TEST BANK for Fundamentals of Information Systems 9th Edition Ralph Stair; George Reynolds Chapter 1: An Introduction to Information Systems in Organizations 1. Information is simply a collection of raw facts such as an employee number or the total hours worked in a week. a. True
*b. False
2. Data represents real-world things including raw facts such as imageand
audio data. *a. True b. False
3. A set of random or unrelated tasks performed to achieve a definite
outcome is called a process. a. True
*b. False
4. The term data is used to label raw facts such as height and weightof a
patient. *a. True b. False
5. Reengineering and continuous improvement have the same definition. a. True
*b. False
6. A sustaining innovation is one that initially provides a lower levelof
performance than the marketplace has grown to accept. a. True
*b. False
7. The concept of a value chain is not significant to organizations
unless they manufacture products. a. True
*b. False
8. Over time, disruptive innovation tends to become less attractive tousers
in a new market. a. True
*b. False 9. Perceived usefulness and ease of use of a system influence an
individual’s attitude toward the system. *a. True b. False
10. The diffusion of innovation theory states that adoption of any
innovation happens all at once for all members of the targeted population. a. True
*b. False
11. The diffusion of innovation theory can be useful in planning the
rollout of a new information system. *a. True b. False
12. The activities that lead to getting the right product into the right
consumer's hands in the right quantity at the right time at theright cost are known as value chain management. a. True
*b. False
13. Opportunities in information systems are available to people from
different parts of the world.
*a. True b. False
14. The role of a systems analyst is narrowly defined and seldom
involves communications with others. a. True
*b. False 15. The information systems operations group is responsible for the
day-to-day running of IS hardware to process the organization’s information systems workload. *a. True b. False 16. The successful implementation for change only happens when people accept the need for change and believe that it will improve factors such as productivity and/or customer satisfaction. *a. True b. False
17. "Adapting" is the second stage in Lewin's Change Model, which
involves learning new work methods, behaviors, and systems. a. True
*b. False
18. According to Lewin's Change Model, an organization must
deliberately change old habits, learn new work methods, and accept the new work methods as parts of the job. *a. True b. False
19. Today, many organizations can function and compete effectively
without computer-based information systems. a. True
*b. False
20. For someone to be a good CIO, technical ability is the most
important characteristic. a. True
*b. False
21. One of the primary roles of a senior IS manager is to communicate
with other areas of the organization to determine changing business needs. *a. True b. False 22. A feedback mechanism is an optional component of an information
system. a. True
*b. False
23. An organization's technology infrastructure includes all of the
hardware, software, databases, networks, people, and procedures that are configured to collect, manipulate, store, and process data into information. *a. True b. False
24. Cole has just landed a job as a sales representative in a department
store. Nina is teaching him the set of steps he should follow to ring up, take payment for, and bag a purchase for a customer.Cole is learning a procedure. *a. True b. False 25. The process of defining relationships among data to create useful
information requires . a. an information system b. a formal education
*c. knowledge
d. intuition 26. A clothing store chain tracks the sale of each product at each location.
Managers use this information to calculate the organization's profits, to track inventory needs, and to determine which styles and fabrics are the most popular among its customers. This is an example of quality information that is . *a. flexible b. economical c. relevant d. verifiable 27. The value of information is directly linked to how it helps decision
makers achieve their organization’s . a. cost/profit target
*b. goals c. cost reduction initiatives d. customer satisfaction levels 28. In terms of information systems, Wikipedia would be an example of
.
a. a personal IS
*b. a group IS c. an enterprise IS d. an organizational complement 29. Which of the following is NOT an organizational complement? a. well-trained workers b. system support c. new decision rights
*d. familiar processes 30. To keep information beyond reach of unauthorized users is to keep the
information *a. secure b. economical c. simple d. verifiable
.
31. Harrison works at a nationally known grocery store chain. He is
analyzing sales data from the past five years to determine which lowselling products should be discontinued. Harrison is most likely a(n) . *a. data scientist b. end user c. knowledge worker d. top executive
32. Providing value to a
is the primary goal of any organization.
*a. stakeholder b. product c. competitor d. service 33. In a manufacturing organization, the supply chain is a key value
chain whose primary activities include all of the following EXCEPT: a. inbound logistics
*b. finance and accounting c. marketing and sales d. customer service 34. The idea of
is a form of innovation that constantly seeks ways to improve business processes and add value to products and services. a. reengineering b. process redesign c. disruptive change *d. continuous improvement 35. The performance levels of radically new 'high-tech' products usually
improve with newer versions. Such types of products are known as a. sustaining innovations b. continuous improvement
*c. disruptive innovations d. business reengineering 36. Which of the following theories explains how a new idea or product
gains acceptance and spreads through a specific population or subset of an
organization? *a. diffusion of innovation theory b. contingency theory c. public choice theory d. two-factor theory 37. In a supply chain,
involve the transformation, movement, and storage of supplies and raw materials. a. virtual flows b. matrix flows c. information flows
*d. physical flows is a visa program that allows skilled employees from foreign lands into the United States. 38.
a. L-1B
*b. H-1B c. 4F d. G-5 are responsible for running and maintaining information system equipment and also for scheduling, hardware maintenance, and preparing input and output. 39.
a. Data-entry operators
*b. System operators c. Web operators d. Local area network operators 40. encompasses all the activities required to get the right product into the right consumer’s hands in the right quantity at the right time and at the right cost, from acquisition of raw materials through customer delivery. *a. Supply chain management b. Value chain management c. Inventory management d. Customer management 41. Suppose you are assigned to manage a virtual team. Which of the
following will you NOT do? a. define goals, and set expectations
b. be aware of team members cultural sensitivity c. ensure the team members are familiar with each other at a personal
level *d. hold team meetings regularly - whether the team members like it or not 42. Suppose, you need to advise someone about getting a certification.
Which of the following will be appropriate advice? a. Getting certification is a sure way of improving your income
*b. Certifications are vendor-specific c. Certifications are the same as courses offered at universities d. You need a college degree before you can take a certification exam 43. All of the following are positive driving forces that influence chance
according to Lewin's Theory of Force Field Analysis, EXCEPT: a. beliefs
*b. past performance c. expectations d. cultural norms 44. According to the diffusion innovation theory, are the risk takers,
always the first to try new products and ideas. a. early majority b. late majority c. early adopters
*d. innovators 45. Which of the following is NOT one of the four main components in
Leavitt's Diamond? a. people *b. systems c. tasks d. technology 46. Positive outcomes of continuous improvement include a. increased customer loyalty b. increased customer satisfaction c. protection against competitors
*d. all of these
.
47. According to Lewin and Schein's 3-stage model of organizational
change, which of the following tasks would be found in the 'unfreezing' stage? a. Monitor progress against success criteria b. Establish controls to ensure change is occurring c. Establish processes and systems to institutionalize change
*d. Assign leaders and implementation team
48. Suppose you work at a business unit that has group of people who
would rather wait to try a new technique. They listen to and follow the opinion leaders. They would be classified as the . a. innovators b. early adopters
*c. early majority d. late majority 49. You might be an information systems worker if you . a. prefer a slow-paced environment, where technology rarely changes b. prefer to work only on the computer and are not interested in the
business *c. enjoy learning new techniques and enjoy working with people d. are good in book-keeping, like an accountant 50. In most large organizations, the IS department is divided into the
following functions . a. operations and development
*b. operations, development, and support c. operations and support d. systems, operations, and development 51. Important functions of the chief information officer include a. employing an IS department's equipment and staff to help the
organization reach its goals b. monitoring the financial considerations of the IS department, such as return on investment c. ensuring the organization complies with laws and regulations
*d. all of these 52. In a large IS organization, the professional who is responsible for
maintaining the security and integrity of the organization's systems and data is . a. the data center manager b. the data security manager c. the system security operator
*d. the information systems security analyst 53. Which of the following is NOT a task typically associated with the
systems analyst role? a. conveying system requirements to software developers and network
architects b. troubleshooting problems after implementation
*c. collaborating with others to build a software product from scratch d. choosing and configuring hardware and software 54. One method an IS professional might use to find a new job would be a. seeking referrals from colleagues, friends, and family members b. searching and applying for open positions on Internet job sites c. networking through an IS professionals' organization
*d. all of these 55. Which of the following is NOT one of the functions of a
computer-based information system? a. collect data b. store data
*c. apply data d. process data 56. Calligraph Publishing Inc.'s information system allows its customers to
access the system to retrieve information on new releases, inventory levels, and more. This must be a .
.
a. personal IS b. group IS
*c. enterprise IS d. none of these answers is the awareness and understanding of a set of information and the ways that information can be made useful to support a specific task or reach a decision. 57.
Correct Answer(s): a. Knowledge
58. For each type of IS (personal, group, enterprise), there are that must
be in place to ensure successful implementation and use of the system. Correct Answer(s): a. organizational complements
59. An information system that improves the productivity of individual
users in performing stand-alone tasks is called a(n). Correct Answer(s): a. personal IS
60. A manufacturing facility has a series of activities that converts the
raw materials into valuable products. Such a series of activities make up the organization's chain. Correct Answer(s): a. value
61. A(n)
is a group of individuals whose members are distributed geographically, but who collaborate and complete work through the use of information systems technology. Correct Answer(s): a. virtual team
62. In any organization,
such as raw materials, labor, facilities,
equipment, and knowledge, are needed to transform them to outputs in a way that increases the input's value. Correct Answer(s): a. inputs
63. The radical redesign of business processes, organizational structures,
information systems, and values of an organization to achieve a breakthrough in business results is known as Correct Answer(s): a. reengineering
.
is a theory that proposes that every organizational system is made up of four main components—people, tasks, structure, and technology—with an interaction among the four components so that any change in one of these elements will necessitate a change in the other three elements. 64.
Correct Answer(s): a. Leavitt’s diamond
65. The attitude towards using an information system depends on its
perceived ease-of-use and perceived . Correct Answer(s): a. usefulness
66. In the technology acceptance model (TAM),
is defined as the degree to which individuals believe that use of the system will improve their performance. Correct Answer(s): a. perceived usefulness
67. Sarah, as the head of a business division, wants to set up a network
access account for a new employee. She should call the to get this done. Correct Answer(s): a. LAN administrator or b. Network administrator
68. A(n)
is a professional in a developmental group of an information systems department who assists in choosing and configuring hardware and software, matching technology to users’ needs, monitoring and testing the system in operation, and troubleshooting problems after implementation. Correct Answer(s): a. systems analyst design and set up databases to meet an organization’s needs.
69.
Correct Answer(s): a. Database administrators b. DBAs c. database administrators 70. The
group of a typical information systems organization is responsible for the day-to- day running of IS hardware to process the organization’s information systems workload. Correct Answer(s): a. operations
convert a program design developed by a systems analyst or software developer using one of many computer languages. 71.
Correct Answer(s): a. Programmers b. programmers
is a process for testing skills and knowledge, which results in a statement by the certifying authority that confirms an individual is capable of performing particular tasks. 72.
Correct Answer(s): a. Certification b. certification
73. Process redesign, which is also known as
, involves the radical redesign of business processes, organizational structures, information systems, and values. Correct Answer(s): a. business process reengineering
74. "Kaizen" is the Japanese word for
.
Correct Answer(s): a. continuous improvement 75. The
theory was developed by E.M. Rogers to explain how a new idea or product gains acceptance and diffuses (or spreads) through a specific population or subset of an organization. Correct Answer(s): a. diffusion of innovation
76. The first stage of Lewin's change model,
, means ceasing old habits and creating a climate that is receptive to change. Correct Answer(s): a. unfreezing
77. According to Leavitt's theory, in one aspect of the information system
element will necessitate changes in other elements also. Correct Answer(s): a. change
78. Laptops are a good example of
because they are gradually displacing desktop computers due to new and better performance characteristics. Correct Answer(s): a. disruptive innovation
79. Of the five categories of innovation adopters, are always the first
to try new products and ideas. Correct Answer(s): a. innovators
is the term used to describe the information systems and solutions built and deployed by departments other than the information 80.
systems department. Correct Answer(s): a. Shadow IT b. shadow IT c. Shadow Information Technology d. shadow information technology
81. Briefly distinguish among data, information, and knowledge.
Correct Answer: Data consists of raw facts, such as employee number or total hours worked in a week, an inventory part number, or the number of units produced on a production line.Information is a collection of facts organized and processed so that they have additional value beyond the value of individual facts. For example, a sales manager may want individual sales data summarized to see the total sales for the month. Providing information to customers can also help companies increase revenues and profits. Knowledge is the awareness and understanding of a set of information and the ways that information can be made useful to support a specific task or reach a decision. Having knowledge means understanding relationships in information. 82. Define the term value chain and briefly discuss the purpose of the supply chain component in a manufacturing organization. Correct Answer: The value chain is a series (chain) of activities that an organization performs to transform inputs into outputs in such a way that the value of the input is increased. In a manufacturing organization, the supply chain is a key value chain whose primary activities include inbound logistics, operations, outbound logistics, marketing and sales, and service. These primary activities are directly concerned with the creation and/or delivery of the product or service. There are also four main areas of support activities, including technology infrastructure, human resource management, accounting and finance, and procurement.
83. Explain the difference between sustaining and disruptive
innovation. Correct Answer: Sustaining innovation results in enhancements to existing products, services, and ways of operating. Such innovations are important as they enable an
organization to continually increase profits, lower costs, and gain market share. A disruptive innovation is one that initially provides a lower level of performance than the marketplace has grown to accept. Over time, however, the disruptive innovation is improved to provide some new performance characteristics and becomes more attractive to users in a new market. As it continues to improve and begins to provide a higher level of performance, it eventually displaces the former product or way of doing things.
84. Discuss the roles, functions, and careers in information systems(IS).
Correct Answer: Information systems (IS) offer many exciting and rewarding careers. Professionals with careers in information systems can work in an IS department or outside a traditional IS department as Web developers, computer programmers, systems analysts, computer operators, and many other positions. There are also opportunities for IS professionals in the public sector. In addition to technical skills, IS professionals need skills in written and verbal communication, an understanding of organizations and the way they operate, and the ability to work with people and in groups. Most medium to large organizations manage information resources through an IS department. In smaller businesses, one or more people might manage information resources, with support from outsourced services.
85. Describe both of Lewin's theories—change model and force field
analysis—and explain how they are related. Correct Answer: Lewin's change model proposes that organizational change goes through three stages: Unfreezing, which means ceasing old habits and creating a climate that is receptive to change; moving, which involves learning new work methods, behaviors, and systems; and refreezing, which involves reinforcing changes to make the new process accepted. Lewin went on to identify two types of forces that can influence these stages, which are explained in his theory of force field analysis. Driving (positive) forces are beliefs, expectations, and cultural norms that encourage change, while restraining (negative) forces make change difficult to accept or implement.
Chapter 2: Hardware and Software 1. Each central processing unit (CPU) produces a series of electronic pulses at a predetermined rate, called the clock speed, which affects machine cycle time. *a. True b. False
2. RAM stands for random access memory; a form of memory that holds
itscontents even if the current is turned off or disrupted. a. True
*b. False
3. You have lots of images on your hard drive totaling 500 million
bytes. A 2 Gigabyte storage device will be adequate to store those photos *a. True b. False
4. Massively parallel processing systems are a form of multiprocessing
that speeds processing by linking hundreds or thousands of processors to operate at the same time. *a. True b. False
5. Secondary storage can store large amounts of data, instructions, and
information more permanently than allowed with main memory. *a. True b. False
6. Virtual tape technology can decrease data access time, lower the total
cost of ownership, and reduce the amount of floor space consumedby tape operations. *a. True b. False
7. In a typical computer configuration, secondary storage has a
much larger capacity than the volatile random access memory. *a. True b. False 8. Solid state storage devices (SSDs) store data in hard disk drives or optical media rather than memory chips. a. True
*b. False
9. A liquid crystal display (LCD) functions by exciting organic
compounds with electric current to produce bright and sharp images. a. True
*b. False
10. Bioprinting, which uses 3D printers to build human parts and organs
from actual human cells, is widely considered to be unethical. a. True
*b. False
11. When dealing with large multinational or global organizations,
vendors often sell their software programs to the organizations butthen outsource the technical support to local, third-party distributors. *a. True b. False
12. The need for additional data storage capacity is one of the factors
driving the growth in data centers. *a. True b. False
13. Thin client computers are a type of portable single-user computers. a. True
*b. False
14. As the difference among computer manufacturers in the areas of price
and performance narrows, support for green computing is emergingas a new business strategy for these companies to distinguish themselves from the competition. *a. True b. False 15. The scope of green computing is limited to the efficient and environmentally responsible design and manufacture of all types of computers. a. True
*b. False
16. Some smartphones allow you to take notes and to "write" emails or text
messages by speaking into the phone. These are examples of speechrecognition technology. *a. True b. False 17. Depending on the brand of tablet you purchase, you may be able to
enter data by typing on a keyboard, writing on the screen with a stylus, or speaking into the tablet's microphone. *a. True b. False
18. An operating system is a set of programs that controls the computer
hardware and acts as an interface with applications. *a. True b. False
19. The operating system converts a basic user request into the set of
detailed instructions that the computer hardware requires, thus acting as an intermediary between the application and the hardware. *a. True b. False
20. The operating system’s application programming interface
(API) provides software developers with tools they use to build application software without needing to understand the inner workingsof the operating system and hardware. *a. True b. False
21. A
command-based user interface employs icons and menus that peopleuse to send commands to the computer system. a. True
*b. False 22. Most operating systems support virtual memory which allocates space
on the hard disk to supplement the immediate, functional memory capacity of RAM. *a. True b. False 23. If 10 users can run programs at the same time on the same computer,it
is known as multi-tasking. a. True
*b. False
24. Your friend has a Mac that runs OS X. If she needs to run a
Windows app on it, she can set it to run Windows also. *a. True b. False
25. Corporate executives often object to the use of open-source
software because it lacks formal technical support, even though information and solutions regarding the software are usually readily available online. *a. True b. False
26. An embedded system is a computer system that is implanted in and
dedicated to the control of another device. *a. True b. False 27. Utility programs help to perform maintenance, correct problems,
merge and sort sets of data, keep track of computer jobs, and compressdata files. *a. True b. False
28. The primary function of application software is to apply the power of
the computer to enable people, workgroups, and the entire enterpriseto solve problems and perform specific tasks. *a. True b. False 29. Proprietary software is mass-produced by software vendors to address needs that are common across businesses, organizations, or individuals. a. True
*b. False 30. Software as a Service (SaaS) allows businesses to subscribe to Web-
delivered business application software by paying a monthly service charge or a per use fee. *a. True b. False
31. Software as a Service (SaaS) refers to the use of computing resources,
including software and data storage, on the Internet ratherthan local computers. a. True
*b. False
32. A software suite is a collection of programs packaged together as a
bundle and typically includes a word processor, spreadsheet program, graphics program, and more. *a. True b. False 33. Suppose your friend, who is a small business owner, wants to
computerize her business functions such as accounting, payroll, and inventory management. She would need to purchase separate software to meet each functional requirement. a. True
*b. False
34. Each programming language has a set of rules, called the program
code of the language. a. True
*b. False
35. A single computer can be used by a single user or by multiple,
simultaneous users. *a. True b. False 36. An example of a common hardware function performed by the
operatingsystem is presenting information on a monitor or printer. *a. True b. False
37. Operating systems provide a measure of security by allowing usersto
access to those resources they've been cleared to use as well as other users' resources if those resources are beneficial. a. True
*b. False
38. Utility programs are used to perform system maintenance, such as
repairing errors on a hard drive, improving system security, and optimizing sluggish system processes.
*a. True b. False
39. If a large organization wants software that will benefit the entire
organization—what's known as enterprise application software—the organization must develop it specifically for the business in order to get the functionality required. a. True
*b. False
40. The use of virtual servers is growing rapidly because virtualization
can save millions of dollars per year in capital andoperating expenses. *a. True b. False
41. Software can be divided into two types: operating software and
application software. a. True
*b. False
Software that allows an individual to create a to-do list, take notes, and organize tasks in a database would be classified as having apersonal sphere of influence. 42.
*a. True b. False
43. A
is a climate-and-access-controlled building or a set of buildings that houses the computer hardware that delivers an organization’s data and information services. a. data mart b. data warehouse
*c. data center d. data mine
44. A type of memory whose contents are not lost if the power is turned
off or interrupted is said to be . a. unarbitrary
*b. nonvolatile c. inaccessible d. nonadjacent is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manner to solve a common problem. 45.
a. Cloud computing
*b. Grid computing c. Parallel computing d. Web computing is a program concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IS-related products. 46.
*a. Green computing b. Grid computing c. Cloud computing d. Utility computing 47. The component of a computer that provides the CPU with a
working storage area for program instructions and data is called the *a. main memory b. input/output device c. bus d. processor
.
48. Carson's supervisor has asked him to review a variety of portable
computers for possible purchase for their company's employees. Which of the following should Carson NOT consider buying? a. laptops b. notebooks
*c. nettops d. tablets 49.
is a storage technology that is primarily used only for backups. a. Magnetic disk b. Compact disc
*c. Magnetic tape d. Cache memory 50. 3D printing is
.
a. printing illusions on paper
*b. used to make solid products c. for kids to play with d. the same as 2D printing 51. A(n)
device provides data and instructions to the computer and receives results from it. a. back-side b. expansion c. internal
*d. input/output are used in standardized tests, including the SAT and GMAT tests, and to record votes in elections. 52.
a. Magnetic Ink Character Recognition (MICR) devices
*b. Optical mark recognition (OMR) systems c. Speech recognition devices d. Optical character recognition (OCR) systems 53. Helen is 72 years old and is a retired school teacher on a fixed income.
She would like to buy a new computer so that she can communicate via email, follow friends and family on social media, and occasionally access recipes and gardening tips from the Web. An important thing to consider is
that Helen has arthritis in her hands, making it difficult for her to work with small buttons and gadgets. So, of the following options, her best choice is probably a(n) . a. smartphone b. e-book c. desktop *d. nettop are used to support engineering and technical users who perform heavy mathematical computing, computer-assisted design (CAD), video editing, and other applications requiring a high-end processor. 54.
a. Desktops b. Netbooks
*c. Workstations d. Notebooks 55. A
is a low-cost, centrally managed computer with no internal or external attached drives for data storage with limited capabilities. a. nettop computer b. cloud computer
*c. thin client d. workstation are the most powerful computers with the fastest processing speed and highest performance. 56.
a. Blade servers b. Workstations c. Mainframe computers
*d. Supercomputers 57. CPU clock speed is the
at a predetermined rate.
a. number of instructions processed
*b. number of electronic pulses created c. number of files created d. number of memory pages loaded 58. Which of the following types of credit cards is currently diminishing in
popularity and being replaced by the other three types?
*a. magnetic stripe b. chip card c. smart card d. contactless payment card 59. Which of the following is NOT an example of a common use of a
point-of-sale (POS) device? a. A server in a restaurant uses a POS to communicate a diner's order
to the kitchen. b. A nurse in a hospital uses a POS to enter a patient's vital signs into his records. c. A barrista in a coffee store uses a POS to record a sale of some bakery items. *d. A teller in a bank uses a POS to withdraw money for a customer. 60. An information system that operates in the
sphere of influence supports two or more people who work together to achieve a common goal. a. personal
*b. workgroup c. enterprise d. social 61. An operating system with capabilities allows a user to run more than
one program concurrently. a. networking b. hardware independence c. memory management
*d. multitasking 62. The
is the heart of the operating system and controls its most critical processes. a. user interface b. register
*c. kernel d. cache is an open-source operating system whose source code is freely available to everyone. 63.
*a. Linux b. Mac OS X c. Chrome d. Unix 64. Which of the following statements is NOT true about a mainframe
computer? *a. A single computer with a single user istypical of a mainframe computer. b. A mainframe computer provides the computing and storage
capacity to meet massive data processing requirements. c. A mainframe computer offers users high performance and excellent system availability. d. A wide range of application software has been developed to run in the mainframe environment.
65. New cars come with an onboard computer that controls anti-
lock brakes, air bag deployment, fuel injection, etc. The software is known as . a. a multi-user system
*b. an embedded system c. an enterprise system d. mobile application software 66. Today’s mobile phones and some PCs use a touch user interface
called a allow people to control the personal computer.
to
a. multiprocessing user interface b. command-based user interface c. speech recognition user interface
*d. natural user interface 67. One of the disadvantages of proprietary software is that
.
a. it is hard to control results even if one is involved in the
development of software *b. it can take a long time and significant resources to develop the required software features c. it does not allow modification of featuresthat one might need
to counteract an initiative by competitors d. it is difficult to achieve what is required in terms of features and reports 68. One of the advantages of off-the-shelf software is that
.
a. an organization does not have to pay for features that are not
required and never used b. the software always matches current work processesand data standards *c. the initial cost is lower because the software firm can spread the development costs over many customers d. the software contains important features, thuseliminating the need for future modification and customization 69. The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called . a. cloud computing b. rapid application development
*c. service-oriented architecture d. Software as a Service 70. One advantage of proprietary software versus off-the-shelf software is
that
.
a. the initial cost is lower b. the software is likely to meet the basic business needs that
are common across organizations c. the software is likely to be of high quality because many customer firms have tested the software and helped identify its bugs *d. the software provides a company a competitive advantage by solving problems in a unique manner
is a personal application software that includes a wide range of built-in functions for statistical, financial, logical, database, graphics, and date and time calculations. 71.
a. Word processing b. Desktop Publishing (DTP)
*c. Spreadsheet d. Graphics 72. A global positioning system (GPS) device uses a(n) to help people
find their way around town or more remote areas. a. user software b. integrated development environment c. personal productivity software
*d. embedded system 73. All of the following are examples of someone using personal productivity
software EXCEPT
.
a. Shawna creating an electronic to-do list for the weekend b. Mark entering appointments into his online calendar
*c. Callie entering a customer's order into a restaurant's ordering system d. Brandon recording the number of miles he's run each day on his exercise tracker 74. All of the following are examples of activities performed by an operating system EXCEPT . a. allowing a user to manage system memory b. allowing a user to control common computer hardware functions c. allowing a user to manage files
*d. allowing a user to do word processing 75. Kendra is taking a class in Finance and she has been asked to give a
speech about a case study in which she's been working. She wants to create a set of slides containing a summary of her study notes that she will project on a screen while she's speaking. Which type of personal application software should she use to create her slides? a. word processing b. database c. spreadsheet analysis
*d. presentation graphics 76. Globally, spending on now exceeds other categories of IT expenditures. a. hardware
*b. software c. servers d. operating systems 77. Which of the following is a smart way to reduce the impact of
software bugs on your own computing? a. Register the software programs you buy so that you receive
bug alerts, fixes, and patches. b. Install the latest software updates c. Check the read-me files or online support Web site for patches and other solutions. *d. All of these answers 78. Clock speed of the central processing unit (CPU) is often measured
in billions of cycles per second also known as
.
Correct Answer(s): a. gigahertz
79. The ability to increase the processing capability of a computer system
so that it can handle more users, more data, or more transactions in a given period is known as . Correct Answer(s): a. scalability
80. Key to the success of grid computing is a(n)
that acts as a grid
leader and traffic monitor. Correct Answer(s): a. central server
81. Eight bits together form a(n)
.
Correct Answer(s): a. byte
82. A(n)
is a direct access storage device that is used to store and retrieve data from rapidly rotating disks coated with magnetic material. Correct Answer(s):
a. hard disk drive (HDD)
83. A universal serial bus (USB)
drive is one example of a commonly used solid state secondary storage device (SSD). Correct Answer(s): a. flash
84. Optical mark recognition (OMR) and optical character recognition
(OCR) are the two categories of a(n) . Correct Answer(s): a. optical data reader
is the simultaneous execution of the same task on multiple processors to obtain results faster. 85.
Correct Answer(s): a. Parallel computing b. parallel computing
is a technology that employs a microchip with an antenna to broadcast its unique identifier and location to receivers. 86.
Correct Answer(s): a. Radio frequency identification (RFID) b. RFID c. radio frequency identification
87. If you would like a portable computer that has a roughly 13-inch
screen, keyboard, and a pointing device, choose a computer. Correct Answer(s): a. laptop
88. A(n)
is a climate-and-access-controlled building, or set of buildings, that houses the computer hardware that delivers an organization’s data and information services. Correct Answer(s): a. data center
input devices, such as Nintendo's Wii remote and PlayStation's Move game controllers, have become very popular in the gaming industry. 89.
Correct Answer(s): a. Motion-sensing b. motion-sensing
90. One common use of a
is in engineering design, when designers need to make a prototype, or model, of the object they're designing. Correct Answer(s): a. 3D printer
91. For most companies, the spheres of influence are
, workgroup, and
enterprise. Correct Answer(s): a. personal
92. A(n)
is a defect in a computer program that keeps it from performing as its users expect it to perform. Correct Answer(s): a. software bug b. bug
programming language is the precursor to languages such as C++, C#, and Java. Correct Answer(s): a. C 93.
94. A(n)
is a set of programming instructions and standards for one software program to access and use the services of another software program. Correct Answer(s): a. application programming interface (API)
95. Being able to develop software without concern for the specific
underlying hardware is referred to as . Correct Answer(s): a. hardware independence
works by swapping programs or parts of programs between memory and one or more disk drives. 96.
Correct Answer(s): a. Virtual memory
software addresses the needs that are common across businesses, organizations, or individuals. 97.
Correct Answer(s): a. Off-the-shelf b. Off the shelf c. Package d. Packaged e. Mass-produced f. Mass produced
98. Your business manager wants to be able to integrate multiple
business applications. The integration software is typically known as . Correct Answer(s): a. Middleware 99. Office workers have the need for a word processor, spreadsheet
program, database program, and graphic presentations software. A package that combines all these software programs is known as a(n) . Correct Answer(s): a. software suite b. office suite c. application suite
100.
is a set of rules associated with a programming language. Correct Answer(s): a. Syntax
101. Mac users can set up their computers to run both Windows and Mac
OS X and select the platform they want to work with when they boot their computers. This is called dual . Correct Answer(s): a. booting
102. Organizations that run hundreds or even thousands of servers in a
server farm are naturally concerned about for low-cost, renewable energy sources.
, which is why they're looking
Correct Answer(s): a. power usage b. power c. performance per watt
103. The ethical imperative that "care must be taken when recycling or
destroying electronic devices to avoid contaminating the environment" is associated with . Correct Answer(s): a. green computing
104. Lara recently purchased the Microsoft Office Suite for her own use on
her laptop. She has not really purchased the software but rather a
.
Correct Answer(s): a. single-user license
105. Explain the primary difference between random access
memory(RAM) and read-only memory (ROM). Correct Answer: RAM chips are volatile storage devices, meaning they lose their contents if
the current is turned off or disrupted (as happens in a power surge, brownout, or electrical noise generated by lightning or nearby machines). ROM is nonvolatile meaning that its contents are not lost if the power is turned off or interrupted. 106. What is grid computing? How does it work?
Correct Answer: Grid computing is the use of a collection of computers, often owned by many people or organizations, to work in a coordinated manner to solve a common problem. Key to the success of grid computing is a central server that acts as a grid leader and traffic monitor. This controlling computer divides the computing task into subtasks and assigns the work to computers on the grid that have (at least temporarily) surplus processing power. The central server also monitors the processing, and if a member of the grid fails to complete a subtask, it will restart or reassign the task. When all the tasks are completed, the controlling server combines the results and advances to the next task until the whole job is completed.
107. Distinguish between systems software and applications software.
Correct Answer: Systems software is the set of programs designed to coordinate the activities and functions of the hardware and various programs throughout the computer system. Applications software consists of programs that help users solve particular computing problems.
108. What is the sphere of influence? Identify three spheres of
influence. Correct Answer: One useful way of classifying the many potential uses of information systems is to identify the scope of the problems and opportunities that the system is designed to address. This scope is called the sphere of influence. For most companies, the spheres of influence are personal, workgroup, and enterprise. The personal sphere of influence concerns the needs of individual users. The workgroup sphere of influence addresses the needs of two or more people who work together to achieve a common goal. The enterprise sphere of influence supports a firm in its interaction with customers, suppliers, shareholders, competitors, special-interest groups, the financial community, and government agencies.
109. Distinguish between multitasking and multithreading.
Correct Answer: Multitasking allows more than one program to run concurrently on an operating system. Multithreading allows different threads of a single program to run concurrently. A thread is a set of instructions within an application that is independent of other threads.
110. Discuss three disadvantages of using proprietary software.
Correct Answer: It can take a long time and significant resources to develop the required features. In-house system developers may become hard pressed to provide the required level of ongoing support and maintenance because of pressure to move on to other new projects. The features and performance of software that has yet to be developed presents potential risk. 111. Discuss the growth in mobile application software.
Correct Answer: The number of applications (apps) for smartphones and other mobile devices has exploded in recent years. Besides the valuable mobile apps that come with these devices, hundreds of thousands of applications have been developed by third parties. For example, iPhone users can download and install thousands of apps using Apple’s App Store. Over 1 million mobile apps are available at the Google Play site for users of Android handsets. Microsoft and other software companies are also investing in mobile apps for devices that run on their software.
Chapter 3: Database Systems and Big Data 1. A database, a database management system, and the application programs that use the data, make up a database environment. *a. True b. False
2. A field is typically a name, number, or combination of charactersthat
describes an aspect of a business object. *a. True b. False
3. A collection of data fields that are all related to one object,activity,
or individual is called a file. a. True
*b. False
4. An attribute is a general class of people, places, or things forwhich
data is collected, stored, and maintained. a. True
*b. False
5. If "color" is an attribute, then "green" is a data item.
*a. True b. False
6. Two sets of fields can have a common primary key. a. True
*b. False 7. The database approach to managing data is superior to the file-based
approach. *a. True b. False
8. Today, most organizations use the traditional approach to data
management, where multiple information systems share a pool of related data. a. True
*b. False 9. DBMSs are used primarily for modeling data. a. True
*b. False
10. A database must reflect the business processes of an organization.
*a. True b. False
11. Two of the major challenges business users face when using big data
are finding the information they need to make decisions and knowing that the data they have is valid. *a. True b. False
12. An enterprise data model is created only for documentation, but is
otherwise inconsequential. a. True
*b. False
13. The relational model describes data using a standard tabular format; all
data elements are placed in three-dimensional tables calledrelations, which are the logical equivalent of files. a. True
*b. False
14. A relational model splits the information up into many two
dimensional data structures.
*a. True b. False
15. In the context of the relational database model, selecting involves
combining two or more tables. a. True
*b. False
16. In the context of the relational database model, projecting
involves eliminating columns in a table. *a. True b. False
17. One of the primary advantages of a relational database is that it allows
tables to be linked to reduce data redundancy and allow data tobe organized more logically. *a. True b. False 18. The relational database model is currently the most widely used.
*a. True b. False
19. A database management system (DBMS) serves as an interface
betweenan application program and a database. *a. True b. False
20. Some of the key factors in database design are content, access,
structure, archiving, and security. *a. True b. False
21. A database administrator (DBA) is an important nontechnical
position responsible for defining and implementing consistent principles for a variety of data issues, including setting data standards and data definitions that apply across all the databases inan organization. a. True
*b. False
22. A database administrator (DBA) must have a clear understanding of
the fundamental business of an organization, be proficient in the use of selected database management systems, and stay abreast of emerging technologies and new design approaches. *a. True b. False
23. Unstructured data comes from sources such as word-
processing documents and scientific research. *a. True b. False
24. Suppose a manager wishes to analyze historical trends in sales. He
would use the online transaction processing (OLTP) system. a. True
*b. False
25. For each data item, a data dictionary usually contains informationsuch
as the name of the data item, the range of values that can be used, and the amount of storage needed for the item. *a. True b. False
26. Data modeling usually involves setting a specific business goal andthen
analyzing the data and information needed to reach that goal. a. True
*b. False
27. Carlos is working with an existing database, but he wants to
eliminate some of the columns in the table to create a new, more streamlined database. He will use projection to create his new database. *a. True b. False
28. Sometimes a database can contain "bad data," meaning incomplete,
incorrect, inaccurate, or irrelevant records, which can be corrected ordeleted through data cleansing. *a. True b. False
29. Organizations can collect many types of data from a wide variety of
sources, but typically they only collect structured data that fits neatly into traditional relational database management systems. a. True
*b. False
30. Which of the following statements is true of a database? a. It is accessed primarily for use by an organization’s database
administrator and data administrator. b. It provides an essential foundation for an organization’s knowledge management and artificial intelligence systems. c. It is a collection of unstructured data. *d. It helps companies analyze information to open new market opportunities. 31. The smallest piece of data used by a computer is a(n) a. entity b. byte
*c. bit d. character
.
32. A database is a collection of integrated and related
.
a. fields b. attributes c. records
*d. files 33. A collection of fields all related to a single object, activity, or individual
is a(n)
.
*a. record b. file c. attribute d. character 34. A(n)
is a field or set of fields in a record that uniquely identifies the
record. a. attribute b. entity
*c. primary key d. data item is an approach that starts by investigating the general data and information needs of an organization at the strategic level and then examines more specific data and information needs for the functional areas and departments within the organization. 35.
a. Data selecting
*b. Enterprise data modeling c. Data cleansing d. Social graph analysis 36. Each attribute in a relational database model can be constrained to a range of allowable values called a . a. bandwidth b. scope c. slot
*d. domain 37. The action of including only some columns for output while retrieving
data is known as .
a. selecting b. joining
*c. projecting d. linking 38. For the
operation, it is required that the the two tables have a common
attribute. a. delete b. select c. project
*d. join 39. In the
process, all of the data from various sources is converted into a single format suitable for processing. *a. extract b. transform c. load d. consolidate is a special-purpose programming language for accessing and manipulating data stored in a relational database. 40.
a. Query by Example (QBE) b. Access
*c. Structured Query Language (SQL) d. Java 41. Suppose you wish to find what tables are in a database, what fields they
have, and how they are related you would review the
.
a. SQL commands b. attributes
*c. schema d. sample data 42. A
is a collection of instructions and commands used to define and describe data and relationships in a specific database. a. data dictionary b. schema
*c. data definition language
d. data manipulation language 43. The position of a
is a non-technical position responsible for defining and implementing consistent principles for setting data standards and data definitions that apply across all the databases in an organization. a. data analyst
*b. data administrator c. database administrator d. data owner 44. You would use Query by Example, if
.
*a. you wish to use a visual approach to query building b. you build a query from an example c. you use a template for reports d. wish teach SQL with examples , the database is stored on a service provider’s server and accessed by the client over a network, typically the Internet. 45. With
a. Internet access
*b. Database as a Service c. Software as a Service d. Oracle is the term used to describe enormous and complex data collections that traditional data management software, hardware, and analysis processes are incapable of handling. 46.
a. Data warehouse b. Data mart
*c. Big data d. Knowledge base 47. Starting from monthly sales data, if you wish to get weekly sales data, use the feature. a. roll up
*b. drill down c. slice and dice d. extract data
48. A
is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making. a. data dictionary b. data model
*c. data mart d. data mine 49. Suppose a new tech startup wants to define the data model. They would
then
.
a. collect and cleanse the data b. define user access privileges
*c. create the entity-relationship model d. acquire a new database management system 50. After entering data into a relational database, users can make all of the
following basic data manipulations except: a. projecting
*b. organizing c. selecting d. joining 51. To ensure reliability and integrity, SQL databases conform to four
specific properties. Which of the following is NOT one of those four properties? a. atomicity b. durability c. isolation
*d. currency 52. Haley's employer has asked her to review tens of thousands of social
media posts about their company's products and compile this data into a database. In terms of the characteristics of big data, Haley is dealing with a. volume
*b. variety
.
c. velocity d. veracity 53. Kyle works for National Sporting Goods, where he manages critical
data elements, such as identifying and acquiring new data sources, creating consistent reference data, and analyzing data for quality. Kyle is a . *a. data steward b. data administrator c. database administrator d. data manager 54. At Coast-to-Coast Moving and Van Lines, Ryan is responsible for
managing the flow of the company's data, from initial acquisition of new data to deletion of old, outdated data. Ryan is involved in . a. data stewardship
*b. data lifecycle management c. database administration d. data management 55. Most of the data that an organization must deal with is
data,
meaning that it is not organized in any predefined manner. Correct Answer(s): a. unstructured
56. mySQL is a popular
.
Correct Answer(s): a. Database management system b. DBMS c. database program d. database software
57. Together, bits, characters, fields, records, files, and databases form the
Correct Answer(s): a. hierarchy of data
58. If you wish to develop expertise in database management, you must
learn popular language known as
.
.
Correct Answer(s): a. SQL b. Structured query language c. system query language
59. A(n)
is a field or set of fields that uniquely identify a record.
Correct Answer(s): a. primary key
60. The
model database makes it easy to develop queries that involve joining two tables. Correct Answer(s): a. relational
61. Data modeling done at the level of an entire enterprise is called
.
Correct Answer(s): a. enterprise data modeling
use basic graphical symbols to show an organization of and relationships between data. 62.
Correct Answer(s): a. Entity-relationship (ER) diagrams
63. The
model has become the most popular database model.
Correct Answer(s): a. relational
64. In the relational database model, each row of a table represents a(n)
Correct Answer(s): a. entity b. entity instance
65. Oracle, IBM DB2, Microsoft SQL Server, Microsoft Access,
MySQL, and Sybas are databases based on the
model.
.
Correct Answer(s): a. relational 66. In a relational database model, the range of allowable values for a data attribute is called its . Correct Answer(s): a. domain
67. In a relational database model,
involves combining two or more tables.
Correct Answer(s): a. joining
is the process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, irrelevant records that reside in a database. 68.
Correct Answer(s): a. Data cleansing
69. Suppose we have a table that stores student data. In that table we have a
field - Student ID - that uniquely identifies each student. This field is known as the . Correct Answer(s): a. primary key b. key field
70. A(n)
is a collection of instructions and commands used to define and describe data and relationships in a specific database. Correct Answer(s): a. data definition language (DDL)
71. A(n)
is a detailed description of all data used in a database.
Correct Answer(s): a. data dictionary
72.
is a method of dealing with a situation in which two or more
users or applications need to access the same record at the same time. Correct Answer(s): a. Concurrency control
73. A
provides a means to store and retrieve data that is modeled using some means other than the simple two-dimensional tabular relations used in relational databases. Correct Answer(s): a. noSQL database
74. The
is a specific language, provided with a database management system (DBMS) that allows users to access and modify the data, to make queries, and to generate reports. Correct Answer(s): a. data manipulation language (DML)
75. A major advantage of NoSQL databases is the ability to spread data
over multiple servers so that each server contains only a subset of the total data, a characteristic that is known as
Correct Answer(s): a. horizontal scaling capability
76. A(n)
is an individual responsible for defining and implementing consistent principles for a variety of data issues. Correct Answer(s): a. data administrator
77. In the context of a database management system (DBMS), a(n)
interacts with other programs or applications and only indirectly interacts with people or users. Correct Answer(s): a. back-end application
78. A(n)
is a database management system that stores the entire
database in random access memory (RAM). Correct Answer(s): a. in-memory database (IMDB)
79. While building a data warehouse, you are converting dates to months.
This second step in the ETL process is known as . Correct Answer(s): a. Transform b. transformation
80. If an organization is taking a "store everything" approach to data, it will
save all the data in its raw and unaltered form in a . Correct Answer(s): a. data lake
is an open-source software framework that includes several software modules that provide a means for storing and processing extremely large data sets. 81.
Correct Answer(s): a. Hadoop
82. Briefly describe the hierarchy of data.
Correct Answer: Data is generally organized in a hierarchy that begins with the smallest piece of data used by computers (a bit) and progresses through the hierarchy to a database. A bit (a binary digit) represents a circuit that is either on or off. Bits can be organized into units called bytes. A byte is typically eight bits. Each byte represents a character, which is the basic building block of most information. Characters are put together to form a field. A field is typically a name, number, or combination of characters that describes an aspect of a business object or activity. A collection of data fields all related to one object, activity, or individual is called a record. A collection of related records is a file. At the highest level of the data hierarchy is a database, a collection of integrated and related files. Together, bits, characters, fields, records, files, and databases form the hierarchy of data.
83. Briefly describe the relational database model.
Correct Answer: The relational database model describes data using a standard tabular format; all data elements are placed in two-dimensional tables called relations, which are the logical equivalent of files. The tables in relational databases organize data in rows and columns, simplifying data access and manipulation. In the relational model, each row of a table represents a data entity or record. Each column represents an attribute or field. After entering data into a relational database, users can make inquiries and analyze data through use of the selecting, projecting, and joining functions. Selecting involves removing rows according to certain criteria. Projecting involves eliminating columns in a table. Joining involves combining two or more tables.
84. Explain entity-relationship (ER) diagrams.
Correct Answer: Entity-relationship (ER) diagrams use basic graphical symbols to show an organization of and relationships between data. In other words, ER diagrams show data items in tables (entities) and the ways they are related. ER diagrams help ensure that the relationships among the data entities in a database are correctly structured so that any application programs developed are consistent with business operations and user needs. In addition, ER diagrams can serve as reference documents after a database is in use. If changes are made to the database, ER diagrams help design them. 85. Define the role of a database administrator and of a data
administrator, and explain the difference between the two. Correct Answer: Based on their understanding of business users' needs, database administrators apply database programming languages to craft a set of databases to meet those needs. Database administrators are also responsible for testing, evaluating, changing, improving, securing, monitoring, and maintaining those databases. DBAs focus on creating and maintaining databases, while the data administrator, on the other hand, focuses on how the databases are used within the organization. A data administrator defines and implements consistent principles for a variety of data issues, and works with managers to identify who is able to read and update the databases.
86. Define the terms data management and data governance, and explain
how organizations are using them to address the challenges of big data. Correct Answer: Big data presents many challenges to organizations trying to use this information to make sound business decisions. There is a tremendous volume of data now available, and it comes from a variety of structured and unstructured sources. Many people are concerned about the ethical and legal issues related to acquiring and retaining so much data—much of it very personal in nature— as well as the security risks involved. Organizations are now expected to comply with a lot of new legislation related to big data. As a result, many organizations have placed a high priority on data management, meaning the integrated set of functions that defines the processes by which data is obtained, certified, stored, secured, and processed. The goal is to ensure accessibility, reliability, and timeliness. Data governance is the core component of data management, as it defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization. Data governance puts people in place who are responsible for fixing and preventing issues with data.
Chapter 4: Networks and Cloud Computing 1. The United States has high Internet penetration among its population constituting the majority of people online. a. True
*b. False
2. The Internet is the infrastructure on which the Web exists.
*a. True b. False
3. Sensors that can monitor and report on data about traffic and parking
conditions are part of a network of physical objects known asthe Internet of Technology. a. True
*b. False
4. The Transmission Control Protocol (TCP) is responsible for managing
IP addresses and Internet domain names. a. True
*b. False 5. Cascading Style Sheets (CSS) use special Hypertext Markup Language
(HTML) tags to globally define font characteristics for a variety of page elements as well as how those elements are laid out on a Web page. *a. True b. False
6. Like other programs, Java software can run only on specific types of
computers. a. True
*b. False
7. Organizations that are concerned about the security of their data
should not use public cloud computing.
*a. True b. False
8. JavaScript can be used to validate data entry in a Web form.
*a. True b. False
9. Twitter is a microblogging service.
*a. True b. False
10. A podcast is a video broadcast over the Internet. a. True
*b. False
11. Video content can be placed on the Internet using the same approach as
a blog. *a. True b. False
12. There is no way a manufacturing firm would implement an Internet of
Things because the risk of hacking is far too high. a. True
*b. False
13. Businesses and organizations that manage a local area network (LAN)
connect to the Internet via a Web browser. a. True
*b. False
14. The Internet is a hyperlink-based system that uses a
client/server model. a. True
*b. False
15. In a Hypertext Markup Language (HTML), the markers are codes
thattell the browser how to format the text or graphics that will be displayed.
a. True
*b. False
16. A telecommunications protocol is any material substance that
carries an electronic signal to support communications between a sending and receiving device.
a. True
*b. False
17. The Institute of Electrical and Electronics Engineers (IEEE) is a
leading standards-setting organization whose IEEE network standards are the basis for many telecommunications devices and services. *a. True b. False
18. 4G will deliver 3 to 20 times the speed of 3G networks for mobile
devices. *a. True b. False
19. A personal area network (PAN) is a wireless network that connects
information networking devices within a small area, such as an office, home, or several floors of a building. a. True
*b. False 20. A wide area network (WAN) is a telecommunications network that
connects users and their computers in a geographical area that spans a campus or business park, but not beyond the city limits. a. True
*b. False
21. A client is any computer on a network that sends messages
requesting services from the servers on the network. *a. True b. False
22. Network management software is a system software that controls the
computer systems and devices on a network and allows them to communicate with each other.
a. True
*b. False 23. A virtual private network (VPN) supports a secure, encrypted
connection between a company’s employees and remote users through athird-party service provider.
*a. True b. False
24. When you use your lab computer to access a printer, you are usingthe
local area network (LAN). *a. True b. False
25. When you point the remote control to turn on/off the TV, the remoteis
using radio frequency. *a. True b. False
26. The ancestor of the Internet was . a. TCP/IP
*b. the ARPANET c. Telnet d. Web 1.0 is a communication standard that enables computers to route communications traffic from one network to another as needed. 27.
a. The ARPANET b. A Uniform Resource Locator (URL)
*c. The Internet Protocol (IP) d. A Wi-Fi 28. The fiber-optic cables that span the globe over land and under sea make
up the Internet . a. ultrastructure
*b. backbone c. layer d. protocol 29. The Internet is migrating to Internet Protocol version 6 (IPv6), which
uses addresses to provide for many more devices.
a. 32-bit b. 64-bit
*c. 128-bit
d. 256-bit
consists of server and client software, the Hypertext Transfer Protocol (HTTP), standards, and markup languages that combine to deliver information and services over the Internet. 30.
*a. The Web b. A tag c. A cache d. The motherboard 31. Which of the following is a markup language for defining the visual
design of a Web page or group of pages? a. JavaScript
*b. Cascading Style Sheets (CSS) c. Java d. Extensible Markup Language (XML) 32. The Internet Corporation for Assigned Names and Numbers
(ICANN) uses companies called registering domain names.
to handle the business of
a. registry operators
*b. accredited domain name registrars c. network information centers d. independent domain name registries 33. Domain names must always have at least
parts, with each part
separated by a dot (period). *a. two b. three c. four d. five refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser. 34.
a. Grid computing b. Distributed computing c. Utility computing
*d. Cloud computing
is the standard page description language for Web pages.
35.
a. Extensible Markup Language (XML) b. JavaScript c. .NET
*d. Hypertext Markup Language (HTML) 36.
is a markup language designed to transport and store data on the Web. a. Standard Generalized Markup Language (SGML)
*b. Extensible Markup Language (XML) c. Hypertext Markup Language (HTML) d. Hypermedia/Time-based Structuring Language (HyTime)
consist of standards and tools that streamline and simplify communication among Websites and that promise to revolutionize the way the Web is developed and used for business and personal purposes. 37.
a. Web browsers
*b. Web services c. Hyperlinks d. Web forms 38. Java allows small programs, called
, to be embedded with an Hypertext Markup Language (HTML) document. a. cookies b. subroutines
*c. applets d. packets 39. A
is a valuable tool that enables a user to find information on the Web by specifying words or phrases known as keywords, which are related to a topic of interest. a. cookie b. server c. Web portal
*d. search engine 40. Web client software, such as Chrome, Firefox, Internet Explorer,
Safari, and Opera, that are used to view Web pages are known as a. Web portals
*b. Web browsers
.
c. Web analytics software d. search engines is a process for driving traffic to a Web site by using techniques that improve the site’s ranking in search results. 41.
a. Web content streaming
*b. Search engine optimization c. Tunneling d. Internet censorship is a very short-range wireless connectivity technology designed for consumer electronics, cell phones, and credit cards. 42.
a. Microwave transmission b. Wireless mesh
*c. Near field communication (NFC) d. Wi-Fi 43. In a
, all network devices are connected to a common backbone that serves as a shared communications medium. a. star network
*b. bus network c. ring network d. mesh network 44. The area covered by one or more interconnected wireless access points
is commonly called a(n) . a. reception area
*b. hot spot c. coverage zone d. access area 45. A
satellite system employs many satellites that are spaced so that, from any point on the Earth at any time, at least one satellite is on a line of sight, each in an orbit at an altitude of less than 1,000 miles. a. very small aperture terminal (VSAT) b. microwave
*c. low earth orbit (LEO) d. geostationary
46. A
network is one in which all network devices are connected to one another through a single central device called the hub node. a. mesh b. personal c. bus
*d. star 47. A
is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city. *a. metropolitan area network (MAN) b. local area network (LAN) c. wide area network (WAN) d. personal area network (PAN) 48. Which of the following statements is true of network-management
software? a. One of the disadvantages of network-management software is
the large amount of time spent on routine tasks. *b. With network-management software, a manager on a networked personal computer can scan for viruses. c. Network-management software allows software to be copied, modified, or downloaded legally or illegally. d. Network-management software complicates the process of updating files and programs on computers on the network.
49. When you connect your computer to a printer using , the distance
between them cannot be longer than 30 feet. *a. Bluetooth b. Wi-Fi c. near field communication d. infrared 50. When you are looking for a 'hotspot', you are searching for .
*a. a wireless access point b. bluetooth signals c. free charging stations
d. strong satellite signals
51. Which of the following systems can help identify your geolocation?
a. Geographic information systems b. Extranets c. VPNs
*d. GPS 52. If your home air conditioner has an IP address, it is part of the
.
a. satellite communication network b. virtual private network
*c. Internet of Things d. satellite communication network 53. Suppose a business wishes to have access to servers, and storage
devices, but does not want to buy them. What is their best choice? a. Internet of Things
*b. cloud computing - infrastructure as a service c. cloud computing - software as a service d. cloud computing - platform as a service 54. You wish to learn a programming language that can be used on
any computer. What language would it be? a. php b. JavaScript
*c. Java d. ASP.Net 55. Liesel is an entrepreneur, and she'd like to publish a website for her small
business. Liesel . a. will need her own server and IT people to run the server
*b. can use hosting services c. will need to learn Java d. will need to run her own web server on leased servers 56. Social journalism or citizen journalism . a. is accurate most of the time
*b. may not be as reliable as mainstream media sources c. is where everyone gets their news feeds d. is a good source for mostly facts
57.
is a good site to develop your professional network. *a. LinkedIn b. Facebook c. Google d. Twitter
58. The world-wide-web uses protocol for transmitting content.
*a. hyper-text transfer b. mail transfer c. uniform resource location d. domain name server is the control or suppression of the publishing or accessing of information on the Internet. 59.
Correct Answer(s): a. Internet censorship
60. The ARPANET was eventually broken into two networks: , which
included all military sites, and a new, smaller ARPANET, which included all the nonmilitary sites. Correct Answer(s): a. MILNET
61. Messages on the Internet are typically sent through one or more
to reach their destination. Correct Answer(s): a. routers
is the process by which virtual private networks (VPNs) transfer information by encapsulating traffic in Internet Protocol (IP) packets over the Internet. 62.
Correct Answer(s): a. Tunneling
63. The
is the primary method for interacting with the Internet.
Correct Answer(s): a. Hypertext Transfer Protocol (HTTP)
b. Hypertext Transfer Protocol c. HTTP
computing refers to deployments in which service providers offer their cloud-based services to the general public. 64.
Correct Answer(s): a. Public cloud
65. A(n) is an HTML code that tells the Web browser how to format
text—such as a heading, as a list, or as body text—and whether images, sound, and other elements should be inserted. Correct Answer(s): a. tag
is a popular programming language for client-side applications that enable a user to create interactive Web pages that respond to user actions. 66.
Correct Answer(s): a. JavaScript
67. Using
, Web users can jump between Web pages stored on various Web servers, creating the illusion of interacting with one big computer. Correct Answer(s): a. hyperlinks
68. The Uniform Resource Locator (URL) www.cengage.com is an
example of a(n) that identifies the Internet host site. Correct Answer(s): a. domain name
69. Web
such as Adobe Flash and Real Player, provide additional features to standard Web sites. Correct Answer(s):
a. plug-ins
is a method of transferring large media files over the Internet so that the data stream of voice and pictures plays more or less continuously as the file is being downloaded. 70.
Correct Answer(s): a. Content streaming
71. A(n)
is a Website that people can create and use to write about their observations, experiences, and opinions on a wide range of topics. Correct Answer(s): a. Web log b. blog
72. The Web, as a computing platform that supports software
applications and the sharing of information among users, is referred to as . Correct Answer(s): a. Web 2.0
is online, real-time communication between two or more people who are connected to the Internet. 73.
Correct Answer(s): a. Instant messaging
74. The use of social media in business is called
.
Correct Answer(s): a. Enterprise 2.0
75. The computers and devices on a network are also known as
Correct Answer(s): a. network nodes
76. A(n)
is a telecommunications network that connects large geographic areas. Correct Answer(s): a. wide area network (WAN) b. wide area network
.
c. WAN
77. Usually measured in bits per second (bps),
which data is exchanged. Correct Answer(s): a. channel bandwidth
refers to the rate at
78. Online
vendors use digital rights management to prevent illegal
copying. Correct Answer(s): a. music b. audio file c. media file
79. The browsers are the in the worldwide web, whereas the web servers are
the servers. Correct Answer(s): a. clients b. client machines c. client computers d. client solftware e. client f. client programs
80. George is in charge of ordering supplies for his employer, and he
usually buys these supplies from the same vendors. One of the vendors, Business Office Supplies, has given George limited access to their inventory system so that he can see if they have what he needs without contacting the salesperson. George is using an . Correct Answer(s): a. extranet
81. Briefly explain the passing of packets over the Internet.
Correct Answer: The various telecommunications networks that are linked to form the Internet work much the same way—they pass data around in chunks called packets, each of which carries the address of its sender and its receiver along with other technical information. The set of conventions used to pass packets from one host to another is the Internet Protocol (IP). Many other protocols are used in connection with IP. The best known is the Transmission Control Protocol (TCP). After a network following these standards links to the Internet’s backbone, it becomes part of the worldwide Internet community.
82. Explain the rules that apply to using domain names.
Correct Answer: Domain names always have at least two parts, with each part separated by a dot (period). For some Internet addresses, the far right part of the domain name is the country code, such as au for Australia, ca for Canada, dk for Denmark, fr for France, de (Deutschland) for Germany, and jp for Japan.. Many Internet addresses have a code denoting affiliation categories, such as com for business sites and edu for education sites. The far left part of the domain name identifies the host network or host provider, which might be the name of a university or a business.
83. Define cloud computing and identify the business benefits of cloud
computing. Correct Answer: Cloud computing refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser. By outsourcing business information systems to the cloud, a business saves on system design, installation, and maintenance. The New York Stock Exchange (NYSE), for example, is starting to offer cloudcomputing applications that let customers pay for the services and data they use on Euronext—a European market for stocks, bonds, and other investments.
84. Briefly describe how a Wi-Fi network operates.
Correct Answer: With a Wi-Fi wireless network, a user’s computer, smartphone, or cell phone has a wireless adapter that translates data into a radio signal and transmits it using an antenna. A wireless access point, which consists of a transmitter with an antenna, receives the signal and decodes it. The access point then sends the information to the Internet over a wired connection. When receiving data, the wireless access point takes the information from the Internet, translates it into a radio signal, and sends it to the device’s wireless adapter.
85. How is the Internet of Things different from the world-wide web?
Correct Answer: Internent of Things (IoT) is a collection of objects that send information over the internet to servers, applications or humans. Whereas the worldwide web is made up of servers that serve web pages written in HTML to client browsers.
Chapter 5: Electronic Commerce and Enterprise Systems 1. A business-to-business (B2B) market is considerably larger than a business-to-consumer (B2C) market. *a. True b. False
2. The Asia-Pacific region has overtaken North America as the region with
the largest B2C sales and now accounts for over one-third of total worldwide B2C sales. *a. True b. False 3. The market for m-commerce in North America is maturing much
earlierthan in Western Europe and Japan. a. True
*b. False
4. Conversion to an e-commerce or m-commerce system enables
organizations to increase the accuracy of order processing and order fulfillment. *a. True b. False
5. Lack of trust in online sellers is one of the most frequently citedreasons
that some consumers are not willing to purchase online. *a. True b. False
6. An electronic exchange is an electronic forum where manufacturers,
suppliers, and competitors buy and sell goods, trade market information, and run back-office operations. *a. True b. False
7. In the past, market segmentation has been easy for B2B marketers
because firmographic data was easy to obtain. a. True
*b. False
8. Consortium-operated exchanges are open to any set of buyers
and sellers within a given market.
a. True
*b. False 9. In spite of the recent economic downturn, Website operators have
shunned the idea of bartering for goods and services. a. True
*b. False 10. Consumers who have enrolled in mobile banking and downloaded
the mobile application to their cell phones can check their credit cardbalances before making major purchases. *a. True b. False
11. Bartering is a technique used by advertisers to recapture shopperswho
abandoned a Website without making a purchase. a. True
*b. False
12. Smart card use is restricted to data associated with financial
transactions. a. True
*b. False
13. PayPal enables any person or business with an e-mail address to
securely, easily, and quickly send and receive payments online. *a. True b. False
14. Smart cards are less protected from misuse that conventional credit,
charge, and debit cards because the smart card information isnot encrypted. a. True
*b. False
15. Smart cards can be used for a variety of purposes, including storing a
user’s financial facts, health insurance data, credit card numbers, and network identification codes and passwords. They can alsostore monetary values for spending.
*a. True b. False
16. If you abandon an online shopping cart, the seller does not carewhat
you were shopping for. a. True
*b. False
17. With an online transaction processing (OLTP) system, each
transaction is accumulated over a period of time and prepared for processing in a large batch of similar transactions. a. True
*b. False
18. When there is a delay between an event and the eventual processingof
the data, it is called batch processing. *a. True b. False
19. The main difference between batch processing and online transaction
processing is in the timely update of data. *a. True b. False
20. It is acceptable to for transaction processing systems to capture
inaccurate data. a. True
*b. False
21. Small and medium size organizations do not employ enterprise
systems. a. True
*b. False
22. An enterprise system ensures that information can be shared withall
authorized users in different functional areas. *a. True b. False
23. If an organization is using several separate systems, they can be
replaced with a single integrated set of applications for the entire enterprise. *a. True b. False
24. An integrated database for the entire organization makes it easierto
share data among different business units. *a. True b. False
25. Implementation of an enterprise resource planning (ERP) system
provides an organization with an opportunity to also upgrade the information technology that it uses. *a. True b. False
26. A customer relationship management (CRM) system helps a company
toplan, execute, and control all the activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and the warehousing and delivery of finished product to customers. a. True
*b. False 27. Product lifecycle management (PLM) typically includes customer
relationship management (CRM) software. a. True
*b. False
28. Customer support, sales management, and contact management are
keyfeatures of a customer relationship management (CRM) system. *a. True b. False
29. External users of product lifecycle management (PLM) software
include design partners and raw material suppliers. *a. True b. False
30. Organizations frequently need to customize a vendor's enterprise
resource planning (ERP) software to integrate other business systems. *a. True b. False
31. The ability to capture and analyze all customer interactions,
generate appropriate responses, and gather data to create and build effective and efficient marketing campaigns is known as contact management. a. True
*b. False
32. Using the hosted software model implies that a small business firm
needs to employ a full-time IT person to maintain key business applications. a. True
*b. False
33. XYZ Inc. assigned a part-time mid-level manager to supervise the
implementation of an enterprise resource planning (ERP) system. The project has a high risk of failure. *a. True b. False
34. Legacy systems typically run on the latest hardware. a. True
*b. False
35. Cultural differences, language barriers, and currency variationsare
all challenges that e-commerce and m-commerce merchants must address when selling to a global marketplace. *a. True b. False
36. In terms of e-commerce infrastructure, the Web server's required
amount of storage capacity and computing power depends primarily on two things: the software that must run on the server and the quantity of content on the e-commerce site. a. True
*b. False
37. When implementing a new enterprise system, keeping the scope of the
project fluid and flexible will ease the transition and yield the best results. a. True
*b. False
38. Which of the following forms of e-commerce is more likely to offer
a more customized product offering? a. Business-to-government (B2G) e-commerce b. Business-to-business (B2B) e-commerce c. Consumer-to-consumer (C2C) e-commerce
*d. Business-to-consumer (B2C) e-commerce 39. The elimination of organizations that operate between the producer
and the consumer is called
.
a. market segmentation b. downsizing
*c. disintermediation d. personalization is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process. 40.
a. Business-to-business (B2B) e-commerce b. Business-to-consumer (B2C) e-commerce c. Consumer-to-business (C2B) e-commerce
*d. Consumer-to-consumer (C2C) e-commerce 41. A reason for the growth in business-to-consumer (B2C) e-commerce
is that online B2C shoppers have the ability to design a product. a. standardized b. universal c. generic
*d. personalized divides the pool of potential customers into subgroups usually defined in terms of demographic characteristics. 42.
a. Disintermediation b. Social networking
*c. Market segmentation d. Market augmentation 43. Which of the following forms of e-commerce has created an
opportunity for many people to make a living out of selling items on auction Websites? a. Business-to-business (B2B) e-commerce
*b. Consumer-to-consumer (C2C) e-commerce c. Consumer-to-business (C2B) e-commerce d. Business-to-consumer (B2C) e-commerce 44. Which of the following statements is true of retargeting? a. It is targeted at approximately 50% of Website visitors who shop
using smartphone applications. *b. It employs personalized ads to direct shoppers back to a retailer’s Website they previously abandoned. c. It attempts to change buying habits of Web shoppers to get them to consider products they have never considered purchasing before. d. It attempts to change buying habits of Web shoppers by getting them to visit Websites they have not visited before. 45. The number of mobile Websites worldwide is expected to grow rapidly
because of . a. the availability of more costly handsets b. typically uniform product offerings c. advances in artificial intelligence technologies
*d. the development of new and useful applications 46. The
is a security technique associated with the use of credit cards at the time of purchase that checks additional digits printed on the back of the credit cards. a. Address Verification System b. Advanced Authorization c. Payment Card Industry security standard
*d. Card Verification Number 47.
is a standard that spells out measures and security procedures to
safeguard a card issuer, a cardholder, and a merchant. a. Secure Sockets Layer (SSL) b. Card Verification Number c. Virtual private network (VPN)
*d. Payment Card Industry (PCI) 48. Which of the following is NOT one of the key website performance
measures commonly used by online retailers? a. response time
*b. total sales c. transaction success rate d. system availability 49. Authentication technologies are used by many organizations to
.
a. verify the accuracy of their product descriptions and prices b. secure sensitive data during e-commerce c. confirm the uniform resource locator (URL) of their suppliers'
Websites *d. confirm the identity of a user requesting access to information or assets 50. Conversion to an e-commerce or m-commerce system enables
organizations to *a. improve the level of customer service b. implement an enterprise resource planning (ERP) system c. increase the cost of doing business d. reinforce consumer-to-consumer (C2C) e-commerce 51. Through e-government, . a. only government agencies can interact with one another b. only businesses can interact with the government c. only individual citizens can interact with the government
*d. any government unit, business or individual can interact with the government
52. A(n)
is central to individuals and organizations of all sizes and ensures that information can be shared across all business functions and all levels of management to support the running and managing of a business. a. transaction processing system
*b. enterprise system c. procurement system d. batch processing system
.
53. The information about invoices to customers is tracked by system. a. supply chain management
b. product lifecycle management
*c. transaction processing system d. value chain system 54. With
, business transactions are accumulated over a period of time for processing in a single unit. a. online transaction processing systems b. real-time transaction processing systems c. on-demand processing systems
*d. batch processing systems 55. In batch processing systems, data processing is done data capture. a. immediately after
*b. some time later than c. immediately before d. some time before 56. Which of the following types of processing is essential for businesses
that require access to current data such as airlines, ticket agencies, and stock investment firms? a. Batch processing b. Multiple unit processing c. Business intelligence processing
*d. Online transaction processing 57. Which of the following transactions definitely require online
transaction processing and cannot work on batch processing approach? a. Payroll b. Vendor payments c. Customer billing
*d. Stock investments 58. In the context of purchasing systems involved in the traditional
transaction processing systems, when a(n) arrives from a supplier, it is matched to the original order and the receiving report, and a check is generated if all data is complete and consistent. a. order b. pick list
*c. invoice d. request for quotation
59. As an organization’s purchasing systems generate purchase orders and
the items ordered are received, information is sent to the system to manage the amounts owed by the organization. a. accounts receivable
*b. accounts payable c. invoicing d. inventory control 60. A small business is currently using a paper-based system for billing,
which is slow and error-prone. Which system upgrade will make the process faster and have fewer errors? a. Manual entry of data into spreadsheet system
*b. Source data automation c. Scanning hand-written bills d. Enterprise resource planning system 61.
involves reentering data that was not typed or scanned correctly. a. Data editing
*b. Data correction c. Data manipulation d. Data encryption 62. In the context of enterprise resource planning (ERP) systems, the
most efficient and effective ways to complete a business process are called . a. current approaches b. streamlined processes
*c. best practices d. process improvements 63. Payroll transactions and billing are typically done via a. grid processing b. online transaction processing (OLTP) c. online analytical processing (OLAP)
*d. batch processing
.
64. According to the classification of enterprise resource planning (ERP)
vendors, vendors target medium-sized firms with annual revenues in the $50 million to $1 billion range operating out of one or more locations.
a. Tier III
*b. Tier II c. Tier IV d. Tier I 65. A key feature of an enterprise system is that . a. it helps a business function isolate information other functions
and other levels of management. b. it is exclusive to small and medium-sized enterprises (SMEs) *c. it employs a database of key operational and planning data that can be shared by all d. it is only used by large organizations includes the planning, executing, and controlling of all activities involved in raw material sourcing and procurement, converting raw materials to finished products, and the warehousing and delivering finished product to customers. 66.
a. Maintenance, repair and operations (MRO) b. Materials requirement planning (MRP) c. Customer relationship management (CRM)
*d. Supply chain management (SCM) 67. A customer relationship management (CRM) system helps a company in
managing a. material sourcing and procurement b. product development and manufacturing
*c. distribution and accounting d. human resources and finance 68. Which of the following statements is true of product lifecycle
management (PLM) software? a. It distributes data only to the employees of an organization.
*b. It provides documents required for FDA and environmental compliance. c. It secures data so that changes cannot be made early in the product design process. d. It is frequently employed by non-manufacturing organizations. 69. Which of these is an advantage of the hosted software model?
.
a. Consistent reliability b. Data security
*c. Faster system start-up d. Increased total cost of ownership
70. Suppose a business with annual sales revenue of $30 million wishes to
use an ERP solution. Which ERP vendor will have the most appropriate solution for them? a. Tier I vendors such as SAP or Oracle. b. Tier II vendors such as Epicor or Lawson.
*c. Tier III vendors such as Abas or Bluebee software. d. Vendors from all three tiers would be appropriate. 71. Suppose a small business is using the hosted model for its enterprise
software. Which of the following will not be an issue they will he worried about? a. promoting and selling their products and services b. managing the hiring processes
*c. employing full-time IT professionals to manage its resources d. designing of their products and services 72. Tom's Art Supplies used to sell art supplies through mail order
catalogs, but the company's order takers often had difficulty deciphering their customers' handwriting on the order forms. Since switching to an online e-commerce site, Tom's has been able to solve this problem, allowing the company to enjoy the advantage of: a. reaching new customers b. reducing costs
*c. increasing accuracy d. improving customer service 73. You design and make women's jewelry, which you sell through an e-
commerce site. Based on feedback from potential customers, you have decided to make a few changes to your site, such as developing a loyalty program, publishing customer testimonials, and including your Better Business Bureau Online accreditation logo. These steps are designed to address potential customers' . a. privacy concerns
*b. lack of trust c. language challenges d. all of these answers
74. You have been put in charge of implementing a new enterprise system.
You should do all of the following EXCEPT: a. allow sufficient time to transition from the old way of doing things
to the new system and processes. b. allocate sufficient time and money for training staff.
c. define metrics that you'll use to assess project progress and
identify project-related risks. *d. provide access to the new system only to your immediate team to avoid conflict and confusion.
75. Which of the following is an obstacle to the successful implementation
of a new enterprise system? a. cost and long time frame b. employees' fear of change and frustration with new systems c. integration with other systems
*d. all of these answers 76.
is the conducting of business activities electronically over computer networks. Correct Answer(s): a. Electronic commerce (e-commerce) b. Electronic commerce c. E-commerce
77.
is a subset of e-commerce where all the participants are organizations. Correct Answer(s): a. Business-to-business (B2B) e-commerce b. Business-to-business e-commerce c. B2B e-commerce
is a form of e-commerce in which customers deal directly with an organization and avoid intermediaries. 78.
Correct Answer(s): a. Business-to-consumer (B2C) e-commerce b. Business-to-consumer e-commerce c. B2C e-commerce
electronic commerce applications support transactions between governments such as the federal government and state or local governments. 79.
Correct Answer(s): a. Government-to-government (G2G)
b. Government-to-government c. G2G
is the use of information and communications technology to simplify the sharing of information, speed formerly paper-based processes, and improve the relationship between citizens and government. 80.
Correct Answer(s): a. E-government
exchanges are owned and operated by a single company.
81.
Correct Answer(s): a. Private
exchanges are open to any set of buyers and sellers within a given market and provide services and a common technology platform to their members. 82.
Correct Answer(s): a. Independent
83. One of the main measures of success of a mobile ad is CTR, which stands
for
.
Correct Answer(s): a. click through rate
84.
is the process of tailoring Web pages to specifically target individual consumers. Correct Answer(s): a. Personalization
exchanges are run by a group of traditionally competing companies with common procurement needs. 85.
Correct Answer(s): a. Consortium-operated
86. The identification of specific markets to target them with tailored
advertising messages is referred to as . Correct Answer(s): a. market segmentation
is an amount of money that is computerized, stored, and used as cash for e-commerce transactions. Correct Answer(s): a. Electronic cash 87.
88. All credit card customers are protected by law from paying more than
for fraudulent transactions. Correct Answer(s): a. $50
89. A(n)
is an attachment to an email message or data embedded in a Website that verifies the identity of a sender or Website. Correct Answer(s): a. digital certificate
90. The
is a credit card-sized device with an embedded microchip to provide electronic memory and processing capability. Correct Answer(s): a. smart card
91. A(n)
is responsible for guaranteeing that the people or organizations who are granted unique digital certificates are in fact who they claim to be. Correct Answer(s): a. certificate authority (CA) b. certificate authority c. CA 92. Mobile commerce destinations, used to place orders and conduct
business through mobile devices, are designated with a domain ending in .
Correct Answer(s): a. .mobi b. mobi
93. If you have classified your customers as 'college-grads', 'young
parents', or 'singles,' you used a technique known as market
.
Correct Answer(s): a. segmentation
94. For m-commerce to work effectively, the interface must be so good
that it is nearly as easy to make a purchase on a or desktop computer.
device as it is on a laptop
Correct Answer(s): a. mobile b. wireless
95. Many organizations employ
which capture and process the detailed data necessary to update records about the fundamental business operations of an organization. Correct Answer(s): a. transaction processing systems (TPSs) b. transaction processing systems c. TPSs
96. With
, transactions are accumulated for as long as necessary to meet the needs of the users of a system. Correct Answer(s): a. batch processing systems
97. In a transaction processing system (TPS), the system is sometimes
referred to as the lifeblood of an organization. Correct Answer(s): a. order processing
98. In a transaction processing system (TPS), a(n) must track the flow of
data related to all the cash flows that affect an organization.
Correct Answer(s): a. accounting system
99. In business, SME stands for
.
Correct Answer(s): a. small and medium-sized enterprises
100. In a transaction processing cycle, capturing data at its source and
recording it accurately in a timely fashion with minimal manual effort and in an electronic or digital form so that it can be directly entered into the computer is known as . Correct Answer(s): a. source data automation 101. In a transaction processing cycle, involves updating one or more databases in an organization with new transactions. Correct Answer(s): a. Data storage
102. Results from one TPS would become
to other systems.
Correct Answer(s): a. input b. inputs
103. In the context of enterprise resource planning (ERP) system, a(n)
is a set of coordinated and related activities that takes one or more types of input and creates an output of value to the customer of that process. Correct Answer(s): a. business procedure
104. Implementation of an enterprise resource planning (ERP) system
ensures good work processes that are based on
.
Correct Answer(s): a. best practices b. the most efficient and effective ways to complete a business
process c. best standards d. best industry standards is a set of integrated programs that manage a company’s vital business operations for an entire organization; even a complex, multi-site, global organization. 105.
Correct Answer(s): a. Enterprise resource planning (ERP) b. Enterprise resource planning c. ERP
is used primarily by people in the sales, marketing, accounting, and service functions to capture and view data about customers and to improve communications. 106.
Correct Answer(s): a. Customer relationship management (CRM) b. Customer relationship management c. CRM 107. In a customer relationship management (CRM) system, the ability to track data on individual customers and sales leads and then access that data from any part of an organization is known as . Correct Answer(s): a. contact management
108. Suppose two businesses (Alpha Inc. and Beta Inc.) are undertaking
ERP implementation projects. Alpha Inc. has a host of other applications that need integration with the new ERP. Beta Inc. has users who are showing resistance to the new ERP system. Among these, the Inc. project is more likely to become a failure. Correct Answer(s): a. Alpha 109. The most successful e-commerce solutions are designed to be highly
so that they can be upgraded to meet unexpected user traffic. Correct Answer(s): a. scalable
110. Define electronic commerce and identify its various subsets.
Correct Answer: Electronic commerce (e-commerce) is the conducting of business activities (e.g., distribution, buying, selling, marketing, and servicing of products or services) electronically over computer networks. It includes any business transaction executed electronically between companies (business-tobusiness), companies and consumers (business-to-consumer), consumers and other consumers (consumer-to-consumer), public sector and business (government-to-business), the public sector to citizens (government-tocitizen), and public sector to public sector (government- to-government). Business activities that are strong candidates for conversion to e-commerce are ones that are paper based, time consuming, and inconvenient for customers.
111. Identify and briefly discuss three key challenges to e-commerce.
Correct Answer: Three key challenges include: 1) dealing with consumer privacy concerns, 2, overcoming consumers' lack of trust, and 3) overcoming global issues. While two-thirds of U.S. Internet users have purchased an item online and most Internet users say online shopping saves them time, about one-third of all adult Internet users will not buy anything online because they have privacy concerns or lack trust in online merchants. Global issues include cultural challenges, language challenges, time and distance challenges, infrastructure challenges, currency challenges, and state, regional, and national law challenges.
112. A small business owner is sceptical about online transactions. Sheis
worried that information may be stolen in transmission or that the
party on the other end may be a bogus one. Also, she is worried aboutthe security of financial transactions online. What can be done to allay those fears? Correct Answer: She could use encryption and digital certificate technologies. The data can be encrypted before transmission. Only the intended recipient of the transmission will be able to decrypt and use it. In addition, she could sign up to use digital certification service to ensure the authenticity of the other party. The standards for processing financial transactions quite strict enough to ensure safeguarding the interests of the card issuer, the carholder and the merchant.
113. Briefly describe the transaction processing cycle.
Correct Answer: The business data goes through a transaction processing cycle that includes data collection, data editing, data correction, data processing, data storage, and document production. Capturing and gathering all data necessary to complete the processing of transactions is called data collection. Data editing involves checking data for validity and completeness to detect any problems. A data correction involves reentering data that was not typed or scanned properly. Data processing refers to performing calculations and other data transformations related to business transactions. Data storage involves updating one or more databases with new transactions. Document production involves generating output records, documents, and reports.
114. What is the goal of a customer relationship management (CRM)
system? Discuss the benefits of CRM software. Correct Answer: The goal of CRM is to understand and anticipate the needs of current and potential customers to increase customer retention and loyalty while optimizing the way that products and services are sold. CRM is used primarily by people in the sales, marketing, distribution, accounting, and service organizations to capture and view data about customers and to improve communications. Businesses implementing CRM systems report benefits such as improved customer satisfaction, increased customer retention, reduced operating costs, and the ability to meet customer demand. CRM software automates and integrates the functions of
sales, marketing, and service in an organization. The objective is to capture data about every contact a company has with a customer through every channel and to store it in the CRM system so that the company can truly understand customer actions. CRM software helps an organization build a database about its customers that describes relationships in sufficient detail so that management, salespeople, customer service providers, and even customers can access information to match customer needs with product plans and offerings, remind them of service requirements, and report on the other products the customers have purchased.
115. Describe product lifecycle management (PLM) software and identify
the type of data stored in such a system. Correct Answer: Product lifecycle management (PLM) software provides a means for managing the data and processes associated with the various phases of the lifecycle of a product, including sales and marketing, research and development, concept development, product design, prototyping and
testing, manufacturing process design, production and assembly, delivery and product installation, service and support, and product retirement and replacement. As products advance through these stages, product data is generated and distributed to various groups both within and outside the manufacturing firm. This data includes design and process documents, bill of material definitions, product attributes, product formulations, and documents needed for FDA and environmental compliance. PLM software provides support for the key functions of configuration management, document management, engineering change management, release management, and collaboration with suppliers and original equipment manufacturers (OEMs).
116. Discuss the advantages and disadvantages of hosted software model.
Correct Answer: Hosted software offers a decreased total cost of ownership. It has a faster system start-up. Hosted software also offers a lower implementation risk. The management of systems is outsourced to experts. However, hosted software has its share of problems as well. There are potential issues regarding availability and reliability. There are also data security issues. In addition, there are potential problems integrating the hosted products of different vendors. And while the management of systems is outsourced to experts, the savings anticipated from outsourcing may be offset by the increased effort to manage vendors.
117. Suppose you are tasked with determining the risks of failure of anERP
implementation project. What organizational characteristics will you focus on? Correct Answer: I would focus on these organizational characteristics. First, I would look at the number of business applications that will be integrated with the new ERP system. Next, I would see how open and welcoming its employees are to the new ERP system. Next, I would assess how much modification or customization is sought in the new ERP system. Finally, I would look at effectiveness of the training of its employees to start using the new ERP system.
CHAPTER 06 9e
1. Business analytics can be used only for forecasting future business
results. a. True
*b. False
2. The data for BI (business intelligence) comes from many sources.
*a. True b. False
3. A marketing manager who does not have deep knowledge of
informationsystems or data science, will NOT be able to use BI tools a. True
*b. False
4. Some insurance companies can detect fraudulant claims using BI
software. *a. True b. False
5. A vehicle routing optimization system helps in maximizing the number
of drivers being assigned. a. True
*b. False
6. Data scientists do not need much business domain knowledge. a. True
*b. False
7. Suppose you are good in math and statistics. Adding programming to
your skill-set will be necessary if you want to be a data scientist. *a. True b. False
CHAPTER 06 9e
8. For an organization to get real value from its BI efforts, it musthave a
solid data management program.
*a. True b. False
CHAPTER 06 9e
9. Creative data scientists - a key component of BI efforts in an
organization - are people who are primarily focused on coming up with novel ways of analyzing data. a. True
*b. False
10. Data governance involves identifying people who are responsible for
fixing and preventing issues with data. *a. True b. False
11. In OLAP data cubes, you would likely find numeric measures
categorized by time and geography. *a. True b. False
12. Online analytical processing is another name for enterprise
application. a. True
*b. False
13. Data cubes can be created on an ad hoc basis. There is no need to
create them ahead of time. a. True
*b. False
14. During drill-down, you go from high-level summary data to detailed
levels of data. *a. True b. False
15. In linear regression, you are to find a line that best fits thedata.
CHAPTER 06 9e
Sometimes the line may be curved. a. True
*b. False
CHAPTER 06 9e
16. Data mining is used to explore large amounts of data, looking for
hidden patterns that can be used to predict future trends and behaviors. *a. True b. False
17. In the regression line Y = a+ bX + e, Y is the value of the
independent variable. a. True
*b. False
18. In the regression line Y = a+ bX + e, a is the slope of the
regression line. a. True
*b. False 19. Linear regression is useful when you wish to predict the value of a
quantitative variable based on a another quantitative variable. *a. True b. False
20. Suppose your university administrators wish to summarize student
GPA on Major, Gender, High School, Home City and ZIP Code dimensions.This cannot be done with one data cube. a. True
*b. False
21. Suppose you are viewing a database of your monthly expenses,
categorized under broad headings such as food, entertainment and accommodation. If you have drill down ability, you are able to view details under each category. *a. True b. False
22. Excel's scenario manager can be used to solve optimization-type
CHAPTER 06 9e
problems. a. True
*b. False
CHAPTER 06 9e
23. Power Pivot and Power Query are components of Microsoft's Power
BItool. *a. True b. False
24. To solve the product mix problem that will maximize the profits,you
can use Excel's Solver add-in. *a. True b. False
25. Users still need help from the IT function of the organization tocreate
customer reports using modern reporting tools. a. True
*b. False
26. A conversion funnel is a visual depiction of a set of words thathave
been grouped together because of the frequency of their occurrence. a. True
*b. False
27. If you wish to have a visual depiction of relative frequencies ofwords
in a document, a word cloud would be an appropriate option. *a. True b. False
28. Which of the following is NOT considered business intelligence
practice? a. Data extraction b. Visualization c. Analysis
*d. Transaction processing
29. One of the goals of business intelligence is to .
CHAPTER 06 9e
*a. present the results in an easy to understand manner b. educate the users about business statistics c. ensure the transaction data is properly stored d. use the most sophisticated techniques
30. Which of the following is NOT a characteristic of a data scientist?
CHAPTER 06 9e
a. strong business acumen b. a deep understanding of analytics c. a healthy appreciation of the limitations of their data
*d. business leadership skills
31. What is the projected shortage of data scientists in the USA, according
to a McKinsey & Co. report? a. 100,000 or less
*b. 100,000 to 200,000 c. 200,000 to 500,000 d. more than 500,000
32. Mastery over which subject is NOT required for being a data scientist? a. Computer science b. Mathematics c. Statistics
*d. English
33. Suppose your employer has four manufacturing units, each with its
own data operations. They are considering using BI tools. Which of the following is a valid recommendation regarding the BI initiative? a. Automate data entry at the factories for reduction in error rates b. Implement BI tools in each factory separately
*c. Create a data warehouse so that data from the factories are combined for BI analysis d. None of these answers
34. Which of the following is NOT a core process associated with data
management? a. process for obtaining data b. process for certifying it fit for use
*c. process for gathering BI requirements d. process for storage
35. You are to advise XYZ so that their BI efforts are fruitful. Which
CHAPTER 06 9e
among the following is the most crucial advice of all? a. You need good data management practices
*b. There must be strong commitment from the management c. You need good data governance practices d. You need creative data scientists
CHAPTER 06 9e
36. Which of the following is NOT a component of a KPI (key performance
indicator)? a. direction b. measure c. time frame
*d. format 37. Which of the following will be a 'fact' measure in a data cube
used at a chain retail business? *a. Sales revenue b. Month name c. Product category d. City name
38. Which of the following is NOT true about linear regression? a. both of the variables must be quantitative variables b. the line minimizes the sum of the squared errors of prediction
*c. the technique implies causality between the independent and the dependent variables d. consists of finding the best-fitting straight line through a set of observations
39. The coefficient of determination, r squared, is . a. the same as the error term in a linear regression
*b. a number that indicates how well data fits the statistical model c. a number that must be close to zero to be useful d. the same as the slope of the linear regression
40. Which of these analysis methods describes neural computing? a. a specialized set of algorithms sorts through data and forms
statistical rules about relationships among the items *b. historical data is examined for patterns that are then used to make predictions c. historical if-then-else cases are used to recognize patterns d. a mathematical procedure to predict the value of a dependent variable based on a single independent variable
CHAPTER 06 9e
41. Suppose management wishes to start a BI project at your new job.
Which of following will you recommend as the first step? a. Understand the data b. Prepare the data
*c. Clarify business goals and design a project plan
CHAPTER 06 9e
d. Create and apply analytical modeling techniques
42. Data within the data cube has been
by specific dimensional values.
a. correlated
*b. summarized c. regressed d. drilled into
43.
is used to explore large amounts of data for hidden patterns to predict future trends. a. Data governance
*b. Data mining c. Linear regression d. Drill down
44. During modeling of the CRISP-DM method, we would
.
a. clarify business goals for the data mining project b. select a subset of data to be used and prepare it c. assess if the model achieves business goals
*d. apply selected modeling techniques
45.
is the last phase of the six-phase CRISP-DM method. a. Evaluation b. Modeling c. Business understanding
*d. Deployment
46. Which of the following is NOT considered a BI and analytics tool? a. Data visualization b. Drill-down analysis
*c. Online transaction processing d. Data mining
47. Suppose you have access to quantitative data on populations by ZIP
code and crime rates. You wish to determine if there is a relationship
CHAPTER 06 9e
between the two variables and display the results in a graph. Which BI tool will be most useful? a. Word cloud tool b. Querying tool c. Reporting tool
*d. Data visualization tool
CHAPTER 06 9e
48. To analzye various alternative scenarios, a manager would use
.
*a. the spreadsheet's 'what-if' capability b. the graphing features of spreadsheet software c. the reporting feature of a BI tool d. a data visualization tool 49. Which of the following is NOT a key capability of BI tools? a. ability to create graphs of results b. ability to zoom in to view various levels of details
*c. ability to provide advice to the user on which model best suits the data d. ability to link disparate data to gain various levels of insights
50. The graphical representation that summarizes the steps a consumer
takes in making the decision to buy your product and become a customer is called . a. a word cloud
*b. a conversion funnel c. a scatter diagram d. a pivot chart 51. What determines the size of words in a word cloud? a. length of the word or phrase b. difficulty in pronouncing the word or phrase c. whether the word is a pronoun
*d. frequency of occurrence of the word in source documents
52. Which of the following is IBM's BI product? a. Power BI b. Business objects
*c. Cognos d. Hyperion
53. From which vendor is the BI product Business Objects available?
CHAPTER 06 9e
a. IBM
*b. SAP c. Google d. Microsoft
CHAPTER 06 9e
encourages nontechnical end users to make decisions based on facts and analyses rather than intuition. 54.
a. Easy access to a degree in Statistics
*b. Self-service analytics c. Seeking expert opinions d. Outsourcing BI tasks
55. Which of the following is a potential disadvantage with self-service BI? a. Accelerates and improves decision making.
*b. Can lead to over spending on unapproved data sources and business analytics tools. c. Encourages nontechnical end users to make decisions based on facts and analyses rather than intuition. d. Gets valuable data into the hands of the people who need it the most—end users.
56. The goal of business intelligence is to
.
a. provide access to novel tools to the users b. reduce the cost of data processing
*c. support and improve decision making d. improve employee morale
57. Which of the following is NOT a commonly used BI tool? a. data visualization b. linear regression c. drill-down analysis
*d. automated customer service
58. Without real time data, generating reports will take
time than with real
time data. Correct Answer(s): a. more
59. Business intelligence includes technologies for extraction, integration and
CHAPTER 06 9e
visualization of . Correct Answer(s): a. data b. patterns
CHAPTER 06 9e
60. Business users access BI applications via the Web or through
organizational and extranets. Correct Answer(s): a. intranets b. internal networks c. local area networks
61. Grocery stores can use BI tools to better
the demands, so that
stock outs are reduced. Correct Answer(s): a. predict b. forecast c. determine d. estimate e. calculate f. compute 62. The goal of the data scientist is to
valuable insights that will
influenceorganizational decisions. Correct Answer(s): a. uncover b. discover c. find
63. Petroleum companies use BI tools that advise the refineries and oil
traders on the mix of products to produce, buy, and sell in order to profit. Correct Answer(s): a. maximize
64. Data
is the core component of data management; it defines the roles,responsibilities, and processes for ensuring that data can be trusted. Correct Answer(s): a. governance 65. For BI to be successful, the
in the organization must be strongly committed to data-driven decision making.
CHAPTER 06 9e
Correct Answer(s): a. management b. executives c. top-brass
CHAPTER 06 9e
d. senior management e. upper management
is the the interactive examination of high-level summary data in increasing detail to gain insight into certain elements. 66.
Correct Answer(s): a. Drill-down b. drill down c. drilldown
67.
is the first phase of the cross-industry process for data mining (CRIPS-DM). Correct Answer(s): a. Business understanding b. Planning
68. Similar to what you find in a car, a business
provides rapid access to information, in an easy-to-interpret and concise manner, which helps organizations run more effectively and efficiently. Correct Answer(s): a. dashboard b. dashboards
69. Metrics that track progress in executing strategies to attain
organizational objectives are also known as (KPIs). Correct Answer(s): a. Key performance indicators
70. Often times, information on dashboards are color coded, using the
color problem areas.
Correct Answer(s): a. red
for
CHAPTER 06 9e
71. Suppose you wish to predict the value of shopping cart contents (order
total), based on the amount of time the customer spent at the online store site. In a linear regression model, you will use order total as the variable.
CHAPTER 06 9e
Correct Answer(s): a. Y b. Response c. dependent
72. Suppose the r2 (r squared) value for the linear regression is 0.85.
You can state that the linear regression accounts for variation in the dependent variable.
percent of the
Correct Answer(s): a. 85 73. Data
tools can take raw data and immediately provide a rich
visualimage. Correct Answer(s): a. visualization
74. A
is a visual depiction of a set of words that have been grouped together because of the frequency of their occurrence.
Correct Answer(s): a. word cloud
tools can present data in an easy-to-understand fashion via formatteddata, graphs, and charts. 75.
Correct Answer(s): a. reporting b. querying c. reporting and querying
76. The presentation of data in a pictorial or graphical format is called
Correct Answer(s): a. data visualization
77.
is the most popular spreadsheet program. Correct Answer(s):
.
CHAPTER 06 9e
a. MS Excel b. Excel c. Microsoft Excel
CHAPTER 06 9e
78. If you wish to present traffic trends on your company's Website,
a
format is preferable to tabular formats. Correct Answer(s): a. graphical
79. With the help of
analytics tools, users work independently to access dataand perform their own analyses. Correct Answer(s): a. self-service 80. A
is an individual who combines strong business acumen, a deep understanding of analytics, and a healthy appreciation of the limitations of their data, tools, and techniques to deliver real improvements in decision making. Correct Answer(s): a. data scientist
81. In what ways can a BI system be useful to a grocery store?
Correct Answer: The BI tool can be useful determining the demand for products by studying past transactions, and customer feedback. The users can run 'what-if' analyses on different scenarios and prepare to have adequate stocks of items. These capabilities would help the store management to stock adequate amounts of items, while keeping the inventory expenses low.
82. You are to advise a business on how to ensure success with their BI
initiatives. List four distinct strategies they must implement to succeed. Correct Answer: First, they must have good data management practices. Second, they need to ensure that good data government practices are in place. Third, they must have creative data scientists who can identify opportunities for applying BI techniques on. Lastly, and most importantly, they must have good commitment from the upper management to embrace data driven decision making.
CHAPTER 06 9e
83. Suppose you are to develop a data cube for a student organizationon
campus that wishes to study the effects of membership drives. Describe what dimension variables and fact variables you will use.
Correct Answer:
CHAPTER 06 9e
For fact variable, we could use the number of members or amount of memberships collected or attendance figures at the student organization's events. We can use 'membership drive', gender, major, semester, and student status (fulltime or partime), student residence (on-campus or off campus) as dimension variables.
84. Suppose you wish to study the relationship between the number of
'likes' on Facebook and the number of 'friends' one has on Facebook. Describe the statistical technique you would use. Correct Answer: I would the linear regression technique to study the relationship between number of 'likes' one gets and the number of friends one has on Facebook. The number of friends will be the independent or predictor variable. The number of likes will be the dependent variable. We expect a positive association between the two variable and we can expect a positive slope in the the linear regression. I would like to see an r-squared value of 0.70 or higher to ensure that at least 70% of the variability in the dependent variable is described by the linear regression.
85. Suppose you are tasked with collecting customer comments on
products and services and analyzing the data. What techniques will you employ and why? Correct Answer: I would use an analysis tool that can take in textual data as input and outputs quantitative data. A tool that can create word frequencies and word clould will be a starting point. Based on the quantitative data, we can run additional analyses such as summary statistics, frequency counts etc. The tool should also have the capability to summarize the comments.
CHAPTER 07 9e
1. Many organizations actively attempt to convert explicit knowledge to
tacit knowledge. a. True
*b. False
2. A group of people with common interests who come together to
create, store, and share knowledge of a specific topic is known as a community of practice. *a. True b. False 3. Artificial intelligence involves the development of machines and
computer systems that can simulate human intelligence processes. *a. True b. False
4. A perceptive system allows a machine to approximate the way a person
sees, hears, and feels objects. *a. True b. False
5. Although computers excel at numerical calculations, they are not as
good at dealing with symbols and three-dimensional objects. *a. True b. False
6. Expert systems, robotics, vision systems, natural language processing,
learning systems, and neural networks are all part of thebroad field of artificial intelligence. *a. True b. False
7. Robotics involves developing mechanical or computer devices that can
paint cars, make precision welds, and perform tasks that require a high
CHAPTER 07 9e
degree of precision or are tedious or hazardous for humans. *a. True b. False
8. Vision systems include hardware and software that permit computers
to capture, store, and process visual images.
CHAPTER 07 9e
*a. True b. False 9. Learning systems allow a computer to change how it reacts to
situations based on the feedback it receives. *a. True b. False
10. A genetic algorithm can be used to search the vast resources of the
Internet to find information on any topic. a. True
*b. False
11. A neural network relies on massively parallel processing to enablea
computer to simulate the function of a human brain. *a. True b. False
12. Expert systems use heuristics to arrive at conclusions or make
recommendations. *a. True b. False
13. The overall purpose of an inference engine is to seek informationand
relationships from the knowledge base and to provide answers, predictions, and suggestions similar to the way a human expert would. *a. True b. False
14. An expert system can use a case-based solution process to develop the
solution to a problem by finding cases stored in the knowledge basethat are similar to the problem at hand and then modifying the solutionto the cases to fit the current problem.
CHAPTER 07 9e
*a. True b. False
15. An expert system, using the explanation facility, can indicate allthe
facts and rules that were used in reaching a conclusion. *a. True
CHAPTER 07 9e
b. False
16. A user interface makes an expert system easier to develop and use.
*a. True b. False
17. The domain expert is the person with the expertise the expert
system is trying to capture. *a. True b. False
18. Expert system shells lessen the burden of programming, allowing
nonprogrammers to develop and benefit from the use of expert systems. *a. True b. False
19. When audio files are played while they are being downloaded from
the Internet, it is called streaming audio. *a. True b. False
20. Virtual reality simulations require special interface devices that
transmit the sights, sounds, and sensations of the simulated world to the user. *a. True b. False
21. Assistive technology systems help people overcome disabilities and
perform various tasks. *a. True b. False
22. Bioinformatics has been used to help map the human genome
CHAPTER 07 9e
andconduct research on biological organisms. *a. True b. False 23. If Stan and Marcus, a new trainee at the manufacturing plant, are
working together to resolve an issue on the line, they would be using
CHAPTER 07 9e
joint problem solving as a means of transferring Stan's tacit knowledgeto Marcus. *a. True b. False
24. The first step in implementing a knowledge management project is to
identify the most valuable pieces of tacit knowledge to capture. a. True
*b. False
25. In some cases, metadata—the data that describes other data—is more
important than the data itself. *a. True b. False
26. To avoid potential bottlenecks and delays in accurately applyingand
implementing changes in business rules, many organizations use business rule management software. *a. True b. False
27. Namaste Yoga Studio's website is a great example of multimedia
because it uses text, photos, graphics, and video to communicate the message of the studio's owners. *a. True b. False
28. While gathering requirements for a system that assists tech support
people, you create a list of conditions and the recommended responses. This list of conditions and responses can form the basis of a knowledgebase for a robotics system. a. True
*b. False
CHAPTER 07 9e 29. Suppose you have an accounting background and you are considered an
expert in the field of discovering errors in electronic spreadsheets. You are considered a knowledge engineer if you are part of a team thatis developing an expert system to discover errors in spreadsheets. . a. True
*b. False
CHAPTER 07 9e
knowledge is hard to measure and document and typically is not objective or formalized. 30.
*a. Tacit b. Shared c. Technical d. Explicit 31. Knowing the best way to negotiate with a foreign government
about a volatile hostage situation is an example of knowledge. a. implied
*b. tacit c. explicit d. definitive 32. A
is a group of people with common interests who come together to create, store, and share knowledge of a specific topic. *a. community of practice (COP) b. social network c. professional learning community (PLC) d. personal network
include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes including learning, reasoning, and self-correction. 33.
a. Assistive technology systems b. Intelligence agents
*c. Artificial intelligence systems d. Virtual reality systems
34. Sophisticated computer systems require an extension of
understanding visual images. This is called a a. robotic
*b. perceptive c. learning d. virtual reality
system.
CHAPTER 07 9e
35.
can process many pieces of data at the same time and learn to recognize patterns.
CHAPTER 07 9e
a. Voice recognition systems b. Natural language processing systems c. Learning systems
*d. Neural networks 36. A genetic algorithm is an approach to solving problems based on the
.
*a. theory of evolution b. theory of relativity c. Compton Effect d. Complementarity Principle 37. A
is a conditional statement that links conditions to actions or outcomes. a. simulation b. case
*c. rule d. genetic algorithm 38. The
stores all relevant information, data, rules, cases, and relationships that an expert system uses. a. inference engine
*b. knowledge base c. user interface d. data warehouse 39. In an expert system, the is the component that delivers the expert advice.
*a. inference engine b. knowledge acquisition facility c. user interface d. explanation facility 40. The
allows an expert system user to understand how the system arrived at its results. a. inference engine b. knowledge base
*c. explanation facility d. knowledge acquisition facility
CHAPTER 07 9e 41. An expert system's knowledge acquisition facility serves as an interface
between
.
CHAPTER 07 9e
a. the end users and the inference engine
*b. the experts and the knowledge base c. the inference engine and the knowledge base d. the inference engine and the explanation facility 42.
do not need any previous training in computers or expert systems. a. Domain experts
*b. Knowledge users c. Knowledge engineers d. Intelligent agents is a popular and sophisticated software package that can be used to edit photographs and other visual images. 43.
a. PowerPoint b. Microsoft Silverlight
*c. Adobe Photoshop d. Autodesk 44. When video files are played while being downloaded from the Internet, it
is called a. video compression b. virtual reality
*c. streaming video d. file conversion 45. The haptic interface relays the sense of in the virtual world. a. sight b. sound
*c. touch d. smell has the potential to superimpose digital data over real photos so that GPS maps can be combined with real pictures of stores and streets to help people locate their position. 46.
a. Immersive virtual reality b. Telepresence
*c. Augmented reality
.
CHAPTER 07 9e
d. Location reality
CHAPTER 07 9e
is a wide range of adaptive and rehabilitative devices to help people with disabilities perform tasks that they were formerly unable to accomplish or had great difficulty accomplishing. 47.
*a. Assistive technology b. Virtual reality c. Forensics software d. Bioinformatics is a mathematical theory for developing strategies that maximize gains and minimize losses while adhering to a given set of rules and constraints. 48.
a. Parrondo's paradox b. Bioinformatics
*c. Game theory d. Chainstore paradox is the combination of information technology with traditional disciplines such as medicine or science while considering the impact on individuals, organizations, and society. 49.
*a. Informatics b. Heuristics c. Assistive technology d. Informetrics 50. Which of the following is NOT one of the factors that have caused
many organizations to establish knowledge management programs? a. expansion of the services sector
*b. economic fluctuations c. emergence of new information technologies d. globalization
51. Kelly has just been hired as a server at a seafood restaurant. Since this is
her first job as a server, her manager has instructed her to follow Mark, an experienced server, for an entire shift to learn how to do the job. Kelly is: . a. observing
*b. shadowing c. copying
CHAPTER 07 9e
d. mimicing 52. Executives at Southwestern Construction have noticed that the
company's construction team in the Phoenix office is more efficient with its resources than the other teams in the Las Vegas,
CHAPTER 07 9e
Salt Lake, and Santa Fe offices. They decide to construct a knowledge management system that will allow the Phoenix team's methods to be shared with the other three offices. Which general benefit are they hoping to gain from this new system? a. fostering innovation through a free flow of ideas
*b. leveraging the expertise of people across the organization c. capturing the expertise of key individuals d. all of these answers 53. Executives at Southwestern Construction have noticed that the
company's construction team in the Phoenix office is more efficient with its resources than the other teams in the Las Vegas, Salt Lake, and Santa Fe offices. They decide to construct a knowledge management system that will allow the Phoenix team's methods to be shared with the other three offices. As a means of convincing the other teams to adopt the new methods, they develop an incentive program that allows team members to earn a percentage of the money they save on each project. This is related to which phase of knowledge management project implementation? a. connecting the KM to goals and objectives b. starting with a small pilot and enthusiastic participants c. identifying valuable tacit knowledge
*d. getting employees to buy in 54. Best Value Hardware Stores, a national chain, has established strict
policies about the conditions under which a customer can return merchandise. These policies are an example of: . a. customer service b. an operational system
*c. a business rule d. a business rule management system 55. An international package shipping company like FedEx needs to be
able to track the location of every package at every stage in the process, from pick-up to delivery. Which specific type of software would be useful in this situation? a. business rule management
*b. enterprise search c. knowledge management
CHAPTER 07 9e
d. none of these answers 56. You
joined an agriculture business as an Assistant Marketing Manager and you are full of ideas on how to improve sales. When you voiced your thoughts to your boss, she mentions "do not reinvent the wheel". It means . a. do not bring new ideas, since this is an old company
CHAPTER 07 9e
*b. before starting any new project, try to build on expertise and knowledge of others in the organization c. the wheels of innovation have already been created in the organization d. currently there is not adequate budget to explore new ideas
57. You work for a manufacturing business. Your employer uses a
model for selecting the supplier for the raw materials. They wish to become more responsive so that changes in the internal decision model can be quickly implemented in the systems. What is an appropriate recommendation? a. Install a more advanced email system. b. Install a social network interface to the customer relationship
management system.
c. Install better teleconferencing systems for anytime, anywhere
teleconferencing with the suppliers. *d. Install a Business Rules management system and interface it to the Supply chain management system.
58. A(n)
is an organized collection of people, procedures, software, databases, and devices used to create, store, share, and use the organization’s knowledge and experience. Correct Answer(s): a. knowledge management system (KMS)
59.
knowledge is objective and can be measured and documented. Correct Answer(s): a. Explicit
60. Knowing that the Hennessey Venom GT, with a top speed of 270
mph, is the fastest car in the world, is an example of having
knowledge.
Correct Answer(s): a. explicit
61. A judge evaluating evidence against a criminal based on his prior
experiences is an example of exhibiting
knowledge.
CHAPTER 07 9e
Correct Answer(s): a. tacit
62. The
attempts to determine whether a computer can successfully impersonate a human. Correct Answer(s): a. Turing Test
CHAPTER 07 9e
are rules of thumb arising from experience.
63.
Correct Answer(s): a. Heuristics
are mechanical or computing devices that perform tasks requiring a high degree of precision or that are tedious or hazardous for humans. 64.
Correct Answer(s): a. Robots
include hardware and software that permit computers to capture, store, and process visual images. 65.
Correct Answer(s): a. Vision systems
involves a computer understanding, analyzing, manipulating, and/or generating linguistic communication. 66.
Correct Answer(s): a. Natural language processing
is a system involving sequential decisions with learning taking place between each decision. 67.
Correct Answer(s): a. Reinforcement learning
is a process where a computer makes a decision, analyzes the results, and then makes a better decision based on the analysis. 68.
Correct Answer(s): a. Dynamic programming
69. A
is a computer system that can act like or simulate the functioning of a human brain.
CHAPTER 07 9e
Correct Answer(s): a. neural network
70. A(n)
is an approach to solving large, complex problems in which many repeated operations or models change and evolve until the best one emerges.
CHAPTER 07 9e
Correct Answer(s): a. genetic algorithm
71. A(n)
consists of programs and a knowledge base used to perform a specific task for a person, a process, or another program. Correct Answer(s): a. intelligent agent
72.
statements are rules that suggest certain conclusions based on certain conditions. Correct Answer(s): a. IF-THEN
73. The purpose of a(n) is to seek information and relationships from the
knowledge base and to provide answers, predictions, and suggestions similar to the way a human expert would. Correct Answer(s): a. inference engine
74. The main purpose of the is to provide a convenient and efficient means
of capturing and storing all components of the knowledge base. Correct Answer(s): a. knowledge acquisition facility
is text, graphics, video, animation, audio, and other media that can be used to help an organization efficiently and effectively achieve its goals. 75.
Correct Answer(s): a. Multimedia
76. A(n)
is a system that enables one or more users to move and react in a computer- simulated environment. Correct Answer(s): a. virtual reality system
CHAPTER 07 9e
77. If an organization wants to document and measure flows of information
among various sources, such as individuals, workgroups, organizations, and web sites, it should engage in . Correct Answer(s): a. organizational network analysis
CHAPTER 07 9e b. ONA c. organizational network analysis (ONA)
78. If a multimedia file is very large, it might be necessary to
it so
that it can be downloaded or emailed. Correct Answer(s): a. compress
79. One of your colleagues has temporarily lost the ability to use his
hands and fingers due to a rare medical condition. He would like to continue to interact with the computers at work. A solution based on would help him. Correct Answer(s): a. natural language processing b. voice recognition
80. You have been contacted to suggest a solution for creating a digital
mockup of a machine to be used at a factory. The users would like to be able to view and interact with the layout of the controls of the machine, even before the actual machine is built. A(n) system will be an appropriate choice for this kind of problem. Correct Answer(s): a. virtual reality
81. Define artificial intelligence system and list the characteristicsof
intelligent behavior. Correct Answer: Artificial intelligence systems include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that demonstrate characteristics of human intelligence. The characteristics of intelligent behavior include the ability to: 1) learn from experience and apply the knowledge acquired from experience, 2) handle complex situations, 3) solve problems when important information is missing, 4) determine what is important, 5) react quickly and correctly to a new situation, 6) understand visual images, 7) process and manipulate symbols, and 8) be creative and imaginative.
CHAPTER 07 9e 82. Identify and briefly define several specialty areas of artificial
intelligence. Correct Answer: Expert systems consist of hardware and software that store knowledge and make inferences, enabling a novice to perform at the level of an expert. Robotics involves developing mechanical or computer devices that can paint cars, make precision welds, and perform other tasks that require a high degree of precision or that are tedious or hazardous for humans. Vision systems include hardware and software that permit computers to capture, store, and manipulate visual images. Natural language processing allows a computer to understand and react to statements and
CHAPTER 07 9e
commands made in a natural language. Learning systems are a combination of software and hardware that allows a computer to change how it functions or reacts to situations based on feedback that it receives. A neural network is a computer system that can act like or simulate the functioning of the human brain.
83. Briefly describe the role of the inference engine and the
explanation facility components of an expert system. Correct Answer: The overall purpose of an inference engine is to seek information and relationships from the knowledge base and to provide answers, predictions, and suggestions similar to the way a human expert would. The explanation facility allows a user or decision maker to understand how the expert system arrived at certain conclusions or results. The expert system, using the explanation facility, can indicate all the facts and rules that were used in reaching the conclusion.
84. Discuss some of the factors that go into designing a multimedia
application. Correct Answer: Designing multimedia applications requires careful thought and a systematic approach. Multimedia applications can be printed on beautiful brochures, placed into attractive corporate reports, uploaded to the Internet, or displayed on large screens for viewing. Because these applications are typically more expensive than preparing documents and files in a wordprocessing program, it is important to spend time designing the best possible multimedia applications. Designing a multimedia application requires that the end use of the document or file be carefully considered. Because different computers and Web browsers display information differently, it is a good idea to select styles, fonts, and presentations based on computers and browsers that are likely to display the multimedia application. Because large files can take much longer to load into a Web page, smaller files are usually preferred for Web-based multimedia applications.
85. Human nature can make establishing a new KM program
challenging,but there are best practices for successfully implementing such a program. Identify and explain the four steps recommended for implementing a KM project.
CHAPTER 07 9e
Correct Answer: The first step in successfully implementing a knowledge management project is to connect the project to the organization's goals and objectives. By clearly defining the benefits and purpose of the project, the organizer will confirm the project is worthwhile and be able to elicit the support and enthusiasm of others in the organization. The second step is to involve enthusiasts within the organization to develop a small pilot program in order to work out issues, determine needed resources, and gain support. Since there is probably too much tacit knowledge to capture, organizers should identify the most valuable pieces of tacit knowledge needed in the third step of the process. Finally, in the fourth stage, the value and benefits of the project must be explained to employees throughout the organization in order to get their buy-in.
CHAPTER 08 9e
1. Pressure to increase profitability and improve operational efficiencies
often drives organizations to implement new approaches andtechnology. *a. True b. False
2. The purpose of studying a system is to identify the strengths and
weaknesses of the existing system and examine current inputs, outputs, processes, security and controls, and system performance. *a. True b. False 3. Joint application development (JAD) sessions with a cross section of
users and stakeholders in a project are an effective way to define system requirements. *a. True b. False
4. Security and control considerations are a negligible part of theentire
system development process. a. True
*b. False
5. A data flow diagram (DFD) does not provide any information about
process timing. *a. True b. False
6. Feasibility analysis assesses the technical, economic, legal,
operational, and schedule feasibility of a project. *a. True b. False
7. The disaster recovery plan focuses on technology recovery and
CHAPTER 08 9e
identifies the people or the teams that are responsible to take actionin the event of a disaster, what exactly these people will do when a disaster strikes, and the information system resources required to support critical business processes. *a. True b. False
CHAPTER 08 9e
8. All members of a system investigation team must be co-located to
ensure a successful start to a project. a. True
*b. False
9. Operational feasibility takes into account the need to meet certain
system performance requirements that are considered important to system users and stakeholders. *a. True b. False
10. The primary outcome of systems analysis is a prioritized list of
system requirements and a recommendation of how to proceed with a project. *a. True b. False
11. System testing is often done by independent testers who are not
involved in developing program code. *a. True b. False
12. Even if unit testing is successful, developers cannot assume theycan
combine individual components into a working system without any problems. *a. True b. False
13. While discussing the preliminary feasibility of a project, your
colleague insists that figures used in economic feasibility be very accurate down to the last cent. His claim is appropriate and not uncommon. a. True
*b. False
CHAPTER 08 9e
14. User acceptance testing (UAT) is a critical activity that must be
completed successfully before newly developed software can be rolled out to the market. *a. True b. False
CHAPTER 08 9e
15. The eventual success of any system solely depends on how users work
with it. a. True
*b. False
16. Unit testing uncovers any defects in the interface between
individual components of an information system. a. True
*b. False 17. Perceived usefulness and perceived ease of use do not have any
influence in determining whether someone will use an information system. a. True
*b. False
18. For a small system, site preparation can be as simple as rearranging
the furniture in an office to make room for a computer. *a. True b. False
19. Parallel start-up involves running a complete new system for one
group of users while the rest of the users still run an old system. a. True
*b. False
20. One of the significant drawbacks to building a custom system is the
high cost compared to off-the-shelf software. *a. True b. False
21. Monitoring is the process of analyzing systems to make sure theyare
CHAPTER 08 9e
operating as intended. a. True
*b. False
22. Suppose your business is using software that was written using
FORTRAN 77. They wish to modify it to accommodate new requirements. It
CHAPTER 08 9e
is a sound advice to suggest that they consider switching to a new application using newer technologies (e.g. Microsoft ASP.Net), ratherthan modify the current software. *a. True b. False
23. A slipstream upgrade is a minor upgrade—typically a code adjustment
or minor bug fix. *a. True b. False
24. Waterfall and agile are the two types of software development
processes available to organizations. a. True
*b. False 25. Agile is better suited for developing larger information systemsthan
smaller ones. a. True
*b. False
requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system. 26.
a. Causal analysis b. Creative analysis
*c. Critical analysis d. Data flow analysis 27. A scrum team usually consists of
*a. less than a dozen people b. twelve to fifteen people c. fifteen to twenty people d. more than twenty people
.
CHAPTER 08 9e
28. The Pareto principle is also known as the a. result rule b. cause rule c. 50-50 rule
.
CHAPTER 08 9e
*d. 80-20 rule 29. In the context of data-flow diagrams (DFDs), a(n)
shows either
the source or destination of the data. a. data-flow line
*b. entity symbol c. process symbol d. data store symbol
30. Tara and Zach are leading a systems development project and they
want the investigation phase to go smoothly and quickly. They decide to use because it will also help with the analysis and design phases. a. direct observation b. agile systems development c. functional decomposition
*d. joint application development
31. Laura is carefully estimating the time required for each phase of a
proposed system development project to see if her company can meet the client's desired time for completion. Laura is checking on . a. technical feasibility
*b. schedule feasibility c. deadline feasibility d. economic feasibility determines whether the expected benefits associated with a project outweigh the expected costs sufficiently to make the project financially attractive. 32.
*a. Economic feasibility b. Technical feasibility c. Legal feasibility d. Operational feasibility 33. A
is a description of the logical and physical structure of data and the relationships among the data for each user. a. data dictionary b. process
CHAPTER 08 9e
*c. schema d. cold site
CHAPTER 08 9e
creates a complete set of technical specifications that can be used to construct an information system. 34.
*a. Systems design b. Systems investigation c. Systems analysis d. Systems development 35. In the context of data-flow diagrams (DFDs), the
includes
arrows that show the direction of data movement. a. process symbol b. entity symbol
*c. data-flow line d. data store symbol 36. Once new software has been selected, implementation will include all of
these tasks EXCEPT . a. customizing any aspects of the solution needed
*b. consulting with stakeholders to establish future needs c. training end users d. configuring all of the software's capabilities and options to meet requirements involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that an information system meets all specified requirements. 37.
a. Integration testing
*b. System testing c. Volume testing d. User acceptance testing 38. The goals of
are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance. a. unit testing b. user acceptance testing
*c. volume testing
CHAPTER 08 9e
d. integration testing
CHAPTER 08 9e
explains the purpose of every major piece of computer code and also identifies and describes key variables. 39.
a. Agile documentation
*b. Technical documentation c. Systems documentation d. User documentation
40. Your new software project manager is OK with requirements that are
not fully specified up front. He recommends a team-based approach to development. He is very likely to be a proponent of the approach to software development. a. Waterfall b. outsourced
*c. Agile d. packages solution 41. The process of switching from an old information system to a
replacement system is called . a. installation b. conversion c. site preparation
*d. cutover 42. You are part of the team to implement new software at XYZ Inc. The
employees at XYZ Inc. trust the results of the old software programs, but are cautious about accepting the outcomes of the proposed new software programs. What software implementation strategy would you recommend in this situation? a. Direct cutover b. Phase-in approach c. Pilot startup
*d. Parallel start up 43. You are part of a testing team at a software business. Your job is to see
how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing testing.
CHAPTER 08 9e a. system testing
*b. volume testing c. acceptance testing d. integration testing
CHAPTER 08 9e
44. Which of the following statements is true of user acceptance testing
(UAT)? a. UAT involves linking individual components together and testing
them as a group to uncover any defects in the interface. b. A goal of UAT is to determine the work load at which systems performance begins to degrade. c. UAT is often done by independent testers who were not involved in developing program code. *d. UAT must be completed successfully before newly developed software can be rolled out to the market.
45.
involves running a complete new system for one group of users rather than all users. a. Phase-in approach b. Parallel start-up c. Cutover
*d. Pilot start-up 46.
involves using a new or modified system under all kinds of operating conditions. *a. Systems operation b. System construction c. Systems review d. Systems modification
is an iterative system development process that develops a system in "sprint" increments lasting from two weeks to two months. 47.
a. Prototyping b. Object-oriented development c. Individual development
*d. Agile development
48. After the software is implemented, some modification is done on the
software during maintenance. Suppose the customer data analysis software used by ABC Bank was significantly changed, but no new features were added. This type of maintenance is called a . a. patch
CHAPTER 08 9e b. slipstream upgrade c. version
*d. release 49. A new
features.
is a major program change, typically encompassing many new
CHAPTER 08 9e
a. release b. patch c. slipstream upgrade
*d. version 50.
is the process of analyzing systems to make sure they are operating as intended. *a. System review b. System operation c. System maintenance d. System construction
51. Phil has been working on a new version of his company's best-selling
sales management software and now he'd like to ask several co-workers and a handful of the existing version's top users to perform an acceptance test. Phil is preparing for . a. gamma testing b. beta testing c. delta testing
*d. alpha testing
52. At County Hospital, doctors and nurses must be able to access patient's
records immediately and at all times in order to perform surgeries, provide medication, and cure patients' illnesses. Accessing records is a process. Correct Answer(s): a. mission-critical b. mission critical
53.
are factors that are essential to the success of a functional area of an organization. Correct Answer(s): a. Critical success factors (CSFs) b. Critical success factors c. CSFs
54. A(n)
is a computer environment that includes rooms, electrical service, telecommunications links, data storage devices, and the like.
CHAPTER 08 9e
Correct Answer(s): a. cold site
CHAPTER 08 9e
55. The last time you backed up your computer's files was a week ago. You
should perform a(n) . Correct Answer(s): a. incremental backup
56. One advantage of the waterfall system development process is that
formal reviews at the end of each phase allows maximum
control.
Correct Answer(s): a. management
57. Maria has been revising a new app, so at the end of the day she recorded
her changes in a(n) .
Correct Answer(s): a. image log
58. A(n)
is a detailed description of all data used in a database.
Correct Answer(s): a. data dictionary 59. Hector and his team have received several requests for information
from software development vendors, so now they are deciding how to go about analyzing the proposals and contacting several customers of each of the vendors. In other words, they are developing a plan for their .
Correct Answer(s): a. final evaluation
60. A(n)
is a comparison of vendor options conducted in a computing environment and with a workload that matches its intended operating conditions.
CHAPTER 08 9e
Correct Answer(s): a. performance evaluation test
61. Isabella's manager has asked her to write up a that describes their
company's interest in developing a custom software solution for processing orders and asks vendors to estimate the cost and time needed to create the software.
CHAPTER 08 9e
Correct Answer(s): a. request for information b. RFI
62. In the context of data flow diagrams (DFDs), a(n)
reveals a storage
location for data. Correct Answer(s): a. data store symbol
63. In a user interface design, most systems provide a(n)that requires
identification numbers, passwords, and other safeguards to improve security and prevent unauthorized use. Correct Answer(s): a. sign-on procedure
64. In a user interface design with a(n)
system, users select what they
want to do from a list of alternatives. Correct Answer(s): a. menu-driven 65. Determining the involves an analysis of existing and future laws to
determine the likelihood of legal action against a systems development project and possible consequences of such action. Correct Answer(s): a. legal feasibility
66. A(n)
is a diagram used during both the analysis and design phases of a systems development life cycle (SDLC) to document the processes of the current system or to provide a model of a proposed new system. Correct Answer(s): a. data-flow diagram (DFD) b. data-flow diagram c. DFD
67.
is the stage of systems development that answers the
CHAPTER 08 9e
question, "How will the information system solve a problem?" Correct Answer(s): a. Systems design
CHAPTER 08 9e
involves linking all individual components together and testing them as a group to uncover any defects between individual components. 68.
Correct Answer(s): a. Integration testing
includes written details that computer operators follow to execute a program and that analysts and programmers use to solve problems or modify the program. 69.
Correct Answer(s): a. Technical documentation
70. A(n)
is a formal agreement that a user signs stating that a phase of the installation or the complete system is approved. Correct Answer(s): a. user acceptance document
71. The
specifies the factors that can lead to better attitudes about the use of a new information system, along with its higher acceptance and usage. Correct Answer(s): a. technology acceptance model (TAM) b. technology acceptance model c. TAM
72. You've just purchased some new software for your laptop, but you
can't seem to figure out how to install it correctly. When you call tech support, you're calling the company's . Correct Answer(s): a. help desk
involves those activities that ensure the orderly dissolution of a system, including disposing of all equipment in an environmentally friendly manner, closing out contracts, and safely migrating information from the system to another system or archiving it in accordance with applicable records management policies. 73.
CHAPTER 08 9e
Correct Answer(s): a. System disposal
is a method employed to keep the agile system development effort focused and moving quickly. 74.
Correct Answer(s): a. Scrum
CHAPTER 08 9e
is an approach to writing code that promotes incremental development of a system using short development cycles to improve productivity and to accommodate new customer requirements. 75.
Correct Answer(s): a. Extreme programming (XP) b. Extreme programming c. XP
76.
is the process of analyzing systems to make sure they are operating as intended. Correct Answer(s): a. Systems review
77. Before National Bank rolled out its new online banking system, it held
numerous training sessions with managers and employees. It also executed a massive campaign to convince its customers of the benefits of the new system and to educate them on using it. These activities were all part of the bank's . Correct Answer(s): a. user preparation
proposes that every organizational system is made up of people, tasks, structure, and technology with an interaction among the four components so that any change in one of these elements will necessitate a change in the other three elements. 78.
Correct Answer(s): a. Leavitt’s Diamond
79. Kumar and Jodie have purchased a new computer system for the
company where they work. After unpacking all of the new equipment and putting the components in place, they will have to test the new system to make sure it's operational before they can consider the to be complete. Correct Answer(s): a. installation
CHAPTER 08 9e
involves measuring system performance by tracking the number of errors encountered, the amount of memory required, the amount of processing or CPU time needed, and other performance indicators. 80.
Correct Answer(s): a. Monitoring
CHAPTER 08 9e
81. Briefly describe the various types of project feasibility that mustbe
evaluated. Correct Answer: Technical feasibility examines whether a project is feasible within the current limits of available technology. Determining the technical feasibility is critical when new technology is first being considered for use within an organization, prior to its widespread use. Economic feasibility determines whether the expected benefits associated with a project outweigh the expected costs sufficiently to make the project financially attractive. Legal feasibility determines whether laws or regulations may prevent or limit a systems development project. Legal feasibility involves an analysis of existing and future laws to determine the likelihood of legal action against the systems development project and the possible consequences of such action. Operational feasibility is concerned with how the system will be accepted by people and how well it will meet various system performance expectations. Schedule feasibility determines whether a project can be completed in a reasonable amount of time. This process involves balancing the time and resource requirements of the project with other projects.
82. Briefly explain the difference between system testing and user
acceptance testing (UAT). Correct Answer: System testing involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that an information system meets all specified requirements. System testing is often done by independent testers who were not involved in developing program code. They attempt to make the system fail. They frequently employ testing called black box testing because it requires no specific knowledge of an application’s code and internal logic. In other words, a system tester is aware of what the software is supposed to do but is not aware of how it does it. During user acceptance testing (UAT), trained users test the information system to verify that it can complete required tasks in a real-world operating environment and perform according to the system design specifications. UAT is also known as beta testing, application testing, and end-user testing. Unlike system testing, which ensures that the system itself works, UAT determines whether the system meets its intended business needs.
CHAPTER 08 9e
83. What is system maintenance? List the reasons for systems
maintenance. Correct Answer: Systems maintenance is a stage of systems development that involves changing and enhancing a system to make it more useful in achieving user and organizational goals. Some of the reasons for program maintenance are the following:1. Poor system performance such as slow response time for frequent transactions 2. Changes in business processes 3. Changes in the needs of system stakeholders, users, and managers
CHAPTER 08 9e
4. Bugs or errors in the program 5. Technical and hardware problems 6. Corporate mergers and acquisitions 7. Changes in government regulations 8. Changes in the operating system or hardware on which the application runs
84. Discuss the advantages and disadvantages of agile development.
Correct Answer: Like any other approach, agile development has its advantages and disadvantages. For appropriate projects, this approach puts an application into production sooner than any other approach. On the other hand, this intense systems development life cycle (SDLC) can burn out systems developers and other project participants. In agile development, documentation is produced as a by-product of completing project tasks, but this approach requires systems analysts and users to be skilled in agile systems development tools and agile techniques. Agile forces teamwork and lots of interaction between users and stakeholders; however, it requires a larger percentage of stakeholders' and users' time than other approaches.
85. System investigation is the initial phase in the development of anew
or modified business information system. What is the purpose of this phase, and what questions are typically explored during the investigation? Correct Answer: The purpose of system investigation is to gain a clear understanding of the specifics of the problem to solve or the opportunity to address. Questions typically asked during this phase are: What is the scope of the problem? Who is affected and how? How often does this occur? After gaining a good understanding of the problem, the next question is, “Is the problem worth addressing?” What are the potential costs, both the one-time initial costs and recurring costs? What risks are associated with the project? If successful, what benefits, both tangible and intangible, will the system provide? Given that organizations have limited resources—people and money—these questions deserve careful attention.
CHAPTER 09 9e
1. As the complexity of a network increases, the possibility of
security breaches decreases. a. True
*b. False
2. An attack that takes place before the security community and/or
software developers become aware of and fix a security vulnerability is called the 'zero-day attack.' *a. True b. False 3. It is not uncommon for computer users to share their login ID and
password with coworkers. *a. True b. False
4. Discovery of a vulnerability in a software program can potentiallybe
sold to the government. *a. True b. False
5. You see a deceptive pop-up that says your computer is infected and
that you must visit a compromised web site where you pay them to clean your computer. You have just become a victim of ransomware. *a. True b. False
6. Macro viruses are called so because they are written using a macro
language. *a. True b. False
7. Even legitimate organizations sometimes use email spam for promoting
products.
CHAPTER 09 9e
*a. True b. False 8. Spam emails make up only a small proportion (<10%) of emails. a. True
CHAPTER 09 9e
*b. False
9. Spam emails do not add to costs because nobody reads them anyways. a. True
*b. False
10. There are bots that can sign up for thousands of email accounts.
*a. True b. False
11. A zombie computer would send requests to access to the target site
again and again. *a. True b. False
12. Educational institutions' Websites are the most commonly targeted
sites by phishers a. True
*b. False
13. When you receive a text message that there is a problem with your
bank account and you are required you to click on a link to submit some information, you are likely seeing a vishing attack. a. True
*b. False
14. Spear-phishing is when the phisher sends fraudulent emails to a
certain organization’s employees. *a. True b. False
15. The computer is running, but not responding to your keyboard
inputs. You find that the network activities are running very slowly.You have probably been hit by a rootkit.
CHAPTER 09 9e
*a. True b. False
16. Downloading games from unknown websites can be risky. The
softwaremay be a Trojan horse.
CHAPTER 09 9e
*a. True b. False 17. You work at a call center of a large bank where you answer credit card
services related questions from customers. Lately, you have noticed an increased number of customers enquiring if you had initiateda call. There can be a scam in progress. *a. True b. False
18. Transmitting a program, code, or command that causes harm to a
computer is a crime. *a. True b. False
19. Those convicted of cyberterrorism are subject to a prison term of 6
months to 1 year. a. True
*b. False
20. A strong security program begins by assessing the backgrounds of
the employees in the organization. a. True
*b. False
21. Default usernames and passwords should always be changed.
*a. True b. False
22. An employee who is marked for a lay-off sent threatening emails tohis
boss, stating that he is going to delete sensitive data. This employee can be charged under the Computer Fraud and Abuse Act. *a. True
CHAPTER 09 9e
b. False
23. A 'virus signature' contains the email ID of the virus developer. a. True
*b. False
CHAPTER 09 9e
24. Any Internet traffic that is not explicitly permitted into theinternal
network is denied entry through a firewall. *a. True b. False
25. A virus can reside in a file (or many files) on the hard drive, butit
would not be active in memory. As such, it is not as important to scan live memory as it is to scan the hard drive. a. True
*b. False
26. Whenever there is a computer security incident, it is not
recommended that the organization reveal all they know in public forums. *a. True b. False
27. There are laws that require businesses to prove that their data issecure.
*a. True b. False
28. Most organizations do not hesitate to conceal information about a
data loss event if there is a fear of bad publicity and loss of customers. a. True
*b. False
29. If an attack is dangerous enough, it may warrant shutting down or
disconnecting critical systems from the network. *a. True b. False
30. Suppose your computer network was compromised in a large scale
virus attack last Thursday. Most of the data files got corrupted beyond
CHAPTER 09 9e
repair. The last data backup was done the Sunday before the virus attack. This means your company has an adequate backup process in place. a. True
*b. False
CHAPTER 09 9e
31. Someone who violates computer or Internet security maliciously
or for illegal personal gain is known as a(n) . *a. black hat hacker b. industrial spy c. hacktivist d. cyberterrorist 32. A hacktivist is someone who . a. attempts to gain financially and/or disrupt a company’s
information systems and business operations *b. hacks computers or Web sites in an attempt to promote a political ideology c. attempts to destroy the infrastructure components of governments d. violates computer or Internet security maliciously or for illegal personal gain
33. These days, the biggest threats to IT security are from
.
a. “geeks” working on their own and motivated by the desire to
gain some degree of notoriety b. international drug cartels c. terrorist organizations *d. organized groups that have ample resources, including money and sophisticated tools, to support their efforts
34. This harmful malware is triggered by a specific event, such as Friday the
13th. a. Virus b. Worm
*c. Logic bomb d. Trojan bomb
35. Your business has a web server that has suddenly become
unresponsive. When you study the server's logs there are a huge number of requests from what appear to be legitimate computers. The problem is likely because of .
CHAPTER 09 9e a. a CAPTCHA issue
*b. a denial-of-service attack c. too many Spam emails d. a logic bomb
36. A botnet is a
.
CHAPTER 09 9e
a. network of robots that control an assembly line at a factory b. network of servers that exchange traffic data c. network of devices that are used for managing security
*d. network of computers that send out access requests to servers repeatedly
37. Once a
is installed, the attacker can gain full access to the computer.
*a. botnet b. zombie c. worm d. rootkit
38. The purpose of Advanced Persistent Threat (APT) usually is to
.
a. steal money b. interrupt service
*c. steal data d. annoy the users
39. On the back of a credit card the three-digit number above the signature
panel is used to . a. verify the identity of the credit card holder
*b. verify the card is legitimate and not a stolen card number c. enter your account into a raffle d. track your transactions for rewards program purposes
40. The US-CERT incident reporting system is used to
.
a. alert the bank about stolen credit cards b. alert the government about missing computers c. alert the Border Patrol about undocumented workers
*d. alert the Department of Homeland Security about information security incidents
41. The second phase of an Advanced Persistent Threat attack is a. capture b. reconnaissance
*c. incursion
.
CHAPTER 09 9e
d. discovery 42. In a denial-of-service (DDoS) attack, the perpetrator .
*a. instructs the zombie computers to send simple access requests to target computers
CHAPTER 09 9e b. sends out a huge number of spam emails to all of those in your
contacts list
c. changes the configuration information of the infected computers d. refuses to accept any email from any sender
43. You had used an online service to apply for a credit card. As part of the
process, you submitted your personal information such as SSN, date of birth, employer information, etc. Soon after you started receiving bills for items you did not purchase. You have become a victim of . a. cyberterrorism b. ransomware
*c. identity theft d. cyber espionage
44. A company's risk assessment process can include numerous threats
to the computers and networks. Which of the following can be considered an adverse event? a. Distributed denial-of-service attack b. Email attachment with harmful worm c. Harmful virus
*d. All of the above
45. Which of the following laws covers false claims regarding unauthorized
use of credit cards? a. Computer Fraud and Abuse Act
*b. Fraud and Related Activity in Connection with Access Devices Statute c. Identity Theft and Assumption Deterrence Act d. Stored Wire and Electronic Communications and Transactional Records Access Statutes 46. Which of the following subject areas does the USA Patriot Act cover?
*a. Cyberterrorism b. Identity theft c. Credit card fraud d. Transmitting virus programs
CHAPTER 09 9e 47. Which of these organizations offers guidelines on developing security
policies? a. DHS
*b. SANS c. IBM d. CISCO
CHAPTER 09 9e
48. You have been hired as the new Information Security consultant at
XYZ Inc. Which of these employee behaviors would be a top security concern? *a. Leaving laptop computers unattended in public spaces b. Using office computers for personal e-mails c. Drinking water or coffee while working on computers d. Banging on the keyboard, when the computer is running slow
49. Which of the following is the correct description of a firewall? a. It is a software that deletes viruses from attachments. b. It is hardware that prevents unauthorized data to enter the private
network. *c. It is a software and hardware combination that limits the incoming and outgoing Internet traffic. d. It is a concept used in developing security policies.
50. Which of the following is NOT a popular vendor of firewall software?
*a. Red Hat b. Check Point c. Kaspersky d. Total Defense
51. You work for a company that is growing. Originally, all the users in
all departments had access to all the data in the database. It is considered a security risk. What is an appropriate action to reduce the risk? a. Install a two-step login procedure, where the user has to key in
additional information for logging in b. Install and provide stronger anti-virus software on the users' computers c. Tweak the firewall parameters so that outgoing traffic can be better controlled *d. Assign roles and privileges to users so that only job-relevant data is accessible to the user.
52. Which
of the following shortcoming may be revealed during an IT security audit? a. whether the IT budget is adequate or not
CHAPTER 09 9e b. whether the users are satisfied with IT services or not
*c. whether only a limited number of people have access to critical data or not d. whether the firewall is tall enough
53. Assume your organization is experiencing an intruder attack.
You have an intrusion detection system (IDS) set up. Which of the following events occurs first? a. Messages from the IDS are routed to the network security team b. The IDS warns the firewall of suspicious traffic
CHAPTER 09 9e
*c. The network router sends traffic to the firewall as well as to the IDS d. Network security team decides to block traffic from that IP address
54. Which of the following security incidents is least costly to fix? a. theft of program source code b. alteration of corporate database c. theft of trade secrets
*d. defacing of web pages
55. There has been a data breach at your business and the business has
lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events? *a. activate the forensics analysis team and prepare documentation b. meet with your lawyers to prepare to counter-sue the customers c. settle with the customers, however much it may cost d. none of these answers
56. You wish to use your personal laptop computer at work. However, the
IT department folks are unwilling to allow you. The likely reason is . a. you will use your laptop for non-work related activity b. your productivity could not be measured correctly
*c. your non-work related use of the laptop could increase vulnerability d. your activities could not be monitored 57. Which of the following is a vendor of popular anti-virus software? a. Microsoft
*b. Symantec c. McDonald's d. Bayer
58. In computing, an attack on an information system that takes
advantage of a particular system vulnerability is called a(n) Correct Answer(s): a. exploit
.
CHAPTER 09 9e 59. Someone who attempts to destroy the infrastructure
components ofgovernments is known as a.
CHAPTER 09 9e
Correct Answer(s): a. cyberterrorist often creates a “backdoor” on a computer that enables an attacker to gain access to the system and compromise confidential or private information. 60. A
Correct Answer(s): a. trojan horse
61. The purpose of
is to use email messages to make the recipients
reveal personal data. Correct Answer(s): a. phishing
62. The
is the agency tasked with the goal of providing for a safer, more secure America, making it resilient against terrorism and other potential threats. Correct Answer(s): a. The DHS b. DHS c. Department of Homeland Security
63. When the data about Target's customers was stolen, it was an example of
a(n)
.
Correct Answer(s): a. data breach is similar to SMiShing except that the victims receive a voice mailmessage telling them to call a phone number or access a Web site. 64.
Correct Answer(s): a. Vishing
is software that generates and grades tests that humans can pass; however, all but the most sophisticated computer programs cannot. 65.
Correct Answer(s): a. CAPTCHA
CHAPTER 09 9e
is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. 66.
Correct Answer(s): a. Virus
CHAPTER 09 9e
67. A(n)
is an individual who captures trade secrets and attempts to gain an unfair competitive advantage. Correct Answer(s): a. industrial spy
try, on a daily basis, to gain unauthorized access to a number of important and sensitive sites, such as the computers at the British, French, Israeli,and United States foreign intelligence agencies. 68.
Correct Answer(s): a. Cyberterrorists
69. You are starting to see unexpected messages on the screen. Some
programs that used to work do not work any longer. You find some key files missing. Your computer has been infected by a(n) . Correct Answer(s): a. virus
70. You recently installed a game that you got for free. After a few days,
you find that your computer's log has entries of logins that were not initiated by you. The perpetrator was most likely logging in using a . Correct Answer(s): a. backdoor
71. The concept of
, in connection with IS security, recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved. Correct Answer(s): a. reasonable assurance defines an organization’s security requirements, as well as thecontrols and sanctions needed to meet those requirements. 72. A
Correct Answer(s):
CHAPTER 09 9e a. security policy
73. The primary security threat for mobile devices continues to be
device.
of the
CHAPTER 09 9e
Correct Answer(s): a. loss b. theft
74. Your ex-colleague was apprehended based on the "Fraud and
Related Activity in Connection with Access Devices Statute" Act. He was caught using unauthorized or stolen . Correct Answer(s): a. credit cards
75. Suppose you wish to inspect the packets of data that are coming in
from the Internet into your organization's network. You should use
.
Correct Answer(s): a. next-generation firewall
76. Many organizations use
to provide a comprehensive display of all vital data related to an organization’s security defenses, including threats, exposures, policy compliance, and incident alerts. Correct Answer(s): a. security dashboard software 77. It is crucial that antivirus software be continually
with the latest
virus signatures. Correct Answer(s): a. updated
78. The US-CERT newsletter has alerted you about vulnerabilities in some
software installed in your organization. To detect if there is any attempt at exploiting this vulnerability, you would employ -based intrusion detection system. Correct Answer(s): a. knowledge
79. Some businesses outsource their security management to MSSPs. MSSP
CHAPTER 09 9e
stands for . Correct Answer(s): a. managed security service provider
CHAPTER 09 9e
80. Computer
is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law. Correct Answer(s): a. forensics
81. You are being consulted for recommendation on software for sales
report management. There are two choices. Choice #1 is a product from an industry leader that costs more than $1,000 per license per year. The second choice is a free open-source software that is free to download and install. The free software is in a language that your programmers do not have expertise in. You may be able to convince management to hire the right programmer to install the free and open source software. Considering the importance of data security, what solution would you recommend, and why? Correct Answer: I would recommend choosing the product from the industry leader. Since the software is from the industry leader, it is likely to have fewer vulnerabilities, and will be less risky. The second reason is that the large user base would have created reliable forums for troubleshooting. Thirdly, finding expertise for installation with this product will be easier. The open source software may have vulnerabilities that may not be discovered yet. For these reasons, I would recommend the first solution—to purchase the software license from the industry leader.
82. Pam, your new marketing manager, is exploring the purchase of tensof
thousands of email addresses, from a legitimate source, for the purpose of sending product information to the masses. She has asked your opinion. Would you agree or disagree with her idea? Why or why not? Correct Answer: I would not agree with her idea to buy tens of thousands of email addresses and send mass emails to them. It will be considered spam and potentially marked as spam by the email filters. The email filters are quite sophisticated these days. Those emails may not make it to the inboxes of the intended audience. Given the general opinion that spam is not welcome, the email
CHAPTER 09 9e
marketing campaign is not destined make any net positive impact on the potential audience minds. In addition, having received 'junk email' from our business would leave a not-so-good impression on people. They may reject any future genuine emails from our business. For these reasons, I would not agree with Pam.
83. You have been invited to speak to senior citizens about the
Internet in general and email in particular. What topics would you choose to talk about to benefit your audience the most?
CHAPTER 09 9e
Correct Answer: Knowing that many of the victims of phishing attacks often tend to be unsuspecting senior citizens, I would caution them against phishing attacks. I would explain what phishing is, and how to identify those emails. I would show them samples of phishing emails and show them what happens if they respond to those mails. I would also demonstrate how following a link from the email can lead to websites with malicious codes. I would give them some guidelines on what to do in case they become victims of phishing attacks.
84. Your company has acquired Joggers PLC, a smaller company. The
integration of the information systems can take up to 6 months, and until then Joggers PLC workers will continue following their policies. You have been tasked with ensuring that their IT practices will be safeand lead to a secure system. What advice would you give your manager regarding information security policies? Correct Answer: I would ensure Joggers' infrastructure is well protected by firewalls, antivirus software, and updated applications. I would enforce a password policy to make guessing the passwords improbable. I would recommend they institute a data backup policy that will make daily, weekly, and monthly backups of all the data. I would also make data access restricted to users' roles.
85. You have been called in to collect information regarding a recent data
breach at your organization. What specific information would you collect and for what reasons would you seek that information? Correct Answer: First, I would identify what actions or inactions led to the data breach. This will help in reducing or preventing such attacks in future. Second, I would identify the vulnerabilities that were exploited in this attack so that those vulnerabilities can be addressed. Third, I would review the capabilities of the intrusion detection system and recommend updates, modifications, or replacement so that similar intrusions can be detected sooner.
CHAPTER 10 9e
1. Computer-related mistakes include organizations operating
unintegrated information systems and acquiring redundant systems. a. True
*b. False
2. Organizations continue to operate their businesses using integrated
information systems that lead to missed opportunities, increased costs,and lost sales. a. True
*b. False 3. In order to protect the privacy of employees, email messages that
have been erased from hard disks cannot be retrieved. a. True
*b. False 4. The use of e-mail among public officials might violate “open
meeting” laws. *a. True b. False
5. Posting information to the Internet using anonymous email accountsor
screen names makes it impossible to identify a libeler. a. True
*b. False
6. A job that requires sitting at a desk and using a computer for many
hours a day qualifies as a sedentary job. *a. True b. False
7. A job that requires sitting at a desk for many hours a day can
significantly reduce the risk of type 2 diabetes.
CHAPTER 10 9e a. True
*b. False
8. Two primary causes of computer-related health problems are a poorly
designed work environment and failure to take regular breaks to stretchthe muscles and rest the eyes.
CHAPTER 10 9e
*a. True b. False
9. If an activity is defined as legal then it is ethical. a. True
*b. False
10. IS professionals believe that their field offers few opportunitiesfor
unethical behavior. a. True
*b. False 11. One idea for reducing cyberloafing is to develop software that
recognizes and categorizes Internet sites into sites that employees can always visit, sometimes visit, and never visit. *a. True b. False
12. Training and incentives are the keys to the successful acceptance and
implementation of policies and procedures governing waste and error prevention. a. True
*b. False
13. Deepak's team is in charge of conducting a review of their
company's waste/mistake prevention policies and procedures. Part ofthis review should also evaluate how upcoming changes in information systems will affect business activities. *a. True b. False
14. Laws and regulations have thoroughly addressed concerns about
privacy and data management in private organizations and federal agencies. a. True
CHAPTER 10 9e
*b. False 15. It is illegal for companies to buy and sell personal data collected
through marketing and sales efforts. a. True
CHAPTER 10 9e
*b. False
16. In the U.S., there is some debate over privacy between those who favor
data collection as a means to increase national security and those who view such programs as a violation of rights guaranteed by theConstitution and the Bill of Rights. *a. True b. False
17. Many workers claim their right to privacy trumps their employers'
right to monitor employee use of IS resources. *a. True b. False
18. Some companies offer health and wellness programs that require
employee participants to share personal data. This data is protectedunder the same HIPAA privacy regulations as data shared with health insurance companies and doctors. a. True
*b. False
19. U.S. federal law permits employers to monitor email sent and
received by employees. *a. True b. False
20. Never send sensitive personal data such as credit card numbers,
bank account numbers, or passwords via text or IM; only send them by email. a. True
*b. False
21. Amy is doing some online research for a term paper. She'd like to
access some information on a particular website, but the website is asking
CHAPTER 10 9e
her to put in her email address before allowing her to view theinformation. She wonders what the website owner will do with that information, but there is never any way for her to know how data collected via a website will be used. a. True
*b. False
CHAPTER 10 9e
22. It's safe for you to input personal data into your Facebook profile
because Facebook is not allowed to share this information with law enforcement officials or third parties for any reason. a. True
*b. False
23. Children and young adults under 18 can easily become the victims of
crimes due to their use of social media, but adults are entirely safe in using social media. a. True
*b. False 24. Software developers have created filtering software that blocks
children from viewing inappropriate or harmful Internet sites at home or school, but to date developers have been unsuccessful in creating asimilar software for use in the workplace. a. True
*b. False
25. The U.S. Congress has made several attempts to pass and maintain
legislation that limits children's exposure to online pornography, but eventually each of these laws has been ruled out because they were unconstitutional. a. True
*b. False
26. The Federal Commerce Commission is responsible for enforcing
consumer protection laws that prevent fraud, deception, and unfair business practices. a. True
*b. False
27. The use of computers in the workplace is a double-edged sword for
workers. While they help to increase productivity and efficiency, theycan also raise concerns about privacy and health issues.
CHAPTER 10 9e
*a. True b. False
28. If a worker is seated at a desk using a keyboard, the height of the
surface holding the keyboard and mouse should be 1 or 2 inches above the worker's thighs so that his or her wrists are nearly straight. *a. True
CHAPTER 10 9e
b. False
29. The term "ethics" refers to an individual's personal beliefs about right
and wrong, whereas the term "morals" describes standards or codesof behavior expected of an individual by a group, such as a nation, organization, or profession. a. True
*b. False
30. The pages on a university's website are maintained by individual
departments and organizational units. It is a useful policy to requirethat every change a user makes to his department pages be reviewed and approved.
*a. True b. False
31. As a Google user, your search history data can be accessed by the
NSA and the FBI without obtaining court orders. *a. True b. False
32. Which of the following is a useful policy to minimize waste and
mistakes? a. Changes to HTML and URLs should be documented and authorized
by end users. b. System report titles should be as brief as possible and should simply indicate the report number. *c. Users should implement proper procedures to ensure correct input data. d. Tight control should be avoided over critical tables. involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation. 33.
CHAPTER 10 9e
a. Vishing b. Slander
*c. Libel d. Phishing 34. Which of the following is a computer-related mistake? a. Operating unintegrated information systems.
CHAPTER 10 9e
*b. Mishandling computer outputs. c. Acquiring redundant systems. d. Exhausting information system resources. 35. The
requires all financial institutions to protect and secure customers' nonpublic data from unauthorized access or use. *a. Gramm-Leach-Bliley Act of 1999 b. E-Government Act of 2002 c. USA Patriot Act of 2001 d. Sarbanes-Oxley Act of 2002
36. The
requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation. a. Cable Act of 1992 b. Electronic Communications Privacy Act of 1986 c. Gramm-Leach-Bliley Act of 1999
*d. USA Patriot Act of 2001 37. Which of the following statements is true of the E-Government Act of
2002? a. It renews the U.S. government's authority to monitor electronic
communications of foreigners abroad and authorizes foreign surveillance programs by the National Security Agency (NSA). *b. It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people. c. It restricts government access to certain records held by financial institutions. d. It defines procedures to request judicial authorization for electronic surveillance of persons engaged in espionage against the United States on behalf of a foreign power. 38. A job that requires sitting at a desk and using a computer for many hours
a day can lead to . a. undesirable weight loss
CHAPTER 10 9e
*b. formation of blood clots c. inflammation of the gum tissue d. sleep disorders 39.
is is an inflammation of the nerve that connects the forearm to the palm of the wrist. *a. Carpal tunnel syndrome (CTS)
CHAPTER 10 9e
b. Seated immobility thromboembolism (SIT) c. Chronic idiopathic mylofibrosis d. Behcet's syndrome
40. Heavy computer users who experience red, dry, itchy eyes should
*a. consider the use of artificial tears b. consider the use of older, but more human friendly CRT monitors c. keep their focus on their screens for long hours d. avoid blinking often states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior. 41.
*a. Code of ethics b. Code of conduct c. Code of civil procedure d. Code of criminal procedure 42. In a recent survey of 2100 human resource professionals, which two
activities were listed as the biggest "productivity killers" in the workplace? *a. personal cell phone use and Internet surfing b. personal cell phone use and online game play c. Internet surfing and online game play d. online shopping and online game play 43. A recent study conducted by the University of Nevada revealed that
cyberloafing (wasting time online) costs U.S. businesses more than annually. a. $25 billion b. $45 billion c. $65 billion
*d. $85 billion 44. To minimize waste and mistakes, organizations often develop and
implement policies and procedures which focus on:
.
a. the use of data editing to ensure data accuracy and completeness b. the assignment of clear responsibility for data accuracy within
each information system c. the implementation of source data automation
.
CHAPTER 10 9e
*d. all of these answers
CHAPTER 10 9e
45. Which legislation is designed to combat the growing crime of identity
theft? a. E-Government Act of 2002 b. USA Freedom Act of 2015 c. USA Patriot Act of 2001
*d. Fair and Accurate Credit Transactions Act of 2003 46. In today's workplace, most employers issue a policy stating that they
will monitor employees' use of any company-owned computer, server, or email system, thus eliminating any expectation of privacy. How many organizations actually monitor, retain, and review employees' emails? a. about one-fourth
*b. about half c. about three-quarters d. nearly all 47. In one court case, a hospital employee, who had been fired for showing
coworkers sexually explicit photos on a hospital computer, sued his former employer for wrongful termination. What did the court rule and why? a. The employee won the case because the court stated that he
had a reasonable expectation of privacy. b. The employee won the case because the court stated that viewing sexually explicit photos is not illegal. *c. The hospital won the case because the court stated that the employee did not have a reasonable expectation of privacy when using the hospital's computer at work. d. The hospital won the case because the court stated that all employers have the right to monitor their employees' behavior at all times.
48. Federal law permits employers to monitor their employees' use
of company-owned computer equipment, specifically a. e-mails b. instant messages c. website views
*d. all of these answers
.
CHAPTER 10 9e 49. RFID chips embedded in objects generate radio transmissions that
allow people to track the location and other associated data of those objects. It's been suggested that RFID chips be implanted . a. in children to enable parents to find them if lost b. in criminals to allow law enforcement agents to find them if needed
CHAPTER 10 9e
c. in all humans to give medical professionals instant access to
medical records and conditions *d. all of these answers 50. Harold is thinking about setting up profiles on Facebook and
Twitter. Which of the following categories of data should he avoid sharing on these social media platforms? a. his location b. his religious and political affiliations c. his health conditions
*d. all of these answers 51. Which of the following is NOT one of the four most common issues
related to the storage and use of personal data? *a. notice b. security c. knowledge d. consent 52. Anne and Jordan have two pre-teen sons and they're concerned about
what their kids might see and share on the Internet. They should probably invest in . a. Internet licensing
*b. filtering software c. security passwords d. privacy screening 53. Although Roberta had signed a form preventing her doctor from
sharing her personal medical records with the company she worked for, she later discovered that the doctor's office had, in fact, shared her data with her health insurance provider and her employer, which caused her to be terminated. Because the doctor's practice violated its own privacy policy, she was able to file a lawsuit under the . *a. Health Insurance Portability and Accountability Act b. Health and Medical Records Privacy Act c. Gramm-Leach-Bliley Act d. none of these answers
CHAPTER 10 9e 54. In order to be accredited by the Better Business Bureau, a business is
required to publish a privacy notice on its website that includes all of the following elements EXCEPT . a. choice
*b. sharing and selling
CHAPTER 10 9e
c. access d. updates 55. Miranda works at a small-batch soda pop manufacturing plant. For
eight hours a day, she uses her right hand to lift individual bottles of soda pop off the production line and place them in packing crates. Lately her right elbow has been hurting, so she visited her doctor, who diagnosed her with . *a. a repetitive strain injury b. carpal tunnel syndrome c. a thromboembolism d. none of these answers 56. Flexibility is a major component of ergonomic design, mainly because: . a. people come in a wide range of shapes and sizes b. people have their own preferences c. people need to be able to position equipment in different ways for
best results *d. all of these answers 57. Graydon noticed Jack, his friend and classmate, cheating on a physics
exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend and probably all of their other friends will be mad at him. In which phase of the ethical decisionmaking process is Graydon? a. gathering information b. developing a problem statement c. identifying options
*d. weighing options 58. While giving her students a physics exam, Professor Thompson noticed
that Jack, one of her students who has been struggling with the course material, appeared to be copying answers from Graydon, one of the best students in the class. She decides that she should compare their answers when the class period is over before deciding what to do about the situation. In which phase of the ethical decision-making process is Professor Thompson?
CHAPTER 10 9e
*a. gathering information b. developing a problem statement c. identifying options d. weighing options 59. During a recent brainstorming session, one of Franklin's co-workers
suggested that their company could sell some of the data contained in its customer databases to earn extra revenue for
CHAPTER 10 9e
the business. As a long-time member of the ACM (Association for Computing Machinery), Franklin is opposed to the idea because it violates which of the following imperatives in the ACM code of ethics? a. Avoid harm to others. b. Be honest and trustworthy. c. Honor property right.s
*d. Respect the privacy of others. 60. Suppose you have been receiving unsolicited phone calls from
telemarketers. Which agency should you contact to prevent these 'junk' calls? *a. The Federal Trade Commission b. Better Business Bureau c. your local police department d. The Department of Justice
61. Your cousin works at her desktop computer for prolonged period of
time every day. She would like to minimize the harmful effects of such repetitive work. Her workspace should be designed with in mind. a. privacy b. productivity c. economics
*d. ergonomics is the science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them. 62.
Correct Answer(s): a. Ergonomics 63. The
is directed at Web sites catering to children and requires Web site owners to obtain parental consent before they collect any personal information from children under 13 years old. Correct Answer(s): a. Children's Online Privacy Protection Act (COPPA) b. Children's Online Privacy Protection Act c. COPPA
CHAPTER 10 9e 64. A party offended by a libel can file what is known as a(n)
lawsuit and use the subpoena power it grants to force the Internet service provider (ISP) to provide whatever information it has about the anonymous poster, including Internet Protocol (IP) address, name, and street address.
CHAPTER 10 9e
Correct Answer(s): a. John Doe
65. The hazardous activities associated with unfavorable working
conditions are collectively referred to as
.
Correct Answer(s): a. work stressors
66. Liam, a specialist in , has designed a desk that uses hydraulic lifts to
raise and lower the desk to the perfect height for any worker to use comfortably, whether sitting or standing. Correct Answer(s): a. ergonomics
67.
issues deal with what is generally considered right or wrong. Correct Answer(s): a. Ethical
68. Employees at a small publishing company were dissatisfied with their
project tracking system because it didn't allow them to record enough detail. To solve the problem, they created another system that recorded some of the same information, but allowed them to add even more detail about the schedules and budgets. As a result, the company had systems. Correct Answer(s): a. redundant
69. Kay should have been inputting data into her employer's database, but
instead she was , meaning she was surfing the Internet, online shopping, and playing games. Correct Answer(s): a. cyberloafing
70. In terms of information systems, issues of privacy relate to the
collection and use or misuse of .
CHAPTER 10 9e
Correct Answer(s): a. data
71. When a U.S. citizen applies for health insurance through the federally-
operated Healthcare Marketplace, workers for the Marketplace then contact the IRS for data about that citizen's income and tax records. This crossreferencing of data is regulated by the Computer and Privacy Act of 1988.
CHAPTER 10 9e
Correct Answer(s): a. Matching b. matching
72. The
Amendment protects individuals against unreasonable searches and seizures by requiring warrants to be issued only upon probable cause. Correct Answer(s): a. Fourth b. fourth
73. Sending an email message is like having an open conversation in
public—many people can listen to your messages, especially if they are not . Correct Answer(s): a. encrypted
, which means sending sexually explicit texts and/or photos, is illegal in some states, even if it is consensual. 74.
Correct Answer(s): a. Sexting b. sexting
is a means of acquiring data about a group of people (such as location, noise level, and pollution levels) through sensor-enhanced mobile devices. 75.
Correct Answer(s): a. Mobile crowd sensing (MCS) b. Mobile Crowd Sensing c. MCS
76. Some people believe that consumers should have the ability to
correct errors in their personal data stored in corporate database systems, which is an issue of . Correct Answer(s): a. control
CHAPTER 10 9e
77. Some parents use
as a means of controlling what their children see or
access on the Internet. Correct Answer(s): a. filtering software
CHAPTER 10 9e
78. According to the Better Business Bureau, a business's privacy notice
should include some method of , which means providing a customer a course of action to take if the business does not meet its' own privacy policy in some way. Correct Answer(s): a. redress
79. A system of rules that tells us what we can and cannot do is referred to as
. Correct Answer(s): a. law b. laws
80. There are federal laws that permit your employer to monitor your
email communications, hence your
is not protected.
Correct Answer(s): a. privacy b. right of privacy c. rights of privacy d. privacy rights
81. Outline six useful policies to minimize computer-related waste and
mistakes. Correct Answer: Some useful policies to minimize waste and mistakes include the following:1. Changes to critical tables, HTML, and URLs should be tightly controlled, with all changes documented and authorized by responsible owners. 2. A user manual should be available covering operating procedures
and documenting the management and control of the application. 3. Each system report should indicate its general content in its title and
specify the time period covered. 4. The system should have controls to prevent invalid and unreasonable data
entry. 5. Controls should exist to ensure that data input, HTML, and URLs are
valid, applicable, and posted in the right time frame.
CHAPTER 10 9e 6. Users should implement proper procedures to ensure correct input data.
82. Identify and briefly discuss two primary causes of computer-related
health problems. Correct Answer:
CHAPTER 10 9e
Two primary causes of computer-related health problems are a poorly designed work environment and failure to take regular breaks to stretch the muscles and rest the eyes. The computer screen can be hard to read because of glare and poor contrast. Desks and chairs can also be uncomfortable. Keyboards and computer screens might be fixed in place or difficult to move. The hazardous activities associated with these unfavorable conditions are collectively referred to as work stressors. Although these problems might not be of major concern to casual users of computer systems, continued stressors such as repetitive motion, awkward posture, and eye strain can cause more serious and long-term injuries. If nothing else, these problems can severely limit productivity and performance.
83. In the modern workplace where many employees are using their
employer's computer technology for business, there are often two differing viewpoints regarding privacy: the organization's and the employees'. Describe each party's viewpoint and state your own opinionon this issue. Correct Answer: The right to privacy at work is also an important issue. Employers are using technology and corporate policies to manage worker productivity and protect the use of IS resources. Employers are mostly concerned about inappropriate web surfing, with over half of employers monitoring the web activity of their employees. Organizations also monitor employees’ email, with more than half retaining and reviewing messages. Statistics such as these have raised employee privacy concerns. In many cases, workers claim their right to privacy trumps their companies’ rights to monitor employee use of IS resources. However, most employers today have a policy that explicitly eliminates any expectation of privacy when an employee uses any company-owned computer, server, or email system. The Fourth Amendment protects individuals against unreasonable searches and seizures and requires that warrants be issued only upon probable cause and specifying the place to be searched and the persons or things to be seized. The courts have ruled that, without a reasonable expectation of privacy, there is no Fourth Amendment protection for the employee. Students' opinions will vary.
84. Imagine that you own your own business, and you have decided to
write your own code of ethics. List at least five "imperatives," or guidelines, that you would like to include in your company's code of ethics. Correct Answer:
CHAPTER 10 9e
Students' answers should include some of the following or similar statements:1. contribute to society and human well-being. 2.
avoid harm to others.
3.
be honest and trustworthy.
4.
be fair and take action not to discriminate.
5.
honor property rights including copyrights and patents.
6.
give proper credit for intellectual property.
7.
respect the privacy of others.
8.
honor confidentiality.
CHAPTER 10 9e
85. Imagine that you are faced with an ethical dilemma at work, and you must determine the "right," or ethical, course of action. List the eight steps you will go through to make this decision, including some of the questions you'll ask yourself at each step in the process. Correct Answer: Questions to Consider Step 1: Gather information • Have you spoken to everyone directly involved and gathered all
the factsnecessary to define the problem? • Have you avoided assuming facts, motivations, or actions for which there is no evidence? Step 2: Develop a problem statement • Do you know the answers to the following questions: What do people observe that causes them to think there is a problem? Who is directly affected by the problem? Is anyone else affected? How often does the problem occur? What is the impact of the problem? How serious is the problem? What are the ethical issues involved? When is a solution needed?
• Have you shared the problem statement with the stakeholders, and
do they concur? Step 3: Consult those involved as well as other appropriate resources • Have you discussed this issue with your manager? • Have you sought input from human resources, legal, or other
appropriate subject matter experts? Step 4: Identify options • Have you identified the success criteria for a “good solution?” • Have the stakeholders had an opportunity to offer solutions?
Step 5: Weigh options • How does each alternative fit with your organization’s code of ethics,
policies, regulations, and organizational norms?
• Is each alternative legal and consistent with industry standards?
CHAPTER 10 9e • Does each alternative have possible unintended consequences? If so,
how will
CHAPTER 10 9e
you deal with those? Step 6: Choose an option • Have you considered how choice of this option might appear to others? • Would you be comfortable explaining your decision and
describing your decision-making process to others?
• Is your decision grounded in a basic sense of fairness to all affected
parties? Step 7: Implement a solution • Have you provided to all stakeholders answers to the following
questions: Why are we doing this? What is wrong with the current way we do things? What are the benefits of the new way for you? • Do you have a clear transition plan that explains to people how they
will movefrom the old way of doing things to the new way? Step 8: Review results • Were the success criteria fully met? • Were there any unintended consequences? • Is there a need for further refinements?