TEST BANK for MIS_Management Information Systems. 10th Edition, Hossein Bidgoli, ISBN-13: 9780357418

Page 1


Module 01: Information Systems in Business True / False 1. When repetitive transaction-processing operations are automated, human involvement is increasingly required. a. True b. False ANSWER: False RATIONALE: Correct Computers are most beneficial in transaction- processing operations. These operations are repetitive, such as printing numerous checks, or involve enormous volumes of data, such as inventory control in a multinational textile company. When these systems are automated, human involvement is minimal. See 1-3:The Beginning: Transaction-Processing Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Define transaction-processing systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.3 TOPICS: Information systems Information systems importance KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 7:17 PM 2. Information systems are broader in scope than information technologies. a. True b. False ANSWER: True RATIONALE: Correct Information systems are broader in scope than information technologies, but the two overlap in many areas. Both are used to help organizations be more competitive and to improve their overall efficiency and effectiveness. See 1-1: Computers and Information Systems in Daily Life POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss common applications of computers and information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.1 TOPICS: Information systems Information systems importance KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 3. In a management information system (MIS) application, processes are usually methods for performing a task. a. True Copyright Cengage Learning. Powered by Cognero.

Page 1


Module 01: Information Systems in Business b. False ANSWER: RATIONALE:

True Correct In an MIS application, processes are usually methods for performing a task. See 1-4: Management Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define management information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.4 TOPICS: Management information systems KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 4. In designing a management information system (MIS), the first task is to collect data and analyze it. a. True b. False ANSWER: False RATIONALE: Correct In designing an MIS, the first task is to clearly define the system’s objectives. See 1-4: Management Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define management information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.4 TOPICS: Management information systems KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 5. An information system should collect data from both external and internal sources, although organizational objectives and the type of application also determine what sources to use. a. True b. False ANSWER: True RATIONALE: Correct The information that users need affects the type of data that is collected and used. An information system should collect data from both external and internal sources, although organizational objectives and the type of application also determine what sources to use. See 1-5: Major Components of an Information System POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 2


Module 01: Information Systems in Business DIFFICULTY: Moderate REFERENCES: Describe the four major components of an information system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.1 TOPICS: Information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 6. Customers, competitors, and suppliers are examples of internal data sources of an information system. a. True b. False ANSWER: False RATIONALE: Correct Customers, competitors, and suppliers are examples of external data sources of an information system. See 1-5: Major Components of an Information System POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the differences between data and information. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.1 TOPICS: Information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 7. In a management information system (MIS), the quality of information is determined by its usefulness to users, and its usefulness determines the success of an information system. a. True b. False ANSWER: True RATIONALE: Correct In an MIS, the quality of information is determined by its usefulness to users, and its usefulness determines the success of an information system. See 1-5: Major Components of an Information System POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the differences between data and information. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.1 TOPICS: Information system components KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 3


Module 01: Information Systems in Business DATE CREATED: DATE MODIFIED:

10/22/2019 1:26 PM 11/19/2019 1:53 PM

8. To be useful, information must be able to integrate with other data and information. a. True b. False ANSWER: True RATIONALE: Correct To be useful, information must be able to integrate with other data and information. See 15: Major Components of an Information System POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the differences between data and information. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.1 TOPICS: Information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 9. When solving problems, the users of an information system must avoid using informal information. a. True b. False ANSWER: False RATIONALE: Correct In addition to the formal information that an information system generates, users need to be able to make use of informal information-such as rumors, unconfirmed reports, and storieswhen solving problems. See 1-5: Major Components of an Information System POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the differences between data and information. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.1 TOPICS: Information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 10. The main difference between an intranet and the Internet is that intranets are public and the Internet is private. a. True b. False ANSWER: False RATIONALE: Correct Copyright Cengage Learning. Powered by Cognero.

Page 4


Module 01: Information Systems in Business The main difference between an intranet and the Internet is that intranets are private and the Internet is public. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the importance and applications of information systems in functional areas of a business. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information systems Information technologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 11. A logistics information system supports decisions related to providing reports and statistics on employee demographics. a. True b. False ANSWER: False RATIONALE: Correct A personnel information system supports decisions related to providing reports and statistics on employee demographics. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the importance and applications of information systems in functional areas of a business. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information systems Information technologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 12. An effective financial information system should provide timely, accurate, and integrated information about the marketing mix, or 4Ps: price, promotion, place, and product. a. True b. False ANSWER: False RATIONALE: Correct An effective marketing information system should provide timely, accurate, and integrated information about the marketing mix-4Ps: price, promotion, place, and product. See 1-6: Using Information Systems and Information Technologies Copyright Cengage Learning. Powered by Cognero.

Page 5


Module 01: Information Systems in Business POINTS: DIFFICULTY: REFERENCES:

1 Moderate Explain the importance and applications of information systems in functional areas of a business. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information systems Information technologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/19/2019 5:30 PM 13. The threat of new entrants into the marketplace is high when duplicating a company’s product or service is difficult. a. True b. False ANSWER: False RATIONALE: Correct The threat of new entrants into the marketplace is low when duplicating a company’s product or service is difficult. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Apply the Five Forces Model and strategies for gaining a competitive advantage. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.9 TOPICS: Five Forces Model KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 14. Rivalry among existing competitors is high when many competitors occupy the same marketplace position. a. True b. False ANSWER: True RATIONALE: Correct Rivalry among existing competitors is high when many competitors occupy the same marketplace position; it is low when there are few competitors. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Apply the Five Forces Model and strategies for gaining a competitive advantage. QUESTION TYPE: True / False HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 6


Module 01: Information Systems in Business LEARNING OBJECTIVES: MIS.10e.1.9 TOPICS: Five Forces Model KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 15. In the context of information systems jobs, a database administrator is responsible for developing an entire information system by writing computer programs. a. True b. False ANSWER: False RATIONALE: Correct A computer programmer writes computer programs or software segments that allow an information system to perform a specific task. A database administrator is responsible for database design and implementation. See 1-7: The IT Job Market POINTS: 1 DIFFICULTY: Easy REFERENCES: Review the IT job market. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.10 TOPICS: Information technology careers KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 16. Smartphones do not include Web-browsing features. a. True b. False ANSWER: False RATIONALE: Correct. Smartphones are mobile phones with advanced capabilities, much like a mini-PC. They include e-mail and Web-browsing features, and most have a built-in keyboard or an external USB key- board. See 1-1: Computers and Information Systems in Daily Life POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss common applications of computers and information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.1 KEYWORDS: Understand DATE CREATED: 11/20/2019 5:48 PM DATE MODIFIED: 11/20/2019 7:08 PM 17. Computers can be used to grade exam answers and generate detailed reports comparing performance. Copyright Cengage Learning. Powered by Cognero.

Page 7


Module 01: Information Systems in Business a. True b. False ANSWER: RATIONALE:

True Computers are often used to grade your exam answers and generate detailed reports comparing the performance of each student in your class. See 1-1: Computers and Information Systems in Daily Life POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss common applications of computers and information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.1 KEYWORDS: Understand DATE CREATED: 11/20/2019 5:55 PM DATE MODIFIED: 11/20/2019 5:55 PM 18. Information literacy involves understanding the role of information in generating and using business intelligence. a. True b. False ANSWER: True RATIONALE: Correct Information literacy, on the other hand, is understanding the role of information in generating and using business intelligence. See 1-2: Computer Literacy and Information Literacy POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the differences between computer literacy and information literacy QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.2 KEYWORDS: Understand DATE CREATED: 11/20/2019 6:41 PM DATE MODIFIED: 11/20/2019 7:10 PM 19. Knowledge workers need both computer literacy and information literacy to be competitive in the workplace. a. True b. False ANSWER: True RATIONALE: Correct. Knowledge workers need two types of knowledge to be competitive in the workplace: computer literacy and information literacy. See 1-2: Computer Literacy and Information Literacy POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the differences between computer literacy and information literacy Copyright Cengage Learning. Powered by Cognero.

Page 8


Module 01: Information Systems in Business QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.2 KEYWORDS: Understand DATE CREATED: 11/20/2019 6:47 PM DATE MODIFIED: 11/20/2019 7:09 PM 20. Computer literacy involves skill in using spreadsheets. a. True b. False ANSWER: RATIONALE:

True Correct. Computer literacy is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software, as well as having a basic knowledge of hardware and software, the Internet, and collaboration tools and technologies. See 1-2: Computer literacy and Information Literacy POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the differences between computer literacy and information literacy QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.2 KEYWORDS: Understand DATE CREATED: 11/20/2019 6:50 PM DATE MODIFIED: 11/20/2019 7:09 PM 21. The most common mobile device is a smartphone. a. True b. False ANSWER: True RATIONALE: Correct The most common mobile device is a smartphone (such as an iPhone, Galaxy, or Droid). See 1-1: Computers and Information Systems in Daily Life POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss common applications of computers and information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.1 TOPICS: Information systems Information systems importance KEYWORDS: Understand DATE CREATED: 11/20/2019 7:04 PM DATE MODIFIED: 11/20/2019 7:04 PM Copyright Cengage Learning. Powered by Cognero.

Page 9


Module 01: Information Systems in Business 22. In an automated payroll system, there is little need for managerial judgment in the task of printing and sending checks. a. True b. False ANSWER: True RATIONALE: Correct In an automated payroll system, there is little need for managerial judgment in the task of printing and sending checks, which reduces personnel costs. See 1-3:The Beginning: Transaction-Processing Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Define transaction-processing systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.3 TOPICS: Information systems Information systems importance KEYWORDS: Remember DATE CREATED: 11/20/2019 7:11 PM DATE MODIFIED: 11/20/2019 7:11 PM 23. Cardless ATMs are an example of a recent transaction-processing technology. a. True b. False ANSWER: True RATIONALE: Correct The cardless ATM is one of the recent technologies deployed by some banks in order to attract younger customers. An app provided by the bank is used to withdraw cash. See 13:The Beginning: Transaction-Processing Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Define transaction-processing systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.3 TOPICS: Information systems Information systems importance KEYWORDS: Remember DATE CREATED: 11/20/2019 7:14 PM DATE MODIFIED: 11/20/2019 7:14 PM 24. Networking technology is predicted to deteriorate in the future, making connecting computers more challenging. a. True b. False ANSWER: False RATIONALE: Correct. Networking technology will improve, so connecting computers will be easier and sending Copyright Cengage Learning. Powered by Cognero.

Page 10


Module 01: Information Systems in Business information from one location to another will be faster. See 1-8: Outlook for the Future POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize the future outlook of information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.11 KEYWORDS: Apply DATE CREATED: 11/20/2019 7:39 PM DATE MODIFIED: 11/20/2019 7:41 PM 25. Protecting personal information is predicated to become more difficult in the future, due to computer criminals becoming more sophisticated. a. True b. False ANSWER: True RATIONALE: Correct. Computer criminals will become more sophisticated and protecting personal information will become more difficult. See 1-8: Outlook for the Future POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize the future outlook of information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.11 KEYWORDS: Apply DATE CREATED: 11/20/2019 7:42 PM DATE MODIFIED: 11/20/2019 7:45 PM 26. A grocery retailer offering club cards that give customers big discounts is one example of an overall cost leadership strategy. a. True b. False ANSWER: True RATIONALE: Correct. Grocery stores, such as Sam’s Club, offer club cards that encourage customers to shop by giving them big discounts, an example of overall cost leadership strategies. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Apply the Five Forces Model and strategies for gaining a competitive advantage QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.9 Copyright Cengage Learning. Powered by Cognero.

Page 11


Module 01: Information Systems in Business KEYWORDS: DATE CREATED: DATE MODIFIED:

Apply 11/20/2019 7:46 PM 11/20/2019 8:01 PM

27. Information is the second most important resource in any organization. a. True b. False ANSWER: True RATIONALE: Correct. Information is the second most important resource (after the human element) in any organization. Timely, relevant, and accurate information is a critical tool for enhancing a company’s competitive position in the marketplace. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze how information technologies are used to gain a competitive advantage. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.9 KEYWORDS: Analyze DATE CREATED: 11/20/2019 8:05 PM DATE MODIFIED: 11/20/2019 8:12 PM 28. Some organizations add services, such as personalized recommendations, to reduce the threat of customers choosing substitute products or services. a. True b. False ANSWER: True RATIONALE: Correct. Some organizations add services, such as Amazon's personalized recommendations, to reduce the threat of customers choosing substitute products or services. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze how information technologies are used to gain a competitive advantage. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.9 KEYWORDS: Analyze DATE CREATED: 11/20/2019 8:13 PM DATE MODIFIED: 11/20/2019 8:16 PM 29. Business intelligence is a computer literacy skill. a. True b. False ANSWER: False Copyright Cengage Learning. Powered by Cognero.

Page 12


Module 01: Information Systems in Business RATIONALE:

Correct. Computer literacy is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software, as well as having a basic knowledge of hardware and software, the Internet, and collaboration tools and technologies. information literacy, on the other hand, is understanding the role of information in generating and using business intelligence. See 1-2: Computer Literacy and Information Literacy

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the differences between computer literacy and information literacy QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.2 KEYWORDS: Understand DATE CREATED: 11/20/2019 8:18 PM DATE MODIFIED: 11/20/2019 8:20 PM 30. Being able to use presentation software is a requirement of information literacy. a. True b. False ANSWER: False RATIONALE: Correct.

Computer literacy is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software, as well as having a basic knowledge of hardware and software, the Internet, and collaboration tools and technologies. information literacy, on the other hand, is understanding the role of information in generating and using business intelligence. See 1-2: Computer Literacy and Information Literacy POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the differences between computer literacy and information literacy. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.2 KEYWORDS: Understand DATE CREATED: 11/20/2019 8:22 PM DATE MODIFIED: 11/20/2019 8:23 PM Multiple Choice 31. _____ help a person connect with friends, family, and colleagues online and meet people with similar interests and hobbies. a. Tender portals b. Social networking sites c. Archives panels Copyright Cengage Learning. Powered by Cognero.

Page 13


Module 01: Information Systems in Business d. Classified advertisements ANSWER: b RATIONALE: Correct. With social networking sites-such as Facebook, Twitter, LinkedIn, and Foursquare-you can connect with friends, family, and colleagues online and meet people with similar interests and hobbies. See 1-1: Computers and Information Systems in Daily Life POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss common applications of computers and information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.1 TOPICS: Computer uses Information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/19/2019 5:56 PM 32. _____ is a social networking and short-messaging service. a. Twitter b. Yahoo c. Bing d. Baidu ANSWER: a RATIONALE: Correct. Twitter (www.twitter.com), for example, is a social networking and short-message service. Users can send and receive brief text updates, called Tweets. See 1-1: Computers and Information Systems in Daily Life POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss common applications of computers and information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.1 TOPICS: Computer uses Information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/19/2019 6:00 PM 33. Which is an example of a video-sharing site? a. Truecaller b. YouTube c. eBay d. PayPal ANSWER: b Copyright Cengage Learning. Powered by Cognero.

Page 14


Module 01: Information Systems in Business Correct. In addition, people use video-sharing sites to watch news, sporting events, and entertainment videos. One of the most popular sites is YouTube (www.youtube.com). See 1-1: Computers and Information Systems in Daily Life POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss common applications of computers and information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.1 TOPICS: Computer uses Information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/19/2019 6:05 PM RATIONALE:

34. Social networking sites can reduce organizations’ costs by _____. a. giving customers more access to all sorts of organizational information b. limiting buyers’ choices by offering services that make it difficult for customers to switch c. providing an inexpensive medium for targeting a large customer base d. customizing the organization’s Web site and offering many options to customers ANSWER: c RATIONALE: Correct. Social networking sites can reduce organizations’ costs by providing an inexpensive medium for targeting a large customer base. Information systems and information technologies are used to help organizations be more competitive and to improve their overall efficiency and effectiveness. See 1-1: Computers and Information Systems in Daily Life POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss common applications of computers and information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.1 TOPICS: Information systems importance Information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 35. _____ is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software. a. Network literacy b. Business literacy c. Information literacy d. Computer literacy ANSWER: d Copyright Cengage Learning. Powered by Cognero.

Page 15


Module 01: Information Systems in Business RATIONALE:

Correct. Computer literacy is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software, as well as having a basic knowledge of hardware and software, the Internet, and collaboration tools and technologies. See 1-2: Computer Literacy and Information Literacy POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the differences between computer literacy and information literacy. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.2 TOPICS: Computer literacy Information literacy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 36. Jack knows how to use word processors, spreadsheets, and presentation software. He also has a basic knowledge of hardware, software, and the Internet. Given this information, it can be concluded that Jack has _____ literacy. a. network b. computer c. information d. business ANSWER: b RATIONALE: Correct. Given this information, it can be concluded that Jack has computer literacy. Computer literacy is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software, as well as having a basic knowledge of hardware and software, the Internet, and collaboration tools and technologies. See 1-2: Computer Literacy and Information Literacy POINTS: 1 DIFFICULTY: Challenging REFERENCES: Explain the differences between computer literacy and information literacy. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.2 TOPICS: Computer literacy Information literacy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 37. _____ is understanding the role of information in generating and using business intelligence. a. Information literacy b. Business ability c. Business mastery d. Information retrieval ANSWER: a Copyright Cengage Learning. Powered by Cognero.

Page 16


Module 01: Information Systems in Business RATIONALE:

Correct. Information literacy is understanding the role of information in generating and using business intelligence. See 1-2: Computer Literacy and Information Literacy POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the differences between computer literacy and information literacy. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.2 TOPICS: Business intelligence Information literacy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 38. Business _____ provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace. a. intelligence b. differentiation c. indexing d. exploration ANSWER: a RATIONALE: Correct. Business intelligence provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace. See 1-2: Computer Literacy and Information Literacy POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the differences between computer literacy and information literacy. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.2 TOPICS: Business intelligence Computer literacy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 39. In the context of computer literacy and information literacy, which statement is true of knowledge workers? a. They should know how to increase strategic dissonance. b. They should know how data should be indexed and updated. c. They should restrict themselves to the use of informal information. d. They should avoid collecting data from external sources. ANSWER: b RATIONALE: Correct. Knowledge workers should know how data should be indexed and updated. In the 21st century, knowledge workers need two types of knowledge to be competitive in the workplace: computer literacy and information literacy. See 1-2: Computer Literacy and Copyright Cengage Learning. Powered by Cognero.

Page 17


Module 01: Information Systems in Business Information Literacy POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the differences between computer literacy and information literacy. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.2 TOPICS: Computer literacy Information literacy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 40. Which statement is true of transaction-processing systems? a. They focus on data collection and processing. b. They focus on integrating hardware and software technologies. c. They focus on integrating data, processes, and human elements. d. They focus on maximizing human involvement. ANSWER: a RATIONALE: Correct. Transaction-processing systems focus on data collection and processing, and they have provided enormous reductions in costs. Transaction-processing operations are repetitive, such as printing numerous checks, or involve enormous volumes of data, such as inventory control in a multinational textile company. See 1-3: The Beginning: TransactionProcessing Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define transaction-processing systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.3 TOPICS: Transaction processing systems KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/19/2019 6:16 PM 41. Transaction-processing systems _____. a. involve low volumes of data b. require extensive managerial judgment c. involve operations that are repetitive d. require maximum human involvement ANSWER: c RATIONALE: Correct. Transaction-processing operations are repetitive, such as printing numerous checks, or involve enormous volumes of data, such as inventory control in a multinational textile company. When these systems are automated, human involvement is minimal. See 1-3: The Beginning: Transaction-Processing Systems Copyright Cengage Learning. Powered by Cognero.

Page 18


Module 01: Information Systems in Business POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define transaction-processing systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.3 TOPICS: Transaction processing systems KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 42. Which is a software component of a management information system (MIS)? a. Commercial programs b. Barcode readers c. Memory devices d. Application servers ANSWER: a RATIONALE: Correct. The hardware components of an MIS include input, output, and memory devices and vary depending on the application and the organization. MIS software can include commercial programs, software developed in-house, or both. See 1-4: Management Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Define management information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.4 TOPICS: Management information systems KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 43. In designing a management information system (MIS), the first task is to _____. a. clearly define the system’s objectives b. collect data c. analyze data d. provided information in a useful format ANSWER: a RATIONALE: Correct. In designing an MIS, the first task is to clearly define the system’s objectives. Second, data must be collected and analyzed. Finally, information must be provided in a useful format for decision-making purposes. See 1-4: Management Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Define management information systems. QUESTION TYPE: Multiple Choice Copyright Cengage Learning. Powered by Cognero.

Page 19


Module 01: Information Systems in Business HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.4 TOPICS: Management information systems KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 44. In designing a management information system (MIS), after defining the system’s objectives, the next step is to _____. a. provide information in a useful format b. collect and analyze data c. use information for decision making d. integrate the hardware and software components ANSWER: b RATIONALE: Correct. In designing an MIS, the first task is to clearly define the system’s objectives. Second, data must be collected and analyzed. Finally, information must be provided in a useful format for decision-making purposes. See 1-4: Management Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Define management information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.4 TOPICS: Management information systems KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 45. The final task in designing a management information system (MIS) is _____. a. collecting and analyzing internal and external data for accuracy and relevancy b. providing information in a useful format for decision-making purposes c. clearly defining the system’s objectives d. integrating hardware and software components ANSWER: b RATIONALE: Correct. In designing an MIS, the first task is to clearly define the system’s objectives. Second, data must be collected and analyzed. Finally, information must be provided in a useful format for decision-making purposes. See 1-4: Management Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Define management information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.4 TOPICS: Management information systems KEYWORDS: Remember Copyright Cengage Learning. Powered by Cognero.

Page 20


Module 01: Information Systems in Business DATE CREATED: DATE MODIFIED:

10/22/2019 1:26 PM 10/22/2019 1:26 PM

46. The data component of an information system is: a. the input to the information system. b. a series of integrated files containing relevant facts. c. a set of facts that have been analyzed by the process component. d. the output of the information system. ANSWER: a RATIONALE: Correct. The data component of an information system is considered the input to the system. See 1-5: Major Components of an Information System POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the four major components of an information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.5 TOPICS: Information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 47. In the context of the data component of an information system, internal data sources include _____. a. personnel records b. population statistics c. economic conditions d. government agencies ANSWER: a RATIONALE: Correct. Internal data sources include sales records, personnel records, and so forth. The data component of an information system is considered the input to the system. See 1-5: Major Components of an Information SystemMajor Components of an Information System POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the four major components of an information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.5 TOPICS: Information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 48. In the context of the data component of an information system, external data sources include _____. a. transaction data b. personnel records Copyright Cengage Learning. Powered by Cognero.

Page 21


Module 01: Information Systems in Business c. labor statistics d. sales records ANSWER: RATIONALE:

c Correct. Labor statistics is an external data source of an information system. The data component of an information system is considered the input to the system. See 1-5: Major Components of an Information SystemMajor Components of an Information System POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the four major components of an information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.5 TOPICS: Information system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 49. Which of the following statements is true of the data component of an information system? a. Current data is collected for performance reports. b. Disaggregated data reports overall performance during a particular sales quarter. c. Aggregated data enables decision makers to focus on specific factors. d. Future data is predicted for budgets or cash flow reports. ANSWER: d RATIONALE: Correct. Past data is collected for performance reports, and current data is collected for operational reports. In addition, future data is predicted for budgets or cash flow reports. See 1-5: Major Components of an Information System POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the four major components of an information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.5 TOPICS: Information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 50. In a management information system, structuring the data component to define what type of data is collected and in what form is usually easy if an organization has _____. a. defined its strategic goals, objectives, and critical factors b. laid out the cause of any past failure due to conflicting objectives and indefinite targets c. focused on its competitors in the market rather than on the critical success factors d. employees who are aware of the current marketing strategies ANSWER: a RATIONALE: Correct. If an organization has defined its strategic goals, objectives, and critical success Copyright Cengage Learning. Powered by Cognero.

Page 22


Module 01: Information Systems in Business factors, then structuring the data component to define what type of data is collected and in what form is usually easy. On the other hand, if there are conflicting goals and objectives or the company is not aware of critical success factors, many problems in data collection can occur, which affects an information system’s reliability and effectiveness. See 1-5: Major Components of an Information System POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the four major components of an information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.5 TOPICS: Information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 51. Database management systems _____. a. are used to create, organize, and manage databases b. improve routing and delivery schedules of databases c. are written for specific database applications d. include transaction-processing reports for database analysis ANSWER: a RATIONALE: Correct. To create, organize, and manage databases, a database management system (DBMS) is used, such as Microsoft Access or FileMaker Pro for home or small-office use. See 1-5: Major Components of an Information System POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the four major components of an information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.5 TOPICS: Computer literacy Information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 52. Microsoft Access is an example of a(n) _____. a. operational resource toolkit system b. enterprise resource planning system c. database management system d. knowledge management system ANSWER: c RATIONALE: Correct. To create, organize, and manage databases, a database management system is used, such as Microsoft Access or FileMaker Pro for home or small-office use. A database, Copyright Cengage Learning. Powered by Cognero.

Page 23


Module 01: Information Systems in Business the heart of an information system, is a collection of all relevant data organized in a series of integrated files. See 1-5: Major Components of an Information System POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the four major components of an information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.5 TOPICS: Information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 53. _____ is a database management system (DBMS) that is suitable for a large organization. a. Microsoft Access b. FileMaker Pro c. Oracle d. Java ANSWER: c RATIONALE: Correct. Microsoft Access and FileMaker Pro are examples of DBMSs that are suitable for home or small-office use. In a large organization, a DBMS such as Oracle or IBM DB2 might be used. See 1-5: Major Components of an Information System POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the four major components of an information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.5 TOPICS: Information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 54. The purpose of an information system’s _____ component is generating the most useful type of information for making decisions. a. process b. internal data c. external data d. database ANSWER: a RATIONALE: Correct. The purpose of an information system’s process component is generating the most useful type of information for making decisions. See 1-5: Major Components of an Information System POINTS: 1 DIFFICULTY: Easy Copyright Cengage Learning. Powered by Cognero.

Page 24


Module 01: Information Systems in Business REFERENCES: Describe the four major components of an information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.5 TOPICS: Information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 55. The _____ component of an information system consists of raw facts and by itself is difficult to use for making decisions. a. cache b. kernel c. data d. process ANSWER: c RATIONALE: Correct. Data consists of raw facts and by itself is difficult to use for making decisions. Information-the output of an information system-consists of facts that have been analyzed by the process component and are therefore more useful to the management information system user. See 1-5: Major Components of an Information System POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the differences between data and information. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.6 TOPICS: Information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 56. In the context of the major components of an information system, which is a difference between information and data? a. Unlike data, information is considered the input to an information system. b. Unlike data, information can be collected in aggregated and disaggregated forms. c. Unlike data, information by itself is difficult to use for making decisions. d. Unlike data, information consists of facts that have been analyzed by the process component. ANSWER: d RATIONALE: Correct. Information-the output of an information system-consists of facts that have been analyzed by the process component and are therefore more useful to the MIS user. See 1-5: Major Components of an Information System POINTS: 1 DIFFICULTY: Challenging REFERENCES: Discuss the differences between data and information. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 25


Module 01: Information Systems in Business LEARNING OBJECTIVES: MIS.10e.1.6 TOPICS: Information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 1:55 PM 57. Which is essential for information to be useful? a. Relevance b. Summarization c. Language independence d. Data variability ANSWER: a RATIONALE: Correct. To be useful, information must have the following qualities: timeliness, integration with other data and information, consistency and accuracy, and relevance. If information lacks any of these qualities, the results are incorrect decisions, misallocation of resources, and overlooked windows of opportunity. See 1-5: Major Components of an Information System POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the differences between data and information. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.6 TOPICS: Information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 58. To be useful, information systems should _____. a. use command line user interfaces b. generate raw data, which can be used for decision making c. produce information in different formats d. not use rumors, unconfirmed reports, and stories ANSWER: c RATIONALE: Correct. To be useful, information systems should also produce information in different formats, including graphics (e.g., pie charts and bar graphs), tables, and exception reports, which highlight information that is outside a specified range. Supplying information in a variety of formats increases the likelihood of users understanding and being able to use the information. See 1-5: Major Components of an Information System POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the four major components of an information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.5 Copyright Cengage Learning. Powered by Cognero.

Page 26


Module 01: Information Systems in Business TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Information system components Understand 10/22/2019 1:26 PM 11/20/2019 1:58 PM

59. Teletech, an international textile company, uses a database to store data on the number of products, suppliers, and sales personnel. The process component of the information system conducts analysis on the data to provide information about sales. Which can be used by Teletech to generate predictions for its next sales period? a. Forecasting models b. Estimation graphs c. Modeling charts d. Theoretical hypotheses ANSWER: a RATIONALE: Correct. Teletech, an international textile company, uses a database to store data on the number of products, suppliers, and sales personnel. The process component of the information system conducts analysis on the data to provide information about sales. Again, forecasting models can be used to generate predictions for the next sales period. See 1-5: Major Components of an Information System POINTS: 1 DIFFICULTY: Challenging REFERENCES: Describe the four major components of an information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.5 TOPICS: Information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 5:32 PM 60. The four Ms of resources in information systems are _____. a. management, motivation, manpower, and monitoring b. materials, money, modeling, and monitoring c. manpower, machinery, materials, and money d. manpower, monitoring, movement, and modeling ANSWER: c RATIONALE: Correct. Timely, relevant, and accurate information is a critical tool for enhancing a company’s competitive position in the marketplace and managing the four Ms of resources: manpower, machinery, materials, and money. To manage these resources, different types of information systems have been developed. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the importance and applications of information systems in functional areas of a business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 27


Module 01: Information Systems in Business LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information systems Information technologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 61. Which statement is true of an intranet? a. It is a network within an organization that uses Internet protocols and technologies. b. It is a network that covers a wide area with the help of rented telecommunication lines. c. It is a network where a computer is connected to the Internet and acts as a gateway for other devices. d. It is a widely available public network of interconnected computer networks. ANSWER: a RATIONALE: Correct. An intranet is a network within an organization that uses Internet protocols and technologies for collecting, storing, and disseminating useful information that supports business activities such as sales, customer service, human resources, and marketing. See 16: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the importance and applications of information systems in functional areas of a business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information systems Information technologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 62. A personnel information system (PIS) helps in _____. a. choosing the best job candidate b. improving transportation budgeting c. calculating product costs d. determining portfolio structures ANSWER: a RATIONALE: Correct. A PIS helps in choosing the best job candidate. Web technologies have played a major role in improving the efficiency and effectiveness of human resource departments. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the importance and applications of information systems in functional areas of a business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 28


Module 01: Information Systems in Business LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information systems Information technologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 63. Decisions related to scheduling and assigning employees can be supported by a _____. a. manufacturing information system b. personnel information system c. financial information system d. logistics information system ANSWER: b RATIONALE: Correct. Decisions related to scheduling and assigning employees can be supported by a personnel information system (PIS). A PIS is designed to provide information that helps decision makers in personnel carry out their tasks more effectively. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the importance and applications of information systems in functional areas of a business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information systems Information technologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 64. A _____ provides reports and statistics on employee demographics. a. manufacturing information system b. marketing information system c. logistics information system d. personnel information system ANSWER: d RATIONALE: Correct. A PIS is designed to provide information that helps decision makers in personnel carry out their tasks more effectively. A PIS/HRIS supports the following decisions, among others: choosing the best job candidate, scheduling and assigning employees, predicting the organization’s future personnel needs, providing reports and statistics on employee demographics. See 1-6: Using Information Systems and Information Technologies

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Explain the importance and applications of information systems in functional areas of a business. Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 29


Module 01: Information Systems in Business HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information systems Information technologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 2:07 PM 65. Which statement is true of a personnel information system (PIS) in an organization? a. It helps make decisions related to allocating human and financial resources. b. It helps make decisions related to reducing the cost of transporting materials. c. It helps make decisions related to increasing product quality. d. It helps make decisions related to minimizing capital investment risks. ANSWER: a RATIONALE: Correct.A PIS/HRIS supports the following decisions, among others: allocating human and financial resources. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the importance and applications of information systems in functional areas of a business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information systems Information technologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 2:09 PM 66. Which decision is supported by a logistics information system (LIS)? a. Predicting an organization’s future personnel needs b. Minimizing capital investment risks c. Determining portfolio structures d. Selecting the best modes of transportation ANSWER: d RATIONALE: Correct. The following are a few examples of decisions supported by an LIS: improving routing and delivery schedules, selecting the best modes of transportation, Improving transportation budgeting, and improving shipment planning. See 1-6: Using Information Systems and

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

Information Technologies 1 Moderate Explain the importance and applications of information systems in functional areas of a business. Multiple Choice False

Copyright Cengage Learning. Powered by Cognero.

Page 30


Module 01: Information Systems in Business LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information systems Information technologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 2:17 PM 67. Which information system is used to manage manufacturing resources? a. An LIS. b. An FIS. c. An MFIS. d. An HRIS. ANSWER: c RATIONALE: Correct. A manufacturing information system (MFIS) is used to manage manufacturing resources so companies can reduce manufacturing costs, increase product quality, and make better inventory decisions. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the importance and applications of information systems in functional areas of a business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information systems Information technologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 2:37 PM 68. Which decision is supported by a manufacturing information system (MFIS)? a. Determination of portfolio structures b. Analysis of price changes and discounts c. Improvement of routing and delivery schedules d. Monitoring of cost trends ANSWER: b RATIONALE: Correct. Analysis of price changes and discounts is carried out by an MFIS. MFISs can perform many types of analysis with a high degree of timeliness and accuracy. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the importance and applications of information systems in functional areas of a business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 31


Module 01: Information Systems in Business LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information systems Information technologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 69. Which decision is supported by a financial information system (FIS)? a. Determining portfolio structures b. Choosing the best job candidate c. Improving routing and delivery schedules d. Analyzing sales personnel ANSWER: a RATIONALE: Correct. Some decisions an FIS is used to support include determining portfolio structures. Other decisions supported by an FIS are improving budget allocation, minimizing capital investment risks, monitoring cost trends, and managing cash flows. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the importance and applications of information systems in functional areas of a business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information systems Information technologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 2:41 PM 70. Which system supports sales forecasting? a. Logistics information systems b. Personnel information systems c. Marketing information systems d. Financial information systems ANSWER: c RATIONALE: Correct. A marketing information system (MKIS) supports sales forecasting. MKISs are used to improve marketing decisions. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the importance and applications of information systems in functional areas of a business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 32


Module 01: Information Systems in Business LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information systems Information technologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 71. According to Michael Porter, which strategy can be followed by an organization to successfully compete in the marketplace? a. Groupthink b. Brainstorming c. Simulation d. Focus ANSWER: d RATIONALE: Correct. Michael Porter, a professor at Harvard Business School, identified three strategies for successfully competing in the marketplace: overall cost leadership, differentiation, and focus. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze how information technologies are used to gain a competitive advantage. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.8 TOPICS: Information systems and competitive advantage KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 72. _____ strategy was identified by Michael Porter, a professor at Harvard Business School, for successfully competing in the marketplace. a. Transformational leadership b. Differentiation c. Groupthink collaboration d. Simulation ANSWER: b RATIONALE: Correct. Michael Porter, a professor at Harvard Business School, identified three strategies for successfully competing in the marketplace: overall cost leadership, differentiation, and focus. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze how information technologies are used to gain a competitive advantage. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.8 TOPICS: Information systems and competitive advantage Copyright Cengage Learning. Powered by Cognero.

Page 33


Module 01: Information Systems in Business KEYWORDS: DATE CREATED: DATE MODIFIED:

Analyze 10/22/2019 1:26 PM 10/22/2019 1:26 PM

73. In the context of using information technologies for a competitive advantage, which statement is true of a bottom-line strategy? a. It focuses on improving efficiency by reducing overall costs. b. It focuses on generating new revenue by offering new products and services. c. It focuses on enhancing rivalry among existing competitors. d. It focuses on helping different market segments achieve a cost advantage. ANSWER: a RATIONALE: Correct. Information technologies can help bottom-line and top-line strategies. The focus of a bottom-line strategy is to improve efficiency by reducing overall costs. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Analyze how information technologies are used to gain a competitive advantage. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.8 TOPICS: Information systems and competitive advantage KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 74. In the context of using information technologies for a competitive advantage, which statement is true of a top-line strategy? a. It focuses on generating new revenue by offering new products and services. b. It focuses on improving efficiency by reducing overall costs. c. It focuses on refining operations by using latest technologies. d. It focuses on helping different market segments achieve technological advancement. ANSWER: a RATIONALE: Correct. A top-line strategy focuses on generating new revenue by offering new products and services to customers or increasing revenue by selling existing products and services to new customers. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Analyze how information technologies are used to gain a competitive advantage. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.8 TOPICS: Information systems and competitive advantage KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM Copyright Cengage Learning. Powered by Cognero.

Page 34


Module 01: Information Systems in Business 75. In the context of using information technologies for a competitive advantage, a top-line strategy focuses on: a. helping different market segments achieve technological advancement. b. improving efficiency by reducing overall costs. c. refining operations by using latest technologies. d. increasing revenue by selling existing products to new customers. ANSWER: d RATIONALE: Correct. A top-line strategy focuses on generating new revenue by offering new products and services to customers or increasing revenue by selling existing products and services to new customers. For example, e-commerce businesses are adapting business models to reduce distribution costs dramatically. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Analyze how information technologies are used to gain a competitive advantage. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.8 TOPICS: Information systems and competitive advantage KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 76. A _____, identified by Michael Porter, helps organizations make their products and services distinct from their competitors. a. simulation strategy b. leadership strategy c. focus strategy d. differentiation strategy ANSWER: d RATIONALE: Correct. For differentiation strategies, organizations try to make their products and services different from their competitors. Apple has been successful with this strategy by designing its computers to look very different than PCs and focusing on its computers’ ease of use. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze how information technologies are used to gain a competitive advantage. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.8 TOPICS: Information systems and competitive advantage KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 77. _____ is high when customers have many choices and low when they have few choices. Copyright Cengage Learning. Powered by Cognero.

Page 35


Module 01: Information Systems in Business a. Buyer power b. Threat of new services c. Rivalry among existing customers d. Risk of substitute products ANSWER: a RATIONALE: Correct. Buyer power is high when customers have many choices and low when they have few choices. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Apply the Five Forces Model and strategies for gaining a competitive advantage. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.9 TOPICS: Five Forces Model KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 78. In the context of Porter’s Five Forces Model, an organization limits buyers’ choices by: a. encouraging the use of the Internet to gather information about products. b. launching duplicate products or services in the marketplace. c. offering services that make it difficult for customers to switch. d. charging market competitive rates for its products or services. ANSWER: c RATIONALE: Correct. Typically, organizations try to limit buyers’ choices by offering services that make it difficult for customers to switch, which is essentially using a differentiation strategy. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Apply the Five Forces Model and strategies for gaining a competitive advantage. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.9 TOPICS: Five Forces Model KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 79. In the context of Porter’s Five Forces Model, which is a difference between buyer power and supplier power? a. Buyer power is low when customers have many choices, whereas supplier power is low when customers have fewer options. b. Buyer power is high when customers have few choices, whereas supplier power is high when customers have more options. c. Buyer power is low when customers have many options, whereas supplier power is low when customers have more choices. Copyright Cengage Learning. Powered by Cognero.

Page 36


Module 01: Information Systems in Business d. Buyer power is high when customers have many choices, whereas supplier power is high when customers have fewer options. ANSWER: d RATIONALE: Correct. Buyer power is high when customers have many choices and low when they have few choices. Supplier power is high when customers have fewer options and low when customers have more options. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Challenging REFERENCES: Apply the Five Forces Model and strategies for gaining a competitive advantage. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.9 TOPICS: Five Forces Model KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 80. In the context of IT jobs, a _____ must have knowledge and understanding of data warehouse and data-mining tools. a. systems mining analyst b. data design officer c. web strategist d. database administrator ANSWER: d RATIONALE: Correct. A database administrator (DBA) is responsible for database design and implementation. Additionally, a DBA should have knowledge and understanding of data warehouses and data-mining tools. See 1-7: The IT Job Market POINTS: 1 DIFFICULTY: Easy REFERENCES: Review the IT job market. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.10 TOPICS: Information technology careers KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 81. _____ refers to computing devices everywhere with different sizes and power and accessed through multiple formats such as voice, touch, and gesture. a. Ubiquitous computing b. Cloud computing c. Context aware computing d. Pervasive computing ANSWER: a Copyright Cengage Learning. Powered by Cognero.

Page 37


Module 01: Information Systems in Business RATIONALE:

Correct. Ubiquitous computing refers to computing devices everywhere with different sizes and power and accessed through multiple formats such as voice, touch, and gesture. See 18: Outlook for the FutureOutlook for the Future POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the future outlook of information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.11 TOPICS: Computing trends Information technology industry KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 82. _____ refers to building and integrating analytics capabilities into all everyday business activities. a. Pervasive analytics b. Artificial intelligence c. Business analytics d. Business intelligence ANSWER: a RATIONALE: Correct. Pervasive analytics is building and integrating analytics capabilities into all everyday business activities. See 1-8: Outlook for the Future POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the future outlook of information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.11 TOPICS: Computing trends Information technology industry KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 83. _____ computing refers to widespread applications and deployment of devices that know users, their devices, and their locations and serve as intelligent assistants to businesses and individuals. a. Context aware b. Cloud c. Ubiquitous d. Pervasive ANSWER: a RATIONALE: Correct. Context aware computing refers to widespread applications and deployment of devices that know users, their devices, and their locations and serve as intelligent assistants to businesses and individuals. See 1-8: Outlook for the Future Copyright Cengage Learning. Powered by Cognero.

Page 38


Module 01: Information Systems in Business POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the future outlook of information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.11 TOPICS: Computing trends Information technology industry KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 84. _______ systems traditionally have been applied to structured tasks such as inventory control. a. networking b. CRM c. transaction-processing d. business intelligence ANSWER: c RATIONALE: For the past 60 years, transaction-processing systems have been applied to structured tasks such as record keeping, simple clerical operations, and inventory control. See 1-3: The Beginning: Transaction-Processing Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Define transaction-processing systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.3 TOPICS: Transaction processing systems KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 7:03 PM 85. A _____ is an organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision-making purposes. a. management information system b. transaction-processing system c. sequential processing system d. data warehousing system ANSWER: a RATIONALE: A management information system (MIS) is an organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision-making purposes. Many MIS applications are used in both the private and public sectors. See 1-4: Management Information Systems POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 39


Module 01: Information Systems in Business DIFFICULTY: Easy REFERENCES: Define management information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.4 TOPICS: Management information systems KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 86. An information system collects past data for performance reports and current data for operational reports. This shows that the data component of the information system has a(n) _____. a. time orientation b. phase orientation c. log orientation d. active orientation ANSWER: a RATIONALE: Typically, data base a time orientation, too. For example, past data is collected for performance reports, and current data is collected for operational reports. In addition, future data is predicted for budgets or cash flow reports. See 1-5: Major Components of an Information System POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the four major components of an information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.5 TOPICS: Information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 3:13 PM 87. A(n) _____, the heart of an information system, is a collection of all relevant facts organized in a series of integrated files. a. procedure b. database c. process d. object ANSWER: b RATIONALE: A database, the heart of an information system, is a collection of all relevant data organized in a series of integrated files. A comprehensive database is essential for the success of any information system. See 1-5: Major Components of an Information System POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the four major components of an information system. Copyright Cengage Learning. Powered by Cognero.

Page 40


Module 01: Information Systems in Business QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.5 TOPICS: Information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 88. Users need to be able to make use of _____, such as rumors, unconfirmed reports, and stories, when solving problems. a. informal information b. interfacing data c. prescribed information d. formal data ANSWER: a RATIONALE: In addition to the formal information that an information system generates, users need to be able to make use of informal information-such as rumors, unconfirmed reports, and storieswhen solving problems. Supplying information in a variety of formats increases the likelihood of users understanding and being able to use the information. See 1-5: Major Components of an Information System POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the differences between data and information. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.6 TOPICS: Business intelligence Information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 89. Computer networks, database systems, POS systems, RFID tags, etc., are examples of information technologies that support information systems in ____. a. orientation focusing b. strategic planning c. decision making d. consumer building ANSWER: c RATIONALE: Computer networks, database systems, POS systems, and radio-frequency identification (RFID) tags are few examples of information technologies that support information systems in decision making. Information systems are designed to collect data, process the collected data, and deliver timely, relevant, and useful information that can be used for making decisions. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the importance and applications of information systems in functional areas Copyright Cengage Learning. Powered by Cognero.

Page 41


Module 01: Information Systems in Business of a business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information systems Information technologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 3:36 PM 90. A ____ is designed to reduce the cost of transporting materials while maintaining safe and reliable delivery. a. logistics information system b. personnel information system c. manufacturing information system d. marketing information system ANSWER: a RATIONALE: A logistics information system (LIS) is designed to reduce the cost of transporting materials while maintaining safe and reliable delivery. An LIS supports decisions related to improvement of routing and delivery schedules, selection of the best modes of transportation, improvement in transportation budgeting, and improvement of shipment planning. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the importance and applications of information systems in functional areas of a business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information systems Information technologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 91. A ____ is typically used to support decisions related to managing an organization’s cash flows. a. marketing information system b. logistics information system c. manufacturing information system d. financial information system ANSWER: d RATIONALE: A financial information system (FIS) is typically used to support decisions related to managing an organization’s cash flows. The goal of an FIS is to provide information to financial executives in a timely manner. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Easy Copyright Cengage Learning. Powered by Cognero.

Page 42


Module 01: Information Systems in Business REFERENCES:

Explain the importance and applications of information systems in functional areas of a business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information systems Information technologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 92. A comprehensive framework called the ____ was created by Harvard Business School’s Michael Porter for analyzing an organization, its position in the marketplace, and how information systems could be used to make the organization more competitive. a. Five Forces Model b. Six Sigma Model c. Three Pyramid Model d. Four Resources Model ANSWER: a RATIONALE: Harvard Business School’s Michael Porter created a comprehensive framework called the Five Forces Model for analyzing an organization, its position in the marketplace, and how information systems could be used to make the organization more competitive. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Apply the Five Forces Model and strategies for gaining a competitive advantage. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.9 TOPICS: Five Forces Model KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 93. ____ is one of the forces of the Five Forces Model created by Michael Porter. a. Rivalry among customers b. Government regulations c. Threat of new entrants d. Taxable services ANSWER: c RATIONALE: The five forces in the Five Forces Model created by Michael Porter are buyer power, supplier power, threat of substitute products or services, threat of new entrants, and rivalry among existing competitors. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Easy Copyright Cengage Learning. Powered by Cognero.

Page 43


Module 01: Information Systems in Business REFERENCES: Apply the Five Forces Model and strategies for gaining a competitive advantage. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.9 TOPICS: Five Forces Model KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 94. According to Porter’s Five Forces Model, ____ is low when customers have more options. a. supplier power b. buyer power c. new entrant power d. competitor power ANSWER: a RATIONALE: According to Porter’s Five Forces Model, supplier power is high when customers have fewer options and low when customers have more options. Organizations might use information systems to make their products and services cheaper or to offer more services in order to distinguish themselves from competitors. See 1-6: Using Information Systems and Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Apply the Five Forces Model and strategies for gaining a competitive advantage. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.9 TOPICS: Five Forces Model KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 95. In the context of the IT job market, the top information systems job belongs to the ____. a. computer programmer b. systems analyst c. webmaster d. chief technology officer ANSWER: d RATIONALE: The top information systems job belongs to either the chief technology officer or the chief information officer. This person oversees long-range planning and keeps an eye on new developments in the field that can affect a company’s success. See 1-7: The IT Job Market POINTS: 1 DIFFICULTY: Easy REFERENCES: Review the IT job market. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 44


Module 01: Information Systems in Business LEARNING OBJECTIVES: MIS.10e.1.10 TOPICS: Information technology careers KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 96. In the context of IT jobs in the information systems field, a ____ is typically responsible for providing network and cybersecurity. a. network administrator b. cyber police c. network programmer d. cyber activist ANSWER: a RATIONALE: In the context of IT jobs in the information systems field, a network administrator is typically responsible for providing network and cybersecurity. This person oversees a company’s internal and external network systems, designing and implementing network systems that deliver correct information to the right decision maker in a timely manner. See 1-7: The IT Job Market POINTS: 1 DIFFICULTY: Easy REFERENCES: Review the IT job market. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.10 TOPICS: Information technology careers KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 97. In the context of IT jobs in the information systems field, a ____ is responsible for database design and implementation. a. database administrator b. database programmer c. database strategist d. database developer ANSWER: a RATIONALE: In the context of IT jobs in the information systems field, a database administrator (DBA) is responsible for database design and implementation. Additionally, a DBA should have knowledge and understanding of data warehouses and data-mining tools. See 1-7: The IT Job Market POINTS: 1 DIFFICULTY: Easy REFERENCES: Review the IT job market. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 45


Module 01: Information Systems in Business LEARNING OBJECTIVES: MIS.10e.1.10 TOPICS: Information technology careers KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 98. In the context of IT jobs in the information systems field, a ____ designs and maintains an organization’s Web site. a. web designer b. webmaster c. web developer d. web host provider ANSWER: b RATIONALE: In the context of IT jobs in the information systems field, a webmaster designs and maintains an organization’s Web site. Because of the popularity of e-commerce applications, webmasters have been in high demand. See 1-7: The IT Job Market POINTS: 1 DIFFICULTY: Easy REFERENCES: Review the IT job market. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.10 TOPICS: Information technology careers KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 99. For the past 60 years, _____ have been applied to structured tasks such as record keeping, simple clerical operations, and inventory control. a. object-oriented-modelling systems b. procedural-programming systems c. business-analysis systems d. transaction-processing systems ANSWER: d RATIONALE: For the past 60 years, transaction-processing systems have been applied to structured tasks such as record keeping, simple clerical operations, and inventory control. Payroll, for example, was one of the first applications to be automated. See 1-3: The Beginning: Transaction-Processing Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Define transaction-processing systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.3 TOPICS: Transaction processing systems KEYWORDS: Remember Copyright Cengage Learning. Powered by Cognero.

Page 46


Module 01: Information Systems in Business DATE CREATED: DATE MODIFIED:

11/20/2019 6:58 PM 11/20/2019 6:58 PM

100. Knowledge workers should know which of the following: a. How data is converted to information and eventually to business intelligence b. How networks are designed c. How to create a transaction-processing system d. How social networking has changed in the past five years ANSWER: b RATIONALE: Correct. Knowledge workers should know how data is converted to information and eventually to business intelligence. See 1-2: Computer Literacy and Information Literacy. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the differences between computer literacy and information literacy. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.2 KEYWORDS: Understand DATE CREATED: 11/20/2019 8:26 PM DATE MODIFIED: 11/20/2019 8:31 PM 101. Knowledge workers are not required to know: a. How data is converted to information and eventually to business intelligence b. How data is collected c. How to design transactional-processing systems d. How data and information should be used to gain a competitive advantage ANSWER: c RATIONALE: Correct. Knowledge workers should know the following:Internal and external sources of data, How data is collected, why data is collected, what type of data should be collected, how data is converted to information and eventually to business intelligence, how data should be indexed and updated, and how data and information should be used to gain a competitive advantage. See 1-2: Computer Literacy and Information Literacy. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the differences between computer literacy and information literacy. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.2 KEYWORDS: Understand DATE CREATED: 11/20/2019 8:31 PM DATE MODIFIED: 11/20/2019 8:38 PM 102. Knowing how data should be indexed and updated is essential to what type of professional: Copyright Cengage Learning. Powered by Cognero.

Page 47


Module 01: Information Systems in Business a. Knowledge worker b. Programmer c. Word processing professional d. Internet user ANSWER: a RATIONALE: Correct. Knowledge workers should know the following: internal and external sources of data, how data is collected, why data is collected, what type of data should be collected, how data is converted to information and eventually to business intelligence, how data should be indexed and updated, and how data and information should be used to gain a competitive advantage. See 1-2: Computer Literacy and Information Literacy. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the differences between computer literacy and information literacy. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.2 KEYWORDS: Understand DATE CREATED: 11/20/2019 8:39 PM DATE MODIFIED: 11/20/2019 8:45 PM 103. Information literacy involves understanding the role of information in generating ____. a. Competitiveness b. Business Intelligence c. Ideas d. Data ANSWER: b RATIONALE: Correct. Knowledge workers should know the following: internal and external sources of data, how data is collected, why data is collected, what type of data should be collected, how data is converted to information and eventually to business intelligence, how data should be indexed and updated, and how data and information should be used to gain a competitive advantage. See 1-2: Computer Literacy and Information Literacy. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the differences between computer literacy and information literacy. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.1.2 KEYWORDS: Understand DATE CREATED: 11/20/2019 8:45 PM DATE MODIFIED: 11/20/2019 8:48 PM Essay 104. Discuss how information systems are useful for students. Copyright Cengage Learning. Powered by Cognero.

Page 48


Module 01: Information Systems in Business ANSWER:

Answers will vary. Students use computers and office suite software and might take online classes. Computers are often used to grade exam answers and generate detailed reports comparing the performance of each student in a class. Computers and information systems also calculate grades and GPAs and can deliver this information to the students. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss common applications of computers and information systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.1.1 TOPICS: Computer uses Information systems importance KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 105. Explain how banks use computers and information systems. ANSWER: Answers will vary. Banks use computers and information systems for generating customers’ monthly statements, running ATM machines, and for many other banking activities. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss common applications of computers and information systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.1.1 TOPICS: Computer uses Information systems importance KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 106. Explain how organizations use social networking sites. ANSWER: Answers will vary. Organizations use social networking sites to give customers up-to-date information and how-to support via videos. These sites can reduce organizations’ costs by providing an inexpensive medium for targeting a large customer base. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss common applications of computers and information systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.1.1 Copyright Cengage Learning. Powered by Cognero.

Page 49


Module 01: Information Systems in Business TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Computer uses Information systems importance Understand 10/22/2019 1:26 PM 10/22/2019 1:26 PM

107. Describe how information systems differ from information technologies. ANSWER: Answers will vary. Information systems are broader in scope than information technologies, but the two overlap in many areas. Both are used to help organizations be more competitive and to improve their overall efficiency and effectiveness. Information technologies offer many advantages for improving decision making but involve some challenges, too, such as security and privacy issues. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss common applications of computers and information systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.1.1 TOPICS: Information systems Information systems importance KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 108. Explain what a knowledge worker should know to understand the role of information in generating and using business intelligence. ANSWER: Answers will vary. Knowledge workers need two types of knowledge to be competitive in the workplace: computer literacy and information literacy. Knowledge workers should know the following: a. Internal and external sources of data b. How data is collected c. Why data is collected d. What type of data should be collected e. How data is converted to information and eventually to business intelligence f. How data should be indexed and updated g. How data and information should be used to gain a competitive advantage POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the differences between computer literacy and information literacy. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.1.2 TOPICS: Information literacy Business intelligence KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 50


Module 01: Information Systems in Business DATE CREATED: DATE MODIFIED:

10/22/2019 1:26 PM 10/22/2019 1:26 PM

109. Give an example of how a management information system (MIS) can be used in the public sector. ANSWER: Answers will vary. In the public sector, an MIS for a police department, for example, could provide information such as crime statistics, crime forecasts, and allocation of police units. Management can examine these statistics to spot increases and decreases in crime rates or types of crimes and analyze this data to determine future deployment of law enforcement personnel. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define management information systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.1.4 TOPICS: Management information systems KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 110. Describe a database, and explain its role in an information system. ANSWER: Answers will vary. A database, the heart of an information system, is a collection of all relevant data organized in a series of integrated files. A comprehensive database is essential for the success of any information system. To create, organize, and manage databases, a database management system (DBMS) is used, such as Microsoft Access or FileMaker Pro for home or small-office use. In a large organization, a DBMS such as Oracle or IBM DB2 might be used. Databases are also important for reducing personnel time needed to gather, process, and interpret data manually. With a computerized database and a DBMS, data can be treated as a common resource that is easy to access and use. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the four major components of an information system. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.1.5 TOPICS: Information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 111. Briefly explain the purpose of an information system’s process component. ANSWER: Answers will vary. The purpose of an information system’s process component is generating the most useful type of information for making decisions. This component generally includes transaction-processing reports and models for decision analysis that can Copyright Cengage Learning. Powered by Cognero.

Page 51


Module 01: Information Systems in Business be built into the system or accessed from external sources. An information system can include a wide range of models to support all levels of decision making. Users should be able to query an information system and generate a variety of reports. In addition, an information system should be able to grow with the organization so users can redefine and restructure models and incorporate new information into their analyses. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the four major components of an information system. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.1.5 TOPICS: Information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 112. In the context of the major components of an information system, describe the factors affecting the usefulness of information. ANSWER: Answers will vary. The quality of information is determined by its usefulness to users, and its usefulness determines the success of an information system. To be useful, information must have the following qualities: a. Timeliness b. Integration with other data and information c. Consistency and accuracy d. Relevance If information lacks any of these qualities, the results are incorrect decisions, misallocation of resources, and overlooked windows of opportunity. If the system cannot give users a minimum level of confidence in its reliability, it will not be used or users might dismiss the reports it generates. Information must provide either a base for users to explore different options or insight into tasks. Another factor affecting the usefulness of information is the information system’s user interface. Because this interface must be flexible and easy to use, most information systems make use of graphical user interfaces, with features such as menus and buttons. To be useful, information systems should also produce information in different formats, including graphics (e.g., pie charts and bar graphs), tables, and exception reports, which highlight information that is outside a specified range. Supplying information in a variety of formats increases the likelihood of users understanding and being able to use the information. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the differences between data and information. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.1.6 TOPICS: Information system components Copyright Cengage Learning. Powered by Cognero.

Page 52


Module 01: Information Systems in Business KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 10/22/2019 1:26 PM 10/22/2019 1:26 PM

113. Describe how a personnel information system (PIS) helps decision makers. ANSWER: Answers will vary. A personnel information system (PIS) or human resource information system (HRIS) is designed to provide information that helps decision makers in personnel carry out their tasks more effectively. A PIS/HRIS supports the following decisions, among others: a. Choosing the best job candidate b. Scheduling and assigning employees c. Predicting the organization’s future personnel needs d. Providing reports and statistics on employee demographics e. Allocating human and financial resources POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the importance and applications of information systems in functional areas of a business. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information systems Information technologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 114. Explain the main difference between an intranet and the Internet. ANSWER: Answers will vary. The main difference between an intranet and the Internet is that an intranet is private and the Internet is public. An intranet is a network within an organization that uses Internet protocols and technologies for collecting, storing, and disseminating useful information that supports business activities such as sales, customer service, human resources, and marketing. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the importance and applications of information systems in functional areas of a business. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information systems Information technologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM Copyright Cengage Learning. Powered by Cognero.

Page 53


Module 01: Information Systems in Business 115. Describe a manufacturing information system (MFIS). ANSWER: Answers will vary. An MFIS is used to manage manufacturing resources so that companies can reduce manufacturing costs, increase product quality, and make better inventory decisions. MFISs can perform many types of analysis with a high degree of timeliness and accuracy. An MFIS supports the following decisions, among others: a. Ordering decisions b. Product cost calculations c. Space utilization d. The bid evaluation process used with vendors and suppliers e. Analysis of price changes and discounts POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the importance and applications of information systems in functional areas of a business. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information systems Information technologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 116. In the context of using information technologies for a competitive advantage, explain the difference in focus for a bottom-line strategy and a top-line strategy. ANSWER: Answers will vary. The focus of a bottom-line strategy is improving efficiency by reducing overall costs. A top-line strategy focuses on generating new revenue by offering new products and services to customers or increasing revenue by selling existing products and services to new customers. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Analyze how information technologies are used to gain a competitive advantage. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.1.8 TOPICS: Information systems and competitive advantage KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 117. Describe the threat of substitute products or services. Explain how organizations fight this threat. ANSWER: Answers will vary. The threat of customers choosing substitute products or services is high when many alternatives to an organization’s products or services are available. Some organizations add services-such as Amazon’s personalized recommendations-to make their Copyright Cengage Learning. Powered by Cognero.

Page 54


Module 01: Information Systems in Business positions in the marketplace more distinctive. Other organizations use fees to discourage customers from switching to a competitor, such as cell phone companies adding charges for switching to another provider before the customer contract is up. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the Five Forces Model and strategies for gaining a competitive advantage. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.1.9 TOPICS: Five Forces Model KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 118. Explain how an organization can combat the threat of new entrants. ANSWER: Answers will vary. The threat of new entrants into the marketplace is low when duplicating a company’s product or service is difficult. Organizations often use focus strategies to ensure that the threat of new entrants remains low. In addition, organizations use information technologies to increase customer loyalty, which reduces the threat of new entrants. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the Five Forces Model and strategies for gaining a competitive advantage. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.1.9 TOPICS: Five Forces Model KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 119. In the context of the top information systems job, describe the roles of a chief technology officer (CTO) or a chief information officer (CIO) and a chief privacy officer (CPO). ANSWER: Answers will vary. The top information systems job belongs to either the CTO or the CIO. This person oversees long-range planning and keeps an eye on new developments in the field that can affect a company’s success. Some organizations also have a CPO. This executive position includes responsibility for managing the risks and business impacts of privacy laws and policies. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Review the IT job market. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic Copyright Cengage Learning. Powered by Cognero.

Page 55


Module 01: Information Systems in Business LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information technology careers KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 120. Describe the role of a systems analyst and the qualifications required for the position. ANSWER: Answers will vary. Systems analysts are responsible for the design and implementation of information systems. In addition to computer knowledge and an information systems background, this position requires a thorough understanding of business systems and functional areas within a business organization. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Review the IT job market. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.1.7 TOPICS: Information technology careers KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 4:28 PM 121. Describe how networking technology will improve in the future. ANSWER: Answers will vary. Networking technology will improve, so connecting computers will be easier, and sending information from one location to another will be faster. Compatibility issues between networks will become more manageable, and integrating voice, data, and images on the same transmission medium will improve communication quality and information delivery. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize the future outlook of information systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.1.11 TOPICS: Computing trends Information technology industry KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 122. Discuss the impact of Internet growth in the future. ANSWER: Answers will vary. By examining various factors related to designing, implementing, and using information systems, it can be predicted that Internet growth will continue, which will put small and large organizations on the same footing, regardless of their financial Copyright Cengage Learning. Powered by Cognero.

Page 56


Module 01: Information Systems in Business status. Internet growth will also make e-collaboration easier, despite geographical distances. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize the future outlook of information systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.1.11 TOPICS: Computing trends Information technology industry KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM

Copyright Cengage Learning. Powered by Cognero.

Page 57


Module 02: Computers and Their Business Applications True / False 1. An object code must be translated into source code for a computer to read and execute it. a. True b. False ANSWER: False RATIONALE: Correct A source code must be translated into object code, consisting of binary 0s and 1s, which can be understood by a computer. Binary code-a set of instructions used to control the computer-uses 0s and 1s, which the computer understands as on or off signals. See 2-1: Defining a Computer. POINTS: 1 DIFFICULTY: Easy REFERENCES: Define a computer system, and describe its components. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.1 TOPICS: Computer defined KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 2. The arithmetic logic unit and the control unit are part of the Basic Input/Output System. a. True b. False ANSWER: False RATIONALE: Correct The arithmetic logic unit and the control unit are part of the central processing unit. A Basic Input/Output System is located on the motherboard. See 2-1: Defining a Computer POINTS: 1 DIFFICULTY: Easy REFERENCES: Define a computer system, and describe its components. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.1 TOPICS: Computer system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 3. ENIAC is an example of a first-generation computer. a. True b. False ANSWER: True RATIONALE: Correct ENIAC is an example of a first-generation computer. First-generation computers were Copyright Cengage Learning. Powered by Cognero.

Page 1


Module 02: Computers and Their Business Applications bulky and unreliable, generated excessive heat, and were difficult to program. See 2-2: The History of Computer Hardware and Software POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the history of computer hardware and software. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.2 TOPICS: Computer history KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 4. Very-large-scale integration (VLSI) circuits were introduced in fifth-generation computers. a. True b. False ANSWER: False RATIONALE: Correct Very-large-scale integration circuits were introduced in fourth-generation computers. Fourth-generation computers continued several trends that further improved speed and ease of use: miniaturization, very-large-scale integration circuits, widespread use of personal computers, and optical discs. See 2-2: The History of Computer Hardware and Software POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the history of computer hardware and software. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.2 TOPICS: Computer history Hardware KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 5. A byte is a single value of 0 or 1. a. True b. False ANSWER: False RATIONALE: Correct A bit is a single value of 0 or 1, and 8 bits equal 1 byte. A byte is the size of a character. See 2-3: The Power of Computers POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze the impact of the three factors of computing power on a business setting. QUESTION TYPE: True / False Copyright Cengage Learning. Powered by Cognero.

Page 2


Module 02: Computers and Their Business Applications HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.3 TOPICS: Computing power KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 6. Extended ASCII is a data code that allows the representation of 1024 characters. a. True b. False ANSWER: False RATIONALE: Correct Extended ASCII code is an 8-bit code that allows representation of 256 characters. Computers and communication systems use data codes to represent and transfer data between computers and network systems. See 2-3: The Power of Computers POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze the impact of the three factors of computing power on a business setting. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.3 TOPICS: Computing power KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 7. Computers perform all tasks using a combination of arithmetic and logical operations. a. True b. False ANSWER: False RATIONALE: Correct Computers can perform three basic tasks: arithmetic operations, logical operations, and storage and retrieval operations. All other tasks are performed using one or a combination of these operations. See 2-4: Computer Operations POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the three basic computer operations. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.4 TOPICS: Computer functions KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM Copyright Cengage Learning. Powered by Cognero.

Page 3


Module 02: Computers and Their Business Applications 8. Computers cannot store massive amounts of data in small spaces. a. True b. False ANSWER: False RATIONALE: Correct Computers can store massive amounts of data in small spaces and locate a particular item quickly. For example, you can store the text of more than one million books in a memory device about the size of your fist. See 2-4: Computer Operations POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the three basic computer operations. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.4 TOPICS: Computer functions KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 9. Inkjet printers produce characters by projecting onto paper electrically charged droplets of ink that create an image. a. True b. False ANSWER: True RATIONALE: Correct Inkjet printers produce characters by projecting onto paper electrically charged droplets of ink that create an image. Inkjet printers are suitable for home users who have limited text and photo printing needs. See 2-5: Input, Output, and Memory Devices POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Output devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 10. In network-attached storage (NAS), as the number of users increases, its performance increases. a. True b. False ANSWER: False RATIONALE: Correct The biggest issue with NAS is that, as the number of users increases, its performance deteriorates. However, it can be expanded easily by adding more servers or upgrading the CPU. See 2-5: Input, Output, and Memory Devices Copyright Cengage Learning. Powered by Cognero.

Page 4


Module 02: Computers and Their Business Applications POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Storage devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 11. A server is a set of programs for controlling and managing computer hardware and software. a. True b. False ANSWER: False RATIONALE: Correct A server is a computer and all the software for managing network resources and offering services to a network. For example, remote access servers (RAS), application servers, and database servers. See 2-6: Classes of Computers POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how computers are classified and their business applications. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.6 TOPICS: Servers KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 12. Spreadsheet software is more powerful than financial planning software. a. True b. False ANSWER: False RATIONALE: Correct Financial planning software, which is more powerful than spreadsheet software, is capable of performing many types of analysis on large amounts of data. These analyses include present value, future value, rate of return, cash flow, depreciation, retirement planning, and budgeting. See 2-7: What Is Software? POINTS: 1 DIFFICULTY: Easy REFERENCES: Apply knowledged of two major types of software and their use in a business setting. QUESTION TYPE: True / False HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 5


Module 02: Computers and Their Business Applications LEARNING OBJECTIVES: MIS.10e.2.7 TOPICS: Applications software Software KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 13. Fourth-generation languages (4GLs) are also called procedural languages. a. True b. False ANSWER: False RATIONALE: Correct Sometimes, 4GLs are called nonprocedural languages, which means you do not need to follow a rigorous command syntax to use them. They are also the easiest computer languages to use. See 2-8: Computer Languages POINTS: 1 DIFFICULTY: Easy REFERENCES: List the five generations of computer languages. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.8 TOPICS: Programming languages Software KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 14. Modularity, reuse of codes for other purposes, and effective problem solving are major advantages of object-oriented programming. a. True b. False ANSWER: True RATIONALE: Correct. Major advantages of OOP are the following: Modularity—Codes are written for specific and self-contained modules. This makes it easier to write codes, modify them, and troubleshoot them easier than traditional codes. New features can easily be added as new modules without any impact on existing modules. Reuse of codes for other purposes— Codes written for one object can be simply modified by maintaining its major parts and applying it to another object. Effective problem solving—OOP languages allow the programmer to break down a program into small-sized problems that a programmer can solve one module or one object at a time. See 2-9: Object-Oriented Programming: A Quick Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Define object-oriented programming. QUESTION TYPE: True / False HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 6


Module 02: Computers and Their Business Applications LEARNING OBJECTIVES: MIS.10e.2.9 KEYWORDS: Remember DATE CREATED: 11/23/2019 5:57 PM DATE MODIFIED: 11/23/2019 6:01 PM 15. Two main parts of an object-oriented programming language include objects and models. a. True b. False ANSWER: False RATIONALE: Correct. Two main parts of an OOP include objects and classes. An object is an item that contains both data and the procedures that read and manipulate it. A class defines the format of the object and the action that it performs. See 2-9: Object-Oriented Programming: A Quick Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Define object-oriented programming. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.9 KEYWORDS: Remember DATE CREATED: 11/23/2019 6:03 PM DATE MODIFIED: 11/23/2019 6:05 PM 16. The object-oriented programming language principle of inheritance is a feature that reduces application development time by using existing codes. a. True b. False ANSWER: True RATIONALE: Correct. Abstraction, inheritance, polymorphism, and encapsulation are four key principles of OOP. Inheritance enables new objects to take on the properties of existing objects. This feature reduces application development time by using existing codes. See 2-9: ObjectOriented Programming: A Quick Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Define object-oriented programming. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.9 KEYWORDS: Remember DATE CREATED: 11/23/2019 6:10 PM DATE MODIFIED: 11/23/2019 6:17 PM 17. The object-oriented programming language principle of encapsulation is the ability to process objects differently depending on their data type or class. a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 7


Module 02: Computers and Their Business Applications ANSWER: RATIONALE:

False Correct. Abstraction, inheritance, polymorphism, and encapsulation are four key principles of OOP. Polymorphism is the ability to process objects differently depending on their data type or class. Encapsulation means grouping related items into a single unit. See 2-9: Object-Oriented Programming: A Quick Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Define object-oriented programming. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.9 KEYWORDS: Remember DATE CREATED: 11/23/2019 6:14 PM DATE MODIFIED: 11/23/2019 6:16 PM 18. Object-oriented programming languages are not tailored to any specific OS or programming environment. a. True b. False ANSWER: False RATIONALE: Correct. Each OOP is tailored to a specific OS and programming environment. For example, Swift is mostly used for programming environment and apps development for MacOS and iOS; C#, developed by Microsoft, is mostly used for Windows apps and Windows programming environment; and Java is used for cross- platform development. See 2-9: Object-Oriented Programming: A Quick Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Define object-oriented programming. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.9 KEYWORDS: Remember DATE CREATED: 11/23/2019 6:26 PM DATE MODIFIED: 11/23/2019 6:28 PM Multiple Choice 19. A(n) _____ is a step-by-step direction for performing a specific task, which is written in a language the computer can understand. a. array b. server c. cache d. program ANSWER: d RATIONALE: Correct. A program is a step-by-step direction for performing a specific task, written in a language the computer can understand. To write a computer program, first you must know what needs to be done, and then you must plan a method to achieve this goal, including Copyright Cengage Learning. Powered by Cognero.

Page 8


Module 02: Computers and Their Business Applications selecting the right language for the task. See 2-1: Defining a Computer POINTS: 1 DIFFICULTY: Easy REFERENCES: Define a computer system, and describe its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.1 TOPICS: Computer defined KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 20. A _____ is a link between devices connected to a computer. a. motherboard b. control unit c. disk drive d. bus ANSWER: d RATIONALE: Correct. A bus is a link between devices connected to a computer. An internal bus enables communication between internal components, such as a video card and memory; an external bus is capable of communicating with external components, such as a USB device. See 2-1: Defining a Computer POINTS: 1 DIFFICULTY: Easy REFERENCES: Define a computer system, and describe its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.1 TOPICS: Computer system components Computer defined KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 21. A(n) _____ enables communication between a video card and memory. a. internal bus b. keyboard c. floppy drive d. optical disc ANSWER: a RATIONALE: Correct. A bus is a link between devices connected to a computer. An internal bus enables communication between internal components, such as a video card and memory. See 2-1: Defining a Computer POINTS: 1 DIFFICULTY: Easy Copyright Cengage Learning. Powered by Cognero.

Page 9


Module 02: Computers and Their Business Applications REFERENCES: Define a computer system, and describe its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.1 TOPICS: Computer system components Computer defined KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 22. A _____ is a peripheral device for recording, storing, and retrieving information. a. disk drive b. motherboard c. control unit d. processor ANSWER: a RATIONALE: Correct. A disk drive is a peripheral device for recording, storing, and retrieving information. A computer system consists of hardware and software. Hardware components are physical devices, such as keyboards, monitors, and processing units. The software component consists of programs written in computer languages. See 2-1: Defining a Computer POINTS: 1 DIFFICULTY: Easy REFERENCES: Define a computer system, and describe its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.1 TOPICS: Computer system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 23. A(n) _____ is a communication interface through which information is transferred one bit at a time. a. extended capability port b. parallel port c. serial port d. enhanced parallel port ANSWER: c RATIONALE: Correct. A serial port is a communication interface through which information is transferred one bit at a time. It is located on the motherboard of a computer. A parallel port is an interface between a computer and a printer that enables the computer to transfer multiple bits of information to the printer simultaneously. See 2-1: Defining a Computer POINTS: 1 DIFFICULTY: Easy REFERENCES: Define a computer system, and describe its components. Copyright Cengage Learning. Powered by Cognero.

Page 10


Module 02: Computers and Their Business Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.1 TOPICS: Computer system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 24. A(n) _____ is an interface between a computer and a printer that enables the computer to transfer multiple bits of information to the printer simultaneously. a. parallel port b. serial port c. arithmetic logic unit d. control unit ANSWER: a RATIONALE: Correct. A parallel port is an interface between a computer and a printer that enables the computer to transfer multiple bits of information to the printer simultaneously. A serial port is a communication interface through which information is transferred one bit at a time. See 2-1: Defining a Computer POINTS: 1 DIFFICULTY: Easy REFERENCES: Define a computer system, and describe its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.1 TOPICS: Computer system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 25. Beginning in the 1940s, first-generation computers used _____. a. transistors b. vacuum tube technology c. integrated circuits d. laser technology ANSWER: b RATIONALE: Correct. Beginning in the 1940s, first-generation computers used vacuum tube technology. They were bulky and unreliable, generated excessive heat, and were difficult to program. See 2-2: The History of Computer Hardware and Software POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the history of computer hardware and software. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.2 Copyright Cengage Learning. Powered by Cognero.

Page 11


Module 02: Computers and Their Business Applications TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Computer history Hardware Understand 10/22/2019 1:26 PM 10/22/2019 1:26 PM

26. Second-generation computers used _____. a. vacuum tube technology b. transistors c. integrated circuits d. laser technology ANSWER: b RATIONALE: Correct. Major developments in hardware have taken place over the past 60 years. To make these developments more clear, computers are often categorized into “generations” that mark technological breakthroughs. Second-generation computers used transistors and were faster, more reliable, and easier to program and maintain than the first-generation computers. See 2-2: The History of Computer Hardware and Software POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the history of computer hardware and software. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.2 TOPICS: Computer history Hardware KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 27. Third-generation computers operated on _____. a. integrated circuits b. vacuum tube technology c. parallel processing d. optical discs ANSWER: a RATIONALE: Correct. Third-generation computers operated on integrated circuits, which enabled computers to be even smaller, faster, more reliable, and more sophisticated than secondgeneration computers. Remote data entry and telecommunications were introduced during this generation. See 2-2: The History of Computer Hardware and Software POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the history of computer hardware and software. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.2 Copyright Cengage Learning. Powered by Cognero.

Page 12


Module 02: Computers and Their Business Applications TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Computer history Hardware Understand 10/22/2019 1:26 PM 11/19/2019 6:19 PM

28. Which statement is true of gallium arsenide chips? a. They run at higher speeds than silicon chips. b. They were used in third-generation computers. c. They are ideal for mass production. d. They have low production costs. ANSWER: a RATIONALE: Correct. The current fifth-generation computers include parallel processing (computers containing hundreds or thousands of CPUs for rapid data processing), gallium arsenide chips that run at higher speeds and consume less power than silicon chips, and optical technologies. Because silicon cannot emit light and has speed limitations, computer designers have concentrated on technology using gallium arsenide, in which electrons move almost five times faster than silicon. See 2-2: The History of Computer Hardware and Software POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the history of computer hardware and software. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.2 TOPICS: Hardware KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 29. Computer designers have concentrated on technology using gallium arsenide instead of silicon because silicon: a. cannot be used for the mass production of electronic devices. b. cannot emit light and has speed limitations. c. is soft and fragile. d. is expensive. ANSWER: b RATIONALE: Correct. Since silicon cannot emit light and has speed limitations, computer designers have concentrated on technology using gallium arsenide, in which electrons move almost five times faster than in silicon. See 2-2: The History of Computer Hardware and Software POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the history of computer hardware and software. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.2 Copyright Cengage Learning. Powered by Cognero.

Page 13


Module 02: Computers and Their Business Applications TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Computer history Hardware Understand 10/22/2019 1:26 PM 10/22/2019 1:26 PM

30. Gallium arsenide _____ than silicon. a. is more fragile b. is more suitable for mass production c. emits less light d. operates at lower temperatures ANSWER: a RATIONALE: Correct. The major problems with gallium arsenide are difficulties in mass production. This material is softer and more fragile than silicon, so it breaks more easily during slicing and polishing. See 2-2: The History of Computer Hardware and Software POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the history of computer hardware and software. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.2 TOPICS: Computer history Hardware KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 31. _____ means saving data in computer memory. a. Stream b. Retrieval c. Syndication d. Storage ANSWER: d RATIONALE: Correct. Computers draw their power from three factors that far exceed human capacities: speed, accuracy, and storage and retrieval capabilities. Storage means saving data in computer memory, and retrieval means accessing data from memory. See 2-3: The Power of Computers POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the factors distinguishing the computing power of computers. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.3 TOPICS: Computing power KEYWORDS: Analyze Copyright Cengage Learning. Powered by Cognero.

Page 14


Module 02: Computers and Their Business Applications DATE CREATED: DATE MODIFIED:

10/22/2019 1:26 PM 10/22/2019 1:26 PM

32. In the context of storage measurements, a _____ is the size of a character. a. nibble b. decibel c. byte d. node ANSWER: c RATIONALE: Correct. A byte is the size of a character. For example, the word computer consists of 8 characters or 8 bytes (64 bits). See 2-3: The Power of Computers POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the factors distinguishing the computing power of computers. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.3 TOPICS: Computing power KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 33. The word computer consists of 64 bits, which is equivalent to _____ bytes. a. 6 b. 8 c. 16 d. 32 ANSWER: b RATIONALE: Correct. The word computer has 64 bits. Eight bits constitute 1 byte, so 64 bits are the same as 8 bytes. See 2-3: The Power of Computers POINTS: 1 DIFFICULTY: Challenging REFERENCES: Explain the factors distinguishing the computing power of computers. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.3 TOPICS: Computing power KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 34. Every character, number, or symbol on the keyboard is represented as a(n) _____ in computer memory. a. decimal number b. hexadecimal number Copyright Cengage Learning. Powered by Cognero.

Page 15


Module 02: Computers and Their Business Applications c. octal number d. binary number ANSWER: RATIONALE:

d Correct. Every character, number, or symbol on the keyboard is represented as a binary number in computer memory. A binary system consists of 0s and 1s, with a 1 representing “on” and a 0 representing “off,” similar to a light switch. See 2-3: The Power of Computers POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the factors distinguishing the computing power of computers. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.3 TOPICS: Computing power KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 35. Computers and communication systems use _____ to represent information between computers and network systems. a. source codes b. nanotubes c. data codes d. servers ANSWER: c RATIONALE: Correct. Computers and communication systems use data codes to represent and transfer data between computers and network systems. The most common data code for text files, PC applications, and the Internet is American Standard Code for Information Interchange. See 2-3: The Power of Computers POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the factors distinguishing the computing power of computers. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.3 TOPICS: Computing power KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 36. In a(n) _____ file, each alphabetic, numeric, or special character is represented with a 7-bit binary number. a. Extended Binary Code Decimal Interchange Code (EBCDIC) b. Unicode c. American Standard Code for Information Interchange (ASCII) d. Extended ASCII ANSWER: c RATIONALE: Correct. In an ASCII file, each alphabetic, numeric, or special character is represented with Copyright Cengage Learning. Powered by Cognero.

Page 16


Module 02: Computers and Their Business Applications a 7-bit binary number (a string of 0s or 1s). Up to 128 (27) characters can be defined. See 2-3: The Power of Computers POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the factors distinguishing the computing power of computers. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.3 TOPICS: Computing power KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 5:50 PM 37. An American Standard Code for Information Interchange (ASCII) file defines up to _____ characters. a. 64 b. 128 c. 256 d. 1024 ANSWER: b RATIONALE: Correct. In an ASCII file, each alphabetic, numeric, or special character is represented with a 7-bit binary number (a string of 0s or 1s). Up to 128 (27) characters can be defined. See 2-3: The Power of Computers POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the factors distinguishing the computing power of computers. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.3 TOPICS: Computing power KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 5:51 PM 38. An Extended ASCII data code allows representation of maximum _____ characters. a. 128 b. 256 c. 512 d. 1024 ANSWER: b RATIONALE: Correct. Apart from American Standard Code for Information Interchange (ASCII), there are two additional data codes used by many operating systems: Unicode and Extended ASCII. Extended ASCII is an 8-bit code that also allows representation of 256 characters. See 2-3: The Power of Computers POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 17


Module 02: Computers and Their Business Applications DIFFICULTY: Easy REFERENCES: Explain the factors distinguishing the computing power of computers. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.3 TOPICS: Computing power KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 39. A petabyte is equal to _____ bytes. a. 230 b. 240 c. 250 d. 260 ANSWER: RATIONALE:

c

Correct. A byte is the size of a character. A petabyte is 250 bytes, 1 gigabyte is 230 bytes, 1 terabyte is 240 bytes, and 1 exabyte is 260 bytes. See 2-3: The Power of Computers POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the factors distinguishing the computing power of computers. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.3 TOPICS: Computing power KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 40. In the context of computer operations, division is a(n) _____. a. arithmetic operation b. storage operation c. logical operation d. retrieval operation ANSWER: a RATIONALE: Correct. Division is an arithmetic operation. Computers can add, subtract, multiply, divide, and raise numbers to a power (exponentiation). See 2-4: Computer Operations POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize computer operations. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.4 Copyright Cengage Learning. Powered by Cognero.

Page 18


Module 02: Computers and Their Business Applications TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Computer functions Apply 10/22/2019 1:26 PM 10/22/2019 1:26 PM

41. Trackballs are ideal for notebook computers because they _____. a. occupy less space than a mouse b. rely on optical scanning of the data on a notebook c. allow faster and more precise cursor positioning than a mouse d. rely on light detection to determine which menu item has been selected ANSWER: a RATIONALE: Correct. Trackballs occupy less space than a mouse, so they are ideal for notebook computers. However, positioning with a trackball is sometimes less precise than with a mouse. See 2-5: Input, Output, and Memory Devices POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Input devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 42. Identify an advantage of a mouse over a trackball. a. A mouse processes more information than a trackball. b. A mouse is more precise in positioning the pointer than a trackball. c. A mouse occupies less space than a trackball. d. A mouse is stationary, whereas a trackball has to be moved around. ANSWER: b RATIONALE: Correct. The mouse is a pointing device that moves the cursor on the screen, allowing fast, precise cursor positioning. Trackballs occupy less space than a mouse, so they are ideal for notebook computers. However, positioning with a trackball is sometimes less precise than with a mouse. See 2-5: Input, Output, and Memory Devices POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Input devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM Copyright Cengage Learning. Powered by Cognero.

Page 19


Module 02: Computers and Their Business Applications 43. Which is an example of an input device? a. A barcode reader b. A cathode ray tube c. An inkjet printer d. An organic light-emitting diode ANSWER: a RATIONALE: Correct. A barcode reader is an example of an input device. This is an optical scanner that uses lasers to read codes in bar form. These devices are fast and accurate and have many applications in inventory, data entry, and tracking systems. See 2-5: Input, Output, and Memory Devices POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Input devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 44. A(n) _____ is an input device. a. plasma display b. laser printer c. data tablet d. inkjet printer ANSWER: c RATIONALE: Correct. A data tablet is an input device. Data tablets are used most widely in computeraided design and manufacturing applications. See 2-5: Input, Output, and Memory Devices POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Input devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 45. A(n) _____ is an input device used to grade multiple-choice and true/false tests. a. optical character reader b. magnetic character sensor c. magnetic ink character recognition system Copyright Cengage Learning. Powered by Cognero.

Page 20


Module 02: Computers and Their Business Applications d. optical mark recognition system ANSWER: d RATIONALE: Correct. An optical mark recognition (OMR) system is sometimes called a mark sensing system because it reads marks on paper. OMRs are often used to grade multiple-choice and true/false tests. See 2-5: Input, Output, and Memory Devices POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Input devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 46. A(n) _____ is a common output device for soft copy. a. liquid crystal display b. floppy disk c. laser printer d. electrostatic plotter ANSWER: a RATIONALE: Correct. The most common output devices for soft copy are cathode ray tube (CRT), plasma display, and liquid crystal display (LCD). Soon, OLED (organic light-emitting diode) displays will replace LCDs. OLED screens are brighter, thinner and consume less power than LCD technology. See 2-5: Input, Output, and Memory Devices POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Output devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 47. A(n) _____ is a common output device for hard copy. a. optical character reader b. compact disc c. laser printer d. plasma display ANSWER: c RATIONALE: Correct. The most common output device for hard copy is a printer. Inkjet and laser printers are standard printers used today. See 2-5: Input, Output, and Memory Devices Copyright Cengage Learning. Powered by Cognero.

Page 21


Module 02: Computers and Their Business Applications POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Output devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 48. Which statement is true of a high-quality inkjet printer? a. It uses multicolor ink cartridges to print digital photographs. b. Its output for a mainframe computer is called soft copy. c. It uses laser-based technology that creates electrical charges on a rotating drum to attract toner. d. It is suitable for office environments that have high-volume and high-quality printing requirements. ANSWER: a RATIONALE: Correct. High-quality inkjet printers use multicolor ink cartridges for near-photo quality output and are often used to print digital photographs. See 2-5: Input, Output, and Memory Devices POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Output devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 6:08 PM 49. Which statement is true of laser printers? a. They are most suitable for home users. b. They use toner to create high-quality outputs. c. They are used to generate three-dimensional outputs. d. They use solid ink to generate two-dimensional outputs. ANSWER: b RATIONALE: Correct. Laser printers use laser-based technology that creates electrical charges on a rotating drum to attract toner. The toner is fused to paper using a heat process that creates high-quality output. See 2-5: Input, Output, and Memory Devices POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Multiple Choice Copyright Cengage Learning. Powered by Cognero.

Page 22


Module 02: Computers and Their Business Applications HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Output devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 6:09 PM 50. The Clipboard’s contents are typically stored in _____. a. read-only memory b. random access memory c. magnetic disks d. magnetic tape ANSWER: b RATIONALE: Correct. The Clipboard’s contents are typically stored in random access memory (RAM). Some other examples of the type of information stored in RAM include open files, running programs, and so forth. Data can be read from and written to RAM. See 2-5: Input, Output, and Memory Devices POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Storage devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 51. Which states a difference between read-only memory (ROM) and random access memory (RAM)? a. ROM is volatile memory, whereas RAM is nonvolatile memory. b. ROM is secondary memory, whereas RAM is main memory. c. ROM is nonvolatile memory, whereas RAM is volatile memory. d. ROM is main memory, whereas RAM is secondary memory. ANSWER: c RATIONALE: Correct. ROM is nonvolatile memory, whereas RAM is volatile memory. Volatile memory loses its contents when electrical power is turned off. Nonvolatile memory holds data when the computer is off or during the course of a program’s operation. See 2-5: Input, Output, and Memory Devices POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Storage devices Copyright Cengage Learning. Powered by Cognero.

Page 23


Module 02: Computers and Their Business Applications KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 10/22/2019 1:26 PM 10/22/2019 1:26 PM

52. Which is true of memory devices? a. The contents of flash memory cannot be reprogrammed. b. The contents of random access memory cannot be reprogrammed. c. The contents of programmable read-only memory cannot be reprogrammed. d. The contents of cache random access memory cannot be reprogrammed. ANSWER: c RATIONALE: Correct. Programmable read-only memory (PROM) is a type of ROM chip that can be programmed with a special device. However, after it has been programmed, the contents cannot be erased. Erasable programmable read-only memory (EPROM) is similar to PROM, but its contents can be erased and reprogrammed. See 2-5: Input, Output, and Memory Devices POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Storage devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 53. _____ holds data when the computer is off or during the course of a program’s operation. a. Random access memory b. Read-only memory c. Secondary memory d. Programmable read-only memory ANSWER: c RATIONALE: Correct. Secondary memory devices are nonvolatile and used for storing large volumes of data for long periods. They can also hold data when the computer is off or during the course of a program’s operation. See 2-5: Input, Output, and Memory Devices POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Storage devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM Copyright Cengage Learning. Powered by Cognero.

Page 24


Module 02: Computers and Their Business Applications 54. _____ is an example of a secondary memory device. a. An inkjet printer b. An optical disc c. Random access memory d. Read-only memory ANSWER: b RATIONALE: Correct. An optical disc is an example of a secondary memory device. Secondary memory devices can hold data when the computer is off or during the course of a program’s operation. See 2-5: Input, Output, and Memory Devices POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Storage devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 55. Which is true of magnetic tape? a. It is made of metal. b. It stores data sequentially. c. It resembles compact discs. d. It is a main memory device. ANSWER: b RATIONALE: Correct. Magnetic tape, made of a plastic material, resembles a cassette tape and stores data sequentially. Records can be stored in a block or separately, with a gap between each record or block, called the interrecord gap (IRG). See 2-5: Input, Output, and Memory Devices POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Storage devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 56. _____ allows data to be stored in multiple places to improve a system’s reliability. a. A remote access server b. Network-attached storage Copyright Cengage Learning. Powered by Cognero.

Page 25


Module 02: Computers and Their Business Applications c. Random access memory d. A redundant array of independent disks ANSWER: d RATIONALE: Correct. A redundant array of independent disks (RAID) is a collection of disk drives used for fault tolerance and improved performance and is typically found in large network systems. Data can be stored in multiple places to improve the system’s reliability. In other words, if one disk in the array fails, data is not lost. In some RAID configurations, sequences of data can be read from multiple disks simultaneously, which improves performance. See 2-5: Input, Output, and Memory Devices POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Storage devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 6:23 PM 57. _____, which is used for online storage and backup, involves multiple virtual servers that are usually hosted by third parties. a. Kernel storage b. Buffer storage c. Cache storage d. Cloud storage ANSWER: d RATIONALE: Correct. Cloud storage has become a popular option for many organizations and individuals in recent years. Used for online storage and backup, it involves multiple virtual servers that are usually hosted by third parties. See 2-5: Input, Output, and Memory Devices POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Storage devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 58. Identify the type of computers that has the highest storage capability. a. Subnotebooks b. Notebooks Copyright Cengage Learning. Powered by Cognero.

Page 26


Module 02: Computers and Their Business Applications c. Personal computers d. Supercomputers ANSWER: RATIONALE:

d Correct. Supercomputers are the most powerful; they also have the highest storage capabilities and the highest price. Supercomputers are more expensive, much bigger, faster, and have more memory than personal computers, minicomputers, and mainframes. See 26: Classes of Computers POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how computers are classified and their business applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.6 TOPICS: Computer types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 59. Identify the type of computers that has the highest price. a. Subnotebooks b. Notebooks c. Personal computers d. Supercomputers ANSWER: d RATIONALE: Correct. Supercomputers are the most powerful; they also have the highest storage capabilities and the highest price. Supercomputers are more expensive, much bigger, faster, and have more memory than personal computers, minicomputers, and mainframes. See 26: Classes of Computers POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how computers are classified and their business applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.6 TOPICS: Computer types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 60. Jacob, a data analyst, is working on a project from home and needs to download some data from his office network. Which of the following server platforms will best serve Jacob’s purpose? a. Remote access servers b. Web servers c. Application servers d. Disk servers Copyright Cengage Learning. Powered by Cognero.

Page 27


Module 02: Computers and Their Business Applications ANSWER: RATIONALE:

a Correct. Remote access servers (RAS) will best serve Jacob’s purpose. RAS allow off-site users to connect to network resources, such as network file storage, printers, and databases. Web servers store Web pages for access over the Internet. Application servers store computer software, which users can access from their workstations. Disk servers contain large-capacity hard drives and enable users to store files and applications for later retrieval. See 2-6: Classes of Computers POINTS: 1 DIFFICULTY: Challenging REFERENCES: Explain how computers are classified and their business applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.6 TOPICS: Servers KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 61. Which best defines an operating system (OS)? a. It is a set of programs for controlling and managing computer hardware and software. b. It is a computer and all the software for managing network resources and offering services to a network. c. It is a collection of disk drives used for fault tolerance and is typically found in large network systems. d. It is the main circuit board containing connectors for attaching additional boards. ANSWER: a RATIONALE: Correct. An OS is a set of programs for controlling and managing computer hardware and software. A typical OS consists of control programs and supervisor programs. See 2-7: What Is Software? POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the two major types of software. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.7 TOPICS: Operating systems Software KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 62. Which is true of the supervisor program of an operating system (OS)? a. It controls compilers in the OS. b. It prioritizes tasks performed by the CPU. c. It transfers data among other parts of the computer system. d. It generates checksums to verify that data is not corrupted. ANSWER: a Copyright Cengage Learning. Powered by Cognero.

Page 28


Module 02: Computers and Their Business Applications RATIONALE:

Correct. The supervisor program, also known as the kernel, is responsible for controlling all other programs in the OS, such as compilers, interpreters, assemblers, and utilities for performing special tasks. On the other hand, control programs manage computer hardware and resources. See 2-7: What Is Software? POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the two major types of software. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.7 TOPICS: Operating systems Software KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 63. The supervisor program in an operating system (OS) is also known as the _____. a. metadata b. kernel c. applet d. cache ANSWER: b RATIONALE: Correct. The supervisor program, also known as the kernel, is responsible for controlling all other programs in the OS, such as compilers, interpreters, assemblers, and utilities for performing special tasks. See 2-7: What Is Software? POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the two major types of software. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.7 TOPICS: Operating systems Software KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 64. UNIX is a type of _____. a. storage area network b. application software c. remote access server d. operating system ANSWER: d RATIONALE: Correct. UNIX is a type of operating system. Microsoft Windows, Mac OS, and Linux are examples of personal computer OSs, and mainframe OSs include UNIX and OpenVMS as Copyright Cengage Learning. Powered by Cognero.

Page 29


Module 02: Computers and Their Business Applications well as some versions of Linux. See 2-7: What Is Software? POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the two major types of software. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.7 TOPICS: Operating systems Software KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 65. _____ consists of a series of 0s and 1s representing data or instructions. a. Assembly language b. A fourth-generation language c. Machine language d. A fifth-generation language ANSWER: c RATIONALE: Correct. Machine language consists of a series of 0s and 1s representing data or instructions. Machine language depends on the machine so code written for one type of computer does not work on another type of computer. Writing a machine-language program is time consuming and painstaking. See 2-8: Computer Languages POINTS: 1 DIFFICULTY: Easy REFERENCES: List the generations of computer languages. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.8 TOPICS: Programming languages Software KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 7:00 PM 66. Java and C++ are examples of _____. a. assembly language b. high-level languages c. machine language d. compiler languages ANSWER: b RATIONALE: Correct. Java, C++, and VB.NET are examples of high-level languages. High-level languages are more like English, so they are easier to learn and code. See 2-8: Computer Languages POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 30


Module 02: Computers and Their Business Applications DIFFICULTY: Easy REFERENCES: List the generations of computer languages. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.8 TOPICS: Programming languages Software KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 7:02 PM 67. Which is true of fourth-generation languages (4GLs)? a. They are the easiest computer languages to use. b. They are composed of rigorous command syntaxes. c. They contain a series of 0s and 1s representing data or instructions. d. They use artificial intelligence technologies, such as knowledge-based systems. ANSWER: a RATIONALE: Correct. 4GLs are the easiest computer languages to use. The commands are powerful and easy to learn, even for people with little computer training. See 2-8: Computer Languages POINTS: 1 DIFFICULTY: Moderate REFERENCES: List the generations of computer languages. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.8 TOPICS: Programming languages Software KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 68. Structured query language (SQL) is an example of a(n) _____. a. assembly language b. high-level language c. fourth-generation language d. fifth-generation language ANSWER: c RATIONALE: Correct. SQL is an example of a fourth-generation language. Fourth-generation languages are the easiest computer languages to use. The commands are powerful and easy to learn, even for people with little computer training. See 2-8: Computer Languages POINTS: 1 DIFFICULTY: Easy REFERENCES: List the generations of computer languages. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 31


Module 02: Computers and Their Business Applications LEARNING OBJECTIVES: MIS.10e.2.8 TOPICS: Programming languages KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 69. Which is true of fifth-generation languages (5GLs)? a. They are the easiest computer languages to use. b. They contain a series of 0s and 1s representing data or instructions. c. They are machine dependent and need to be changed after every use. d. They use artificial intelligence technologies, such as knowledge-based systems. ANSWER: d RATIONALE: Correct. 5GLs use some of the artificial intelligence technologies, such as knowledgebased systems, natural language processing, visual programming, and a graphical approach to programming. Codes are automatically generated and designed to make the computer solve a given problem without a programmer or with minimum programming effort. See 28: Computer Languages POINTS: 1 DIFFICULTY: Moderate REFERENCES: List the generations of computer languages. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.8 TOPICS: Programming languages Software KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 70. To make a computer understand a program, the source code must be first translated into _____ code. a. ASCII b. object c. ternary d. UTF-8 ANSWER: b RATIONALE: Regardless of the language, a program is also referred to as the source code. This source code must be translated into object code—consisting of binary 0s and 1s. See 2-1: Defining a Computer POINTS: 1 DIFFICULTY: Easy REFERENCES: Define a computer system, and describe its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.1 TOPICS: Computer defined Copyright Cengage Learning. Powered by Cognero.

Page 32


Module 02: Computers and Their Business Applications KEYWORDS: DATE CREATED: DATE MODIFIED:

Remember 10/22/2019 1:26 PM 11/20/2019 7:06 PM

71. The _____ is the heart of a computer. a. main memory b. basic input/output system c. central processing unit d. serial port ANSWER: c RATIONALE: The central processing unit (CPU) is the heart of a computer. It is divided into two components: the arithmetic logic unit (ALU) and the control unit. See 2-1: Defining a Computer POINTS: 1 DIFFICULTY: Easy REFERENCES: Define a computer system, and describe its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.1 TOPICS: Computer defined Computer system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 72. The _____ tells the computer what to do, such as instructing the computer which device to read or send output to. a. main memory b. motherboard c. operating system d. control unit ANSWER: d RATIONALE: The central processing unit (CPU) is the heart of a computer. It is divided into two components: the arithmetic logic unit (ALU) and the control unit. The control unit tells the computer what to do, such as instructing the computer which device to read or send output to. See 2-1: Defining a Computer POINTS: 1 DIFFICULTY: Easy REFERENCES: Define a computer system, and describe its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.1 TOPICS: Computer system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM Copyright Cengage Learning. Powered by Cognero.

Page 33


Module 02: Computers and Their Business Applications 73. A(n) _____ is the enclosure containing the computer’s main components. a. disk drive b. computer chassis c. expansion slot d. parallel port ANSWER: b RATIONALE: A central processing unit (CPU) case (also known as a computer chassis or tower) is the enclosure containing the computer’s main components. See 2-1: Defining a Computer POINTS: 1 DIFFICULTY: Easy REFERENCES: Define a computer system, and describe its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.1 TOPICS: Computer system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 74. _____ include gallium arsenide chips that run at higher speeds and consume less power than silicon chips and optical technologies. a. Second-generation computers b. Third-generation computers c. Fourth-generation computers d. Fifth-generation computers ANSWER: d RATIONALE: The current fifth-generation computers include parallel processing (computers containing hundreds or thousands of CPUs for rapid data processing), gallium arsenide chips that run at higher speeds and consume less power than silicon chips, and optical technologies. See 2-2: The History of Computer Hardware and Software POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the history of computer hardware and software. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.2 TOPICS: Computer history Hardware KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 75. _____ bits equal one byte. a. Six Copyright Cengage Learning. Powered by Cognero.

Page 34


Module 02: Computers and Their Business Applications b. Eight c. Thirty-two d. Sixty-four ANSWER: RATIONALE:

b A bit is a single value of 0 or 1, and 8 bits equal 1 byte. A byte is the size of a character. See 2-3: The Power of Computers POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the factors distinguishing the computing power of computers. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.3 TOPICS: Computing power KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 76. A _____ is an input device for computers. a. mouse b. printer c. monitor d. speaker ANSWER: a RATIONALE: An input device, such as a keyboard or a mouse, is used to send data and information to the computer. The mouse moves the cursor on the screen, allowing fast, precise cursor positioning. See 2-5: Input, Output, and Memory Devices POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Input devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 77. The most common type of main memory is a semiconductor memory chip made of _____. a. arsenic b. germanium c. silicon d. manganese ANSWER: c RATIONALE: The most common type of main memory is a semiconductor memory chip made of silicon. Copyright Cengage Learning. Powered by Cognero.

Page 35


Module 02: Computers and Their Business Applications A semiconductor memory device can be volatile or nonvolatile. See 2-5: Input, Output, and Memory Devices POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Storage devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 78. A(n) _____, made of Mylar, is used for random-access processing of data in a computer. a. video adapter b. optical disc c. cassette tape d. magnetic disk ANSWER: d RATIONALE: A magnetic disk, made of Mylar or metal, is used for random-access processing. In other words, data can be accessed in any order, regardless of its order on the surface. See 2-5: Input, Output, and Memory Devices POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Storage devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 79. _____ are compatible with the IBM System/360 line introduced in 1965. a. Minicomputers b. Mainframe computers c. Personal computers d. Super computers ANSWER: b RATIONALE: Mainframe computers are compatible with the IBM System/360 line introduced in 1965. Systems that are not based on System/360 are referred to as “servers” or supercomputers. See 2-6: Classes of Computers POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how computers are classified and their business applications. Copyright Cengage Learning. Powered by Cognero.

Page 36


Module 02: Computers and Their Business Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.6 TOPICS: Computer types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 80. A(n) _____ is a type of server that stores computer software, which users can access from their workstations. a. database server b. Web server c. application server d. file server ANSWER: c RATIONALE: Application servers store computer software, which users can access from their workstations. A server is a computer and all the software for managing network resources and offering services to a network. See 2-6: Classes of Computers POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how computers are classified and their business applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.6 TOPICS: Servers KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 81. Corel Quattro Pro is an example of _____. a. word-processing software b. spreadsheet software c. database software d. desktop publishing software ANSWER: b RATIONALE: Corel Quattro Pro is an example of spreadsheet software. Microsoft Excel and IBM’s Lotus 1-2-3 are among other examples. See 2-7: What Is Software? POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the two major types of software. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.7 TOPICS: Applications software Software Copyright Cengage Learning. Powered by Cognero.

Page 37


Module 02: Computers and Their Business Applications KEYWORDS: DATE CREATED: DATE MODIFIED:

Apply 10/22/2019 1:26 PM 11/20/2019 7:22 PM

82. Microsoft PowerPoint is the most commonly used _____ software. a. desktop publishing b. presentation c. graphics d. project management ANSWER: b RATIONALE: Microsoft PowerPoint is the most commonly used presentation software; other examples include Google Slides and Canva. Presentation software is used to create and deliver slide shows. See 2-7: What Is Software? POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the two major types of software. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.7 TOPICS: Applications software Software KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 7:24 PM 83. Codes written for one type of computer using _____ do not work on another type of computer. a. assembly language b. structured query language c. a fourth-generation language d. a fifth-generation language ANSWER: a RATIONALE: Assembly language, the second generation of computer languages, is a higher-level language than machine language but is also machine dependent; hence, code written for one type of computer does not work on another type of computer. See 2-8: Computer Languages POINTS: 1 DIFFICULTY: Easy REFERENCES: List the generations of computer languages. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.8 TOPICS: Programming languages Software KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM Copyright Cengage Learning. Powered by Cognero.

Page 38


Module 02: Computers and Their Business Applications DATE MODIFIED:

10/22/2019 1:26 PM

84. Which is true of assembly language? a. More difficult than machine language to write programs for. b. Uses a series of short codes, or mnemonics, to represent data or instructions. c. Facilitates natural conversations between the user and the computer. d. Used mostly for Web development. ANSWER: b RATIONALE: Correct. Assembly language, the second generation of computer languages, is a higherlevel language than machine language but is also machine dependent. It uses a series of short codes, or mnemonics, to represent data or instructions. For example, ADD and SUBTRACT are typical commands in assembly language. Writing programs in assembly language is easier than in machine language. See 2-8: Computer Languages

POINTS: 1 DIFFICULTY: Easy REFERENCES: List the generations of computer languages. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.8 TOPICS: Programming languages Software KEYWORDS: Remember DATE CREATED: 11/22/2019 1:23 PM DATE MODIFIED: 11/22/2019 1:52 PM 85. ______ contain large-capacity hard drives and enable users to store files and applications for later retrieval. a. Application servers b. Disk servers c. File servers d. Database servers ANSWER: b RATIONALE: Disk servers contain large-capacity hard drives and enable users to store files and applications for later retrieval. See 2-6: Classes of Computers. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how computers are classified and their business applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.6 TOPICS: Servers KEYWORDS: Understand DATE CREATED: 11/22/2019 1:43 PM DATE MODIFIED: 11/22/2019 1:47 PM Copyright Cengage Learning. Powered by Cognero.

Page 39


Module 02: Computers and Their Business Applications 86. Wearable devices may provide which possible benefit in the manufacturing field? a. Improve employee safety by providing a hands-free work environment. b. Ability to store more data than a personal computer. c. Storage of Web pages for access over the Internet. d. Magnetic tape backup. ANSWER: a RATIONALE: Correct. Wearable devices could be used for improving productivity. For example, in the manufacturing field they might: • • • • •

Improve employee safety by providing a hands-free environment to work. Improve employee monitoring by helping to keep track of what’s going on. Provide service support by helping employees to access online tools aiding in resolving issues faster. Provide support for plant monitoring by offering warnings when a component fails. Provide support for video applications by offering hands-free real-time video that can be saved and analyzed later.

See 2-6: Classes of Computers POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how computers are classified and their business applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.6 TOPICS: Computer types KEYWORDS: Understand DATE CREATED: 11/22/2019 1:54 PM DATE MODIFIED: 11/22/2019 2:16 PM 87. Abstraction, inheritance, polymorphism, and encapsulation are four key principles of ________. a. network-attached storage b. machine language c. fifth-generation languages d. object-oriented programming ANSWER: d RATIONALE: Correct. Abstraction, inheritance, polymorphism, and encapsulation are four key principles of object-oriented programming (OOP). Abstraction is used to handle complexity by hiding unnecessary details from the user. Inheritance enables new objects to take on the properties of existing objects. Polymorphism is the ability to process objects differently depending on their data type or class. Encapsulation means grouping related items into a single unit. See 2-9: Object-Oriented Programming: A Quick Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Define object-oriented programming. QUESTION TYPE: Multiple Choice Copyright Cengage Learning. Powered by Cognero.

Page 40


Module 02: Computers and Their Business Applications HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.9 KEYWORDS: Remember DATE CREATED: 11/23/2019 2:38 PM DATE MODIFIED: 11/23/2019 2:43 PM 88. In object-oriented programming, a class __________. a. is an item that contains data and the procedures that read and manipulate it b. defines the format of an object c. uses a series of short codes to represent data or instructions d. controls and prioritizes tasks performed by the CPU ANSWER: b RATIONALE: Correct. A class defines the format of the object and the action that it performs. See 2-9: Object-Oriented Programming: A Quick Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Define object-oriented programming. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.9 KEYWORDS: Remember DATE CREATED: 11/23/2019 5:28 PM DATE MODIFIED: 11/23/2019 5:36 PM 89. An item that contains both data and the procedures that read and manipulate it is called a(n) ________. a. class b. module c. object d. application ANSWER: c RATIONALE: Correct. An object is an item that contains both data and the procedures that read and manipulate it. Examples include a person, an event, or a transaction. See 2-9: ObjectOriented Programming: A Quick Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Define object-oriented programming. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.9 KEYWORDS: Remember DATE CREATED: 11/23/2019 5:39 PM DATE MODIFIED: 11/23/2019 5:43 PM 90. The principle of _________ in object-oriented programming is used to handle complexity by hiding unnecessary Copyright Cengage Learning. Powered by Cognero.

Page 41


Module 02: Computers and Their Business Applications details from the user. a. inheritance b. encapsulation c. abstraction d. polymorphism ANSWER: RATIONALE:

c Correct. Abstraction, inheritance, polymorphism, and encapsulation are four key principles of OOP. Abstraction is used to handle complexity by hiding unnecessary details from the user. This principle looks at a problem from a higher level and then gets into detail in later stages of code development. See 2-9: Object-Oriented Programming: A Quick Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Define object-oriented programming. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.9 KEYWORDS: Remember DATE CREATED: 11/23/2019 5:44 PM DATE MODIFIED: 11/23/2019 5:49 PM 91. The object-oriented language _______ is used to develop apps for MacOS and iOS. a. Swift b. C# c. SQL d. ActiveX ANSWER: a RATIONALE: Correct. Each OOP is tailored to a specific OS and programming environment. For example, Swift is mostly used for programming environment and apps development for MacOS and iOS; C#, developed by Microsoft, is mostly used for Windows apps and Windows programming environment; and Java is used for cross-platform development. See 2-9: Object-Oriented Programming: A Quick Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Define object-oriented programming. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.9 KEYWORDS: Remember DATE CREATED: 11/23/2019 5:51 PM DATE MODIFIED: 11/23/2019 5:55 PM 92. Multiplication is a(n) _________ operation in the context of computer operations. a. logic b. retrieval c. storage Copyright Cengage Learning. Powered by Cognero.

Page 42


Module 02: Computers and Their Business Applications d. arithmetic ANSWER: RATIONALE:

d Correct. Computers can perform three basic tasks: arithmetic operations, logical operations, and storage and retrieval operations. All other tasks are performed using one or a combination of these operations. Computers can add, subtract, multiply, divide, and raise numbers to a power (exponentiation). See 2-4 Computer Operations. POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the three basic computer operations. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.4 KEYWORDS: Apply DATE CREATED: 11/25/2019 1:40 PM DATE MODIFIED: 11/25/2019 1:46 PM 93. In the context of computer operations, comparing two numbers is a(n) _______ operation. a. arithmetic b. logical c. storage d. retrieval ANSWER: b RATIONALE: Correct. Computers can perform three basic tasks: arithmetic operations, logical operations, and storage and retrieval operations. Computers can perform comparison operations by comparing two numbers. For example, a computer can compare x to y and determine which number is larger. See 2-4 Computer Operations. POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the three basic computer operations. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.4 KEYWORDS: Apply DATE CREATED: 11/25/2019 1:48 PM DATE MODIFIED: 11/25/2019 1:53 PM 94. Writing data to a hard drive is an example of a(n) ________ operation. a. arithmetic b. storage c. retrieval d. logical ANSWER: b Copyright Cengage Learning. Powered by Cognero.

Page 43


Module 02: Computers and Their Business Applications RATIONALE:

Correct. Computers can perform three basic tasks: arithmetic operations, logical operations, and storage and retrieval operations. Computers can store massive amounts of data in very small spaces and locate a particular item quickly. For example, you can store the text of more than 1 million books in a memory device about the size of your fist.

See 2-4 Computer Operations. POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the three basic computer operations. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.4 KEYWORDS: Apply DATE CREATED: 11/25/2019 1:58 PM DATE MODIFIED: 11/25/2019 2:03 PM 95. Obtaining the data of a video file from a flash drive is an example of a(n) _________ operation. a. exponentiation b. storage c. comparison d. retrieval ANSWER: d RATIONALE: Correct. Computers can perform three basic tasks: arithmetic operations, logical operations, and storage and retrieval operations. During a game, your computer may perform calculations in order to make a decision (such as whether to move from point A to point B), it may compare two numbers, and it may perform storage and retrieval functions for going forward with the process.See 2-4 Computer Operations. POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the three basic computer operations. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.4 KEYWORDS: Apply DATE CREATED: 11/25/2019 2:06 PM DATE MODIFIED: 11/25/2019 2:11 PM 96. Which of the following is considered a basic task in the context of computer operations? a. Logical operations b. Connecting to the Internet c. Word processing d. Natural language processing ANSWER: a Copyright Cengage Learning. Powered by Cognero.

Page 44


Module 02: Computers and Their Business Applications RATIONALE:

Correct. Computers can perform three basic tasks: arithmetic operations, logical operations, and storage and retrieval operations. All other tasks are performed using one or a combination of these operations. See 2-4 Computer Operations. POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the three basic computer operations. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.4 KEYWORDS: Apply DATE CREATED: 11/25/2019 3:03 PM DATE MODIFIED: 11/25/2019 3:10 PM 97. In the context of computer operations, which of the following is considered an arithmetic operation? a. Saving a file b. Retrieving data c. Comparing x to y d. Subtraction ANSWER: d RATIONALE: Correct. Computers can perform three basic tasks: arithmetic operations, logical operations, and storage and retrieval operations. All other tasks are performed using one or a combination of these operations. Computers can add, subtract, multiply, divide, and raise numbers to a power (exponentiation). See 2-4 Computer Operations. POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the three basic computer operations. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.2.4 KEYWORDS: Apply DATE CREATED: 11/25/2019 3:16 PM DATE MODIFIED: 11/25/2019 3:20 PM Essay 98. Provide a general description on how to write a computer program. ANSWER: Answers will vary. To write a computer program, first a user must know what needs to be done, and then he or she must plan a method to achieve this goal, including selecting the right language for the task. Many computer languages are available; the language the user selects depends on the problem being solved and the type of computer he or she is using. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define a computer system, and describe its components. QUESTION TYPE: Essay HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 45


Module 02: Computers and Their Business Applications STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.2.1 TOPICS: Computer defined KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 99. Discuss single processor and multiprocessor computers. ANSWER: Answers will vary. Some computers have a single processor; other computers, called multiprocessors, contain multiple processors. Multiprocessing is the use of two or more CPUs in a single computer system. Generally, a multiprocessor computer performs better than a single-processor computer in the same way that a team would perform better than an individual on a large, time-consuming project. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define a computer system, and describe its components. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.2.1 TOPICS: Computer system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 100. Explain the effects of processor size and operating system (OS) on computer performance. ANSWER: Answers will vary. In recent years, 32-bit and 64-bit processors and OSs have created a lot of interest. A 32-bit processor can use 232 bytes (4 GB) of RAM; and, in theory, a 64-bit processor can use 264 bytes (16 EB, or exabytes) of RAM. So a computer with a 64-bit processor can perform calculations with larger numbers and be more efficient with smaller numbers; it also has better overall performance than a 32-bit system. However, to take advantage of this higher performance, you must also have a 64-bit OS. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define a computer system, and describe its components. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.2.1 TOPICS: Computer defined Computer system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 7:27 PM 101. What is a motherboard? Copyright Cengage Learning. Powered by Cognero.

Page 46


Module 02: Computers and Their Business Applications ANSWER:

Answers will vary. A motherboard is the main circuit board containing connectors for attaching additional boards. In addition, it usually contains the CPU, Basic Input/Output System (BIOS), memory, storage, interfaces, serial and parallel ports, expansion slots, and all the controllers for standard peripheral devices, such as the display monitor, disk drive, and keyboard. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define a computer system, and describe its components. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.2.1 TOPICS: Computer system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 102. Discuss the advantages and disadvantages of gallium arsenide chips. ANSWER: Answers will vary. Because silicon cannot emit light and has speed limitations, computer designers have concentrated on technology using gallium arsenide, in which electrons move almost five times faster than silicon. Devices made with this synthetic compound can emit light, withstand higher temperatures, and survive much higher doses of radiation than silicon devices. The major problems with gallium arsenide are difficulties in mass production. This material is softer and more fragile than silicon, so it breaks more easily during slicing and polishing. Because of the high costs and difficulty of production, the military is currently the major user of this technology. However, research continues to eliminate some shortcomings of this technology. POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the history of computer hardware and software. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.2.2 TOPICS: Hardware KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 103. Describe how computer speed is measured. ANSWER: Answers will vary. Typically, computer speed is measured as the number of instructions performed during the following fractions of a second: a. Millisecond: 1/1,000 of a second b. Microsecond: 1/1,000,000 of a second c. Nanosecond: 1/1,000,000,000 of a second d. Picosecond: 1/1,000,000,000,000 of a second POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 47


Module 02: Computers and Their Business Applications DIFFICULTY: Moderate REFERENCES: Explain the factors distinguishing the computing power of computers. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.2.3 TOPICS: Computing power KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 104. Explain how data is stored in a computer. ANSWER: Answers will vary. Computers can store vast quantities of data and locate a specific item quickly, which makes knowledge workers more efficient in performing their jobs. In computers, data is stored in bits. A bit is a single value of 0 or 1, and 8 bits equal 1 byte. A byte is the size of a character. For example, the word computer consists of 8 characters or 8 bytes (64 bits). Every character, number, or symbol on the keyboard is represented as a binary number in computer memory. A binary system consists of 0s and 1s, with a 1 representing “on” and a 0 representing “off,” similar to a light switch. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the factors distinguishing the computing power of computers. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.2.3 TOPICS: Computing power KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 105. Discuss the three basic tasks performed by computers. ANSWER: Answers will vary. Computers can perform three basic tasks: arithmetic operations, logical operations, and storage and retrieval operations. Computers can add, subtract, multiply, divide, and raise numbers to a power (exponentiation), as shown in these examples: A + B (addition): 5 + 7 = 12 A – B (subtraction): 5 – 2 = 3 A * B (multiplication): 5 * 2 = 10 A / B (division): 5 / 2 = 2.5 A ^ B (exponentiation): 5 ^ 2 = 25 Computers can perform comparison operations by comparing two numbers. For example, a computer can compare x to y and determine which number is larger. Computers can store massive amounts of data in very small spaces and locate a particular item quickly. For example, a person can store the text of more than one million books in a memory device about the size of his or her fist. POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 48


Module 02: Computers and Their Business Applications DIFFICULTY: Moderate REFERENCES: Summarize computer operations. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.2.4 TOPICS: Computer functions KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 7:33 PM 106. Describe touch screens. ANSWER:

Answers will vary. A touch screen, which usually works with menus, is a combination of input devices. Some touch screens rely on light detection to determine which menu item has been selected, and others are pressure sensitive. Touch screens are often easier to use than keyboards, but they might not be as accurate because selections can be misread or mistouched. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Input devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 107. What are the most common output devices for soft copy? ANSWER: Answers will vary. Output displayed on a screen is called “soft copy.” The most common output devices for soft copy are cathode ray tube (CRT), plasma display, and liquid crystal display (LCD). Soon, OLED (organic light-emitting diode) displays will replace LCDs. OLED screens are brighter, thinner, and consume less power than LCD technology. However, they are more expensive than LCD technology. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Output devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM Copyright Cengage Learning. Powered by Cognero.

Page 49


Module 02: Computers and Their Business Applications DATE MODIFIED:

10/22/2019 1:26 PM

108. What is the most common type of main memory? ANSWER: Answers will vary. The most common type of main memory is a semiconductor memory chip made of silicon. A semiconductor memory device can be volatile or nonvolatile. Volatile memory is called random access memory (RAM), although you could think of it as “read-write memory.” In other words, data can be read from and written to RAM. Some examples of the type of information stored in RAM include open files, the Clipboard’s contents, running programs, and so forth. A special type of RAM, called cache RAM, resides on the processor. Because memory access from main RAM storage generally takes several clock cycles (a few nanoseconds), cache RAM stores recently accessed memory so the processor is not waiting for the memory transfer. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Storage devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 109. Describe the main types of secondary memory devices. ANSWER: Answers will vary. There are several types of secondary memory devices: Magnetic disk: A magnetic disk, made of Mylar or metal, is used for random-access processing. In other words, data can be accessed in any order, regardless of its order on the surface. Magnetic disks are much faster but more expensive than tape devices. Magnetic tape: Magnetic tape, made of a plastic material, resembles a cassette tape and stores data sequentially. Records can be stored in a block or separately, with a gap between each record or block, called the interrecord gap (IRG). Magnetic tape is sometimes used for storing backups, although other media are more common now. Optical disc: Optical discs use laser beams to access and store data. Optical technology can store vast amounts of data and is durable. Three common types of optical storage are CDROMs, WORM discs, and DVDs. Other secondary memory devices include hard disks, USB flash drives, and memory cards. Hard disks come in a variety of sizes and can be internal or external, and their costs have been decreasing steadily. Memory sticks have become popular because of their small size, high storage capacity, and decreasing cost. Flash memory is nonvolatile memory that can be electronically erased and reprogrammed. It is used mostly in memory cards and USB flash drives for storing and transferring data between computers and other devices. Another type of memory device that is gaining in popularity is the solid-state drive (SSD). With SSDs, similar to a memory stick, there are no moving parts. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Essay Copyright Cengage Learning. Powered by Cognero.

Page 50


Module 02: Computers and Their Business Applications HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Storage devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 11/20/2019 7:39 PM 110. Describe flash memory. ANSWER: Answers will vary. Flash memory is nonvolatile memory that can be electronically erased and reprogrammed. It is used mostly in memory cards and USB flash drives for storing and transferring data between computers and other devices. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Storage devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 111. Explain how a redundant array of independent disks (RAID) provides fault tolerance and improves performance. ANSWER: Answers will vary. A RAID system is a collection of disk drives used for fault tolerance and improved performance, and it is typically found in large network systems. With RAID, data can be stored in multiple places to improve the system’s reliability. In other words, if one disk in the array fails, data is not lost. In some RAID configurations, sequences of data can be read from multiple disks simultaneously, which improves performance. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the types of input, output, and memory devices. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.2.5 TOPICS: Storage devices KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 112. Briefly discuss different classes of computers. ANSWER: Answers will vary. Usually, computers are classified based on cost, amount of memory, speed, and sophistication. Using these criteria, computers are classified as subnotebooks, notebooks, personal computers, minicomputers, mainframes, or supercomputers. Copyright Cengage Learning. Powered by Cognero.

Page 51


Module 02: Computers and Their Business Applications Supercomputers are the most powerful; they also have the highest storage capabilities and the highest price. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how computers are classified and their business applications. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.2.6 TOPICS: Computer types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 113. Briefly discuss fax servers, file servers, and mail servers. ANSWER: Answers will vary. A server is a computer and all the software for managing network resources and offering services to a network. a. Fax servers: Fax servers contain software and hardware components that enable users to send and receive faxes. b. File servers: File servers contain large-capacity hard drives for storing and retrieving data files. c. Mail servers: Mail servers are configured for sending, receiving, and storing e-mails. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how computers are classified and their business applications. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.2.6 TOPICS: Servers KEYWORDS: Understand DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 114. Describe desktop publishing software. ANSWER: Answers will vary. Desktop publishing software is used to produce professional-quality documents without expensive hardware and software. This software works on a “whatyou-see-is-what-you-get” concept, so the high-quality screen display gives a user a good idea of what he or she will see in the printed output. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the two major types of software. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.2.7 Copyright Cengage Learning. Powered by Cognero.

Page 52


Module 02: Computers and Their Business Applications TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Applications software Software Apply 10/22/2019 1:26 PM 10/22/2019 1:26 PM

115. Describe financial planning and accounting software. ANSWER: Answers will vary. Financial planning software, which is more powerful than spreadsheet software, is capable of performing many types of analysis on large amounts of data. These analyses include present value, future value, rate of return, cash flow, depreciation, retirement planning, and budgeting. A widely used financial planning package is Intuit Quicken. Using this package, you can plan and analyze all kinds of financial scenarios. In addition to spreadsheet software, dedicated accounting software is available for performing many sophisticated accounting tasks, such as general ledgers, accounts receivable, accounts payable, payroll, balance sheets, and income statements. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the two major types of software. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.2.7 TOPICS: Applications software Software KEYWORDS: Apply DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM 116. Describe assembly language. ANSWER: Answers will vary. Assembly language is the second generation of computer languages. It is a higher-level language than machine language but is also machine dependent. It uses a series of short codes, or mnemonics, to represent data or instructions. For example, ADD and SUBTRACT are typical commands in assembly language. Writing programs in assembly language is easier than in machine language. POINTS: 1 DIFFICULTY: Moderate REFERENCES: List the generations of computer languages. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.2.8 TOPICS: Programming languages Software KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM Copyright Cengage Learning. Powered by Cognero.

Page 53


Module 02: Computers and Their Business Applications 117. Describe fifth-generation languages (5GLs). ANSWER: Answers will vary. Fifth-generation languages (5GLs) use some of the artificial intelligence technologies, such as knowledge-based systems, natural language processing, visual programming, and a graphical approach to programming. Codes are automatically generated and designed to make the computer solve a given problem without a programmer or with minimum programming effort. These languages are designed to facilitate natural conversations between a user and the computer. Imagine that the user could ask his or her computer, “What product generated the most sales last year?” The computer, equipped with a voice synthesizer, could respond, “Product X.” Dragon NaturallySpeaking Solutions is an example of NLP. Research continues in this field because of the promising results so far. POINTS: 1 DIFFICULTY: Moderate REFERENCES: List the generations of computer languages. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.2.8 TOPICS: Programming languages Software KEYWORDS: Remember DATE CREATED: 10/22/2019 1:26 PM DATE MODIFIED: 10/22/2019 1:26 PM

Copyright Cengage Learning. Powered by Cognero.

Page 54


Module 03: Data and Business Intelligence True / False 1. Although a database can consist of only a single file, it is usually a group of files. a. True b. False ANSWER: True RATIONALE: Correct Although a database can consist of only a single file, it is usually a group of files. A university database, for example, might have files for students, staff, faculty, and courses. See 3-1: Databases POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a database and use of a database management system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.1 TOPICS: Databases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 2. A database is a critical component of information systems because any type of analysis that is done is based on data available in the database. a. True b. False ANSWER: True RATIONALE: Correct A database is a critical component of information systems because any type of analysis that is done is based on data available in the database. To make using databases more efficient, a database management system is used. See 3-1: Databases POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe a database and use of a database management system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.1 TOPICS: Database defined KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 3. Labor and population statistics are examples of sources for internal data that are accessed by a database. a. True b. False ANSWER: False RATIONALE: Correct Copyright Cengage Learning. Powered by Cognero.

Page 1


Module 03: Data and Business Intelligence Labor and population statistics are examples of sources for external data that are accessed by a database. External data comes from a variety of sources and is often stored in a data warehouse. See 3-1: Databases POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a database and use of a database management system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.1 TOPICS: Databases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 4. Disks are sequential access devices, whereas tapes are random access devices. a. True b. False ANSWER: False RATIONALE: Correct Disks are random access devices, whereas tapes are sequential access devices. In a sequential access file structure, records in files are organized and processed in numerical or sequential order, typically the order in which they were entered. In a random access file structure, records can be accessed in any order, regardless of their physical locations in storage media. See 3-1: Databases POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a database and use of a database management system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.1 TOPICS: Databases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 5. With the indexed sequential access method (ISAM), records cannot be accessed randomly. a. True b. False ANSWER: False RATIONALE: Correct With the ISAM, records can be accessed sequentially or randomly, depending on the number being accessed. For a small number of records, random access is used, and for a large number, sequential access is used. See 3-1: Databases POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe a database and use of a database management system. Copyright Cengage Learning. Powered by Cognero.

Page 2


Module 03: Data and Business Intelligence QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.1 TOPICS: Databases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 6. A network model is similar to a hierarchical data model because in both data models records are organized in the same way. a. True b. False ANSWER: False RATIONALE: Correct A network model is similar to a hierarchical model, but records are organized differently. Unlike the hierarchical model, each record in the network model can have multiple parent and child records. See 3-2: Logical Database Design POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 7. A select operation pares down a table in a relational database by eliminating columns according to certain criteria. a. True b. False ANSWER: False RATIONALE: Correct A select operation searches data in a table and retrieves records based on certain criteria. A project operation pares down a table by eliminating columns according to certain criteria. See 3-2: Logical Database Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Relational database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM Copyright Cengage Learning. Powered by Cognero.

Page 3


Module 03: Data and Business Intelligence DATE MODIFIED:

10/22/2019 1:28 PM

8. A database engine converts logical requests from users into their physical equivalents by interacting with other components of the database management system (DBMS). a. True b. False ANSWER: True RATIONALE: Correct A database engine converts logical requests from users into their physical equivalents by interacting with other components of the DBMS. It is responsible for data storage, manipulation, and retrieval. See 3-3: Components of a DBMS POINTS: 1 DIFFICULTY: Easy REFERENCES: Define the five components of a database management system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.3 TOPICS: Database management system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 9. The use of the OR operator in a query form, when using query by example (QBE), means that all conditions must be met. a. True b. False ANSWER: False RATIONALE: Correct With QBE, you request data from a database by constructing a statement made up of query forms. The use of the OR operator in a query form, when using QBE, means that only one of the conditions must be met. See 3-3: Components of a DBMS POINTS: 1 DIFFICULTY: Easy REFERENCES: Define the five components of a database management system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.3 TOPICS: Database management system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 10. Static Web sites are useful for e-commerce sites that need frequent updates. a. True b. False ANSWER: False Copyright Cengage Learning. Powered by Cognero.

Page 4


Module 03: Data and Business Intelligence RATIONALE:

Correct Data-driven Web sites are useful for e-commerce sites that need frequent updates. With a data-driven Web site, users can get more current information from a variety of data sources. See 3-4: Recent Trends in Database Design and Use POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize three recent trends in database design and use. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.4 TOPICS: Database information uses KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 11. In contrast to the query languages used to interact with a relational database, interaction with an object-oriented database takes places via methods, which are called by sending a message to an object. a. True b. False ANSWER: True RATIONALE: Correct In contrast to the query languages used to interact with a relational database, interaction with an object-oriented database takes places via methods, which are called by sending a message to an object. Messages are usually generated by an event of some kind, such as pressing Enter or clicking the mouse button. See 3-4: Recent Trends in Database Design and Use POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize three recent trends in database design and use. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.4 TOPICS: Database trends KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 12. Data in a database is used for analytical purposes, whereas data in a data warehouse is used for capturing and managing transactions. a. True b. False ANSWER: False RATIONALE: Correct Data in a data warehouse is used for analytical purposes, whereas data in a database is used for capturing and managing transactions. Data warehouses store multidimensional data, so they are sometimes called “hypercubes.” See 3-5: Data Warehouses Copyright Cengage Learning. Powered by Cognero.

Page 5


Module 03: Data and Business Intelligence POINTS: DIFFICULTY: REFERENCES:

1 Easy Analyze the four major functions of a data warehouse and their use for businesses. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.5 TOPICS: Data warehouses KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 13. Consolidating information from different departments or functional areas is easier in data marts than in data warehouses. a. True b. False ANSWER: False RATIONALE: Correct Data marts usually have more limited scope than data warehouses, and consolidating information from different departments or functional areas is more difficult. A data mart is usually a smaller version of a data warehouse, used by a single department or function. See 3-6: Data Marts POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the functions of a data mart. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.6 TOPICS: Data marts KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 14. Business intelligence (BI) uses scorecards and dashboards to support decision-making activities, whereas business analytics (BA) uses data mining tools and predictive modeling. a. True b. False ANSWER: True RATIONALE: Correct BI uses dashboards, scorecards, online analytical processing, and query reports to support decision-making activities, whereas BA uses statistical analysis, data mining tools, and predictive modeling. See 3-7: Business Analytics POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain business analytics and its role in the decision-making process. QUESTION TYPE: True / False Copyright Cengage Learning. Powered by Cognero.

Page 6


Module 03: Data and Business Intelligence HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.7 TOPICS: Business analytics KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 15. Database marketing works by using multivariate analysis, data segmentation, and automated tools to transform marketing from a proactive to a reactive process. a. True b. False ANSWER: False RATIONALE: Correct Database marketing works by using multivariate analysis, data segmentation, and automated tools to transform marketing from a reactive to a proactive process. It makes an organization more responsive to the needs and desires of its customers and also allows the organization to better respond to changes in the marketplace. See 3-9: Database Marketing POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain database marketing and its business applications. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.9 TOPICS: Database information uses KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 16. Tableau can utilize data from various sources including data files, relational databases, and big data sources. a. True b. False ANSWER: True RATIONALE: Correct. Tableau is a data visualization tool used for generating business intelligence. It is used to analyze data for generating trends using graphs and charts. It can utilize data from various sources including data files (with various formats such as Excel and PDF) and relational databases, as well as big data sources. See 3-10 Tableau and Power BI: Two Popular BI and Visualization Platforms. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain key features of Tableau and Power BI as two popular bi and visualization platforms QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.10 KEYWORDS: Understand DATE CREATED: 11/27/2019 2:53 PM Copyright Cengage Learning. Powered by Cognero.

Page 7


Module 03: Data and Business Intelligence DATE MODIFIED:

11/27/2019 2:56 PM

17. A disadvantage of Power BI is that it only accepts data from a single source. a. True b. False ANSWER: False RATIONALE: Correct. Power BI from Microsoft is a platform that allows a user to analyze and visualize data from different sources with different formats. Data may be an Excel spreadsheet, data from the cloud, or from data warehouses and data marts. See 3-10 Tableau and Power BI: Two Popular BI and Visualization Platforms. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain key features of Tableau and Power BI as two popular bi and visualization platforms QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.10 KEYWORDS: Understand DATE CREATED: 11/27/2019 2:59 PM DATE MODIFIED: 11/27/2019 3:02 PM 18. The earliest users of automated marketing tools included credit bureaus and mail-order catalog companies. a. True b. False ANSWER: True RATIONALE: Correct. The earliest use of automated marketing tools was by Reader’s Digest, American Express, mail-order catalog companies, and credit bureaus. Database marketing made call centers and telemarketing popular. It also became popular with loyalty programs, such as grocery chain club cards, airline mileage programs, and more recently, My Starbucks Rewards. See 3-9 Database Marketing. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain database marketing and its business applications. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.9 KEYWORDS: Understand DATE CREATED: 11/29/2019 3:00 PM DATE MODIFIED: 11/29/2019 3:03 PM 19. Conventional computing methods are able to efficiently process and manage big data. a. True b. False ANSWER: False RATIONALE: Correct. The result of the exponential growth of data in both public and private organizations, big Copyright Cengage Learning. Powered by Cognero.

Page 8


Module 03: Data and Business Intelligence data is data so voluminous that conventional computing methods are not able to efficiently process and manage it. See 3-8 The Big Data Era. POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the advantages and challenges of big data and predictive analytics for a business. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.8 KEYWORDS: Analyze DATE CREATED: 11/29/2019 4:14 PM DATE MODIFIED: 11/29/2019 4:17 PM 20. Apache Hadoop is the most commonly used platform for big data analytics. a. True b. False ANSWER: True RATIONALE: Correct. The most commonly used platform for big data analytics is the open-source Apache Hadoop, which uses the Hadoop Distributed File System (HDFS) to manage storage. See 3-8 The Big Data Era. POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the advantages and challenges of big data and predictive analytics for a business. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.8 KEYWORDS: Analyze DATE CREATED: 11/29/2019 4:27 PM DATE MODIFIED: 11/29/2019 4:28 PM 21. There are, to date, many legal requirements for protecting privacy while using big data analytics. a. True b. False ANSWER: False RATIONALE: Correct. Few legal protections exist for the involved individuals: There are, to date, few (if any) legal requirements for protecting privacy while using big data analytics. Big data analytics is able to provide key decision makers with unprecedented decision-making support and great potential for gaining a competitive advantage. However, this powerful tool could reveal and expose certain information that puts some people’s privacy at risk. It also may create some legal and ethical concerns. See 3-8 The Big Data Era. POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the advantages and challenges of big data and predictive analytics for a business. Copyright Cengage Learning. Powered by Cognero.

Page 9


Module 03: Data and Business Intelligence QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.8 KEYWORDS: Analyze DATE CREATED: 11/29/2019 4:43 PM DATE MODIFIED: 11/29/2019 4:45 PM 22. In the context of business analytics, prescriptive analytics recommends a precise course of action that a decision maker should follow and shows the likely outcome of each decision. a. True b. False ANSWER: True RATIONALE: Correct. There are several types of BA methods. Three popular ones are descriptive, predictive, and prescriptive analytics. Prescriptive analytics goes beyond descriptive and predictive analytics by recommending a course of action that a decision maker should follow and showing the likely outcome of each decision. In other words, prescriptive analytics is more specific than predictive analytics by recommending a precise course of action. See 3-7 Business Analytics. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain business analytics and its role in the decision-making process. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.7 KEYWORDS: Understand DATE CREATED: 11/30/2019 2:29 PM DATE MODIFIED: 11/30/2019 2:33 PM 23. In the context of business analytics, mobile analytics is declining in popularity. a. True b. False ANSWER: False RATIONALE: Correct. As the number of mobile users is increasing on a daily basis, mobile analytics is gaining in popularity. Some companies build tablet-specific Web sites; some design and optimize their regular Web sites in order to better fit into the screen size, mobile browser, connection speed, and other capabilities of mobile devices. See 3-7 Business Analytics. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain business analytics and its role in the decision-making process. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.7 KEYWORDS: Understand DATE CREATED: 11/30/2019 2:40 PM DATE MODIFIED: 11/30/2019 2:42 PM Copyright Cengage Learning. Powered by Cognero.

Page 10


Module 03: Data and Business Intelligence 24. A data mart is designed for an entire organization's use. a. True b. False ANSWER: False RATIONALE: Correct. A data mart is designed for a specific department or division, and identifying their requirements and the functions they need is easier. A data warehouse is designed for an entire organization’s use. See 3-6 Data Marts. POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the functions of a data mart. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.6 KEYWORDS: Understand DATE CREATED: 11/30/2019 3:35 PM DATE MODIFIED: 11/30/2019 3:37 PM 25. Data markets focus on business functions for the marketing department of an organization. a. True b. False ANSWER: False RATIONALE: Correct. A data mart is usually a smaller version of a data warehouse, used by a single department or function. Data marts focus on business functions for a specific user group in an organization, such as a data mart for the marketing department. See 3-6 Data Marts. POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the functions of a data mart. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.6 KEYWORDS: Understand DATE CREATED: 11/30/2019 3:39 PM DATE MODIFIED: 11/30/2019 3:40 PM 26. Data marts usually have more limited scope than data warehouses, and consolidating information from different departments is more difficult. a. True b. False ANSWER: True RATIONALE: Correct. A data warehouse is designed for an entire organization’s use. Data marts, however, usually have more limited scope than data warehouses, and consolidating information from different departments or functional areas (such as sales and production) is more difficult. See 3-6 Data Marts. POINTS: 1 DIFFICULTY: Easy Copyright Cengage Learning. Powered by Cognero.

Page 11


Module 03: Data and Business Intelligence REFERENCES: Describe the functions of a data mart. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.6 KEYWORDS: Understand DATE CREATED: 11/30/2019 3:43 PM DATE MODIFIED: 11/30/2019 3:45 PM Multiple Choice 27. Which statement is true of a flat file system? a. Same data can be stored in more than one file. b. Programs and data are independent. c. Complex requests can be handled easily. d. It requires very less storage space. ANSWER: a RATIONALE: Correct. The problem with a flat file organization is that the same data could be stored in more than one file, creating data redundancy. See 3-1: Databases POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe a database and use of a database management system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.1 TOPICS: Database defined Databases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 28. In comparison with flat file systems, databases: a. minimize data redundancy. b. are easier to design. c. have less sophisticated security measures. d. require more storage space. ANSWER: a RATIONALE: Correct. In comparison with flat file systems, databases minimize data redundancy. See 31: Databases POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe a database and use of a database management system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.1 TOPICS: Database defined Copyright Cengage Learning. Powered by Cognero.

Page 12


Module 03: Data and Business Intelligence KEYWORDS: DATE CREATED: DATE MODIFIED:

Databases Understand 10/22/2019 1:28 PM 10/22/2019 1:28 PM

29. In comparison with a flat file system, _____ in a database. a. storage space is reduced b. programs and data are interdependent c. complex requests cannot be handled easily d. data redundancy is introduced ANSWER: a RATIONALE: Correct. In comparison with a flat file system, storage space is reduced in a database. The problem with flat file organization is that the same data could be stored in more than one file, creating data redundancy. See 3-1: Databases POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe a database and use of a database management system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.1 TOPICS: Database management Hierarchical database models KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 30. In the context of the types of data in a database, which is a source of internal data? a. Tax records b. Sales records c. Distribution networks d. Economic indicators ANSWER: b RATIONALE: Correct. Internal data is collected from within an organization and can include transaction records, sales records, and personnel records. See 3-1: Databases POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe a database and use of a database management system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.1 TOPICS: Database defined Databases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM Copyright Cengage Learning. Powered by Cognero.

Page 13


Module 03: Data and Business Intelligence 31. In the context of the types of data in a database, which is a source of external data? a. Tax records b. Sales records c. Transaction records d. Personnel records ANSWER: a RATIONALE: Correct. Tax records, distribution networks, and government regulations are examples of sources for external data. See 3-1: Databases POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe a database and use of a database management system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.1 TOPICS: Database defined Databases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 32. The _____ method for accessing files is effective when a large number of records are processed less frequently, perhaps on a quarterly or yearly basis. a. sequential access file structure b. random access file structure c. indexed sequential access d. physical view access ANSWER: a RATIONALE: Correct. The sequential access file structure method is effective when a large number of records are processed less frequently, perhaps on a quarterly or yearly basis. In this method, records in files are organized and processed in numerical or sequential order, typically the order in which they were entered. See 3-1: Databases POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a database and use of a database management system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.1 TOPICS: Database defined Databases KEYWORDS: Remember DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 33. Which file structure is similar to a book index that lists page numbers where certain topics can be found? Copyright Cengage Learning. Powered by Cognero.

Page 14


Module 03: Data and Business Intelligence a. The indexed sequential access method b. The indexed network access structure c. The indexed random access file structure d. The indexed hierarchical access method ANSWER: a RATIONALE: Correct. With the indexed sequential access method, records can be accessed sequentially or randomly, depending on the number being accessed. This file structure is similar to a book index that lists page numbers where you can find certain topics. See 3-1: Databases POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a database and use of a database management system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.1 TOPICS: Database management Databases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 34. In the context of how information is viewed in a database, the _____ involves how data is stored on and retrieved from storage media. a. physical view b. logical view c. rational view d. analytical view ANSWER: a RATIONALE: Correct. The physical view involves how data is stored on and retrieved from storage media, such as hard disks, magnetic tapes, or CDs. See 3-2: Logical Database Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 35. For each database, there: a. is only one physical view of data. b. are only two logical views of data. c. are multiple physical views of data. d. is only one logical view of data. Copyright Cengage Learning. Powered by Cognero.

Page 15


Module 03: Data and Business Intelligence ANSWER: RATIONALE:

a Correct. For each database, there is only one physical view of data. The physical view involves how data is stored on and retrieved from storage media, such as hard disks, magnetic tapes, or CDs. See 3-2: Logical Database Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 36. The first step in database design is defining a _____, which determines how data is created, represented, organized, and maintained. a. data warehouse b. data mart c. data dictionary d. data model ANSWER: d RATIONALE: Correct. The first step in database design is defining a data model, which determines how data is created, represented, organized, and maintained. A data model includes three components: data structure, operations, and integrity rules. See 3-2: Logical Database Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 37. Which component of a data model describes methods and calculations that can be performed on data, such as updating and querying data? a. Data structure b. Operations c. Integrity rules d. File structure ANSWER: b RATIONALE: Correct. Operations, a component of a data model, describes methods and calculations that Copyright Cengage Learning. Powered by Cognero.

Page 16


Module 03: Data and Business Intelligence can be performed on data, such as updating and querying data. See 3-2: Logical Database Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 38. _____ is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a field, constraints, and access methods. a. Data structure b. Schema diagrams c. Integrity rules d. File procedure ANSWER: c RATIONALE: Correct. Integrity rules is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a field, constraints (limits on what type of data can be stored in a field), and access methods. See 3-2: Logical Database Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Database design KEYWORDS: Remember DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 39. In a(n) _____, nodes with the same parents are called twins or siblings. a. hierarchical model b. network model c. relational model d. object-based model ANSWER: a RATIONALE: Correct. In a hierarchical model, nodes with the same parents are called twins or siblings. In this model, the relationships among records form a treelike structure. See 3-2: Logical Database Design POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 17


Module 03: Data and Business Intelligence DIFFICULTY: Easy REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 40. In the context of data models, relationships among records in a hierarchical model are called _____. a. nodes b. branches c. roots d. segments ANSWER: b RATIONALE: Correct. In a hierarchical model, records are called nodes, and relationships among records are called branches. See 3-2: Logical Database Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 41. In a(n) _____, each record can have multiple parent and child records. a. network model b. hierarchical model c. object-oriented model d. relational model ANSWER: a RATIONALE: Correct. In a network model, each record can have multiple parent and child records. For example, a customer can have several invoices, and an invoice can be paid by more than one method. See 3-2: Logical Database Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.2 Copyright Cengage Learning. Powered by Cognero.

Page 18


Module 03: Data and Business Intelligence TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Database design Understand 10/22/2019 1:28 PM 10/22/2019 1:28 PM

42. In a relational database model, the rows are called _____. a. tuples b. attributes c. branches d. roots ANSWER: a RATIONALE: Correct. In a relational database model, the rows are records (also called tuples), and the columns are fields (also called attributes). See 3-2: Logical Database Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Relational database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 43. In a relational database model, the columns are called _____. a. attributes b. tuples c. branches d. roots ANSWER: a RATIONALE: Correct. In a relational database model, the rows are records (also called tuples), and the columns are fields (also called attributes). See 3-2: Logical Database Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Relational database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 44. To begin designing a relational database, you must define the _____ by defining each table and the fields in it. Copyright Cengage Learning. Powered by Cognero.

Page 19


Module 03: Data and Business Intelligence a. physical structure b. logical structure c. primary key d. foreign key ANSWER: RATIONALE:

b Correct. To begin designing a relational database, you must define the logical structure by defining each table and the fields in it. For example, a Students table has fields for StudentID, StudentFirstName, StudentLastName, and so forth. See 3-2: Logical Database Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Relational database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 45. The _____ stores data types for fields, default values for fields, and validation rules for data in each field. a. data dictionary b. data mine c. data warehouse d. data mart ANSWER: a RATIONALE: Correct. The data dictionary stores definitions, such as data types for fields, default values, and validation rules for data in each field. See 3-2: Logical Database Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Relational database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 46. In a relational database model, a _____ is a field in a relational table that matches the primary key column of another table. a. secondary key b. foreign key c. serial key d. domain key Copyright Cengage Learning. Powered by Cognero.

Page 20


Module 03: Data and Business Intelligence ANSWER: RATIONALE:

b Correct. In a relational database model, a foreign key is a field in a relational table that matches the primary key column of another table. It can be used to cross-reference tables. See 3-2: Logical Database Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Relational database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 47. _____ improves database efficiency by eliminating redundant data and ensuring that only related data is stored in a table. a. Triangulation b. Fragmentation c. Normalization d. Encapsulation ANSWER: c RATIONALE: Correct. To improve database efficiency, a process called normalization is used, which eliminates redundant data and ensures that only related data is stored in a table. See 3-2: Logical Database Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Relational database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 48. In a relational database model, which operation searches data in a table and retrieves records based on certain criteria? a. insert operation b. join operation c. find operation d. select operation ANSWER: d RATIONALE: Correct. In a relational database model, a select operation searches data in a table and retrieves records based on certain criteria or conditions. See 3-2: Logical Database Design POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 21


Module 03: Data and Business Intelligence DIFFICULTY: Easy REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Relational database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 49. In a relational database model, which operation pares down a table by eliminating columns according to certain criteria? a. project operation b. join operation c. find operation d. insert operation ANSWER: a RATIONALE: Correct. In a relational database model, a project operation pares down a table by eliminating columns according to certain criteria. For example, users may need a list of students but do not want to include their ages. This data can be retrieved using the project operation. See 3-2: Logical Database Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Relational database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 50. The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary. a. manipulation b. generation c. definition d. administration ANSWER: c RATIONALE: Correct. The data definition component of a DBMS is used to create and maintain the data dictionary and define the structure of files in a database. Any changes to a database’s structure, such as adding a field, deleting a field, changing a field’s size, or changing the data type stored in a field, are made with this component. See 3-3: Components of a DBMS POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 22


Module 03: Data and Business Intelligence DIFFICULTY: Easy REFERENCES: Define the five components of a database management system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.3 TOPICS: Database management system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 51. The data _____ component of a database management system (DBMS) is used to add, delete, modify, and retrieve records from a database. a. manipulation b. generation c. definition d. administration ANSWER: a RATIONALE: Correct. The data manipulation component of a DBMS is used to add, delete, modify, and retrieve records from a database. Typically, a query language is used for this component. See 3-3: Components of a DBMS POINTS: 1 DIFFICULTY: Easy REFERENCES: Define the five components of a database management system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.3 TOPICS: Database management system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 52. When using query by example (QBE) in the data manipulation component of a database management system (DBMS), the _____ is used when all the conditions in the QBE form must be met. a. NOT operator b. AND operator c. OR operator d. NOR operator ANSWER: b RATIONALE: Correct. When using QBE in the data manipulation component of a DBMS, the AND operator is used when all the conditions in the QBE form must be met. For example, “Major = MIS AND GPA > 3.8” means a student must be majoring in MIS and have a GPA higher than 3.8 to be retrieved. See 3-3: Components of a DBMS POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define the five components of a database management system. Copyright Cengage Learning. Powered by Cognero.

Page 23


Module 03: Data and Business Intelligence QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.3 TOPICS: Database management system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 53. In the context of the operators used in a query by example (QBE) form, the _____ is used when only one of the conditions in the QBE form must be met. a. NOT operator b. AND operator c. OR operator d. NOR operator ANSWER: c RATIONALE: Correct. When using QBE in the data manipulation component of a database management system (DBMS), the OR operator is used when only one of the conditions in the QBE form must be met. For example, “Major = MIS OR GPA > 3.8” means that if a student has a GPA higher than 3.8, he can be majoring in another field, such as accounting. Alternatively, if a student is majoring in MIS, she can have a GPA of 3.8 or lower. See 3-3: Components of a DBMS POINTS: 1 DIFFICULTY: Easy REFERENCES: Define the five components of a database management system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.3 TOPICS: Database management system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 54. Which component of a database management system (DBMS) is used to design elements of an application using a database, such as data entry screens, interactive menus, and interfaces with other programming languages? a. application generation b. application definition c. application administration d. application manipulation ANSWER: a RATIONALE: Correct. The application generation component of a DBMS is used to design elements of an application using a database, such as data entry screens, interactive menus, and interfaces with other programming languages. See 3-3: Components of a DBMS POINTS: 1 DIFFICULTY: Easy REFERENCES: Define the five components of a database management system. Copyright Cengage Learning. Powered by Cognero.

Page 24


Module 03: Data and Business Intelligence QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.3 TOPICS: Database management system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 55. The data _____ component of a database management system (DBMS) is used for tasks such as backup and recovery, security, and change management. a. manipulation b. generation c. definition d. administration ANSWER: d RATIONALE: Correct. The data administration component of a DBMS is used for tasks such as backup and recovery, security, and change management. This component is also used to determine who has permission to perform certain functions such as create, update, read, and delete. See 3-3: Components of a DBMS POINTS: 1 DIFFICULTY: Easy REFERENCES: Define the five components of a database management system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.3 TOPICS: Database management system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 56. In the context of the data administration component of a database management system (DBMS), the acronym CRUD stands for _____. a. create, read, update, and delete b. copy, revise, undo, and define c. create, repeat, undo, and develop d. copy, read, update, and define ANSWER: a RATIONALE: Correct. The data administration component of a DBMS is used to determine who has permission to perform certain functions, often summarized as create, read, update, and delete (CRUD). See 3-3: Components of a DBMS POINTS: 1 DIFFICULTY: Easy REFERENCES: Define the five components of a database management system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 25


Module 03: Data and Business Intelligence LEARNING OBJECTIVES: MIS.10e.3.3 TOPICS: Database management system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 57. A _____ acts as an interface to a database, retrieving data for users and allowing users to enter data in the database. a. data-driven Web site b. flat Web page c. stationary Web page d. static Web site ANSWER: a RATIONALE: Correct. A data-driven Web site acts as an interface to a database, retrieving data for users and allowing users to enter data in the database. A data-driven Web site changes automatically because it retrieves content from external dynamic data sources, such as MySQL, Microsoft SQL Server, Microsoft Access, Oracle, IBM DB2, and other databases. See 3-4: Recent Trends in Database Design and Use POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize three recent trends in database design and use. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.4 TOPICS: Database information uses Database trends KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 58. Which type of databases is not limited by the data’s physical location? a. distributed b. relational c. multi-structured d. semi-structured ANSWER: a RATIONALE: Correct. Organizations choose a distributed database because it is not limited by the data’s physical location. Security issues are more challenging in a distributed database because of multiple access points from both inside and outside an organization. See 3-4: Recent Trends in Database Design and Use POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize three recent trends in database design and use. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.4 Copyright Cengage Learning. Powered by Cognero.

Page 26


Module 03: Data and Business Intelligence TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Database information uses Database trends Apply 10/22/2019 1:28 PM 10/22/2019 1:28 PM

59. Which approach to set up a distributed database management system (DDBMS) combines the fragmentation approach and the replication approach? a. optimization b. allocation c. encapsulation d. normalization ANSWER: b RATIONALE: Correct. The allocation approach, used to set up a DDBMS, combines fragmentation and replication. This method improves response time for local users (those in the same location as the database storage facilities). See 3-4: Recent Trends in Database Design and Use POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize three recent trends in database design and use. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.4 TOPICS: Database information uses Database trends KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 60. A data _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence. a. dictionary b. pattern c. mine d. warehouse ANSWER: d RATIONALE: Correct. A data warehouse is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence. Data warehouses store multidimensional data. See 3-5: Data Warehouses POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze the four major functions of a data warehouse and their use for businesses. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.5 Copyright Cengage Learning. Powered by Cognero.

Page 27


Module 03: Data and Business Intelligence TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Data warehouses Analyze 10/22/2019 1:28 PM 10/22/2019 1:28 PM

61. Data warehouses are sometimes called hypercubes because they _____. a. are function oriented b. store multidimensional data c. capture raw transaction data d. manage transactions ANSWER: b RATIONALE: Correct. Data warehouses store multidimensional data, so they are sometimes called “hypercubes.” See 3-5: Data Warehouses POINTS: 1 DIFFICULTY: Moderate REFERENCES: Analyze the four major functions of a data warehouse and their use for businesses. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.5 TOPICS: Data warehouses KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 62. In contrast to data in a database, data in a data warehouse is described as subject oriented, which means that it _____. a. captures aggregated data b. manages data transactions c. focuses on a specific area d. categorizes based on time ANSWER: c RATIONALE: Correct. Data in a data warehouse is subject oriented, which is focused on a specific area, whereas data in a database is transaction/function oriented. See 3-5: Data Warehouses POINTS: 1 DIFFICULTY: Moderate REFERENCES: Analyze the four major functions of a data warehouse and their use for businesses. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.5 TOPICS: Data warehouses KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM Copyright Cengage Learning. Powered by Cognero.

Page 28


Module 03: Data and Business Intelligence 63. Unlike data in databases, data in data warehouses is: a. function oriented. b. raw transaction data. c. collected from a single source. d. used for analytical purposes. ANSWER: d RATIONALE: Correct. Data in a data warehouse is used for analytical purposes, whereas data in a database is used for capturing and managing transactions. See 3-5: Data Warehouses POINTS: 1 DIFFICULTY: Challenging REFERENCES: Analyze the four major functions of a data warehouse and their use for businesses. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.5 TOPICS: Data warehouses KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 64. In the context of the input component of a data warehouse, _____ collect, integrate, and process data that can be used by all functional areas in an organization. a. online analytical processing systems b. online transaction management systems c. enterprise resource planning systems d. data mining analysis systems ANSWER: c RATIONALE: Correct. Enterprise resource planning systems collect, integrate, and process data that can be used by all functional areas in an organization. See 3-5: Data Warehouses POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze the four major functions of a data warehouse and their use for businesses. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.5 TOPICS: Data warehouses KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 65. In a data warehouse, _____ is the process of collecting data from a variety of sources and converting it into a format that can be used in transformation processing. a. extraction b. transformation Copyright Cengage Learning. Powered by Cognero.

Page 29


Module 03: Data and Business Intelligence c. optimization d. aggregation ANSWER: RATIONALE:

a Correct. Extraction is the process of collecting data from a variety of sources and converting it into a format that can be used in transformation processing. See 3-5: Data Warehouse POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze the four major functions of a data warehouse and their use for businesses. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.5 TOPICS: Data warehouses KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 66. In data warehouses, _____ is information about data-its content, quality, condition, origin, and other characteristics. a. metadata b. big data c. summary data d. raw data ANSWER: a RATIONALE: Correct. Metadata is information about data-its content, quality, condition, origin, and other characteristics. It tells users how, when, and by whom data was collected and how data has been formatted and converted into its present form. See 3-5: Data Warehouses POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze the four major functions of a data warehouse and their use for businesses. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.5 TOPICS: Data warehouses KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 67. A data _____ is usually a smaller version of a data warehouse, used by a single department or function. a. domain b. mine c. dictionary d. mart ANSWER: d Copyright Cengage Learning. Powered by Cognero.

Page 30


Module 03: Data and Business Intelligence RATIONALE:

Correct. A data mart is usually a smaller version of a data warehouse, used by a single department or function. Data marts focus on business functions for a specific user group in an organization, such as a data mart for the Marketing Department. See 3-6: Data Marts POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the functions of a data mart. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.6 TOPICS: Data marts KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 68. Which statement is true of data marts and data warehouses? a. Consolidating information from different departments is easier in data marts than in data warehouses. b. Data marts have more extended scope than data warehouses. c. Access to data is often slower in data marts than in data warehouses. d. Data marts usually perform the same types of analysis as data warehouses. ANSWER: d RATIONALE: Correct. Despite being smaller, data marts can usually perform the same types of analysis as data warehouses. However, data marts usually have more limited scope than data warehouses. See 3-6: Data Marts POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the functions of a data mart. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.6 TOPICS: Data marts KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 69. Business analytics uses _____ to gain insight into data and provide decision makers with information they can act on. a. predictive modeling b. dashboards c. query reports d. application generators ANSWER: a RATIONALE: Correct. Business analytics uses statistical analysis, data mining tools, and predictive modeling to gain insight into data and provide decision makers with information they can act on. See 3-7: Business Analytics POINTS: 1 DIFFICULTY: Easy Copyright Cengage Learning. Powered by Cognero.

Page 31


Module 03: Data and Business Intelligence REFERENCES: Explain business analytics and its role in the decision-making process. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.7 TOPICS: Business analytics KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 70. Which statement is true of big data? a. It eliminates unethical actions based on interpretations. b. It can be efficiently processed and managed by conventional computing methods. c. It has three dimensions, which are value, density, and uniformity. d. It is the result of the exponential growth of data in both public and private organizations. ANSWER: d RATIONALE: Correct. The result of the exponential growth of data in both public and private organizations, big data is data so voluminous that conventional methods are not able to efficiently process and manage it. See 3-8: The Big Data Era POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine the advantages and challenges of big data and predictive analytics for a business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.8 TOPICS: Big data KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 71. The _____ dimension of big data refers to the sheer quantity of transactions, measured in petabytes or exabytes. a. velocity b. volume c. area d. time ANSWER: b RATIONALE: Correct. The volume dimension of big data refers to the sheer quantity of transactions, measured in petabytes or exabytes. The other dimensions are velocity and variety. See 3-8: The Big Data Era POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the advantages and challenges of big data and predictive analytics for a business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 32


Module 03: Data and Business Intelligence LEARNING OBJECTIVES: MIS.10e.3.8 TOPICS: The Big Data Era KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 72. The variety dimension of big data refers to the combination of _____. a. data warehouses and data marts b. object-oriented data models and relational data models c. structured data and unstructured data d. data definition and data manipulation ANSWER: c RATIONALE: Correct. The variety dimension of big data refers to the combination of structured data (e.g., customers’ product ratings between 1 and 5) and unstructured data (e.g., customer complaints about a service or product). See 3-8: The Big Data Era POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the advantages and challenges of big data and predictive analytics for a business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.8 TOPICS: The Big Data Era KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 73. Which is a key factor that has contributed to the growth and popularity of big data? a. Implosion in data growth b. Brick and mortar businesses c. Mobile and wireless technology d. Exponential decay of organizational data ANSWER: c RATIONALE: Correct. Mobile and wireless technology, the popularity of social networks, and the enhanced power and sophistication of smartphones and handheld devices are among the key factors that have contributed to the growth and popularity of big data. See 3-8: The Big Data Era POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine the advantages and challenges of big data and predictive analytics for a business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.8 TOPICS: The Big Data Era Copyright Cengage Learning. Powered by Cognero.

Page 33


Module 03: Data and Business Intelligence KEYWORDS: DATE CREATED: DATE MODIFIED:

Analyze 10/22/2019 1:28 PM 10/22/2019 1:28 PM

74. _____ can be described as using an organization’s database of customers and potential customers in order to promote products or services that an organization offers. a. Database mining b. Database marketing c. Data encapsulation d. Data normalization ANSWER: b RATIONALE: Correct. Database marketing can be described as using an organization’s database of customers and potential customers in order to promote products or services that an organization offers. See 3-9: Database Marketing POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain database marketing and its business applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.9 TOPICS: Database information uses Database trends KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 75. Which statement is true of database marketing? a. It works by using univariate analysis to transform marketing from a proactive to a reactive process. b. It works by utilizing information that can be found outside the organizational database. c. It makes an organization responsive to the needs of its customers. d. It allows an organization to resist changes in the marketplace. ANSWER: c RATIONALE: Correct. Database marketing makes an organization responsive to the needs and desires of its customers and also allows the organization to better respond to changes in the marketplace. See 3-9: Database Marketing POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain database marketing and its business applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.9 TOPICS: Database trends KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM Copyright Cengage Learning. Powered by Cognero.

Page 34


Module 03: Data and Business Intelligence 76. In the context of database marketing, when a buyer is segmented on the basis of variable psychographics, it explains _____. a. why the buyer buys a product or service b. who the buyer is c. how the buyer buys a product or service d. where the buyer is ANSWER: a RATIONALE: Correct. In the context of database marketing, when a buyer is segmented with respect to the variable psychographics, it explains “why” he/she buys a product or service. See 3-9: Database Marketing POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain database marketing and its business applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.9 TOPICS: Database information uses KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 77. A data _____ is the structure and organization of data, which involves fields, records, and files. a. mine b. mart c. warehouse d. hierarchy ANSWER: d RATIONALE: A data hierarchy is the structure and organization of data, which involves fields, records, and files. In a database, a file is a group of related records, and a record is a group of related fields. See 3-1: Databases POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a database and use of a database management system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.1 TOPICS: Database defined Hierarchical database models KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 78. A _____ is software for creating, storing, maintaining, and accessing database files. a. database management system Copyright Cengage Learning. Powered by Cognero.

Page 35


Module 03: Data and Business Intelligence b. data hierarchical system c. database modelling tool d. data warehousing tool ANSWER: a RATIONALE: A database management system (DBMS) is software for creating, storing, maintaining, and accessing database files. A DBMS makes using databases more efficient. See 3-1: Databases POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a database and use of a database management system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.1 TOPICS: Databases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 79. In a(n) _____, records in files are organized and processed in numerical order. a. sequential access file structure b. random access file structure c. indexed access file structure d. direct access file structure ANSWER: a RATIONALE: In a sequential access file structure, records in files are organized and processed in numerical order. Records are organized based on what is known as a “primary key.” See 31: Databases POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a database and use of a database management system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.1 TOPICS: Databases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 80. In a(n) _____ access file structure, records can be accessed in any order, regardless of their physical locations in storage media. a. sequential b. random c. indexed d. direct ANSWER: b Copyright Cengage Learning. Powered by Cognero.

Page 36


Module 03: Data and Business Intelligence RATIONALE:

In a random access file structure, records can be accessed in any order, regardless of their physical locations in storage media. This method of access is fast and very effective when a small number of records needs to be processed daily or weekly. See 3-1: Databases POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a database and use of a database management system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.1 TOPICS: Database management Databases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 81. The advantage of the _____ access method is that both sequential and random access can be used to access records, depending on the number being accessed. a. indexed sequential b. progressive c. direct random d. random-serialized ANSWER: a RATIONALE: The advantage of the indexed sequential access method (ISAM) is that both sequential and random access can be used, depending on the number being accessed. For a small number, random access is used, and for a large number, sequential access is used. See 3-1: Databases POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a database and use of a database management system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.1 TOPICS: Database management Databases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 82. The _____ view of a database involves how information appears to users and how it can be organized and retrieved. a. rational b. physical c. logical d. analytical ANSWER: c RATIONALE: The logical view of a database involves how information appears to users and how it can Copyright Cengage Learning. Powered by Cognero.

Page 37


Module 03: Data and Business Intelligence be organized and retrieved. There can be more than one logical view of data, depending on the user. See 3-2: Logical Database Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 83. In a _____ model, the relationships among records form a treelike structure. a. hierarchical b. relational c. network d. spiral ANSWER: a RATIONALE: In a hierarchical model, the relationships among records form a treelike structure. Records are called nodes, and relationships among records are called branches. See 3-2: Logical Database Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 84. In a relational database, every record must be uniquely identified by a _____ key. a. primary b. super c. remote d. candidate ANSWER: a RATIONALE: In a relational database, every record must be uniquely identified by a primary key. To establish relationships among tables so data can be linked and retrieved more efficiently, a primary key for one table can appear in other tables. See 3-2: Logical Database Design POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain logical database design and the relational database model. Copyright Cengage Learning. Powered by Cognero.

Page 38


Module 03: Data and Business Intelligence QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Relational database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 85. A _____ converts logical requests from users into their physical equivalents by interacting with other components of the database management system (DBMS). a. database engine b. data-driven site c. static site d. database mine ANSWER: a RATIONALE: A database engine, the heart of DBMS software, is responsible for data storage, manipulation, and retrieval. It converts logical requests from users into their physical equivalents (e.g., reports) by interacting with other components of the DBMS (usually the data manipulation component). See 3-3: Components of a DBMS POINTS: 1 DIFFICULTY: Easy REFERENCES: Define the five components of a database management system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.3 TOPICS: Database management system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 86. In large organizations, database design and management is handled by a database _____. a. developer b. evaluator c. synchronizer d. administrator ANSWER: d RATIONALE: In large organizations, database design and management is handled by a database administrator (DBA), although with complex databases this task is sometimes handled by an entire department. The data administration component, also used by IT professionals and database administrators, is used for tasks such as backup and recovery, security, and change management. See 3-3: Components of a DBMS POINTS: 1 DIFFICULTY: Easy REFERENCES: Define the five components of a database management system. QUESTION TYPE: Multiple Choice Copyright Cengage Learning. Powered by Cognero.

Page 39


Module 03: Data and Business Intelligence HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.3 TOPICS: Database management system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 87. In object-oriented databases, grouping objects along with their attributes and methods into a class is called _____. a. allocation b. fragmentation c. encapsulation d. optimization ANSWER: c RATIONALE: Grouping objects along with their attributes and methods into a class is called encapsulation, which essentially means grouping related items into a single unit. It helps handle more complex types of data, such as images and graphs. See 3-4: Recent Trends in Database Design and Use POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize three recent trends in database design and use. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.4 TOPICS: Database information uses KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 88. _____, used in object-oriented databases, refers to new objects being created faster and more easily by entering new data in attributes. a. Fragmentation b. Encapsulation c. Inheritance d. Counterbalance ANSWER: c RATIONALE: Object-oriented databases use inheritance, which means new objects can be created faster and more easily by entering new data in attributes. For example, you can add a BMW as a Vehicle object by having it inherit attributes and methods of the Vehicle class. See 3-4: Recent Trends in Database Design and Use POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize three recent trends in database design and use. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.4 Copyright Cengage Learning. Powered by Cognero.

Page 40


Module 03: Data and Business Intelligence TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Database trends Apply 10/22/2019 1:28 PM 10/22/2019 1:28 PM

89. _____ tools are capable of “drilling up,” proceeding from the smallest unit of data to higher levels. a. Online analytical processing b. Online transaction processing c. Extraction, transformation, and loading d. Business analytics ANSWER: a RATIONALE: Online analytical processing (OLAP) tools are capable of “drilling up,” proceeding from the smallest unit of data to higher levels. OLAP allows you to analyze information that has been summarized in multidimensional views. See 3-5: Data Warehouses POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze the four major functions of a data warehouse and their use for businesses. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.5 TOPICS: Data warehouses KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 90. _____ analysis is used to discover patterns and relationships. a. Data mart b. Data-mining c. Data pattern d. Data-toggling ANSWER: b RATIONALE: Data-mining analysis is used to discover patterns and relationships. For example, datamining tools can be used to examine point-of-sale data to generate reports on customers’ purchase histories. See 3-5: Data Warehouses POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze the four major functions of a data warehouse and their use for businesses. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.5 TOPICS: Data warehouses KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:28 PM Copyright Cengage Learning. Powered by Cognero.

Page 41


Module 03: Data and Business Intelligence DATE MODIFIED:

10/22/2019 1:28 PM

91. In the context of segmentation of customers in database marketing, _____ is a variable that includes gender, age, income, and marital status. a. strategical information b. geographical information c. psychographic information d. demographic information ANSWER: d RATIONALE: While demographics data explain “who” the buyer is, psychographics explain “why” he/she buys a product or service. Demographic information includes gender, age, income, and marital status. See 3-9: Database Marketing POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain database marketing and its business applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.9 TOPICS: Database information uses KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 92. Which of the following are two popular data visualization platforms? a. Excel and PowerPoint b. Apache and Cassandra c. OLTP and OLAP d. Power BI and Tableau ANSWER: d RATIONALE: Correct. Tableau is a data visualization tool used for generating business intelligence. It is used to analyze data for generating trends using graphs and charts. Power BI is a platform that allows a user to analyze and visualize data from different sources with different formats. See 3-10 Tableau and Power BI: Two Popular BI and Visualization Platforms. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain key features of Tableau and Power BI as two popular bi and visualization platforms QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.10 KEYWORDS: Understand DATE CREATED: 11/27/2019 1:45 PM DATE MODIFIED: 11/27/2019 1:51 PM 93. Which of the following is considered a unique feature of Tableau? Copyright Cengage Learning. Powered by Cognero.

Page 42


Module 03: Data and Business Intelligence a. Translating coded values, such as replacing Yes with 1 b. In-depth insights and "what-if" analysis c. Encapsulation d. Allocation ANSWER: b RATIONALE: Correct. Tableau is a data visualization tool used for generating business intelligence. Some of the unique features of Tableau include: In-depth insights: Users can explore the visualizations and view the same data from different angles. Users can perform “what-if” analysis in order to explore the impact of each variable on the entire model. See 3-10 Tableau and Power BI: Two Popular BI and Visualization Platforms. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain key features of Tableau and Power BI as two popular bi and visualization platforms QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.10 KEYWORDS: Understand DATE CREATED: 11/27/2019 1:53 PM DATE MODIFIED: 11/27/2019 2:03 PM 94. Which of the following is not considered an advantage of Power BI? a. Analytics may be misinterpreted and offer support for a decision that may not be ethical b. Seamless integration with other data and existing applications c. Creation of personalized dashboards for different users with diverse information needs d. Delivery of actionable information with high speed, accuracy, and security ANSWER: a RATIONALE: Correct. Power BI from Microsoft is a platform that allows a user to analyze and visualize data from different sources with different formats. Advantages of Power BI include: Seamless integration with other data and existing applications; Creation of personalized dashboards for different users with diverse information needs; Delivery of actionable information with high speed, accuracy, and security. See 3-10 Tableau and Power BI: Two Popular BI and Visualization Platforms. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain key features of Tableau and Power BI as two popular bi and visualization platforms QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.10 KEYWORDS: Understand DATE CREATED: 11/27/2019 2:08 PM DATE MODIFIED: 11/27/2019 2:13 PM 95. The Power BI platform's major components include: a. An online SaaS (software as a service) Copyright Cengage Learning. Powered by Cognero.

Page 43


Module 03: Data and Business Intelligence b. Tableau Server c. Microsoft Access d. SAS Big Data Analytics ANSWER: a RATIONALE: Correct. Power BI from Microsoft is a platform that allows a user to analyze and visualize data from different sources with different formats. Major components of Power BI include: A Windows desktop application called Power BI Desktop; An online SaaS (software as a service) service called the Power BI service; Power BI mobile apps for Windows, iOS, and Android devices. See 3-10 Tableau and Power BI: Two Popular BI and Visualization Platforms. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain key features of Tableau and Power BI as two popular bi and visualization platforms QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.10 KEYWORDS: Understand DATE CREATED: 11/27/2019 2:18 PM DATE MODIFIED: 11/27/2019 2:26 PM 96. Tableau and Power BI are best described as ____________. a. Data marts b. Data warehouses c. Data visualization tools d. Data-driven Web sites ANSWER: c RATIONALE: Correct. Tableau is a data visualization tool used for generating business intelligence. It is used to analyze data for generating trends using graphs and charts. Power BI is a platform that allows a user to analyze and visualize data from different sources with different formats. See 3-10 Tableau and Power BI: Two Popular BI and Visualization Platforms. POINTS: DIFFICULTY: REFERENCES:

1 Easy Explain key features of Tableau and Power BI as two popular bi and visualization platforms QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.10 KEYWORDS: Understand DATE CREATED: 11/27/2019 2:29 PM DATE MODIFIED: 11/27/2019 2:34 PM 97. In the context of a database marketing campaign, _______ tells a business how much it should spend to maintain a relationship. a. enterprise resource planning (ERP) Copyright Cengage Learning. Powered by Cognero.

Page 44


Module 03: Data and Business Intelligence b. extraction, transformation, and loading (ETL) c. recency, frequency, and monetary analysis (RFM) d. customer lifetime value (CLTV) ANSWER: d RATIONALE: Correct. A successful database marketing campaign calculates customer lifetime value (CLTV)—This model predicts and generates an estimate of what the lifetime relationship of a typical customer will be worth to a business. Based on this value, a business would know how much it should spend in order to keep this relationship. See 3-9 Database Marketing. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain database marketing and its business applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.9 KEYWORDS: Understand DATE CREATED: 11/29/2019 3:10 PM DATE MODIFIED: 11/29/2019 3:21 PM 98. In the context of database marketing, demographics data explains which of the following? a. Why the buyer buys a product or service. b. Who the buyer is. c. Which product generated the highest sales. d. How buyers interact with an app. ANSWER: b RATIONALE: Correct. Customers can be segmented by many variables, including demographics, geography, benefits sought, psychographics, price sensitivity, and socioeconomic characteristics. While demographics data explain “who” the buyer is, psychographics explain “why” he or she buys a product or service. Demographic information includes gender, age, income, and marital status. Psychographic information includes habits, hobbies, spending patterns, and values. See 3-9 Database Marketing. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain database marketing and its business applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.9 KEYWORDS: Understand DATE CREATED: 11/29/2019 3:24 PM DATE MODIFIED: 11/29/2019 3:32 PM 99. In the context of big data, velocity is _________. a. the speed with which the data has to be gathered and processed b. the trustworthiness and accuracy of the data c. the value that the collected data brings to the decision-making process Copyright Cengage Learning. Powered by Cognero.

Page 45


Module 03: Data and Business Intelligence d. the quantity of transactions, measured in petabytes or exabytes ANSWER: a RATIONALE: Correct. There are five dimensions to big data, known at the 5 Vs: Volume, variety, velocity, veracity, and value. Velocity—The speed with which the data has to be gathered and processed. See 3-8 The Big Data Era. POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the advantages and challenges of big data and predictive analytics for a business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.8 KEYWORDS: Analyze DATE CREATED: 11/29/2019 4:20 PM DATE MODIFIED: 11/29/2019 4:24 PM 100. Risks associated with big data technology include which of the following? a. Finding unseen patterns that can be used for forecasting and planning. b. Monitoring of vehicles to improve fuel efficiency and delivery routes. c. Increase of RoI by providing real-time analytics. d. Privacy breaches, loss of anonymity, and discrimination. ANSWER: d RATIONALE: Correct. Big data analytics is able to provide key decision makers with unprecedented decision-making support and great potential for gaining a competitive advantage. However, this powerful tool could reveal and expose certain information that puts some people’s privacy at risk. It also may create some legal and ethical concerns. The following list describes the risks associated with this technology: Discrimination, privacy breaches and embarrassments, unethical actions based on interpretations, loss of anonymity, few legal protections. See 3-8 The Big Data Era. POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the advantages and challenges of big data and predictive analytics for a business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.8 KEYWORDS: Analyze DATE CREATED: 11/29/2019 4:34 PM DATE MODIFIED: 11/29/2019 4:41 PM 101. In the context of business analytics, which method reviews past events, analyzes the data, and reports on what happened in a given period? a. Predictive analytics b. Descriptive analytics c. Prescriptive analytics d. Web analytics Copyright Cengage Learning. Powered by Cognero.

Page 46


Module 03: Data and Business Intelligence ANSWER: RATIONALE:

b Correct. There are several types of BA methods. Three popular ones are descriptive, predictive, and prescriptive analytics. Descriptive analytics reviews past events, analyzes the data, and provides a report indicating what happened in a given period and how to prepare for the future. Thus, it is a reactive strategy. See 3-7 Business Analytics. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain business analytics and its role in the decision-making process. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.7 KEYWORDS: Understand DATE CREATED: 11/30/2019 2:19 PM DATE MODIFIED: 11/30/2019 2:24 PM 102. In the context of business analytics, which method prepares a decision maker for future events? a. Descriptive analytics b. Prescriptive analytics c. Predictive analytics d. Mobile analytics ANSWER: c RATIONALE: Correct. There are several types of BA methods. Three popular ones are descriptive, predictive, and prescriptive analytics. Predictive analytics, as the name indicates, is a proactive strategy; it prepares a decision maker for future events. As an example, it might indicate that if a current sales trend continues, a company will need a certain number of salespeople in the coming years. See 3-7 Business Analytics. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain business analytics and its role in the decision-making process. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.7 KEYWORDS: Understand DATE CREATED: 11/30/2019 2:26 PM DATE MODIFIED: 11/30/2019 2:28 PM 103. Advertising and marketing analytics, in-app analytics, and performance analytics are three popular types of ________ analytics. a. data b. prescriptive c. Web d. mobile ANSWER: d RATIONALE: Correct. There are three popular types of mobile analytics: •

In-app analytics—Determines who your users are and how they interact with the

Copyright Cengage Learning. Powered by Cognero.

Page 47


Module 03: Data and Business Intelligence • •

app Performance analytics—Ensures the app’s functional and operational success by measuring the app uptime and app responsiveness Advertising and marketing analytics—Determines which ad a user clicked that led the user to install the app on his or her device

See 3-7 Business Analytics. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain business analytics and its role in the decision-making process. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.7 KEYWORDS: Understand DATE CREATED: 11/30/2019 2:35 PM DATE MODIFIED: 11/30/2019 2:39 PM 104. Which of the following is not an advantage that data marts have over data warehouses? a. Access to data is often faster because of their smaller size. b. They are less expensive. c. Response time for users is improved. d. They are larger and often more complex. ANSWER: d RATIONALE: Correct. Data marts have the following advantages over data warehouses: • • • • •

Access to data is often faster because of their smaller size. Response time for users is improved. They are easier to create because they are smaller and often less complex. They are less expensive. Users are targeted better because a data mart is designed for a specific department or division; identifying their requirements and the functions they need is easier. A data warehouse is designed for an entire organization’s use.

Data marts, however, usually have more limited scope than data warehouses, and consolidating information from different departments or functional areas (such as sales and production) is more difficult. See 3-6 Data Marts. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the functions of a data mart. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.6 KEYWORDS: Understand DATE CREATED: 11/30/2019 3:19 PM DATE MODIFIED: 11/30/2019 3:27 PM 105. A data mart is usually _______ a data warehouse. Copyright Cengage Learning. Powered by Cognero.

Page 48


Module 03: Data and Business Intelligence a. larger than b. the same size as c. smaller than d. more expensive than ANSWER: RATIONALE:

c Correct. A data mart is usually a smaller version of a data warehouse, used by a single department or function. Data marts focus on business functions for a specific user group in an organization, such as a data mart for the marketing department. Despite being smaller, data marts can usually perform the same types of analysis as a data warehouse. See 3-6 Data Marts. POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the functions of a data mart. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.3.6 KEYWORDS: Understand DATE CREATED: 11/30/2019 3:29 PM DATE MODIFIED: 11/30/2019 3:34 PM Essay 106. Discuss how data was stored in flat files in the past. Explain the disadvantages associated with the flat file organization. ANSWER: Answers will vary. In the past, data was stored in a series of files that were called flat files because they were not arranged in a hierarchy, and there was no relationship among these files. The problem with this flat file organization was that the same data could be stored in more than one file, creating data redundancy. For example, in a customer database, a customer’s name might be stored in more than one table. This duplication takes up unnecessary storage space and can make retrieving data inefficient. Updating a flat file system can be time consuming and inefficient. Data might not be updated in all files consistently, resulting in conflicting reports generated from these files. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe a database and use of a database management system. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.3.1 TOPICS: Databases Hierarchical database models KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 107. Discuss the advantages of a database over a flat file system. Copyright Cengage Learning. Powered by Cognero.

Page 49


Module 03: Data and Business Intelligence ANSWER:

Answers will vary. A database has the following advantages over a flat file system: a. More information can be generated from the same data. b. Complex requests can be handled more easily. c. Data redundancy is eliminated or minimized. d. Programs and data are independent, so more than one program can use the same data. e. Data management is improved. f. A variety of relationships among data can be easily maintained. g. More sophisticated security measures can be used. h. Storage space is reduced. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe a database and use of a database management system. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.3.1 TOPICS: Databases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 108. Discuss some examples of sources for external data. ANSWER: Answers will vary. The following are examples of sources for external data: • Competitors, customers, and suppliers • Distribution networks • Economic indicators (e.g., the consumer price index) • Government regulations • Labor and population statistics • Tax records POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe a database and use of a database management system. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.3.1 TOPICS: Databases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 109. Describe how records are accessed in a random access file structure. ANSWER: Answers will vary. In a random access file structure, records can be accessed in any order, regardless of their physical locations in storage media. This method of access is fast and very effective when a small number of records needs to be processed daily or weekly. To achieve this speed, these records are often stored on magnetic disks. POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 50


Module 03: Data and Business Intelligence DIFFICULTY: Moderate REFERENCES: Describe a database and use of a database management system. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.3.1 TOPICS: Databases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 110. Explain how information in a database is observed through the physical view and the logical view. ANSWER: Answers will vary. Before designing a database, you need to know the two ways information is viewed in a database. The physical view involves how data is stored on and retrieved from storage media, such as hard disks, magnetic tapes, or CDs. For each database, there is only one physical view of data. The logical view involves how information appears to users and how it can be organized and retrieved. There can be more than one logical view of data, depending on the user. For example, marketing executives might want to see data organized by top-selling products in a specific region; the finance officer might need to see data organized by cost of raw materials for each product. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 111. Briefly explain a relational model. ANSWER: Answers will vary. A relational model uses a two-dimensional table of rows and columns of data. Rows are records (also called tuples), and columns are fields (also referred to as attributes). To begin designing a relational database, you must define the logical structure by defining each table and the fields in it. The collection of these definitions is stored in the data dictionary. The data dictionary can also store other definitions, such as data types for fields, default values for fields, and validation rules for data in each field. In a relational database, every record must be uniquely identified by a primary key. To establish relationships among tables so data can be linked and retrieved more efficiently, a primary key for one table can appear in other tables. In this case, it is called a foreign key. Data stored in a relational model is retrieved from tables by using operations that pick and combine data from one or more tables. There are several operations, such as select, project, join, intersect, union, and difference. POINTS: 1 DIFFICULTY: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 51


Module 03: Data and Business Intelligence REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Relational database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 112. Describe the tasks performed in the first normal form (1NF) stage of normalization to improve database efficiency. ANSWER: Answers will vary. To improve database efficiency, a process called normalization is used, which eliminates redundant data and ensures that only related data is stored in a table. Normalization can go through several stages, from first normal form (1NF) to fifth normal form (5NF). Typically, however, only stages 1NF through 3NF are used. The following tasks are performed in the 1NF stage: a. Eliminate duplicated fields from the same table. b. Create separate tables for each group of related data. c. Identify each record with a unique field (the primary key). POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Relational database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 113. Describe how data stored in a relational model is retrieved from tables. ANSWER: Answers will vary. Data stored in a relational model is retrieved from tables by using operations that pick and combine data from one or more tables. There are several operations, such as select, project, join, intersect, union, and difference. The first three operations are the most commonly used. A select operation searches data in a table and retrieves records based on certain criteria (also called conditions). A project operation pares down a table by eliminating columns (fields) according to certain criteria. A join operation combines two tables based on a common field (e.g., the primary key in the first table and the foreign key in the second table). POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain logical database design and the relational database model. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic Copyright Cengage Learning. Powered by Cognero.

Page 52


Module 03: Data and Business Intelligence LEARNING OBJECTIVES: MIS.10e.3.2 TOPICS: Relational database design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 114. Explain the function of the data definition component of a database management system. ANSWER: Answers will vary. The data definition component of a database management system is used to create and maintain the data dictionary and define the structure of files in a database. Any changes to a database’s structure, such as adding a field, deleting a field, changing a field’s size, or changing the data type stored in a field, are made with this component. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define the five components of a database management system. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.3.3 TOPICS: Database management system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 115. In the context of the data manipulation component of a database management system (DBMS), briefly explain structured query language (SQL). ANSWER: Answers will vary. The data manipulation component is used to add, delete, modify, and retrieve records from a database. Typically, a query language is used for this component. SQL is a standard fourth-generation query language used by many DBMS packages, such as Oracle Database 12c and Microsoft SQL Server. SQL consists of several keywords specifying actions to take. The basic format of an SQL query is as follows: SELECT field FROM table or file WHERE conditions After the SELECT keyword, you list the fields you want to retrieve. After FROM, you list the tables or files from where the data is retrieved, and after WHERE, you list conditions (criteria) for retrieving the data. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define the five components of a database management system. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.3.3 TOPICS: Database management system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM Copyright Cengage Learning. Powered by Cognero.

Page 53


Module 03: Data and Business Intelligence 116. Briefly explain the responsibilities of a database administrator (DBA). ANSWER: Answers will vary. A DBA’s responsibilities include the following: a. Designing and setting up a database b. Establishing security measures to determine users’ access rights c. Developing recovery procedures in case data is lost or corrupted d. Evaluating database performance e. Adding and fine-tuning database functions POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define the five components of a database management system. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.3.3 TOPICS: Database management system components KEYWORDS: Remember DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 117. Discuss why an organization might choose a distributed database. ANSWER: Answers will vary. A distributed database management system (DDBMS) stores data on multiple servers throughout an organization. Here are some of the reasons an organization would choose a distributed database: • The design better reflects the organization’s structure. • Local storage of data decreases response time but increases communication costs. • Distributing data among multiple sites minimizes the effects of computer failures. If one database server goes down, it does not affect the entire organization. • The number of users of an information system is not limited by one computer’s capacity or processing power. • Several small integrated systems might cost less than one large server. • Accessing one central database server could increase communication costs for remote users. Storing some data at remote sites can help reduce these costs. • Distributed processing, which includes database design, is used more widely now and is often more responsive to users’ needs than centralized processing. • A distributed database is not limited by the data’s physical location. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize three recent trends in database design and use. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.3.4 TOPICS: Database trends KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 118. Describe the fragmentation approach to setting up a distributed database management system (DDBMS). Copyright Cengage Learning. Powered by Cognero.

Page 54


Module 03: Data and Business Intelligence ANSWER:

Answers will vary. The fragmentation approach to setting up a DDBMS addresses how tables are divided among multiple locations. Horizontal fragmentation breaks a table into rows, storing all fields (columns) in different locations. Vertical fragmentation stores a subset of columns in different locations. Mixed fragmentation, which combines vertical and horizontal fragmentation, stores only site-specific data in each location. If data from other sites is needed, the DDBMS retrieves it. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize three recent trends in database design and use. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.3.4 TOPICS: Database information uses KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 119. Describe the features and benefits of an object-oriented database. ANSWER: Answers will vary. Like object-oriented programming, an object-oriented database represents real-world entities with database objects. An object consists of attributes (characteristics describing an entity) and methods (operations or calculations) that can be performed on the object’s data. For example, a real-world car can be represented by an object in the Vehicle class. Objects in this class have attributes of year, make, model, and license number, for example. You can then use methods to work with data in a Vehicle object, such as the AddVehicle method to add a car to the database. Thinking of classes as categories or types of objects can be helpful. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize three recent trends in database design and use. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.3.4 TOPICS: Database information uses KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 120. List and describe the features of data in a data warehouse in contrast to data in a database. ANSWER: Answers will vary. Data in a data warehouse is described as having the following characteristics in contrast to data in a database: a. Subject oriented: Data in a data warehouse is focused on a specific area, such as the home-improvement business or a university. Data in a database is transaction/function oriented. b. Integrated: Data in a data warehouse comes from a variety of sources, whereas data in a database usually does not. Copyright Cengage Learning. Powered by Cognero.

Page 55


Module 03: Data and Business Intelligence c. Time variant: Data in a data warehouse is categorized based on time, such as historical information, whereas data in a database only keeps recent activity in memory. d. Type of data: Data in a data warehouse captures aggregated data, whereas data in a database captures raw transaction data. e. Purpose: Data in a data warehouse is used for analytical purposes, whereas data in a database is used for capturing and managing transactions. POINTS: 1 DIFFICULTY: Challenging REFERENCES: Analyze the four major functions of a data warehouse and their use for businesses. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.3.5 TOPICS: Data warehouses KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 121. In the context of data warehouses, briefly explain extraction, transformation, and loading (ETL). ANSWER: Answers will vary. ETL refers to the processes used in a data warehouse. Extraction means collecting data from a variety of sources and converting it into a format that can be used in transformation processing. The extraction process can also parse (divide into pieces) data to make sure it meets the data warehouse’s structural needs. Transformation processing is done to make sure data meets the data warehouse’s needs. Loading is the process of transferring data to the data warehouse. Depending on the organization’s needs and the data warehouse’s storage capacity, loading might overwrite existing data or add collected data to existing data. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Analyze the four major functions of a data warehouse and their use for businesses. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.3.5 TOPICS: Data warehouses KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 122. Discuss the advantages of data marts over data warehouses. ANSWER: Answers will vary. Data marts have the following advantages over data warehouses: a. Access to data is often faster because of their smaller size. b. Response time for users is improved. c. They are easier to create because they are smaller and often less complex. d. They are less expensive. Copyright Cengage Learning. Powered by Cognero.

Page 56


Module 03: Data and Business Intelligence e. Users are targeted better, because a data mart is designed for a specific department or division; identifying their requirements and the functions they need is easier. A data warehouse is designed for an entire organization’s use. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the functions of a data mart. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.3.6 TOPICS: Data marts KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 123. Briefly explain the role of business analytics (BA) in decision making and compare it to business intelligence (BI). ANSWER: Answers will vary. BA uses data and statistical methods to gain insight into the data and provide decision makers with information they can act on. BA is increasingly used for data-driven decision making that leverages and explores the data in a database, data warehouse, or data mart system. Compared to BI, BA is more forward looking; it tells the user what is going to happen in the future rather than what has happened in the past. BI can help determine what happened, what the problem is, and what decisions need to be made based on the available data. BA can help determine why this is happening, what it will mean if the sales trend continues, and what actions should be taken. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain business analytics and its role in the decision-making process. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.3.7 TOPICS: Business analytics KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 124. Briefly explain the types of business analytics (BA) methods. ANSWER: Answers will vary. There are several types of BA methods. Three popular ones are descriptive, predictive, and prescriptive analytics. Descriptive analytics reviews past events, analyzes the data, and provides a report indicating what happened in a given period and how to prepare for the future. Thus, it is a reactive strategy. Predictive analytics, as the name indicates, is a proactive strategy; it prepares a decision maker for future events. As an example, it might indicate that if a current sales trend continues, a company will need a certain number of salespeople in 2018. Prescriptive analytics goes beyond descriptive and predictive analytics by recommending a course of action that a decision maker should follow and showing the likely outcome of each decision. In another words prescriptive analytics is more specific than predictive analytics by recommending a precise course of Copyright Cengage Learning. Powered by Cognero.

Page 57


Module 03: Data and Business Intelligence action. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain business analytics and its role in the decision-making process. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.3.7 TOPICS: Business analytics KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 125. Briefly discuss the advantages and disadvantages of database marketing. ANSWER: Answers will vary. Database marketing offers several advantages, including improved profitability, increased sales, improved marketing communications, and improved product development. High startup costs, such as hardware and software, and the ongoing operational costs are among the drawbacks of database marketing. And for effective utilization and operation of a successful database marketing program, employees with technical knowledge are needed. This may put this technology out of reach for small organizations that have limited budget. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain database marketing and its business applications. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.3.9 TOPICS: Database trends KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 126. Explain key features and uses of Tableau in the context of business intelligence and data visualization. ANSWER: Answers will vary. Tableau is a data visualization tool used for generating business intelligence. It is used to analyze data for generating trends using graphs and charts. Tableau users can: • • •

Explore and find quick patterns in data Reproduce and further analyze data patterns Create multiple charts to get meaningful insight in data

Tableau is a powerful platform for performing visual analytics that helps design visualizations that users with minimal analytics backgrounds can easily understand and use. It can utilize data from various sources including data files (with various formats such as Excel and PDF) and relational databases, as well as big data sources. It is extensively used by both private and public sectors including academic researchers, businesses, and Copyright Cengage Learning. Powered by Cognero.

Page 58


Module 03: Data and Business Intelligence many government agencies. Some of the unique features of Tableau include: •

• • •

Superb visualizations: Users can switch between different visualizations in order to zero in on a particular data point by drilling up and down. In-depth insights: Users can explore the visualizations and view the same data from different angles. Users can perform “what-if” analysis in order to explore the impact of each variable on the entire model. User-friendly interface: Most of the features and visualization in Tableau are accessed by drag-and-drop and no programming is needed to use this platform. Working with disparate data sources: Users can connect, use, and analyze data from various data sources including data warehouses, data marts, spreadsheets, and big data sources. Adding data sets to existing data: New data sets from various sources could easily be added and blended to the existing data for further analysis.

POINTS: DIFFICULTY: REFERENCES:

1 Challenging Explain key features of Tableau and Power BI as two popular business intelligence and visualization platforms. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.3.10 KEYWORDS: Understand DATE CREATED: 11/27/2019 2:36 PM DATE MODIFIED: 11/27/2019 2:45 PM 127. Explain key features and uses of Power BI in the context of business intelligence and data visualization. ANSWER: Answers will vary. Power BI from Microsoft is a platform that allows a user to analyze and visualize data from different sources with different formats. Data may be an Excel spreadsheet, data from the cloud, or from data warehouses and data marts. Visualization allows the user to discover patterns and understand important points in the data that may not be easily understood otherwise. Power BI is for extensive modeling and real-time analytics. It allows users to create, share, and utilize business insights for effective decision making. It may be used for many different purposes by many different users. As an example, a finance executive may use it for number-crunching and creating business reports. A marketing executive may use it to monitor sales trends and achieve sales goals. Yet a production and operation executive may use it in order to spot production efficiency and meet production goals. Advantages of Power BI include: • • •

Seamless integration with other data and existing applications Creation of personalized dashboards for different users with diverse information needs Delivery of actionable information with high speed, accuracy, and security

Major components of Power BI include: • •

A Windows desktop application called Power BI Desktop An online SaaS (software as a service) service called the Power BI service

Copyright Cengage Learning. Powered by Cognero.

Page 59


Module 03: Data and Business Intelligence •

Power BI mobile apps for Windows, iOS, and Android devices

POINTS: DIFFICULTY: REFERENCES:

1 Challenging Explain key features of Tableau and Power BI as two popular business intelligence and visualization platforms. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.3.10 KEYWORDS: Understand DATE CREATED: 11/27/2019 2:48 PM DATE MODIFIED: 11/27/2019 2:51 PM

Copyright Cengage Learning. Powered by Cognero.

Page 60


Module 04: Personal, Legal, and Ethical Organizational Issues True / False 1. With employee-monitoring systems, managers can supervise employees’ work speeds. a. True b. False ANSWER: True RATIONALE: Correct With employee-monitoring systems, managers can supervise employees’ performance— the number of errors they make, their work speeds, and their time away from the desk. Naturally, this monitoring has made some workers concerned about their privacy. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Electronic surveillance and monitoring Information privacy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 11/30/2019 5:01 PM 2. Information technologies have decreased the ease of access to information for hackers as well as for legitimate organizations. a. True b. False ANSWER: False RATIONALE: Correct Unfortunately, information technologies have increased the ease of access to information for hackers as well as for legitimate organizations. In terms of electronic information, most people believe they should be able to keep their personal affairs to themselves and should be told how information about them is being used. Based on this definition, many practices of government agencies, credit agencies, and marketing companies using databases would represent an invasion of privacy. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Electronic surveillance and monitoring KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM Copyright Cengage Learning. Powered by Cognero.

Page 1


Module 04: Personal, Legal, and Ethical Organizational Issues 3. To minimize the invasion of privacy, users should be barred from reviewing their records. a. True b. False ANSWER: False RATIONALE: Correct To minimize the invasion of privacy, users should be able to review their records and correct any inaccuracies. The existence of record-keeping systems storing personal data should not be kept secret. In addition, there must be a way for people to find out what information about them has been stored and how it is used. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Electronic surveillance and monitoring Information privacy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 4. According to the Children’s Online Privacy Protection Act (COPPA), any information collected from children must have parental consent. a. True b. False ANSWER: True RATIONALE: Correct The goal of the COPPA is to protect the privacy of children under the age of 13. Web sites directed to children must publish their privacy policies. Any information collected from children must have parental consent. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Privacy laws KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 5. E-wallets and smart cards increase the risks of exposing consumers’ information on the Web. a. True b. False ANSWER: False RATIONALE: Correct Copyright Cengage Learning. Powered by Cognero.

Page 2


Module 04: Personal, Legal, and Ethical Organizational Issues To lessen consumers’ concerns, many credit card companies reimburse fraudulent charges. In addition, other electronic payment systems are being developed, such as e-wallets and smart cards, that reduce the risks of exposing consumers’ information on the Web. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Information privacy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 6. Because sending spam is expensive, a small response—a fraction of a percent, for example—is an inadequate return on the investment. a. True b. False ANSWER: False RATIONALE: Correct Because sending spam is so inexpensive, even a small response-a fraction of a percent, for example-is a worthwhile return on the investment. Usually, spam is sent in bulk using automated mailing software, and many spammers sell their address lists. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Information privacy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 12/2/2019 1:48 PM 7. Private information on the Web—what is posted by a person—is subject to censorship. a. True b. False ANSWER: False RATIONALE: Correct Private information on the Web-what is posted by a person-is not subject to censorship because of the person’s constitutional freedom of expression. Public information, posted by an organization or public agency, can be censored for public policy reasons. See 4-2: Ethical Issues of Information Technologies POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 3


Module 04: Personal, Legal, and Ethical Organizational Issues DIFFICULTY: Easy REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Ethics IT codes of conduct KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 12/2/2019 2:02 PM 8. As a knowledge worker, while making a work-related decision, it is unnecessary to check if the decision complies with the organization's values. a. True b. False ANSWER: False RATIONALE: Correct As a knowledge worker, you should consider the following questions and statements before making a work-related decision: 1. 2. 3. 4. 5. 6.

Does this decision comply with my organization’s values? How will I feel about myself after making this decision? If I know this decision is wrong, I must not make it. If I am not sure about this decision, I must ask my supervisor before making it. Is the decision right? Is the decision fair? How will I feel if somebody else makes this decision on my behalf? 7. Is the decision legal? 8. Would I want everyone to know about this decision after I make it? See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine ethical issues and censorship of information technology. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.4 KEYWORDS: Apply DATE CREATED: 12/2/2019 3:17 PM DATE MODIFIED: 12/2/2019 3:22 PM 9. Copyright laws cover online materials that can be printed or saved on a storage device. a. True b. False ANSWER: True RATIONALE: Correct Generally, copyright laws protect tangible material, such as books, drawings, and so forth. Copyright Cengage Learning. Powered by Cognero.

Page 4


Module 04: Personal, Legal, and Ethical Organizational Issues However, they also cover online materials, including Web pages, HTML code, and computer graphics, as long as the content can be printed or saved on a storage device. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: IT codes of conduct KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 10. A patent protects product names and identifying marks. a. True b. False ANSWER: False RATIONALE: Correct A trademark protects product names and identifying marks (logos, for example). A patent protects new processes. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: IT codes of conduct KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 11. Information technologies have led to job deskilling. a. True b. False ANSWER: True RATIONALE: Correct Information technologies have led to job deskilling. This occurs when skilled labor is eliminated by high technology or when a job is downgraded from a skilled to a semiskilled or unskilled position. See 4-3: The Impact of Information Technology in the Workplace POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. Copyright Cengage Learning. Powered by Cognero.

Page 5


Module 04: Personal, Legal, and Ethical Organizational Issues QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Computers in the workplace KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 12. A virtual organization needs an organizational hierarchy for participants to contribute their expertise. a. True b. False ANSWER: False RATIONALE: Correct A virtual organization does not need an organizational hierarchy for participants to contribute their expertise. Virtual organizations are networks of independent companies, suppliers, customers, and manufacturers connected via information technologies, so they can share skills and costs and have access to each other’s markets. See 4-3: The Impact of Information Technology in the Workplace POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Information technology careers KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 13. Ergonomics experts believe that using better-designed furniture can solve many of the health problems related to computer equipment. a. True b. False ANSWER: True RATIONALE: Correct Ergonomics experts believe that using better-designed furniture as well as flexible or wireless keyboards, correct lighting, special monitors for workers with vision problems, and so forth can solve many of the health problems related to computer equipment. See 43: The Impact of Information Technology in the Workplace POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. QUESTION TYPE: True / False HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 6


Module 04: Personal, Legal, and Ethical Organizational Issues LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Computers in the workplace KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 14. Green computing helps an organization save on energy costs. a. True b. False ANSWER: True RATIONALE: Correct Green computing not only helps an organization save on energy costs but also improves the quality of the environment in which you live and work. See 4-4: Green Computing POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe green computing and the ways it can improve the quality of the environment. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.7 TOPICS: Green computing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 15. One of the ways in which green computing can be achieved is by replacing meetings over computer networks with actual face-to-face meetings. a. True b. False ANSWER: False RATIONALE: Correct One of the ways in which green computing can be achieved is by replacing actual face-toface meetings with meetings over computer networks. Green computing can also be achieved by using video conferencing, electronic meeting systems, and groupware. These technologies can also reduce business travel. See 4-4: Green Computing POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe green computing and the ways it can improve the quality of the environment. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.7 TOPICS: Green computing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM Copyright Cengage Learning. Powered by Cognero.

Page 7


Module 04: Personal, Legal, and Ethical Organizational Issues DATE MODIFIED:

10/22/2019 1:28 PM

16. The General Data Protection Regulation (GDPR) only applies to select EU member states. a. True b. False ANSWER: False RATIONALE: Correct. The General Data Protection Regulation (GDPR) covers a series of laws in order to protect European Union (EU) citizens’ personal data including genetic data, health, racial or ethnic origin, and religious beliefs. The goal is to create more consistent protection of consumer and personal data across EU nations and it applies to each member state of the European Union. Companies that sell products or services to EU residents must be aware of this law and its consequences regardless of their locations. See 4-1a: General Data Protection Regulation (GDPR) POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the general data protection regulation (GDPR) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.2 KEYWORDS: Understand DATE CREATED: 12/3/2019 1:32 PM DATE MODIFIED: 12/3/2019 1:34 PM 17. Under the GDPR individuals can easily transfer their personal data between service providers. a. True b. False ANSWER: True RATIONALE: Correct. The General Data Protection Regulation (GDPR) covers a series of laws in order to protect European Union (EU) citizens’ personal data including genetic data, health, racial or ethnic origin, and religious beliefs. The goal is to create more consistent protection of consumer and personal data across EU nations and it applies to each member state of the European Union. Under the GDPR individuals can easily transfer their personal data between service providers, called “right to portability.” See 4-1a: General Data Protection Regulation (GDPR) POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the general data protection regulation (GDPR) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.2 KEYWORDS: Understand DATE CREATED: 12/3/2019 1:44 PM DATE MODIFIED: 12/3/2019 1:46 PM 18. The goal of the General Data Protection Regulation (GDPR) is to create more consistent protection of consumer and Copyright Cengage Learning. Powered by Cognero.

Page 8


Module 04: Personal, Legal, and Ethical Organizational Issues personal data across EU nations. a. True b. False ANSWER: True RATIONALE: Correct. The General Data Protection Regulation replaced data protection directive 95/46/ec and went into effect on May 25, 2018. The General Data Protection Regulation (GDPR) covers a series of laws in order to protect European Union (EU) citizens’ personal data including genetic data, health, racial or ethnic origin, and religious beliefs. The goal is to create more consistent protection of consumer and personal data across EU nations and it applies to each member state of the European Union. See 4-1a: General Data Protection Regulation (GDPR) POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the general data protection regulation (GDPR) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.2 KEYWORDS: Understand DATE CREATED: 12/3/2019 2:36 PM DATE MODIFIED: 12/3/2019 2:38 PM 19. A company that sells products or services to EU residents must be aware of the General Data Protection Regulation (GDPR) and its consequences only if the company is located in the EU. a. True b. False ANSWER: False RATIONALE: Correct. Companies that sell products or services to EU residents must be aware of the General Data Protection Regulation (GDPR) and its consequences regardless of their locations. In that regard, there is no difference between EU-based companies and international companies. If any organization’s Web site collects any of the regulated data from EU users, it is liable to comply to GDPR. See 4-1a: General Data Protection Regulation (GDPR) POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the general data protection regulation (GDPR) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.2 KEYWORDS: Understand DATE CREATED: 12/3/2019 2:39 PM DATE MODIFIED: 12/3/2019 2:42 PM 20. Under the GDPR, users must be notified regarding any types of data breaches within 12 hours of learning of the breach. a. True Copyright Cengage Learning. Powered by Cognero.

Page 9


Module 04: Personal, Legal, and Ethical Organizational Issues b. False ANSWER: RATIONALE:

False Correct. The GDPR contains 11 modules and 91 articles. The key components include: • • • • •

User consent must be given for any type of processing of personal information. Collected data must be anonymized in order to protect privacy. Users must be notified regarding any types of data breaches within 72 hours of learning of the breach. Companies must provide specific details of the breach such as the nature and its scope. Data transfer across borders must be safely done. Certain companies are required to appoint a data protection officer to oversee GDPR compliance.

See 4-1a: General Data Protection Regulation (GDPR) POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the general data protection regulation (GDPR) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.2 KEYWORDS: Understand DATE CREATED: 12/3/2019 2:53 PM DATE MODIFIED: 12/3/2019 2:57 PM 21. Under the GDPR, businesses that deal with US citizens must designate a data protection officer that will build a data protection program to meet GDPR requirements. a. True b. False ANSWER: False RATIONALE: Correct. Under the GDPR, certain companies are required to appoint a data protection officer to oversee GDPR compliance. Businesses that deal with EU citizens must designate a data protection officer that will build a data protection program to meet GDPR requirements. See 4-1a: General Data Protection Regulation (GDPR) POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the general data protection regulation (GDPR) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.2 KEYWORDS: Understand DATE CREATED: 12/3/2019 3:29 PM DATE MODIFIED: 12/3/2019 3:31 PM 22. Misuse of an individual's medical records will not prevent them from obtaining employment. a. True Copyright Cengage Learning. Powered by Cognero.

Page 10


Module 04: Personal, Legal, and Ethical Organizational Issues b. False ANSWER: RATIONALE:

False Correct. Some “information paranoia” is valid because information about almost every aspect of people’s lives is now stored on various databases, and misuse of extremely sensitive information (such as medical records) could prevent someone from getting employment, health insurance, or housing. Laws are in place to prevent these problems, but taking legal action is often costly, and by that point, the damage has often already been done. See 4-1: Privacy Issues. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the privacy issues of e-mail and data collection in a business environment QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.3 KEYWORDS: Understand DATE CREATED: 12/3/2019 3:52 PM DATE MODIFIED: 12/3/2019 3:56 PM 23. A supercookie tracks a user’s browsing activities even in a privacy mode. a. True b. False ANSWER: True RATIONALE: Correct. There is another cookie called a supercookie that is more challenging to deal with. A supercookie is a type of browser cookie that is designed to be permanently stored on a user’s device and is much more difficult to remove. Its function is the same as a regular cookie that tracks a user’s browsing activities even in a privacy mode. However, there are utility programs available on the market that help guard against these types of cookies and remove them from a user’s device. See 4-1c Data collection on the Web. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the privacy issues of e-mail and data collection in a business environment QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.3 KEYWORDS: Understand DATE CREATED: 12/3/2019 4:15 PM DATE MODIFIED: 12/3/2019 4:18 PM 24. To ensure privacy and accuracy, organizations should allow users to review and correct collected data. a. True b. False ANSWER: True RATIONALE: Correct. Copyright Cengage Learning. Powered by Cognero.

Page 11


Module 04: Personal, Legal, and Ethical Organizational Issues • • • •

Organizations should monitor data collection and entry and should use verification procedures to ensure data accuracy; they should also collect only the data that is necessary. Records kept on an individual should be accurate and up to date. Organizations must correct or delete incorrect data and delete data when it is no longer needed for the stated purpose. Users should be able to review their records and correct any inaccuracies. The existence of record-keeping systems storing personal data should not be kept secret. In addition, there must be a way for people to find out what information about them has been stored and how it is used.

See 4-1: Privacy Issues. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the privacy issues of e-mail and data collection in a business environment QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.3 KEYWORDS: Understand DATE CREATED: 12/3/2019 4:35 PM DATE MODIFIED: 12/3/2019 4:40 PM 25. Only a few organizations have policies stating that e-mail sent on company-owned computers are the organization’s property. a. True b. False ANSWER: False RATIONALE: Correct. Many organizations have policies stating that e-mail sent on company-owned computers are the organization’s property and that the organization has the right to access them. See 4-1b: E-mail. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the privacy issues of e-mail and data collection in a business environment QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.3 KEYWORDS: Understand DATE CREATED: 12/3/2019 4:42 PM DATE MODIFIED: 12/3/2019 4:47 PM Multiple Choice 26. In the context of Web and network privacy, an acceptable use policy is a: a. legal document that protects an organization from embezzlement of money by its service providers. b. set of rules to govern the electronic fund transfers between an organization and its clients. Copyright Cengage Learning. Powered by Cognero.

Page 12


Module 04: Personal, Legal, and Ethical Organizational Issues c. legal document that contains an agreement of the issues documented by the health and social issues of pharmaceuticals. d. set of rules specifying the legal and ethical use of a system and the consequences of noncompliance. ANSWER: d RATIONALE: Correct. An acceptable use policy is a set of rules specifying the legal and ethical use of a system and the consequences of noncompliance. Most organizations have new employees sign an acceptable use policy before they can access the network. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Information privacy Privacy laws KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 27. In the context of Web and network privacy, _____ is a method for binding all the parties to a contract. a. phishing b. nonrepudiation c. cybersquatting d. encapsulation ANSWER: b RATIONALE: Correct. There are three important concepts regarding the Web and network privacy: acceptable use policies, accountability, and nonrepudiation. Nonrepudiation is basically a method for binding all the parties to a contract. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Information privacy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 28. To minimize the invasion of privacy, organizations should: a. not delete data even when it is not needed. b. not modify data once it is entered into an information system. c. collect only the data that is necessary for the stated purpose. d. provide unlimited access to personal information to those who have authorization. ANSWER: c Copyright Cengage Learning. Powered by Cognero.

Page 13


Module 04: Personal, Legal, and Ethical Organizational Issues RATIONALE:

Correct. To minimize the invasion of privacy, organizations should collect only the data that is necessary for the stated purpose. They should also monitor data collection and entry and should use verification procedures to ensure data accuracy. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Information privacy Privacy laws KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 29. To minimize the invasion of privacy, _____. a. organizations should not delete data even when it is not needed b. users should be able to review their records and correct any inaccuracies c. organizations should not modify data once it is entered into an information system d. users should provide unlimited access to personal information to those who have authorization ANSWER: b RATIONALE: Correct. To minimize the invasion of privacy, users should be able to review their records and correct any inaccuracies. Users should also limit access to their personal information to those who have authorization. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Information privacy Privacy laws KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 30. To minimize the invasion of privacy, users and organizations should: a. provide wrong data to unauthorized users. b. use verification procedures to ensure data accuracy. c. keep collected information even after the stated purpose is over. d. provide access to one’s personal information to all interested parties. ANSWER: b RATIONALE: Correct. To minimize the invasion of privacy, organizations should monitor data collection and entry and should use verification procedures to ensure data accuracy. They should also collect only the data that is necessary. See 4-1: Privacy Issues Copyright Cengage Learning. Powered by Cognero.

Page 14


Module 04: Personal, Legal, and Ethical Organizational Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Information privacy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 31. Which is included in the goal of the Health Insurance Portability and Accountability Act (HIPAA)? a. Safeguarding patients’ billing information b. Protecting patients’ computer records c. Protecting patients’ credit information d. Safeguarding conversations between patients and their families ANSWER: a RATIONALE: Correct. Safeguarding patients’ billing information is included in the goal of the HIPAA. It also includes protecting medical providers’ notes and records, health insurers’ computer records, as well as conversations between medical personnel concerning patient care and treatment. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Privacy laws KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 32. The goal of the Health Insurance Portability and Accountability Act (HIPAA) includes: a. safeguarding health insurers’ credit information. b. protecting medical providers’ notes and records. c. protecting patients’ bank information. d. safeguarding conversations between patients and their families. ANSWER: b RATIONALE: Correct. The goal of the HIPAA is to protect the confidentiality of a patient’s medical information and establish safeguards to protect the privacy of health information. This includes medical providers’ notes and records, health insurers’ computer records, patients’ billing information, as well as conversations between medical personnel concerning patient care and treatment. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 15


Module 04: Personal, Legal, and Ethical Organizational Issues REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Privacy laws KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 33. In the context of information privacy, junk e-mail is also known as _____. a. cookie b. bookmark c. spam d. draft ANSWER: c RATIONALE: Correct. Junk e-mail is also known as spam. Spam is an unsolicited e-mail sent for advertising purposes. Because sending these e-mails is so inexpensive, even a small response-a fraction of a percent, for example-is a worthwhile return on the investment. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Information privacy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 34. In the context of information privacy, which of the following is true of spam? a. It is solicited e-mail sent for business purposes. b. It can only be send to a small number of people. c. It is sent in bulk using automated mailing software. d. It can only be used to provide access to legitimate e-mails. ANSWER: c RATIONALE: Correct. Usually, spam is sent in bulk using automated mailing software, and many spammers sell their address lists. For these reasons, the volume of spam can rise to an unmanageable level quickly, clogging users’ inboxes and preventing access to legitimate emails. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 16


Module 04: Personal, Legal, and Ethical Organizational Issues LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Information privacy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 35. In order to overcome concerns about hackers getting access to the accounts of online shoppers, electronic payment systems such as _____ are being developed. a. credit cards b. e-checks c. debit cards d. e-wallets ANSWER: d RATIONALE: Correct. To lessen consumers’ concerns, many credit card companies reimburse fraudulent charges. In addition, other electronic payment systems are being developed, such as ewallets and smart cards, that reduce the risks of exposing consumers’ information on the Web. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Information privacy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 36. Which is a commonly used technology for data collection? a. Applets b. Kernels c. Cookies d. Firewalls ANSWER: c RATIONALE: Correct. Two commonly used technologies for data collection are cookies and log files. Cookies are small text files with unique ID tags that are embedded in a Web browser and saved on the user’s hard drive. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Information privacy KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 17


Module 04: Personal, Legal, and Ethical Organizational Issues DATE CREATED: DATE MODIFIED:

10/22/2019 1:28 PM 10/22/2019 1:28 PM

37. In the context of information privacy, which is true of cookies? a. They record users’ actions on a Web site. b. They get saved on a computers’ primary memory. c. They provide information about users’ location. d. They make it impossible for Web sites to customize pages for users. ANSWER: c RATIONALE: Correct. Cookies provide information about a user’s location and computer equipment, and this information can be used for unauthorized purposes, such as corporate espionage. For these reasons, many users disable cookies by installing a cookie manager, which can eliminate existing cookies and prevent additional cookies from being saved to a user’s hard drive. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Information privacy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 38. E-commune, an e-commerce company, uses small text files with unique ID tags to collect users’ data. These text files are embedded in a Web browser and saved on the user’s hard drive. They make it possible for E-commune to customize its Web page for its customers. Given this information, it can be concluded that E-commune uses _____ to collect data. a. applets b. cookies c. kernels d. log files ANSWER: b RATIONALE: Correct. Given this information, it can be concluded that E-commune uses cookies to collect data. Cookies are small text files with unique ID tags that are embedded in a Web browser and saved on the user’s hard drive. Whenever a user accesses the same domain, the browser sends the saved information to the Web server. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Challenging REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Information privacy KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 18


Module 04: Personal, Legal, and Ethical Organizational Issues DATE CREATED: DATE MODIFIED:

10/22/2019 1:28 PM 10/22/2019 1:28 PM

39. _____, which are generated by Web server software, record a user’s actions on a Web site. a. Viruses b. Junk e-mails c. Worms d. Log files ANSWER: d RATIONALE: Correct. Log files, which are generated by Web server software, record a user’s actions on a Web site. If the information collected is not accurate, the result could be identity misrepresentation. For example, if someone claims to be younger on an online dating site, any demographic data collected would be flawed. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Information privacy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 40. Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua. In this scenario, Jared’s actions are considered _____. a. ethical, but illegal b. unethical, but legal c. illegal and unethical d. legal and ethical ANSWER: c RATIONALE: Correct. In this scenario, Jared’s actions are considered illegal and unethical. If a person makes two copies of a software package he or she just bought and sells one to a friend, the person’s behavior is considered illegal and unethical. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Challenging REFERENCES: Examine ethical issues and censorship of information technology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.4 TOPICS: Ethics KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM Copyright Cengage Learning. Powered by Cognero.

Page 19


Module 04: Personal, Legal, and Ethical Organizational Issues 41. Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal details to the banker who is responsible for sanctioning loans. The banker uses Clement’s personal information to sell him insurance policies. In this scenario, the banker’s action is considered _____. a. unethical and illegal b. ethical, but illegal c. legal and ethical d. legal, but unethical ANSWER: d RATIONALE: Correct. In this scenario, the banker’s action is considered legal, but unethical. When a banker uses the information a client enters in a loan application to sell other financial products to this client, the banker’s action is considered legal, but unethical. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Challenging REFERENCES: Examine ethical issues and censorship of information technology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.4 TOPICS: Ethics KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 42. Albert applied for a consumer durables loan at Horizon Bank and had to provide his personal information in the loan application form. John, the banker in charge, used Albert’s information to sell him a credit card issued by Horizon Bank. In this scenario, John’s action is considered _____. a. illegal and unethical b. illegal but ethical c. legal but unethical d. legal and ethical ANSWER: c RATIONALE: Correct. In the given scenario, John’s action is considered legal but unethical. It is legal but unethical for a banker to use the information a client enters in a loan application to sell other financial products to this client. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Challenging REFERENCES: Examine ethical issues and censorship of information technology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.4 TOPICS: Ethics KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM Copyright Cengage Learning. Powered by Cognero.

Page 20


Module 04: Personal, Legal, and Ethical Organizational Issues 43. A credit card company sells its customers’ mailing addresses to its competitors. In this scenario, the company’s action is considered _____. a. ethical, but illegal b. legal, but unethical c. illegal and unethical d. legal and ethical ANSWER: b RATIONALE: Correct. In this scenario, the company’s action is considered legal, but unethical. In essence, ethics means doing the right thing, but what is “right” can vary from one culture to another and even from one person to another. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine ethical issues and censorship of information technology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.4 TOPICS: Ethics KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 44. Alfred, a software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization’s network. When Liam, his manager, discovers that Alfred had intentionally spread the virus, he immediately fires Alfred. In this scenario, Liam’s behavior is considered _____. a. illegal and unethical b. legal, but unethical c. illegal, but ethical d. legal and ethical ANSWER: d RATIONALE: Correct. When a supervisor fires a programmer who has intentionally spread viruses to the organization’s network, the supervisor’s behavior is considered both legal and ethical. In this scenario, Liam has a clear legal reason for firing Alfred, and allowing Alfred to continue working in the organization will not be ethical. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Challenging REFERENCES: Examine ethical issues and censorship of information technology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.4 TOPICS: Ethics KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM Copyright Cengage Learning. Powered by Cognero.

Page 21


Module 04: Personal, Legal, and Ethical Organizational Issues 45. What information can be censored if the content is deemed offensive to a political, religious, or cultural group? a. Public b. Private c. Secretive d. Abstracted ANSWER: a RATIONALE: Correct. Public information can be censored if the content is deemed offensive to a political, religious, or cultural group. However, private information-what is posted by a person-is not subject to censorship because of your constitutional freedom of expression. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine ethical issues and censorship of information technology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.4 TOPICS: Ethics KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 46. In the context of ethical issues of information technologies, restricting access to the Web is a type of _____. a. cybersquatting b. censorship c. copyright d. spamming ANSWER: b RATIONALE: Correct. Restricting access to the Web is a type of censorship. Governments of the countries, such as Burma, China, and Singapore, believe that the racist, pornographic, and politically extreme content of some Web sites could affect national security. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine ethical issues and censorship of information technology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.4 TOPICS: Ethics KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 47. Which principle states that Internet service providers (ISPs) and government agencies should treat all data on the Internet equally? a. Internet censorship Copyright Cengage Learning. Powered by Cognero.

Page 22


Module 04: Personal, Legal, and Ethical Organizational Issues b. Net neutrality c. Internet security d. Free Basics ANSWER: RATIONALE:

b Correct. Most experts believe that Internet neutrality (also known as “net neutrality”) must be practiced in all cases. According to this principle, ISPs and government agencies should treat all data on the Internet equally. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine ethical issues and censorship of information technology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.4 TOPICS: Ethics Information privacy KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 48. Identify a program used by parents to prevent their children’s access to certain Web sites. a. Hideman b. Betternet c. CYBERSitter d. ZenMate ANSWER: c RATIONALE: Correct. Many parents are concerned about what their children are exposed to while using the Web, such as pornography, violence, and adult language. Many parents use programs such as CyberPatrol, CYBERSitter, Net Nanny, and SafeSurf to prevent their children’s access to certain Web sites. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine ethical issues and censorship of information technology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.4 TOPICS: Information privacy KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 49. In the context of intellectual property, _____ are categorized as industrial property. a. copyrights b. music albums c. novels d. logos Copyright Cengage Learning. Powered by Cognero.

Page 23


Module 04: Personal, Legal, and Ethical Organizational Issues ANSWER: RATIONALE:

d Correct. Intellectual property can be divided into two categories: industrial property (inventions, trademarks, logos, industrial designs, and so on) and copyrighted material, which covers literary and artistic works. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: Ethics IT codes of conduct KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 50. In the context of intellectual property, which is categorized as copyrighted material? a. Trademarks b. Industrial designs c. Artistic works d. Inventions ANSWER: c RATIONALE: Correct. Intellectual property can be divided into two categories: industrial property (inventions, trademarks, logos, industrial designs, and so on) and copyrighted material, which covers literary and artistic works. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: Ethics IT codes of conduct KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 51. Identify a true statement about copyright laws. a. They protect new processes. b. They protect product names. c. They protect tangible material, such as books. d. They protect product identifying marks, such as logos. Copyright Cengage Learning. Powered by Cognero.

Page 24


Module 04: Personal, Legal, and Ethical Organizational Issues ANSWER: RATIONALE:

c Correct. Copyright laws protect tangible material, such as books, drawings, and so forth. However, they also cover online materials, including Web pages, HTML code, and computer graphics, as long as the content can be printed or saved on a storage device. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: Ethics IT codes of conduct KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 52. Which protects contents of an HTML code? a. Copyright laws b. Patent laws c. Laws governing trademarks d. Industrial property laws ANSWER: a RATIONALE: Correct. Generally, copyright laws protect tangible material, such as books, drawings, and so forth. However, they also cover online materials, including Web pages, HTML code, and computer graphics, as long as the content can be printed or saved on a storage device. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: Ethics IT codes of conduct KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 53. _____ laws give only the creator exclusive privileges, meaning no one else can reproduce, distribute, or perform the literary and artistic work without permission. a. Trademark b. Invention c. Patent Copyright Cengage Learning. Powered by Cognero.

Page 25


Module 04: Personal, Legal, and Ethical Organizational Issues d. Copyright ANSWER: RATIONALE:

d Correct. Copyright laws give only the creator exclusive rights, meaning no one else can reproduce, distribute, or perform the work without permission. Copyright laws do have some exceptions, however, usually under the Fair Use Doctrine. This exception means you can use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: Ethics IT codes of conduct KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 54. _____ permits you to use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews. a. Uniform Civil Code b. The Fair Use Doctrine c. The Copyright Act of 1790 d. IT code of conduct ANSWER: b RATIONALE: Correct. Copyright laws have some exceptions usually under the Fair Use Doctrine. This exception means a person can use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: Ethics KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 55. In general, _____ last the author’s lifetime plus 70 years and do not need to be renewed. a. copyrights b. patents Copyright Cengage Learning. Powered by Cognero.

Page 26


Module 04: Personal, Legal, and Ethical Organizational Issues c. aero designs d. industrial designs ANSWER: RATIONALE:

a Correct. In general, copyrights last the author’s lifetime plus 70 years and do not need to be renewed; patents last 20 years (14 years for design patents). Generally, copyright laws protect tangible material, such as books, drawings, and so forth. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: Ethics IT codes of conduct KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 56. Organizations can benefit from patents as they can use patents: a. for an unlimited period of time. b. for contents derived from other processes. c. to upgrade a pre-existing patented process. d. to keep competitors from entering certain market segments. ANSWER: d RATIONALE: Correct. An organization can benefit from a patent by using it to keep competitors from entering certain market segments. An organization can also generate revenue by licensing its patent to others. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: Ethics KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 57. According to the 1980 revisions to the Copyright Act of 1976, _____. a. copyright holders can perform a copyrighted work by means of digital audio transmission b. copyright protection extends to original works of authorship in architectural fields c. both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs Copyright Cengage Learning. Powered by Cognero.

Page 27


Module 04: Personal, Legal, and Ethical Organizational Issues d. the owner of a copyrighted program is allowed to make multiple copies or adaptations for use on other computers ANSWER: c RATIONALE: Correct. The 1980 revisions to the Copyright Act of 1976 include computer programs, so both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: Ethics KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 58. In the 1997 Reno v. ACLU case, the U.S. Supreme Court unanimously voted to strike down the anti-indecency provisions of the Communications Decency Act (CDA) because they violated the: a. freedom of speech provisions of the First Amendment. b. self-defense provisions of the Second Amendment. c. Fourth Amendment to the United States Constitution. d. Fifth Amendment to the United States Constitution. ANSWER: a RATIONALE: Correct. The CDA was partially overturned in the 1997 Reno v. ACLU case, in which the U.S. Supreme Court unanimously voted to strike down the CDA’s anti-indecency provisions, finding they violated the freedom of speech provisions of the First Amendment. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: Privacy laws KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 59. In the context of intellectual property, _____ is registering, selling, or using a domain name to profit from someone else’s trademark. a. sniffing b. phishing c. cybersquatting Copyright Cengage Learning. Powered by Cognero.

Page 28


Module 04: Personal, Legal, and Ethical Organizational Issues d. spamming ANSWER: RATIONALE:

c Correct. One aspect of intellectual property that has attracted attention recently is cybersquatting, which is registering, selling, or using a domain name to profit from someone else’s trademark. A variation of cybersquatting is typosquatting, also called URL hijacking. This technique relies on typographical errors made by Web users when typing a Web site address into a Web browser. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: Ethics KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 60. When a user accidentally enters an incorrect Web site address, he or she may be directed to an alternative Web site. This is an example of _____. a. cyberstalking b. typosquatting c. phishing d. spamming ANSWER: b RATIONALE: Correct. A variation of cybersquatting is typosquatting. If a user accidentally enters an incorrect Web site address, he or she may be directed to an alternative Web site owned by a typosquatter. In such a case, the legitimate site does not get the intended traffic. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: Ethics IT codes of conduct KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 61. Which can help offset the digital divide? a. Increasing the speed of the Internet for the information rich b. Increasing the number of computers in public places Copyright Cengage Learning. Powered by Cognero.

Page 29


Module 04: Personal, Legal, and Ethical Organizational Issues c. Reducing the number of computer equipment at schools d. Reducing the Internet bandwidth for the information poor ANSWER: b RATIONALE: Correct. Increasing funding for computer equipment at schools and adding more computers in public places, such as libraries, can help offset digital divide. Some schools have even started loaner programs so that students can have a portable computer to use after school hours. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Ethics KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 62. Identify a true statement about information technology. a. It has increased clerical jobs. b. It has cut down production costs. c. It has reduced consumers’ purchasing power. d. It has eliminated more jobs than it has created. ANSWER: b RATIONALE: Correct. Although information technology has eliminated some clerical jobs, it has created many new jobs. Some believe that information technologies have reduced production costs, resulting in a stronger economy. See 4-3: The Impact of Information Technology in the Workplace POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Computers in the workplace Information technology careers KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 63. A potential benefit of telecommuting is that it _____. a. regulates work routine b. reduces employee turnover Copyright Cengage Learning. Powered by Cognero.

Page 30


Module 04: Personal, Legal, and Ethical Organizational Issues c. separates work and home life d. increases interaction with coworkers ANSWER: b RATIONALE: Correct. A potential benefit of telecommuting is that it reduces employee turnover and absenteeism. With telecommunications technology, a worker can send and receive data to and from the main office, and organizations can use the best and most cost-effective human resources in a large geographical region. See 4-3: The Impact of Information Technology in the Workplace POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Computers in the workplace KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 64. Which is a potential benefit of telecommuting? a. It increases productivity. b. It regulates work routine. c. It separates work and home life. d. It increases the interaction with coworkers. ANSWER: a RATIONALE: Correct. A potential benefit of telecommuting is that it increases productivity. With telecommunications technology, a worker can send and receive data to and from the main office, and organizations can use the best and most cost-effective human resources in a large geographical region. See 4-3: The Impact of Information Technology in the Workplace POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Computers in the workplace KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 65. Which is a potential drawback of telecommuting? a. Increased interruptions from coworkers b. Lack of necessary supplies or equipment Copyright Cengage Learning. Powered by Cognero.

Page 31


Module 04: Personal, Legal, and Ethical Organizational Issues c. Increased employee turnover and absenteeism d. Difficult work environment for employees with disabilities ANSWER: b RATIONALE: Correct. A potential drawback of telecommuting is the lack of necessary supplies or equipment. Family interruptions and household distractions is also one of the potential drawbacks. See 4-3: The Impact of Information Technology in the Workplace POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Computers in the workplace KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 66. Job deskilling occurs when: a. experienced labor is eliminated by high technology. b. a worker is promoted from a semiskilled to a skilled position. c. a job is carried out manually. d. fragmented jobs are combined as a whole. ANSWER: a RATIONALE: Correct. Information technologies have led to “job deskilling.” This occurs when skilled labor is eliminated by high technology or when a job is downgraded from a skilled to a semiskilled or unskilled position. See 4-3: The Impact of Information Technology in the Workplace POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Information technology careers KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 67. In the context of information technology in workplaces, clerical workers using computers for word-processing tasks is an example of _____. a. job restraining b. job upgrading c. job deskilling Copyright Cengage Learning. Powered by Cognero.

Page 32


Module 04: Personal, Legal, and Ethical Organizational Issues d. job sharing ANSWER: RATIONALE:

b Correct. Information technologies have created job upgrading, as when clerical workers use computers for word-processing tasks. Job upgrading has some limitations, however. Even with information technologies, training clerical workers to write programs for the company Web site would be difficult, for instance. See 4-3: The Impact of Information Technology in the Workplace POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Computers in the workplace Information technology careers KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 68. In the context of information technology in workplaces, which allows adding new tasks to employees’ responsibilities? a. Job virtualization b. Job upgrading c. Job deskilling d. Job rotation ANSWER: b RATIONALE: Correct. Job upgrading makes it possible to add new tasks to employees’ responsibilities. For example, clerical workers could be responsible for updating the company’s Web site. See 4-3: The Impact of Information Technology in the Workplace POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Computers in the workplace Information technology careers KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 69. Which is true of virtual organizations? a. They need central offices for participants to contribute their expertise. b. They are networks of dependent companies and manufacturers connected via information technologies. Copyright Cengage Learning. Powered by Cognero.

Page 33


Module 04: Personal, Legal, and Ethical Organizational Issues c. They let independent suppliers share skills and have access to each other’s markets via information technologies. d. They need an organizational hierarchy for participants to contribute their expertise. ANSWER: c RATIONALE: Correct. Virtual organizations are networks of independent companies, suppliers, customers, and manufacturers connected via information technologies, so they can share skills and costs and have access to each other’s markets. See 4-3: The Impact of Information Technology in the Workplace POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Information technology careers KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 70. The cost of hiring additional employees in virtual organizations is reduced because: a. there is less emphasis on hiring new talent. b. skills are shared among the participating companies. c. companies hire candidates with minimum experience. d. training costs are reduced because of the absence of training programs. ANSWER: b RATIONALE: Correct. Since skills are shared among participating virtual organizations, the cost of hiring additional employees is reduced. A virtual organization does not need central offices or an organizational hierarchy for participants to contribute their expertise. See 4-3: The Impact of Information Technology in the Workplace POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Information technology careers KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 71. Using _____ is a way to solve health issues related to computer equipment. a. correct lighting b. wired keyboards Copyright Cengage Learning. Powered by Cognero.

Page 34


Module 04: Personal, Legal, and Ethical Organizational Issues c. a high capacity RAM d. a high speed Internet ANSWER: RATIONALE:

a Correct. Ergonomics experts believe that using better-designed furniture as well as flexible or wireless keyboards, correct lighting, special monitors for workers with vision problems, and so forth can solve many of the health problems related to computer equipment. See 43: The Impact of Information Technology in the Workplace POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Computers in the workplace KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 72. _____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment. a. Cloud computing b. Mobile computing c. Green computing d. Natural computing ANSWER: c RATIONALE: Correct. Green computing involves the design, manufacture, use, and disposal of computers, servers, and computing devices (such as monitors, printers, storage devices, and networking and communications equipment) in such a way that there is minimal impact on the environment. See 4-4: Green Computing POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe green computing and the ways it can improve the quality of the environment. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.7 TOPICS: Green computing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 73. Which is a true statement about information and communications technology (ICT)? a. It generates approximately six percent of the world’s greenhouse gases. b. It generates approximately two percent of the world’s carbon dioxide emissions. Copyright Cengage Learning. Powered by Cognero.

Page 35


Module 04: Personal, Legal, and Ethical Organizational Issues c. It generates more carbon dioxide emissions than the aviation industry. d. It degrades the quality of the environment in which you work. ANSWER: b RATIONALE: Correct. ICT generates approximately 2 percent of the world’s carbon dioxide emissions, roughly the same amount as the aviation industry. See 4-4: Green Computing POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe green computing and the ways it can improve the quality of the environment. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.7 TOPICS: Green computing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 12/2/2019 5:03 PM 74. Green computing can be achieved by: a. using computing devices that are nonbiodegradable. b. replacing meetings over computer networks with actual face-to-face meetings. c. replacing one large server with several underutilized smaller servers. d. using video conferencing, electronic meeting systems, and groupware. ANSWER: d RATIONALE: Correct. Green computing can be achieved by using video conferencing, electronic meeting systems, and groupware. These technologies can also reduce business travel. See 4-4: Green Computing POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe green computing and the ways it can improve the quality of the environment. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.7 TOPICS: Green computing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 75. A common way to index and link databases is by using _____. a. key customer numbers b. Virtual Account numbers c. Social Security numbers d. protected electronic numbers ANSWER: c RATIONALE: The most common way to index and link databases is by using Social Security numbers Copyright Cengage Learning. Powered by Cognero.

Page 36


Module 04: Personal, Legal, and Ethical Organizational Issues (typically obtained from credit bureaus), although names are sometimes used to track transactions that do not require Social Security numbers, such as credit card purchases, charitable contributions, and movie rentals. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Information privacy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 76. To guard against possible legal ramifications and the consequences of using the Web and networks, an organization usually establishes a(n) _____. a. acceptable use policy b. standard data policy c. article ownership policy d. user content policy ANSWER: a RATIONALE: To guard against possible legal ramifications and the consequences of using the Web and networks, an organization usually establishes an acceptable use policy, which is a set of rules specifying the legal and ethical use of a system and the consequences of noncompliance. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Information privacy Privacy laws KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 77. In the context of Web and network privacy issues, new employees in an organization have to sign a(n) _____before they access the network. a. article ownership policy b. standard data policy c. acceptable use policy d. user content policy ANSWER: c RATIONALE: In the context of Web and network privacy, most organizations have new employees sign Copyright Cengage Learning. Powered by Cognero.

Page 37


Module 04: Personal, Legal, and Ethical Organizational Issues an acceptable use policy before they can access the network. An acceptable use policy is a set of rules specifying the legal and ethical use of a system and the consequences of noncompliance. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Information privacy Privacy laws KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 78. In the context of privacy issues, unsolicited e-mail sent for advertising purposes is called _____. a. a virus b. a bug c. spam d. a cookie ANSWER: c RATIONALE: Although e-mail is widely used, it presents some serious privacy issues. One issue is junk e-mail, also known as spam-unsolicited e-mail sent for advertising purposes. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the privacy issues of e-mail and data collection in a business environment QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.3 TOPICS: Information privacy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 12/3/2019 3:52 PM 79. _____ are small text files with unique ID tags that are embedded in a Web browser and saved on the user’s hard drive. a. Applets b. Kernels c. Cookies d. Firewalls ANSWER: c RATIONALE: Cookies are small text files with unique ID tags that are embedded in a Web browser and saved on the user’s hard drive. They provide information about a user’s location and computer equipment, and this information can be used for unauthorized purposes, such as corporate espionage. See 4-1: Privacy Issues Copyright Cengage Learning. Powered by Cognero.

Page 38


Module 04: Personal, Legal, and Ethical Organizational Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the privacy issues of e-mail and data collection in a business environment QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.3 TOPICS: Information privacy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 80. _____ make it possible for Web sites to customize pages for users, such as an e-commerce Web site recommending items based on your past purchases. a. Cookies b. Trojans c. Applets d. Kernels ANSWER: a RATIONALE: Cookies are small text files with unique ID tags that are embedded in a Web browser and saved on the user’s hard drive. They also make it possible for Web sites to customize pages for users, such as Amazon recommending books based on your past purchases. See 4-1: Privacy Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the privacy issues of e-mail and data collection in a business environment QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.3 TOPICS: Information privacy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 81. _____ is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for “creations of the mind” developed by people or businesses. a. An identity log file b. A virtual organization c. Intellectual property d. Information policy ANSWER: c RATIONALE: Intellectual property is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for “creations of the mind” developed by people or businesses. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy Copyright Cengage Learning. Powered by Cognero.

Page 39


Module 04: Personal, Legal, and Ethical Organizational Issues REFERENCES:

Discuss the principles of intellectual property and issues related to the infringement of intellectual property. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: Ethics KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 82. In the context of intellectual property, inventions are categorized as _____ properties. a. literary b. copyrighted c. industrial d. artistic ANSWER: c RATIONALE: Intellectual property can be divided into two categories: industrial property (inventions, trademarks, logos, industrial designs, and so on) and copyrighted material, which covers literary and artistic works. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: Ethics IT codes of conduct KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 83. A _____ is an intellectual property that protects product names and identifying marks. a. registration b. copyright c. trademark d. patent ANSWER: c RATIONALE: A trademark is an intellectual property that protects product names and identifying marks. Trademarks are part of industrial property. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. Copyright Cengage Learning. Powered by Cognero.

Page 40


Module 04: Personal, Legal, and Ethical Organizational Issues QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: Ethics KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 84. A _____ is an intellectual property that protects new processes. a. registration b. copyright c. trademark d. patent ANSWER: d RATIONALE: A patent is an intellectual property that protects new processes. In general, patents last 20 years (14 years for design patents). See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: Ethics IT codes of conduct KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 85. URL _____ is a technique that relies on typographical errors made by Web users when typing a Web site address into a Web browser. a. opening b. hijacking c. parsing d. decoding ANSWER: b RATIONALE: A variation of cybersquatting is typosquatting, also called URL hijacking. This technique relies on typographical errors made by Web users when typing a Web site address into a Web browser. If a user accidentally enters an incorrect Web site address, he or she may be directed to an alternative Web site owned by a typosquatter. See 4-2: Ethical Issues of Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. Copyright Cengage Learning. Powered by Cognero.

Page 41


Module 04: Personal, Legal, and Ethical Organizational Issues QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: IT codes of conduct KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 86. _____, also known as virtual work, has enabled some people to perform their jobs from home. a. Telecommuting b. Urbanizing c. Outsourcing d. Offshoring ANSWER: a RATIONALE: Telecommuting, also known as virtual work, has enabled some people to perform their jobs from home. With telecommunications technology, a worker can send and receive data to and from the main office, and organizations can use the best and most cost-effective human resources in a large geographical region. See 4-3: The Impact of Information Technology in the Workplace POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Computers in the workplace KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 87. _____ are networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so that they can share skills and costs and have access to each other’s markets. a. Pool organizations b. Collated organizations c. Merged organizations d. Virtual organizations ANSWER: d RATIONALE: Virtual organizations are networks of independent companies, suppliers, customers, and manufacturers connected via information technologies, so they can share skills and costs and have access to each other’s markets. The principle of virtual organization is the idea that several organizations working together can do what one organization cannot. See 4-3: The Impact of Information Technology in the Workplace POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the impact of information technology on society: the digital divide, Copyright Cengage Learning. Powered by Cognero.

Page 42


Module 04: Personal, Legal, and Ethical Organizational Issues telecommuting, and health issues. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Information technology careers KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 88. The principle of _____ is the idea that several organizations working together can do what one organization cannot. a. virtual organization b. collated organization c. merged organization d. pool organization ANSWER: a RATIONALE: The principle of virtual organization is the idea that several organizations working together can do what one organization cannot. Virtual organizations are networks of independent companies, suppliers, customers, and manufacturers connected via information technologies, so they can share skills and costs and have access to each other’s markets. See 4-3: The Impact of Information Technology in the Workplace POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Computers in the workplace KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 89. What kind of computing promotes a sustainable environment and consumes the least amount of energy? a. Digital computing b. Soft computing c. Green computing d. Cyber computing ANSWER: c RATIONALE: Green computing is computing that promotes a sustainable environment and consumes the least amount of energy. Green computing not only helps an organization save on energy costs but also improves the quality of the environment in which you live and work. See 44: Green Computing POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe green computing and the ways it can improve the quality of the Copyright Cengage Learning. Powered by Cognero.

Page 43


Module 04: Personal, Legal, and Ethical Organizational Issues environment. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.7 TOPICS: Green computing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 90. In the context of green computing, properly recycling an unwanted digital device is considered _______. a. green disposal b. green use c. green manufacturing d. green design ANSWER: a RATIONALE: Correct. Green disposal involves remaking an existing digital device or properly disposing of, or recycling, unwanted digital devices. See 4-4: Green Computing. POINTS: DIFFICULTY: REFERENCES:

1 Easy Describe green computing and the ways it can improve the quality of the environment. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.7 KEYWORDS: Understand DATE CREATED: 12/2/2019 5:07 PM DATE MODIFIED: 12/2/2019 5:11 PM 91. Minimizing the electricity consumption of computers and other digital devices is considered _________. a. wasteful b. time-consuming c. green use d. green disposal ANSWER: c RATIONALE: Correct. To implement a successful green computing program, the following four approaches are generally used: 1. Green design: Designing energy-efficient computers, servers, handheld devices, printers, and other digital devices 2. Green manufacturing: Minimizing waste during the manufacturing of computers and other digital devices to reduce the environmental impact of these activities 3. Green use: Minimizing the electricity consumption of computers and other digital devices and using them in an eco-friendly manner 4. Green disposal: Remaking an existing digital device or properly disposing of, or recycling, unwanted digital devices Copyright Cengage Learning. Powered by Cognero.

Page 44


Module 04: Personal, Legal, and Ethical Organizational Issues See 4-4: Green Computing. POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe green computing and the ways it can improve the quality of the environment. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.7 KEYWORDS: Understand DATE CREATED: 12/2/2019 5:13 PM DATE MODIFIED: 12/2/2019 5:17 PM 92. In some states, certain computer manufacturers collect a fee called a(n) _________, in order to dispose of a computer after its useful life. a. waste abatement fee b. advance recovery fee c. green fee d. post-usage fee ANSWER: b RATIONALE: Correct. In some states, certain computer manufacturers collect a fee from their customers, called an advance recovery fee, in order to dispose of the computer after its useful life. See 4-4: Green Computing. POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe green computing and the ways it can improve the quality of the environment. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.7 KEYWORDS: Understand DATE CREATED: 12/2/2019 5:19 PM DATE MODIFIED: 12/2/2019 5:22 PM 93. Which of the following is not considered a way to achieve green computing? a. Encourage all employees to work on-site. b. Encourage carpooling and nonmotorized transportation for employees. c. Use computing devices that consume less energy. d. Design search engines and other computing routines that are faster and consume less energy. ANSWER: a RATIONALE: Correct. Here are some of the ways that green computing can be achieved: 1. Design products that last longer and are modular in design so certain parts can be upgraded without replacing the entire system. 2. Design search engines and other computing routines that are faster and consume less energy. 3. Replace several underutilized smaller servers with one large server using a Copyright Cengage Learning. Powered by Cognero.

Page 45


Module 04: Personal, Legal, and Ethical Organizational Issues virtualization technique. 4. Use computing devices that consume less energy and are biodegradable. 5. Allow certain employees to work from their homes, resulting in fewer cars on the roads. 6. Replace actual face-to-face meetings with meetings over computer networks. 7. Use video conferencing, electronic meeting systems, and groupware. 8. Use a virtual world. This technology can also reduce face-to-face meetings, resulting in less travel. 9. Use cloud computing as promoted by companies such as Amazon. This platform can also reduce energy consumption. 10. Turn off idle PCs, recycle computer-related materials, and encourage carpool and nonmotorized transportation for employees. See 4-4: Green Computing. POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe green computing and the ways it can improve the quality of the environment. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.7 KEYWORDS: Understand DATE CREATED: 12/2/2019 5:25 PM DATE MODIFIED: 12/2/2019 5:32 PM 94. When did the General Data Protection Regulation (GDPR) go into effect? a. May 25, 2016 b. May 25, 2017 c. May 25, 2018 d. May 25, 2019 ANSWER: c RATIONALE: Correct. The General Data Protection Regulation replaced data protection directive 95/46/ec and went into effect on May 25, 2018. The General Data Protection Regulation (GDPR) covers a series of laws in order to protect European Union (EU) citizens’ personal data including genetic data, health, racial or ethnic origin, and religious beliefs. See 4-1a: General Data Protection Regulation (GDPR) POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the general data protection regulation (GDPR) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.2 KEYWORDS: Understand DATE CREATED: 12/3/2019 1:28 PM DATE MODIFIED: 12/3/2019 1:30 PM Copyright Cengage Learning. Powered by Cognero.

Page 46


Module 04: Personal, Legal, and Ethical Organizational Issues 95. Identify a true statement about the General Data Protection Regulation (GDPR). a. If any organization’s Web site collects any of the regulated data from EU users, it is liable to comply to GDPR. b. If any EU organization’s Web site collects any of the regulated data from US users, it is liable to comply to GDPR. c. If any US organization’s Web site collects any of the regulated data from US users, it is liable to comply to GDPR. d. If any organization’s Web site collects any of the regulated data from users worldwide, it is liable to comply to GDPR.

ANSWER: RATIONALE:

a Correct. The General Data Protection Regulation (GDPR) covers a series of laws in order to protect European Union (EU) citizens’ personal data including genetic data, health, racial or ethnic origin, and religious beliefs. Companies that sell products or services to EU residents must be aware of this law and its consequences regardless of their locations. In that regard, there is no difference between EU-based companies and international companies. If any organization’s Web site collects any of the regulated data from EU users, it is liable to comply to GDPR. See 4-1a: General Data Protection Regulation (GDPR) POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the general data protection regulation (GDPR) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.2 KEYWORDS: Understand DATE CREATED: 12/3/2019 1:36 PM DATE MODIFIED: 12/3/2019 1:42 PM 96. Which of the following is not a key component of the General Data Protection Regulation (GDPR)? a. User consent must be given for processing of personal information. b. Collected data must be anonymized to protect privacy. c. Ease of use. d. Safe data transfer across borders. ANSWER: c RATIONALE: Correct. The GDPR contains 11 modules and 91 articles. The key components include: • • • • •

POINTS: DIFFICULTY: REFERENCES:

User consent must be given for any type of processing of personal information. Collected data must be anonymized in order to protect privacy. Users must be notified regarding any types of data breaches within 72 hours of learning of the breach. Companies must provide specific details of the breach such as the nature and its scope. Data transfer across borders must be safely done. Certain companies are required to appoint a data protection officer to oversee GDPR compliance.

See 4-1a: General Data Protection Regulation (GDPR) 1 Moderate Explain the general data protection regulation (GDPR)

Copyright Cengage Learning. Powered by Cognero.

Page 47


Module 04: Personal, Legal, and Ethical Organizational Issues QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.2 KEYWORDS: Understand DATE CREATED: 12/3/2019 1:47 PM DATE MODIFIED: 12/3/2019 1:52 PM 97. One of the major business benefits of GDPR compliance is ________. a. it is no longer necessary to align with evolving technology b. increased maintenance costs c. reduced data security d. improved consumer confidence ANSWER: d RATIONALE: Correct. The following are major business benefits of GDPR compliance: • • • • •

Improved consumer confidence Better data security Reduced maintenance costs by retiring any data inventory software and legacy applications that are no longer GDPR compliant Better alignment with evolving technology Better decision making by using customer information effectively

See 4-1a: General Data Protection Regulation (GDPR) POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the general data protection regulation (GDPR) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.2 KEYWORDS: Understand DATE CREATED: 12/3/2019 2:29 PM DATE MODIFIED: 12/3/2019 2:35 PM 98. Under the General Data Protection Regulation (GDPR), violators could be fined up to ___ percent of the company’s global annual revenue depending on the nature of the violation. a. 2 b. 4 c. 6 d. 8 ANSWER: RATIONALE:

b Correct. If any organization’s Web site collects any of the regulated data from EU users, it is liable to comply to GDPR. Violators could be fined up to 4 percent of the company’s global annual revenue depending on the nature of the violation. See 4-1a: General Data Protection Regulation (GDPR)

Copyright Cengage Learning. Powered by Cognero.

Page 48


Module 04: Personal, Legal, and Ethical Organizational Issues POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the general data protection regulation (GDPR) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.2 KEYWORDS: Understand DATE CREATED: 12/3/2019 2:44 PM DATE MODIFIED: 12/3/2019 2:47 PM 99. The series of laws intended to protect European Union (EU) citizens’ personal data is referred to as the __________. a. Data Protection Directive b. Personal Data Protection Regulation c. Genetic Data Protection Regulation d. General Data Protection Regulation ANSWER: d RATIONALE: Correct. The General Data Protection Regulation replaced data protection directive 95/46/ec and went into effect on May 25, 2018. The General Data Protection Regulation (GDPR) covers a series of laws in order to protect European Union (EU) citizens’ personal data including genetic data, health, racial or ethnic origin, and religious beliefs. See 4-1a: General Data Protection Regulation (GDPR) POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the general data protection regulation (GDPR) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.2 KEYWORDS: Understand DATE CREATED: 12/3/2019 2:48 PM DATE MODIFIED: 12/3/2019 2:52 PM 100. Under the GDPR, the ability for a user to transfer personal data between service providers is called _________. a. "the right to portability" b. "the right to switch" c. "the data transfer protocol" d. "the service provider switch" ANSWER: a RATIONALE: Correct. Under the GDPR individuals can easily transfer their personal data between service providers, called “right to portability.” See 4-1a: General Data Protection Regulation (GDPR) POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the general data protection regulation (GDPR) Copyright Cengage Learning. Powered by Cognero.

Page 49


Module 04: Personal, Legal, and Ethical Organizational Issues QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.2 KEYWORDS: Understand DATE CREATED: 12/3/2019 3:01 PM DATE MODIFIED: 12/3/2019 3:11 PM 101. __________ are the top three countries for generating spam. a. Nigeria, the Ukraine, and Mexico b. The United States, China, and Russia c. China, South Africa, and Germany d. Iceland, Chile, and India ANSWER: b RATIONALE: Correct. United States, China, and Russia are the top three countries for generating spam. See 4-1b: Email. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the privacy issues of e-mail and data collection in a business environment QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.3 KEYWORDS: Understand DATE CREATED: 12/3/2019 3:58 PM DATE MODIFIED: 12/3/2019 4:04 PM 102. Two commonly used technologies for Web user data collection are ________. a. VR and AR b. cybersquatting and typosquatting c. viruses and spam d. cookies and log files ANSWER: d RATIONALE: Correct. Information that users provide on the Web can be combined with other information and technologies to produce new information. For example, a financial profile can be created by collecting a person’s employment information. Two commonly used technologies for data collection are cookies and log files. See 4-1c: Data Collection on the Web. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the privacy issues of e-mail and data collection in a business environment QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.3 KEYWORDS: Understand DATE CREATED: 12/3/2019 4:07 PM Copyright Cengage Learning. Powered by Cognero.

Page 50


Module 04: Personal, Legal, and Ethical Organizational Issues DATE MODIFIED:

12/3/2019 4:13 PM

103. Identify a true statement about data collected on the Web. a. It must be used and interpreted with caution. b. It must be sold to telemarketing firms. c. Users supply truthful answers to online surveys. d. Personal information is never used without the user's consent. ANSWER: a RATIONALE: Correct. If the information collected is not accurate, the result could be identity misrepresentation. For example, if someone claims to be younger on an online dating site, any demographic data collected would be flawed. Similarly, if a streaming service collects data on viewing trends through online surveys and people supply answers that are not truthful, any analyses the network attempts to conduct would not be accurate. Therefore, data collected on the Web must be used and interpreted with caution. See 4-1c Data Collection on the Web. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the privacy issues of e-mail and data collection in a business environment QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.3 KEYWORDS: Understand DATE CREATED: 12/3/2019 4:19 PM DATE MODIFIED: 12/3/2019 4:26 PM 104. Which federal law is intended to protect data collected from children? a. GDPR b. HIPAA c. COPPA d. FACTA ANSWER: c RATIONALE: Correct. The three important federal data-protection laws include the Health Insurance Portability and Accountability Act (HIPAA), the Fair and Accurate Credit Transaction Act (FACTA), and the Children’s Online Privacy Protection Act (COPPA). The goal of COPPA is to protect the privacy of children under the age of 13. Web sites directed to children must publish their privacy policies. Any information collected from children must have parental consent. See 4-1 Privacy Issues. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the privacy issues of e-mail and data collection in a business environment QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.4.3 KEYWORDS: Understand DATE CREATED: 12/3/2019 4:28 PM Copyright Cengage Learning. Powered by Cognero.

Page 51


Module 04: Personal, Legal, and Ethical Organizational Issues DATE MODIFIED:

12/3/2019 4:33 PM

Essay 105. Provide an example of how information technology has created concerns about privacy in the workplace. ANSWER: Answers will vary. Information technologies have brought many benefits, but they have also created concerns about privacy in the workplace. For example, employers now search social networking sites such as Facebook to find background information on applicants, and this information can influence their hiring decisions. In fact, some recruiters and hiring managers use the extracted information to assign the potential employee a numeric rank between 0 and 100. With employee-monitoring systems, managers can also supervise employees’ performance—the number of errors they make, their work speeds, and their time away from the desk. Naturally, this monitoring has made some workers concerned about their privacy. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Information privacy Electronic surveillance and monitoring KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 12/2/2019 4:30 PM 106. In the context of Web and network privacy, explain acceptable use policies. ANSWER: Answers will vary. To guard against possible legal ramifications and the consequences of using the Web and networks, an organization usually establishes an acceptable use policy, which is a set of rules specifying the legal and ethical use of a system and the consequences of noncompliance. Having a clear, specific policy can help prevent users from taking legal action against an organization, as in cases of termination. Most organizations have new employees sign an acceptable use policy before they can access the network. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss information privacy and methods for improving the privacy of information. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.4.1 TOPICS: Information privacy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM Copyright Cengage Learning. Powered by Cognero.

Page 52


Module 04: Personal, Legal, and Ethical Organizational Issues 107. Describe the privacy concern posed by ease of access to e-mail. ANSWER: Answers will vary. Whether an e-mail is distributed through the Internet or through a company network, people should assume that others have access to their messages. In addition, many organizations have policies stating that any e-mails sent on companyowned computers are the property of the organization and that the organization has the right to access them. In other words, employees often have no right to privacy, although there is a lot of controversy over this point and several lawsuits have resulted. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the privacy issues of e-mail and data collection in a business environment QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.4.3 KEYWORDS: Understand DATE CREATED: 12/2/2019 4:35 PM DATE MODIFIED: 12/2/2019 4:36 PM 108. Some Web sites require users to enter their name, address, and employment information before they are allowed to use the site. What type of privacy issues does this raise? ANSWER: Answers will vary. Privacy issues include the concern that this personal information will be sold to telemarketing firms, and consumers do not want to be bombarded with spam. Also, some consumers are concerned about their computers’ contents being searched while they are connected to the Web, and personal information could be used without their consent for solicitation and other purposes. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the privacy issues of e-mail and data collection in a business environment QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.4.3 KEYWORDS: Understand DATE CREATED: 12/2/2019 4:39 PM DATE MODIFIED: 12/2/2019 4:40 PM 109. List seven moral imperatives as put forth by the Association for Computing Machinery (ACM). ANSWER: Answers will vary. The ACM has a code of ethics and professional conduct that includes the following general moral imperatives: 1. Contribute to society and human well-being, acknowledging that all people are stakeholders in computing. 2. Avoid harm. 3. Be honest and trustworthy. 4. Be fair and take action not to discriminate. 5. Respect the work required to produce new ideas, inventions, creative works, and computing artifacts. Copyright Cengage Learning. Powered by Cognero.

Page 53


Module 04: Personal, Legal, and Ethical Organizational Issues 6. Respect privacy. 7. Honor confidentiality. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine ethical issues and censorship of information technology. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.4.4 TOPICS: Ethics KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 12/2/2019 4:46 PM 110. List eight questions or statements that a knowledge worker should consider before making a work-related decision in order to avoid ethical issues. ANSWER: Answers will vary. A knowledge worker should consider the following questions and statements before making a work-related decision: 1. 2. 3. 4. 5. 6.

Does this decision comply with my organization’s values? How will I feel about myself after making this decision? If I know this decision is wrong, I must not make it. If I am not sure about this decision, I must ask my supervisor before making it. Is the decision right? Is the decision fair? How will I feel if somebody else makes this decision on my behalf? 7. Is the decision legal? 8. Would I want everyone to know about this decision after I make it? POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine ethical issues and censorship of information technology. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.4.4 TOPICS: Ethics KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 12/2/2019 4:48 PM 111. When can public information be censored? ANSWER: Answers will vary. Public information, posted by an organization or public agency, can be censored for public policy reasons—such as not allowing military secrets to be published, lest the information fall into enemy hands. Public information can also be censored if the content is deemed offensive to a political, religious, or cultural group. Copyright Cengage Learning. Powered by Cognero.

Page 54


Module 04: Personal, Legal, and Ethical Organizational Issues POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine ethical issues and censorship of information technology. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.4.4 KEYWORDS: Apply DATE CREATED: 12/2/2019 4:49 PM DATE MODIFIED: 12/2/2019 4:49 PM 112. Define the two categories of intellectual property. ANSWER: Answers will vary. Intellectual property can be divided into two categories: industrial property (inventions, trademarks, logos, industrial designs, and so on) and copyrighted material, which covers literary and artistic works. Generally, copyright laws protect tangible material, such as books, drawings, and so forth. However, they also cover online materials, including Web pages, HTML code, and computer graphics, as long as the content can be printed or saved on a storage device. A trademark protects product names and identifying marks (logos, for example). A patent protects new processes. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: Ethics KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 113. Describe in brief the intellectual property that copyright laws protect and the exceptions. ANSWER: Answers will vary. Generally, copyright laws protect tangible material, such as books, drawings, and so forth. However, they also cover online materials, including Web pages, HTML code, and computer graphics, as long as the content can be printed or saved on a storage device. Copyright laws give only the creator exclusive rights, meaning no one else can reproduce, distribute, or perform the work without permission. Copyright laws do have some exceptions, however, usually under the Fair Use Doctrine. This exception means one can use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. QUESTION TYPE: Essay Copyright Cengage Learning. Powered by Cognero.

Page 55


Module 04: Personal, Legal, and Ethical Organizational Issues HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: Ethics KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 114. List the risks that can be avoided by using an Internet use policy. ANSWER: Answers will vary. To avoid the following legal risks, organizations should have an Internet use policy: Risk 1: If employees download pornographic materials to their office computers over the corporate network, the organization could be liable for harassment charges as well as infringement of privacy and even copyright laws. Risk 2: Indecent e-mail exchanges among employees can leave the corporation open to discrimination and sexual harassment charges. Risk 3: Employees using the corporate network to download and distribute unlicensed software can leave the corporation open to serious charges of copyright infringement and other legal issues. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: Ethics KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 115. Discuss the concept of typosquatting. ANSWER: Answers will vary. A variation of cybersquatting is typosquatting, also called URL hijacking. This technique relies on typographical errors made by Web users when typing a Web site address into a Web browser. If a user accidentally enters an incorrect Web site address, he or she may be directed to an alternative Web site owned by a typosquatter. In such a case, the legitimate site does not get the intended traffic. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the principles of intellectual property and issues related to the infringement of intellectual property. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.4.5 TOPICS: Ethics Copyright Cengage Learning. Powered by Cognero.

Page 56


Module 04: Personal, Legal, and Ethical Organizational Issues KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 10/22/2019 1:28 PM 10/22/2019 1:28 PM

116. Discuss the steps being taken to offset the digital divide. ANSWER: Answers will vary. Increasing funding for computer equipment at schools and adding more computers in public places, such as libraries, can help offset the digital divide. Some schools have even started loaner programs, so students can have a portable computer to use after school hours. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Ethics KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 117. Explain telecommuting. ANSWER: Answers will vary. Telecommuting, also known as virtual work, has enabled some people to perform their jobs from home. With telecommunications technology, a worker can send and receive data to and from the main office, and organizations can use the best and most cost-effective human resources in a large geographical region. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Computers in the workplace KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 118. Provide an example of job deskilling. ANSWER: Answers will vary. Job deskilling usually takes place when a job is automated or when a complex job is fragmented into a sequence of easily performed tasks. An example of job deskilling is when a computer-aided design program performs the technical tasks that used to be performed by a designer. POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 57


Module 04: Personal, Legal, and Ethical Organizational Issues DIFFICULTY: REFERENCES:

Moderate Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Computers in the workplace KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 119. With information technologies, one skilled worker might be capable of doing the job of several workers. Provide some examples of this situation. ANSWER: Answers will vary. With information technologies, one skilled worker might be capable of doing the job of several workers. For example, with mail-merge programs, an office worker can generate thousands of letters, eliminating the need for additional workers. Information technologies can also make workers more efficient, for example, being able to send a message throughout an organization by using e-mail instead of interoffice memos. Similarly, mass-marketing efforts for new product announcements have been streamlined, reducing the expense and personnel needed to reach millions of customers. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Computers in the workplace Information technology careers KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 120. List five advantages of virtual organizations. ANSWER: Answers will vary. Advantages of virtual organizations include the following: a. Each participating company can focus on what it does best, thus improving the ability to meet customers’ needs. b. Because skills are shared among participating companies, the cost of hiring additional employees is reduced. c. Companies can respond to customers faster and more efficiently. d. The time needed to develop new products is reduced. e. Products can be customized more to respond to customers’ needs. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine the impact of information technology on society: the digital divide, Copyright Cengage Learning. Powered by Cognero.

Page 58


Module 04: Personal, Legal, and Ethical Organizational Issues telecommuting, and health issues. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Information technology careers KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 121. What are some of the causes of health issues related to information technology? ANSWER: Answers will vary. Work habits can cause some physical problems and so can the work environment in which computers are used-static electricity, inadequate ventilation, poor lighting, dry air, unsuitable furniture, and too few rest breaks. The increasing popularity of touchscreens on smartphones, tablets, and some PCs may result in more stress-related injuries of the users’ hands, arms, back, and eyes. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Computers in the workplace KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 122. Discuss how health problems related to computer equipment can be solved. ANSWER: Answers will vary. Ergonomics experts believe that using better-designed furniture as well as flexible or wireless keyboards, correct lighting, special monitors for workers with vision problems, and so forth can solve many of the health problems related to computer equipment. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine the impact of information technology on society: the digital divide, telecommuting, and health issues. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.4.6 TOPICS: Computers in the workplace KEYWORDS: Apply DATE CREATED: 10/22/2019 1:28 PM Copyright Cengage Learning. Powered by Cognero.

Page 59


Module 04: Personal, Legal, and Ethical Organizational Issues DATE MODIFIED:

10/22/2019 1:28 PM

123. Describe green computing. ANSWER: Answers will vary. Green computing is computing that promotes a sustainable environment and consumes the least amount of energy. Green computing involves the design, manufacture, use, and disposal of computers, servers, and computing devices (such as monitors, printers, storage devices, and networking and communications equipment) in such a way that there is minimal impact on the environment. It is one of the methods for combating global warming. In some states, certain computer manufacturers collect a fee from their customers, called an advance recovery fee, in order to dispose of the computer after its useful life. A successful green computing strategy cannot be fully implemented without the cooperation of both the private and the public sector. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe green computing and the ways it can improve the quality of the environment. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.4.7 TOPICS: Green computing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM 124. Describe any three ways by which green computing can be achieved. ANSWER: Answers will vary. Green computing can be achieved by the following ways: a. Design products that last longer and are modular in design so that certain parts can be upgraded without replacing the entire system. b. Design search engines and other computing routines that are faster and consume less energy. c. Replace several underutilized smaller servers with one large server using a virtualization technique. In this case, multiple operating systems are hosted on a single hardware platform and can share this hardware platform. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe green computing and the ways it can improve the quality of the environment. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.4.7 TOPICS: Green computing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:28 PM DATE MODIFIED: 10/22/2019 1:28 PM Copyright Cengage Learning. Powered by Cognero.

Page 60


Module 04: Personal, Legal, and Ethical Organizational Issues

Copyright Cengage Learning. Powered by Cognero.

Page 61


Module 05: Protecting Information Resources True / False 1. In contrast to pharming, phishing involves hijacking an official Web site address by hacking a Domain Name System server. a. True b. False ANSWER: False RATIONALE: Correct The difference between phishing and pharming is that pharming involves hijacking an official Web site address by hacking a Domain Name System server and then altering the legitimate Web site IP address so that users who enter the correct Web address are directed to the pharmers’ fraudulent Web site. See 5-1: Risks Associated with Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe information technologies that could be used in computer crimes. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.2 KEYWORDS: Understand DATE CREATED: 12/4/2019 2:57 PM DATE MODIFIED: 12/4/2019 2:58 PM 2. Auction fraud is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university. a. True b. False ANSWER: False RATIONALE: Correct Phishing is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university. The e-mails usually direct recipients to false Web sites that look like the real thing for the purpose of capturing personal information. See 5-1: Risks Associated with Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe information technologies that could be used in computer crimes. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.2 KEYWORDS: Understand DATE CREATED: 12/4/2019 3:02 PM DATE MODIFIED: 12/4/2019 3:03 PM 3. The three important aspects of computer and network security, confidentiality, integrity, and availability, are collectively referred to as the CIA triangle. a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 1


Module 05: Protecting Information Resources ANSWER: RATIONALE:

True Correct There are three important aspects of computer and network security: confidentiality, integrity, and availability, collectively referred to as the CIA triangle. See 5-2: Computer and Network Security: Basic Safeguards POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe basic safeguards in computer and network security. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.3 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 4. In the context of the CIA triangle, confidentiality means that computers and networks are operating and authorized users can access the information they need. a. True b. False ANSWER: False RATIONALE: Correct Confidentiality means that a system must not allow the disclosing of information by anyone who is not authorized to access it. Availability means that computers and networks are operating and authorized users can access the information they need. See 5-2: Computer and Network Security: Basic Safeguards POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe basic safeguards in computer and network security. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.3 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 5. Level 1 security protects back-end systems to ensure confidentiality, accuracy, and integrity of data. a. True b. False ANSWER: False RATIONALE: Correct Level 2 security protects back-end systems to ensure confidentiality, accuracy, and integrity of data. Level 1 security protects front-end servers. See 5-2: Computer and Network Security: Basic Safeguards POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 2


Module 05: Protecting Information Resources DIFFICULTY: Moderate REFERENCES: Describe basic safeguards in computer and network security. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.3 TOPICS: Security protection Hacking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 6. If a drive in a redundant array of independent disks (RAID) system fails, data stored on it can be reconstructed from data stored on the remaining drives. a. True b. False ANSWER: True RATIONALE: Correct A RAID system is a collection of disk drives used to store data in multiple places. If a drive in a RAID system fails, data stored on it can be reconstructed from data stored on the remaining drives. RAID systems vary in cost, performance, and reliability. See 5-2: Computer and Network Security: Basic Safeguards POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe basic safeguards in computer and network security. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.3 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 7. When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails. a. True b. False ANSWER: False RATIONALE: Correct When using mirror disks, if one of the two disks containing the same data fails, the other is available, allowing operations to continue. Mirror disks are usually a less expensive, level1 redundant array of independent disks system and can be a suitable solution for small organizations. See 5-2: Computer and Network Security: Basic Safeguards POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe basic safeguards in computer and network security. QUESTION TYPE: True / False HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 3


Module 05: Protecting Information Resources LEARNING OBJECTIVES: MIS.10e.5.3 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 8. When a program containing a virus is used, the virus attaches itself to other files, and the cycle continues. a. True b. False ANSWER: True RATIONALE: Correct When a program or operating system containing a virus is used, the virus attaches itself to other files, and the cycle continues. See 5-3: Security Threats: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Identify the nine most common intentional security threats. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 9. Viruses can be transmitted through a network or through e-mail attachments. a. True b. False ANSWER: True RATIONALE: Correct Viruses can be transmitted through a network or through e-mail attachments. Some of the most dangerous ones come through bulletin boards or message boards because they can infect any system using the board. See 5-3: Security Threats: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Identify the nine most common intentional security threats. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 10. Social engineering is an attack that takes advantage of the backdoors in security systems. a. True Copyright Cengage Learning. Powered by Cognero.

Page 4


Module 05: Protecting Information Resources b. False ANSWER: RATIONALE:

False Correct In the context of intentional computer and network threats, social engineering means using “people skills”-such as being a good listener and assuming a friendly, unthreatening air-to trick others into revealing private information. This is an attack that takes advantage of the human element of security systems. See 5-3: Security Threats: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Identify the nine most common intentional security threats. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 11. In some instances, after examining an incoming packet, a firewall can send a message to the packet’s sender that the attempt to transmit the packet has failed. a. True b. False ANSWER: True RATIONALE: Correct After examining an incoming packet, a firewall can send a message to the packet’s sender that the attempt failed. A firewall can examine data passing into or out of a private network and decide whether to allow the transmission based on users’ IDs, the transmission’s origin and destination, and the transmission’s contents. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 12. Application-filtering firewalls are less expensive than packet-filtering firewalls. a. True b. False ANSWER: False RATIONALE: Correct Copyright Cengage Learning. Powered by Cognero.

Page 5


Module 05: Protecting Information Resources Application-filtering firewalls are generally more secure and flexible than packet-filtering firewalls, but they are also more expensive. They also filter viruses and log actions more effectively than packet-filtering firewalls, which helps network administrators spot potential security breaches. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 13. An intrusion detection system (IDS) can protect networks against both external and internal access. a. True b. False ANSWER: True RATIONALE: Correct An IDS can protect networks against both external and internal access. It is usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for a network administrator, and cause routers to terminate connections with suspicious sources. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 14. The main drawback of an intrusion detection system (IDS) is its inability to prevent denial-of-service (DoS) attacks. a. True b. False ANSWER: False RATIONALE: Correct An IDS can prevent DoS attacks. It monitors network traffic and uses the “prevent, detect, and react” approach to security. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 6


Module 05: Protecting Information Resources DIFFICULTY: REFERENCES:

Moderate Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 15. Terminal resource security is a software feature that erases the screen and signs a user off automatically after a specified length of inactivity. a. True b. False ANSWER: True RATIONALE: Correct Terminal resource security is a software feature that erases the screen and signs a user off automatically after a specified length of inactivity. This method of access control prevents unauthorized users from using an unattended computer to access the network and data. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Access control systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 16. The cost of setting up a virtual private network (VPN) is usually high. a. True b. False ANSWER: False RATIONALE: Correct The cost of setting up a VPN is usually low, but transmission speeds can be slow, and lack of standardization can be a problem. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: True / False Copyright Cengage Learning. Powered by Cognero.

Page 7


Module 05: Protecting Information Resources HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 17. When an organization develops a comprehensive security plan, it should set up a security committee with representatives from all departments as well as upper management. a. True b. False ANSWER: True RATIONALE: Correct When an organization develops a comprehensive security plan, it should set up a security committee with representatives from all departments as well as upper management. See 55: Guidelines for a Comprehensive Security System POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the guidelines for a comprehensive security system, including business continuity planning. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.6 TOPICS: Business continuity planning KEYWORDS: Apply DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 18. When disaster strikes, an organization should contact the insurance company to resume normal operations as soon as possible. a. True b. False ANSWER: True RATIONALE: Correct When disaster strikes, an organization should contact the insurance company to resume normal operations as soon as possible. To lessen the effects of a natural disaster or a network attack or intrusion, planning the recovery is important. See 5-5: Guidelines for a Comprehensive Security System POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize the guidelines for a comprehensive security system, including business continuity planning. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.6 TOPICS: Business continuity planning Copyright Cengage Learning. Powered by Cognero.

Page 8


Module 05: Protecting Information Resources KEYWORDS: DATE CREATED: DATE MODIFIED:

Apply 10/22/2019 1:29 PM 10/22/2019 1:29 PM

19. A hot site, an alternative site to use in case of disaster, does not have the necessary equipment to get up an running immediately. a. True b. False ANSWER: False RATIONALE: Correct. Set up alternative sites to use in case of a disaster. Cold sites have the right environment for computer equipment (such as air conditioning and humidity controls), but no equipment is stored in them. Hot sites, on the other hand, have all the needed equipment and are ready to go. See 5-5: Guidelines for a Comprehensive Security System POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the guidelines for a comprehensive security system including business continuity planning. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.6 KEYWORDS: Apply DATE CREATED: 12/5/2019 2:03 PM DATE MODIFIED: 12/5/2019 2:06 PM 20. In the event of disaster, organizations should document all actions taken to regain normality. a. True b. False ANSWER: True RATIONALE: Correct. If disaster strikes, organizations should document all actions taken to regain normality so they know what worked and what did not work, and should revise the disaster recovery plan, if needed. See 5-5: Guidelines for a Comprehensive Security System POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the guidelines for a comprehensive security system including business continuity planning. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.6 KEYWORDS: Apply DATE CREATED: 12/5/2019 2:08 PM DATE MODIFIED: 12/5/2019 2:10 PM 21. When developing a comprehensive security plan, employees' awareness of security problems should be minimized. a. True Copyright Cengage Learning. Powered by Cognero.

Page 9


Module 05: Protecting Information Resources b. False ANSWER: RATIONALE:

False Correct. Raise employees’ awareness of security problems. An organization’s employees are an essential part of the success of any security system, so training employees about security awareness and security measures is important. See 5-5: Guidelines for a Comprehensive Security System

POINTS: DIFFICULTY: REFERENCES:

1 Easy Summarize the seven steps an organization should follow in order to resume operations in the event of a disaster. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.6 KEYWORDS: Apply DATE CREATED: 12/5/2019 2:37 PM DATE MODIFIED: 12/5/2019 2:40 PM 22. An organization's comprehensive security plan should include procedures for installing software patches and updates on a regular basis. a. True b. False ANSWER: True RATIONALE: Correct. When developing a comprehensive security plan: Install software patches and updates on operating systems on a regular basis. See 5-5: Guidelines for a Comprehensive Security System POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the seven steps an organization should follow in order to resume operations in the event of a disaster. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.6 KEYWORDS: Apply DATE CREATED: 12/5/2019 2:45 PM DATE MODIFIED: 12/5/2019 2:47 PM 23. One of the first steps to consider when developing an organization's comprehensive security plan should be to set up a security committee with representatives from all departments as well as upper management. a. True b. False ANSWER: True RATIONALE: Correct. One of the first steps to consider when developing an organization's comprehensive security plan should be to set up a security committee with representatives from all Copyright Cengage Learning. Powered by Cognero.

Page 10


Module 05: Protecting Information Resources departments as well as upper management. See 5-5: Guidelines for a Comprehensive Security System POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize the seven steps an organization should follow in order to resume operations in the event of a disaster. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.6 KEYWORDS: Apply DATE CREATED: 12/5/2019 2:57 PM DATE MODIFIED: 12/5/2019 2:59 PM Multiple Choice 24. _____ can interfere with users’ control of their computers, through such methods as installing additional software and redirecting Web browsers. a. Keystroke loggers b. Spyware c. Firmware d. Script loggers ANSWER: b RATIONALE: Correct. Spyware can interfere with users’ control of their computers, through such methods as installing additional software and redirecting Web browsers. It is software that secretly gathers information about users while they browse the Web. See 5-1: Risks Associated with Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe information technologies that could be used in computer crimes. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.2 TOPICS: Computer crimes Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 25. Which statement best describes spyware? a. It is software that secretly gathers information about users while they browse the Web. b. It is an attack that floods a server with service requests to prevent legitimate users’ access to the system. c. It is encryption security that manages transmission security on the Internet. d. It is a programming routine built into a system by its designer to bypass system security and sneak back into the system later to access programs or files. ANSWER: a RATIONALE: Correct. Spyware is software that secretly gathers information about users while they Copyright Cengage Learning. Powered by Cognero.

Page 11


Module 05: Protecting Information Resources browse the Web. This information could be used for malicious purposes. See 5-1: Risks Associated with Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe information technologies that could be used in computer crimes. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.2 TOPICS: Computer crimes Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 26. Which statement is true of phishing? a. It involves monitoring and recording keystrokes. b. It involves sending fraudulent e-mails that seem to come from legitimate sources. c. It consists of self-propagating program code that is triggered by a specified time or event. d. It prevents the disclosure of information to anyone who is not authorized to access it. ANSWER: b RATIONALE: Correct. Phishing is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university. The e-mails usually direct recipients to false Web sites that look like the real thing for the purpose of capturing personal information. See 5-1: Risks Associated with Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe information technologies that could be used in computer crimes. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.2 TOPICS: Security risks and threats Computer crimes KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 27. In the context of computer crimes and attacks, the difference between phishing and spear phishing is that: a. in spear phishing, the attack is targeted toward a specific person or a group. b. spear phishing involves monitoring and recording keystrokes. c. in spear phishing, hackers capture and record network traffic. d. spear phishing involves collecting sensitive information via phone calls. ANSWER: a RATIONALE: Correct. Spear phishing is the same as phishing. The difference is that the attack is targeted toward a specific person or a group. See 5-1: Risks Associated with Information Technologies Copyright Cengage Learning. Powered by Cognero.

Page 12


Module 05: Protecting Information Resources POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe information technologies that could be used in computer crimes. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.2 TOPICS: Security risks and threats Computer crimes KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 28. Similar to phishing, _____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers. a. sniffing b. screening c. pharming d. cybersquatting ANSWER: c RATIONALE: Correct. Pharming is similar to phishing in that Internet users are directed to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers. The difference is that pharmers usually hijack an official Web site address by hacking a Domain Name System server, then alter the legitimate Web site IP address so that users who enter the correct Web address are directed to the pharmers’ fraudulent Web site. See 5-1: Risks Associated with Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe information technologies that could be used in computer crimes. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.2 TOPICS: Computer crimes Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 29. The process of capturing and recording network traffic is referred to as _____. a. sniffing b. phishing c. bombing d. pharming ANSWER: a RATIONALE: Correct. Sniffing is capturing and recording network traffic. Although it can be done for legitimate reasons, such as monitoring network performance, hackers often use it to Copyright Cengage Learning. Powered by Cognero.

Page 13


Module 05: Protecting Information Resources intercept information. See 5-1: Risks Associated with Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe information technologies that could be used in computer crimes. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.2 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 30. Spoofing happens when: a. a word is converted into a digital pattern. b. keystrokes are monitored and recorded. c. an illegitimate program poses as a legitimate one. d. a firewall rejects the incoming data packets. ANSWER: c RATIONALE: Correct. Spoofing happens when an illegitimate program poses as a legitimate one. It is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information. See 5-1: Risks Associated with Information Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe information technologies that could be used in computer crimes. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.2 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 31. John downloaded Alten Cleaner, a program that poses as a computer registry cleaner, on his computer. Once he installed the program on his computer, the program illegitimately gained access to John’s passwords and credit card information. In this scenario, it is evident that John was a victim of _____. a. spoofing b. phishing c. baiting d. pharming ANSWER: a RATIONALE: Correct. In the given scenario, it is evident that John was a victim of spoofing. Spoofing happens when an illegitimate program poses as a legitimate one. It is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information. See 5-1: Risks Associated with Information Copyright Cengage Learning. Powered by Cognero.

Page 14


Module 05: Protecting Information Resources Technologies POINTS: 1 DIFFICULTY: Challenging REFERENCES: Describe information technologies that could be used in computer crimes. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.2 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 32. _____ is a computer crime that involves destroying or disrupting computer services. a. Keystroke logging b. Dumpster diving c. Bombing d. Sabotage ANSWER: d RATIONALE: Correct. Sabotage is a computer crime that involves destroying or disrupting computer services. Surprisingly, most computer crimes are committed by company insiders, which makes protecting information resources even more difficult. See 5-1: Risks Associated with Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe information technologies that could be used in computer crimes. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.2 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 33. In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it. a. reliability b. confidentiality c. integrity d. availability ANSWER: b RATIONALE: Correct. Confidentiality means that a system must not allow the disclosing of information by anyone who is not authorized to access it. In businesses, confidentiality ensures that private information, such as payroll and personnel data, is protected from competitors and other organizations. See 5-2: Computer and Network Security: Basic Safeguards POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 15


Module 05: Protecting Information Resources DIFFICULTY: Easy REFERENCES: Describe basic safeguards in computer and network security. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.3 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 34. In the context of computer and network security, _____ refers to the accuracy of information resources within an organization. a. validity b. confidentiality c. integrity d. availability ANSWER: c RATIONALE: Correct. Integrity refers to the accuracy of information resources within an organization. In other words, a security system must not allow data to be corrupted or allow unauthorized changes to a corporate database. See 5-2: Computer and Network Security: Basic Safeguards POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe basic safeguards in computer and network security. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.3 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 35. In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be corrupted or allow unauthorized changes to a corporate database. a. integrity b. confidentiality c. validity d. availability ANSWER: a RATIONALE: Correct. Integrity refers to the accuracy of information resources within an organization. In other words, a security system must not allow data to be corrupted or allow unauthorized changes to a corporate database. See 5-2: Computer and Network Security: Basic Safeguards POINTS: 1 DIFFICULTY: Easy Copyright Cengage Learning. Powered by Cognero.

Page 16


Module 05: Protecting Information Resources REFERENCES: Describe basic safeguards in computer and network security. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.3 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 36. In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need. a. validity b. confidentiality c. integrity d. availability ANSWER: d RATIONALE: Correct. Availability means that computers and networks are operating and authorized users can access the information they need. It also means a quick recovery in the event of a system failure or disaster. See 5-2: Computer and Network Security: Basic Safeguards POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe basic safeguards in computer and network security. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.3 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 37. In the context of computer and network security, _____ means a quick recovery in the event of a system failure or disaster. a. availability b. confidentiality c. integrity d. validity ANSWER: a RATIONALE: Correct. Availability means that computers and networks are operating and authorized users can access the information they need. It also means a quick recovery in the event of a system failure or disaster. See 5-2: Computer and Network Security: Basic Safeguards POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe basic safeguards in computer and network security. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 17


Module 05: Protecting Information Resources LEARNING OBJECTIVES: MIS.10e.5.3 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 38. The Committee on National Security Systems (CNSS) proposed a model known as the _____ for evaluating information security. a. McCumber cube b. Six Sigma model c. Bohr model d. SWOT analysis ANSWER: a RATIONALE: Correct. The CNSS proposed a model known as the McCumber cube. John McCumber created this framework for evaluating information security. See 5-2: Computer and Network Security: Basic Safeguards POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe basic safeguards in computer and network security. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.3 TOPICS: Hacking Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 39. A level 1 security system is used to protect _____ against unauthorized access. a. users’ workstations b. back-end systems c. internal database servers d. front-end servers ANSWER: d RATIONALE: Correct. In level 1 security, front-end servers, those available to both internal and external users, must be protected against unauthorized access. Typically, these systems are e-mail and Web servers. See 5-2: Computer and Network Security: Basic Safeguards POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe basic safeguards in computer and network security. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.3 TOPICS: Security protection Hacking Copyright Cengage Learning. Powered by Cognero.

Page 18


Module 05: Protecting Information Resources KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 10/22/2019 1:29 PM 10/22/2019 1:29 PM

40. In a level 2 security system, _____ must be protected to ensure confidentiality, accuracy, and integrity of data. a. back-end systems b. external databases c. private networks d. front-end servers ANSWER: a RATIONALE: Correct. In level 2 security, back-end systems (such as users’ workstations and internal database servers) must be protected to ensure confidentiality, accuracy, and integrity of data. See 5-2: Computer and Network Security: Basic Safeguards POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe basic safeguards in computer and network security. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.3 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 41. A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access. a. back-end server b. corporate network c. user’s work station d. front-end server ANSWER: b RATIONALE: Correct. In level 3 security, the corporate network must be protected against intrusion, denial-of-service attacks, and unauthorized access. See 5-2: Computer and Network Security: Basic Safeguards POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe basic safeguards in computer and network security. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.3 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM Copyright Cengage Learning. Powered by Cognero.

Page 19


Module 05: Protecting Information Resources 42. When a computer is infected by a virus, _____. a. the system’s disk access is fast b. system updates are recommended often c. some programs suddenly increase in size d. the available memory space remains constant ANSWER: c RATIONALE: Correct. A virus consists of self-propagating code that is triggered by a specific time or event. When programs suddenly increase in size, it is an indication that the computer is infected by a virus. See 5-3: Security Threats: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Identify the nine most common intentional security threats. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 43. In the context of the common intentional security threats, which statement best describes a worm? a. It travels from computer to computer in a network, but it does not usually erase data. b. It attaches itself to a host program to spread to other files in a computer. c. It is a programming routine built into a system by its designer to bypass system security and sneak back into the system later to access data. d. It floods a network or server with service requests to prevent legitimate users’ access to the system. ANSWER: a RATIONALE: Correct. A worm travels from computer to computer in a network, but it does not usually erase data. Unlike a virus, it is an independent program that can spread itself without having to be attached to a host program. See 5-3: Security Threats: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Identify the nine most common intentional security threats. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 44. Which of the following statements is true of a worm? a. It is usually hidden inside a popular program, but it is not capable of replicating itself. b. It floods a network or server with service requests to prevent legitimate users’ access to the system. c. It is an independent program that can spread itself without attaching itself to a host program. Copyright Cengage Learning. Powered by Cognero.

Page 20


Module 05: Protecting Information Resources d. It enables a system designer to bypass the security of a system and sneak back into the system later to access files. ANSWER: c RATIONALE: Correct. A worm travels from computer to computer in a network, but it does not usually erase data. Unlike a virus, it is an independent program that can spread itself without attaching itself to a host program. See 5-3: Security Threats: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Identify the nine most common intentional security threats. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 45. In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replicate themselves. a. Trojan programs b. worms c. viruses d. McCumber cubes ANSWER: a RATIONALE: Correct. Trojan programs can erase data and wreak havoc on computers and networks, but they do not replicate themselves, as viruses and worms do. They contain code intended to disrupt a computer, network, or Web site, and they are usually hidden inside a popular program. See 5-3: Security Threats: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Identify the nine most common intentional security threats. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 46. A _____ is a type of an intentional computer and network threat. a. latch b. proxy server c. backdoor d. corner bolt ANSWER: c Copyright Cengage Learning. Powered by Cognero.

Page 21


Module 05: Protecting Information Resources RATIONALE:

Correct. A backdoor, a type of an intentional computer and network threat, is a programming routine built into a system by its designer or programmer. This routine enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files. See 5-3: Security Threats: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Identify the nine most common intentional security threats. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 47. Which of the following intentional computer and network threats is a type of Trojan program used to release a virus, worm, or other destructive code? a. A logic bomb b. Dumpster diving c. A blended threat d. Shoulder surfing ANSWER: a RATIONALE: Correct. A logic bomb is a type of Trojan program used to release a virus, worm, or other destructive code. Logic bombs are triggered at a certain time (sometimes the birthday of a famous person) or by a specific event, such as a user pressing the Enter key or running a certain program. See 5-3: Security Threats: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Identify the nine most common intentional security threats. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 48. In the context of intentional computer and network threats, a _____ is a programming routine built into a system by its designer or programmer to bypass system security and sneak back into the system later to access programs or files. a. logic bomb b. proxy server c. firewall d. backdoor ANSWER: d RATIONALE: Correct. A backdoor (also called a trapdoor) is a programming routine built into a system Copyright Cengage Learning. Powered by Cognero.

Page 22


Module 05: Protecting Information Resources by its designer or programmer. This routine enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files. See 5-3: Security Threats: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Identify the nine most common intentional security threats. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 49. In the context of intentional computer and network threats, a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks. a. blended threat b. mirror disk c. backdoor threat d. firewall ANSWER: a RATIONALE: Correct. A blended threat combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks. Blended threats search for vulnerabilities in computer networks and then take advantage of these vulnerabilities by embedding malicious codes in the server’s HTML files or by sending unauthorized e-mails from compromised servers with a worm attachment. See 5-3: Security Threats: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Identify the nine most common intentional security threats. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 50. In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users’ access to the system. a. blended threat b. denial-of-service attack c. keystroke logging attack d. backdoor threat ANSWER: b Copyright Cengage Learning. Powered by Cognero.

Page 23


Module 05: Protecting Information Resources RATIONALE:

Correct. A denial-of-service (DoS) attack floods a network or server with service requests to prevent legitimate users’ access to the system. It can be thought of as 5,000 people surrounding a store and blocking customers who want to enter; the store is open, but it cannot provide service to legitimate customers. See 5-3: Security Threats: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Identify the nine most common intentional security threats. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 51. In the context of security, _____ is an attack that takes advantage of the human element of security systems. a. disk mirroring b. weblogging c. voice recognition d. social engineering ANSWER: d RATIONALE: Correct. In the context of security, social engineering means using “people skills”-such as being a good listener and assuming a friendly, unthreatening air-to trick others into revealing private information. Social engineering attacks take advantage of the human element of security systems. See 5-3: Security Threats: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Identify the nine most common intentional security threats. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 52. Which of the following is a biometric security measure? a. Terminal resource security b. A corner bolt c. A callback modem d. Signature analysis ANSWER: d RATIONALE: Correct. Signature analysis is a biometric security measure. It involves checking a user’s signature as well as deviations in pen pressure, speed, and length of time used to sign the name. See 5-4: Security Measures and Enforcement: An Overview Copyright Cengage Learning. Powered by Cognero.

Page 24


Module 05: Protecting Information Resources POINTS: DIFFICULTY: REFERENCES:

1 Easy Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Biometric access systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 53. Which biometric security measure compares the length of each finger, the translucence of fingertips, and the webbing between fingers against stored data to verify users’ identities? a. Hand geometry b. Fingerprint recognition c. Vein analysis d. Palm prints ANSWER: a RATIONALE: Correct. Hand geometry is a biometric security measure that compares the length of each finger, the translucence of fingertips, and the webbing between fingers against stored data to verify users’ identities. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Biometric access systems Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 54. Which is a nonbiometric security measure? a. Electronic trackers b. Retinal scanning c. Callback modems d. Signature analysis ANSWER: c RATIONALE: Correct. The three main nonbiometric security measures are callback modems, firewalls, and intrusion detection systems. A callback modem verifies whether a user’s access is valid by logging the user off (after he or she attempts to connect to the network) and then calling the user back at a predetermined number. See 5-4: Security Measures and Enforcement: An Overview Copyright Cengage Learning. Powered by Cognero.

Page 25


Module 05: Protecting Information Resources POINTS: DIFFICULTY: REFERENCES:

1 Easy Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 55. Which statement is true of application-filtering firewalls? a. They are less secure than packet-filtering firewalls. b. They filter viruses less effectively than packet-filtering firewalls. c. They filter faster than packet-filtering firewalls. d. They are more expensive than packet-filtering firewalls. ANSWER: d RATIONALE: Correct. Application-filtering firewalls are more expensive than packet-filtering firewalls. They are generally more secure and flexible than packet-filtering firewalls. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 56. In the context of firewall as a nonbiometric security measure, a _____ is software that acts as an intermediary between two systems. a. logic bomb b. callback modem c. proxy server d. block multiplexer ANSWER: c RATIONALE: Correct. A proxy server is software that acts as an intermediary between two systemsbetween network users and the Internet, for example. It is often used to help protect a network against unauthorized access from outside the network by hiding the network addresses of internal systems. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 26


Module 05: Protecting Information Resources DIFFICULTY: REFERENCES:

Easy Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 57. Which statement is true of firewalls? a. They protect against external access, but they leave networks unprotected from internal intrusions. b. They can identify attack signatures, trace patterns, and generate alarms for a network administrator. c. They monitor network traffic and use the “prevent, detect, and react” approach to security. d. They cause routers to terminate connections with suspicious sources. ANSWER: a RATIONALE: Correct. Firewalls protect against external access, but they leave networks unprotected from internal intrusions. An intrusion detection system can protect against both external and internal access. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 58. _____ are usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for a network administrator, and cause routers to terminate connections with suspicious sources. a. Intrusion detection systems b. Proxy servers c. Identification badges d. Virtual private networks ANSWER: a RATIONALE: Correct. An intrusion detection system can protect against both external and internal access. It is usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for a network administrator, and cause routers to terminate connections with suspicious sources. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 27


Module 05: Protecting Information Resources DIFFICULTY: REFERENCES:

Easy Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 59. _____ primarily control access to computers and networks and include devices for securing computers and peripherals from theft. a. Nonbiometric security measures b. Virtual security measures c. Biometric security measures d. Physical security measures ANSWER: d RATIONALE: Correct. Physical security measures primarily control access to computers and networks, and they include devices for securing computers and peripherals from theft. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 60. As a physical security measure, _____. a. electronic trackers are attached to a computer at the power outlet b. passwords are used to restrict access to computers c. firewalls are used to filter data packets d. a user’s signature is verified before granting accessibility ANSWER: a RATIONALE: Correct. As a physical security measure, electronic trackers are attached to a computer at the power outlet. If the power cord is disconnected, a transmitter sends a message to an alarm that goes off or to a camera that records what happens. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 28


Module 05: Protecting Information Resources REFERENCES:

Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 61. _____ are an inexpensive way to secure a computer to a desktop or counter and often have locks as an additional protection against theft. a. Corner bolts b. Identification badges c. Callback modems d. Electronic trackers ANSWER: a RATIONALE: Correct. Corner bolts are an inexpensive way to secure a computer to a desktop or counter. These often have locks as an additional protection against theft. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 62. Which type of access control is used to protect systems from unauthorized access? a. Electronic trackers b. Passwords c. Firewalls d. Identification badges ANSWER: b RATIONALE: Correct. Passwords are a type of access control. A password is a combination of numbers, characters, and symbols that is entered to allow access to a system. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. Copyright Cengage Learning. Powered by Cognero.

Page 29


Module 05: Protecting Information Resources QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Access control systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 63. A(n) _____ network is often used so that remote users have a secure connection to an organization’s network. a. biometric security b. intrusion detection c. virtual private d. terminal resource ANSWER: c RATIONALE: Correct. A virtual private network (VPN) provides a secure tunnel through the Internet for transmitting messages and data via a private network. It is often used so that remote users have a secure connection to an organization’s network. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 64. Data sent through a virtual private network (VPN) can be encrypted using the _____. a. User Datagram Protocol b. Transmission Control Protocol c. Internet Control Message Protocol d. Layer Two Tunneling Protocol ANSWER: d RATIONALE: Correct. Data is encrypted before it is sent through a VPN with a protocol, such as Layer Two Tunneling Protocol or Internet Protocol Security. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 30


Module 05: Protecting Information Resources LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 65. Which form of text needs to be unscrambled using a decryption key? a. Plaintext b. Cleartext c. Teletext d. Ciphertext ANSWER: d RATIONALE: Correct. Data encryption transforms data, called plaintext or cleartext, into a scrambled form called ciphertext that cannot be read by others. The receiver then unscrambles the data by using a decryption key. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 66. _____ is a commonly used encryption protocol that manages transmission security on the Internet. a. Application Layer b. Secure Sockets Layer c. Transmission Control Protocol d. User Datagram Protocol ANSWER: b RATIONALE: Correct. A commonly used encryption protocol is Secure Sockets Layer, which manages transmission security on the Internet. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection Copyright Cengage Learning. Powered by Cognero.

Page 31


Module 05: Protecting Information Resources KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 10/22/2019 1:29 PM 10/22/2019 1:29 PM

67. In data encryption, the https in a browser address bar indicates a safe HTTP connection over _____. a. Secure Sockets Layer b. Transport Layer Security c. User Datagram Protocol d. Transmission Control Protocol ANSWER: a RATIONALE: Correct. The https indicates a Secure HTTP connection over Secure Sockets Layer (SSL). SSL is a commonly used encryption protocol, which manages transmission security on the Internet. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 68. _____, a more recent cryptographic protocol, ensures data security and integrity over public networks, such as the Internet. a. Transport Layer Security b. Terminal Resource Security c. Transmission Control Security d. User Datagram Security ANSWER: a RATIONALE: Correct. Transport Layer Security (TLS) is a more recent cryptographic protocol, which ensures data security and integrity over public networks, such as the Internet. TLS encrypts the network segment used for performing transactions. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 32


Module 05: Protecting Information Resources DATE CREATED: DATE MODIFIED:

10/22/2019 1:29 PM 12/4/2019 4:20 PM

69. _____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority. a. A public key infrastructure b. Open key encryption c. Secret key encryption d. A private key infrastructure ANSWER: a RATIONALE: Correct. A public key infrastructure (PKI) enables users of a public network such as the Internet to securely and privately exchange data through the use of a pair of keys-a public one and a private one-that is obtained from a trusted authority and shared through that authority. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 70. _____ uses a public key known to everyone and a private key known only to the recipient. a. Symmetric encryption b. Asymmetric encryption c. Remote key encryption d. Secret key encryption ANSWER: b RATIONALE: Correct. Asymmetric encryption uses two keys: a public key known to everyone and a private or secret key known only to the recipient. This encryption usually works better for public networks, such as the Internet. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 33


Module 05: Protecting Information Resources DATE CREATED: DATE MODIFIED:

10/22/2019 1:29 PM 10/22/2019 1:29 PM

71. Which statement is true of asymmetric encryption? a. It uses the same key to encrypt and decrypt a message. b. It requires a large amount of processing power. c. It can easily share a key over the Internet. d. It needs the shared key to be a secret between the sender and the receiver. ANSWER: b RATIONALE: Correct. The main drawback of asymmetric encryption is that it is slower and requires a large amount of processing power. Asymmetric encryption uses two keys: a public key known to everyone and a private or secret key known only to the recipient. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 72. _____ is also known as secret key encryption. a. Symmetric encryption b. Auto key generation c. Public key cryptography d. Message authentication ANSWER: a RATIONALE: Correct. Symmetric encryption is also known as secret key encryption. In this, the sender and receiver must agree on a key and keep it secret. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM Copyright Cengage Learning. Powered by Cognero.

Page 34


Module 05: Protecting Information Resources 73. Which statement is true of symmetric encryption? a. It uses two different keys to encrypt and decrypt a message. b. It requires more processing power than asymmetric encryption. c. It is difficult to share a key over the Internet in symmetric encryption. d. It is impossible to create digital signatures using symmetric encryption. ANSWER: c RATIONALE: Correct. In symmetric encryption, the same key is used to encrypt and decrypt the message. The problem with symmetric encryption is that sharing the key over the Internet is difficult. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 74. In the context of e-commerce transaction security measures, authentication is a critical factor because it ensures that: a. a system quickly recovers in the event of a system failure or disaster. b. the person using a credit card number is the card’s legitimate owner. c. the accuracy of information resources within an organization is maintained. d. a system can easily be restored to operational status. ANSWER: b RATIONALE: Correct. Authentication is important because the person using a credit card number in an online transaction is not necessarily the card’s legitimate owner, for example. Two factors are important: what the receiver knows to be accurate and what the sender is providing. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 75. The main function of Cyber Incident Response Capability (CIRC) is to _____. Copyright Cengage Learning. Powered by Cognero.

Page 35


Module 05: Protecting Information Resources a. provide level 1 security b. restrict access controls to unauthorized personnel c. provide information on security incidents d. create backdoors to bypass security protocols ANSWER: c RATIONALE: Correct. CIRC’s main function is to provide information on security incidents, including information systems’ vulnerabilities, viruses, and malicious programs. CIRC also provides awareness training, analysis of threats and vulnerabilities, and other services. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 76. _____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion. a. An access control system b. Business continuity planning c. An intrusion detection system d. Terminal resource security ANSWER: b RATIONALE: Correct. To lessen the effects of a natural disaster or a network attack or intrusion, planning the recovery is important. This includes business continuity planning, which outlines procedures for keeping an organization operational. See 5-5: Guidelines for a Comprehensive Security System POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the guidelines for a comprehensive security system, including business continuity planning. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.6 TOPICS: Business continuity planning KEYWORDS: Apply DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 77. In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment. Copyright Cengage Learning. Powered by Cognero.

Page 36


Module 05: Protecting Information Resources a. risk assessment plan b. systems engineering plan c. disaster recovery plan d. security compliance plan ANSWER: c RATIONALE: Correct. A disaster recovery plan lists the tasks that must be performed to restore damaged data and equipment as well as steps to prepare for disaster. To lessen the effects of a natural disaster or a network attack or intrusion, planning the recovery is important. See 55: Guidelines for a Comprehensive Security System POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the guidelines for a comprehensive security system, including business continuity planning. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.6 TOPICS: Business continuity planning KEYWORDS: Apply DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 78. _____ is an example of antispyware software. a. STOPzilla b. AndroZip c. Tumblr d. Dogpile ANSWER: a RATIONALE: STOPzilla is an example of antispyware software. To protect against spyware, you should install antivirus software that also checks for spyware or you should install antispyware software. See 5-1: Risks Associated with Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe information technologies that could be used in computer crimes. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.2 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 79. _____ is a form of spyware that collects information about a user (without the user’s consent) to determine which commercials to display in the user’s Web browser. a. Firmware b. Silverware Copyright Cengage Learning. Powered by Cognero.

Page 37


Module 05: Protecting Information Resources c. Freeware d. Adware ANSWER: RATIONALE:

d Adware is a form of spyware that collects information about a user (without the user’s consent) to determine which advertisements to display in the user’s Web browser. In addition to antivirus software, an ad-blocking feature should be installed in your Web browser to protect against adware. See 5-1: Risks Associated with Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe information technologies that could be used in computer crimes. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.2 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 80. _____ monitor and record the keys pressed on a keyboard and can be software or hardware devices. a. Keystroke loggers b. Key chain planners c. Key punchers d. Key performers ANSWER: a RATIONALE: Keystroke loggers monitor and record keystrokes and can be software or hardware devices. Sometimes, companies use these devices to track employees’ use of e-mail and the Internet, and this use is legal. See 5-1: Risks Associated with Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe information technologies that could be used in computer crimes. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.2 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 81. _____ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information. a. Phishing b. Keystroke logging c. Spoofing d. Pharming Copyright Cengage Learning. Powered by Cognero.

Page 38


Module 05: Protecting Information Resources ANSWER: RATIONALE:

c Spoofing is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information. Spoofing also happens when an illegitimate program poses as a legitimate one. See 5-1: Risks Associated with Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe information technologies that could be used in computer crimes. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.2 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 82. _____ is the unauthorized use of system data for personal gain, such as transferring money from another’s account or charging purchases to someone else’s account. a. Computer fraud b. Denial-of-service c. Keystroke logging d. Social engineering ANSWER: a RATIONALE: Computer fraud is the unauthorized use of computer data for personal gain, such as transferring money from another’s account or charging purchases to someone else’s account. See 5-1: Risks Associated with Information Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe information technologies that could be used in computer crimes. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.2 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 83. When planning a comprehensive security system, the first step is designing _____, which use a combination of hardware and software for improving reliability, a way of ensuring availability in case of a system failure. a. database-resilient systems b. vulnerability-evade systems c. primary-defense systems d. fault-tolerant systems ANSWER: d RATIONALE: When planning a comprehensive security system, the first step is designing fault-tolerant Copyright Cengage Learning. Powered by Cognero.

Page 39


Module 05: Protecting Information Resources systems, which use a combination of hardware and software for improving reliability, a way of ensuring availability in case of a system failure. See 5-2: Computer and Network Security: Basic Safeguards POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe basic safeguards in computer and network security. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.3 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 84. A _____ consists of self-propagating program code that is triggered by a specified time or event. a. virus b. mirror disk c. cable shield d. backdoor ANSWER: a RATIONALE: A virus consists of self-propagating program code that is triggered by a specified time or event. See 5-3: Security Threats: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Identify the nine most common intentional security threats. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 85. Code Red, Melissa, and Sasser are examples of _____. a. corner bolts b. firewalls c. cable shields d. worms ANSWER: d RATIONALE: Worms are independent programs that can spread themselves without having to be attached to a host program. Code Red, Melissa, and Sasser are examples of worms. See 5-3: Security Threats: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Identify the nine most common intentional security threats. Copyright Cengage Learning. Powered by Cognero.

Page 40


Module 05: Protecting Information Resources QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 86. A(n) _____contains code intended to disrupt a computer, network, or Web site and is usually hidden inside a popular program. a. Trojan program b. PageRank c. exit application d. withdrawal suite ANSWER: a RATIONALE: A Trojan program contains code intended to disrupt a computer, network, or Web site, and it is usually hidden inside a popular program. Users run the popular program, unaware that the malicious program is also running in the background. See 5-3: Security Threats: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Identify the nine most common intentional security threats. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 87. A _____ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a targeted IP address. a. router threat b. magnetic threat c. signal threat d. blended threat ANSWER: d RATIONALE: A blended threat is a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks. It may launch a worm through a Trojan horse or launch a denial-of-service attack at a targeted IP address. See 5-3: Security Threats: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Identify the nine most common intentional security threats. QUESTION TYPE: Multiple Choice Copyright Cengage Learning. Powered by Cognero.

Page 41


Module 05: Protecting Information Resources HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 88. _____, a biometric security measure, translates words into digital patterns, which are recorded and examined for tone and pitch. a. Voice recognition b. Audio manipulation c. Word exhibition d. Keyword identification ANSWER: a RATIONALE: Voice recognition is a biometric security measure that translates words into digital patterns, which are recorded and examined for tone and pitch. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Biometric access systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 89. A(n) _____ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks. a. intrusion detection sysem b. rootkit c. firewall d. electronic tracker ANSWER: c RATIONALE: A firewall is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet. A network administrator defines rules for access, and all other data transmissions are blocked. See 54: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice Copyright Cengage Learning. Powered by Cognero.

Page 42


Module 05: Protecting Information Resources HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 90. _____ is a method of access control that prevents unauthorized users from using an unattended computer to access the network and data. a. Terminal resource security b. Distance-vector routing c. Direct digital synthesis d. Link-state routing ANSWER: a RATIONALE: Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity. This method of access control prevents unauthorized users from using an unattended computer to access the network and data. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Access control systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 91. _____ is one of the most popular password managers. a. CounterSpy b. STOPzilla c. Dashlane d. FilePro ANSWER: c RATIONALE: Dashlane is an example of a password manager. Most password managers assist you as they recognize the phishing sites even if the domain names appear to be identical to your bank or an organization with whom you usually communicate. See 5-4: Security Measures and Enforcement: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Multiple Choice Copyright Cengage Learning. Powered by Cognero.

Page 43


Module 05: Protecting Information Resources HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Access control systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 92. The top two targets for ransomware attacks are the __________. a. Internal Revenue Service and the Social Security Administration b. petroleum industry and nuclear facilities c. aviation and aerospace industries d. healthcare industry and financial institutions ANSWER: d RATIONALE: Correct. The health care industry and financial institutions are the top two targets for ransomware attacks. See 5-1 Risks Associated with Information Technologies. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe information technologies that could be used in computer crimes. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.2 KEYWORDS: Understand DATE CREATED: 12/4/2019 4:44 PM DATE MODIFIED: 12/4/2019 4:51 PM 93. According to a 2019 study, which of the following is not an accurate statistic about ransomware attacks? a. Ransomware generates over $25 million in revenue for hackers each year. b. 34% of businesses hit with malware took a week or more to regain access to their data. c. 97% of targeted US companies paid a ransom. d. A new organization will fall victim to ransomware every 11 seconds by 2021. ANSWER: c RATIONALE: Correct. A study published in 2019 revealed some interesting statistics about ransomware attacks: • • • • • • POINTS: DIFFICULTY:

A new organization will fall victim to ransomware every 11 seconds by 2021. Ransomware attacks have increased over 97 percent in the past two years. 34% of businesses hit with malware took a week or more to regain access to their data. Ransomware generates over $25 million in revenue for hackers each year. More than half of ransoms were paid with bitcoin. 97% of United States’ companies refused to pay a ransom.

See 5-1 Risks Associated with Information Technologies. 1 Moderate

Copyright Cengage Learning. Powered by Cognero.

Page 44


Module 05: Protecting Information Resources REFERENCES: Describe information technologies that could be used in computer crimes. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.2 KEYWORDS: Understand DATE CREATED: 12/4/2019 4:53 PM DATE MODIFIED: 12/4/2019 4:59 PM 94. Before establishing a security program, organizations should __________. a. check temperature and humidity levels b. conduct a basic risk analysis c. recycle or donate used computing devices d. use a co-location facility ANSWER: b RATIONALE: Correct. Organizations should understand the principles of the Sarbanes-Oxley Act of 2002 and conduct a basic risk analysis before establishing a security program. See 5-5: Guidelines for a Comprehensive Security System POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the guidelines for a comprehensive security system including business continuity planning. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.6 KEYWORDS: Apply DATE CREATED: 12/4/2019 7:35 PM DATE MODIFIED: 12/4/2019 7:42 PM 95. Which federal law requires IT professionals to test the effectiveness of security measures protecting a company's data and vital records? a. Sarbanes-Oxley Act of 2002 b. Dodd–Frank Wall Street Reform and Consumer Protection Act of 2010 c. General Data Protection Regulation (GDPR) d. The Federal Trade Commission Act ANSWER: a RATIONALE: Correct. Section 404 of the Sarbanes-Oxley Act of 2002 requires IT professionals to document and test the effectiveness of security measures protecting information technology and systems, including general computer controls, application controls, and system software controls. IT professionals must be familiar with this act and incorporate it into their organizations’ security policies. In addition, companies must set up a security system that protects vital records and data and prevents them from being destroyed, lost, corrupted, or altered by unauthorized users. The purpose of this act is to maintain data integrity and availability of business operations, which are particularly critical in financial organizations. See 5-5: Guidelines for a Comprehensive Security System Copyright Cengage Learning. Powered by Cognero.

Page 45


Module 05: Protecting Information Resources POINTS: DIFFICULTY: REFERENCES:

1 Easy Summarize the guidelines for a comprehensive security system including business continuity planning. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.6 KEYWORDS: Apply DATE CREATED: 12/4/2019 7:45 PM DATE MODIFIED: 12/4/2019 7:54 PM 96. Which of the following is recommended in the context of a comprehensive security plan? a. Employees should be trained in security measures. b. Participants should receive certificates before training sessions. c. Management should expect employees to implement their own training. d. Employee passwords and ID badges should be periodically revoked. ANSWER: a RATIONALE: Correct. An organization’s employees are an essential part of the success of any security system, so training employees about security awareness and security measures is important. Tests and certificates should be given to participants at the end of training sessions. Making sure management supports security training is important to help promote security awareness throughout the organization. Revoke terminated employees’ passwords and ID badges immediately to prevent attempts at retaliation. See 5-5: Guidelines for a Comprehensive Security System POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the guidelines for a comprehensive security system including business continuity planning. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.6 KEYWORDS: Apply DATE CREATED: 12/5/2019 11:18 AM DATE MODIFIED: 12/5/2019 11:27 AM 97. When developing a comprehensive security plan, which of the following steps is not recommended? a. Design an audit trail for incoming and outgoing data. b. Avoid implementing zero trust security. c. Keep printouts locked in secure locations. d. Investigate any billing discrepancies. ANSWER: b RATIONALE: Correct. The following steps should be considered when developing a comprehensive security plan: Copyright Cengage Learning. Powered by Cognero.

Page 46


Module 05: Protecting Information Resources • • • •

Design an audit trail procedure for incoming and outgoing data. Keep sensitive data, software, and printouts locked in secure locations. Investigate any billing discrepancies. Consider implementing zero trust security.

See 5-5: Guidelines for a Comprehensive Security System POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the guidelines for a comprehensive security system including business continuity planning. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.6 KEYWORDS: Apply DATE CREATED: 12/5/2019 11:28 AM DATE MODIFIED: 12/5/2019 11:32 AM 98. If disaster strikes, which of the following is a step that an organization should follow in order to resume normal operations? a. Test the disaster recovery plan with trial data. b. Establish new insurance coverage. c. Notify all affected people, including customers, suppliers, and employees. d. Keep a copy of the disaster recovery plan off-site. ANSWER: c RATIONALE: Correct. If disaster strikes, organizations should follow these steps to resume normal operations as soon as possible: 1. Put together a management crisis team to oversee the recovery plan. 2. Contact the insurance company. 3. Restore phone lines and other communication systems. 4. Notify all affected people, including customers, suppliers, and employees. 5. Set up a help desk to assist affected people. 6. Notify the affected people that recovery is underway. 7. Document all actions taken to regain normality so you know what worked and what did not work; revise the disaster recovery plan, if needed. See 5-5: Guidelines for a Comprehensive Security System POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize the guidelines for a comprehensive security system including business continuity planning. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.6 KEYWORDS: Apply DATE CREATED: 12/5/2019 11:33 AM DATE MODIFIED: 12/5/2019 11:39 AM Copyright Cengage Learning. Powered by Cognero.

Page 47


Module 05: Protecting Information Resources 99. A ________ is rented from a third party and usually contains telecommunication equipment. a. McCumber cube b. data mine c. cold site d. co-location facility ANSWER: d RATIONALE: Correct. Investigate using a co-location facility, which is rented from a third party and usually contains telecommunication equipment. See 5-5: Guidelines for a Comprehensive Security System POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the guidelines for a comprehensive security system including business continuity planning. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.6 KEYWORDS: Apply DATE CREATED: 12/5/2019 11:42 AM DATE MODIFIED: 12/5/2019 11:50 AM 100. Which of the following is not considered part of a comprehensive security plan? a. Leaving logged-on workstations unattended b. Using strong passwords c. Using physical security measures, such as corner bolts on workstations, ID badges, and door locks d. Installing antivirus programs, and making sure they are updated automatically ANSWER: a RATIONALE: Correct. Some of the steps to consider when developing a comprehensive security plan: • • • •

Use strong passwords and don’t use the same passwords across systems or Web sites. Exit programs and systems promptly, and never leave logged-on workstations unattended. Install antivirus programs, and make sure they are updated automatically. Use physical security measures, such as corner bolts on workstations, ID badges, and door locks.

See 5-5: Guidelines for a Comprehensive Security System POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the seven steps an organization should follow in order to resume operations in the event of a disaster. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.5.6 KEYWORDS: Apply Copyright Cengage Learning. Powered by Cognero.

Page 48


Module 05: Protecting Information Resources DATE CREATED: DATE MODIFIED:

12/5/2019 2:48 PM 12/5/2019 2:55 PM

Essay 101. Briefly explain the McCumber cube. ANSWER: Answers will vary. The Committee on National Security Systems proposed a model called the McCumber cube. John McCumber created this framework for evaluating information security. Represented as a three-dimensional cube, it defines nine characteristics of information security. The McCumber cube is more specific than the CIA triangle and helps designers of security systems consider many crucial issues for improving the effectiveness of security measures. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe basic safeguards in computer and network security. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.5.3 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 102. Describe the three levels of security in a comprehensive security system. ANSWER: Answers will vary. A comprehensive security system must provide three levels of security: • Level 1: Front-end servers, those available to both internal and external users, must be protected against unauthorized access. Typically, these systems are e-mail and Web servers. • Level 2: Back-end systems (such as users’ workstations and internal database servers) must be protected to ensure confidentiality, accuracy, and integrity of data. • Level 3: The corporate network must be protected against intrusion, denial-of-service attacks, and unauthorized access. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe basic safeguards in computer and network security. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.5.3 TOPICS: Security protection Hacking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 103. In the context of fault-tolerant systems, describe uninterruptible power supply (UPS). Copyright Cengage Learning. Powered by Cognero.

Page 49


Module 05: Protecting Information Resources ANSWER:

Answers will vary. UPS is a backup power unit that continues to provide electrical power in the event of blackouts and other power interruptions and is most often used to protect servers. It performs two crucial tasks: It serves as a power source to continue running the server (usually for a short period), and it safely shuts down the server. More sophisticated UPS units can prevent users from accessing the server and send an alert to the network administrator. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe basic safeguards in computer and network security. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.5.3 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 104. List several different types of intentional computer and network security threats. ANSWER: Answers will vary. Intentional computer and network threats include the following: a. Viruses b. Worms c. Trojan programs d. Logic bombs e. Backdoors f. Blended threats (e.g., a worm launched by Trojan) g. Rootkits h. Denial-of-service attacks i. Social engineering POINTS: 1 DIFFICULTY: Moderate REFERENCES: Identify the nine most common intentional security threats. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 105. Briefly list some of the indications of a computer being infected by a virus. ANSWER: Answers will vary. The following list describes some of the indications that a computer might be infected by a virus: • Some programs have suddenly increased in size. • Files have been corrupted, or the user is unable to open some files. • Hard disk free space is reduced drastically. Copyright Cengage Learning. Powered by Cognero.

Page 50


Module 05: Protecting Information Resources • The keyboard locks up, or the screen freezes. • Available memory dips down more than usual. • Disk access is slow. • The computer takes longer than normal to start. • There is unexpected disk activity, such as the disk drive light flashing even though the user is not trying to save or open a file. • There are unfamiliar messages on the screen. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Identify the nine most common intentional security threats. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 106. Briefly discuss how a worm can disrupt a computer or a network. ANSWER: Answers will vary. A worm travels from computer to computer in a network, but it does not usually erase data. Unlike a virus, it is an independent program that can spread itself without having to be attached to a host program. It might corrupt data, but it usually replicates itself into a full-blown version that eats up computing resources, eventually bringing a computer or network to a halt. Well-known worms include Code Red, Melissa, and Sasser. Conficker, a recent worm, has infected millions of Windows computers. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Identify the nine most common intentional security threats. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 107. In the context of intentional computer and network threats, describe how blended threats work. ANSWER: Answers will vary. A blended threat is a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks. Blended threats search for vulnerabilities in computer networks and then take advantage of these vulnerabilities by embedding malicious codes in the server’s HTML files or by sending unauthorized e-mails from compromised servers with a worm attachment. They may launch a worm through a Trojan horse or launch a denial-of-service attack at a targeted IP address. Their goal is not just to start and transmit an attack but to spread it. Copyright Cengage Learning. Powered by Cognero.

Page 51


Module 05: Protecting Information Resources POINTS: 1 DIFFICULTY: Moderate REFERENCES: Identify the nine most common intentional security threats. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 108. Briefly discuss dumpster diving and shoulder surfing, two commonly used social-engineering techniques. ANSWER: Answers will vary. Two commonly used social-engineering techniques are called dumpster diving and shoulder surfing. Social engineers often search through dumpsters or trash cans looking for discarded material (such as phone lists and bank statements) that they can use to help break into a network. For example, a social engineer might look up the phone number of a receptionist he or she can call and pretend to be someone else in the organization. Shoulder surfing-that is, looking over someone’s shoulder-is the easiest form of collecting information. Social engineers use this technique to observe an employee entering a password or a person entering a PIN at an ATM, for example. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Identify the nine most common intentional security threats. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.5.4 TOPICS: Security risks and threats KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 109. In the context of biometric security measures, briefly describe some biometric devices and measures. ANSWER: Answers will vary. The following list describes some biometric devices and measures: • Facial recognition-Identify users by analyzing the unique shape, pattern, and positioning of facial features. • Fingerprints-Scan users’ fingerprints and verify them against prints stored in a database. • Hand geometry-Compare the length of each finger, the translucence of fingertips, and the webbing between fingers against stored data to verify users’ identities. • Iris analysis-Use a video camera to capture an image of the user’s iris, then use software to compare the data against stored templates. • Palm prints-Use the palm’s unique characteristics to identify users. A palm reader uses near-infrared light to capture a user’s vein pattern, which is unique to each individual. This is compared to a database that contains existing patterns. This method is often used by law enforcement agencies. • Retinal scanning-Scan the retina using a binocular eye camera, then check against data stored in a database. Copyright Cengage Learning. Powered by Cognero.

Page 52


Module 05: Protecting Information Resources • Signature analysis-Check the user’s signature as well as deviations in pen pressure, speed, and length of time used to sign the name. • Vein analysis-Analyze the pattern of veins in the wrist and back of the hand without making any direct contact with the veins. • Voice recognition-Translate words into digital patterns, which are recorded and examined for tone and pitch. Using voice to verify user identity has one advantage over most other biometric measures: It can work over long distances via ordinary telephones. A welldesigned voice-recognition security system can improve the security of financial transactions conducted over the phone. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Biometric access systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 110. Explain the use of callback modems as a nonbiometric security measure. ANSWER: Answers will vary. A callback modem verifies whether a user’s access is valid by logging the user off (after he or she attempts to connect to the network) and then calling the user back at a predetermined number. This method is useful in organizations with many employees who work off-site and who need to connect to the network from remote locations. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 111. List the actions that a firewall can take after examining a packet. ANSWER: Answers will vary. A firewall can examine data passing into or out of a private network and decide whether to allow the transmission based on users’ IDs, the transmission’s origin and destination, and the transmission’s contents. Information being transmitted is stored in what’s called a packet, and after examining a packet, a firewall can take one of the following actions: Copyright Cengage Learning. Powered by Cognero.

Page 53


Module 05: Protecting Information Resources • Reject the incoming packet. • Send a warning to the network administrator. • Send a message to the packet’s sender that the attempt failed. • Allow the packet to enter (or leave) the private network. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 112. Briefly explain how packet-filtering firewalls work. ANSWER: Answers will vary. Packet-filtering firewalls control data traffic by configuring a router to examine packets passing into and out of a network. The router examines the following information in a packet: source IP address and port, destination IP address and port, and protocol used. Based on this information, rules called packet filters determine whether a packet is accepted, rejected, or dropped. For example, a packet filter can be set up to deny packets coming from specific IP addresses. A packet-filtering firewall informs senders if packets are rejected but does nothing if packets are dropped; senders have to wait until their requests time out to learn that the packets they sent were not received. In addition, these firewalls record all incoming connections, and packets that are rejected might be a warning sign of an unauthorized attempt. Packet-filtering firewalls are somewhat inefficient, however, because they have to examine packets one by one, and they might be difficult to install. In addition, they cannot usually record every action taking place at the firewall, so network administrators could have trouble finding out whether and how intruders are trying to break into the network. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 113. Discuss the guidelines for improving a firewall’s capabilities. ANSWER: Answers will vary. Guidelines for improving a firewall’s capabilities include the Copyright Cengage Learning. Powered by Cognero.

Page 54


Module 05: Protecting Information Resources following: a. Identify what data must be secured, and conduct a risk analysis to assess the costs and benefits of a firewall. b. Compare a firewall’s features with the organization’s security needs. For example, if your organization uses e-mail and FTP frequently, you must make sure that the application-filtering firewall you are considering can handle these network applications. c. Compare features of packet-filtering firewalls, application-filtering firewalls, and proxy servers to determine which of these types addresses your network’s security needs the best. d. Examine the costs of firewalls, and remember that the most expensive firewall is not necessarily the best. Some inexpensive firewalls might be capable of handling everything your organization needs. e. Compare the firewall’s security with its ease of use. Some firewalls emphasize accuracy and security rather than ease of use and functionality. Determine what is most important to your organization when considering the trade-offs. f. Check the vendor’s reputation, technical support, and update policies before making a final decision. As the demand for firewalls has increased, so has the number of vendors, and not all vendors are equal. Keep in mind that you might have to pay more for a product from a vendor with a good reputation that offers comprehensive technical support. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 114. Briefly explain an intrusion detection system (IDS). ANSWER: Answers will vary. Firewalls protect against external access, but they leave networks unprotected from internal intrusions. An IDS can protect against both external and internal access. It is usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for a network administrator, and cause routers to terminate connections with suspicious sources. These systems can also prevent denial-of-service attacks. An IDS monitors network traffic and uses the “prevent, detect, and react” approach to security. Although it improves security, it requires a great deal of processing power and can affect network performance. It might also need additional configuration to prevent it from generating false positive alarms. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic Copyright Cengage Learning. Powered by Cognero.

Page 55


Module 05: Protecting Information Resources LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 115. Explain how proximity-release door openers are used as a physical security measure to control access to computers and networks. ANSWER: Answers will vary. Physical security measures primarily control access to computers and networks, and they include devices for securing computers and peripherals from theft. Proximity-release door openers are an effective way to control access to a computer room. A small radio transmitter is placed in authorized employees’ ID badges, and when they come within a predetermined distance of the computer room’s door, a radio signal sends a key number to the receiver, which unlocks the door. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 116. In the context of access controls, briefly explain the guidelines that need to be followed to increase the effectiveness of passwords. ANSWER: Answers will vary. To increase the effectiveness of passwords, the following guidelines must be followed: • Change passwords frequently. • Passwords should be eight characters or longer. • Passwords should be a combination of uppercase and lowercase letters, numbers, and special symbols, such as @ or $. • Passwords should not be written down. • Passwords should not be common names, such as the user’s first or last name, obvious dates (such as birthdays or anniversaries), or words that can be found in a dictionary. • Passwords should not be increased or decreased sequentially or follow a pattern (for example, 222ABC, 224ABC, 226ABC). • Before employees are terminated, make sure their passwords have been deleted. • Do not use passwords that you have used before. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Essay HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 56


Module 05: Protecting Information Resources STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Access control systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 117. Describe how a virtual private network (VPN) works. ANSWER: Answers will vary. A VPN provides a secure “tunnel” through the Internet for transmitting messages and data via a private network. It is often used so remote users have a secure connection to an organization’s network. VPNs can also be used to provide security for extranets, which are networks set up between an organization and an external entity, such as a supplier. Data is encrypted before it is sent through the tunnel with a protocol, such as Layer Two Tunneling Protocol or Internet Protocol Security. The cost of setting up a VPN is usually low, but transmission speeds can be slow, and lack of standardization can be a problem. Typically, an organization leases the media used for a VPN on an as-needed basis, and network traffic can be sent over the combination of a public network (usually the Internet) and a private network. VPNs are an alternative to private leased lines or dedicated Integrated Services Digital Network (ISDN) lines and T1 lines. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 118. Briefly discuss the process of data encryption. ANSWER: Answers will vary. Data encryption transforms data, called plaintext or cleartext, into a scrambled form called ciphertext that cannot be read by others. The rules for encryption, known as the encryption algorithm, determine how simple or complex the transformation process should be. The receiver then unscrambles the data by using a decryption key. A commonly used encryption protocol is Secure Sockets Layer (SSL), which manages transmission security on the Internet. Next time you purchase an item online, notice that the http in the browser address bar changes to https. The https indicates a Secure HTTP connection over SSL. You might also see a padlock icon in the status bar at the bottom to indicate that your information has been encrypted and hackers cannot intercept it. A more recent cryptographic protocol is Transport Layer Security (TLS), which ensures data security and integrity over public networks, such as the Internet. Similar to SSL, TLS encrypts the network segment used for performing transactions. In addition to being encryption protocols, SSL and TLS have authentication functions. POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 57


Module 05: Protecting Information Resources DIFFICULTY: REFERENCES:

Moderate Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 119. In the context of data encryption, briefly describe asymmetric encryption. ANSWER: Answers will vary. Asymmetric encryption uses two keys: a public key known to everyone and a private or secret key known only to the recipient. A message encrypted with a public key can be decrypted only with the same algorithm used by the public key and requires the recipient’s private key, too. Anyone intercepting the message cannot decrypt it, because he or she does not have the private key. This encryption usually works better for public networks, such as the Internet. Each company conducting transactions or sending messages gets a private key and a public key; a company keeps its private key and publishes its public key for others to use. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 120. Discuss the functions of the Computer Emergency Response Team (CERT). ANSWER: Answers will vary. The CERT was developed by the Defense Advanced Research Projects Agency (part of the Department of Defense) in response to the 1988 Morris worm attack, which disabled 10 percent of the computers connected to the Internet. Many organizations now follow the CERT model to form teams that can handle network intrusions and attacks quickly and effectively. Currently, CERT focuses on security breaches and denial-ofservice (DoS) attacks and offers guidelines on handling and preventing these incidents. CERT also conducts a public awareness campaign and researches Internet security vulnerabilities and ways to improve security systems. Network administrators and ecommerce site managers should check the CERT Coordination Center for updates on protecting network and information resources. POINTS: 1 DIFFICULTY: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 58


Module 05: Protecting Information Resources REFERENCES:

Describe the nine security measures and enforcement that a comprehensive security system should include. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.5.5 TOPICS: Security protection KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 121. Summarize the seven steps an organization should follow in order to resume operations in the event of a disaster. ANSWER: Answers will vary. If disaster strikes, organizations should follow these steps to resume normal operations as soon as possible: 1. 2. 3. 4. 5. 6. 7.

Put together a management crisis team to oversee the recovery plan. Contact the insurance company. Restore phone lines and other communication systems. Notify all affected people, including customers, suppliers, and employees. Set up a help desk to assist affected people. Notify the affected people that recovery is underway. Document all actions taken to regain normality so you know what worked and what did not work; revise the disaster recovery plan, if needed.

See 5-5: Guidelines for a Comprehensive Security System POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize the seven steps an organization should follow in order to resume operations in the event of a disaster. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.5.6 KEYWORDS: Apply DATE CREATED: 12/5/2019 2:22 PM DATE MODIFIED: 12/5/2019 2:25 PM 122. In the context of business continuity planning, list at least five of the procedures for keeping an organization operational in the event of a disaster. ANSWER: Answers will vary. Business continuity planning outlines procedures for keeping an organization operational. A disaster recovery plan lists the tasks that must be performed to restore damaged data and equipment as well as steps to prepare for a disaster, such as the following: • • •

Back up all files. Periodically review security and fire standards for computer facilities. Periodically review information from CERT and other security agencies.

Copyright Cengage Learning. Powered by Cognero.

Page 59


Module 05: Protecting Information Resources • • • • • •

• • • • •

Make sure staff members have been trained and are aware of the consequences of possible disasters and steps to reduce the effects of disasters. Test the disaster recovery plan with trial data. Identify vendors of all software and hardware used in the organization. Document all changes made to hardware and software. Get a comprehensive insurance policy for computers and network facilities. Periodically review the policy to make sure coverage is adequate and up to date. Set up alternative sites to use in case of a disaster. Cold sites have the right environment for computer equipment (such as air conditioning and humidity controls), but no equipment. Hot sites have all the needed equipment and are ready to go. Investigate using a co-location facility, which is rented from a third party and usually contains telecommunication equipment. Check sprinkler systems, fire extinguishers, and halon gas systems. Keep backups in off-site storage, periodically test data recovery procedures, and keep a detailed record of machine-specific information, such as model and serial numbers. Keep a copy of the disaster recovery plan off-site. Go through a mock disaster to assess response time and recovery procedures.

See 5-5: Guidelines for a Comprehensive Security System POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize the seven steps an organization should follow in order to resume operations in the event of a disaster. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.5.6 KEYWORDS: Apply DATE CREATED: 12/5/2019 2:28 PM DATE MODIFIED: 12/5/2019 2:35 PM

Copyright Cengage Learning. Powered by Cognero.

Page 60


Module 06: Data Communication: Delivering Information Anywhere and Anytime True / False 1. Data communication systems increase inventory costs. a. True b. False ANSWER: False RATIONALE: Correct Data communication applications support just-in-time delivery of goods, which reduces inventory costs and improves the competitive edge. See 6-1: Defining Data Communication POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe major applications of a data communication system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.1 TOPICS: Data communication KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 2. Data communication technologies make Web and video conferencing easier, which can reduce the costs of business travel. a. True b. False ANSWER: True RATIONALE: Correct Data communication is the electronic transfer of data from one location to another. Data communication technologies make Web and video conferencing easier, which can reduce the costs of business travel. See 6-1: Defining Data Communication POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe major applications of a data communication system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.1 TOPICS: Data communication KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 3. Narrowband is capable of transmitting a maximum of 60,000 bps. a. True b. False ANSWER: False RATIONALE: Correct Copyright Cengage Learning. Powered by Cognero.

Page 1


Module 06: Data Communication: Delivering Information Anywhere and Anytime Narrowband is a voice-grade transmission channel capable of transmitting a maximum of 56,000 bps, so only a limited amount of information can be transferred in a specific period of time. See 6-2: Basic Components of a Data Communication System POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 4. Protocols are devices that connect users to the Internet. a. True b. False ANSWER: False RATIONALE: Correct Protocols are rules that govern data communication, including error detection, message length, and transmission speed. Modems are devices that connect users to the Internet. See 6-2: Basic Components of a Data Communication System POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 5. Terrestrial microwave systems use Earth-based transmitters and receivers for transmitting data. a. True b. False ANSWER: True RATIONALE: Correct Terrestrial microwave systems use Earth-based transmitters and receivers and are often used for point-to-point links between buildings. See 6-2: Basic Components of a Data Communication System POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: True / False Copyright Cengage Learning. Powered by Cognero.

Page 2


Module 06: Data Communication: Delivering Information Anywhere and Anytime HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 6. In a centralized processing system, processing power is distributed among several locations. a. True b. False ANSWER: False RATIONALE: Correct In a centralized processing system, all processing is done at one central computer, whereas in distributed processing, processing power is distributed among several locations. See 6-3: Processing Configurations POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the three major types of processing configurations. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.3 TOPICS: Processing configurations KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 7. Distributed processing maintains decentralized control and centralized operations. a. True b. False ANSWER: False RATIONALE: Correct Distributed processing maintains centralized control and decentralized operations. Processing power is distributed among several locations. See 6-3: Processing Configurations POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the three major types of processing configurations. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.3 TOPICS: Processing configurations KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM Copyright Cengage Learning. Powered by Cognero.

Page 3


Module 06: Data Communication: Delivering Information Anywhere and Anytime 8. The data transfer speeds of local area networks (LANs) typically range from 100 Mbps to 10 Gbps. a. True b. False ANSWER: True RATIONALE: Correct The data transfer speeds of LANs typically vary from 100 Mbps to 10 Gbps. Usually, a LAN covers a limited geographical area, such as a building or campus, and one company owns it. See 6-4: Types of Networks POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three types of networks. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.4 TOPICS: Network defined KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 9. Ethernet is a standard communication protocol embedded in software and hardware devices used for building a local area network (LAN). a. True b. False ANSWER: True RATIONALE: Correct Ethernet is a standard communication protocol embedded in software and hardware devices used for building a LAN. An Ethernet cable is used to connect computers, hubs, switches, and routers to a network. See 6-4: Types of Networks POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three types of networks. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.4 TOPICS: Network defined KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 10. A ring topology needs more cables to connect the nodes within a network than a star topology. a. True b. False ANSWER: False RATIONALE: Correct A ring topology needs less cable than a star topology, but it is similar to a star topology in that it is better for handling heavy but short bursts of traffic. See 6-5: Network Topologies Copyright Cengage Learning. Powered by Cognero.

Page 4


Module 06: Data Communication: Delivering Information Anywhere and Anytime POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the five main network topologies. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.5 TOPICS: Network topologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 11. The bus topology connects nodes along a network segment, with the ends connected in a manner similar to a ring topology. a. True b. False ANSWER: False RATIONALE: Correct The bus topology connects nodes along a network segment, but the ends of the cable are not connected, as they are in a ring topology. A hardware device called a terminator is used at each end of the cable to absorb the signal. See 6-5: Network Topologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the three main network topologies. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.5 TOPICS: Network topologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 12. Any packet-switching network can handle multimedia data. a. True b. False ANSWER: True RATIONALE: Correct Any packet-switching network can handle multimedia data, such as text, graphics, audio, and video. Packets are transmitted along the best route available between sender and receiver. See 6-6: Major Networking Concepts POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain important networking concepts, including protocols, TCP/IP, routing, routers, and the client/server model. QUESTION TYPE: True / False HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 5


Module 06: Data Communication: Delivering Information Anywhere and Anytime LEARNING OBJECTIVES: MIS.10e.6.6 TOPICS: Routing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 13. Wireless network traffic can be captured with sniffers. a. True b. False ANSWER: True RATIONALE: Correct One of the drawbacks of mobile and wireless networks is that wireless network traffic can be captured with sniffers. See 6-7: Wireless and Mobile Networks POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine wireless and mobile technologies and networks in a business setting. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.7 TOPICS: Mobile wireless Internet Wireless networks KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 14. An access point (AP) is the part of a wireless local area network (WLAN) that connects it to other networks. a. True b. False ANSWER: True RATIONALE: Correct An AP is the part of a WLAN that connects it to other networks. Security is important in any type of network, but it is especially important in a wireless network, because anyone walking or driving within the range of an AP can use the network. See 6-8: Wireless Security POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the importance of wireless security and the five techniques used. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.8 TOPICS: Wireless network security KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM Copyright Cengage Learning. Powered by Cognero.

Page 6


Module 06: Data Communication: Delivering Information Anywhere and Anytime 15. In the context of mobile networking, 3G networks have decreased the quality of Internet telephony or Voice over Internet Protocol (VoIP). a. True b. False ANSWER: False RATIONALE: Correct The 3G network has increased the rate of information transfer, its quality, video and broadband wireless data transfers, and the quality of Internet telephony or VoIP. See 6-9: Convergence of Voice, Video, and Data POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the convergence phenomenon and its applications for business and personal use. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.9 TOPICS: Convergence KEYWORDS: Apply DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 16. Gigabit Ethernet is a LAN transmission standard capable of 1 Gbps and 10 Gbps data transfer speeds. a. True b. False ANSWER: True RATIONALE: Correct. Convergence requires major network upgrades because video requires much more bandwidth. Technologies such as Asynchronous Transfer Mode (ATM); Gigabit Ethernet; 3G, 4G, and 5G networks are helping meet this demand. Gigabit Ethernet is a LAN transmission standard capable of 1 Gbps and 10 Gbps data transfer speeds. See 6-9: Convergence of Voice, Video, and Data POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize the convergence phenomenon and its applications for business and personal use. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.9 KEYWORDS: Apply DATE CREATED: 12/5/2019 5:05 PM DATE MODIFIED: 12/5/2019 5:08 PM 17. EAP (Extensible Authentication Protocol) keys are dynamically generated based on the user’s SSID and password. a. True b. False ANSWER: False Copyright Cengage Learning. Powered by Cognero.

Page 7


Module 06: Data Communication: Delivering Information Anywhere and Anytime RATIONALE:

Correct. EAP (Extensible Authentication Protocol) keys are dynamically generated based on the user’s ID and password. See 6-8: Wireless Security POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the importance of wireless security and the five techniques used. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.8 KEYWORDS: Understand DATE CREATED: 12/6/2019 10:28 AM DATE MODIFIED: 12/6/2019 10:30 AM 18. WPA (Wi-Fi Protected Access) keys are longer than WEP (Wired Equivalent Privacy) keys, and are therefore more difficult to break. a. True b. False ANSWER: True RATIONALE: Correct. WPA (Wi-Fi Protected Access) combines the strongest features of WEP and EAP. Keys are fixed, as in WEP, or dynamically changed, as in EAP. However, the WPA key is longer than the WEP key; therefore, it is more difficult to break. See 6-8: Wireless Security POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the importance of wireless security and the five techniques used. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.8 KEYWORDS: Understand DATE CREATED: 12/6/2019 10:33 AM DATE MODIFIED: 12/6/2019 10:35 AM 19. A company's BYOD strategy requires employees to use the organization's computers, tablets, smartphones, or other devices for work purposes. a. True b. False ANSWER: False RATIONALE: Correct. The BYOD strategy allows employees of an organization to use their own computers, tablets, smartphones, or other devices for work purposes. See 6-7 Wireless and Mobile Networks POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine wireless and mobile technologies and networks in a business setting. Copyright Cengage Learning. Powered by Cognero.

Page 8


Module 06: Data Communication: Delivering Information Anywhere and Anytime QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.7 KEYWORDS: Understand DATE CREATED: 12/6/2019 12:35 PM DATE MODIFIED: 12/6/2019 12:38 PM 20. Unlike the other disadvantages of wireless, throughput is expected to become a bigger problem in the future. a. True b. False ANSWER: True RATIONALE: Correct. Unlike the other disadvantages of wireless, throughput is expected to become a bigger problem in the future. See 6-7: Wireless and Mobile Networks POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine wireless and mobile technologies and networks in a business setting. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.7 KEYWORDS: Understand DATE CREATED: 12/6/2019 12:52 PM DATE MODIFIED: 12/6/2019 12:53 PM 21. Virtual meetings are not considered cost effective applications of data communication systems for managers. a. True b. False ANSWER: False RATIONALE: Correct. E-collaborations and virtual meetings are other important applications of data communication systems for managers. These applications are cost effective and improve customer service. See 6-1: Defining Data Communication POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe major applications of a data communication system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.1 KEYWORDS: Understand DATE CREATED: 12/6/2019 1:36 PM DATE MODIFIED: 12/6/2019 1:39 PM 22. The Internet and data communication systems facilitate lifelong learning. Copyright Cengage Learning. Powered by Cognero.

Page 9


Module 06: Data Communication: Delivering Information Anywhere and Anytime a. True b. False ANSWER: RATIONALE:

True Correct. The Internet and data communication systems facilitate lifelong learning, which will be an asset for knowledge workers of the future. See 6-1: Defining Data Communication POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe major applications of a data communication system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.1 KEYWORDS: Understand DATE CREATED: 12/6/2019 1:41 PM DATE MODIFIED: 12/6/2019 1:42 PM 23. The decrease in telecommuters is an example of how the boundaries between work and personal life are becoming less clear-cut as data communication becomes more available in both homes and businesses. a. True b. False ANSWER: False RATIONALE: Correct. Boundaries between work and personal life are less clear-cut as data communication is more available in both homes and businesses. The increase in telecommuters is an example of this trend. See 6-1: Defining Data Communication POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe major applications of a data communication system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.1 KEYWORDS: Understand DATE CREATED: 12/6/2019 1:58 PM DATE MODIFIED: 12/6/2019 2:01 PM Multiple Choice 24. _____ is the electronic transfer of data from one location to another. a. Data communication b. Data interpretation c. Data mining d. Data exchange ANSWER: a RATIONALE: Correct. Data communication is the electronic transfer of data from one location to another. Copyright Cengage Learning. Powered by Cognero.

Page 10


Module 06: Data Communication: Delivering Information Anywhere and Anytime Because most organizations collect and transfer data across large geographic distances, an efficient data communication system is critical. See 6-1: Defining Data Communication POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe major applications of a data communication system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.1 TOPICS: Data communication KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 25. _____ is the amount of data that can be transferred from one point to another in one second. a. Bandwidth b. Packet c. Latency d. Protocol ANSWER: a RATIONALE: Correct. Bandwidth is the amount of data that can be transferred from one point to another in a certain time period, usually one second. It is often expressed as bits per second (bps). See 6-2: Basic Components of a Data Communication System POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 26. In _____ data transmission, multiple pieces of data are sent simultaneously to increase the transmission rate. a. narrowband b. baseband c. broadband d. sideband ANSWER: c RATIONALE: Correct. In broadband data transmission, multiple pieces of data are sent simultaneously to increase the transmission rate. Smartphones are widening the broadband gap between seniors and young adults. See 6-2: Basic Components of a Data Communication System POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three major components of a data communication system. Copyright Cengage Learning. Powered by Cognero.

Page 11


Module 06: Data Communication: Delivering Information Anywhere and Anytime QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 27. Which statement is true of the different forms of sender and receiver devices? a. Thin clients have processing power. b. Smart terminals are full-featured computers. c. Workstations serve as stand-alone systems. d. Netbook computers are high-cost computers with disks. ANSWER: c RATIONALE: Correct. An intelligent terminal, a workstation, or a personal computer serves as an input/output devices or as a stand-alone system. Generally, an intelligent terminal is considered a step up from a smart terminal. See 6-2: Basic Components of a Data Communication System POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 28. Identify a true statement about the different forms of sender and receiver devices. a. Thin clients have no processing power. b. Smart terminals are full-featured computers. c. Workstations are the same as supercomputers. d. Netbook computers do not save data to servers. ANSWER: a RATIONALE: Correct. A thin client is used only for sending or receiving information; it has no processing power. See 6-2: Basic Components of a Data Communication System POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems Copyright Cengage Learning. Powered by Cognero.

Page 12


Module 06: Data Communication: Delivering Information Anywhere and Anytime KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 10/22/2019 1:29 PM 10/22/2019 1:29 PM

29. A(n) _____ is a device that connects a user to the Internet. a. drafter b. modem c. cookie d. applet ANSWER: b RATIONALE: Correct. A modem (short for “modulator-demodulator”) is a device that connects a user to the Internet. Dial-up, digital subscriber line, and cable access require modems to connect. See 6-2: Basic Components of a Data Communication System POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 30. _____ is a high-speed carrier service that uses ordinary phone circuits to send and receive data. a. An analog modem b. Digital subscriber line c. Code division multiple access d. A cable modem ANSWER: b RATIONALE: Correct. Digital subscriber line, a common carrier service, is a high-speed service that uses ordinary phone lines. The actual speed is determined by proximity to the provider’s location. See 6-2: Basic Components of a Data Communication System POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 31. _____ are conducted media that can be used for both data and voice transmissions. Copyright Cengage Learning. Powered by Cognero.

Page 13


Module 06: Data Communication: Delivering Information Anywhere and Anytime a. Terrestrial microwaves b. Broadcast radios c. Coaxial cables d. Satellite dishes ANSWER: c RATIONALE: Correct. Coaxial cables are thick cables that can be used for both data and voice transmissions. They are used mainly for long-distance telephone transmissions and local area networks. See 6-2: Basic Components of a Data Communication System POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 32. _____ are glass tubes surrounded by concentric layers of glass, called “cladding,” to form a light path through wire cables. a. Twisted pair cables b. Copper line cables c. Air-spaced coaxial cables d. Fiber-optic cables ANSWER: d RATIONALE: Correct. Fiber-optic cables are glass tubes (half the diameter of a human hair) surrounded by concentric layers of glass, called “cladding,” to form a light path through wire cables. At the core is the central piece of glass that carries the light. See 6-2: Basic Components of a Data Communication System POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 33. _____ have the highest bandwidth of any communication medium. a. Coaxial cables b. Fiber-optic cables c. Twisted pair copper cables Copyright Cengage Learning. Powered by Cognero.

Page 14


Module 06: Data Communication: Delivering Information Anywhere and Anytime d. Ethernet cables ANSWER: RATIONALE:

b Correct. Fiber-optic cables have a higher capacity, smaller size, lighter weight, lower attenuation, and higher security than other cable types; they also have the highest bandwidth of any communication medium. See 6-2: Basic Components of a Data Communication System POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 34. In the context of data communication, which of the following media is based on “line of sight”? a. A terrestrial microwave b. A mechanical wave c. A coaxial cable d. A fiber-optic cable ANSWER: a RATIONALE: Correct. Radiated media use an antenna for transmitting data through air or water. Some of these media are based on “line of sight” (an open path between sending and receiving devices or antennas), including broadcast radio, terrestrial microwave, and satellite. See 62: Basic Components of a Data Communication System POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 35. In the context of data communication, a _____ is based on “line of sight.” a. twisted pair wire b. satellite c. coaxial cable d. fiber-optic cable ANSWER: b RATIONALE: Correct. Some radiated media are based on “line of sight” (an open path between sending Copyright Cengage Learning. Powered by Cognero.

Page 15


Module 06: Data Communication: Delivering Information Anywhere and Anytime and receiving devices or antennas), including broadcast radio, terrestrial microwave, and satellite. See 6-2: Basic Components of a Data Communication System POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 36. Transmission of data across satellites is an example of data communication through _____. a. conducted media b. radiated media c. induced media d. uprooted media ANSWER: b RATIONALE: Correct. Transmission of data across satellites is an example of data communication through radiated media. Radiated media use an antenna for transmitting data through air or water. Some of these media are based on “line of sight” (an open path between sending and receiving devices or antennas), including broadcast radio, terrestrial microwave, and satellite. See 6-2: Basic Components of a Data Communication System POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 37. Identify an advantage of centralized processing. a. It helps in exercising tight control over system operations and applications. b. It is highly responsive to users’ needs. c. It has the highest fault tolerance. d. It is highly compatible with organizational growth because workstations can be added easily. ANSWER: a RATIONALE: Correct. The main advantage of centralized processing is being able to exercise tight control over system operations and applications. The main disadvantage is lack of responsiveness to users’ needs, because the system and its users could be located far apart from each other. See 6-3: Processing Configurations Copyright Cengage Learning. Powered by Cognero.

Page 16


Module 06: Data Communication: Delivering Information Anywhere and Anytime POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the three major types of processing configurations. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.3 TOPICS: Processing configurations KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 38. In _____, each department has its own computer for performing processing tasks. a. centralized processing b. decentralized processing c. distributed processing d. modular processing ANSWER: b RATIONALE: Correct. In decentralized processing, each user, department, or division has its own computer (sometimes called an “organizational unit”) for performing processing tasks. A decentralized processing system is certainly more responsive to users than a centralized processing system. See 6-3: Processing Configurations POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the three major types of processing configurations. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.3 TOPICS: Processing configurations KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 39. Which problem is resolved by distributed processing? a. Lack of coordination in centralized processing b. Lack of responsiveness in centralized processing c. Lack of security in decentralized processing d. Lack of individuality in decentralized processing ANSWER: b RATIONALE: Correct. Distributed processing solves two main problems-the lack of responsiveness in centralized processing and the lack of coordination in decentralized processing-by maintaining centralized control and decentralizing operations. See 6-3: Processing Configurations POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the three major types of processing configurations. Copyright Cengage Learning. Powered by Cognero.

Page 17


Module 06: Data Communication: Delivering Information Anywhere and Anytime QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.3 TOPICS: Processing configurations KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 40. The _____ layer of the Open Systems Interconnection (OSI) model provides services that support users’ tasks, such as file transfers, database access, and e-mail. a. Application b. Presentation c. Network d. Data Link ANSWER: a RATIONALE: Correct. The Application layer of the OSI model serves as the window through which applications or computer programs access network services. It performs different tasks, depending on the application, and provides services that support users’ tasks, such as file transfers, database access, and e-mail. See 6-3: Processing Configurations POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the three major types of processing configurations. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.3 TOPICS: Processing configurations KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 41. Which layer of the Open Systems Interconnection (OSI) model formats message packets? a. Session b. Application c. Presentation d. Network ANSWER: c RATIONALE: Correct. The Presentation layer of the OSI model formats message packets. See 6-3: Processing Configurations POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the three major types of processing configurations. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.3 TOPICS: Processing configurations Copyright Cengage Learning. Powered by Cognero.

Page 18


Module 06: Data Communication: Delivering Information Anywhere and Anytime KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 10/22/2019 1:29 PM 10/22/2019 1:29 PM

42. The _____ of the Open Systems Interconnection (OSI) model generates the receiver’s address and ensures the integrity of messages by making sure packets are delivered without error, in sequence, and with no loss or duplication. a. Application layer b. Presentation layer c. Session layer d. Transport layer ANSWER: d RATIONALE: Correct. The Transport layer of the OSI model generates the receiver’s address and ensures the integrity of messages by making sure packets are delivered without error, in sequence, and with no loss or duplication. This layer provides methods for controlling data flow, ordering received data, and acknowledging received data. See 6-3: Processing Configurations POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the three major types of processing configurations. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.3 TOPICS: Processing configurations KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 43. Which layer of the Open Systems Interconnection (OSI) model specifies the electrical connections between computers and the transmission medium and is primarily concerned with transmitting binary data, or bits, over a communication network? a. Application b. Transport c. Data Link d. Physical ANSWER: d RATIONALE: Correct. The Physical layer of the OSI model specifies the electrical connections between computers and the transmission medium and defines the physical medium used for communication. This layer is primarily concerned with transmitting binary data, or bits, over a communication network. See 6-3: Processing Configurations POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the three major types of processing configurations. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.3 TOPICS: Processing configurations Copyright Cengage Learning. Powered by Cognero.

Page 19


Module 06: Data Communication: Delivering Information Anywhere and Anytime KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 10/22/2019 1:29 PM 10/22/2019 1:29 PM

44. _____ is the physical link between a network and a workstation. a. The session layer b. An adapter card c. An html address d. A network topology ANSWER: b RATIONALE: Correct. A network interface card (NIC), also called an “adapter card,” is the physical link between a network and a workstation. See 6-4: Types of Networks POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three types of networks. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.4 TOPICS: Network defined Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 45. A network interface card (NIC) operates at the Open Systems Interconnection (OSI) model’s _____ layers. a. Presentation and Application b. Session and Presentation c. Network and Transport d. Physical and Data Link ANSWER: d RATIONALE: Correct. An NIC, also called an “adapter card,” is the physical link between a network and a workstation, so it operates at the OSI model’s Physical and Data Link layers. See 6-4: Types of Networks POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three types of networks. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.4 TOPICS: Network defined Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM Copyright Cengage Learning. Powered by Cognero.

Page 20


Module 06: Data Communication: Delivering Information Anywhere and Anytime 46. Local area networks (LANs) are used to _____. a. integrate services to a single building or campus b. link computers that are geographically far apart c. connect various wide area networks in metropolitan areas d. provide communication services spanning several cities or states ANSWER: a RATIONALE: Correct. LANs connect workstations and peripheral devices that are in close proximity. Usually, a LAN covers a limited geographical area, such as a building or campus, and one company owns it. See 6-4: Types of Networks POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the three types of networks. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.4 TOPICS: Network defined Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 47. _____ are used to connect computers, hubs, switches, and routers to a network in a local area network (LAN). a. Fiber-optic cables b. Satellites c. Ethernet cables d. Terrestrial microwaves ANSWER: c RATIONALE: Correct. In a LAN environment, there are two basic terms to remember: Ethernet and Ethernet cable. An Ethernet cable is used to connect computers, hubs, switches, and routers to a network. See 6-4: Types of Networks POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three types of networks. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.4 TOPICS: Network defined Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 48. A network _____ represents a network’s physical layout. a. utility b. packet Copyright Cengage Learning. Powered by Cognero.

Page 21


Module 06: Data Communication: Delivering Information Anywhere and Anytime c. protocol d. topology ANSWER: RATIONALE:

d Correct. A network topology represents a network’s physical layout, including the arrangement of computers and cables. See 6-5: Network Topologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the five main network topologies. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.5 TOPICS: Network topologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 49. In a(n) _____ topology, if any link between nodes is severed, the entire network is affected, and failure of a single node disrupts the entire network. a. star b. ring c. octagonal d. mesh ANSWER: b RATIONALE: Correct. In a ring topology, if any link between nodes is severed, the entire network is affected, and failure of a single node disrupts the entire network. Transmission is in one direction, and nodes repeat a signal before passing it to the downstream neighbor. See 6-5: Network Topologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the five main network topologies. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.5 TOPICS: Network topologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 50. In the bus topology, a hardware device called a _____ is used at each end of the cable to absorb the transmitted signal. a. emulator b. terminator c. stopper d. node ANSWER: b RATIONALE: Correct. In the bus topology, a hardware device called a terminator is used at each end of Copyright Cengage Learning. Powered by Cognero.

Page 22


Module 06: Data Communication: Delivering Information Anywhere and Anytime the cable to absorb the transmitted signal. Without a terminator, the signal would bounce back and forth along the length of the cable and prevent network communication. See 6-5: Network Topologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the five main network topologies. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.5 TOPICS: Network topologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 12/5/2019 3:59 PM 51. Identify an advantage of the bus topology. a. It makes fault diagnosis easy. b. It detects problems easily due to its centralized control. c. It handles steady traffic well. d. It is effective even when network traffic is heavy. ANSWER: c RATIONALE: Correct. The bus topology handles steady (even) traffic well. In the bus topology, the wiring layout is simple and uses the least amount of cable of any topology, which keeps costs down. See 6-5: Network Topologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the five main network topologies. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.5 TOPICS: Network topologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 52. A hierarchical topology is also called a _____ topology. a. layered b. mixed c. tree d. vertical ANSWER: c RATIONALE: Correct. A hierarchical topology (also called a “tree”) combines computers with different processing strengths in different organizational levels. For example, the bottom level might consist of workstations, with minicomputers in the middle and a server at the top. See 6-5: Network Topologies POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 23


Module 06: Data Communication: Delivering Information Anywhere and Anytime DIFFICULTY: Easy REFERENCES: Describe the five main network topologies. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.5 TOPICS: Network topologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 53. Identify a topology used by traditional mainframe networks. a. A ring topology b. A star topology c. A mesh topology d. A hierarchical topology ANSWER: d RATIONALE: Correct. Traditional mainframe networks use a hierarchical topology. A hierarchical topology (also called a “tree”) combines computers with different processing strengths in different organizational levels. See 6-5: Network Topologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the five main network topologies. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.5 TOPICS: Network topologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 54. A _____ is a hardware device that allows several nodes to share one communication channel. a. multiplexer b. controller c. terminator d. router ANSWER: a RATIONALE: Correct. A multiplexer is a hardware device that allows several nodes to share one communication channel. In traditional mainframe networks, the mainframe computer is at the top, front-end processors are at the next level, controllers and multiplexers are at the next level, and terminals and workstations are at the bottom level. See 6-5: Network Topologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the five main network topologies. QUESTION TYPE: Multiple Choice Copyright Cengage Learning. Powered by Cognero.

Page 24


Module 06: Data Communication: Delivering Information Anywhere and Anytime HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.5 TOPICS: Network topologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 55. Compared with a star topology, a hierarchical topology: a. allows network expansion more easily. b. has cable layouts that are easy to modify. c. offers a great deal of network control and lower cost. d. is more effective at handling heavy but short bursts of traffic. ANSWER: c RATIONALE: Correct. A hierarchical topology offers a great deal of network control and lower cost, compared with a star topology. Its disadvantages include that network expansion may pose a problem, and there could be traffic congestion at the root and higher-level nodes. See 6-5: Network Topologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the five main network topologies. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.5 TOPICS: Network topologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 56. _____ allows the linking of devices running on many different platforms. a. Time Division Multiple Access b. Transmission Control Protocol/Internet Protocol c. A mobile telephone switching office d. A public switched telephone network ANSWER: b RATIONALE: Correct. Transmission Control Protocol/Internet Protocol’s (TCP/IP’s) main advantage is that it enables interoperability-in other words, it allows the linking of devices running on many different platforms. TCP/IP was originally intended for Internet communication, but because it addressed issues such as portability, it also became the standard protocol for UNIX network communication. See 6-6: Major Networking Concepts POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain important networking concepts, including protocols, TCP/IP, routing, routers, and the client/server model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 25


Module 06: Data Communication: Delivering Information Anywhere and Anytime LEARNING OBJECTIVES: MIS.10e.6.6 TOPICS: Networking protocols and standards KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 57. Transmission Control Protocol operates at the _____ of the Open Systems Interconnection (OSI) model. a. Network layer b. Physical layer c. Transport layer d. Data Link layer ANSWER: c RATIONALE: Correct. Two of the major protocols in the Transmission Control Protocol/Internet Protocol (TCP/IP) suite are Transmission Control Protocol (TCP), which operates at the OSI model’s Transport layer, and Internet Protocol (IP), which operates at the OSI model’s Network layer. See 6-6: Major Networking Concepts POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain important networking concepts, including protocols, TCP/IP, routing, routers, and the client/server model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.6 TOPICS: Networking protocols and standards KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 58. Internet Protocol (IP) operates at the _____ of the Open Systems Interconnection (OSI) model. a. Transport layer b. Physical layer c. Data Link layer d. Network layer ANSWER: d RATIONALE: Correct. Two of the major protocols in the Transmission Control Protocol/Internet Protocol (TCP/IP) suite are Transmission Control Protocol (TCP), which operates at the OSI model’s Transport layer, and Internet Protocol (IP), which operates at the OSI model’s Network layer. See 6-6: Major Networking Concepts POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain important networking concepts, including protocols, TCP/IP, routing, routers, and the client/server model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.6 Copyright Cengage Learning. Powered by Cognero.

Page 26


Module 06: Data Communication: Delivering Information Anywhere and Anytime TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Networking protocols and standards Understand 10/22/2019 1:29 PM 10/22/2019 1:29 PM

59. _____ is responsible for packet forwarding. a. Internet Protocol b. Transmission Control Protocol c. User Datagram Protocol d. Extensible Authentication Protocol ANSWER: a RATIONALE: Correct. Internet Protocol is responsible for packet forwarding. To perform this task, it must be aware of the available data link protocols and the optimum size of each packet. See 6-6: Major Networking Concepts POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain important networking concepts, including protocols, TCP/IP, routing, routers, and the client/server model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.6 TOPICS: Networking protocols and standards KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 60. The process of deciding which path data takes on a network is called _____. a. converging b. diverging c. roaming d. routing ANSWER: d RATIONALE: Correct. The process of deciding which path data takes on a network is called routing. Routing is similar to the path you take from home to work. See 6-6: Major Networking Concepts POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain important networking concepts, including protocols, TCP/IP, routing, routers, and the client/server model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.6 TOPICS: Routing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM Copyright Cengage Learning. Powered by Cognero.

Page 27


Module 06: Data Communication: Delivering Information Anywhere and Anytime DATE MODIFIED:

10/22/2019 1:29 PM

61. A routing table lists _____. a. nodes on a network b. the IP address of a router c. the protocols that each node understands d. packets to be sent ANSWER: a RATIONALE: Correct. A routing table lists nodes on a network and the path to each node, along with alternate routes and the speed of existing routes. In most cases, a routing table, generated automatically by software, is used to determine the best possible route for the packet. See 6-6: Major Networking Concepts POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain important networking concepts, including protocols, TCP/IP, routing, routers, and the client/server model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.6 TOPICS: Routing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 62. A(n) _____ is a network connection device that can build tables that identify addresses on each network. a. switch b. adapter card c. dynamic router d. hub ANSWER: c RATIONALE: Correct. A router is a network connection device containing software that connects network systems and controls traffic flow between them. A dynamic router can build tables that identify addresses on each network. See 6-6: Major Networking Concepts POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain important networking concepts, including protocols, TCP/IP, routing, routers, and the client/server model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.6 TOPICS: Routing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM Copyright Cengage Learning. Powered by Cognero.

Page 28


Module 06: Data Communication: Delivering Information Anywhere and Anytime 63. Which event takes place in the most basic client/server configuration? a. The results of a query are sent to the server. b. The server sends a request to the client over a network. c. The client receives and processes a query. d. The user creates a query by running client software. ANSWER: d RATIONALE: Correct. In the most basic client/server configuration, the user runs client software to create a query. The main advantage of the client/server architecture is its scalability, meaning its ability to grow. See 6-6: Major Networking Concepts POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain important networking concepts, including protocols, TCP/IP, routing, routers, and the client/server model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.6 TOPICS: Network architectures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 64. Horizontal scaling of a client/server architecture means _____. a. migrating the network to decentralized servers b. migrating the network to a faster communication media c. adding more proxy servers d. adding more workstations ANSWER: d RATIONALE: Correct. Client/server architectures can be scaled horizontally or vertically. Horizontal scaling means adding more workstations (clients), and vertical scaling means migrating the network to larger, faster servers. See 6-6: Major Networking Concepts POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain important networking concepts, including protocols, TCP/IP, routing, routers, and the client/server model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.6 TOPICS: Network architectures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 65. In the two-tier architecture of the client/server model, _____. a. the presentation logic is always on the client b. the data management logic is always on the client Copyright Cengage Learning. Powered by Cognero.

Page 29


Module 06: Data Communication: Delivering Information Anywhere and Anytime c. the application logic is always on the server d. the application logic is always on the client ANSWER: a RATIONALE: Correct. In the two-tier architecture of the client/server model, the presentation logic is always on the client, and the data management logic is on the server. The application logic can be on the client, on the server, or split between them, although it is usually on the client side. See 6-6: Major Networking Concepts POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain important networking concepts, including protocols, TCP/IP, routing, routers, and the client/server model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.6 TOPICS: Network architectures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 66. Which statement is true of the types of client/server architectures? a. An n-tier architecture tests software easily. b. An n-tier architecture helps improve network performance. c. A two-tier architecture allows easy upgrades of applications. d. A two-tier architecture requires minor modifications in case of any changes in application logic. ANSWER: b RATIONALE: Correct. Improving network performance is a major advantage of the n-tier architecture. An n-tier architecture attempts to balance the workload between client and server by removing application processing from both the client and server and placing it on a middletier server. See 6-6: Major Networking Concepts POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain important networking concepts, including protocols, TCP/IP, routing, routers, and the client/server model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.6 TOPICS: Network architectures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 67. A _____ is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter. a. dynamic network b. mobile network c. mesh network Copyright Cengage Learning. Powered by Cognero.

Page 30


Module 06: Data Communication: Delivering Information Anywhere and Anytime d. wired network ANSWER: RATIONALE:

b Correct. A mobile network (also called a “cellular network”) is a network operating on an RF, consisting of radio cells, each served by a fixed transmitter, known as a “cell site” or “base station.” See 6-7: Wireless and Mobile Networks POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine wireless and mobile technologies and networks in a business setting. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.7 TOPICS: Mobile wireless Internet Wireless networks KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 68. _____ refers to using a cellular phone outside of a carrier’s limited service area. a. Routing b. Teleprocessing c. Roaming d. Surfing ANSWER: c RATIONALE: Correct. Roaming is using a cellular phone outside of a carrier’s limited service area. By doing this, users are extending the connectivity service in a location that is different from the home location where the service was first registered. See 6-7: Wireless and Mobile Networks POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine wireless and mobile technologies and networks in a business setting. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.7 TOPICS: Mobile wireless Internet KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 69. In the context of the technologies developed to improve the efficiency and quality of digital communications, _____ divides each channel into six time slots. a. Time Division Multiple Access b. time of observation c. statistical time division multiplexing d. Time Slot Allocation ANSWER: a Copyright Cengage Learning. Powered by Cognero.

Page 31


Module 06: Data Communication: Delivering Information Anywhere and Anytime RATIONALE:

Correct. Time Division Multiple Access divides each channel into six time slots. Each user is allocated two slots: one for transmission and one for reception. This method increases efficiency by 300 percent, as it allows carrying three calls on one channel. See 6-7: Wireless and Mobile Networks POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine wireless and mobile technologies and networks in a business setting. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.7 TOPICS: Mobile wireless Internet KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 70. In the context of security of wireless networks, which is true of Wired Equivalent Privacy (WEP)? a. It is suitable for large networks with high bandwidths. b. It is the most secure system for wireless networks. c. In WEP, keys are dynamically generated based on the user’s ID and password. d. In WEP, a key must be entered manually into the access point and the client computer. ANSWER: d RATIONALE: Correct. In WEP, a key must be entered manually into the access point and the client computer. The key encrypts the message before transmission. Because this manual process is complex and time consuming, the WEP technique is not suitable for large networks. See 6-8: Wireless Security POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the importance of wireless security and the five techniques used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.8 TOPICS: Wireless network security KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 71. The Wi-Fi Protected Access 2 (WPA2) uses _____ to obtain a master key, which is in turn used to negotiate for a key that will be used for a session. a. Internet Protocol b. Service Set Identifier c. Wired Equivalent Privacy d. Extensible Authentication Protocol ANSWER: d RATIONALE: Correct. The WPA2 uses Extensible Authentication Protocol to obtain a master key. With this master key, a user’s computer and the access point negotiate for a key that will be used Copyright Cengage Learning. Powered by Cognero.

Page 32


Module 06: Data Communication: Delivering Information Anywhere and Anytime for a session. After the session is terminated, the key is discarded. See 6-8: Wireless Security POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the importance of wireless security and the five techniques used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.8 TOPICS: Wireless network security KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 72. In data communication, _____ refers to integrating voice, video, and data so that multimedia information can be used for decision making. a. immersion b. convergence c. telepresence d. integration ANSWER: b RATIONALE: Correct. In data communication, convergence refers to integrating voice, video, and data so that multimedia information can be used for decision making. Convergence requires major network upgrades, because video requires much more bandwidth. See 6-9: Convergence of Voice, Video, and Data POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the convergence phenomenon and its applications for business and personal use. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.9 TOPICS: Convergence KEYWORDS: Apply DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 73. In data communication, the _____ is a packet-switching service that operates at 25 Mbps and 622 Mbps, with maximum speed of up to 10 Gbps. a. 4G network b. Asynchronous Transfer Mode c. 3G network d. IP multimedia subsystem ANSWER: b RATIONALE: Correct. The Asynchronous Transfer Mode is a packet-switching service that operates at 25 Mbps and 622 Mbps, with maximum speed of up to 10 Gbps. See 6-9: Convergence of Copyright Cengage Learning. Powered by Cognero.

Page 33


Module 06: Data Communication: Delivering Information Anywhere and Anytime Voice, Video, and Data POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the convergence phenomenon and its applications for business and personal use. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.9 TOPICS: Convergence KEYWORDS: Apply DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 74. In the context of data communication, which is true of convergence? a. It changes the path that data takes each time a connection is made. b. It allows the transmission of a limited amount of information in a specific period of time. c. It requires major network upgrades, because video requires much more bandwidth. d. It synchronizes devices before establishing a communication link. ANSWER: c RATIONALE: Correct. Convergence requires major network upgrades, because video requires much more bandwidth. This has changed, however, with the availability of high-speed technologies, such as Asynchronous Transfer Mode, Gigabit Ethernet, 3G and 4G networks, and more demand for applications using these technologies. See 6-9: Convergence of Voice, Video, and Data POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize the convergence phenomenon and its applications for business and personal use. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.9 TOPICS: Convergence KEYWORDS: Apply DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 75. _____ is the loss of power in a signal as it travels from the sending device to the receiving device. a. Attenuation b. Convergence c. Throughput d. Bandwidth ANSWER: a RATIONALE: Attenuation is the loss of power in a signal as it travels from the sending device to the receiving device. See 6-2: Basic Components of a Data Communication System POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 34


Module 06: Data Communication: Delivering Information Anywhere and Anytime DIFFICULTY: Easy REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 76. _____ is a voice-grade transmission channel capable of transmitting a maximum of 56,000 bps. a. Narrowband b. Baseband c. Broadband d. Sideband ANSWER: a RATIONALE: Narrowband is a voice-grade transmission channel capable of transmitting a maximum of 56,000 bps, so only a limited amount of information can be transferred in a specific period of time. See 6-2: Basic Components of a Data Communication System POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 77. _____ is a set of rules that governs data communication, including error detection, message length, and transmission speed. a. Throughput b. Attenuation c. A topology d. A protocol ANSWER: d RATIONALE: Synchronization is handled with protocols, rules that govern data communication, including error detection, message length, and transmission speed. Protocols also help ensure compatibility between different manufacturers’ devices. See 6-2: Basic Components of a Data Communication System POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: Multiple Choice Copyright Cengage Learning. Powered by Cognero.

Page 35


Module 06: Data Communication: Delivering Information Anywhere and Anytime HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 78. In the context of communication media, _____ media provide a physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable, and fiber optics. a. radiated b. conducted c. wireless d. non-guided ANSWER: b RATIONALE: Conducted media provide a physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable, and fiber optics. Communication media, or channels, connect sender and receiver devices. They can be conducted (wired or guided) or radiated (wireless). See 6-2: Basic Components of a Data Communication System POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 79. Communication media that use an antenna for transmitting data through air or water are called _____. a. radiated media b. conducted media c. wired media d. guided media ANSWER: a RATIONALE: Radiated media use an antenna for transmitting data through air or water. These media include broadcast radio, terrestrial microwave, and satellite. Some of these media are based on “line of sight” (an open path between sending and receiving devices or antennas). See 6-2: Basic Components of a Data Communication System POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.2 Copyright Cengage Learning. Powered by Cognero.

Page 36


Module 06: Data Communication: Delivering Information Anywhere and Anytime TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Data communication systems Understand 10/22/2019 1:29 PM 10/22/2019 1:29 PM

80. In the early days of computer technology, which system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers? a. Centralized processing b. Decentralized processing c. Distributed processing d. Interconnected processing ANSWER: a RATIONALE: In the early days of computer technology, a centralized processing system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers. The main disadvantage is lack of responsiveness to users’ needs, because the system and its users could be located far apart from each other. This configuration is not used much now. See 6-3: Processing Configurations POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the three major types of processing configurations. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.3 TOPICS: Processing configurations KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 81. The _____ is a seven-layer architecture for defining how data is transmitted from computer to computer in a network. a. Transmission Control Protocol model b. client/server model c. Open Systems Interconnection model d. basic input/output model ANSWER: c RATIONALE: The Open Systems Interconnection (OSI) model is a seven-layer architecture for defining how data is transmitted from computer to computer in a network. OSI also standardizes interactions between network computers exchanging information. See 6-3: Processing Configurations POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the three major types of processing configurations. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.3 Copyright Cengage Learning. Powered by Cognero.

Page 37


Module 06: Data Communication: Delivering Information Anywhere and Anytime TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Processing configurations Understand 10/22/2019 1:29 PM 10/22/2019 1:29 PM

82. A _____ is typically used to connect workstations and peripheral devices that are in close proximity. a. controller area network b. metropolitan area network c. wide area network d. local area network ANSWER: d RATIONALE: A local area network (LAN) connects workstations and peripheral devices that are in close proximity. Usually, a LAN covers a limited geographical area, such as a building or campus, and one company owns it. See 6-4: Types of Networks POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three types of networks. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.4 TOPICS: Network defined KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 83. A _____ is designed to handle data communication for multiple organizations in a city and sometimes nearby cities as well. a. controller area network b. metropolitan area network c. wide area network d. local area network ANSWER: b RATIONALE: A metropolitan area network (MAN) is designed to handle data communication for multiple organizations in a city and sometimes nearby cities as well. The data transfer speed varies from 34 Mbps to 155 Mbps. See 6-4: Types of Networks POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three types of networks. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.4 TOPICS: Network defined KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM Copyright Cengage Learning. Powered by Cognero.

Page 38


Module 06: Data Communication: Delivering Information Anywhere and Anytime 84. A _____ works well for companies that are geographically dispersed. a. ring topology b. star topology c. mesh topology d. hierarchical topology ANSWER: d RATIONALE: Companies that are geographically dispersed and organized hierarchically are good candidates for a hierarchical topology. A hierarchical topology (also called a “tree”) combines computers with different processing strengths in different organizational levels. See 6-5: Network Topologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the five main network topologies. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.5 TOPICS: Network topologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 85. A _____ is a collection of binary digits, including message data and control characters for formatting and transmitting, sent from computer to computer over a network. a. bandwidth b. packet c. topology d. protocol ANSWER: b RATIONALE: A packet is a collection of binary digits-including message data and control characters for formatting and transmitting-sent from computer to computer over a network. Packets are transmitted along the best route available between sender and receiver. See 6-6: Major Networking Concepts POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain important networking concepts, including protocols, TCP/IP, routing, routers, and the client/server model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.6 TOPICS: Routing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 86. In _____ routing, one node is in charge of selecting the path for all packets. Copyright Cengage Learning. Powered by Cognero.

Page 39


Module 06: Data Communication: Delivering Information Anywhere and Anytime a. centralized b. decentralized c. distributed d. clashed ANSWER: RATIONALE:

a In centralized routing, one node is in charge of selecting the path for all packets. This node, considered the network routing manager, stores the routing table, and any changes to a route must be made at this node. See 6-6: Major Networking Concepts POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain important networking concepts, including protocols, TCP/IP, routing, routers, and the client/server model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.6 TOPICS: Routing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 87. In which architecture is the application logic usually on the client side? a. session tier b. two-tier c. middle-tier d. data tier ANSWER: b RATIONALE: In the two-tier architecture, the application logic can be on the client, on the server, or split between them, although it is usually on the client side. See 6-6: Major Networking Concepts POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain important networking concepts, including protocols, TCP/IP, routing, routers, and the client/server model. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.6 TOPICS: Network architectures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 88. What do both Wireless LANs (WLANs) and Wireless WANs (WWANs) rely on as the communication medium? a. multiplexer b. CIA triangle c. controller Copyright Cengage Learning. Powered by Cognero.

Page 40


Module 06: Data Communication: Delivering Information Anywhere and Anytime d. radio frequency spectrum ANSWER: d RATIONALE: Both WLANs and WWANs rely on the radio frequency spectrum as the communication medium. In a wireless environment, portable computers use small antennas to communicate with radio towers in the surrounding area. See 6-7: Wireless and Mobile Networks POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine wireless and mobile technologies and networks in a business setting. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.7 TOPICS: Wireless networks KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 89. _____ is a technique that combines the strongest features of Wired Equivalent Privacy (WEP) and Extensible Authentication Protocol (EAP) techniques and helps improve the security of wireless networks. a. Service Set Identifier b. Media access control c. Code Division Multiple Access d. Wi-Fi Protected Access ANSWER: d RATIONALE: Wi-Fi Protected Access (WPA) is a technique to improve the security of wireless networks, which combines the strongest features of WEP (Wired Equivalent Privacy) and EAP (Extensible Authentication Protocol) techniques. Keys are fixed, as in WEP, or dynamically changed, as in EAP. See 6-8: Wireless Security POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the importance of wireless security and the five techniques used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.8 TOPICS: Wireless network security KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 90. Common applications of convergence do not include which of the following? a. E-commerce b. Increased affordability of computer conferencing c. Telecommuting d. Decreased availability of videos on demand ANSWER: d Copyright Cengage Learning. Powered by Cognero.

Page 41


Module 06: Data Communication: Delivering Information Anywhere and Anytime RATIONALE:

Correct. Common applications of convergence include the following: • • • •

E-commerce More entertainment options as the number of TV channels substantially increases and movies and videos on demand become more available Increased availability and affordability of video and computer conferencing Consumer products and services, such as virtual classrooms, telecommuting, and virtual reality

See 6-9: Convergence of Voice, Video, and Data POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the convergence phenomenon and its applications for business and personal use. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.9 KEYWORDS: Apply DATE CREATED: 12/5/2019 4:35 PM DATE MODIFIED: 12/5/2019 4:44 PM 91. Convergence is possible now because of a combination of technological innovation, changes in market structure, and ________. a. 2G networks b. regulatory reform c. face-to-face meetings d. international postal delivery ANSWER: b RATIONALE: Correct. Convergence is possible now because of a combination of technological innovation, changes in market structure, and regulatory reform. See 6-9: Convergence of Voice, Video, and Data POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize the convergence phenomenon and its applications for business and personal use. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.9 KEYWORDS: Apply DATE CREATED: 12/5/2019 4:45 PM DATE MODIFIED: 12/5/2019 4:49 PM 92. Which of the following is true of the 3G network? a. Has less advanced network capacity than 2G b. Is unable to accommodate streaming video Copyright Cengage Learning. Powered by Cognero.

Page 42


Module 06: Data Communication: Delivering Information Anywhere and Anytime c. Features a wider range of services than 2G d. Requires a nearby Wi-Fi network ANSWER: c RATIONALE: Correct. The 3G network is the third generation of mobile networking and telecommunications. It features a wider range of services and a more advanced network capacity than the 2G network. The 3G network has increased the rate of information transfer, its quality, video and broadband wireless data transfers, and the quality of Internet telephony or Voice over Internet Protocol (VoIP). It has also made streaming video possible as well as much faster uploads and downloads. See 6-9: Convergence of Voice, Video, and Data POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the convergence phenomenon and its applications for business and personal use. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.9 KEYWORDS: Apply DATE CREATED: 12/5/2019 4:52 PM DATE MODIFIED: 12/5/2019 4:58 PM 93. In the past, ________ networks were used to transmit voice, video, and data. a. separate b. integrated c. converged d. asynchronous ANSWER: a RATIONALE: Correct. In data communication, convergence refers to integrating voice, video, and data so that multimedia information can be used for decision making. In the past, separate networks were used to transmit voice, video, and data, but as the demand for integrated services has increased, technology has developed to meet this demand. See 6-9: Convergence of Voice, Video, and Data POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the convergence phenomenon and its applications for business and personal use. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.9 KEYWORDS: Apply DATE CREATED: 12/5/2019 5:00 PM DATE MODIFIED: 12/5/2019 5:03 PM 94. One way to improve the security of a Wi-Fi network is to ___________. Copyright Cengage Learning. Powered by Cognero.

Page 43


Module 06: Data Communication: Delivering Information Anywhere and Anytime a. enable WPA2 encryption b. maintain the router's default password c. filter MAC addresses on your computer d. increase the range of the wireless signal ANSWER: a RATIONALE: Correct. Here are some guidelines for security for a Wi-Fi network: 1. Open your router settings page and change the default password on your router to a strong password. 2. Change your network’s SSID default name to a name that you choose. 3. Enable network encryption to WPA2. 4. Filter MAC (media access control) addresses on your router. 5. If your wireless device is in a small place (such as a small apartment), reduce the range of the wireless signal. 6. As you do with antivirus software, upgrade your router’s firmware to the latest version. See 6-8: Wireless Security POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the importance of wireless security and the five techniques used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.8 KEYWORDS: Understand DATE CREATED: 12/6/2019 10:08 AM DATE MODIFIED: 12/6/2019 10:15 AM 95. All client computers that try to access an access point are required to include an _____ in all their packets. a. CTIA b. TDMA c. WLAN d. SSID ANSWER: d RATIONALE: Correct. SSID (Service Set Identifier)—All client computers that try to access the AP are required to include an SSID in all their packets. See 6-8: Wireless Security POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the importance of wireless security and the five techniques used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.8 KEYWORDS: Understand DATE CREATED: 12/6/2019 10:16 AM Copyright Cengage Learning. Powered by Cognero.

Page 44


Module 06: Data Communication: Delivering Information Anywhere and Anytime DATE MODIFIED:

12/6/2019 10:19 AM

96. WPA2 or 802.11i uses ____ to obtain a master key. a. EAP b. WEP c. SSID d. MAC ANSWER: a RATIONALE: Correct. WPA2 or 802.11i uses EAP to obtain a master key. With this master key, a user’s computer and the access point negotiate for a key that will be used for a session. See 6-8: Wireless Security POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the importance of wireless security and the five techniques used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.8 KEYWORDS: Understand DATE CREATED: 12/6/2019 10:37 AM DATE MODIFIED: 12/6/2019 10:40 AM 97. One disadvantage of the BYOD strategy is the potential for __________. a. cost savings b. increased flexibility c. privacy and security issues d. increased productivity ANSWER: c RATIONALE: Correct. A strategy used by some companies called BYOD (bring your own device) has further enhanced the popularity of mobile and wireless networks. Advantages of this strategy include cost savings, increased flexibility, increased productivity, and its attractiveness for some job-seekers. See 6-7: Wireless and Mobile Networks POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine wireless and mobile technologies and networks in a business setting. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.7 KEYWORDS: Understand DATE CREATED: 12/6/2019 12:42 PM DATE MODIFIED: 12/6/2019 12:47 PM 98. WiMAX usually has a range of about _______ for fixed stations. a. 10 miles Copyright Cengage Learning. Powered by Cognero.

Page 45


Module 06: Data Communication: Delivering Information Anywhere and Anytime b. 20 miles c. 30 miles d. 40 miles ANSWER: RATIONALE:

c Correct. Worldwide Interoperability for Microwave access (WiMaX) is a broadband wireless technology based on the IEEE 802.16 standards. It is designed for wireless metropolitan area networks and usually has a range of about 30 miles for fixed stations and 3–10 miles for mobile stations. See 6-7: Wireless and Mobile Networks POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine wireless and mobile technologies and networks in a business setting. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.7 KEYWORDS: Understand DATE CREATED: 12/6/2019 12:58 PM DATE MODIFIED: 12/6/2019 1:00 PM 99. In the context of data communication, managers need a clear understanding of __________. a. its organizational and social effects b. how disk drives store data c. cache RAM d. the BIOS ANSWER: a RATIONALE: Correct. Managers need a clear understanding of the following areas of data communication: • • • • • •

The basics of data communication and networking The Internet, intranets, and extranets Wired and wireless networks Network security issues and measures Organizational and social effects of data communication Globalization issues

Applications of data communication system POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe major applications of a data communication system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.1 KEYWORDS: Understand DATE CREATED: 12/6/2019 1:19 PM Copyright Cengage Learning. Powered by Cognero.

Page 46


Module 06: Data Communication: Delivering Information Anywhere and Anytime DATE MODIFIED:

12/6/2019 1:28 PM

100. Data communication applications support just-in-time delivery of goods, which reduces ________. a. competitive edge b. globalization issues c. e-commerce efficiency d. inventory costs ANSWER: d RATIONALE: Correct. Data communication applications support just-in-time delivery of goods, which reduces inventory costs and improves the competitive edge. See 6-1: Defining Data Communication POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False DATE CREATED: 12/6/2019 1:44 PM DATE MODIFIED: 12/6/2019 1:48 PM 101. _________ is an application of data communication that allows decision makers throughout the world to work with their colleagues. a. Autonomous transportation b. E-collaboration c. Decentralized processing d. Outsourcing ANSWER: b RATIONALE: Correct. E-collaboration is another main application of data communication. Decision makers can be located throughout the world but can still collaborate with their colleagues no matter where they are. See 6-1: Defining Data Communication POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe major applications of a data communication system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.6.1 KEYWORDS: Understand DATE CREATED: 12/6/2019 1:51 PM DATE MODIFIED: 12/6/2019 1:56 PM Essay 102. Why is an efficient data communication system critical to an information system? ANSWER: Answers will vary. An information system’s effectiveness is measured in part by how efficiently it delivers information, and a data communication system is what enables an Copyright Cengage Learning. Powered by Cognero.

Page 47


Module 06: Data Communication: Delivering Information Anywhere and Anytime information system to carry out this function. In addition, because most organizations collect and transfer data across large geographic distances, an efficient data communication system is critical. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe major applications of a data communication system. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.6.1 TOPICS: Data communication KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 103. List the three main components of a typical data communication system. ANSWER: Answers will vary. A typical data communication system includes the following components: a. Sender and receiver devices b. Modems or routers c. Communication medium (channel) POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 104. Describe an intelligent terminal. ANSWER: Answers will vary. An intelligent terminal, a workstation, or a personal computer serves as an input/output device or as a stand-alone system. Using this type of device, a remote computer can perform certain processing tasks without the main computer’s support. Generally, an intelligent terminal is considered a step up from a smart terminal. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.6.2 Copyright Cengage Learning. Powered by Cognero.

Page 48


Module 06: Data Communication: Delivering Information Anywhere and Anytime TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Data communication systems Understand 10/22/2019 1:29 PM 10/22/2019 1:29 PM

105. Describe a modem. ANSWER:

Answers will vary. A modem (short for “modulator-demodulator”) is a device that connects a user to the Internet. Not all Internet connections require a modem; for example, wireless users connect via access points, and satellite users use a satellite dish. However, dial-up, digital subscriber line, and cable access require modems to connect. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 106. Discuss the various forms of sender and receiver devices. ANSWER: Answers will vary. A sender and receiver device can take various forms: a. An input/output device, or “thin client,” is used only for sending or receiving information; it has no processing power. b. A smart terminal is an input/output device that can perform certain processing tasks but is not a full-featured computer. This type of device is often used on factory floors and assembly lines for collecting data and transmitting it to the main computer system. c. An intelligent terminal, a workstation, or a personal computer serves as an input/output device or as a stand-alone system. Using this type of device, a remote computer can perform certain processing tasks without the main computer’s support. Generally, an intelligent terminal is considered a step up from a smart terminal. d. A netbook computer is a low-cost, diskless computer used to connect to the Internet or a local area network. It runs software off servers and saves data to servers. e. Minicomputers, mainframes, and supercomputers process data and send it to other devices or receive data that has been processed elsewhere, process it, then transmit it to other devices. f. Smartphones are mobile phones with advanced capabilities, such as e-mail and Webbrowsing, and most have a built-in keyboard or an external USB keyboard. A video game console is an electronic device for playing video games. It receives instructions from a game player and produces a video display signal on a monitor such as a television screen or a computer monitor. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: Essay HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 49


Module 06: Data Communication: Delivering Information Anywhere and Anytime STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 107. In the context of communication media, what is the difference between a point-to-point system and a multipoint system? ANSWER: Answers will vary. In a point-to-point system, only one device at a time uses the medium. In a multipoint system, several devices share the same medium, and a transmission from one device can be sent to all other devices sharing the link. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the three major components of a data communication system. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.6.2 TOPICS: Data communication systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 108. Explain the main advantage and disadvantage of a centralized processing system. ANSWER: Answers will vary. The main advantage of a centralized processing system is being able to exercise tight control over system operations and applications. The main disadvantage is lack of responsiveness to users’ needs, because the system and its users could be located far apart from each other. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the three major types of processing configurations. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.6.3 TOPICS: Processing configurations KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 109. List few drawbacks of decentralized systems. ANSWER: Answers will vary. Decentralized systems have some drawbacks, including lack of coordination among organizational units, the high cost of having many systems, and duplication of efforts. POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 50


Module 06: Data Communication: Delivering Information Anywhere and Anytime DIFFICULTY: Moderate REFERENCES: Describe the three major types of processing configurations. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.6.3 TOPICS: Processing configurations KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 110. Explain the advantages of distributed processing. ANSWER: Answers will vary. The advantages of distributed processing include the following: a. Accessing unused processing power is possible. b. Modular design means computer power can be added or removed, based on need. c. Distance and location are not limiting. d. It is more compatible with organizational growth because workstations can be added easily. e. Fault tolerance is improved because of the availability of redundant resources. f. Resources, such as high-quality laser printers, can be shared to reduce costs. g. Reliability is improved because system failures can be limited to only one site. h. The system is more responsive to user needs. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the three major types of processing configurations. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.6.3 TOPICS: Processing configurations KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 111. Describe the responsibilities of the Transport layer of the Open Systems Interconnection (OSI) model. ANSWER: Answers will vary. The Transport layer generates the receiver’s address and ensures the integrity of messages by making sure packets are delivered without error, in sequence, and with no loss or duplication. This layer provides methods for controlling data flow, ordering received data, and acknowledging received data. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the three major types of processing configurations. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.6.3 Copyright Cengage Learning. Powered by Cognero.

Page 51


Module 06: Data Communication: Delivering Information Anywhere and Anytime TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Processing configurations Understand 10/22/2019 1:29 PM 10/22/2019 1:29 PM

112. What are the major types of networks? ANSWER: Answers will vary. There are three major types of networks: local area networks (LANs), wide area networks (WANs), and metropolitan area networks (MANs). In all these networks, computers are usually connected to the network via a network interface card (NIC), a hardware component that enables computers to communicate over a network. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the three types of networks. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.6.4 TOPICS: Network defined KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 113. Briefly explain a wide area network (WAN). ANSWER: Answers will vary. A WAN can span several cities, states, or even countries, and it is usually owned by several different parties. The data transfer speed depends on the speed of its interconnections (called “links”) and can vary from 28.8 Kbps to 155 Mbps. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the three types of networks. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.6.4 TOPICS: Network defined KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 114. Describe a star topology. ANSWER: Answers will vary. A star topology usually consists of a central computer (host computer, often a server) and a series of nodes (typically workstations or peripheral devices). The host computer supplies the main processing power. A node failing does not affect the network’s operation, but if the host computer fails, the entire network goes down. POINTS: 1 DIFFICULTY: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 52


Module 06: Data Communication: Delivering Information Anywhere and Anytime REFERENCES: Describe the five main network topologies. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.6.5 TOPICS: Network topologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 115. Describe a ring topology. ANSWER: Answers will vary. In a ring topology, no host computer is required because each computer manages its own connectivity. Computers and devices are arranged in a circle, so each node is connected to two other nodes: its upstream neighbor and its downstream neighbor. Transmission is in one direction, and nodes repeat a signal before passing it to the downstream neighbor. If any link between nodes is severed, the entire network is affected, and failure of a single node disrupts the entire network. A token ring is a common implementation of the ring topology. Modern ring topologies, such as Fiber Distributed Data Interface, are capable of bidirectional transmission (clockwise and counterclockwise), which prevents the problems caused by a single node failure. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the five main network topologies. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.6.5 TOPICS: Network topologies KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 116. Describe a mesh topology and its advantages. ANSWER: Answers will vary. In a mesh topology (also called “plex” or “interconnected”), every node (which can differ in size and configuration from the others) is connected to every other node. This topology is highly reliable. Failure of one or a few nodes does not usually cause a major problem in network operation, because many other nodes are available. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the five main network topologies. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.6.5 TOPICS: Network topologies KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 53


Module 06: Data Communication: Delivering Information Anywhere and Anytime DATE CREATED: DATE MODIFIED:

10/22/2019 1:29 PM 10/22/2019 1:29 PM

117. What are the disadvantages of centralized routing? Give an example. ANSWER: Answers will vary. As with all centralized configurations, there are disadvantages to having control at one node. For example, if the network routing manager is at a point far from the network’s center, many links and paths that make up the network are far from the central node. Status information sent by other nodes to initiate changes to the routing table have to travel a long distance to the central node, causing a delay in routing some data and reducing network performance. In addition, if the controlling node fails, no routing information is available. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain important networking concepts, including protocols, TCP/IP, routing, routers, and the client/server model. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.6.6 TOPICS: Routing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 118. In the context of client/server architectures, describe a two-tier architecture. ANSWER: Answers will vary. In the two-tier architecture, a client (tier one) communicates directly with the server (tier two). The presentation logic is always on the client, and the data management logic is on the server. The application logic can be on the client, on the server, or split between them, although it is usually on the client side. This architecture is effective in small workgroups (that is, groups of 50 clients or less). Because application logic is usually on the client side, a two-tier architecture has the advantages of application development speed, simplicity, and power. On the downside, any changes in application logic, such as stored procedures and validation rules for databases, require major modifications of clients, resulting in upgrade and modification costs. However, this depends on the application. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain important networking concepts, including protocols, TCP/IP, routing, routers, and the client/server model. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.6.6 TOPICS: Network architectures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM Copyright Cengage Learning. Powered by Cognero.

Page 54


Module 06: Data Communication: Delivering Information Anywhere and Anytime 119. Describe the two categories of wireless technologies. ANSWER: Answers will vary. The two categories of wireless technologies are the following: Wireless LANs (WLANs): These networks are becoming an important alternative to wired local area networks (LANs) in many companies. Like their wired counterparts, WLANs are characterized by having one owner and covering a limited area. Wireless WANs (WWANs): These networks cover a broader area than WLANs and include the following devices: cellular networks, cellular digital packet data, paging networks, personal communication systems, packet radio networks, broadband personal communications systems, microwave networks, and satellite networks. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine wireless and mobile technologies and networks in a business setting. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.6.7 TOPICS: Wireless networks KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 120. How is a Service Set Identifier (SSID) used to improve the security of a wireless network? ANSWER: Answers will vary. All client computers that try to access the access point (AP) are required to include an SSID in all their packets. A packet without an SSID is not processed by the AP. The major weakness of using an SSID is that it can be picked up by other devices within the range, given the right software. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the importance of wireless security and the five techniques used. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.6.8 TOPICS: Wireless network security KEYWORDS: Understand DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM 121. List the common applications of convergence. ANSWER: Answers will vary. Common applications of convergence include the following: a. E-commerce b. More entertainment options as the number of TV channels substantially increases and movies and videos on demand become more available c. Increased availability and affordability of video and computer conferencing d. Consumer products and services, such as virtual classrooms, telecommuting, and virtual reality Copyright Cengage Learning. Powered by Cognero.

Page 55


Module 06: Data Communication: Delivering Information Anywhere and Anytime POINTS: DIFFICULTY: REFERENCES:

1 Moderate Summarize the convergence phenomenon and its applications for business and personal use. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.6.9 TOPICS: Convergence KEYWORDS: Apply DATE CREATED: 10/22/2019 1:29 PM DATE MODIFIED: 10/22/2019 1:29 PM

Copyright Cengage Learning. Powered by Cognero.

Page 56


Module 07: A Connected World True / False 1. The Internet is owned by the Advanced Research Projects Agency Network (ARPANET). a. True b. False ANSWER: False RATIONALE: Correct No one actually owns or runs the Internet, and each network is administered and funded locally. See 7-1: The Internet POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:17 PM 2. The Web changed the Internet by introducing a graphical interface to the largely text-based Internet. a. True b. False ANSWER: True RATIONALE: Correct The Web changed the Internet in 1989 by introducing a graphical interface to the largely text-based Internet. See 7-1: The Internet POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:17 PM 3. Any computer that stores hypermedia documents and makes them available to other computers on the Internet is called a client. a. True b. False ANSWER: False RATIONALE: Correct Any computer that stores hypermedia documents and makes them available to other computers on the Internet is called a server, and computers requesting these documents are Copyright Cengage Learning. Powered by Cognero.

Page 1


Module 07: A Connected World called clients. See 7-1: The Internet POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet infrastructure KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:18 PM 4. Hypermedia documents can be stored anywhere in the world. a. True b. False ANSWER: True RATIONALE: Correct The most exciting feature of the Web is that hypermedia documents can be stored anywhere in the world, so users can jump from a site in the United States to a site in Paris, France, in just a few milliseconds. See 7-1: The Internet POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet infrastructure KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:19 PM 5. Combinations of spaces and special characters can be used in domain names of uniform resource locators (URLs). a. True b. False ANSWER: False RATIONALE: Correct Combinations of letters, the numerals 0 through 9, and hyphens can be used in domain names of URLs. Spaces are not allowed. See 7-1: The Internet POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web Copyright Cengage Learning. Powered by Cognero.

Page 2


Module 07: A Connected World KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 10/22/2019 1:30 PM 12/6/2019 3:20 PM

6. A T3 line uses two pairs of copper wires to carry up to 24 simultaneous conversations and has a transmission rate of 1.544 Mbps. a. True b. False ANSWER: False RATIONALE: Correct T1 uses two pairs of copper wires to carry up to 24 simultaneous conversations (called channels) and has a transmission rate of 1.544 Mbps. A T3 line is a digital communication link that supports transmission rates of 43-45 Mbps. See 7-1: The Internet POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet infrastructure KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:21 PM 7. In the context of directories on the Web, a human-powered directory uses crawlers to collect data. a. True b. False ANSWER: False RATIONALE: Correct A human-powered directory does not use crawlers to collect data; instead, it relies on users to supply the data. See 7-2: Navigational Tools, Search Engines, and Directories POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss navigational tools, search engines, and directories. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.2 TOPICS: Web directories KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 8. In the context of directories on the Web, Open Directory is an example of an automated directory. a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 3


Module 07: A Connected World ANSWER: RATIONALE:

False Correct Open Directory is an example of a human-powered directory. See 7-2: Navigational Tools, Search Engines, and Directories POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss navigational tools, search engines, and directories. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.2 TOPICS: Web directories KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 9. Client-based e-mail enables a user to access his or her e-mail account from any computer. a. True b. False ANSWER: False RATIONALE: Correct Web-based e-mail enables a user to access his or her e-mail account from any computer. Client-based e-mail consists of an e-mail program that a user installs on his or her computer; e-mail is downloaded and stored locally on the user’s computer. See 7-3: Internet Services POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe four common Internet services and how they are used in a business environment. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.3 TOPICS: Internet services KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 10. Voice over Internet Protocol (VoIP) is used to route traffic starting and ending at conventional public switched telephone network phones. a. True b. False ANSWER: True RATIONALE: Correct VoIP is used to route traffic starting and ending at conventional public switched telephone network phones. See 7-3: Internet Services POINTS: 1 DIFFICULTY: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 4


Module 07: A Connected World REFERENCES:

Describe four common Internet services and how they are used in a business environment. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.3 TOPICS: Internet services KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 11. Online degree programs adversely affect colleges and universities that are facing an enrollment decline. a. True b. False ANSWER: False RATIONALE: Correct Online degree programs help colleges and universities facing an enrollment decline, because they make it possible for students who could not attend school otherwise to enroll in classes. See 7-4: Web Applications POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain business applications of the Internet. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.4 TOPICS: Computer uses Web-based software KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 12. Telepresence surgery allows surgeons to operate all over the world without physically traveling anywhere. a. True b. False ANSWER: True RATIONALE: Correct Telepresence surgery allows surgeons to operate all over the world without physically traveling anywhere. See 7-4: Web Applications POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain business applications of the Internet. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.4 TOPICS: Computer uses Web-based software Copyright Cengage Learning. Powered by Cognero.

Page 5


Module 07: A Connected World KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 10/22/2019 1:30 PM 10/22/2019 1:30 PM

13. An intranet is an application or service that uses an organization’s computer network. a. True b. False ANSWER: True RATIONALE: Correct An intranet is an application or service that uses an organization’s computer network. See 7-5: Intranets POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the role of intranets in various business functions. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.5 TOPICS: Intranets KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 14. Intranets are typically set up behind a firewall. a. True b. False ANSWER: True RATIONALE: Correct Carefully defining and limiting access is important for security reasons, so intranets are typically set up behind a firewall. See 7-5: Intranets POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the role of intranets in various business functions. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.5 TOPICS: Intranets KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 15. Even if there are more than one smart object on an individual’s body, they would not be aware of each other’s existence. a. True b. False ANSWER: True Copyright Cengage Learning. Powered by Cognero.

Page 6


Module 07: A Connected World RATIONALE:

Correct Smart objects cannot be connected to one another. Thus, if more than one smart object were on an individual’s body, they would not be aware of each other’s existence. See 7-8: The Internet of Everything and Beyond POINTS: 1 DIFFICULTY: Moderate REFERENCES: Analyze the Internet of Everything and its business applications. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.8 TOPICS: Internet services KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 16. Comprehensive security measures must ensure that access to an organization's extranet is granted only to authorized users and trusted business partners. a. True b. False ANSWER: True RATIONALE: Correct. Often, an organization makes a portion of its intranet accessible to external parties as its extranet. Comprehensive security measures must ensure that access is granted only to authorized users and trusted business partners. See 7-6: Extranets POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the role of extranets in various business functions. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.6 KEYWORDS: Understand DATE CREATED: 12/7/2019 10:51 AM DATE MODIFIED: 12/7/2019 10:53 AM 17. The security system of an organization's extranet should not include auditing and reporting capabilities. a. True b. False ANSWER: False RATIONALE: Correct. The security system of an organization's extranet should include access control, user-based authentication, encryption, and auditing and reporting capabilities. See 7-6: Extranets POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the role of extranets in various business functions. Copyright Cengage Learning. Powered by Cognero.

Page 7


Module 07: A Connected World QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.6 KEYWORDS: Understand DATE CREATED: 12/7/2019 10:55 AM DATE MODIFIED: 12/7/2019 10:58 AM 18. In comparison with the Internet, the information on an organization's extranet is typically confidential. a. True b. False ANSWER: True RATIONALE: Correct. Often, an organiza tion makes a portion of its intranet accessible to external parties as its extranet. Comprehensive security measures must ensure that access is granted only to authorized users and trusted business partners. See 7-6: Extranets POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the role of extranets in various business functions. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.6 KEYWORDS: Understand DATE CREATED: 12/7/2019 11:00 AM DATE MODIFIED: 12/7/2019 11:03 AM 19. IoM will enable health insurers to recommend plans that offer savings for using a wearable device. a. True b. False ANSWER: True RATIONALE: Correct. IoM will enable health insurers to recommend personalized plan options, including some that offer savings for using a wearable device. See 7-8: The Internet of Everything and Beyond POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze the Internet of Everything and its business applications. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.8 KEYWORDS: Analyze DATE CREATED: 12/7/2019 11:13 PM DATE MODIFIED: 12/7/2019 11:16 PM 20. A typical IoT device is secured when purchased from vendors. Copyright Cengage Learning. Powered by Cognero.

Page 8


Module 07: A Connected World a. True b. False ANSWER: RATIONALE:

False Correct. A typical IoT device is unsecured when purchased from vendors; the user has to change the default network name and secure it with a strong password. See 7-8: The Internet of Everything and Beyond POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze the Internet of Everything and its business applications. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.8 KEYWORDS: Analyze DATE CREATED: 12/7/2019 11:32 PM DATE MODIFIED: 12/7/2019 11:33 PM 21. A virtual LAN isolates IoT devices in a logical subnetwork that will group together a collection of devices from different physical LANs. a. True b. False ANSWER: True RATIONALE: Correct. Implement restrictive network communication policies and set up virtual LANs: a virtual LAN isolates IoT devices in a logical subnetwork that will group together a collection of devices from different physical LANs. In this case, if an IoT device gets hacked, the hacker will not have access to the entire network. See 7-8: The Internet of Everything and Beyond POINTS: 1 DIFFICULTY: Moderate REFERENCES: Analyze the Internet of Everything and its business applications. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.8 KEYWORDS: Analyze DATE CREATED: 12/7/2019 11:35 PM DATE MODIFIED: 12/7/2019 11:37 PM Multiple Choice 22. The Web organizes information by using _____, meaning documents that include embedded references to audio, text, images, video, or other documents. a. spyware b. hypermedia c. newsgroups d. adware Copyright Cengage Learning. Powered by Cognero.

Page 9


Module 07: A Connected World ANSWER: RATIONALE:

b Correct. The Web organizes information by using hypermedia, meaning documents that include embedded references to audio, text, images, video, or other documents. Composed of billions of hypermedia documents, the Web constitutes a large portion of the Internet. See 7-1: The Internet POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web Internet infrastructure KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:30 PM 23. Any computer that stores hypermedia documents and makes them available to other computers on the Internet is called a _____. a. client b. server c. station d. domain ANSWER: b RATIONALE: Correct. Any computer that stores hypermedia documents and makes them available to other computers on the Internet is called a server or Web server, and computers requesting these documents are called clients. A client can be a home computer or a node in an organization’s LAN. See 7-1: The Internet POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web Internet infrastructure KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:30 PM 24. Which term is used for unique identifiers of computer or network addresses on the Internet? a. Prototypes b. Domain names c. Foreign keys d. Mirror disks Copyright Cengage Learning. Powered by Cognero.

Page 10


Module 07: A Connected World ANSWER: RATIONALE:

b Correct. Domain names, such as IBM.com or whitehouse.gov, are unique identifiers of computer or network addresses on the Internet. When information is transferred from one network to another, domain names are converted to Internet Protocol addresses by the Domain Name System protocol. See 7-1: The Internet POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the makeup of the Internet and the World Wide Web. Describe the makeup of the Internet and the Web. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web Internet infrastructure KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:31 PM 25. James gets a job at a multinational corporation. On his first day at work, he finds out that the numerical code assigned by the Internet Corporation for Assigned Names and Numbers (ICANN) to his computer system is 115.248.178.233. This numerical code is referred to as a(n) _____. a. Internet Protocol address b. virtual path identifier c. Ethernet address d. data link connection identifier ANSWER: a RATIONALE: Correct. The numerical code, 115.248.178.233, assigned to James’s system is referred to as an Internet Protocol (IP) address. Each computer or network has an IP address, which is assigned by the ICANN. These numbers are difficult to remember, however, so languagebased domain names are used more often to access Web sites. See 7-1: The Internet POINTS: 1 DIFFICULTY: Challenging REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web Internet infrastructure KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:32 PM 26. When information is transferred from one network to another, domain names are converted to _____ by the Domain Name System (DNS) protocol. a. electronic media b. hypermedia Copyright Cengage Learning. Powered by Cognero.

Page 11


Module 07: A Connected World c. Ethernet addresses d. Internet Protocol addresses ANSWER: d RATIONALE: Correct. When information is transferred from one network to another, domain names are converted to Internet Protocol (IP) addresses by the DNS protocol. Servers using this protocol maintain lists of computers’ and Web sites’ addresses and their associated IP addresses. See 7-1: The Internet POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web Internet infrastructure KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:33 PM 27. A(n) _____ identifies a Web page and is the address of a document or site on the Internet. a. top-level domain b. uniform resource locator c. Internet Protocol d. Weblog ANSWER: b RATIONALE: Correct. A uniform resource locator (URL) is the address of a document or site on the Internet that helps in identifying a Web page. See 7-1: The Internet POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web Internet infrastructure KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:34 PM 28. In the universal resource locator (URL) https://www.exsat.org, the domain name is _____. a. http b. .org c. https://www. d. exsat.org ANSWER: d Copyright Cengage Learning. Powered by Cognero.

Page 12


Module 07: A Connected World RATIONALE:

Correct. In the URL https://www.exsat.org, the domain name is exsat.org. See 7-1: The Internet POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web Internet infrastructure KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:34 PM 29. Which indicates the top-level domain for the universal resource locator (URL) http://www.csub.edu? a. http: b. www. c. .csub d. .edu ANSWER: d RATIONALE: Correct. In the URL http://www.csub.edu, .edu is the top-level domain. The suffix, .edu, stands for educational institutions. See 7-1: The Internet POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web Internet infrastructure KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:37 PM 30. Which can be used in domain names in uniform resource locators (URLs)? a. Spaces b. Hyphens c. Asterisks d. Apostrophes ANSWER: b RATIONALE: Correct. Combinations of letters, the numerals 0 through 9, and hyphens can be used in domain names. Spaces are not allowed. See 7-1: The Internet POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the makeup of the Internet and the Web. Copyright Cengage Learning. Powered by Cognero.

Page 13


Module 07: A Connected World QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web Internet infrastructure KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:38 PM 31. Which are not allowed in domain names? a. Numerals b. Hyphens c. Combinations of letters d. Spaces ANSWER: d RATIONALE: Correct. Combinations of letters, the numerals 0 through 9, and hyphens can be used in domain names. Spaces are not allowed. See 7-1: The Internet POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web Internet infrastructure KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:39 PM 32. The _____ denotes the type of organization or country the address of a document or site on the Internet specifies. a. top-level domain b. network interface card c. Post Office Protocol d. User Datagram Protocol ANSWER: a RATIONALE: Correct. The top-level domain (TLD) denotes the type of organization or country the address of a document or site on the Internet specifies. TLDs are divided into organizational domains (generic top-level domains, gTLDs) and geographic domains (country code top-level domains, ccTLDs). See 7-1: The Internet POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 Copyright Cengage Learning. Powered by Cognero.

Page 14


Module 07: A Connected World TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Internet and the World Wide Web Internet infrastructure Understand 10/22/2019 1:30 PM 12/6/2019 3:40 PM

33. Which is a generic top-level domain (TLD) name used for backbone, regional, and commercial networks? a. .org b. .int c. .net d. .mil ANSWER: c RATIONALE: Correct. .net is a generic TLD name used for backbone, regional, and commercial networks. The TLD denotes the type of organization or country the address specifies. See 7-1: The Internet POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web Internet infrastructure KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:40 PM 34. Which is a country code top-level domain? a. .int b. .fr c. .aero d. .mil ANSWER: b RATIONALE: Correct. .fr is the country code top-level domain for France. Top-level domains (TLDs) are divided into organizational domains (generic top-level domains, gTLDs) and geographic domains (country code top-level domains, ccTLDs). See 7-1: The Internet POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web Internet infrastructure KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 15


Module 07: A Connected World DATE CREATED: DATE MODIFIED:

10/22/2019 1:30 PM 12/6/2019 3:41 PM

35. The generic top-level domain (gTLD) for the United Nations is _____. a. .com b. .int c. .net d. .org ANSWER: b RATIONALE: Correct. The gTLD for international organizations, such as the United Nations, is .int. See 7-1: The Internet POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web Internet infrastructure KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:42 PM 36. Which statement is true of geographic top-level domains (TLDs)? a. They are used to promote business and tourism. b. They are owned by corporations to control use of their brands. c. They are limited to members of a defined community. d. They are used by the organizations that provide information services. ANSWER: a RATIONALE: Correct. Geographic TLDs (e.g., .London or .Madrid) are owned by cities and geographic regions and are used to promote business and tourism. See 7-1: The Internet POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web Internet infrastructure KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:43 PM 37. In the uniform resource locator (URL) http://www.csub.edu/~hbidgoli/books.html, _____ represents the name of the directory in which files are stored. Copyright Cengage Learning. Powered by Cognero.

Page 16


Module 07: A Connected World a. http:// b. www.csub.edu c. /~hbidgoli d. books.html ANSWER: RATIONALE:

c Correct. In the URLhttp://www.csub.edu/~hbidgoli/books.html, /~hbidgoli represents the name of the directory in which files pertaining to the books the author has written are stored. A server can be divided into directories for better organization. See 7-1: The Internet POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web Internet infrastructure KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:43 PM 38. Which Digital Subscriber Line (DSL) service has a lower transmission rate upstream than downstream? a. Asymmetric DSL b. Symmetric DSL c. Very High-Speed DSL d. High-bit-rate DSL ANSWER: a RATIONALE: Correct. Asymmetric DSL (ADSL) has a lower transmission rate upstream (3.5 Mbps) than downstream (typically 24 Mbps). See 7-1: The Internet POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web Internet infrastructure KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:44 PM 39. Which statement is true of Hypertext Markup Language (HTML)? a. It is used to route traffic on a public telephone network. b. It is used to build a local area network. c. It is used to define a Web page’s layout and appearance. Copyright Cengage Learning. Powered by Cognero.

Page 17


Module 07: A Connected World d. It is used to provide radio coverage over a wide area. ANSWER: c RATIONALE: Correct. HTML is the language used to create Web pages. It defines a page’s layout and appearance by using tags and attributes. See 7-1: The Internet POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web Internet infrastructure KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:45 PM 40. Microsoft Edge, Mozilla Firefox, Google Chrome, Apple Safari, and Opera are examples of _____. a. operating systems b. search engines c. Web browsers d. uniform resource locators ANSWER: c RATIONALE: Correct. Many graphical Web browsers are available, such as Microsoft Edge, Mozilla Firefox, Google Chrome, Apple Safari, and Opera. Typically, these browsers have menu options you have seen in word-processing programs, such as File, Edit, and Help. See 7-2: Navigational Tools, Search Engines, and Directories POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss navigational tools, search engines, and directories. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.2 TOPICS: Web browsers KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 3:48 PM 41. A _____ is an information system that enables users to retrieve data from the Web by using keywords related to their topic of interest. a. Web server b. data mart c. search engine d. data warehouse ANSWER: c RATIONALE: Correct. A search engine, such as Google, Bing, DuckDuckGo, or Ask, is an information Copyright Cengage Learning. Powered by Cognero.

Page 18


Module 07: A Connected World system that enables users to retrieve data from the Web by using search terms. See 7-2: Navigational Tools, Search Engines, and Directories POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss navigational tools, search engines, and directories. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.2 TOPICS: Search engines KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 42. What are Google, Bing, and Ask are examples of? a. directories b. search engines c. navigational tools d. newsgroups ANSWER: b RATIONALE: Correct. Google, Bing, and Ask are examples of search engines. A search engine is an information system that enables users to retrieve data from the Web by using search terms. See 7-2: Navigational Tools, Search Engines, and Directories POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss navigational tools, search engines, and directories. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.2 TOPICS: Search engines KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 43. _____ check to see what links are on the user’s Web page and make sure they work; if a link is broken, they identify it and include this information as part of the data about that page. a. Crawlers b. Subscribers c. Backdoors d. Clients ANSWER: a RATIONALE: Correct. Crawlers check to see what links are on the user’s Web page and make sure they work; if a link is broken, they identify it and include this information as part of the data about that page. In addition, crawlers can go through the other pages that are part of the user’s Web site, as long as there are links to those pages. See 7-2: Navigational Tools, Search Engines, and Directories Copyright Cengage Learning. Powered by Cognero.

Page 19


Module 07: A Connected World POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss navigational tools, search engines, and directories. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.2 TOPICS: Search engines KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 44. _____, software used by search engines, can go through the other pages that are part of your Web site, as long as there are links to those pages. a. Crawlers b. Backdoors c. Scores d. PageRanks ANSWER: a RATIONALE: Correct. Search engines use software called crawlers, spiders, bots, and other similar names. Crawlers can go through the other pages that are part of your Web site, as long as there are links to those pages. See 7-2: Navigational Tools, Search Engines, and Directories POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss navigational tools, search engines, and directories. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.2 TOPICS: Search engines KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 45. Housed at server farms, search engines use _____ to index data coming in from crawlers. a. cookies b. keywords c. spiders d. bots ANSWER: b RATIONALE: Correct. Housed at server farms, search engines use keywords to index data coming in from crawlers. Each keyword has an index entry that is linked to all Web pages containing that keyword. See 7-2: Navigational Tools, Search Engines, and Directories POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss navigational tools, search engines, and directories. Copyright Cengage Learning. Powered by Cognero.

Page 20


Module 07: A Connected World QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.2 TOPICS: Search engines KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 46. When a Web page changes, _____ update their indexes and databases automatically to reflect the change. a. picture-frame directories b. open-ended directories c. human-powered directories d. crawler-based directories ANSWER: d RATIONALE: Correct. Crawler-based directories create indexes of search terms and collect these terms automatically by using crawlers. When a Web page changes, for example, these directories update their indexes and databases automatically to reflect the change. See 7-2: Navigational Tools, Search Engines, and Directories POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss navigational tools, search engines, and directories. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.2 TOPICS: Web directories KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 47. Microsoft Outlook is an example of a _____. a. client-based e-mail program b. Web-based e-mail program c. crawler-based e-mail program d. bot-based e-mail program ANSWER: a RATIONALE: Correct. Examples of client-based e-mail programs include Microsoft Outlook, Mozilla Thunderbird, and Apple Mail. Client-based e-mail consists of an e-mail program you install on your computer; e-mail is downloaded and stored locally on your computer. See 7-3: Internet Services POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe four common Internet services and how they are used in a business environment. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 21


Module 07: A Connected World LEARNING OBJECTIVES: MIS.10e.7.3 TOPICS: Internet services KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 48. Which is an example of a client-based e-mail program? a. Roundcube b. MSN Hotmail c. Mozilla Thunderbird d. Yahoo! Mail ANSWER: c RATIONALE: Correct. Examples of client-based e-mail programs include Microsoft Outlook, Mozilla Thunderbird, and Apple Mail. Client-based e-mail consists of an e-mail program you install on your computer; e-mail is downloaded and stored locally on your computer. See 7-3: Internet Services POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe four common Internet services and how they are used in a business environment. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.3 TOPICS: Internet services KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 49. _____ are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or scholarly nature. a. Backdoor feeds b. Corporate portals c. Document repositories d. Discussion groups ANSWER: d RATIONALE: Correct. Discussion groups are usually for exchanging opinions and ideas on a specific topic, usually of a technical or scholarly nature. Group members post messages or articles that others in the group can read. See 7-3: Internet Services POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe four common Internet services and how they are used in a business environment. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.3 Copyright Cengage Learning. Powered by Cognero.

Page 22


Module 07: A Connected World TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Internet services Understand 10/22/2019 1:30 PM 10/22/2019 1:30 PM

50. In the context of Internet services, which is a drawback of Internet telephony? a. Voicemails cannot be received on the computer. b. Users often experience busy lines. c. Calls cannot be forwarded by users. d. The call quality is not as good as it is with regular phone lines. ANSWER: d RATIONALE: Correct. The only drawback of Internet telephony is the call quality, which is not as good as with regular phone lines. However, the quality has been improving steadily. See 7-3: Internet Services POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe four common Internet services and how they are used in a business environment. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.3 TOPICS: Internet services KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 51. Which statement is true of Voice over Internet Protocol (VoIP)? a. Users often experience busy lines. b. Callers can be screened even with blocked caller IDs. c. Voicemails are not received on the computer. d. Calls cannot be forwarded by users. ANSWER: b RATIONALE: Correct. With VoIP, users can screen callers, even if the caller has caller ID blocked. VoIP is used to route traffic starting and ending at conventional public switched telephone network phones. See 7-3: Internet Services POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe four common Internet services and how they are used in a business environment. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.3 TOPICS: Internet services KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM Copyright Cengage Learning. Powered by Cognero.

Page 23


Module 07: A Connected World DATE MODIFIED:

10/22/2019 1:30 PM

52. With Voice over Internet Protocol (VoIP), _____. a. voicemails cannot be received on the computer b. call quality is significantly better than that of regular phone lines c. users cannot screen callers if the caller has caller ID blocked d. users can have calls forwarded from anywhere in the world ANSWER: d RATIONALE: Correct. With VoIP, users can have calls forwarded from anywhere in the world. VoIP is also used to route traffic starting and ending at conventional public switched telephone network phones. See 7-3: Internet Services POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe four common Internet services and how they are used in a business environment. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.3 TOPICS: Internet services KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 53. The Internet is playing an important role in helping organizations reduce expenses, because _____. a. the services offered by telephone networks cost less than that offered by VoIP b. the employees hired through online employment services perform their official tasks virtually c. Web applications can be used with minimum costs d. products and services can be bought at retail stores ANSWER: c RATIONALE: Correct. The Internet is playing an important role in helping organizations reduce expenses, because Web applications can be used with minimum costs. See 7-4: Web Applications POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain business applications of the Internet. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.4 TOPICS: Computer uses Web-based software KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 54. Which statement is true of telemedicine? Copyright Cengage Learning. Powered by Cognero.

Page 24


Module 07: A Connected World a. It enables medical professionals to conduct surgical procedures virtually. b. It enables patients to quickly reach a doctor’s clinic. c. It enables medical professionals to conduct remote consultation. d. It enables patients to acquire medicines through online stores. ANSWER: c RATIONALE: Correct. In the context of healthcare Web sites, telemedicine enables medical professionals to conduct remote consultation, diagnosis, and conferencing, which can save on office overhead and travel costs. See 7-4: Web Applications POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain business applications of the Internet. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.4 TOPICS: Computer uses Web-based software KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 55. Identify a true statement about virtual medicine on the Internet. a. It is primarily used to purchase medicines through online stores. b. It enables specialists at major hospitals to operate on patients remotely. c. It is primarily used to help patients locate medical clinics in nearby areas. d. It helps specialists increase physical interactions with patients. ANSWER: b RATIONALE: Correct. Virtual medicine on the Internet enables specialists at major hospitals to operate on patients remotely. Telepresence surgery, as it is called, allows surgeons to operate all over the world without physically traveling anywhere. See 7-4: Web Applications POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain business applications of the Internet. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.4 TOPICS: Computer uses Web-based software KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 56. Which healthcare system can make interactive medical tools available to the public? a. The well-being model b. Personal health information systems c. The out-of-pocket model Copyright Cengage Learning. Powered by Cognero.

Page 25


Module 07: A Connected World d. Medicine endorsement systems ANSWER: b RATIONALE: Correct. Personal health information systems can make interactive medical tools available to the public. These systems use public kiosks (often in shopping malls) equipped with Internet-connected computers and a diagnostic procedure that prompts patients with a series of questions. See 7-4: Web Applications POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain business applications of the Internet. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.4 TOPICS: Computer uses Web-based software KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 57. Intranets are also called _____. a. newsgroups b. hotspots c. corporate portals d. universal resource locators ANSWER: c RATIONALE: Correct. Intranets are also called corporate portals. The main difference between a company’s Web site and its intranet is that the company Web site is usually public, whereas an intranet is for internal use by employees. See 7-5: Intranets POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the role of intranets in various business functions. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.5 TOPICS: Intranets KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 58. Which statement is true of an intranet in an organization? a. It can be used by trusted business partners with a password. b. It is a public network that can be used by external users. c. It is not dependent on Internet Protocols and technologies. d. It will not allow employees to post information on their departmental Web servers. ANSWER: a RATIONALE: Correct. Many companies allow trusted business partners to access their intranets, usually Copyright Cengage Learning. Powered by Cognero.

Page 26


Module 07: A Connected World with a password or another authentication method to protect confidential information. Carefully defining and limiting access is important for security reasons, so intranets are typically set up behind a firewall. See 7-5: Intranet POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the role of intranets in various business functions. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.5 TOPICS: Intranets KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 59. Which is a similarity between the Internet and an intranet? a. Both use similar languages for developing applications. b. Both are public networks. c. Both are private networks. d. Neither can be used by users without approval. ANSWER: a RATIONALE: Correct. The Internet and an intranet use similar languages for developing applications, such as Java, and offer files in similar formats. The Internet is a public network; an intranet is a private network. See 7-5: Intranets POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the role of intranets in various business functions. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.5 TOPICS: Intranets KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 60. Which statement is true of the Internet? a. Its accessibility requires prior approval. b. Its geographical scope is limited. c. It is usually faster than an intranet. d. It is less secure than an intranet. ANSWER: d RATIONALE: Correct. The Internet is less secure than an intranet. Any user can access the Internet, but access to an intranet is only for certain users and must be approved. See 7-5: Intranets POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the role of intranets in various business functions. Copyright Cengage Learning. Powered by Cognero.

Page 27


Module 07: A Connected World QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.5 TOPICS: Intranets KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 61. Which statement is true of an intranet? a. It increases the costs and time of document production. b. It aids the duplication and distribution of documents. c. It helps organizations move from a calendar-based document-publishing strategy to one that is based on events. d. It inhibits the sharing of software, such as an office suite or a database management system. ANSWER: c RATIONALE: Correct. Intranets help organizations move from a calendar or schedule-based documentpublishing strategy to one that is based on events or needs. Intranets reduce the costs and time of document production, too. See 7-5: Intranets POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the role of intranets in various business functions. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.5 TOPICS: Intranets KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 62. Which is a type of interorganizational system? a. A modem b. A uniform resource locator c. An extranet d. A weblog ANSWER: c RATIONALE: Correct. An extranet is considered a type of interorganizational system. These systems facilitate information exchange among business partners. See 7-6: Extranets POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the role of extranets in various business functions. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.6 TOPICS: Extranets Copyright Cengage Learning. Powered by Cognero.

Page 28


Module 07: A Connected World KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 10/22/2019 1:30 PM 10/22/2019 1:30 PM

63. Which statement is true of extranets? a. They increase internetworking costs for companies, which subsequently leads to increased losses. b. They facilitate information exchange among business partners. c. They help organizations move from a calendar-based document-publishing strategy to one that is based on events. d. They are a type of public network that can be accessed without any specific rights. ANSWER: b RATIONALE: Correct. Extranets are considered a type of interorganizational system. These systems facilitate information exchange among business partners. See 7-6: Extranets POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the role of extranets in various business functions. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.6 TOPICS: Extranets KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 64. Which is also known as “the Semantic Web”? a. Web 1.1 b. Web 1.0 c. Web 2.0 d. Web 3.0 ANSWER: d RATIONALE: Correct. Most experts agree that Web 3.0, also known as “the Semantic Web,” provides personalization that allows users to access the Web more intelligently. See 7-7: The Web Trends POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze Web trends and their impact on business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.7 TOPICS: Web 3.0 KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 4:04 PM 65. The goal of _____ is to tailor online searching and requests to users’ specific search patterns, preferences, and needs. Copyright Cengage Learning. Powered by Cognero.

Page 29


Module 07: A Connected World a. Web 1.1 b. Web 1.0 c. Web 2.0 d. Web 3.0 ANSWER: RATIONALE:

d Correct. The goal of Web 3.0 is to tailor online searching and requests to users’ specific search patterns, preferences, and needs. See 7-7: The Web Trends POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze Web trends and their impact on business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.7 TOPICS: Web 3.0 KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 4:06 PM 66. A _____ is a journal or newsletter that is updated frequently and intended for the general public. a. wiki b. tweet c. blog d. podcast ANSWER: c RATIONALE: Correct. A blog (short for Weblog) is a journal or newsletter that is updated frequently and intended for the general public. Blogs reflect their authors’ personalities and often include philosophical reflections and opinions on social or political issues. See 7-7: The Web Trends POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze Web trends and their impact on business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.7 TOPICS: Web 2.0 KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 4:07 PM 67. A _____ is a type of Web site that allows users to add, delete, and sometimes modify content. a. wiki b. blog c. tweet d. podcast Copyright Cengage Learning. Powered by Cognero.

Page 30


Module 07: A Connected World ANSWER: RATIONALE:

a Correct. A wiki is a type of Web site that allows users to add, delete, and sometimes modify content. One of the best-known examples is the online encyclopedia Wikipedia. See 7-7: The Web Trends POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze Web trends and their impact on business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.7 TOPICS: Web 2.0 KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 4:08 PM 68. The most serious problem with wikis is the: a. inability to modify content. b. inaccuracy of content. c. lack of data privacy. d. restricted access to the general public. ANSWER: b RATIONALE: Correct. The most serious problem with wikis is the quality of information, because allowing anyone to modify content affects the content’s accuracy. Wikipedia is currently working on methods to verify the credentials of users contributing to the site because of past problems with contributors falsifying credentials. See 7-7: The Web Trends POINTS: 1 DIFFICULTY: Moderate REFERENCES: Analyze Web trends and their impact on business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.7 TOPICS: Web 2.0 KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 4:08 PM 69. _____ refers to a broad class of Web sites and services that allow users to connect with friends, family, and colleagues online as well as meet people with similar interests or hobbies. a. Social networking b. Podcasting c. Gigapop d. Weblogging ANSWER: a RATIONALE: Correct. Social networking refers to a broad class of Web sites and services that allow users to connect with friends, family, and colleagues online as well as meet people with Copyright Cengage Learning. Powered by Cognero.

Page 31


Module 07: A Connected World similar interests or hobbies. See 7-7: The Web Trends POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze Web trends and their impact on business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.7 TOPICS: Web 2.0 KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 4:09 PM 70. Joey, a businessman, designs cases and covers for cell phones. He wishes to showcase his products so that more people know about his work. Which will help Joey promote his products? a. SoundHound b. WordPress c. Pinterest d. Bing ANSWER: c RATIONALE: Correct. Joey can use Pinterest to promote his products. A business can showcase its product offerings using Pinterest. See 7-7: The Web Trends POINTS: 1 DIFFICULTY: Challenging REFERENCES: Analyze Web trends and their impact on business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.7 TOPICS: Web 2.0 KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 4:11 PM 71. Which statement is true of Extensible Markup Language (XML)? a. XML defines data without context. b. XML tags specify the layout and appearance of content. c. XML tags represent the kind of content being posted and transmitted. d. XML is inflexible toward interoperability between different systems. ANSWER: c RATIONALE: Correct. Unlike Hypertext Markup Language tags that specify layout and appearance, XML tags represent the kind of content being posted and transmitted. See 7-7: The Web Trends POINTS: 1 DIFFICULTY: Moderate REFERENCES: Analyze Web trends and their impact on business. Copyright Cengage Learning. Powered by Cognero.

Page 32


Module 07: A Connected World QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.7 TOPICS: Web 2.0 Web 3.0 KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 4:12 PM 72. A _____ is an electronic audio file that is posted on the Web for users to download to their mobile devices or their computers. a. podcast b. tweet c. blog d. wiki ANSWER: a RATIONALE: Correct. A podcast is an electronic audio file, such as an MP3 file, that is posted on the Web for users to download to their mobile devices or even their computers. See 7-7: The Web Trends POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze Web trends and their impact on business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.7 TOPICS: Web 2.0 Web 3.0 KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 4:13 PM 73. Syndication feeds are one way of announcing the availability of a _____. a. gigapop b. backlink c. podcast d. mirror disk ANSWER: c RATIONALE: Correct. Syndication feeds are one way of announcing a podcast’s availability. A podcast is an electronic audio file, such as an MP3 file, that is posted on the Web for users to download to their mobile devices or even their computers. See 7-7: The Web Trends POINTS: 1 DIFFICULTY: Moderate REFERENCES: Analyze Web trends and their impact on business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 33


Module 07: A Connected World LEARNING OBJECTIVES: MIS.10e.7.7 TOPICS: Web 2.0 Web 3.0 KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 4:14 PM 74. Which is a smart device that can tell the user’s heart rate and lung capacity? a. The Belkin WeMo Switch b. The Nike Hyperdunk Plus shoes c. The Wi-Fi Smart Thermostat d. The Under Armour Armour39 shirt ANSWER: d RATIONALE: Correct. The Under Armour Armour39 shirt is a smart device that can tell the user’s heart rate and lung capacity. See 7-8: The Internet of Everything and Beyond POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze the Internet of Everything and its business applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.8 TOPICS: Internet services KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 75. The embedded references in hypermedia documents are called _____. a. hypertext b. wikis c. podcast d. weblogs ANSWER: a RATIONALE: The embedded references in hypermedia documents are called hypertext; they consist of links users can click to follow a particular thread (topic). See 7-1: The Internet POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 4:16 PM Copyright Cengage Learning. Powered by Cognero.

Page 34


Module 07: A Connected World 76. _____ are indexes of information, based on keywords embedded in documents, that allow search engines to find what Internet users are looking for. a. Directories b. Newsgroups c. Aggregators d. Podcasts ANSWER: a RATIONALE: Directories are indexes of information, based on keywords embedded in documents, that allow search engines to find what Internet users are looking for. See 7-2: Navigational Tools, Search Engines, and Directories POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss navigational tools, search engines, and directories. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.2 TOPICS: Search engines Web directories KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 77. _____ enables a user to access his or her e-mail account from any computer and, in some cases, store the e-mails on a Web server. a. Server-based e-mail b. Client-based e-mail c. Web-based e-mail d. Signal-based e-mail ANSWER: c RATIONALE: Web-based e-mail enables a user to access his or her e-mail account from any computer and, in some cases, store the e-mails on a Web server. See 7-3: Internet Services POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe four common Internet services and how they are used in a business environment. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.3 TOPICS: Internet services Web browsers KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 78. _____ is an Internet service that enables users in chat rooms to exchange text messages with people in other locations in real time. Copyright Cengage Learning. Powered by Cognero.

Page 35


Module 07: A Connected World a. Internet telephony b. Short message service c. Text Relay d. Internet Relay Chat ANSWER: d RATIONALE: Internet Relay Chat enables users in chat rooms to exchange text messages with people in other locations in real time. You can find chat rooms on a variety of topics, such as gardening, video games, and relationships. See 7-3: Internet Services POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe four common Internet services and how they are used in a business environment. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.3 TOPICS: Internet services KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 79. _____ is an Internet service for communicating with others via a private “chat room” on the Internet. a. Electronic mail b. Instant messaging c. Short message service d. Video telephony ANSWER: b RATIONALE: Instant Messaging (IM) is a service for communicating with others via a private “chat room” on the Internet. Many IM applications are available, such as Windows Messenger, Yahoo! Messenger, and Google Chat, and the capabilities and features vary depending on the application. See 7-3: Internet Services POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe four common Internet services and how they are used in a business environment. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.3 TOPICS: Internet services KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 80. _____ is a service that uses the Internet rather than the telephone network to exchange spoken conversations. a. Internet telephony b. Internet broadcast Copyright Cengage Learning. Powered by Cognero.

Page 36


Module 07: A Connected World c. Telephone relay d. Call forwarding ANSWER: RATIONALE:

a Internet telephony is using the Internet rather than the telephone network to exchange spoken conversations. The protocol used for this capability is Voice over Internet Protocol. See 7-3: Internet Services POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe four common Internet services and how they are used in a business environment. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.3 TOPICS: Internet services KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 81. A(n) _____ is a secure network that uses the Internet and Web technologies to connect intranets of business partners so that communication between organizations is possible. a. extranet b. local talk c. newsgroup d. token ring ANSWER: a RATIONALE: An extranet is a secure network that uses the Internet and Web technologies to connect intranets of business partners so that communication between organizations or between consumers is possible. Extranets are considered a type of interorganizational system. See 7-6: Extranets POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the role of extranets in various business functions. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.6 TOPICS: Extranets KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 82. _____ is a popular blogging tool that allows users to post anything from their browsers, phones, desktops, e-mail programs, and so forth. a. Google Chrome b. Mozilla Firefox c. Wikipedia Copyright Cengage Learning. Powered by Cognero.

Page 37


Module 07: A Connected World d. Tumblr ANSWER: RATIONALE:

d One popular blogging tool is Tumblr (www.tumblr.com), which allows users to post anything—text, photos, quotes, links, music, and videos—from their browsers, phones, desktops, e-mail programs, and so forth. See 7-7: The Web Trends POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze Web trends and their impact on business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.7 TOPICS: Web 2.0 KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 4:22 PM 83. The layout and appearance of a Hypertext Markup Language (HTML) document should be handled by _____. a. Cascading Style Sheets b. Really Simple Syndication feeds c. Standard Generalized Markup Language d. Extensible Style Sheets ANSWER: a RATIONALE: Although HTML contains some layout and appearance features, these “presentational attributes” are deprecated by the World Wide Web Consortium, which suggests that HTML only be used for creating structured documents through markup. Layout and appearance should be handled by Cascading Style Sheets (CSS). See 7-7: The Web Trends POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze Web trends and their impact on business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.7 TOPICS: Web 2.0 Web 3.0 KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 4:23 PM 84. _____ are usually collected by an “aggregator” such as iTunes. a. Blogs b. Tweets c. Wikis d. Podcasts ANSWER: d RATIONALE: Podcasts are usually collected by an “aggregator,” such as iTunes or iPodder. A podcast is Copyright Cengage Learning. Powered by Cognero.

Page 38


Module 07: A Connected World an electronic audio file, such as an MP3 file, that is posted on the Web for users to download to their mobile devices or even their computers. See 7-7: The Web Trends POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze Web trends and their impact on business. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.7 TOPICS: Web 2.0 Web 3.0 KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 4:24 PM 85. The _____ refers to the physical objects that are connected to the Internet and, therefore, to all the other physical objects. a. Internet Archive b. Transmission Control Protocol c. Internet Control Message Protocol d. Internet of Things ANSWER: d RATIONALE: The Internet of Things refers to the physical objects that are connected to the Internet and, therefore, to all the other physical objects. See 7-8: The Internet of Everything and Beyond POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze the Internet of Everything and its business applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.8 TOPICS: Internet infrastructure Web browsers KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 86. Compared to campus-based learning, MOOCs offer __________. a. higher costs per course b. lower costs and greater flexibility c. a more personal touch d. face-to-face interaction ANSWER: b RATIONALE: Correct. Massive open online courses (MOOCs) will bring down costs and offer flexibility, but at the expense of losing the personal touch and interaction that exists in campus-based learning. Copyright Cengage Learning. Powered by Cognero.

Page 39


Module 07: A Connected World See 7-4: Web Applications POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain business applications of the Internet. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.4 KEYWORDS: Understand DATE CREATED: 12/6/2019 11:58 PM DATE MODIFIED: 12/7/2019 12:11 AM 87. Financing options and school profiles are services are offered by _______ Web sites and apps. a. travel b. publishing c. real-estate d. bank and credit union ANSWER: c RATIONALE: Correct. Real-estate Web sites provide millions of up-to-date listings of homes for sale. Buyers can review neighborhoods, schools, and local real-estate prices, and customers can use these sites to find realtors and brokerage firms and learn home-buying tips. Some sites have virtual tours of houses for sale, which is convenient for buyers moving to another state. Other services include appraisals, neighborhood and school profiles, financing options, and home-improvement advice. See 7-4: Web Applications POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain business applications of the Internet. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.4 KEYWORDS: Understand DATE CREATED: 12/7/2019 12:15 AM DATE MODIFIED: 12/7/2019 12:29 AM 88. Sites such as Monster and LinkedIn offer which of the following services? a. Career tests b. Neighborhood profiles c. Access to the Multiple Listing Service d. Online university courses ANSWER: a RATIONALE: Correct. Employment services are widely available on the Internet. LinkedIn or Monster are sites that offer comprehensive services to job-seekers, including: •

Expert advice and tools for managing your career

Copyright Cengage Learning. Powered by Cognero.

Page 40


Module 07: A Connected World • • • • • • •

Resume assistance, including tools for creating professional-looking resumes Job search tutorials Resume posting and distribution Searches by company, industry, region, or category Announcements of job fairs Career tests to see what career is right for you Salary calculators

See 7-4: Web Applications POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain business applications of the Internet. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.4 KEYWORDS: Understand DATE CREATED: 12/7/2019 12:21 AM DATE MODIFIED: 12/7/2019 12:26 AM 89. In a typical intranet configuration, the ___________ must define each user’s level of access. a. DBMS b. Human Resources Department c. sysop d. system administrator ANSWER: d RATIONALE: Correct. In a typical intranet configuration, the system administrator must define each user’s level of access. See 7-5: Intranets POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the role of intranets in various business functions. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.5 KEYWORDS: Understand DATE CREATED: 12/7/2019 12:45 AM DATE MODIFIED: 12/7/2019 12:48 AM 90. An advantage of an intranet is that the organization can specify a(n) _______ that supports the technologies the organization uses, such as Internet telephony or video conferencing. a. top level domain b. browser c. search engine d. RSS feed ANSWER: b Copyright Cengage Learning. Powered by Cognero.

Page 41


Module 07: A Connected World RATIONALE:

Correct. An advantage of an intranet is that because the organization can control which browser is used, it can specify a browser that supports the technologies the organization uses, such as Internet telephony or video conferencing. In addition, the organization knows documents will be displayed the same way in all users’ browsers. See 7-5: Intranets POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the role of intranets in various business functions. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.5 KEYWORDS: Understand DATE CREATED: 12/7/2019 12:49 AM DATE MODIFIED: 12/7/2019 12:59 AM 91. In the context of extranets, which of the following is considered an interorganizational system? a. Wikis b. Sales and marketing c. Electronic funds transfer (EFT) d. Discussion groups ANSWER: c RATIONALE: Correct. Extranets are considered a type of interorganizational system (IOS). These systems facilitate information exchange among business partners. Some of these systems, such as electronic funds transfer (EFT) and e-mail, have been used in traditional businesses as well as in e-commerce. Electronic data interchange (EDI) is another common IOS. See 7-6: Extranets POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the role of extranets in various business functions. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.6 KEYWORDS: Understand DATE CREATED: 12/7/2019 10:31 AM DATE MODIFIED: 12/7/2019 10:38 AM 92. Electronic data interchange (EDI) is a common type of ______________. a. interorganizational system (IOS) b. database management system (DBMS) c. symmetric DSL (SDSL) d. hypermedia ANSWER: a RATIONALE: Correct. Electronic data interchange (EDI) is another common interorganizational system Copyright Cengage Learning. Powered by Cognero.

Page 42


Module 07: A Connected World (IOS). See 7-6: Extranets POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the role of extranets in various business functions. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.6 KEYWORDS: Understand DATE CREATED: 12/7/2019 10:39 AM DATE MODIFIED: 12/7/2019 10:45 AM 93. Often, an organization makes a portion of its ________ accessible to external parties as its extranet. a. blog b. inner firewall c. internet d. intranet ANSWER: d RATIONALE: Correct. Often, an organization makes a portion of its intranet accessible to external parties as its extranet. See 7-6: Extranets POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the role of extranets in various business functions. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.6 KEYWORDS: Understand DATE CREATED: 12/7/2019 10:47 AM DATE MODIFIED: 12/7/2019 10:49 AM 94. An organization's extranet server is typically placed in a network area called the ______ that is separate from the LAN. a. neutral zone b. demilitarized zone c. outer firewall d. document repository ANSWER: b RATIONALE: Correct. DMZ refers to the demilitarized zone, an area of the network that is separate from the organization’s LAN, where the extranet server is placed. See 7-6: Extranets POINTS: 1 DIFFICULTY: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 43


Module 07: A Connected World REFERENCES: Describe the role of extranets in various business functions. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.6 KEYWORDS: Understand DATE CREATED: 12/7/2019 11:04 AM DATE MODIFIED: 12/7/2019 11:09 AM 95. The city of Copenhagen used the Internet of Things to reduce water loss by implementing _____. a. email reminders b. smart sensors c. smart pipes d. low water pressure technology ANSWER: b RATIONALE: Correct. Smart sensors helped the city of Copenhagen to reduce water loss due to leaking pipes. The city installed leak-detection sensors that can report leaks. Now Copenhagen’s water loss is down to 7 percent from about 40 percent, a 33 percent improvement. See 7-8: The Internet of Everything and Beyond POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze the Internet of Everything and its business applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.8 TOPICS: Internet infrastructure Web browsers KEYWORDS: Analyze DATE CREATED: 12/7/2019 6:45 PM DATE MODIFIED: 12/7/2019 6:49 PM 96. The next technology predicted after the Internet of Things is the _____. a. Internet of Everything b. Internet of Us c. Smart Internet d. Internet of Me ANSWER: d RATIONALE: Correct. The next technology after IoT is the Internet of Me (IoM). The Internet of Me (IoM) is a subset Internet that gathers and processes information for a given user from the entire Internet and IoT devices to deliver a personalized experience. See 7-8: The Internet of Everything and Beyond POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze the Internet of Everything and its business applications. QUESTION TYPE: Multiple Choice Copyright Cengage Learning. Powered by Cognero.

Page 44


Module 07: A Connected World HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.8 TOPICS: Internet infrastructure Web browsers KEYWORDS: Analyze DATE CREATED: 12/7/2019 6:49 PM DATE MODIFIED: 12/7/2019 11:12 PM 97. Which of the following refers to a subset Internet that gathers and processes information for a given user from the entire Internet to deliver a personalized experience? a. The Internet of People b. The Internet of Everything c. The Internet of Things d. The Internet of Me ANSWER: d RATIONALE: Correct. The Internet of Me (IoM) is a subset Internet that gathers and processes information for a given user from the entire Internet and IoT devices to deliver a personalized experience. See 7-8: The Internet of Everything and Beyond POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze the Internet of Everything and its business applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.8 KEYWORDS: Analyze DATE CREATED: 12/7/2019 11:04 PM DATE MODIFIED: 12/7/2019 11:10 PM 98. Which growing application of IoT is used to enhance manufacturing processes and data analytics on factory floors? a. Industrial Internet of Things (IIoT) b. Manufacturing Internet of Things (MIoT) c. Internet of Everything (IoE) d. Internet of Me (IoM) ANSWER: a RATIONALE: Correct. A growing application of IoT is industrial IoT or IIoT. IIoT is used to enhance manufacturing and industrial processes such as predictive maintenance and data analytics on factory floors. See 7-8: The Internet of Everything and Beyond POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze the Internet of Everything and its business applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 45


Module 07: A Connected World LEARNING OBJECTIVES: MIS.10e.7.8 KEYWORDS: Analyze DATE CREATED: 12/7/2019 11:18 PM DATE MODIFIED: 12/7/2019 11:21 PM 99. Which of the following is an application of industrial IoT (IIoT)? a. Video doorbells b. Production flow monitoring c. Voice assistants (e.g., Alexa, Siri, Google Assistant) d. Personalized medical care ANSWER: b RATIONALE: Correct. Industrial IoT (IIoT) is used to enhance manufacturing and industrial processes such as predictive maintenance and data analytics on factory floors. In production flow monitoring, IoT-enabled sensors highlight lags in production (if any), eliminating wastes and unnecessary work in progress inventory. See 7-8: The Internet of Everything and Beyond POINTS: 1 DIFFICULTY: Moderate REFERENCES: Analyze the Internet of Everything and its business applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.7.8 KEYWORDS: Analyze DATE CREATED: 12/7/2019 11:23 PM DATE MODIFIED: 12/7/2019 11:32 PM Essay 100. Discuss network access points (NAPs) and how they relate to the Internet backbone. ANSWER: Answers will vary. The Internet backbone is a foundation network linked with fiber-optic cables that can support very high bandwidth. It is called a backbone because it supports all the other networks that form the Internet, just as the human backbone is the foundation of the nervous system. The Internet backbone is made up of many interconnected government, academic, commercial, and other high-capacity data routers. Several private companies operate their own Internet backbones that interconnect at NAPs. NAPs determine how traffic is routed over the Internet. Local area networks serve as localized Internet connections, and they use NAPs to connect to the Internet backbone. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web Copyright Cengage Learning. Powered by Cognero.

Page 46


Module 07: A Connected World KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 10/22/2019 1:30 PM 10/22/2019 1:30 PM

101. Discuss how the Web uses hypermedia. ANSWER: Answers will vary. The Web organizes information by using hypermedia, meaning documents that include embedded references to audio, text, images, video, and other documents. Composed of billions of hypermedia documents, the Web constitutes a large portion of the Internet. The embedded references in hypermedia documents are called hypertext; they consist of links users can click to follow a particular thread (topic). By using hypertext links, users can access files, applications, and other computers in any order they like (unlike in paper documents) and retrieve information with the click of a button. In essence, hypertext is an approach to data management, in which data is stored in a network of nodes connected by links. Data in these nodes is accessed with an interactive browsing system, meaning the user determines the order in which information is accessed. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 102. Briefly describe Hypertext Markup Language (HTML). ANSWER: Answers will vary. HTML is the language used to create Web pages. It defines a page’s layout and appearance by using tags and attributes. A tag delineates a section of the page, such as the header or body; an attribute specifies a value, such as a font color, for a page component. The most recent version is HTML7. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet infrastructure KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 4:34 PM 103. Describe each part of a uniform resource locator (URL) using an example. ANSWER: Answers will vary. The following are brief explanations of each part of a URL, using http://www.csub.edu/~hbidgoli/books.html as an example: Copyright Cengage Learning. Powered by Cognero.

Page 47


Module 07: A Connected World http—Stands for Hypertext Transfer Protocol, the protocol used for accessing most Web sites. www.csub.edu—The www stands for WWW, World Wide Web, or the Web. The csub stands for California State University at Bakersfield. And the .edu is the suffix for educational institutions. Together, csub.edu uniquely identifies this Web site. /~hbidgoli—This part is the name of the directory in which files pertaining to the books the author has written are stored. A server can be divided into directories for better organization. books.html—This part is the document itself. The .html extension means it is a Hypertext Markup Language (HTML) document. Servers that do not support long extensions display just .htm; other servers display .html. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet and the World Wide Web KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 4:35 PM 104. Discuss the different types of Digital Subscriber Line (DSL) services. ANSWER: Answers will vary. There are several methods for connecting to a network, including the Internet. These methods include dial-up and cable modems as well as DSL. Several types of DSL services are available: • Symmetric DSL (SDSL)—SDSL has the same data transmission rate to and from the phone network (called upstream and downstream), usually up to 1.5 Mbps (million bits per second) in both directions. • Asymmetric DSL (ADSL)—ADSL has a lower transmission rate upstream (3.5 Mbps) than downstream (typically 24 Mbps)—for example, the ITU G.992.5 Annex M standard. • Very High-Speed DSL (VDSL)—VDSL has a downstream/upstream transmission rate of up to 100 Mbps over short distances—for example, the ITU G.993.2 standard. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the makeup of the Internet and the Web. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.7.1 TOPICS: Internet infrastructure KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 4:36 PM 105. Briefly describe navigational tools. Copyright Cengage Learning. Powered by Cognero.

Page 48


Module 07: A Connected World ANSWER:

Answers will vary. Navigational tools are used to travel from Web site to Web site (i.e., “surf” the Internet). Many graphical Web browsers are available, such as Microsoft Edge, Mozilla Firefox, Google Chrome, Apple Safari, and Opera. Typically, these browsers have menu options similar to word-processing programs, such as File, Edit, and Help. They also include options for viewing your browsing history, bookmarking favorite Web sites, and setting viewing preferences, as well as navigation buttons to move backward and forward in Web pages you have visited. With some browsers, you can also set up specialized toolbars for accessing frequently visited sites or conducting searches. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss navigational tools, search engines, and directories. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.7.2 TOPICS: Web browsers KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 4:37 PM 106. Briefly explain the searching process of a search engine. ANSWER: Answers will vary. When you enter a search term, the search engine uses an index to look up the term. If the term exists in the index, the search engine identifies all Web pages linked to the term. However, it needs some way of prioritizing Web pages based on how close each one is to the search term. For example, say your Aunt Emma makes pictureframe cookies and has a Web site for selling them. Someone searching on the term picture frame might see Aunt Emma’s site listed, too. Because search engines are programmed to try to differentiate different types of search requests, they can use other terms, such as posters, photos, and images, to give a higher priority to Web pages containing these additional terms, along with the search term picture frame, and a lower priority to Web pages containing terms such as cookies or baked goods along with picture frame. Search engines vary in intelligence, which is why the user can use the same search term and get different results with two different search engines. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss navigational tools, search engines, and directories. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.7.2 TOPICS: Search engines KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 107. Briefly explain the two kinds of directories on the Web. ANSWER: Answers will vary. Directories organize information into categories. There are two kinds Copyright Cengage Learning. Powered by Cognero.

Page 49


Module 07: A Connected World of directories on the Web. The first is the automated, or crawler-based, directory that search engines use; it creates indexes of search terms and collects these terms automatically by using crawlers. Google, Yahoo!, Ask, and others fall into this category. When your Web page changes, for example, these directories update their indexes and databases automatically to reflect the change. The second type of directory is the humanpowered directory. If you want your Web page to be listed in a search engine’s results, you have to manually submit keywords to a human-powered directory. It does not use crawlers to collect data; instead, it relies on users to supply the data. After key words are submitted, they are indexed with search engines and can then be listed in search results. The main difference is that if your Web page changes, the directory does not have the updated content until you submit changes to the directory. Open Directory is an example of a human-powered directory. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss navigational tools, search engines, and directories. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.7.2 TOPICS: Web directories KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 108. In the context of Internet telephony, in addition to cost savings, list the other advantages of Voice over Internet Protocol (VoIP). ANSWER: Answers will vary. In addition to cost savings, VoIP offers the following advantages: a. Users do not experience busy lines. b. Voicemails can be received on the computer. c. Users can screen callers, even if the caller has caller ID blocked. d. Users can have calls forwarded from anywhere in the world. e. Users can direct calls to the correct departments and take automated orders. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe four common Internet services and how they are used in a business environment. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.7.3 TOPICS: Internet services KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 109. List some banking services available via the Internet. ANSWER: Answers will vary. Following are some banking services available via the Internet: Copyright Cengage Learning. Powered by Cognero.

Page 50


Module 07: A Connected World a. Accessing customer service by e-mail around the clock b. Viewing current and old transactions c. Online mortgage applications d. Interactive tools for designing a savings plan, choosing a mortgage, or getting insurance quotes online e. Finding loan status and credit card account information online f. Paying bills and credit card accounts g. Transferring funds h. Viewing digital copies of checks POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain business applications of the Internet. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.7.4 TOPICS: Web-based software KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 110. In the context of Web applications, briefly explain software distribution. ANSWER: Answers will vary. Many vendors distribute software on the Internet as well as drivers and patches. For example, most antivirus vendors make updates available for download to keep up with new viruses and worms. Typically, patches, updates, and small programs such as new browser versions are fast and easy to download. Trying to download large programs, such as Microsoft Office Suite, takes too long, so these types of programs are not usually distributed via the Internet. Developing online copyright-protection schemes continues to be a challenge. If users need an encryption code to “unlock” software they have downloaded, making backups might not be possible. Despite these challenges, online software distribution provides an inexpensive, convenient, and fast way to sell software. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain business applications of the Internet. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.7.4 TOPICS: Web-based software KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 111. Explain the main difference between a company’s Web site and its intranet. ANSWER: Answers will vary. The main difference between a company’s Web site and its intranet is that the company Web site is usually public; an intranet is for internal use by employees. However, many companies also allow trusted business partners to access their intranets, Copyright Cengage Learning. Powered by Cognero.

Page 51


Module 07: A Connected World usually with a password or another authentication method to protect confidential information. POINTS: 1 DIFFICULTY: Challenging REFERENCES: Describe the role of intranets in various business functions. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.7.5 TOPICS: Intranets KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 112. Discuss the different types of information that can be made available on an intranet to improve an organization’s efficiency and effectiveness. ANSWER: Answers will vary. A well-designed intranet can make the following types of information, among others, available to an entire organization in a timely manner to improve the organization’s efficiency and effectiveness: • Human resources management-401K plans, upcoming events, the company’s mission statement and policies, job postings, medical benefits, orientation materials, online training sessions and materials, meeting minutes, vacation time, etc. • Sales and marketing-Call tracking, information on competitors, customer information, order tracking and placement, product information, etc. • Production and operations-Equipment inventory, facilities management, industry news, product catalog, project information, etc. • Accounting and finance-Budget planning, expense reports, etc. POINTS: 1 DIFFICULTY: Challenging REFERENCES: Describe the role of intranets in various business functions. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.7.5 KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 113. Explain how an extranet improves coordination among business partners. ANSWER: Answers will vary. Extranets improve coordination between business partners, such as suppliers, distributors, and customers. Critical information can be made available quickly so decisions can be made without delays. For example, a manufacturer can coordinate production by checking the inventory status. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the role of extranets in various business functions. QUESTION TYPE: Essay Copyright Cengage Learning. Powered by Cognero.

Page 52


Module 07: A Connected World HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.7.6 TOPICS: Extranets KEYWORDS: Understand DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 114. Briefly explain Web 3.0 ANSWER: Answers will vary. There have been three generations of Web applications so far: Web 1.0 (static content), Web 2.0 (dynamic content), and Web 3.0 (Semantic Web). Key features of Web 3.0 include Semantic Web, artificial intelligence, 3D graphics, connectivity, and ubiquity. The Semantic Web provides personalization that allows users to access the Web more intelligently. Computers, not their users, will perform the tedious work involved in finding, combining, and acting upon information on the Web. Web 3.0 focuses on “intelligent” Web applications using various artificial intelligence technologies. These include natural language processing, artificial neural networks, and intelligent agents. The goal is to tailor online searching and requests to users’ specific search patterns, preferences, and needs. Microsoft’s Bing and Google Search already offer many Web 3.0 features. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Analyze Web trends and their impact on business. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.7.7 TOPICS: Web 2.0 KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 12/6/2019 4:44 PM 115. Briefly discuss the uses of corporate wikis with examples. ANSWER: Answers will vary. Corporate wikis are used for a variety of purposes, such as posting news about product development. Many open-source software packages for creating wikis are available, such as MediaWiki and TWiki. Companies are also creating wikis to give customers information. For example, Motorola and T-Mobile have set up wikis about their products that function as continually updated user guides, and eBay has formed eBay Wiki, where buyers and sellers can share information on a wide range of topics. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Analyze Web trends and their impact on business. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.7.7 TOPICS: Web 2.0 Copyright Cengage Learning. Powered by Cognero.

Page 53


Module 07: A Connected World KEYWORDS: DATE CREATED: DATE MODIFIED:

Analyze 10/22/2019 1:30 PM 10/22/2019 1:30 PM

116. Briefly describe social networking, and give examples of social networking sites. ANSWER: Answers will vary. Social networking refers to a broad class of Web sites and services that allow users to connect with friends, family, and colleagues online as well as meet people with similar interests or hobbies. More than 100 social networks are available on the Internet. Two of the most popular are Facebook and Twitter. In addition, LinkedIn is a professional networking site where you can connect with professional contacts and exchange ideas and job opportunities with a large network of professionals. Many people now use both LinkedIn and Facebook to keep their professional and social contacts separate. Twitter is extremely popular, and the term tweet is often used for a response or comment no longer than 280 characters, the maximum length allowed for a Twitter post. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Analyze Web trends and their impact on business. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.7.7 TOPICS: Web 2.0 KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 117. Explain how a podcast is different from a regular audio file. ANSWER: Answers will vary. A podcast is different from a regular audio file in that users can subscribe to a podcast. Each time a new podcast is available, an aggregator collects it automatically, using the URL, and makes it available for subscribers. Subscribers can then “sync” the podcast with their mobile devices and listen to it whenever they want. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Analyze Web trends and their impact on business. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.7.7 TOPICS: Web 2.0 Web 3.0 KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM 118. Briefly explain the Internet of Everything (IoE). ANSWER: Answers will vary. The IoE refers to a Web-based development in which people, processes, data, and things are interconnected via the Internet using various means. It is a Copyright Cengage Learning. Powered by Cognero.

Page 54


Module 07: A Connected World network of networks in which billions of connections create unparalleled opportunities and challenges. The technology behind the IoE will facilitate, among other things, automated inventory systems in the retail industry, automated and programmable appliances in domestic households, and road and bridge systems that will be able to detect a problem as soon as it occurs and notify the authorities. Consumers and businesses will save money by preserving energy when they control their room temperatures onsite or remotely through smart devices, while companies will save time and money on labor due to automation. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Analyze the Internet of Everything and its business applications. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.7.8 TOPICS: Internet infrastructure Web browsers KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:30 PM DATE MODIFIED: 10/22/2019 1:30 PM

Copyright Cengage Learning. Powered by Cognero.

Page 55


Module 08: eCommerce True / False 1. E-commerce is part of e-business. a. True b. False ANSWER: True RATIONALE: Correct E-commerce is buying and selling goods and services over the Internet. E-business encompasses all the activities a company performs in selling and buying products and services using computers and communication technologies. E-commerce is part of ebusiness. However, the two terms are often used interchangeably. See 8-1: Defining ECommerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: E-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 2. E-business excludes transactions that generate demand for goods and services. a. True b. False ANSWER: False RATIONALE: Correct E-business includes not only transactions that center on buying and selling goods and services to generate revenue but also transactions that generate demand for goods and services, offer sales support and customer service, and facilitate communication between business partners. See 8-1: Defining E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: E-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 3. Outbound logistics, a primary activity in Michael Porter’s value chain, includes tasks associated with receiving, storing, Copyright Cengage Learning. Powered by Cognero.

Page 1


Module 08: eCommerce and converting raw materials to finished goods. a. True b. False ANSWER: False RATIONALE: Correct Outbound logistics, a primary activity in Michael Porter’s value chain, includes tasks associated with moving and storing products, from the end of the production line to end users or distribution centers. See 8-1: Defining E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: Value chain and e-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 4. Click-and-brick e-commerce struggles to incorporate online interaction. a. True b. False ANSWER: False RATIONALE: Correct Click-and-brick e-commerce capitalizes on the advantages of online interaction with their customers yet retains the benefits of having a physical store location. See 8-1: Defining ECommerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: Value chain and e-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 5. E-commerce provides product acknowledgements through phone calls and faxes. a. True b. False ANSWER: False RATIONALE: Correct E-commerce is buying and selling goods and services over the Internet. E-commerce Copyright Cengage Learning. Powered by Cognero.

Page 2


Module 08: eCommerce provides product acknowledgements through e-mail, Web sites, and electronic data interchange. See 8-1: Defining E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: E-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 6. Government and nonbusiness organizations are prohibited from using e-commerce applications. a. True b. False ANSWER: False RATIONALE: Correct Many government and other nonbusiness organizations use e-commerce applications, including the Department of Defense, the Internal Revenue Service, and the Department of the Treasury. See 8-2: Major Categories of E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the major categories of e-commerce. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.2 TOPICS: E-commerce types and models KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 7. Universities are an example of nonbusiness organizations that use e-commerce applications. a. True b. False ANSWER: True RATIONALE: Correct Universities are an example of nonbusiness organizations that use e-commerce applications; for example, many universities use Web technologies for online classes, registration, and grade reporting. See 8-2: Major Categories of E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the major categories of e-commerce. QUESTION TYPE: True / False Copyright Cengage Learning. Powered by Cognero.

Page 3


Module 08: eCommerce HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.2 TOPICS: E-commerce types and models KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 8. Service and support are more important in e-commerce than in traditional commerce, given that e-commerce companies do not have a physical location to help maintain current customers. a. True b. False ANSWER: True RATIONALE: Correct Service and support are more important in e-commerce than in traditional commerce, given that e-commerce companies do not have a physical location to help maintain current customers. See 8-3: B2C E-Commerce Cycle POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the five major activities of the business-to-consumer e-commerce cycle. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.3 TOPICS: Business-to-consumer e-commerce KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 9. The third-party exchange marketplace model is controlled by sellers and buyers. a. True b. False ANSWER: False RATIONALE: Correct The third-party exchange marketplace model is not controlled by sellers or buyers. Instead, it is controlled by a third party, and the marketplace generates revenue from the fees charged for matching buyers and sellers. See 8-4: B2B E-Commerce: A Second Look POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the four major models of business-to-business e-commerce. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.4 TOPICS: E-commerce types and models KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM Copyright Cengage Learning. Powered by Cognero.

Page 4


Module 08: eCommerce 10. In a buyer-side marketplace, a buyer, or a group of buyers, opens an electronic marketplace and invites sellers to bid on announced products or make a request for quotation. a. True b. False ANSWER: True RATIONALE: Correct In a buyer-side marketplace, a buyer, or a group of buyers, opens an electronic marketplace and invites sellers to bid on announced products or make a request for quotation. The thirdparty exchange marketplace model offers suppliers a direct channel of communication to buyers through online storefronts. See 8-4: B2B E-Commerce: A Second Look POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the four major models of business-to-business e-commerce. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.4 TOPICS: E-commerce types and models KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 11. Mobile commerce (m-commerce) predominantly relies on voice recognition and text-to-speech technologies. a. True b. False ANSWER: False RATIONALE: Correct Supporting technologies for m-commerce applications include wireless wide area networks (WWANs) and 3G and 4G networks as well as short-range wireless communication technologies, such as Wi-Fi, WiMAX, Bluetooth, and RFID. Voice-based e-commerce relies on voice recognition and text-to-speech technologies. See 8-5: Mobile and VoiceBased E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe mobile-based and voice-based e-commerce. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.5 TOPICS: Mobile e-commerce Voice-based e-commerce KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 12. One method of conducting voice-based e-commerce is using digital wallet. a. True Copyright Cengage Learning. Powered by Cognero.

Page 5


Module 08: eCommerce b. False ANSWER: RATIONALE:

True Correct One method of conducting voice-based e-commerce is using digital wallet. In addition to storing financial information, digital wallet can store such information as the customer’s address and driver’s license number. See 8-5: Mobile and Voice-Based E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe mobile-based and voice-based e-commerce. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.5 TOPICS: Voice-based e-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 12/6/2019 4:38 PM 13. The use of digital wallet is restricted to nonportable devices. a. True b. False ANSWER: False RATIONALE: Correct Digital wallet, which is available for most handheld devices, offers a secure, convenient, and portable tool for online shopping. They store personal and financial information, such as credit card numbers, passwords, and PINs. See 8-6: E-Commerce Supporting Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain four supporting technologies for e-commerce. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.6 TOPICS: E-commerce implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 12/6/2019 1:11 PM 14. E-commerce is a subset of social commerce. a. True b. False ANSWER: False RATIONALE: Correct Social commerce is a subset of e-commerce that is influenced by social networks and other online media enhanced by the ever increasing power of smartphones. See 8-7: ECommerce and Beyond: Social Commerce POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 6


Module 08: eCommerce DIFFICULTY: Moderate REFERENCES: Explain social commerce and the reasons for its popularity. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.7 TOPICS: Social commerce KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 15. Group buying platforms constitute one category of mobile marketing. a. True b. False ANSWER: False RATIONALE: There are several categories of social networks and online media that collectively constitute social commerce, including group buying platforms: These Web sites offer a product or service at a huge discount if a certain number of buyers agree to buy the product or service in a given time period, such as within a 24-hour period. Popular examples include Groupon and LivingSocial. See 8-7: E-Commerce and Beyond: Social Commerce POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain social commerce and the reasons for its popularity. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.7 TOPICS: social commerce KEYWORDS: Understand DATE CREATED: 12/6/2019 3:43 PM DATE MODIFIED: 12/6/2019 3:47 PM 16. Kickstarter is an example of a participatory e-commerce site. a. True b. False ANSWER: True RATIONALE: Correct There are several categories of social networks and online media that effectively constitute social commerce, including participatory e-commerce: These Web sites allow users to participate in the production process and bring a product or service to the sites in a collaborative fashion. Popular examples include CutOnYourBias and Kickstarter. See 8-7: E-Commerce and Beyond: Social Commerce POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain social commerce and the reasons for its popularity. QUESTION TYPE: True / False HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 7


Module 08: eCommerce LEARNING OBJECTIVES: MIS.10e.8.7 TOPICS: Social commerce KEYWORDS: Understand DATE CREATED: 12/6/2019 3:49 PM DATE MODIFIED: 12/6/2019 3:52 PM 17. Recommendation web sites are not allowed to offer incentives to individuals for sharing information about their purchases. a. True b. False ANSWER: False RATIONALE: Correct Recommendation Web sites aggregate customers’ opinions related to products or services that they have purchased and then rec- ommend them to others with the same interest. Some also offer incentives to individuals for sharing their purchases with friends through social media. Popular examples include TripAdvisor and Yelp. See 8-7: E-Commerce and Beyond: Social Commerce POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain social commerce and the reasons for its popularity. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.7 TOPICS: Social commerce KEYWORDS: Understand DATE CREATED: 12/6/2019 3:52 PM DATE MODIFIED: 12/6/2019 3:55 PM 18. Social Web sites provide shopping advice and opinion through chat and forums. a. True b. False ANSWER: True RATIONALE: Correct Social Web sites provide shopping advice and opinion through chat and forums. Popular examples include GoTryItOn and eBags. See 8-7: E-Commerce and Beyond: Social Commerce POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain social commerce and the reasons for its popularity. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.7 TOPICS: Social commerce KEYWORDS: Understand DATE CREATED: 12/6/2019 3:55 PM Copyright Cengage Learning. Powered by Cognero.

Page 8


Module 08: eCommerce DATE MODIFIED:

12/6/2019 3:58 PM

19. Social commerce is a type of e-commerce that is influenced primarily by radio and television advertising. a. True b. False ANSWER: False RATIONALE: Correct Social commerce is a subset of e-commerce that is influenced by social networks and other online media enhanced by the ever-increasing power of smartphones. See 8-7: ECommerce and Beyond: Social Commerce POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain social commerce and the reasons for its popularity. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.7 TOPICS: Social commerce KEYWORDS: Understand DATE CREATED: 12/6/2019 3:59 PM DATE MODIFIED: 12/6/2019 4:02 PM 20. M-commerce is based on the Wi-Fi protocol. a. True b. False ANSWER: False RATIONALE: Correct Mobile commerce, based on the Wireless Application Protocol (WAP), has been around for several years, particularly in European countries. See 8-5: Mobile and Voice-Based E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe mobile-based and voice-based e-commerce. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.5 TOPICS: Voice-based e-commerce KEYWORDS: Remember DATE CREATED: 12/6/2019 4:38 PM DATE MODIFIED: 12/6/2019 4:41 PM 21. iPhone apps are a popular type of m-commerce application. a. True b. False ANSWER: True RATIONALE: Correct Copyright Cengage Learning. Powered by Cognero.

Page 9


Module 08: eCommerce A wide variety of m-commerce applications are available, among the most popular being iPhone apps, which include games, entertainment, news, and travel information. Some iPhone apps are free; others must be purchased via iTunes. See 8-5: Mobile and VoiceBased E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe mobile-based and voice-based e-commerce. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.5 TOPICS: Voice-based e-commerce KEYWORDS: Remember DATE CREATED: 12/6/2019 4:41 PM DATE MODIFIED: 12/6/2019 4:45 PM 22. Voice-based e-commerce relies on text-to-speech technologies. a. True b. False ANSWER: True RATIONALE: Correct Voice-based e-commerce relies on voice recognition and text-to-speech technologies that have improved dramatically in the past decade. See 8-5: Mobile and Voice-Based ECommerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe mobile-based and voice-based e-commerce. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.5 TOPICS: Voice-based e-commerce KEYWORDS: Remember DATE CREATED: 12/6/2019 4:46 PM DATE MODIFIED: 12/6/2019 4:51 PM 23. Social media information systems facilitate sales for the system's sponsors. a. True b. False ANSWER: True RATIONALE: Correct. SMISs facilitate business activities such as sales and marketing for the sponsors and help the sponsors establish bonds and loyalties with their customers. See 8-9: Social Media Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain social media information systems. Copyright Cengage Learning. Powered by Cognero.

Page 10


Module 08: eCommerce QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.9 TOPICS: Social media information systems SMIS KEYWORDS: Understand DATE CREATED: 12/6/2019 6:08 PM DATE MODIFIED: 12/6/2019 6:17 PM 24. A social media information system can generate valuable information about customers, including where they live. a. True b. False ANSWER: True RATIONALE: Correct. A SMIS could generate the following key information for a business that is properly designing and using such a strategic tool: Gaining valuable information and insights about customers— who they are, where they live, what they like, and how they feel about a brand. See 8-9: Social

Media Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain social media information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.9 TOPICS: Social media information systems SMIS KEYWORDS: Understand DATE CREATED: 12/6/2019 6:14 PM DATE MODIFIED: 12/6/2019 6:16 PM 25. Before defining a social media policy, an organization should design its social media information system. a. True b. False ANSWER: False RATIONALE: Correct. Before designing a SMIS, an organization should clearly define its social media policy and the policy should be clearly explained to all impacted employees. See 8-9: Social Media Information

Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain social media information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.9 TOPICS: Social media information systems SMIS Copyright Cengage Learning. Powered by Cognero.

Page 11


Module 08: eCommerce KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 12/6/2019 6:18 PM 12/6/2019 6:19 PM

26. For a business that is properly using a social media information system, the system can generate information about what competitors are doing. a. True b. False ANSWER: True RATIONALE: Correct. A SMIS could generate the following key information for a business that is properly designing and using such a strategic tool: Finding out what the competitors are doing and be able to make strategic decisions in real time to combat them. See 8-9: Social Media Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain social media information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.9 TOPICS: SMIS Social media information systems KEYWORDS: Understand DATE CREATED: 12/6/2019 6:24 PM DATE MODIFIED: 12/6/2019 6:28 PM Multiple Choice 27. Which is a supporting activity in a value chain? a. Operations b. Logistics c. Technological development d. Marketing and sales ANSWER: c RATIONALE: Correct. The supporting activities of a value chain are organizational infrastructure, human resource management, technological development, and procurement (gathering input). See 8-1: Defining E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: Value chain and e-commerce KEYWORDS: Remember Copyright Cengage Learning. Powered by Cognero.

Page 12


Module 08: eCommerce DATE CREATED: DATE MODIFIED:

10/22/2019 1:31 PM 10/22/2019 1:31 PM

28. _____ is a supporting activity in Michael Porter’s value chain. a. Service b. Logistics c. Marketing and sales d. Human resource management ANSWER: d RATIONALE: Correct. The supporting activities of a value chain are organizational infrastructure, human resource management, technological development, and procurement (gathering input). See 8-1: Defining E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: Value chain and e-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 29. _____ is a primary activity in Michael Porter’s value chain. a. Service b. Procurement c. Technological development d. Human resource management ANSWER: a RATIONALE: Correct. The primary activities in Michael Porter’s value chain are inbound logistics, outbound logistics, operations, service, and marketing and sales. See 8-1: Defining ECommerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: Value chain and e-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM Copyright Cengage Learning. Powered by Cognero.

Page 13


Module 08: eCommerce 30. _____ is a primary activity in a value chain that involves moving and storing products, from the end of the production line to end users or distribution centers. a. Marketing and sales b. Outbound logistics c. Operations d. Service ANSWER: b RATIONALE: Correct. Outbound logistics involves moving and storing products, from the end of the production line to end users or distribution centers. Inbound logistics includes tasks associated with receiving, storing, and disseminating incoming goods or materials. See 8-1: Defining E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: Value chain and e-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 31. In a value chain, service involves _____. a. processing raw materials into finished goods b. identifying customer needs and generating sales c. activities to support customers after the sale of products d. tasks associated with receiving, storing, and disseminating incoming goods ANSWER: c RATIONALE: Correct. Service involves activities to support customers after the sale of products and services. Apart from service, inbound logistics, outbound logistics, operations, and marketing and sales are the other primary activities of a value chain. See 8-1: Defining ECommerce POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: Value chain and e-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 32. _____ is a primary activity in a value chain that involves processing raw materials into finished goods and services. Copyright Cengage Learning. Powered by Cognero.

Page 14


Module 08: eCommerce a. Operations b. Service c. Procurement d. Logistics ANSWER: RATIONALE:

a Correct. Operations involves processing raw materials into finished goods and services. Apart from operations, inbound logistics, outbound logistics, service, and marketing and sales are the other primary activities of a value chain. See 8-1: Defining E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: Value chain and e-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 33. A similarity between e-commerce and traditional commerce is that both: a. use the same mode of service to cater to consumers. b. require a physical store to sell consumer goods. c. use magazines to provide product information. d. concentrate on selling products to generate profit. ANSWER: d RATIONALE: Correct. Although the goal of e-commerce and traditional commerce is the same-selling products and services to generate profit-they do it quite differently. In e-commerce, the Web and telecommunication technologies play a major role. See 8-1: Defining ECommerce POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: E-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 34. In the context of e-commerce, which of the following is used to provide product information? a. Web sites b. Phone calls Copyright Cengage Learning. Powered by Cognero.

Page 15


Module 08: eCommerce c. Flyers d. Faxes ANSWER: RATIONALE:

a Correct. In e-commerce, product information is provided using Web sites and online catalogs. Other activities, such as checking product availability and generating orders, are also performed using Web sites. See 8-1: Defining E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: E-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 35. One of the advantages of e-commerce is that it: a. improves customer service. b. is a universally accepted system. c. guarantees privacy and security of buyers. d. is highly accessible throughout the world. ANSWER: a RATIONALE: Correct. E-commerce improves customer service. It also offers personalized services and product customization. See 8-1: Defining E-Commerce POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: E-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 36. Price _____, in e-commerce, means all market participants can trade at the same price. a. discrimination b. transparency c. bundling d. skimming ANSWER: b RATIONALE: Correct. One of the advantages of e-commerce is that it creates “price transparency,” Copyright Cengage Learning. Powered by Cognero.

Page 16


Module 08: eCommerce meaning all market participants can trade at the same price. E-commerce also offers personalized services and product customization. See 8-1: Defining E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: E-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 37. Which model transfers the old retail model to the e-commerce world by using the medium of the Internet? a. merchant b. brokerage c. advertising d. infomediary ANSWER: a RATIONALE: Correct. The merchant model of e-commerce transfers the old retail model to the ecommerce world by using the medium of the Internet. In the most common type of merchant model, an e-commerce company uses Internet technologies and Web services to sell goods and services over the Web. See 8-1: Defining E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: E-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 38. Using the _____ model, e-commerce sites sell digital products and services. a. brokerage b. infomediary c. mixed d. subscription ANSWER: d RATIONALE: Correct. Using the subscription model, e-commerce sites sell digital products or services to customers. For example, the Wall Street Journal and Consumer Reports offer online subscriptions, and antivirus vendors use this model to distribute their software and updates. Copyright Cengage Learning. Powered by Cognero.

Page 17


Module 08: eCommerce See 8-1: Defining E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: Value chain and e-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 39. Identify the e-commerce business model that brings sellers and buyers together on the Web and collects commissions on transactions between these parties. a. The merchant model b. The brokerage model c. The advertising model d. The infomediary model ANSWER: b RATIONALE: Correct. Using the brokerage model brings sellers and buyers together on the Web and collects commissions on transactions between these parties. The best example of this model is an online auction site, such as eBay (www.ebay.com), DealDash (www.dealdash.com), or QuiBids (www.quibids.com). See 8-1: Defining E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: Value chain and e-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 40. E-commerce sites that use the _____ model collect data on consumers and businesses and then sell this data to other companies for marketing purposes. a. brokerage b. merchant c. infomediary d. subscription ANSWER: c RATIONALE: Correct. E-commerce sites that use the infomediary model collect information on consumers and businesses and then sell this information to other companies for marketing Copyright Cengage Learning. Powered by Cognero.

Page 18


Module 08: eCommerce purposes. For example, Bizrate (bizrate.com) collects information about the performance of other sites and sells this information to advertisers. See 8-1: Defining E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: Value chain and e-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 41. Companies exclusively using business-to-consumer (B2C) applications: a. sell directly to consumers. b. rely on physical storefronts for customer interactions. c. approach customers through third-party agents. d. focus on using personalized physical stores to serve consumers. ANSWER: a RATIONALE: Correct. B2C companies-such as Amazon, Barnesandnoble.com, and Overstock.com-sell directly to consumers. Amazon and its business partners sell a wide array of products and services, including books, DVDs, prescription drugs, clothing, and household products. See 8-2: Major Categories of E-Commerce POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the major categories of e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.2 TOPICS: E-commerce types and models KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 42. BuyStore Inc., an online retail store, sells all of its products through its Web site, buystore.com, and through an application on cell phones. BuyStore Inc. is an example of a _____. a. brick-and-mortar firm b. pure-play company c. third-party broker d. physical storefront ANSWER: b RATIONALE: Correct. BuyStore Inc. is an example of a pure-play company. Companies that rely exclusively on the Web to distribute their products are referred to as pure-play companies. See 8-2: Major Categories of E-Commerce Copyright Cengage Learning. Powered by Cognero.

Page 19


Module 08: eCommerce POINTS: 1 DIFFICULTY: Challenging REFERENCES: Explain the major categories of e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.2 TOPICS: E-commerce types and models KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 43. Online auction sites that involve business transactions between users of products and services are categorized as _____ e-commerce. a. consumer-to-consumer b. consumer-to-business c. business-to-business d. business-to-consumer ANSWER: a RATIONALE: Correct. Consumer-to-consumer (C2C) e-commerce involves business transactions between users, such as when consumers sell to other consumers via the Internet. When people use online classified ads (e.g., Craigslist) or online auction sites (e.g., eBay), that is C2C e-commerce. See 8-2: Major Categories of E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the major categories of e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.2 TOPICS: E-commerce types and models KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 44. Ryan, an employee of Widget Corp., makes and sells customized paper notebooks. He uses the company’s intranet to advertise the notebooks and sell them to the employees of the company. This is an example of _____ e-commerce. a. consumer-to-consumer b. consumer-to-business c. business-to-business d. business-to-consumer ANSWER: a RATIONALE: Correct. This is an example of consumer-to-consumer (C2C) e-commerce. C2C ecommerce involves business transactions between users, such as when consumers sell to other consumers via the Internet. See 8-2: Major Categories of E-Commerce POINTS: 1 DIFFICULTY: Challenging Copyright Cengage Learning. Powered by Cognero.

Page 20


Module 08: eCommerce REFERENCES: Explain the major categories of e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.2 TOPICS: E-commerce types and models KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 45. In the context of e-government applications, crisis response is categorized as a _____ application. a. government-to-citizen b. government-to-business c. government-to-government d. government-to-employee ANSWER: c RATIONALE: Correct. Crisis response is categorized as a government-to-government (G2G) application. Disaster assistance is also a G2G application. See 8-2: Major Categories of E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the major categories of e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.2 TOPICS: E-commerce types and models KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 46. In the context of e-government applications, e-training for government officials is categorized as a _____ application. a. government-to-citizen b. government-to-business c. government-to-government d. government-to-employee ANSWER: d RATIONALE: Correct. E-training for government officials is categorized as a government-to-employee application. See 8-2: Major Categories of E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the major categories of e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.2 TOPICS: E-commerce types and models KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 21


Module 08: eCommerce DATE CREATED: DATE MODIFIED:

10/22/2019 1:31 PM 10/22/2019 1:31 PM

47. E-commerce activities that take place within an organization’s data communication network are part of _____ ecommerce. a. interbusiness b. agribusiness c. nonbusiness d. intrabusiness ANSWER: d RATIONALE: Correct. Organizational (intrabusiness) e-commerce involves e-commerce activities that take place inside an organization, typically via the organization’s intranet. Intrabusiness ecommerce supports overall e-business activities. See 8-2: Major Categories of ECommerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the major categories of e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.2 TOPICS: E-commerce types and models KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 48. _____ is the first activity involved in a typical business-to-consumer (B2C) cycle. a. Fulfillment b. Information sharing c. Ordering d. Payment ANSWER: b RATIONALE: Correct. The activities of a B2C company are most likely to begin with the company sharing information with consumers. A B2C e-commerce company can use a variety of methods to share information with its customers, such as company Web sites, online catalogs, e-mail, online advertisements, video conferencing, message boards, and newsgroups. See 8-3: B2C E-Commerce Cycle POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the five major activities of the business-to-consumer e-commerce cycle. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.3 TOPICS: Business-to-consumer e-commerce KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM Copyright Cengage Learning. Powered by Cognero.

Page 22


Module 08: eCommerce DATE MODIFIED:

10/22/2019 1:31 PM

49. Service and support are more important in e-commerce than in traditional commerce because e-commerce companies _____. a. do not have a physical location to help maintain current customers b. focus only on attracting new customers c. do not continue business with unsatisfied customers d. rarely cut out the middleman in the link between suppliers and consumers ANSWER: a RATIONALE: Correct. Service and support are more important in e-commerce than in traditional commerce, given that e-commerce companies do not have a physical location to help maintain current customers. Because maintaining current customers is less expensive than attracting new customers, e-commerce companies should make an effort to improve customer service and support. See 8-3: B2C E-Commerce Cycle POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the five major activities of the business-to-consumer e-commerce cycle. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.3 TOPICS: Business-to-consumer e-commerce KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 50. In the context of the seller-side marketplace model, _____ prevents purchases from suppliers that are not on the approved list of sellers. a. e-ticketing b. e-procurement c. the third-party exchange d. the trading partner agreement ANSWER: b RATIONALE: Correct. The main objectives of e-procurement are to prevent purchases from suppliers that are not on the approved list of sellers and eliminate the processing costs of purchases. Eprocurement enables employees in an organization to order and receive supplies and services directly from suppliers. See 8-4: B2B E-Commerce: A Second Look POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the four major models of business-to-business e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.4 TOPICS: Business-to-business e-commerce E-commerce types and models KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM Copyright Cengage Learning. Powered by Cognero.

Page 23


Module 08: eCommerce DATE MODIFIED:

10/22/2019 1:31 PM

51. Large corporations (such as General Electric or Boeing) as well as consortiums of large companies use the _____ model. a. e-procurement b. buyer-side marketplace c. third-party exchange d. infomediary ANSWER: b RATIONALE: Correct. Large corporations (such as General Electric or Boeing) as well as consortiums of large companies use the buyer-side marketplace model. In a buyer-side marketplace, a buyer, or a group of buyers, opens an electronic marketplace and invites sellers to bid on announced products or make a request for quotation. See 8-4: B2B E-Commerce: A Second Look POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the four major models of business-to-business e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.4 TOPICS: E-commerce types and models KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 52. The _____ model generates revenue from the fees charged for matching buyers and sellers. a. seller-side marketplace b. buyer-side marketplace c. third-party exchange marketplace d. trader-side marketplace ANSWER: c RATIONALE: Correct. The third-party exchange marketplace model is not controlled by sellers or buyers. Instead, it is controlled by a third party, and the marketplace generates revenue from the fees charged for matching buyers and sellers. See 8-4: B2B E-Commerce: A Second Look POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the four major models of business-to-business e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.4 TOPICS: Business-to-business e-commerce E-commerce types and models KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM Copyright Cengage Learning. Powered by Cognero.

Page 24


Module 08: eCommerce 53. In the third-party exchange marketplace model, the sale of medical products is an example of a _____. a. horizontal market b. vertical market c. baseline market d. sideline market ANSWER: b RATIONALE: Correct. The utilities industry, the beef and dairy industries, and the sale of medical products are examples of vertical markets. The third-party exchange marketplace model is not controlled by sellers or buyers. Instead, it is controlled by a third party, and the marketplace generates revenue from the fees charged for matching buyers and sellers. See 8-4: B2B E-Commerce: A Second Look POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the four major models of business-to-business e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.4 TOPICS: E-commerce types and models KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 54. Which market concentrates on a specific function or business process and automates this function or process for different industries? a. vertical b. horizontal c. baseline d. sideline ANSWER: b RATIONALE: Correct. A horizontal market concentrates on a specific function or business process and automates this function or process for different industries. Employee-benefits administration and media buying are examples of horizontal markets. See 8-4: B2B ECommerce: A Second Look POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the four major models of business-to-business e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.4 TOPICS: Business-to-business e-commerce E-commerce types and models KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 55. In the third-party exchange marketplace model, media buying is an example of a _____. Copyright Cengage Learning. Powered by Cognero.

Page 25


Module 08: eCommerce a. vertical market b. horizontal market c. baseline market d. sideline market ANSWER: RATIONALE:

b Correct. Employee-benefits administration and media buying are examples of horizontal markets. The third-party exchange marketplace model is not controlled by sellers or buyers. Instead, it is controlled by a third party, and the marketplace generates revenue from the fees charged for matching buyers and sellers. See 8-4: B2B E-Commerce: A Second Look POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the four major models of business-to-business e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.4 TOPICS: E-commerce types and models KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 56. In the context of trading partner agreements, which of the following is true of electronic business Extensible Markup Language (ebXML)? a. ebXML does not support the transfer of inventory charts. b. ebXML enables customers to submit hard copies of agreements. c. ebXML allows Web browsers to select only the data requested in a search. d. ebXML does not support communication of purchase orders. ANSWER: c RATIONALE: Correct. The main advantage of ebXML or XML over HTML is that a user can assign data-type definitions to information on a page, so Web browsers select only the data requested in a search. It is particularly useful in m-commerce (mobile commerce), because loading only the necessary data in a browser makes searches more efficient. See 8-4: B2B E-Commerce: A Second Look POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize the four major models of business-to-business e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.4 TOPICS: Business-to-business e-commerce E-commerce types and models KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 57. In the context of trading partner agreements, identify a true statement about electronic business Extensible Markup Copyright Cengage Learning. Powered by Cognero.

Page 26


Module 08: eCommerce Language (ebXML). a. It makes searches more efficient. b. It increases traffic on the Internet. c. It increases delays during peak usage hours. d. It enables customers to submit hard copies of documents. ANSWER: a RATIONALE: Correct. ebXML is particularly useful in m-commerce (mobile commerce), because loading only the necessary data in a browser makes searches more efficient. This process reduces traffic on the Internet and helps prevent delays during peak usage hours. See 8-4: B2B E-Commerce: A Second Look POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize the four major models of business-to-business e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.4 TOPICS: Business-to-business e-commerce E-commerce types and models KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 58. Mobile commerce (m-commerce) is based on the _____. a. Token Ring Protocol b. Ethernet Protocol c. Wireless Application Protocol d. Wi-Fi Protected Protocol ANSWER: c RATIONALE: Correct. M-commerce, based on the Wireless Application Protocol, has been around for several years, particularly in European countries. Supporting technologies for m-commerce applications include wireless wide area networks (WWANs) and 3G and 4G networks as well as short-range wireless communication technologies, such as Wi-Fi, WiMAX, Bluetooth, and RFID. See 8-5: Mobile and Voice-Based E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe mobile-based and voice-based e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.5 TOPICS: Mobile e-commerce KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 59. _____ is a short-range wireless communication technology that acts as a supporting technology for mobile commerce (m-commerce) applications. Copyright Cengage Learning. Powered by Cognero.

Page 27


Module 08: eCommerce a. A 3G network b. E-procurement c. Bluetooth d. A 4G network ANSWER: RATIONALE:

c Correct. Supporting technologies for m-commerce applications include wireless wide area networks (WWANs) and 3G and 4G networks as well as short-range wireless communication technologies, such as Wi-Fi, WiMAX, Bluetooth, and RFID. See 8-5: Mobile and Voice-Based E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe mobile-based and voice-based e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.5 TOPICS: Mobile e-commerce KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 60. Which of the following is true of mobile commerce (m-commerce) applications? a. They are supported by short-range wireless communication technologies. b. They predominantly rely on voice recognition and text-to-speech technologies. c. They are incompatible with 3G and 4G networks. d. They are based on wired protocols. ANSWER: a RATIONALE: Correct. Supporting technologies for m-commerce applications include wireless wide area networks (WWANs) and 3G and 4G networks as well as short-range wireless communication technologies, such as Wi-Fi, WiMAX, Bluetooth, and RFID. See 8-5: Mobile and Voice-Based E-Commerce POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe mobile-based and voice-based e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.5 TOPICS: Mobile e-commerce KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 61. A(n) electronic _____ is the electronic exchange of money or scrip. a. array b. exchange c. cash transfer Copyright Cengage Learning. Powered by Cognero.

Page 28


Module 08: eCommerce d. payment ANSWER: RATIONALE:

d Correct. An electronic payment is the electronic exchange of money or scrip. It usually involves the use of the Internet, other computer networks, and digitally stored value systems. See 8-6: E-Commerce Supporting Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain four supporting technologies for e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.6 TOPICS: E-commerce implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 62. A _____ is about the size of a credit card and contains an embedded microprocessor chip for storing important financial and personal information. a. nano card b. memory card c. smart card d. pay card ANSWER: c RATIONALE: Correct. A smart card is about the size of a credit card and contains an embedded microprocessor chip for storing important financial and personal information. Smart cards have been used in Europe, Asia, and Australia for many years and are slowly gaining acceptance in the United States because of their multiple functions. See 8-6: E-Commerce Supporting Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain four supporting technologies for e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.6 TOPICS: E-commerce implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 63. Jack is a gamer, and every time he plays at a gaming center, he pays five dollars using a card that he recharges electronically every week. It is evident that Jack uses _____ as the mode of payment. a. e-cash b. a nanopayment card c. e-pay d. a micropayment card Copyright Cengage Learning. Powered by Cognero.

Page 29


Module 08: eCommerce ANSWER: RATIONALE:

a Correct. Jack uses e-cash as the mode of payment. E-cash usually works with a smart card, and the amount of cash stored on the chip can be “recharged” electronically. See 8-6: ECommerce Supporting Technologies POINTS: 1 DIFFICULTY: Challenging REFERENCES: Explain four supporting technologies for e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.6 TOPICS: E-commerce implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 64. _____ offers a secure, convenient, and portable tool for online shopping and stores personal and financial information, such as credit card numbers, passwords, and PINs. a. E-cash b. Digital wallet c. An e-check d. E-pay ANSWER: b RATIONALE: Correct. Digital wallet, which is available for most handheld devices, offers a secure, convenient, and portable tool for online shopping. They store personal and financial information, such as credit card numbers, passwords, and PINs. See 8-6: E-Commerce Supporting Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain four supporting technologies for e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.6 TOPICS: E-commerce implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 12/6/2019 2:06 PM 65. _____ is a popular online payment system used on many online auction sites. a. Bitcoin b. Google Pay c. PayPal d. Apple Wallet ANSWER: c RATIONALE: Correct. PayPal is a popular online payment system used for many online transactions. Users with valid e-mail addresses can set up PayPal accounts and make secure payments Copyright Cengage Learning. Powered by Cognero.

Page 30


Module 08: eCommerce for online transactions using their credit cards or bank accounts. See 8-6: E-Commerce Supporting Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain four supporting technologies for e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.6 TOPICS: E-commerce implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 66. _____ is a method for advertisers to pay for cost per view or cost per click, which is typically one-tenth of a cent. a. Smart payment b. Micropayment c. E-cash d. E-check ANSWER: b RATIONALE: Correct. Micropayments are transactions on the Web involving very small amounts of money. They began as a method for advertisers to pay for cost per view or cost per click, which is typically one-tenth of a cent. See 8-6: E-Commerce Supporting Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain four supporting technologies for e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.6 TOPICS: E-commerce implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 12/6/2019 2:09 PM 67. In the context of Web marketing, the term ad _____ refers to one user viewing one ad. a. blocker b. exchange c. impression d. connect ANSWER: c RATIONALE: Correct. The term ad impression refers to one user viewing one ad. Most Web and e-mail advertising is priced based on the cost per thousand ad impressions. See 8-6: E-Commerce Supporting Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain four supporting technologies for e-commerce. Copyright Cengage Learning. Powered by Cognero.

Page 31


Module 08: eCommerce QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.6 TOPICS: E-commerce implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 68. In the context of Web marketing, the _____ is computed by dividing the number of clicks an ad gets by the total impressions bought. a. cost per click b. cost per thousand c. click-through rate d. click-through impression ANSWER: c RATIONALE: Correct. The click-through rate (CTR) is computed by dividing the number of clicks an ad gets by the total impressions bought. For example, if an advertiser buys 100,000 impressions and gets 20,000 clicks, the CTR is 20 percent (20,000/100,000). See 8-6: ECommerce Supporting Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain four supporting technologies for e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.6 TOPICS: E-commerce implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 69. In the context of Web marketing, a cookie is: a. the information that users save on the hard drive for later use. b. the information a Web site stores on a user’s hard drive. c. a list of sites visited by a user in a day or the last few days. d. a list of sites that users bookmark on a browser for reference. ANSWER: b RATIONALE: Correct. Cookies are information a Web site stores on a user’s hard drive so that it can be used for a later visit, such as for greeting a visitor by name. This information is also used to record user preferences and browsing habits. See 8-6: E-Commerce Supporting Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain four supporting technologies for e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 32


Module 08: eCommerce LEARNING OBJECTIVES: MIS.10e.8.6 TOPICS: E-commerce implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 70. In the context of Web marketing, any element of a Web page that is clicked counts as a _____ to a server. a. pop b. byte c. hit d. loop ANSWER: c RATIONALE: Correct. Any element of a Web page (including text, graphics, and interactive items) that is clicked counts as a hit to a server. Hits are not the preferred unit of measurement for site traffic because the number of hits per page can vary widely, depending on the number of graphics, type of browser used, and page size. See 8-6: E-Commerce Supporting Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain four supporting technologies for e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.6 TOPICS: E-commerce implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 71. In the context of Web marketing, _____ are display ads that appear on top of a browser window, blocking the user’s view. a. pop-under ads b. pop-up ads c. dialog box ads d. banner box ads ANSWER: b RATIONALE: Correct. Pop-up ads are display ads that appear on top of a browser window, blocking the user’s view. Pop-up ads are more intrusive than pop-under ads. See 8-6: E-Commerce Supporting Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain four supporting technologies for e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.6 TOPICS: E-commerce implementation Copyright Cengage Learning. Powered by Cognero.

Page 33


Module 08: eCommerce KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 10/22/2019 1:31 PM 10/22/2019 1:31 PM

72. The Web page displayed when a user first visits a site is called a(n) _____. a. ad impression b. cookie c. splash screen d. hit ANSWER: c RATIONALE: Correct. The Web page displayed when a user first visits a site is called a splash screen. It is designed to capture the user’s attention and motivate the user to browse the site. See 8-6: E-Commerce Supporting Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain four supporting technologies for e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.6 TOPICS: E-commerce implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 73. Which is an artificial intelligence application that can be used for Web marketing? a. intelligent agent b. intelligent updater c. intelligent link d. intelligent queue ANSWER: a RATIONALE: Correct. An intelligent agent is an artificial intelligence application that can be used for Web marketing. For example, product-brokering agents can alert customers about a new product. See 8-6: E-Commerce Supporting Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain four supporting technologies for e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.6 TOPICS: E-commerce implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 74. In the context of mobile marketing strategies, in-game mobile marketing: Copyright Cengage Learning. Powered by Cognero.

Page 34


Module 08: eCommerce a. requires a user to share his/her location and display business ads relative to the location. b. requires a gamer to click on search engine ads in order to go to the next level of the game. c. uses mobile games where the characters in the game promote products for companies. d. uses mobile ads that appear between loading screens within popular games. ANSWER: d RATIONALE: Correct. In-game mobile marketing uses mobile ads that appear within popular mobile games and can take several forms, such as banner popups, full-page image ads, or video ads, that appear between loading screens. See 8-6: E-Commerce Supporting Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain four supporting technologies for e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.6 TOPICS: E-commerce implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 75. Buyline is an e-commerce Web site. It has come up with a promotional offer where buyers get a 60 percent discount on refrigerators if a minimum of 100 buyers agree to buy the product within 24 hours of the offer being announced. In this case, it is evident that BuyLine is a _____. a. social networking site b. group buying platform c. peer-to-peer e-commerce platform d. participatory e-commerce site ANSWER: b RATIONALE: Correct. It is evident that BuyLine is a group buying platform. Group buying platforms are Web sites that offer a product or service at a huge discount if certain number of buyers agree to buy the product or service in a given time period, such as within a 24-hour period. See 8-7: E-Commerce and Beyond: Social Commerce POINTS: 1 DIFFICULTY: Challenging REFERENCES: Explain social commerce and the reasons for its popularity. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.7 TOPICS: Social commerce KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 76. _____ are community-based marketplaces that enable individuals to communicate directly with each other and conduct e-commerce operations. a. Social networking sites Copyright Cengage Learning. Powered by Cognero.

Page 35


Module 08: eCommerce b. Group buying platforms c. Peer-to-peer e-commerce platforms d. Participatory e-commerce sites ANSWER: c RATIONALE: Correct. Peer-to-peer e-commerce platforms are community-based marketplaces that enable individuals to communicate directly with each other and conduct e-commerce operations. Amazon Marketplace is a popular example of such marketplaces. See 8-7: ECommerce and Beyond: Social Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain social commerce and the reasons for its popularity. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.7 TOPICS: Social commerce KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 77. For a business that is properly designing and using a social media information system (SMIS), the SMIS would most likely: a. decrease Web site traffic. b. curb hypersocialization in the organization. c. enable it to develop local area networks within the organization. d. enable it to share new and dynamic contents with customers in real time. ANSWER: d RATIONALE: Correct. For a business that is properly designing and using a SMIS, the SMIS would most likely enable it to share new and dynamic contents with customers in real time. See 8-9: Social Media Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain social media information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.9 TOPICS: Social commerce KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 78. _____ encompasses all the activities a company performs in selling and buying products and services using computers and communication technologies. a. E-procurement b. Marketing and sales c. E-business Copyright Cengage Learning. Powered by Cognero.

Page 36


Module 08: eCommerce d. Web marketing ANSWER: RATIONALE:

c E-business encompasses all the activities a company performs in selling and buying products and services using computers and communication technologies. In broad terms, ebusiness includes several related activities, such as online shopping, sales force automation, supply chain management, electronic procurement (e-procurement), electronic payment systems, Web advertising, and order management. See 8-1: Defining ECommerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: E-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 79. Which concept, introduced by Michael Porter, consists of a series of activities designed to meet business needs by adding cost in each phase of the e-commerce process? a. social engineering b. search engine optimization c. packet switching d. value chain ANSWER: d RATIONALE: Michael Porter introduced the value chain concept in 1985. It consists of a series of activities designed to meet business needs by adding value (or cost) in each phase of the ecommerce process. See 8-1: Defining E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: E-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 80. _____ is a mix of traditional commerce and e-commerce. a. Brick-and-mortar e-commerce b. Click-and-brick e-commerce c. Business-to-business e-commerce Copyright Cengage Learning. Powered by Cognero.

Page 37


Module 08: eCommerce d. Customer-to-customer e-commerce ANSWER: b RATIONALE: Many companies now operate as a mix of traditional commerce and e-commerce and have some kind of e-commerce presence. These companies, referred to as click-and-brick ecommerce, capitalize on the advantages of online interaction with their customers yet retain the benefits of having a physical store location. See 8-1: Defining E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: E-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 81. Which model of e-commerce is an extension of traditional marketing media, such as radio and television? a. merchant model b. brokerage model c. advertising model d. infomediary model ANSWER: c RATIONALE: The advertising model of e-commerce is an extension of traditional advertising media, such as radio and television. Directories such as Yahoo! provide content (similar to radio and TV) to users for free. See 8-1: Defining E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: Value chain and e-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 82. Electronic data interchange (EDI) and electronic funds transfer (EFT) are forms of _____ e-commerce. a. consumer-to-consumer b. consumer-to-business c. business-to-business d. business-to-consumer ANSWER: c Copyright Cengage Learning. Powered by Cognero.

Page 38


Module 08: eCommerce RATIONALE:

Business-to-business (B2B) e-commerce involves electronic transactions between businesses. These transactions have been around for many years in the form of EDI and EFT. See 8-2: Major Categories of E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the major categories of e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.2 TOPICS: E-commerce types and models KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 83. A popular application of the _____ model, which is a major business-to-business (B2B) e-commerce model, is eprocurement. a. third-party exchange market-place b. buyer-side marketplace c. seller-side marketplace d. trader-side marketplace ANSWER: c RATIONALE: A popular application of the seller-side marketplace model is e-procurement, which enables employees in an organization to order and receive supplies and services directly from suppliers. E-procurement streamlines the traditional procurement process, which reduces costs, saves time, and improves relationships between suppliers and participating organizations. See 8-4: B2B E-Commerce: A Second Look POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the four major models of business-to-business e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.4 TOPICS: E-commerce types and models KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 84. In the third-party exchange marketplace model, a _____ market concentrates on a specific industry or market. a. vertical b. horizontal c. baseline d. sideline ANSWER: a RATIONALE: A vertical market concentrates on a specific industry or market, such as the utilities industry, the beef and dairy industries, and the sale of medical products. See 8-4: B2B ECopyright Cengage Learning. Powered by Cognero.

Page 39


Module 08: eCommerce Commerce: A Second Look POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the four major models of business-to-business e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.4 TOPICS: E-commerce types and models KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 85. _____ support m-commerce applications. a. Personal area networks b. Wireless wide area networks c. Local area networks d. Virtual private networks ANSWER: b RATIONALE: Supporting technologies for m-commerce applications include wireless wide area networks (WWANs) and 3G and 4G networks as well as short-range wireless communication technologies, such as Wi-Fi, WiMAX, Bluetooth, and RFID. See 8-5: Mobile and VoiceBased E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe mobile-based and voice-based e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.5 TOPICS: Mobile e-commerce KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 86. _____ relies on text-to-speech technologies. a. Seller-side e-commerce b. Voice-based e-commerce c. Traditional commerce d. Mobile commerce ANSWER: b RATIONALE: Voice-based e-commerce relies on voice recognition and text-to-speech technologies that have improved dramatically in the past decade. One method of conducting voice-based ecommerce is using e-wallets, or virtual wallets. See 8-5: Mobile and Voice-Based ECommerce POINTS: 1 DIFFICULTY: Easy Copyright Cengage Learning. Powered by Cognero.

Page 40


Module 08: eCommerce REFERENCES: Describe mobile-based and voice-based e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.5 TOPICS: Mobile e-commerce Voice-based e-commerce KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 87. A(n) _____ is the electronic version of a paper check and offers security, speed, and convenience for online transactions. a. paper wallet b. digital wallet c. e-check d. online-check ANSWER: c RATIONALE: An e-check is the electronic version of a paper check and offers security, speed, and convenience for online transactions. Many utility companies offer customers the opportunity to use e-checks to make their payments, and most banks accept e-checks for online bill payments. See 8-6: E-Commerce Supporting Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain four supporting technologies for e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.6 TOPICS: E-commerce implementation KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 12/6/2019 3:08 PM 88. Which tag is an HTML tag that provides information on the keywords that represent the contents of a Web page? a. head b. body c. meta d. object ANSWER: c RATIONALE: The meta tag provides information about a Web page, such as keywords that represent the page content, the Web designer, and frequency of page updates. Search engines use this information (particularly the keywords) to create indexes. See 8-6: E-Commerce Supporting Technologies POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain four supporting technologies for e-commerce. Copyright Cengage Learning. Powered by Cognero.

Page 41


Module 08: eCommerce QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.6 TOPICS: E-commerce implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 89. Search engines and directories offer space that companies can purchase for advertising purposes. This process is called _____. a. ad impression b. cookie spacing c. spot leasing d. search optimization ANSWER: c RATIONALE: Search engines and directories offer space that companies can purchase for advertising purposes. This process is called spot leasing. Spots have an advantage over banner ads because their placement is permanent; banner ad placement can change from visit to visit. See 8-6: E-Commerce Supporting Technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain four supporting technologies for e-commerce. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.6 TOPICS: E-commerce implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 90. _____ aggregate customers’ opinions related to products or services that they have purchased and then suggest them to others with the same interest. a. Recommendation Web sites b. Group buying platforms c. Peer-to-peer e-commerce platforms d. Participatory e-commerce Web sites ANSWER: a RATIONALE: Recommendation Web sites aggregate customers’ opinions related to products or services that they have purchased and then recommend them to others with the same interest. Some also offer incentives to individuals for sharing their purchases with friends through social media. See 8-7: E-Commerce and Beyond: Social Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain social commerce and the reasons for its popularity. QUESTION TYPE: Multiple Choice Copyright Cengage Learning. Powered by Cognero.

Page 42


Module 08: eCommerce HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.7 TOPICS: Social commerce KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 91. In the _____ sales channel, a customer uses only one channel of a given business to purchase an item, including instore, on a cell phone, or on the company’s Web site. a. omnichannel b. multichannel c. cross-channel d. mobile channel ANSWER: b RATIONALE: Correct. A customer uses one channel of a given business to purchase an item, including in-store, on a cell phone, on the company’s Web site, social media channels, comparison shopping engines, third-party marketplaces, other companies’ Web sites, and so forth. These various channels are not connected to one another and different departments and channels do not share any data with each other. See 8-3: B2C E-Commerce Cycle POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the five major activities of the business-to-consumer e-commerce cycle. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.3 TOPICS: Business-to-consumer e-commerce KEYWORDS: Understand DATE CREATED: 12/6/2019 4:05 PM DATE MODIFIED: 12/6/2019 4:11 PM 92. Identify one advantage of multichannel retailing. a. It leverages the power of marketplaces and search engines. b. It leverages the power of telecommunications. c. It targets only consumers who are ready to buy. d. It targets the most affluent consumers. ANSWER: b RATIONALE: Correct. Multichannel retailing leverages the power of marketplaces and search engines. Multichannel sellers have more freedom and flexibility and are able to take advantage of different features that each channel offers. See 8-3: B2C E-Commerce Cycle POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the five major activities of the business-to-consumer e-commerce cycle. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 43


Module 08: eCommerce LEARNING OBJECTIVES: MIS.10e.8.3 TOPICS: Business-to-consumer e-commerce KEYWORDS: Understand DATE CREATED: 12/6/2019 4:12 PM DATE MODIFIED: 12/6/2019 4:19 PM 93. In the _____ sales channel, a customer uses several channels in order to buy an item. a. cross-channel b. multichannel c. auction-style d. hypersocial ANSWER: b RATIONALE: Correct. In the cross-channel sales channel, a customer uses several channels in order to buy an item. This strategy offers freedom and convenience to the customer. See 8-3: B2C E-Commerce Cycle POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the five major activities of the business-to-consumer e-commerce cycle. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.3 TOPICS: Business-to-consumer e-commerce KEYWORDS: Understand DATE CREATED: 12/6/2019 4:20 PM DATE MODIFIED: 12/6/2019 4:22 PM 94. Identify an advantage of omnichannel. a. It does not require extensive integration. b. It improves the quality of products. c. It requires a strong infrastructure. d. It improves brand recognition. ANSWER: d RATIONALE: Correct. Some of the advantages of omnichannel include: It improves customer satisfaction and retention; It allows a company to meet customers where they are; It retains more customers; It increases revenue; It improves brand recognition. See 8-3: B2C E-Commerce Cycle POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the five major activities of the business-to-consumer e-commerce cycle. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.3 TOPICS: Business-to-consumer e-commerce KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 44


Module 08: eCommerce DATE CREATED: DATE MODIFIED:

12/6/2019 4:23 PM 12/6/2019 4:28 PM

95. Identify an advantage of a cross-channel sales strategy. a. It increases sales opportunities. b. It allows companies to meet customers where they are. c. It leverages the power of marketplaces and search engines. d. It simplifies payment options. ANSWER: a RATIONALE: Correct. There are several advantages of the cross-channel strategy: It makes customer service more personal. It attracts new customers faster; It improves the company's brand image; It gets a unique view of its customers; It increases sales opportunities; It allows the business to know its customers better. See 8-3: B2C E-Commerce Cycle POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the five major activities of the business-to-consumer e-commerce cycle. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.3 TOPICS: Business-to-consumer e-commerce KEYWORDS: Understand DATE CREATED: 12/6/2019 4:28 PM DATE MODIFIED: 12/6/2019 4:33 PM 96. Identify the main disadvantage of omnichannel. a. Its simplicity. b. Its complexity. c. It is too time-consuming for customers. d. It does not increase revenue. ANSWER: b RATIONALE: Correct. The main disadvantage of this strategy is its complexity. It requires that a large number of people in a lot of different places all be on the same page. Also, it requires seamless integration between people, software, and processes in order to be successful. See 8-3: B2C E-Commerce Cycle POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the five major activities of the business-to-consumer e-commerce cycle. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.3 TOPICS: Business-to-consumer e-commerce KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 45


Module 08: eCommerce DATE CREATED: DATE MODIFIED:

12/6/2019 4:34 PM 12/6/2019 4:36 PM

97. Hypersocial organizations should forget information channels and concentrate on: a. e-commerce. b. social media. c. knowledge networks. d. reviews. ANSWER: c RATIONALE: Correct. Hypersocial organizations should forget information channels and concentrate on knowledge networks. As noted, the majority of the customers follow peers on social media. Customers already have some basic knowledge about a company and its products and services and have heard comments from the peers in their tribes. Companies should share knowledge and work to gain trust using social media. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain hyper-social organizations and their growing popularity. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.8 TOPICS: hyper-social organizations KEYWORDS: Understand DATE CREATED: 12/6/2019 4:58 PM DATE MODIFIED: 12/6/2019 5:01 PM 98. One pillar of hypersociality involves focusing on _____, which are based on group behavioral characteristics. a. tribes b. theories c. product reviews d. market segments ANSWER: a RATIONALE: Correct. Tribes have their own language and protocols, and they identify with each other in some way, such as people from different economic and social classes that share the same interest. Companies should forget market segments and focus on tribes, which are based on group behavioral characteristics (market segments are based on individual consumer traits). Companies need to reach tribes with members who influence each other. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain hyper-social organizations and their growing popularity. QUESTION TYPE: Multiple Choice HAS VARIABLES: False TOPICS: hyper-social organizations KEYWORDS: Understand DATE CREATED: 12/6/2019 5:02 PM Copyright Cengage Learning. Powered by Cognero.

Page 46


Module 08: eCommerce DATE MODIFIED: 12/6/2019 5:06 PM 99. Hypersocial organizations leverage the power of _____. a. online advertising b. bricks-and-mortar retailing c. online communities d. search engines ANSWER: c RATIONALE: Correct. Hypersocial organizations leverage the power of online communities. There are four key elements for a successful community: members, content, member profiles, and transactions. See 8-8: Hypersocial Organizations. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain hyper-social organizations and their growing popularity. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.8 TOPICS: hyper-social organizations KEYWORDS: Understand DATE CREATED: 12/6/2019 5:06 PM DATE MODIFIED: 12/6/2019 5:09 PM 100. Personalization technologies used on Amazon demonstrate the use of _____ centricity. a. human b. online c. group d. technological ANSWER: a RATIONALE: Correct. Human centricity directs all company activities and decisions toward providing value to the humans who are a company’s customers, employees, or business partners. A hypersocial organization should engage with customers and satisfy their needs directly using social media. Personalization technologies used on Web sites such as Amazon demonstrate this. See 8-8: Hypersocial Organizations. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain hyper-social organizations and their growing popularity. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.8 TOPICS: hyper-social organizations KEYWORDS: Understand DATE CREATED: 12/6/2019 5:16 PM DATE MODIFIED: 12/6/2019 5:20 PM Copyright Cengage Learning. Powered by Cognero.

Page 47


Module 08: eCommerce 101. The four pillars of hypersociality describe a return to a _____ for businesses. a. more formal interaction b. mechanized strategy c. Web-based framework d. natural human interaction ANSWER: d RATIONALE: Correct. The four pillars of hypersociality describe a return to a natural human interaction for both businesses and consumers. See 8-8: Hypersocial Organizations. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain hyper-social organizations and their growing popularity. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.8 TOPICS: hyper-social organizations KEYWORDS: Understand DATE CREATED: 12/6/2019 5:20 PM DATE MODIFIED: 12/6/2019 5:23 PM 102. For a hypersocial organization, which is considered the most vital element of an online community? a. content b. members c. member profiles d. transactions ANSWER: b RATIONALE: Correct. Hypersocial organizations leverage the power of online communities. There are four key elements for a successful community: members, content, member profiles, and transactions. The importance of members is probably the most vital element. The more members in a community the better it is. See 8-8: Hypersocial Organizations. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain hyper-social organizations and their growing popularity. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.8 TOPICS: hyper-social organizations KEYWORDS: Understand DATE CREATED: 12/6/2019 5:24 PM DATE MODIFIED: 12/6/2019 5:29 PM 103. Hypersocial organizations are companies that leverage _____ in order to turn the business into a social process. a. e-commerce b. automation Copyright Cengage Learning. Powered by Cognero.

Page 48


Module 08: eCommerce c. e-mail d. social media ANSWER: RATIONALE:

d Correct. Hypersocial organizations are companies that leverage social media in order to turn the business into a social process and, as a result, be able to better connect with their customers and sell more products and services. See 8-8: Hypersocial Organizations. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain hyper-social organizations and their growing popularity. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.8 TOPICS: hyper-social organizations KEYWORDS: Understand DATE CREATED: 12/6/2019 5:29 PM DATE MODIFIED: 12/6/2019 5:32 PM 104. The _____ pillar of hypersociality realizes that the benefits of leveraging social media are much greater than its negatives. a. tribe vs. market segment b. social messiness vs. process hierarchy c. information channels cs. network channels d. human-centric vs. company-centric ANSWER: b RATIONALE: Correct. Social messiness versus process hierarchy: Hypersocial organizations should forget process and hierarchies and embrace social messiness. This new paradigm will be less rigid and less predefined but will allow people in an organization to interact as humans. People can make mistakes, but over time, they will correct themselves. This pillar realizes that the benefits of leveraging social media are much greater than its negatives. See 8-8: Hypersocial Organizations. POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain hyper-social organizations and their growing popularity. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.8 TOPICS: hyper-social organizations KEYWORDS: Understand DATE CREATED: 12/6/2019 5:33 PM DATE MODIFIED: 12/6/2019 5:40 PM 105. Identify one component of a social media information system (SMIS) that is not included in other information systems. a. Hardware. b. Procedures. Copyright Cengage Learning. Powered by Cognero.

Page 49


Module 08: eCommerce c. User communities. d. Software. ANSWER: RATIONALE:

c Correct. A social media information system (SMIS) is an information system that includes all the components like other information systems (discussed in Module 1) such as hardware, software, people, and procedures that sup- port content sharing among its members or users. Three additional components of a SMIS include: application providers, user communities, and sponsors. See 8-9: Social Media Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain social media information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.9 TOPICS: Social commerce KEYWORDS: Understand DATE CREATED: 12/6/2019 5:56 PM DATE MODIFIED: 12/6/2019 6:00 PM 106. Social media information systems play a major role in fostering _____. a. hypersocial organizations b. click-and-brick retailers c. new sales channels d. voice-based e-commerce ANSWER: a RATIONALE: Correct. SMISs play a major role in fostering hypersocial organizations by creating communities to transform interactions with users, customers, employees, and business partners into a mutually productive relationship. See 8-9: Social Media Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain social media information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.8.9 TOPICS: Social commerce KEYWORDS: Understand DATE CREATED: 12/6/2019 6:01 PM DATE MODIFIED: 12/6/2019 6:04 PM Essay 107. How does e-commerce relate to the value chain concept? ANSWER: Answers will vary. The Internet can increase the speed and accuracy of communication between suppliers, distributors, and customers. Moreover, the Internet’s low cost means companies of any size can take advantage of value chain integration, which is the process Copyright Cengage Learning. Powered by Cognero.

Page 50


Module 08: eCommerce of multiple companies in a shared market working together to plan and manage the flow of goods, services, and information from manufacturers to consumers. This process optimizes the value chain’s efficiency, thus creating a competitive advantage for all companies involved. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: Value chain and e-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 108. Provide examples of how e-commerce can enhance a value chain. ANSWER: Answers will vary. E-commerce can enhance a value chain by offering new ways to reduce costs or improve operations, including the following: a. Using e-mail rather than regular mail to notify customers of upcoming sales can reduce costs. b. Selling to customers via the company Web site can generate new sources of revenue, particularly from customers who live far away from the company’s headquarters or physical store. c. Offering online customer service can make products or services more appealing to customers. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: Value chain and e-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 109. Explain the concept of click-and-brick e-commerce. ANSWER: Answers will vary. Many companies now operate as a mix of traditional commerce and ecommerce and have some kind of e-commerce presence. These companies, referred to as click-and-brick e-commerce, capitalize on the advantages of online interaction with their customers yet retain the benefits of having a physical store location. For example, customers can buy items from the company’s Web site but take them to the physical store if they need to return items. Copyright Cengage Learning. Powered by Cognero.

Page 51


Module 08: eCommerce POINTS: DIFFICULTY: REFERENCES:

1 Moderate Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: Value chain and e-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 12/6/2019 3:13 PM 110. List four disadvantages of e-commerce. ANSWER: Answers will vary. E-commerce has the following disadvantages, although many of these should be eliminated or reduced in the near future: a. Bandwidth capacity problems (in certain parts of the world) b. Security and privacy issues c. Accessibility (not everybody is connected to the Web yet) d. Acceptance (not everybody accepts this technology) POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: E-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 111. Describe the merchant model of e-commerce. ANSWER: Answers will vary. The merchant model transfers the old retail model to the e-commerce world by using the medium of the Internet. In the most common type of merchant model, an e-commerce company uses Internet technologies and Web services to sell goods and services over the Web. Companies following this model offer good customer service and lower prices to establish a presence on the Web. Amazon uses this model, but traditional businesses, such as Dell, Cisco, and Hewlett-Packard, have adopted this model to eliminate the middleman and reach new customers. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define e-commerce and describe its advantages, disadvantages, and business models. QUESTION TYPE: Essay Copyright Cengage Learning. Powered by Cognero.

Page 52


Module 08: eCommerce HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.1 TOPICS: E-commerce KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 112. How do companies use business-to-business (B2B) applications? ANSWER: Answers will vary. Companies use B2B applications for purchase orders, invoices, inventory status, shipping logistics, business contracts, and other operations. These companies report millions of dollars in savings by increasing transaction speed, reducing errors, and eliminating manual tasks. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the major categories of e-commerce. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.2 TOPICS: E-commerce types and models KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 113. Provide examples of organizational e-commerce activities that take place inside an organization. ANSWER: Answers will vary. Organizational e-commerce activities can include exchange of goods, services, or information among employees. Other examples include conducting training programs and offering human resource services. Some of these activities, although not specifically selling and buying, are considered supporting activities in Porter’s value chain. For example, a human resources department supports the personnel involved in producing and distributing a company’s products. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the major categories of e-commerce. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.2 TOPICS: E-commerce types and models KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 114. Describe the information sharing and ordering activities involved in conducting business-to-consumer (B2C) ecommerce. Copyright Cengage Learning. Powered by Cognero.

Page 53


Module 08: eCommerce ANSWER:

Answers will vary. A B2C e-commerce company can use a variety of methods to share information with its customers. Web sites, online catalogs, e-mail, online advertisements, video conferencing, message boards, and newsgroups are some of the methods that can be used. Customers can use electronic forms or e-mail to order products from a B2C site. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the five major activities of the business-to-consumer e-commerce cycle. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.3 TOPICS: Business-to-consumer e-commerce KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 115. What are the advantages of business-to-business (B2B) e-commerce? ANSWER: Answers will vary. B2B e-commerce lowers production costs and improves accuracy by eliminating many labor-intensive tasks, such as creating invoices and tracking payments manually. In addition, the information flow among business partners is improved by creating a direct online connection in the supply chain network, which reduces delivery time. In other words, raw materials are received faster, and information related to customers’ demands is transferred faster. Improved electronic communication between business partners improves overall communication, which results in better inventory management and control. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize the four major models of business-to-business e-commerce. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.4 TOPICS: Business-to-business e-commerce KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 116. What are the main objectives of trading partner agreements? ANSWER: Answers will vary. The main objectives of trading partner agreements are to automate negotiating processes and enforce contracts between participating businesses. Using this model, business partners can send and receive bids, contracts, and other information needed when offering and purchasing products and services. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize the four major models of business-to-business e-commerce. QUESTION TYPE: Essay Copyright Cengage Learning. Powered by Cognero.

Page 54


Module 08: eCommerce HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.4 TOPICS: E-commerce types and models KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 117. What can sellers do by participating in buyer-side marketplaces? ANSWER: Answers will vary. By participating in buyer-side marketplaces, sellers can do the following: a. Conduct sales transactions. b. Automate the order management process. c. Conduct post-sales analysis. d. Automate the fulfillment function. e. Improve understanding of buying behaviors. f. Provide an alternative sales channel. g. Reduce order placement and delivery time. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize the four major models of business-to-business e-commerce. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.4 TOPICS: Business-to-business e-commerce KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 118. Describe voice-based e-commerce. ANSWER: Answers will vary. Voice-based e-commerce relies on voice recognition and text-to-speech technologies that have improved dramatically in the past decade. One method of conducting voice-based e-commerce is using a digital wallet. In addition to storing financial information, digital wallet can store such information as the customer’s address and driver’s license number. Several voice portals are already available, including Nuance (nuance.com), Internet Speech (internetspeech.com), and Google Voice (www.google.com/googlevoice/about.html). See 8-5: Mobile and Voice-Based ECommerce POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe mobile-based and voice-based e-commerce. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.5 TOPICS: Voice-based e-commerce Copyright Cengage Learning. Powered by Cognero.

Page 55


Module 08: eCommerce KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 10/22/2019 1:31 PM 12/6/2019 3:23 PM

119. Describe micropayments. ANSWER: Answers will vary. Micropayments are transactions on the Web involving very small amounts of money. They began as a method for advertisers to pay for cost per view or cost per click, which is typically one-tenth of a cent. Such fractional amounts are difficult to handle with traditional currency methods, and electronic micropayments reduce the cost of handling them for financial institutions. Payment amounts are accumulated for customers until they are large enough to offset the transaction fee, and then the account deduction or charge is submitted to the bank. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain four supporting technologies for e-commerce. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.6 TOPICS: E-commerce implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 120. In the context of Web marketing, describe spot leasing. ANSWER: Answers will vary. Search engines and directories offer space that companies can purchase for advertising purposes. Spots have an advantage over banner ads because their placement is permanent; banner ad placement can change from visit to visit. However, spots can be more expensive than banner ads, especially on high-traffic sites, such as Yahoo!. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain four supporting technologies for e-commerce. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.6 TOPICS: E-commerce implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 121. Describe the term hit in the context of Web marketing. ANSWER: Answers will vary. Any element of a Web page (including text, graphics, and interactive items) that is clicked counts as a hit to a server. Hits are not the preferred unit of measurement for site traffic because the number of hits per page can vary widely, depending on the number of graphics, type of browser used, and page size. Copyright Cengage Learning. Powered by Cognero.

Page 56


Module 08: eCommerce POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain four supporting technologies for e-commerce. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.6 TOPICS: E-commerce implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 122. Describe at least two categories of social networks and online media that collectively constitute social commerce. ANSWER: Answers will vary. There are several categories of social networks and online media that collectively constitute social commerce: a. Social networking sites: Users of these sites recommend a product or service to a friend, or the site offers a direct link for shopping, such as the Shop tab in Facebook or the Buy button in Twitter. b. Group buying platforms: These Web sites offer a product or service at a huge discount if certain number of buyers agree to buy the product or service in a given time period, such as within a 24-hour period. Popular examples include Groupon and LivingSocial. c. Peer-to-peer e-commerce platforms: These Web sites are community-based marketplaces that enable individuals to communicate directly with each other and conduct e-commerce operations. Popular examples include Amazon Marketplace and Etsy. d. Recommendation Web sites: These Web sites aggregate customers’ opinions related to products or services that they have purchased and then recommend them to others with the same interest. Popular examples include TripAdvisor and Yelp. e. Participatory e-commerce: These Web sites allow users to participate in the production process and bring a product or service to the sites in a collaborative fashion. Popular examples include CutOnYour-Bias and Kickstarter. f. Social advice: These Web sites provide shopping advice and opinion through chat and forums. Popular examples include GoTryItOn and eBags. g. User-curated shopping: These Web sites provide a platform for users to create actual products and/or generate listings of products that others can choose from. Popular examples include Lyst and Polyvore. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain social commerce and the reasons for its popularity. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.7 TOPICS: Social commerce KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 12/6/2019 3:32 PM 123. Describe hypersocial organizations. Copyright Cengage Learning. Powered by Cognero.

Page 57


Module 08: eCommerce ANSWER:

Answers will vary. Hypersocial organizations are companies that leverage social media in order to turn the business into a social process, and as a result, be able to better connect with their customers and sell more products and services. Hypersocial organizations share information through many different avenues. The most popular is direct social media interaction, such as Facebook posts, Twitter pages, and Instagram. These organizations may also use blogs, videos on YouTube, and their own company Web sites. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain hyper-social organizations and their growing popularity. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.8 TOPICS: Social commerce KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 12/6/2019 3:34 PM 124. List the four pillars of hypersociality. ANSWER: Answers will vary. The four pillars of hypersociality describe a return to a natural human interaction for both businesses and consumers. They include (1) tribe versus market segment, (2) human-centric versus company-centric, (3) information channels versus network channels, and (4) social messiness versus process hierarchy. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain hyper-social organizations and their growing popularity. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.8 TOPICS: Social commerce KEYWORDS: Understand DATE CREATED: 12/6/2019 4:55 PM DATE MODIFIED: 12/6/2019 4:56 PM 125. Briefly explain why hypersocial organizations should embrace social messiness. ANSWER: Answers will vary. Hypersocial organizations should forget process and hierarchies and embrace social messiness. This new paradigm will be less rigid and less predefined but will allow people in an organization to interact as humans. People can make mistakes, but over time, they will correct themselves. This pillar realizes that the benefits of leveraging social media are much greater than its negatives. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain hyper-social organizations and their growing popularity. QUESTION TYPE: Essay HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 58


Module 08: eCommerce STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.8 TOPICS: Social commerce KEYWORDS: Understand DATE CREATED: 12/6/2019 4:57 PM DATE MODIFIED: 12/6/2019 4:58 PM 126. Explain how sponsors function within a social media information system. ANSWER: Answers will vary. Additional components of a SMIS include: Sponsors: Organizations and businesses that pay money to social media sites to advertise their products and services such as Walmart, Macy’s, and Intel. Organizations and businesses could also use social media sites free of charge to promote their products and services and connect with their customers by creating fan pages, publishing FAQs, blogs, podcasts, and so forth. Businesses also publish how-to videos and enable certain customers to help each other solve problems. Sponsors usually generate revenue through advertising. POINTS: 1 DIFFICULTY: Challenging REFERENCES: Explain social media information systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.9 TOPICS: social media information systems SMIS KEYWORDS: Understand DATE CREATED: 12/6/2019 5:47 PM DATE MODIFIED: 12/6/2019 5:51 PM 127. Briefly describe the application component of a social media information system. ANSWER: Answers will vary. Additional components of a SMIS include: Application (app) providers, which are social media sites such as Facebook, Twitter, LinkedIn, and Snapchat that create features and functions for the app and make them available for free to their users. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain social media information systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.9 TOPICS: SMIS social media information systems KEYWORDS: Understand DATE CREATED: 12/6/2019 5:52 PM DATE MODIFIED: 12/6/2019 5:54 PM Copyright Cengage Learning. Powered by Cognero.

Page 59


Module 08: eCommerce 128. Outline four things that an organization's social media policy should include and do. ANSWER: Answers will vary. Before designing a SMIS, an organization should clearly define its social media policy and the policy should be clearly explained to all impacted employees. Many companies’ social media policies are available online and they should be consulted before designing one in order to implement best practices. In its basic form an organization’s social media policy should include and do the following: Protect the company’s reputation; eliminate legal issues; protect the privacy of all impacted individuals; and raise brand awareness. POINTS: 1 DIFFICULTY: Challenging REFERENCES: Explain social media information systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.8.9 TOPICS: SMIS social media information systems KEYWORDS: Understand DATE CREATED: 12/6/2019 6:20 PM DATE MODIFIED: 12/6/2019 6:23 PM

Copyright Cengage Learning. Powered by Cognero.

Page 60


Module 09: Global Information Systems True / False 1. The Internet complicates communication and restricts opportunities for consumers. a. True b. False ANSWER: False RATIONALE: Correct The Internet simplifies communication, improves business relationships, and offers new opportunities to both consumers and businesses. As e-business matures and more companies conduct business online, consumers can engage in comparison shopping more easily, for example. See 9-1: Why Go Global? POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.1 TOPICS: Information technology industry and the economy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 2. As e-business matures and more companies conduct business online, consumers can engage in comparison shopping more easily. a. True b. False ANSWER: True RATIONALE: Correct The Internet can simplify communication, improves business relationships, and offers new opportunities to both consumers and businesses. As e-business matures and more companies conduct business online, consumers can engage in comparison shopping more easily. See 9-1: Why Go Global? POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.1 TOPICS: Information technology industry and the economy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 12/4/2019 4:44 PM 3. The increase in direct buyer-seller communication through e-business has eliminated the opportunities for Copyright Cengage Learning. Powered by Cognero.

Page 1


Module 09: Global Information Systems intermediaries. a. True b. False ANSWER: RATIONALE:

False Correct Even though direct buyer-seller communication has increased, there are still new opportunities for intermediaries. For example, some businesses can become intermediaries or brokers to track special markets, notify clients of bargains or changes in market conditions, locate hard-to-find items, and even conduct searches for special products on clients’ behalf. See 9-1: Why Go Global? POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.1 TOPICS: Information technology industry and the economy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 4. With a global information system (GIS) in place, a company can efficiently track production schedules. a. True b. False ANSWER: True RATIONALE: Correct Strategic planning is a core function of a GIS. By being able to efficiently share information among subsidiaries, international companies can track performance, production schedules, shipping alternatives, and accounting items. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 5. A global information system (GIS) can be defined along two dimensions: customization and communication. a. True b. False ANSWER: False Copyright Cengage Learning. Powered by Cognero.

Page 2


Module 09: Global Information Systems RATIONALE:

Correct A GIS can be defined along two dimensions: control and coordination. Control consists of using managerial power to ensure adherence to the organization’s goals. Coordination is the process of managing the interaction among activities in different, specialized parts of an organization. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 6. A global information system (GIS) remains unaffected irrespective of a company’s size and business needs. a. True b. False ANSWER: False RATIONALE: Correct Although a GIS can vary quite a bit depending on a company’s size and business needs, most GISs have two basic components: a global database and information sharing technologies. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 7. Currency conversion is a challenge in global database development. a. True b. False ANSWER: True RATIONALE: Correct Currency conversion is a challenge in database development, although some software is available for this task. For example, SAP (originally called Systems Applications and Products in Data Processing) offers valuable features and capabilities for global information systems. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy Copyright Cengage Learning. Powered by Cognero.

Page 3


Module 09: Global Information Systems REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 8. With asynchronous transmission, both parties on a network must be connected at the same time. a. True b. False ANSWER: False RATIONALE: Correct With asynchronous transmission, both parties do not have to be connected at the same time, as is true of e-mail. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 9. With the popularity of the Internet, the use of value-added networks has increased. a. True b. False ANSWER: False RATIONALE: Correct With the popularity of the Internet, value-added networks are not used as much anymore; today, businesses of all sizes typically use the Internet to conduct international business. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM Copyright Cengage Learning. Powered by Cognero.

Page 4


Module 09: Global Information Systems 10. Operational support provided by a global information system (GIS) involves broad and long-term goals. a. True b. False ANSWER: False RATIONALE: Correct Operational support provided by a GIS involves day-to-day activities. Strategic support involves broad and long-term goals. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 11. An organization’s structure usually determines the architecture of its global information system (GIS). a. True b. False ANSWER: True RATIONALE: Correct An organization’s structure usually determines the architecture of its GIS. Four types of organizations do business across national borders: multinational organizations, global organizations, international organizations, and transnational organizations. See 9-3: Organizational Structures and Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 12. In a multinational structure, financial management is decentralized. a. True b. False ANSWER: False RATIONALE: Correct In a multinational structure, production, sales, and marketing are decentralized and Copyright Cengage Learning. Powered by Cognero.

Page 5


Module 09: Global Information Systems financial management remains the parent company’s responsibility. See 9-3: Organizational Structures and Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 13. Local hardware and software vendors influence which applications a multinational company chooses. a. True b. False ANSWER: True RATIONALE: Correct Local hardware and software vendors influence which applications a multinational company chooses. Inevitably, each subsidiary operates on a different platform, and uniform connections are economically impractical. See 9-3: Organizational Structures and Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the types of organizational structures used with global information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 14. In an organization with a global structure, to achieve organizational efficiency, duplicate information systems must be eliminated. a. True b. False ANSWER: False RATIONALE: Correct In an organization with a global structure, to achieve organizational efficiency, duplicate information systems have to be developed. Products are usually created, financed, and produced in the headquarters’ country, and subsidiaries have the responsibility of selling, marketing, and tailoring the products to their countries’ requirements and tastes. See 9-3: Organizational Structures and Global Information Systems Copyright Cengage Learning. Powered by Cognero.

Page 6


Module 09: Global Information Systems POINTS: DIFFICULTY: REFERENCES:

1 Easy Explain the four types of organizational structures used with global information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 15. In an organization with a global structure, the headquarters has the responsibility of selling, marketing, and tailoring products to the requirements and tastes of the countries of its subsidiaries. a. True b. False ANSWER: False RATIONALE: Correct In an organization with a global structure, products are usually created, financed, and produced in the headquarters’ country, and subsidiaries have the responsibility of selling, marketing, and tailoring the products to their countries’ requirements and tastes. See 9-3: Organizational Structures and Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 16. In an organization with an international structure, information systems personnel are regularly exchanged among locations to encourage joint development of applications for marketing, finance, and production. a. True b. False ANSWER: True RATIONALE: Correct In an organization with an international structure, information systems personnel are regularly exchanged among locations to encourage joint development of applications for marketing, finance, and production. This exchange encourages a cooperative culture in geographically dispersed personnel, and using a global information system to support an international structure is more feasible because of this cooperative nature. See 9-3: Organizational Structures and Global Information Systems Copyright Cengage Learning. Powered by Cognero.

Page 7


Module 09: Global Information Systems POINTS: DIFFICULTY: REFERENCES:

1 Easy Explain the four types of organizational structures used with global information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 17. Companies with a transnational structure have decreased efficiency in production costs because production is spread across more locations. a. True b. False ANSWER: False RATIONALE: Correct Companies with a transnational structure have increased efficiency in production costs because production can be spread across more locations. See 9-3: Organizational Structures and Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 18. Lack of standardization can impede the development of a cohesive global information system (GIS) that is capable of sharing information resources across borders. a. True b. False ANSWER: True RATIONALE: Correct Lack of standardization can impede the development of a cohesive GIS that is capable of sharing information resources across borders. Electronic data interchange, e-mail, and telecommunication standards vary throughout the world, and trying to work with all the various standards is impractical. See 9-4: Obstacles to Using Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine five obstacles to using global information systems. Copyright Cengage Learning. Powered by Cognero.

Page 8


Module 09: Global Information Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 19. Time zones pose difficulties in managing a global information system (GIS). a. True b. False ANSWER: True RATIONALE: Correct Time zones can pose difficulties in managing a GIS. For example, information-systems personnel who are managing a centralized GIS under international standards and sharing information resources across time zones might have difficulties finding the right time to take the system offline for backup and maintenance. See 9-4: Obstacles to Using Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine five obstacles to using global information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 20. According to the Miniwatts Marketing group, the highest growth in Internet use from 2000 to 2019 occurred in North America. a. True b. False ANSWER: False RATIONALE: Correct According to the Miniwatts Marketing Group, which tracked the worldwide growth of the Internet from 2000 to 2019, the highest growth has occurred in Africa, the lowest in North America. See 9-1: Why Go Global? POINTS: DIFFICULTY: REFERENCES:

1 Easy Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.1 Copyright Cengage Learning. Powered by Cognero.

Page 9


Module 09: Global Information Systems TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Information technology industry and the economy Understand 12/5/2019 11:25 AM 12/5/2019 11:31 AM

21. According to the Miniwatts Marketing group, there were approximately 2 billion worldwide Internet users as of March 2019. a. True b. False ANSWER: False RATIONALE: Correct According to the Miniwatts Marketing Group, which tracked the worldwide growth of the Internet from 2000 to 2019, the highest growth has occurred in Africa, the lowest in North America. As of March 2019, there were approximately 4.34 billion worldwide Internet users. See 9-1: Why Go Global? POINTS: DIFFICULTY: REFERENCES:

1 Easy Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.1 TOPICS: Information technology industry and the economy KEYWORDS: Understand DATE CREATED: 12/5/2019 11:29 AM DATE MODIFIED: 12/5/2019 11:31 AM 22. The number of non-English speakers on the Internet is on the rise. a. True b. False ANSWER: True RATIONALE: Correct The number of non-English speakers on the Internet is on the rise. As of September 2018, the top 10 languages on the Internet were English, Chinese, Spanish, Arabic, Portuguese, Indonesian/Malaysian, Japanese, Russian, French, and German. See 9-1: Why Go Global? POINTS: DIFFICULTY: REFERENCES:

1 Easy Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.1 TOPICS: Information technology industry and the economy Copyright Cengage Learning. Powered by Cognero.

Page 10


Module 09: Global Information Systems KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 12/5/2019 11:31 AM 12/5/2019 11:33 AM

23. Mobile networks offer an alternative for developing nations without an established communication network in place. a. True b. False ANSWER: True RATIONALE: Correct Mobile computing and mobile apps play a major role in further globalization and in bringing more people online. Because many developing nations do not have an established communication network in place, mobile networks are an attractive alternative for many of these countries. See 9-1: Why Go Global? POINTS: DIFFICULTY: REFERENCES:

1 Easy Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.1 TOPICS: Information technology industry and the economy KEYWORDS: Understand DATE CREATED: 12/5/2019 11:33 AM DATE MODIFIED: 12/5/2019 11:36 AM 24. Diverse regulatory practices simplify the process of managing a global information system (GIS). a. True b. False ANSWER: False RATIONALE: Correct Diverse regulatory practices also impede the integration process. This obstacle does not necessarily apply to trans- border data flow (TDF) regulations; it applies to policies on business practices and technological use. See 9-4: Obstacles to Using Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine five obstacles to using global information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles KEYWORDS: Apply DATE CREATED: 12/5/2019 4:01 PM DATE MODIFIED: 12/5/2019 4:05 PM Copyright Cengage Learning. Powered by Cognero.

Page 11


Module 09: Global Information Systems 25. Cultural differences in values, attitudes, and behaviors play a minor role in using global information systems (GISs). a. True b. False ANSWER: False RATIONALE: Correct Cultural differences in values, attitudes, and behaviors play an important role in using GISs. See 9-4: Obstacles to Using Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine five obstacles to using global information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles KEYWORDS: Apply DATE CREATED: 12/5/2019 4:05 PM DATE MODIFIED: 12/5/2019 4:07 PM 26. Blocking social media is one way in which a country's regulatory practices can hinder the success of a global information system. a. True b. False ANSWER: True RATIONALE: Correct Diverse regulatory practices also impede the integration process. In addition to China, there are several other countries that have blocked social media, including Pakistan, North Korea, Cuba, Iran, Bangladesh, Vietnam, Mauritius, Egypt, and Syria. See 9-4: Obstacles to Using Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine five obstacles to using global information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles KEYWORDS: Apply DATE CREATED: 12/5/2019 4:07 PM DATE MODIFIED: 12/5/2019 4:10 PM 27. Open-source systems have eliminated all difficulties related the the lack of standardization across borders. a. True b. False ANSWER: False RATIONALE: Correct Electronic data interchange, e-mail, and telecommunication standards vary throughout the Copyright Cengage Learning. Powered by Cognero.

Page 12


Module 09: Global Information Systems world and trying to work with all the various standards is impractical. And although opensource systems are increasing in popularity and the technology to link diverse systems is available, few organizations can meet the costs of integrating different platforms. See 9-4: Obstacles to Using Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine five obstacles to using global information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles KEYWORDS: Apply DATE CREATED: 12/5/2019 4:11 PM DATE MODIFIED: 12/5/2019 4:15 PM 28. Lack of cultural differences throughout an organization can impede the development of a cohesive GIS. a. True b. False ANSWER: False RATIONALE: Correct Lack of standardization can impede the development of a cohesive GIS that is capable of sharing information resources across borders. See 9-4: Obstacles to Using Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine five obstacles to using global information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles KEYWORDS: Apply DATE CREATED: 12/5/2019 4:16 PM DATE MODIFIED: 12/5/2019 4:41 PM 29. Training and certification programs offered through the Internet are one possible solution to the lack of skilled analysts and programmers. a. True b. False ANSWER: True RATIONALE: Correct Having skilled analysts and consultants with the knowledge to implement a GIS is critical. Training and certification programs, many of which are offered through the Internet, are one possible solution for narrowing this skills gap in developing nations. See 9-4: Obstacles to Using Global Information Systems POINTS: 1 DIFFICULTY: Easy Copyright Cengage Learning. Powered by Cognero.

Page 13


Module 09: Global Information Systems REFERENCES: Examine five obstacles to using global information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles KEYWORDS: Apply DATE CREATED: 12/5/2019 4:20 PM DATE MODIFIED: 12/5/2019 4:25 PM 30. In some cultures, using technology is considered a boring, low-level task, while in others it is seen as a sign of social importance. a. True b. False ANSWER: True RATIONALE: Correct Cultural differences in values, attitudes, and behaviors play an important role in using GISs. For example, in some cultures, using technology is considered a boring, low-level task; in others, being technologically knowledgeable is seen as a sign of social importance. See 9-4: Obstacles to Using Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine five obstacles to using global information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles KEYWORDS: Apply DATE CREATED: 12/5/2019 4:26 PM DATE MODIFIED: 12/5/2019 4:28 PM 31. Cultural issues affecting a global information system, such as acceptable content, can be safely ignored. a. True b. False ANSWER: True RATIONALE: Correct Cultural differences in values, attitudes, and behaviors play an important role in using GISs. Organizations might also need to look at changing content or images on their Web sites. Cultural issues are best addressed with education and training. See 9-4: Obstacles to Using Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine five obstacles to using global information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.4 Copyright Cengage Learning. Powered by Cognero.

Page 14


Module 09: Global Information Systems TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Global information system obstacles Apply 12/5/2019 4:31 PM 12/5/2019 4:38 PM

Multiple Choice 32. The expansion of global markets is a major factor in developing global information systems to handle _____ demands of integrated worldwide services. a. customers’ b. sellers’ c. suppliers’ d. dealers’ ANSWER: a RATIONALE: Correct. The global economy is creating customers who demand integrated worldwide services, and the expansion of global markets is a major factor in developing global information systems to handle these integrated services. See 9-1: Why Go Global? POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.1 TOPICS: Information technology industry and the economy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 33. _____ are considered the first large-scale interactive global system. a. Credit card services b. Hotel reservation systems c. Airline reservation systems d. Car rental services ANSWER: c RATIONALE: Correct. Airline reservation systems are considered the first large-scale interactive global system; hotels, rental car companies, and credit card services also now require worldwide databases to serve their customers more efficiently and effectively. See 9-1: Why Go Global? POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.1 Copyright Cengage Learning. Powered by Cognero.

Page 15


Module 09: Global Information Systems TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Information technology industry and the economy Understand 10/22/2019 1:31 PM 10/22/2019 1:31 PM

34. A manufacturer moving operations to another country because of the advantages available in that country is involved in _____ the operations. a. generalizing b. standardizing c. regionalizing d. centralizing ANSWER: c RATIONALE: Correct. A manufacturer might “regionalize” operations-that is, move them to another country-because of advantages available in certain regions. For example, raw materials might be less expensive in Indonesia than in Singapore, and specialized skills needed for production might be available in India but not in Brazil. See 9-1: Why Go Global? POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.1 TOPICS: Information technology industry and the economy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 35. Aton Motors, an automobile manufacturer, establishes its manufacturing units in Argentina because of the low cost of the metal used to make automobile frames. In this scenario, Aton Motors has _____ its operations. a. regionalized b. standardized c. generalized d. centralized ANSWER: a RATIONALE: Correct. In this scenario, Aton Motors has regionalized its operations. A manufacturer might “regionalize” operations-that is, move them to another country-because of advantages available in certain regions. See 9-1: Why Go Global? POINTS: 1 DIFFICULTY: Challenging REFERENCES: Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.1 Copyright Cengage Learning. Powered by Cognero.

Page 16


Module 09: Global Information Systems TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Information technology industry and the economy Understand 10/22/2019 1:31 PM 10/22/2019 1:31 PM

36. By generating and delivering timely and relevant information supported by networks, _____ creates new opportunities for conducting commercial activities. a. cybersquatting b. e-business c. phishing d. transborder data flow ANSWER: b RATIONALE: Correct. By generating and delivering timely and relevant information supported by networks, e-business creates new opportunities for conducting commercial activities. For example, by using online information for commercial activities, e-business makes it easier for different groups to cooperate. See 9-1: Why Go Global? POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.1 TOPICS: Information technology industry and the economy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 37. Some companies create separate Web sites for each country in which they do business. This is called _____ of a Web site. a. standardization b. localization c. centralization d. generalization ANSWER: b RATIONALE: Correct. Some companies create separate Web sites for each country in which they do business. This is called “localization of a Web site.” When this is the case, the company’s main Web site needs to make a clear and specific reference to these additional Web sites, preferably through drop-down menus. See 9-1: Why Go Global? POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.1 Copyright Cengage Learning. Powered by Cognero.

Page 17


Module 09: Global Information Systems TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Information technology industry and the economy Understand 10/22/2019 1:31 PM 10/22/2019 1:31 PM

38. Symbic Foods, a chain of fast food restaurants, has included a drop-down menu on its main Web site. With this dropdown menu, people can view their country-specific Web site, which contains information about the dishes that Symbic Foods serves in that country. In this case, what is the strategy adopted by Symbic Foods called? a. localization b. standardization c. centralization d. generalization ANSWER: a RATIONALE: Correct. In this case, the strategy adopted by Symbic Foods is called localization of a Web site. Some companies create separate Web sites for each country in which they do business. This is called “localization of a Web site.” When this is the case, the company’s main Web site needs to make a clear and specific reference to these additional Web sites, preferably through drop-down menus. See 9-1: Why Go Global? POINTS: 1 DIFFICULTY: Challenging REFERENCES: Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.1 TOPICS: Information technology industry and the economy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 39. Which statement is true of a global information system (GIS)? a. It incorporates technologies that are specific to a particular country. b. It facilitates communication between headquarters and subsidiaries in other countries. c. It differs from a typical information system as it excludes operations management. d. It enables a company’s subsidiaries to function with complete autonomy. ANSWER: b RATIONALE: Correct. A GIS is an information system that works across national borders, facilitates communication between headquarters and subsidiaries in other countries, and incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data across cultural and geographic boundaries. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 18


Module 09: Global Information Systems LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 40. With a global information system (GIS) in place, an international company _____. a. can classify consolidated global reporting as a strategic requirement b. does not need a global database for its operations c. need not incorporate strategic planning as a core function d. can increase its control over its subsidiaries ANSWER: d RATIONALE: Correct. With a GIS in place, an international company can increase its control over its subsidiaries and better coordinate their activities, thereby gaining access to new global markets. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 41. Which is considered a core function of a global information system (GIS)? a. Tactical planning b. Strategic planning c. Operational planning d. Contingency planning ANSWER: b RATIONALE: Correct. Strategic planning is a core function of a GIS. By being able to efficiently share information among subsidiaries, international companies can track performance, production schedules, shipping alternatives, and accounting items. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM Copyright Cengage Learning. Powered by Cognero.

Page 19


Module 09: Global Information Systems DATE MODIFIED:

10/22/2019 1:31 PM

42. In the context of a global information system (GIS), _____ refers to the use of managerial power to ensure adherence to the organization’s goals. a. standardization b. transparency c. control d. coordination ANSWER: c RATIONALE: Correct. A GIS can be defined along two dimensions: control and coordination. Control consists of using managerial power to ensure adherence to the organization’s goals. See 92: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 43. In the context of a global information system (GIS), _____ is the process of managing the interaction among activities in different, specialized parts of an organization. a. coordination b. socialization c. regionalization d. globalization ANSWER: a RATIONALE: Correct. A GIS can be defined along two dimensions: control and coordination. Coordination is the process of managing the interaction among activities in different, specialized parts of an organization. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 44. The control dimension of a global information system requires a(n) _____ architecture for data. Copyright Cengage Learning. Powered by Cognero.

Page 20


Module 09: Global Information Systems a. formal b. informal c. decentralized d. centralized ANSWER: RATIONALE:

d Correct. Control requires a centralized architecture for data, standardized definitions used across an organization, standard formats for reports, defined behaviors for different processes (such as how to respond when a customer has a complaint), and performancetracking systems. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 45. Control in a global information system requires _____. a. the use of variable definitions across an organization b. decentralized architectures for data c. flexible formats for reports d. the use of defined behaviors for different processes ANSWER: d RATIONALE: Correct. Control requires a centralized architecture for data, standardized definitions used across an organization, standard formats for reports, defined behaviors for different processes (such as how to respond when a customer has a complaint), and performancetracking systems. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 46. Coordination in a global information system requires a(n) _____ architecture for data, standardization within departments. a. passive b. autocratic Copyright Cengage Learning. Powered by Cognero.

Page 21


Module 09: Global Information Systems c. decentralized d. centralized ANSWER: RATIONALE:

c Correct. Coordination requires a decentralized architecture for data, standardization within departments, the ability to communicate these standards to other departments, collaboration systems, and technologies that support informal communication and socialization. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 47. The coordination dimension of a global information system (GIS) requires _____. a. technologies that exclude informal communication b. a centralized architecture for data c. standardization within departments d. segregated systems ANSWER: c RATIONALE: Correct. Coordination requires a decentralized architecture for data, standardization within departments, the ability to communicate these standards to other departments, collaboration systems, and technologies that support informal communication and socialization. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 48. In the context of a GIS, which is true of high coordination? a. It enables a company’s subsidiaries to function with complete autonomy. b. It increases efficiency at the expense of the effectiveness in meeting customers’ needs. c. It increases operational costs by a large margin. d. It gives flexibility in responding to competitors in different markets. ANSWER: d Copyright Cengage Learning. Powered by Cognero.

Page 22


Module 09: Global Information Systems RATIONALE:

Correct. High coordination in a GIS gives flexibility in responding to competitors in different countries and markets. It also increases efficiency and effectiveness in meeting customers’ needs. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 49. In a global information system (GIS), high coordination: a. increases overhead and operational costs. b. increases efficiency at the expense of the effectiveness in meeting customers’ requirements. c. helps maintain control of market needs around the world. d. helps provide a standard response to competitors in different countries and markets. ANSWER: c RATIONALE: Correct. High coordination in a GIS helps maintain control of market needs around the world. It also increases efficiency and effectiveness in meeting customers’ needs. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 50. Designing and implementing a global database is a technical challenge, mainly because of the _____. a. variations in the business needs of an organization b. different character sets used for the names of people and places c. complications involved in providing complete autonomy to a company’s subsidiaries d. need to transfer data across cultural and geographic boundaries ANSWER: b RATIONALE: Correct. Designing and implementing a global database is a technical challenge, mainly because of the different character sets required for the names of people and places and the different formats required for phone numbers and postal codes. See 9-2: Global Information Systems: An Overview POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 23


Module 09: Global Information Systems DIFFICULTY: Moderate REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 51. In the context of a global information system (GIS), _____ networks offer electronic data interchange standards, encryption, secure e-mail, data synchronization, and other services to conduct international business. a. crawler-based b. value-added c. human-powered d. brick-and-mortar ANSWER: b RATIONALE: Correct. Value-added networks are private multipoint networks managed by a third party and used by organizations on a subscription basis. They offer electronic data interchange standards, encryption, secure e-mail, data synchronization, and other services. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 52. Which factor should be considered when determining the best communication media to meet global performance and traffic needs? a. Range b. Robustness c. Bit rate d. Throughput ANSWER: a RATIONALE: Correct. An information system manager must determine the best communication media to meet global performance and traffic needs, such as fiber optics, satellite, microwave, or conventional phone lines. Factors to consider include bandwidth, range, noise, and cost. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy Copyright Cengage Learning. Powered by Cognero.

Page 24


Module 09: Global Information Systems REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 53. In the context of determining the best communication media to meet global performance, the _____ factor involves how immune a communication medium is to outside electronic interference. a. bandwidth b. range c. cost d. noise ANSWER: d RATIONALE: Correct. The noise factor involves how immune a communication medium is to outside electronic interference. As always, component, installation, and leasing costs must be balanced with other factors. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 54. With _____ transmission, both parties in a global network are connected at the same time, as in a phone call. a. synchronous b. asynchronous c. symmetric d. asymmetric ANSWER: a RATIONALE: Correct. Current transmission technologies are synchronous, asynchronous, multiplexing, digital (baseband), and analog (broadband). With synchronous transmission, both parties are connected at the same time, as in a phone call. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 25


Module 09: Global Information Systems LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 55. If a company uses multimedia applications in addition to normal file and database sharing, which transmission is more efficient? a. dual-duplex b. half-duplex c. multi-duplex d. full-duplex ANSWER: d RATIONALE: Correct. If a company uses multimedia applications (such as video conferencing and electronic meeting systems) in addition to normal file and database sharing, full-duplex transmission is more efficient. Furthermore, a private network or a dedicated leased line provides stability in transmission protocols when there are inadequate telecommunication infrastructures, as there often are in developing countries. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 56. After a global network is in place, a company must _____. a. decide which types of information-sharing technology it will be using b. consider its objectives to determine the network architecture c. determine the best communication media to meet global performance d. use standardized software and hardware across all countries ANSWER: a RATIONALE: Correct. After a global network is in place, an international company must decide which types of information-sharing technology it will be using, such as electronic meeting systems or video conferencing, group support systems, File Transfer Protocol, data synchronization, and application sharing. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 26


Module 09: Global Information Systems LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 57. While deciding the type of information-sharing technology that a company will be using for its global network, the company’s information system manager should keep in mind that: a. the company’s objectives do not affect the network architecture. b. standardized software and hardware are not always feasible. c. with asynchronous transmission, parties have to be connected at the same time. d. half-duplex transmission is ideal when response time is a critical factor. ANSWER: b RATIONALE: Correct. While deciding the type of information-sharing technology that a company will be using for its global network, information system managers should keep in mind that standardized software and hardware are the ideal but not always feasible. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 58. Transborder data flow (TDF) comprises national laws and international agreements on _____. a. ethical standards b. software licenses c. intellectual properties d. privacy protection ANSWER: d RATIONALE: Correct. TDF is subject to restrictions on how data can be captured and transmitted. It comprises national laws and international agreements on privacy protection and data security. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 27


Module 09: Global Information Systems DATE CREATED: DATE MODIFIED:

10/22/2019 1:31 PM 10/22/2019 1:31 PM

59. Which of the following statements is true of multinational corporations (MNCs)? a. MNCs are government organizations. b. MNCs have assets and operations only in their home country. c. MNCs deliver products and services across national borders. d. MNCs are essentially decentralized. ANSWER: c RATIONALE: Correct. MNCs are organizations with assets and operations in at least one country other than their home country. They deliver products and services across national borders and are usually centrally managed from their headquarters. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 60. In the context of multinational corporations (MNCs), which is one of the four factors in a global environment? a. Ergonomic b. Technological c. Cultural d. Ethical ANSWER: c RATIONALE: Correct. MNCs deliver products and services across national borders and are usually centrally managed from their headquarters. A global environment includes four kinds of factors: legal (intellectual property laws, patent and trademark laws, transborder data flow regulations, and so forth), cultural (languages, ethical issues, and religious beliefs), economic (currency, tax structure, interest rates, monetary and fiscal policies), and political (government type and stability, policies toward MNCs, and so on). See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 28


Module 09: Global Information Systems DATE CREATED: DATE MODIFIED:

10/22/2019 1:31 PM 10/22/2019 1:31 PM

61. _____ of a global information system (GIS) involves broad and long-term goals. a. Tactical support b. Dynamic support c. Operational support d. Strategic support ANSWER: d RATIONALE: Correct. A GIS can be classified according to the different kinds of managerial support it provides: operational, tactical, and/or strategic. Strategic support involves broad and longterm goals. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 62. _____ of a global information system (GIS) concentrates on medium-range activities that move an organization toward achieving long-term goals. a. Differential support b. Strategic support c. Operational support d. Tactical support ANSWER: d RATIONALE: Correct. A GIS can be classified according to the different kinds of managerial support it provides: operational, tactical, and/or strategic. Tactical support concentrates on mediumrange activities that move an organization toward achieving long-term goals. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM Copyright Cengage Learning. Powered by Cognero.

Page 29


Module 09: Global Information Systems 63. In the context of a global information system (GIS), which kind of managerial support involves day-to-day activities? a. Strategic b. Operational c. Tactical d. Dynamic ANSWER: a RATIONALE: Correct. A GIS can be classified according to the different kinds of managerial support it provides: operational, tactical, and/or strategic. Operational support involves day-to-day activities. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 64. _____ is an operational requirement for a global information system (GIS). a. Management of global tax risks b. Global data access c. Management of political conflicts d. Strategic planning support ANSWER: b RATIONALE: Correct. Global data access is an operational requirement for a GIS. Online access to information from locations around the world allows management to monitor global operations from the company headquarters. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 65. In the context of a global information system, consolidated global reporting is a crucial tool for managing overseas subsidiaries because it: a. compares only standardized reports. b. excludes the differences in regulatory standards. Copyright Cengage Learning. Powered by Cognero.

Page 30


Module 09: Global Information Systems c. forms the basis of all the strategic requirements of a global information system. d. reduces the difficulties caused by the differences in accounting procedures. ANSWER: d RATIONALE: Correct. Consolidated global reporting is a crucial tool for managing overseas subsidiaries because it reduces the difficulties in comparing reports from different accounting procedures and regulatory standards. These reports should include accounting and financial data, manufacturing updates, inventory, and so forth, and they enable management to compare financial information in all the subsidiaries. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 66. In a(n) _____, production, sales, and marketing are decentralized and financial management remains the parent company’s responsibility. a. global structure b. universal structure c. transnational structure d. multinational structure ANSWER: d RATIONALE: Correct. In a multinational structure, production, sales, and marketing are decentralized and financial management remains the parent company’s responsibility. Tyco Corporation is an example of a company with a multinational structure. Tyco’s focus is local-responding to customers’ needs in a subsidiary’s location. So the company’s subsidiaries operate autonomously but regularly report to the parent company. See 9-3: Organizational Structures and Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 67. In a(n) _____ structure, a company’s subsidiaries operate autonomously but regularly report to the parent company. Copyright Cengage Learning. Powered by Cognero.

Page 31


Module 09: Global Information Systems a. multinational b. transnational c. international d. global ANSWER: RATIONALE:

a Correct. In a multinational structure, a company’s subsidiaries operate autonomously but regularly report to the parent company. Tyco Corporation is an example of a company with a multinational structure. Tyco’s focus is local-responding to customers’ needs in a subsidiary’s location. So the company’s subsidiaries operate autonomously but regularly report to the parent company. See 9-3: Organizational Structures and Global Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 68. One of the issues with a _____ structure is that subsidiaries rely on headquarters for all process and control decisions as well as system design and implementation. a. multinational b. global c. regional d. transnational ANSWER: b RATIONALE: Correct. In a global structure, subsidiaries have little autonomy and rely on headquarters for all process and control decisions as well as system design and implementation. Consequently, an extensive communication network is necessary to manage this type of organization, and a global information system fits well into this structure. See 9-3: Organizational Structures and Global Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM Copyright Cengage Learning. Powered by Cognero.

Page 32


Module 09: Global Information Systems 69. Which statement is true of a global organizational structure? a. It requires an extensive communication network. b. It uses highly decentralized information systems. c. It easily integrates production, marketing, and human resources. d. It provides complete autonomy to the subsidiaries of the parent organization. ANSWER: a RATIONALE: Correct. In a global structure, subsidiaries have little autonomy and rely on headquarters for all process and control decisions as well as system design and implementation. Consequently, an extensive communication network is necessary to manage this type of organization, and a global information system fits well into this structure. See 9-3: Organizational Structures and Global Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 70. The integration needed to manage production, marketing, and human resources is difficult to achieve with a global structure because of the _____. a. excessive autonomy given to subsidiaries b. presence of duplicate information systems c. use of highly decentralized information systems d. heavy reliance on headquarters ANSWER: d RATIONALE: Correct. The integration needed to manage production, marketing, and human resources is difficult to achieve with a global structure because of the heavy reliance on headquarters. To achieve organizational efficiency, duplicate information systems have to be developed. See 9-3: Organizational Structures and Global Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM Copyright Cengage Learning. Powered by Cognero.

Page 33


Module 09: Global Information Systems 71. An organization with a(n) _____ structure might have several regional divisions that share authority and responsibility, but in general, it does not have its headquarters in a particular country. a. global b. transnational c. multinational d. international ANSWER: b RATIONALE: Correct. An organization with a transnational structure might have several regional divisions that share authority and responsibility, but in general it does not have its headquarters in a particular country. In an organization with a transnational structure, the parent company and all the subsidiaries work together in designing policies, procedures, and logistics for delivering products and services to the right market. See 9-3: Organizational Structures and Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Remember DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 72. In the context of the types of organizations that do business across national borders, the architecture of the global information system (GIS) in a(n) _____ structure requires a higher level of standardization and uniformity for global efficiency, and yet it must maintain local responsiveness. a. multinational b. global c. transnational d. international ANSWER: c RATIONALE: Correct. In the context of the types of organizations that do business across national borders, the architecture of the GIS in a transnational structure requires a higher level of standardization and uniformity for global efficiency, and yet it must maintain local responsiveness. Universal data dictionaries and standard databases, for example, enhance the integration of GISs. See 9-3: Organizational Structures and Global Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.3 Copyright Cengage Learning. Powered by Cognero.

Page 34


Module 09: Global Information Systems TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Global information system organizational structures Understand 10/22/2019 1:31 PM 10/22/2019 1:31 PM

73. Foreign exchange systems that allow traders and brokers from around the world to interact are an example of information systems that support a(n) _____ structure. a. multinational b. global c. transnational d. international ANSWER: c RATIONALE: Correct. Foreign exchange systems that allow traders and brokers from around the world to interact are an example of information systems that support a transnational structure. An organization with a transnational structure might have several regional divisions that share authority and responsibility, but in general it does not have its headquarters in a particular country. See 9-3: Organizational Structures and Global Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 74. Initially, offshore outsourcing was used mostly in manufacturing to find _____. a. cheap labor b. help desk support c. quality tester d. manufacturing engineers ANSWER: a RATIONALE: Correct. Initially, offshore outsourcing was used mostly in manufacturing to find cheap labor, but now it is used for many information technology tasks, including medical diagnosis, tax preparation, programming, application development, Web site development, help desk/user support, and quality assurance/software testing. See 9-3: Organizational Structures and Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 35


Module 09: Global Information Systems LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 75. Which statement is true of offshore outsourcing? a. Improved telecommunication systems have increased its attractiveness. b. The increased cost of communication has reduced its popularity. c. The limited availability of the Internet has reduced its effectiveness. d. Reduced bandwidth has increased its efficiency to perform with low latency. ANSWER: a RATIONALE: Correct. The widespread availability of the Internet, improved telecommunication systems, the reduced cost of communication, and increased bandwidth have made offshore outsourcing more attractive for all types of organizations. See 9-3: Organizational Structures and Global Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 76. Which country was among the top Asia offshore locations for outsourcing in 2019? a. Japan b. Nepal c. India d. North Korea ANSWER: c RATIONALE: Correct. India was among the top offshore location for outsourcing in 2016. With offshore outsourcing, an organization chooses an outsourcing firm in another country that can provide needed services and products. See 9-3: Organizational Structures and Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.3 Copyright Cengage Learning. Powered by Cognero.

Page 36


Module 09: Global Information Systems TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Global information system organizational structures Understand 10/22/2019 1:31 PM 12/4/2019 7:01 PM

77. Diverse regulatory practices _____ the integration process of a global information system (GIS). a. impede b. facilitate c. empower d. speed up ANSWER: a RATIONALE: Correct. Diverse regulatory practices impede the integration process of a GIS. This obstacle does not necessarily apply to transborder data flow regulations; it applies to policies on business practices and technological use. See 9-4: Obstacles to Using Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine five obstacles to using global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 78. Before adding a global information system (GIS), international companies must take into consideration the _____ infrastructures of the countries where its subsidiaries are located. a. management b. social c. telecommunication d. power transmission ANSWER: c RATIONALE: Correct. Before adding a GIS, international companies must take into consideration the telecommunication infrastructures of the countries where subsidiaries are located. An organization might have the resources and skills to implement a worldwide integrated system but not be able to change an existing telecommunication infrastructure. See 9-4: Obstacles to Using Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine five obstacles to using global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles Copyright Cengage Learning. Powered by Cognero.

Page 37


Module 09: Global Information Systems KEYWORDS: DATE CREATED: DATE MODIFIED:

Apply 10/22/2019 1:31 PM 10/22/2019 1:31 PM

79. In the context of the requirement of skilled analysts for implementing a global information system (GIS), there is a severe shortage of qualified information systems ____. a. quality analysts in Japan b. consultants in Korea c. project managers in Germany d. professionals in the United States ANSWER: d RATIONALE: Correct. Having skilled analysts and consultants with the knowledge to implement a GIS is critical, particularly with the severe shortage of qualified information systems professionals in the United States and Western Europe. See 9-4: Obstacles to Using Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine five obstacles to using global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 80. _____ is a major factor in the widespread use of global information systems. a. E-business b. Cybersquatting c. Traditional commerce d. Social engineering ANSWER: a RATIONALE: E-business is a major factor in the widespread use of global information systems. Ebusiness includes transactions that support revenue generation as well as those that focus on buying and selling goods and services. See 9-1: Why Go Global? POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.1 TOPICS: Information technology industry and the economy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM Copyright Cengage Learning. Powered by Cognero.

Page 38


Module 09: Global Information Systems DATE MODIFIED:

10/22/2019 1:31 PM

81. _____ products, which are products or services that have been standardized for all markets, are becoming increasingly important in international marketing efforts. a. Global b. Domestic c. Local d. Regional ANSWER: a RATIONALE: Global products, which are products or services that have been standardized for all markets, are becoming increasingly important in international marketing efforts. See 9-1: Why Go Global? POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.1 TOPICS: Information technology industry and the economy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 82. A global _____ system is a system that incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data across cultural and geographic boundaries. a. broadcast b. analytics c. information d. economic ANSWER: c RATIONALE: A global information system is an information system that works across national borders, facilitates communication between headquarters and subsidiaries in other countries, and incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data across cultural and geographic boundaries. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM Copyright Cengage Learning. Powered by Cognero.

Page 39


Module 09: Global Information Systems DATE MODIFIED:

10/22/2019 1:31 PM

83. Which system is used for managing global operations, supporting an international company’s decision-making processes, and dealing with complex variables in global operations and decision making? a. public broadcast b. tactical analytics c. global information d. pseudo economic ANSWER: c RATIONALE: A global information system is an information system for managing global operations, supporting an international company’s decision-making processes, and dealing with complex variables in global operations and decision making. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 84. The trade-off between the amount of control needed and the amount of _____ needed, which are the two dimensions of a global information system (GIS), defines an organization’s globalization strategy. a. coordination b. standardization c. regulation d. direction ANSWER: a RATIONALE: The trade-off between the amount of control needed and the amount of coordination needed defines an organization’s globalization strategy. Coordination is the process of managing the interaction among activities in different, specialized parts of an organization. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM Copyright Cengage Learning. Powered by Cognero.

Page 40


Module 09: Global Information Systems 85. _____ networks are private multipoint networks managed by a third party and used by organizations on a subscription basis. a. Social b. Subscription c. Value-added d. Communication ANSWER: c RATIONALE: Value-added networks are private multipoint networks managed by a third party and used by organizations on a subscription basis. They offer electronic data interchange standards, encryption, secure e-mail, data synchronization, and other services. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 86. _____ data flow restricts what type of data can be captured and transmitted in foreign countries. a. Transborder b. Transcontinental c. International d. Tariff ANSWER: a RATIONALE: Transborder data flow (TDF) restricts what type of data can be captured and transmitted in foreign countries. TDF consists of national laws and international agreements on privacy protection and data security. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 87. A _____ is an organization with assets and operations in at least one country other than its home country. a. local company b. transnational company Copyright Cengage Learning. Powered by Cognero.

Page 41


Module 09: Global Information Systems c. universal corporation d. multinational corporation ANSWER: d RATIONALE: A multinational corporation (MNC) is an organization with assets and operations in at least one country other than its home country. An MNC delivers products and services across national borders and is usually centrally managed from its headquarters. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 88. _____ is an operational requirement of a global information system (GIS) that includes accounting and financial data, manufacturing updates, inventory, and so forth. a. Consolidated global reporting b. Communication between headquarters and subsidiaries c. Global data access d. Strategic planning support ANSWER: a RATIONALE: Consolidated global reporting is an operational requirement of a GIS that includes accounting and financial data, manufacturing updates, inventory, and so forth. It is a crucial tool for managing overseas subsidiaries because it reduces the difficulties in comparing reports from different accounting procedures and regulatory standards. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 89. _____ focuses on regionalizing resources more effectively and responding to rapid environmental changes, such as increased political and foreign exchange risks and global competition. a. Global data access b. Management of global tax risks Copyright Cengage Learning. Powered by Cognero.

Page 42


Module 09: Global Information Systems c. Strategic planning support d. Consolidated global reporting ANSWER: c RATIONALE: Strategic planning support is the core of any global information system. It focuses on regionalizing resources more effectively and responding to rapid environmental changes, such as increased political and foreign exchange risks and global competition. See 9-2: Global Information Systems: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 90. An organization with a(n) _____ structure, sometimes called a “franchiser,” uses highly centralized information systems. a. local b. global c. domestic d. insular ANSWER: b RATIONALE: An organization with a global structure, sometimes called a “franchiser,” uses highly centralized information systems. In a global structure, subsidiaries have little autonomy and rely on headquarters for all process and control decisions as well as system design and implementation. See 9-3: Organizational Structures and Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 91. An organization with a(n) _____ structure operates much like a multinational corporation, but subsidiaries depend on headquarters more for process and production decisions. a. international b. regional Copyright Cengage Learning. Powered by Cognero.

Page 43


Module 09: Global Information Systems c. public d. continental ANSWER: RATIONALE:

a An organization with an international structure operates much like a multinational corporation, but subsidiaries depend on headquarters more for process and production decisions. Information-systems personnel are regularly exchanged among locations to encourage joint development of applications for marketing, finance, and production. See 93: Organizational Structures and Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 92. In an organization with a(n) _____ structure, the parent company and all the subsidiaries work together in designing policies, procedures, and logistics for delivering products and services to the right market. a. global b. international c. transnational d. universal ANSWER: c RATIONALE: In an organization with a transnational structure, the parent company and all the subsidiaries work together in designing policies, procedures, and logistics for delivering products and services to the right market. This type of organization might have several regional divisions that share authority and responsibility, but in general it does not have its headquarters in a particular country. See 9-3: Organizational Structures and Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 93. With an _____ outsourcing approach, an organization chooses an outsourcing firm in another country that can provide Copyright Cengage Learning. Powered by Cognero.

Page 44


Module 09: Global Information Systems needed services and products. a. offshore b. online c. onshore d. offline ANSWER: a RATIONALE: With an offshore outsourcing approach, an organization chooses an outsourcing firm in another country that can provide needed services and products. Initially, offshore outsourcing was used mostly in manufacturing to find cheap labor, but now it is used for many information technology tasks. See 9-3: Organizational Structures and Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 94. One of the issues with a global information system is that too much _____ can decrease an organization’s flexibility in responding to local preferences-even time differences. a. localization b. regionalization c. standardization d. customization ANSWER: c RATIONALE: Too much standardization can be a problem, decreasing an organization’s flexibility in responding to local preferences-even time differences. For example, an organization should not insist that all its subsidiaries use the metric system. It should allow them to use the measuring systems they are familiar with, converting from one system to the other when necessary. See 9-4: Obstacles to Using Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine five obstacles to using global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM Copyright Cengage Learning. Powered by Cognero.

Page 45


Module 09: Global Information Systems 95. Identify an app that is bringing more people online in Jordan. a. SoukTel b. Excel c. Frogtek d. Facebook ANSWER: a RATIONALE: Correct. SoukTel: Based in the Middle East, it offers information about jobs and social services. Its job- matching feature uses text messages to communicate with job-seekers in Jordan, Rwanda, Tunisia, and other countries. See 9-1: Why Go Global? POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.1 TOPICS: Information technology industry and the economy KEYWORDS: Understand DATE CREATED: 12/5/2019 11:37 AM DATE MODIFIED: 12/5/2019 11:41 AM 96. Identify a social networking site based in Ghana. a. FrogTek b. M-Pesa c. Facebook d. Esoko ANSWER: c RATIONALE: Correct. Esoko: Based in Ghana, it is a type of social networking site for farmers. Using text messaging, it sends weather alerts, product price information, and ads. See 9-1: Why Go Global? POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.1 TOPICS: Information technology industry and the economy KEYWORDS: Understand DATE CREATED: 12/5/2019 11:44 AM DATE MODIFIED: 12/5/2019 11:46 AM 97. Mobile apps plan a major role in globalization by offering _____. a. basic social services and commerce b. infrastructure Copyright Cengage Learning. Powered by Cognero.

Page 46


Module 09: Global Information Systems c. web design d. free Internet service ANSWER: RATIONALE:

a Correct. Mobile apps play a major role in globalization by offering basic social services and commerce such as bank- ing, payment, and agricultural information for developing nations. See 9-1: Why Go Global? POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.1 TOPICS: Information technology industry and the economy KEYWORDS: Understand DATE CREATED: 12/5/2019 11:46 AM DATE MODIFIED: 12/5/2019 11:49 AM 98. As of 2015, approximately _____ percent of Internet content was in English. a. 15 b. 35 c. 55 d. 75 ANSWER: c RATIONALE: Correct. As of 2015, about 55 percent of the Internet con- tent was in English, but this number will likely change as other languages gain in popularity. See 9-1: Why Go Global? POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.1 TOPICS: Information technology industry and the economy KEYWORDS: Understand DATE CREATED: 12/5/2019 11:49 AM DATE MODIFIED: 12/5/2019 11:51 AM 99. In India, nearly _____ of Internet users use their own local language online. a. 98 b. 92 c. 58 Copyright Cengage Learning. Powered by Cognero.

Page 47


Module 09: Global Information Systems d. 47 ANSWER: RATIONALE:

d Correct. India, the second most populated country in the world with a nearly 1.36 billion population, had about 627 million Internet users in 2019. Nearly 47 percent of these use their own local language online—mostly Hindi. See 9-1: Why Go Global? POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.1 TOPICS: Information technology industry and the economy KEYWORDS: Understand DATE CREATED: 12/5/2019 11:51 AM DATE MODIFIED: 12/5/2019 11:55 AM 100. The nature of intellectual property laws and how they are enforced is one aspect of a country's _____. a. cultural differences b. regulatory practices c. telecommunications infrastructure d. standardization ANSWER: b RATIONALE: Correct. Diverse regulatory practices also impede the integration process. This obstacle does not necessarily apply to trans- border data flow (TDF) regulations; it applies to policies on business practices and technological use. The nature of intellectual property laws and how they are enforced in different countries also varies. See 9-4: Obstacles to Using Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine five obstacles to using global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles KEYWORDS: Apply DATE CREATED: 12/5/2019 4:45 PM DATE MODIFIED: 12/5/2019 4:48 PM 101. Trying to work with all the various electronic data interchange, e-mail, and telecommunication standards throughout the world is considered _____. a. useful b. mandatory c. impossible Copyright Cengage Learning. Powered by Cognero.

Page 48


Module 09: Global Information Systems d. impractical ANSWER: RATIONALE:

d Correct.

Lack of standardization can impede the development of a cohesive GIS that is capable of sharing information resources across borders. Electronic data interchange, e-mail, and telecommunication standards vary throughout the world and trying to work with all the various standards is impractical. See 9-4: Obstacles to Using Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine five obstacles to using global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles KEYWORDS: Apply DATE CREATED: 12/5/2019 4:48 PM DATE MODIFIED: 12/5/2019 4:51 PM 102. Most software applications are _____ in nature and cannot be integrated into a GIS infrastructure. a. universal b. local c. cross-cultural d. untranslatable ANSWER: b RATIONALE: Correct. Sharing software is difficult and impractical when these factors are considered. Only 5–15 percent of a company’s applications are truly global in nature. Most applications are local in nature and cannot be integrated into a GIS infrastructure. See 9-4: Obstacles to Using Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine five obstacles to using global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles KEYWORDS: Apply DATE CREATED: 12/5/2019 4:52 PM DATE MODIFIED: 12/5/2019 4:55 PM 103. Identify an example of an obstacle to the success of global information system. a. An organization might be unable to develop products that appeal to customers in all countries. b. An organization might adjust content on their Web site to address cultural differences in different countries. c. An organization might have the resources to implement a worldwide integrated system but not be able to change an existing telecommunication infrastructure. Copyright Cengage Learning. Powered by Cognero.

Page 49


Module 09: Global Information Systems d. An organization might use training and education to train analysts. ANSWER: c RATIONALE: Correct. An organization might have the resources and skills to implement a worldwide integrated system but not be able to change an existing telecommunication infrastructure. Furthermore, the differences in telecommunication systems make consolidating them difficult. See 9-4: Obstacles to Using Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine five obstacles to using global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles KEYWORDS: Apply DATE CREATED: 12/5/2019 4:55 PM DATE MODIFIED: 12/5/2019 5:06 PM 104. One instance of regulatory practices hindering the success of a global information system occurs when a country _____. a. offers fewer training courses for analysts and programmers b. insists that all organizations use the metric system c. charges more for Internet access d. restricts the type of hardware and software that can be imported or used ANSWER: d RATIONALE: Correct. Diverse regulatory practices also impede the integration process. This obstacle does not necessarily apply to trans-border data flow (TDF) regulations; it applies to policies on business practices and technological use. Many countries also restrict the type of hardware and software that can be imported or used, and the vendors that an organization normally deals with might not service certain countries. See 9-4: Obstacles to Using Global Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine five obstacles to using global information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles KEYWORDS: Apply DATE CREATED: 12/5/2019 5:07 PM DATE MODIFIED: 12/5/2019 5:15 PM Essay 105. Discuss the impact of globalization on purchasing and the supply chain. ANSWER: Answers will vary. The growing trend toward global customers and products means globalization has also become an important factor in purchasing and the supply chain. Copyright Cengage Learning. Powered by Cognero.

Page 50


Module 09: Global Information Systems Worldwide purchasing gives suppliers the incentive to consider foreign competition as well as domestic competition. Furthermore, large global organizations can reduce costs in purchasing, manufacturing, and distribution because they have access to cheaper labor and can sell products and services locally as well as internationally. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.9.1 TOPICS: Information technology industry and the economy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 106. How does e-business build on the advantages and structures of traditional business? ANSWER: Answers will vary. E-business builds on the advantages and structures of traditional business by adding the flexibility that networks offer. By generating and delivering timely and relevant information supported by networks, e-business creates new opportunities for conducting commercial activities. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss the reasons for globalization and for using global information systems, including e-business and Internet growth. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.9.1 TOPICS: Information technology industry and the economy KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 107. In the context of global information systems (GISs), describe the advantages of high coordination. ANSWER: Answers will vary. High coordination has the following advantages: a. Flexibility in responding to competitors in different countries and markets b. Ability to respond in one country to a change in another country c. Ability to maintain control of market needs around the world d. Ability to share and transfer knowledge between departments and international branches e. Increased efficiency and effectiveness in meeting customers’ needs f. Reduced operational costs POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe global information systems and their requirements and components. Copyright Cengage Learning. Powered by Cognero.

Page 51


Module 09: Global Information Systems QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 108. List the two basic components of a global information system (GIS). ANSWER: Answers will vary. Although a GIS can vary quite a bit depending on a company’s size and business needs, most GISs have two basic components: a. A global database b. Information-sharing technologies POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 109. How do small and large companies use a variety of technologies for an integrated global information system (GIS)? ANSWER: Answers will vary. International companies can use a variety of technologies for an integrated GIS. Small companies might outsource to take advantage of expertise that is not available inside the company. On the other hand, large companies with the resources and technical expertise might develop custom applications to be shared across borders. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 110. List the factors to be considered when determining the best communication media to meet global performance and traffic needs. Copyright Cengage Learning. Powered by Cognero.

Page 52


Module 09: Global Information Systems ANSWER:

Answers will vary. The factors that need to be considered when determining the best communication media to meet global performance and traffic needs are bandwidth, range, noise, and cost. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 111. Why must an information system manager choose the best transmission technology for the global network’s needs? What are the current transmission technologies? ANSWER: Answers will vary. Without reliable transmission, a network has no value. Current transmission technologies are synchronous, asynchronous, multiplexing, digital (baseband), and analog (broadband). POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 112. A global information system (GIS) is capable of supporting global decisions. What are the environmental factors that affect the complexity of such decisions? ANSWER: Answers will vary. A global environment includes four kinds of factors: legal (intellectual property laws, patent and trademark laws, transborder data flow (TDF) regulations, and so forth), cultural (languages, ethical issues, and religious beliefs), economic (currency, tax structure, interest rates, monetary and fiscal policies), and political (government type and stability, policies toward multinational corporations, and so on). POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.9.2 Copyright Cengage Learning. Powered by Cognero.

Page 53


Module 09: Global Information Systems TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Global information system components Understand 10/22/2019 1:31 PM 10/22/2019 1:31 PM

113. Explain the importance of managing short-term foreign exchange risks as a requirement for decision making using global information systems (GISs). ANSWER: Answers will vary. A mix of free-floating (no government intervention), managed-floating, and fixed-exchange rates characterizes today’s international monetary system. Currency rates can change daily, so management must minimize the impact of currency fluctuations in countries where the parent company and the subsidiaries are located. To manage foreign exchange risks, many companies have developed expert systems and decision support systems. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 114. Describe strategic planning support of a global information system (GIS). ANSWER: Answers will vary. Strategic planning support is the core of any GIS, a focus on regionalizing resources more effectively and responding to rapid environmental changes, such as increased political and foreign exchange risks and global competition. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 115. What are the requirements for designing tax-risk management systems? ANSWER: Answers will vary. Designing tax-risk management systems requires detailed knowledge of international finance, international monetary systems, and international tax law. POINTS: 1 DIFFICULTY: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 54


Module 09: Global Information Systems REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 116. Discuss the four issues that must be addressed before adding a global information system (GIS) to an existing organization. ANSWER: Answers will vary. Following issues must be addressed before adding a GIS to an existing organization: a. The organization must identify its business opportunities in the global marketplace. b. Decision makers must justify the organization’s investment in a GIS, given the substantial commitment of resources that will have to be made, usually years in advance. c. The organization’s personnel need to be screened for technical and business expertise, because implementing a GIS is more challenging than implementing a domestic information system. d. Migration to the GIS needs to be coordinated carefully to help personnel move from the old familiar system to the new one. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe global information systems and their requirements and components. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.9.2 TOPICS: Global information system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 117. List the four types of organizations that do business across national borders. ANSWER: Answers will vary. The four types of organizations that do business across national borders are the following: a. Multinational organizations b. Global organizations c. International organizations d. Transnational organizations POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: Essay HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 55


Module 09: Global Information Systems STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 118. Describe an organization with a transnational structure. ANSWER: Answers will vary. In an organization with a transnational structure, the parent company and all the subsidiaries work together in designing policies, procedures, and logistics for delivering products to the right market. This type of organization might have several regional divisions that share authority and responsibility, but in general it does not have its headquarters in a particular country. A transnational organization usually focuses on optimizing supply sources and using advantages available in subsidiary locations. Many companies do this when they look for manufacturing facilities in countries where labor is less expensive than it is in the parent country. For example, China, India, Vietnam, and other countries have cheaper labor costs than the United States does. Again, a global information system fits into this structure well by integrating global activities through cooperation and information sharing between headquarters and subsidiaries. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 119. Besides manufacturing, list other information technology tasks that use offshore outsourcing. ANSWER: Answers will vary. Other information technology tasks that use offshore outsourcing include the following: a. Medical diagnosis b. Tax preparation c. Programming d. Application development e. Web site development f. Help desk/user support g. Quality assurance/software testing POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: Essay HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 56


Module 09: Global Information Systems STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 120. How does a global information system (GIS) play an important role in supporting offshore outsourcing? ANSWER: Answers will vary. A GIS plays an important role in supporting offshore outsourcing by providing a global network that all participants can use for coordinating development activities, such as product design and global marketing campaigns. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the four types of organizational structures used with global information systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.9.3 TOPICS: Global information system organizational structures KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 121. List the five factors that can hinder the success of a global information system (GIS). ANSWER: Answers will vary. Following are the five factors that can hinder the success of a GIS: a. Lack of standardization (including differences in time zones, taxes, language, and work habits) b. Cultural differences c. Diverse regulatory practices d. Poor telecommunication infrastructures e. Lack of skilled analysts and programmers POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine five obstacles to using global information systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 122. How do diverse regulatory practices impede the integration process in a global information system (GIS)? ANSWER: Answers will vary. Diverse regulatory practices apply to policies on business practices and Copyright Cengage Learning. Powered by Cognero.

Page 57


Module 09: Global Information Systems technological use. Many countries restrict the type of hardware and software that can be imported or used, and the vendors that an organization normally deals with might not service certain countries. For example, in August 2010, the United Arab Emirates, citing security concerns, announced that BlackBerry phones would not be allowed to access email or the Web. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine five obstacles to using global information systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 123. Explain how the lack of skilled analysts and programmers can hinder the success of a global information system (GIS). ANSWER: Answers will vary. Having skilled analysts and consultants with the knowledge to implement a GIS is critical, particularly with the severe shortage of qualified information systems professionals in the United States and Western Europe. When forming integrated teams, companies must consider the nature of each culture and differences in skills in other countries. For example, experts from Singapore and Korea have been regarded as the best consultants in Asia because of their work ethic and their broad skill base. Germans are recognized for their project management skills, and Japanese are known for their quality process controls and total quality management. Ideally, an organization would link the skills of people from different countries to form a “dream team.” However, cultural and political differences can affect the cooperative environment needed for global integration. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine five obstacles to using global information systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 124. Discuss one possible solution for narrowing the skills gap in developing nations. ANSWER: Answers will vary. Training and certification programs, many of which are offered through the Internet, are one possible solution for narrowing the skills gap in developing nations. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine five obstacles to using global information systems. Copyright Cengage Learning. Powered by Cognero.

Page 58


Module 09: Global Information Systems QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.9.4 TOPICS: Global information system obstacles KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM

Copyright Cengage Learning. Powered by Cognero.

Page 59


Module 10: Building Successful Information Systems 1. Information system projects are often an extension of existing systems or involve replacing an old technology with a new one. a. True b. False ANSWER: True RATIONALE: Correct Information system projects are often an extension of existing systems or involve replacing an old technology with a new one. However, sometimes an information system needs to be designed from scratch, and the systems development life cycle model is particularly suitable in these situations. See 10-1: Systems Development Life Cycle: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Apply the systems development life cycle (SDLC) as a method for developing information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.1 TOPICS: System development phases KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 2. It is important to project an organization’s growth rate when designing information systems. a. True b. False ANSWER: True RATIONALE: Correct When designing information systems, projecting an organization’s growth rate is important; otherwise, the system could become inefficient shortly after it is designed. See 10-1: Systems Development Life Cycle: An Overview POINTS: 1 DIFFICULTY: Moderate REFERENCES: Apply the systems development life cycle (SDLC) as a method for developing information systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.1 TOPICS: System development phases KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 3. During the planning phase of the systems development life cycle (SDLC), a systems designer must define the symptoms before the underlying problem that an organization might be facing. a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 1


Module 10: Building Successful Information Systems ANSWER: RATIONALE:

False Correct During the planning phase, which is one of the most crucial phases of the SDLC model, a systems designer must define the problem an organization faces, taking care not to define symptoms rather than the underlying problem. The problem can be identified internally or externally. See 10-2: Phase 1: Planning POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the planning phase. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.1 TOPICS: System planning KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 4. Establishing evaluation criteria causes excessive subjectivity during the systems development life cycle (SDLC) process. a. True b. False ANSWER: False RATIONALE: Correct Establishing evaluation criteria ensures objectivity throughout the SDLC process. In addition, analysts must get feedback from users on the problem and the need for an information system. See 10-2: Phase 1: Planning POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the planning phase. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.1 TOPICS: System planning KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 11/22/2019 12:15 PM 5. Normally, a task force for the planning phase of the systems development life cycle (SDLC) includes only representatives from the IT department and the top management. a. True b. False ANSWER: False RATIONALE: Correct To ensure an information system’s success, users must have input in the planning, requirements-gathering and analysis, design, and implementation phases. For this reason, a task force is formed, consisting of representatives from different departments (including Copyright Cengage Learning. Powered by Cognero.

Page 2


Module 10: Building Successful Information Systems IT), systems analysts, technical advisors, and top management. See 10-2: Phase 1: Planning POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the planning phase. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.1 TOPICS: System planning KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 6. External users are normally part of a company’s task force. a. True b. False ANSWER: False RATIONALE: Correct External users are not employees but do use the system; they include customers, contractors, sup- pliers, and other business partners. Although external users are not normally part of the task force, their input is essential. See 10-2: Phase 1: Planning POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the planning phase. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.1 TOPICS: System development phases System planning KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 11/22/2019 12:29 PM 7. The creation of a system specifications document indicates the beginning of the analysis phase of the systems development life cycle (SDLC). a. True b. False ANSWER: False RATIONALE: Correct The team uses the information collected during the requirements-gathering phase to understand the main problems, define the project’s scope-including what it should and should not do-and create a document called the system specifications. The creation of a system specifications document indicates the end of the analysis phase and the start of the design phase of the SDLC. See 10-3: Phase 2: Requirements Gathering and Analysis POINTS: 1 DIFFICULTY: Easy Copyright Cengage Learning. Powered by Cognero.

Page 3


Module 10: Building Successful Information Systems REFERENCES: Explain the tasks involved in the requirements-gathering and analysis phase. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.3 TOPICS: Gathering and analyzing information System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 11/22/2019 12:47 PM 8. The object-oriented approach combines process and data analysis, and the line between analysis and design is so thin that analysis and design seem to be a single phase instead of two distinct phases. a. True b. False ANSWER: True RATIONALE: Correct The structured systems analysis and design (SSAD) approach treats process and data independently and is a sequential approach that requires completing the analysis before beginning the design. The object-oriented approach combines process and data analysis, and the line between analysis and design is so thin that analysis and design seem to be a single phase instead of two distinct phases. See 10-3: Phase 2: Requirements Gathering and Analysis POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the requirements-gathering and analysis phase. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.3 TOPICS: Gathering and analyzing information System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 9. Including users and top management in the construction phase of a prototype is essential because some problems that crop up during construction can be solved only by users or top management. a. True b. False ANSWER: True RATIONALE: Correct Including users and top management in the construction phase of a prototype is essential because some problems that crop up during construction can be solved only by users or top management. In addition, during this phase, users and top management can learn more about the problems the information system will solve, and the team of users and designers can learn a lot about decision making in the organization. See 10-4: Phase 3: Design POINTS: 1 DIFFICULTY: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 4


Module 10: Building Successful Information Systems REFERENCES: Explain the tasks involved in the design phase. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.4 TOPICS: System design System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 10. One of the advantages of prototyping is that modifying a prototype is easier than modifying a complete system. a. True b. False ANSWER: True RATIONALE: Correct It is easier to modify a prototype than a complete system. Prototyping has been around for many years in physical science because building a small working model first is easier and less expensive than building the entire system. See 10-4: Phase 3: Design POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the design phase. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.4 TOPICS: System design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 11. In pilot conversion, an analyst introduces an information system in only a limited area of an organization. a. True b. False ANSWER: True RATIONALE: Correct In pilot conversion, the analyst introduces the system in only a limited area of the organization, such as a division or department. If the system works correctly, it is implemented in the rest of the organization in stages or all at once. In phased-in-phased-out conversion, as each module of the new system is converted, the corresponding part of the old system is retired. See 10-5: Phase 4: Implementation POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the implementation phase. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.5 Copyright Cengage Learning. Powered by Cognero.

Page 5


Module 10: Building Successful Information Systems TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

System development phases System implementation Understand 10/22/2019 1:31 PM 11/22/2019 12:54 PM

12. PERT and CPM techniques work by determining the "critical path" for the completion of a series of interrelated activities. If any of the activities along the critical path is delayed, the entire project is delayed. a. True b. False ANSWER: True RATIONALE: Correct While using PERT and CPM techniques, if any of the activities is delayed, the entire project is delayed. Activities that are not on the critical path are more flexible and can be delayed without delaying the project. See 10-5: Phase 4: Implementation POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the implementation phase. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.5 TOPICS: System implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 11/22/2019 12:56 PM 13. Creating a help desk to support users is an important task in the implementation phase of the systems development life cycle (SDLC). a. True b. False ANSWER: False RATIONALE: Correct Creating a help desk to support users is an important task in the maintenance phase of the SDLC. With the ongoing nature of the SDLC approach, maintenance can lead to starting the cycle over at the planning phase if the team discovers the system is not working correctly. See 10-6: Phase 5: Maintenance POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the maintenance phase. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.6 TOPICS: System development phases System maintenance KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM Copyright Cengage Learning. Powered by Cognero.

Page 6


Module 10: Building Successful Information Systems DATE MODIFIED:

11/22/2019 1:04 PM

14. The systems development life cycle (SDLC) model is appropriate in situations when the problem under investigation is not well defined. a. True b. False ANSWER: False RATIONALE: Correct The SDLC model might not be appropriate when there is a lack of specifications-that is, the problem under investigation is not well defined. It is also not suitable if users’ needs keep changing, which means the system undergoes several changes. See 10-7: New Trends in Systems Analysis and Design POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe new trends in systems analysis and design, including service-oriented architecture, rapid application development, extreme programming, and agile methodology. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.7 TOPICS: System development trends KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 15. Service-oriented architecture (SOA) advocates that core business functions and the dynamic functions that change all the time should be decoupled. a. True b. False ANSWER: True RATIONALE: Correct SOA advocates that core business functions and the dynamic functions that change all the time should be decoupled. SOA allows an organization to pick and choose those services that respond most effectively to the customer’s needs and market demands. See 10-7: New Trends in Systems Analysis and Design POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe new trends in systems analysis and design, including service-oriented architecture, rapid application development, extreme programming, and agile methodology. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.7 TOPICS: System development trends KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM Copyright Cengage Learning. Powered by Cognero.

Page 7


Module 10: Building Successful Information Systems DATE MODIFIED:

10/22/2019 1:31 PM

16. The systems development life cycle (SDLC) is also known as the _____. a. ad hoc cycle b. self-sourcing model c. agile cycle d. waterfall model ANSWER: d RATIONALE: Correct. The SDLC is also known as the waterfall model. In this model, each phase’s output (results) becomes the input for the next phase. See 10-1: Systems Development Life Cycle: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Apply the systems development life cycle (SDLC) as a method for developing information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.1 TOPICS: System development phases KEYWORDS: Apply DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 17. During the _____ phase of the systems development life cycle (SDLC) model, an information systems designer must define the problem an organization faces, taking care not to define symptoms rather than the underlying problem. a. planning b. requirements-gathering c. design d. implementation ANSWER: a RATIONALE: Correct. During the planning phase of the SDLC model, an information systems designer must define the problem an organization faces, taking care not to define symptoms rather than the underlying problem. The end result of this phase should give users and top management a clear view of what the problem is and how the information system will solve the problem. See 10-2: Phase 1: Planning POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the planning phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.2 TOPICS: System development phases System planning KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM Copyright Cengage Learning. Powered by Cognero.

Page 8


Module 10: Building Successful Information Systems DATE MODIFIED:

10/22/2019 1:31 PM

18. In the context of the planning phase of the systems development life cycle (SDLC), which is an example of an externally identified problem? a. Employees demanding an increase in their wage before the launch of a new system b. Suppliers noting inefficiency in the inventory control procedure c. Management voicing concern about the organization’s lack of a competitive edge in the marketplace d. Management conducting a high-cost training program to improve employees’ skills ANSWER: b RATIONALE: Correct. In the context of the planning phase of the SDLC model, an example of an externally identified problem would be suppliers noting inefficiency in the inventory control procedure. See 10-2: Phase 1: Planning POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the planning phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.2 TOPICS: System planning System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 19. _____ are employees who will use an information system regularly and can offer important feedback on the system’s strengths and weaknesses. a. Internal users b. Merchandise users c. Suppliers d. Contractors ANSWER: a RATIONALE: Correct. Internal users are employees who will use an information system regularly, and they can offer important feedback on the system’s strengths and weaknesses. See 10-2: Phase 1: Planning POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the planning phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.2 TOPICS: System planning KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM Copyright Cengage Learning. Powered by Cognero.

Page 9


Module 10: Building Successful Information Systems 20. In the context of an organization’s information system, external users _____. a. refrain from providing feedback to the organization b. include customers, contractors, and suppliers c. typically form part of the task force d. are the employees who use the system ANSWER: b RATIONALE: Correct. External users are not employees but do use the system; they include customers, contractors, suppliers, and other business partners. Although external users are not normally part of the task force, their input is essential. See 10-2: Phase 1: Planning POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the planning phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.2 TOPICS: System planning System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 21. Which is a characteristic of joint application design (JAD)? a. It ensures that the requirements collected from different functional areas of an organization for the application are multi-dimensional in focus. b. It centers on a structured workshop in which users and system professionals come together to develop an application. c. It is a unilateral activity that involves the owner of the organization. d. It ensures that collected requirements are one-dimensional in focus. ANSWER: b RATIONALE: Correct. JAD is a collective activity involving users, top management, and IT professionals. It centers on a structured workshop (called a JAD session) in which users and system professionals come together to develop an application. See 10-2: Phase 1: Planning POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the planning phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.2 TOPICS: System planning System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 22. Which is an advantage of the joint application design (JAD) approach? Copyright Cengage Learning. Powered by Cognero.

Page 10


Module 10: Building Successful Information Systems a. It incorporates varying viewpoints from different functional areas of an organization to help ensure that collected requirements for an application is not too narrow or one-dimensional in focus. b. It provides a method for investigating an environment in which a problem is poorly defined and information is difficult to gather. c. It reduces the need to train information system users and increases the system’s chance of success by encouraging users’ involvement. d. It improves communication among users, top management, and information systems personnel because seeing a concrete model often prompts potential users of the system to ask questions, express opinions, and so forth. ANSWER: a RATIONALE: Correct. An advantage of the JAD approach is that it incorporates varying viewpoints from different functional areas of an organization to help ensure that collected requirements for an application are not too narrow or one-dimensional in focus. JAD is a collective activity involving users, top management, and IT professionals. See 10-2: Phase 1: Planning POINTS: 1 DIFFICULTY: Challenging REFERENCES: Explain the tasks involved in the planning phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.2 TOPICS: System planning KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 23. During the _____ phase of the systems development life cycle (SDLC), analysts investigate a proposed solution’s feasibility and determine how best to present the solution to management to obtain funding. a. design b. requirements-gathering c. planning d. implementation ANSWER: c RATIONALE: Correct. During the planning phase of the SDLC, analysts investigate a proposed solution’s feasibility and determine how best to present the solution to management in order to obtain funding. The tool used for this purpose is a feasibility study. See 10-2: Phase 1: Planning POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the planning phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.2 TOPICS: System planning KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 24. Which benefit of an information system is categorized as a tangible? Copyright Cengage Learning. Powered by Cognero.

Page 11


Module 10: Building Successful Information Systems a. Improved employee morale b. Better customer satisfaction c. Increased company profits d. Increased flexibility in business operations ANSWER: c RATIONALE: Correct. Tangible benefits can be quantified in terms of monthly or annual savings, such as a new system allowing the organization to operate with three employees rather than five or the new system resulting in increased profits. See 10-2: Phase 1: Planning POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the planning phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.2 TOPICS: System planning System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:31 PM DATE MODIFIED: 10/22/2019 1:31 PM 25. In the _____ phase of the systems development life cycle (SDLC), a problem is defined and alternatives are generated for solving it. a. planning b. requirements-gathering and analysis c. designing and prototype-development d. implementation ANSWER: b RATIONALE: Correct. In the requirements-gathering and analysis phase of the SDLC, analysts define a problem and generate alternatives for solving it. See 10-3: Phase 2: Requirements Gathering and Analysis POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the requirements-gathering and analysis phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.3 TOPICS: Gathering and analyzing information System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 26. The _____ document, created during the requirements-gathering and analysis phase of the systems development life cycle (SDLC), indicates the end of the analysis phase and the start of the design phase. a. maintenance plan Copyright Cengage Learning. Powered by Cognero.

Page 12


Module 10: Building Successful Information Systems b. system specifications c. blueprint d. execution ANSWER: RATIONALE:

b Correct. Systems analysts use the information collected during the requirements-gathering and analysis phase and create a document called the system specifications. The creation of this document indicates the end of the analysis phase and the start of the design phase. See 10-3: Phase 2: Requirements Gathering and Analysis POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the requirements-gathering and analysis phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.3 TOPICS: Gathering and analyzing information KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 27. Finding out what users do and how they do it part of the ______ phase of the software development life cycle. a. planning b. requirements-gathering and analysis c. design d. maintenance ANSWER: b RATIONALE: Correct. The first step in the requirements-gathering and analysis phase is gathering requirements. Several techniques are available for this step, including interviews, surveys, observations, and the JAD approach described earlier. The intent is to find out the following: what users do, how they do it, what problems they face in performing their jobs, how the new system would address these problems, what users expect from the system, what decisions are made, what data is needed to make decisions, where data comes from, how data should be presented, and what tools are needed to examine data for the decisions that users make. See 10-3: Phase 2: Requirements Gathering and Analysis POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the requirements-gathering and analysis phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.3 TOPICS: Gathering and analyzing information System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 11/22/2019 5:36 PM 28. Finding out how a new information system would address employees' problems in performing their jobs is the goal of Copyright Cengage Learning. Powered by Cognero.

Page 13


Module 10: Building Successful Information Systems which phase in the SDLC: a. requirements-gathering and analysis b. design c. planning d. implementation ANSWER: a RATIONALE: Correct. The first step in the requirements-gathering and analysis phase is gathering requirements. Several techniques are available for this step, including interviews, surveys, observations, and the JAD approach described earlier. The intent is to find out the following: what users do, how they do it, what problems they face in performing their jobs, how the new system would address these problems, what users expect from the system, what decisions are made, what data is needed to make decisions, where data comes from, how data should be presented, and what tools are needed to examine data for the decisions that users make. See 10-3: Phase 2: Requirements Gathering and Analysis See 10-3: Phase 2: Requirements Gathering and Analysis POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the requirements-gathering and analysis phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.3 TOPICS: Gathering and analyzing information System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 11/22/2019 5:40 PM 29. In the context of structured systems analysis and design (SSAD) models, a _____ is a tool that shows a process at a more general level and is helpful for showing top management and the task force how a process works. a. data flow diagram b. flowchart c. context diagram d. conceptual data model ANSWER: c RATIONALE: Correct. In the context of SSAD models, a context diagram is a tool that shows a process at a more general level and is helpful for showing top management and the task force how a process works. See 10-3: Phase 2: Requirements Gathering and Analysis POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the requirements-gathering and analysis phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.3 TOPICS: Gathering and analyzing information KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM Copyright Cengage Learning. Powered by Cognero.

Page 14


Module 10: Building Successful Information Systems DATE MODIFIED:

10/22/2019 1:32 PM

30. In the context of structured systems analysis and design (SSAD) models, a _____ is a tool that helps analysts understand the data requirements an information system must meet by defining data elements and showing the associations between them. a. data flow diagram b. flowchart c. context diagram d. conceptual data model ANSWER: d RATIONALE: Correct. In the context of SSAD models, a conceptual data model is a tool that helps analysts understand the data requirements an information system must meet by defining data elements and showing the associations between them. See 10-3: Phase 2: Requirements Gathering and Analysis POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the requirements-gathering and analysis phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.3 TOPICS: Gathering and analyzing information System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 31. During the _____ phase of the systems development life cycle (SDLC), analysts choose the solution that is the most realistic and offers the highest payoff for the organization. a. planning b. analysis c. design d. implementation ANSWER: c RATIONALE: Correct. During the design phase of the SDLC, analysts choose the solution that is the most realistic and offers the highest payoff for the organization. See 10-4: Phase 3: Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the design phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.4 TOPICS: System design System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM Copyright Cengage Learning. Powered by Cognero.

Page 15


Module 10: Building Successful Information Systems DATE MODIFIED:

10/22/2019 1:32 PM

32. In the design phase of the systems development life cycle (SDLC), the _____ design is an overview of the system and does not include hardware or software choices. a. virtual b. physical c. conceptual d. logical ANSWER: c RATIONALE: Correct. In the design phase of the SDLC, the conceptual design is an overview of the system and does not include hardware or software choices. See 10-4: Phase 3: Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the design phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.4 TOPICS: System design System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 33. In the design phase of the systems development life cycle (SDLC), the _____ design indicates hardware and software, such as specifying Linux servers and Windows clients. a. theoretical b. physical c. conceptual d. logical ANSWER: d RATIONALE: Correct. The logical design makes the conceptual design more specific by indicating hardware and software, such as specifying Linux servers, Windows clients, an objectoriented programming language, and a relational database management system (DBMS). See 10-4: Phase 3: Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the design phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.4 TOPICS: System design System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM Copyright Cengage Learning. Powered by Cognero.

Page 16


Module 10: Building Successful Information Systems 34. During the design phase of the systems development life cycle (SDLC), the _____ design is created for a specific platform, such as choosing Dell servers running Ubuntu Linux and Java for the programming language. a. virtual b. physical c. conceptual d. logical ANSWER: b RATIONALE: Correct. During the design phase of the SDLC, the physical design is created for a specific platform, such as choosing Dell servers running Ubuntu Linux, Dell laptops running Windows 10 and Internet Explorer, Java for the programming language, and SQL Server 2019 for the relational database management system (DBMS). See 10-4: Phase 3: Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the design phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.4 TOPICS: System design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 11/22/2019 2:01 PM 35. Which is an outcome of the design phase of the systems development life cycle (SDLC)? a. A document that contains the requirements for the current system to determine its main problem b. A document that contains operation-specific data collected by the analysts after observing the system’s performance over a predefined period of time c. A document with exact specifications for executing the system, including procedures, hardware and software, and networking components d. A document that drafts the details noted after conducting interviews and surveys with the prospective users of the system ANSWER: c RATIONALE: Correct. The output of the design phase is a document with exact specifications for implementing the system, including files and databases, forms and reports, documentation, procedures, hardware and software, networking components, and general system specifications. See 10-4: Phase 3: Design POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the design phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.4 TOPICS: System design System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM Copyright Cengage Learning. Powered by Cognero.

Page 17


Module 10: Building Successful Information Systems 36. Computer-aided systems engineering (CASE) tools are typically used during the _____ phase of the systems development life cycle (SDLC). a. planning b. design c. implementation d. maintenance ANSWER: b RATIONALE: Correct. CASE tools are typically used during the design phase of the SDLC. Systems analysts use CASE tools to automate parts of the application development process. See 104: Phase 3: Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the design phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.4 TOPICS: System design System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 37. In the context of prototyping during the design phase of the systems development life cycle (SDLC), a _____ prototype shows users how a particular task that was not technically feasible or appears to be unfeasible can be done. a. proof-of-concept b. computer-aided c. requirements-based d. phased-in-phased-out ANSWER: a RATIONALE: Correct. In the context of prototyping during the design phase of the SDLC, a proof-ofconcept prototype shows users how a particular task that was not technically feasible or appears to be unfeasible can be done. See 10-4: Phase 3: Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the design phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.4 TOPICS: System design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 38. In the context of information systems, which is an advantage of prototyping? Copyright Cengage Learning. Powered by Cognero.

Page 18


Module 10: Building Successful Information Systems a. A prototype guarantees the success of the final system. b. It is easier to modify a prototype than a complete system. c. It does not require any support from the top management of a firm. d. A prototype always reflects the final system’s actual operation. ANSWER: b RATIONALE: Correct. It is easier to modify a prototype than a complete system. Prototyping provides a method for investigating an environment in which a problem is poorly defined and information is difficult to gather. See 10-4: Phase 3: Design POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the design phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.4 TOPICS: System design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 39. In the context of information systems, which is a disadvantage of prototyping? a. It increases the need to train information system users. b. It decreases a system’s chance of success by discouraging users’ involvement. c. A prototype is more difficult to modify than a complete system. d. A prototype might not reflect the final system’s actual operation and, therefore, could be misleading. ANSWER: d RATIONALE: Correct. A prototype might not reflect the final system’s actual operation and, therefore, could be misleading. See 10-4: Phase 3: Design POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the design phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.4 TOPICS: System design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 11/22/2019 2:08 PM 40. During the implementation phase of the systems development life cycle (SDLC), _____. a. a team assesses how a system is working and takes steps to keep the system up and running b. analysts define the organizational problem and generate alternatives for solving it c. analysts choose the solution that is the most realistic and offers the highest payoff for the organization d. the solution is transferred from paper to action, and a team configures the system and procures components for it Copyright Cengage Learning. Powered by Cognero.

Page 19


Module 10: Building Successful Information Systems ANSWER: RATIONALE:

d Correct. During the implementation phase of the SDLC, the solution is transferred from paper to action, and a team configures the system and procures components for it. See 105: Phase 4: Implementation POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the implementation phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.5 TOPICS: System implementation System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 11/22/2019 2:10 PM 41. In _____ conversion of the implementation phase of the systems development life cycle (SDLC), the old and new systems run simultaneously for a short time to ensure the new system works correctly. a. parallel b. phased-in-phased-out c. plunge d. pilot ANSWER: a RATIONALE: Correct. In parallel conversion, the old and new systems run simultaneously for a short time to ensure the new system works correctly. However, this approach is costly and can be used only if an operational system is already in place. See 10-5: Phase 4: Implementation POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the implementation phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.5 TOPICS: System development phases System implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 42. In _____ conversion of the implementation phase of the systems development life cycle (SDLC), as each module of a new system is converted, the corresponding part of an old system is retired. a. parallel b. phased-in-phased-out c. plunge d. pilot Copyright Cengage Learning. Powered by Cognero.

Page 20


Module 10: Building Successful Information Systems ANSWER: RATIONALE:

b Correct. In phased-in-phased-out conversion, as each module of a new system is converted, the corresponding part of an old system is retired. This process continues until the entire system is operational. See 10-5: Phase 4: Implementation POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the implementation phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.5 TOPICS: System development phases System implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 43. In _____ conversion of the implementation phase of the systems development life cycle (SDLC), an old system is stopped and a new system is implemented. a. parallel b. phased-in-phased-out c. plunge d. pilot ANSWER: c RATIONALE: Correct. In plunge (direct cutover) conversion, an old system is stopped and a new system is implemented. This approach is risky if there are problems with the new system, but the organization can save on costs by not running the old and new systems concurrently. See 10-5: Phase 4: Implementation POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the implementation phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.5 TOPICS: System development phases System implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 44. In _____ conversion of the implementation phase of the systems development life cycle (SDLC), an analyst introduces an information system in only a limited area of an organization, such as a division or department. a. parallel b. direct cutover c. plunge d. pilot Copyright Cengage Learning. Powered by Cognero.

Page 21


Module 10: Building Successful Information Systems ANSWER: RATIONALE:

d Correct. In pilot conversion, the analyst introduces an information system in only a limited area of an organization, such as a division or department. If the system works correctly, it is implemented in the rest of the organization in stages or all at once. See 10-5: Phase 4: Implementation POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the implementation phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.5 TOPICS: System development phases System implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 45. Which statement is true of Critical Path Method (CPM)? a. Activities on the critical path take the shortest time to be completed. b. It determines the critical path for the completion of a series of interrelated activities. c. Activities that are on the critical path are flexible and can be delayed without delaying a project. d. A delay in the activities of a project does not affect the scheduled delivery of the project. ANSWER: b RATIONALE: Correct. PERT (Program Evaluation Review Technique) and CPM techniques work by determining the “critical path” for the completion of a series of interrelated activities. This includes all those activities that are extremely crucial for the completion of a project, with zero slack time. See 10-5: Phase 4: Implementation POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the implementation phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.5 TOPICS: System implementation System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 46. Which is a disadvantage of a request for proposal (RFP)? a. A lengthy time frame for preparation makes an RFP less appealing. b. The limited time allotted for the evaluation of an RFP makes the process tedious. c. In an RFP, every vendor gets different information, resulting in unfair bids. d. In an RFP, different vendors have different deadlines for submitting bids. ANSWER: a Copyright Cengage Learning. Powered by Cognero.

Page 22


Module 10: Building Successful Information Systems RATIONALE:

Correct. A major disadvantage of an RFP is the time involved in writing and evaluating proposals. With the rapid changes in information technologies, a lengthy time frame makes RFPs less appealing. See 10-5: Phase 4: Implementation POINTS: 1 DIFFICULTY: Challenging REFERENCES: Explain the tasks involved in the implementation phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.5 TOPICS: System implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 47. _____ can help reduce the backlog in producing information systems and improve flexibility in responding to users’ information needs. a. Intersourcing b. Outsourcing c. Self-sourcing d. Crowdsourcing ANSWER: c RATIONALE: Correct. Self-sourcing can help reduce the backlog in producing information systems and improve flexibility in responding to users’ information needs. Self-sourcing gives end users the power to build their own applications in a short time and create, access, and modify data. See 10-5: Phase 4: Implementation POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the implementation phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.5 TOPICS: System implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 11/22/2019 2:22 PM 48. Which of the following approaches for developing information systems increases the risk of leaking confidential information to competitors? a. Insourcing b. Outsourcing c. Self-sourcing d. Venture sourcing ANSWER: b RATIONALE: Correct. The risk of leaking confidential information to competitors increases in outsourcing because of the involvement of third parties. See 10-5: Phase 4: Copyright Cengage Learning. Powered by Cognero.

Page 23


Module 10: Building Successful Information Systems Implementation POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the implementation phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.5 TOPICS: System implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 49. With the _____ outsourcing approach, an organization chooses an outsourcing company in a neighboring country, such as when a U.S. organization chooses a company in Canada or Mexico. a. onshore b. nearshore c. offshore d. farshore ANSWER: b RATIONALE: Correct. With the nearshore outsourcing approach, an organization chooses an outsourcing company in a neighboring country, such as when a U.S. organization chooses a company in Canada or Mexico. See 10-5: Phase 4: Implementation POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the implementation phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.5 TOPICS: System implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 50. During the _____ of the systems development life cycle (SDLC), an information system is operating, enhancements and modifications to the system have been developed and tested, and hardware and software components have been added or replaced. a. planning b. design c. implementation d. maintenance ANSWER: d RATIONALE: Correct. During the maintenance phase of the SDLC, an information system is operating, enhancements and modifications to the system have been developed and tested, and hardware and software components have been added or replaced. See 10-6: Phase 5: Maintenance Copyright Cengage Learning. Powered by Cognero.

Page 24


Module 10: Building Successful Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the maintenance phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.6 TOPICS: System development phases System maintenance KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 51. _____ is a philosophy and a software and system development methodology that focuses on the development, use, and reuse of small, self-contained blocks of codes to meet the software needs of an organization. a. Extreme programming b. Rapid application development c. Service-oriented architecture d. Joint application design ANSWER: c RATIONALE: Correct. Service-oriented architecture is a philosophy and a software and system development methodology that focuses on the development, use, and reuse of small, selfcontained blocks of codes (called services) to meet the software needs of an organization. See 10-7: New Trends in Systems Analysis and Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe new trends in systems analysis and design, including service-oriented architecture, rapid application development, extreme programming, and agile methodology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.7 TOPICS: System development trends KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 52. _____ uses an iterative process that repeats the design, development, and testing steps as needed, based on feedback from users. a. Extreme programming b. Rapid application development c. Service-oriented architecture d. Joint application design ANSWER: b RATIONALE: Correct. Rapid application development uses an iterative process (also called incremental development) that repeats the design, development, and testing steps as needed, based on feedback from users. See 10-7: New Trends in Systems Analysis and Design Copyright Cengage Learning. Powered by Cognero.

Page 25


Module 10: Building Successful Information Systems POINTS: DIFFICULTY: REFERENCES:

1 Easy Describe new trends in systems analysis and design, including service-oriented architecture, rapid application development, extreme programming, and agile methodology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.7 TOPICS: System development trends KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 53. One shortcoming of rapid application development (RAD) is _____. a. that it has a narrow focus, which might limit future development b. that building an application takes more time c. its lack of reusability of small, self-contained blocks of codes d. its inflexibility to adjust to systems’ changing needs ANSWER: a RATIONALE: Correct. One shortcoming of RAD is a narrow focus, which might limit future development. In addition, because these applications are built quickly, the quality might be lower. See 10-7: New Trends in Systems Analysis and Design POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe new trends in systems analysis and design, including service-oriented architecture, rapid application development, extreme programming, and agile methodology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.7 TOPICS: System development trends KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 54. _____ is a method for developing software applications and information system projects in which a project is divided into smaller functions and developers cannot go on to the next phase until the current phase is finished. a. Extreme programming b. Rapid application development c. Service-oriented architecture d. Joint application design ANSWER: a RATIONALE: Correct. Extreme programming (XP) is a recent method for developing software applications and information system projects. XP divides a project into smaller functions, and developers cannot go on to the next phase until the current phase is finished. See 10-7: New Trends in Systems Analysis and Design Copyright Cengage Learning. Powered by Cognero.

Page 26


Module 10: Building Successful Information Systems POINTS: DIFFICULTY: REFERENCES:

1 Easy Describe new trends in systems analysis and design, including service-oriented architecture, rapid application development, extreme programming, and agile methodology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.7 TOPICS: System development trends KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 55. Which of the following statements is true of pair programming? a. Two programmers work on different codes at one workstation. b. Two programmers work on the same code at one workstation. c. Two programmers perform same activities at different workstations. d. Two programmers perform different activities at different workstations. ANSWER: b RATIONALE: Correct. Pair programming is where two programmers participate in one development effort at one workstation. Each programmer performs the action the other is not currently doing. See 10-7: New Trends in Systems Analysis and Design POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe new trends in systems analysis and design, including service-oriented architecture, rapid application development, extreme programming, and agile methodology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.7 TOPICS: System development trends KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 56. Which statement is true of extreme programming (XP)? a. Developers are allowed to go to the next phase before the completion of the current phase. b. This method does not allow changes to a system after its delivery to the users. c. Two programmers perform activities different from the other at different workstations. d. A system’s quality is improved by addressing major issues that have not been examined before. ANSWER: d RATIONALE: Correct. XP uses incremental steps to improve a system’s quality, addressing major issues that have not been examined before. See 10-7: New Trends in Systems Analysis and Design POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 27


Module 10: Building Successful Information Systems DIFFICULTY: REFERENCES:

Moderate Describe new trends in systems analysis and design, including service-oriented architecture, rapid application development, extreme programming, and agile methodology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.7 TOPICS: System development trends KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 57. Which is a difference between the systems development life cycle (SDLC) and extreme programming (XP)? a. The SDLC model has a separate planning and analysis phase, whereas XP combines both the phases into one phase. b. Developers following the SDLC model cannot go on to the next phase until the current phase is finished, whereas in XP, developers can move to any phase from the current phase. c. In the SDLC model, changes cannot be made to a system once it is delivered to the user, whereas the XP method delivers the system to the users and then make changes suggested by the user. d. The SDLC model develops an entire system at once, whereas XP uses incremental steps to improve an information system’s quality. ANSWER: d RATIONALE: Correct. The SDLC develops an entire system at once, whereas XP uses incremental steps to improve an information system’s quality. See 10-7: New Trends in Systems Analysis and Design POINTS: 1 DIFFICULTY: Challenging REFERENCES: Describe new trends in systems analysis and design, including service-oriented architecture, rapid application development, extreme programming, and agile methodology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.7 TOPICS: System development trends KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 58. Which is a similarity between agile methodology and extreme programming (XP)? a. Both give equal emphasis to team coding. b. Both focus on an incremental development process. c. Both respond to changing needs before the system is delivered. d. Both have programmers perform different actions at the same time. ANSWER: b RATIONALE: Correct. Agile methodology is similar to XP in focusing on an incremental development process and timely delivery of working software. However, there is less emphasis on team Copyright Cengage Learning. Powered by Cognero.

Page 28


Module 10: Building Successful Information Systems coding and more emphasis on limiting the project’s scope. See 10-7: New Trends in Systems Analysis and Design POINTS: 1 DIFFICULTY: Challenging REFERENCES: Describe new trends in systems analysis and design, including service-oriented architecture, rapid application development, extreme programming, and agile methodology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.7 TOPICS: System development trends KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 59. _____ is a series of well-defined phases performed in sequence that serves as a framework for developing an information system or project. a. Rapid Application Development b. Extreme Programming c. The maintenance process model d. The systems development life cycle ANSWER: d RATIONALE: The systems development life cycle (SDLC) is a series of well-defined phases performed in sequence that serves as a framework for developing an information system or project. The SDLC is also known as the waterfall model. See 10-1: Systems Development Life Cycle: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Apply the systems development life cycle (SDLC) as a method for developing information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.1 TOPICS: System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 60. The _____ approach treats process and data independently and is a sequential approach that requires completing the analysis before beginning the design of information systems. a. joint application design b. structured systems analysis and design c. object-oriented d. class-responsibility collaboration ANSWER: b Copyright Cengage Learning. Powered by Cognero.

Page 29


Module 10: Building Successful Information Systems RATIONALE:

The structured systems analysis and design (SSAD) approach treats process and data independently and is a sequential approach that requires completing the analysis before beginning the design. The models created during the analysis phase constitute the design specifications. See 10-3: Phase 2: Requirements Gathering and Analysis POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the requirements-gathering and analysis phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.3 TOPICS: Gathering and analyzing information KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 61. A _____ is a tool used in the structured systems analysis and design (SSAD) model for data analysis. a. conceptual data model b. context diagram c. flowchart d. data flow diagram ANSWER: a RATIONALE: A conceptual data model (such as an entity relationship model) is a tool used in the SSAD model for data analysis. It helps analysts understand the data requirements a system must meet by defining data elements and showing the associations between them See 10-3: Phase 2: Requirements Gathering and Analysis POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the requirements-gathering and analysis phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.3 TOPICS: Gathering and analyzing information KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 62. _____ are small-scale versions of information systems, which are built before building the entire system, and are used to illustrate the system’s benefits and allow users to offer feedback. a. Structured systems b. Prototypes c. Flowcharts d. Context diagrams ANSWER: b RATIONALE: Prototyping has gained popularity in designing information systems because needs can change quickly and lack of specifications for the system can be a problem. Typically, a Copyright Cengage Learning. Powered by Cognero.

Page 30


Module 10: Building Successful Information Systems small-scale version of the system that is large enough to illustrate the system’s benefits is developed, which allows users to offer feedback. Prototypes can also be tested to detect potential problems and devise solutions. See 10-4: Phase 3: Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the design phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.4 TOPICS: System design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 11/22/2019 2:43 PM 63. During the _____ phase of the systems development life cycle (SDLC), a team assesses how a system is working and takes steps to keep the system up and running. a. planning b. implementation c. maintenance d. design ANSWER: c RATIONALE: During the maintenance phase of the SDLC, the information system is operating, enhancements and modifications to the system have been developed and tested, and hardware and software components have been added or replaced. The maintenance team assesses how the system is working and takes steps to keep the system up and running. As part of this phase, the team collects performance data and gathers information on whether the system is meeting its objectives by talking with users, customers, and other people affected by the new system. See 10-6: Phase 5: Maintenance POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the maintenance phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.6 TOPICS: System maintenance System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 11/22/2019 2:51 PM 64. The fundamental principle behind _____ is that the self-contained blocks of codes can be reused in a variety of different applications, allowing new business processes to be created from a pool of existing services. a. rapid prototyping b. joint application design c. service-oriented architecture d. computer-aided systems engineering Copyright Cengage Learning. Powered by Cognero.

Page 31


Module 10: Building Successful Information Systems ANSWER: RATIONALE:

c The fundamental principle behind service-oriented architecture is that the “blocks of codes” can be reused in a variety of different applications, allowing new business processes to be created from a pool of existing services. These services should be organized so they can be accessed when needed via a network. See 10-7: New Trends in Systems Analysis and Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe new trends in systems analysis and design, including service-oriented architecture, rapid application development, extreme programming, and agile methodology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.7 TOPICS: System development trends KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 65. In the extreme programming environment, _____ programming allows programmers to detect and correct programming mistakes as they go, which is faster than correcting them after an entire program has been written. a. procedural b. pair c. sequential d. parallel ANSWER: b RATIONALE: Pair programming is where two programmers participate in one development effort at one workstation. Each programmer performs the action the other is not currently doing. In this way, they can detect and correct programming mistakes as they go, which is faster than correcting them after the entire program has been written. See 10-7: New Trends in Systems Analysis and Design POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe new trends in systems analysis and design, including service-oriented architecture, rapid application development, extreme programming, and agile methodology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.7 TOPICS: System development trends KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 66. Explain how the phases of the systems development life cycle (SDLC) relate to each other. ANSWER: Answers will vary. In the SDLC, each phase’s output (results) becomes the input for the Copyright Cengage Learning. Powered by Cognero.

Page 32


Module 10: Building Successful Information Systems next phase. When following this model, one should keep in mind that the main goal of an information system is delivering useful information in a timely manner to the right decision maker. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Apply the systems development life cycle (SDLC) as a method for developing information systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.10.1 TOPICS: System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 67. In the context of the planning phase of the systems development life cycle (SDLC), discuss the questions that an analyst or team of analysts must answer to assess the current and future needs of an organization or a specific group of users. ANSWER: Answers will vary. During the planning phase of the SDLC, after identifying a problem, an analyst or team of analysts assesses the current and future needs of the organization or a specific group of users by answering the following questions: Why is this information system being developed? Who are the system’s current and future users? Is the system new, or is it an upgrade or extension of an existing system? Which functional areas (departments) will be using the system? As part of this assessment, analysts must examine the organization’s strategic goals, how the proposed system can support these goals, which factors are critical to the proposed system’s success, and the criteria for evaluating the proposed system’s performance. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the planning phase. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.10.2 TOPICS: System planning KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 11/22/2019 3:54 PM 68. Explain the importance of the formation of a task force during the planning phase of the systems development life cycle (SDLC). ANSWER: Answers will vary. To ensure an information system’s success, users must have input in the planning, requirements-gathering and analysis, design, and implementation phases. For this reason, a task force is formed, consisting of representatives from different departments (including IT), systems analysts, technical advisors, and top management. This team Copyright Cengage Learning. Powered by Cognero.

Page 33


Module 10: Building Successful Information Systems collects user feedback and works toward getting users involved from the beginning. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the planning phase. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.10.2 TOPICS: System planning KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 69. Describe joint application design (JAD). ANSWER: Answers will vary. JAD is a collective activity involving users, top management, and IT professionals. It centers on a structured workshop (called a JAD session) in which users and system professionals come together to develop an application. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the planning phase. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.10.2 TOPICS: System planning KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 70. Explain feasibility and its importance in designing a successful information system. ANSWER: Answers will vary. Feasibility is the measure of how beneficial or practical an information system will be to an organization and should be measured continuously throughout the systems development life cycle (SDLC) process. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the planning phase. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.10.2 TOPICS: System planning KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM Copyright Cengage Learning. Powered by Cognero.

Page 34


Module 10: Building Successful Information Systems 71. Discuss the five major dimensions of a feasibility study. ANSWER: Answers will vary. Following are the five major dimensions of a feasibility study: a. Economic feasibility b. Technical feasibility c. Operational feasibility d. Scheduling feasibility e. Legal feasibility POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the planning phase. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.10.2 TOPICS: System planning System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 72. State any five development costs considered while assessing the economic feasibility of an information system. ANSWER: Answers will vary. Following are the development costs considered while assessing the economic feasibility of an information system: a. Hardware and software b. Software leases or licenses c. Computer time for programming, testing, and prototyping d. Maintenance costs for monitoring equipment and software e. Personnel costs-salaries for consultants, systems analysts, network specialists, programmers, data entry clerks, computer operators, secretaries, and technicians f. Supplies and other equipment g. Training employees who will be using the system POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the planning phase. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.10.2 TOPICS: System planning KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 73. Explain how tangible benefits of an information system can be quantified to assess its economic feasibility. ANSWER: Answers will vary. Tangible benefits of an information system can be quantified in terms of monthly or annual savings, such as the new system allowing an organization to operate with three employees rather than five or the new system resulting in increased profits. Copyright Cengage Learning. Powered by Cognero.

Page 35


Module 10: Building Successful Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the planning phase. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.10.2 TOPICS: System planning System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 74. Explain why intangible benefits of an information system are difficult to quantify. ANSWER: Answers will vary. Assessing intangible costs and benefits accurately is challenging; attaching a realistic monetary value to these factors can be difficult. Intangible benefits are difficult to quantify in terms of dollar amounts, but if they are not at least identified, many information system projects cannot be justified. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the planning phase. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.10.2 TOPICS: System planning KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 75. Explain how the models created during the analysis phase contribute to the design phase of the systems development life cycle (SDLC). ANSWER: Answers will vary. The models created during the analysis phase of the SDLC constitute the design specifications. After confirming these specifications with users, analysts start designing the system. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the requirements-gathering and analysis phase. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.10.3 TOPICS: Gathering and analyzing information KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM Copyright Cengage Learning. Powered by Cognero.

Page 36


Module 10: Building Successful Information Systems DATE MODIFIED:

10/22/2019 1:32 PM

76. Discuss the different parts in the design phase of the systems development life cycle (SDLC). ANSWER: Answers will vary. During the design phase, analysts choose the solution that is the most realistic and offers the highest payoff for the organization. The design phase consists of three parts: conceptual design, logical design, and physical design. The conceptual design is an overview of the system and does not include hardware or software choices. The logical design makes the conceptual design more specific by indicating hardware and software, such as specifying Linux servers, Windows clients, an object-oriented programming language, and a relational database management system (DBMS). These choices usually require changing the conceptual design to fit the platforms and programming languages chosen. Finally, the physical design is created for a specific platform, such as choosing Dell servers running Ubuntu Linux, Dell laptops running Windows 10 and Internet Explorer, Java for the programming language, and SQL Server 2019 for the relational DBMS. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the design phase. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.10.4 TOPICS: System design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 11/22/2019 4:01 PM 77. Discuss the five capabilities of computer-aided systems engineering (CASE) tools. ANSWER: Answers will vary. The capabilities of CASE tools vary, depending on the product, but generally include the following: a. Graphics tools, such as data flow diagrams, to illustrate an information system’s operation b. Dictionary tools designed to record the system’s operation in detail c. Prototyping tools for designing input and output formats, forms, and screens d. Code generators to minimize or eliminate programming efforts e. Project management tools to help control the system’s schedule and budget POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the design phase. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.10.4 TOPICS: System design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM Copyright Cengage Learning. Powered by Cognero.

Page 37


Module 10: Building Successful Information Systems 78. Discuss the four steps involved in prototyping. ANSWER: Answers will vary. Prototyping is done in four steps: a. Define the initial requirements. b. Develop the prototype. c. Review and evaluate the prototype. d. Revise the prototype. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the design phase. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.10.4 TOPICS: System design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 79. Describe the advantages of prototypes. ANSWER: Answers will vary. Prototyping offers several advantages: a. It provides a method for investigating an environment in which the problem is poorly defined and information is difficult to gather. b. It reduces the need to train information system users because the users are involved in developing the system. c. It reduces costs because building a model is less expensive than building the complete system. If users and top management decide the system should not be developed, the organization has not lost all the money that would have been spent on building a complete system. d. It increases the system’s chance of success by encouraging users’ involvement. e. It is easier to modify a prototype than a complete system. f. It improves documentation because users and designers can walk through several versions of the system. g. It improves communication among users, top management, and information systems personnel because seeing a concrete model often prompts potential users of the system to ask questions, express opinions, point out shortcomings and strengths, and so forth. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the design phase. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.10.4 TOPICS: System design KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 80. Describe how information systems are implemented using a plunge conversion method. Copyright Cengage Learning. Powered by Cognero.

Page 38


Module 10: Building Successful Information Systems ANSWER:

Answers will vary. In plunge (direct cutover) conversion, an old system is stopped and a new system is implemented. This approach is risky if there are problems with the new system, but an organization can save on costs by not running the old and new systems concurrently. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the implementation phase. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.10.5 TOPICS: System implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 81. Explain how a request for proposal (RFP) is prepared. Discuss the advantages of an RFP. ANSWER: Answers will vary. An RFP is usually prepared during the implementation phase of the systems development life cycle (SDLC) and contains detailed information about the functional, technical, and business requirements of the proposed information system. Drafting an RFP can take 6 to 12 months, but with software, the Internet, and other online technologies, time and costs can be reduced. A crucial part of this process is comparing bids from single and multiple vendors. Using a single vendor to provide all the information system’s components is convenient, but the vendor might not have expertise in all areas of the information system’s operations. The main advantage of an RFP is that all vendors get the same information and requirements, so bids can be evaluated more fairly. Furthermore, all vendors have the same deadline for submitting bids, so no vendor has the advantage of having more time to prepare an offer. RFPs are also useful in narrowing down a long list of prospective vendors. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the implementation phase. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.10.5 TOPICS: System implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 82. Describe the concept of crowdsourcing. ANSWER: Answers will vary. Crowdsourcing refers to the process of outsourcing tasks that are traditionally performed by employees or contractors to a large group of people (a crowd) through an open call. Crowdsourcing has become popular with publishers, journalists, editors, and businesses that want to take advantage of the collaborative capabilities offered Copyright Cengage Learning. Powered by Cognero.

Page 39


Module 10: Building Successful Information Systems by Web 2.0. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the implementation phase. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.10.5 TOPICS: System implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 83. Discuss the disadvantages of outsourcing. ANSWER: Answers will vary. The disadvantages of outsourcing include the following: a. Loss of control-Relying on an outsourcing company to control information system functions can result in the system not fully meeting an organization’s information requirements. b. Dependency-If an organization becomes too dependent on an outsourcing company, changes in the outsourcing company’s financial status or managerial structure can have a major impact on the organization’s information system. c. Vulnerability of strategic information-The risk of leaking confidential information to competitors increases because third parties are involved in outsourcing. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the implementation phase. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.10.5 TOPICS: System implementation KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 84. Discuss the basic steps involved in the maintenance phase of the systems development life cycle (SDLC). ANSWER: Answers will vary. During the maintenance phase of the SDLC, an information system is operating, enhancements and modifications to the system have been developed and tested, and hardware and software components have been added or replaced. The maintenance team assesses how the system is working and takes steps to keep the system up and running. As part of this phase, the team collects performance data and gathers information on whether the system is meeting its objectives by talking with users, customers, and other people affected by the new system. If the system’s objectives are not being met, the team must take corrective action. Creating a help desk to support users is another important task in this phase. With the ongoing nature of the SDLC approach, maintenance can lead to starting the cycle over at the planning phase if the team discovers the system is not working correctly. Copyright Cengage Learning. Powered by Cognero.

Page 40


Module 10: Building Successful Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain the tasks involved in the maintenance phase. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.10.6 TOPICS: System maintenance System development phases KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 85. Discuss the key features of extreme programming (XP). ANSWER: Answers will vary. XP uses incremental steps to improve a system’s quality, addressing major issues that have not been examined before. Its key features are the following: • Simplicity • Incremental process • Responsiveness to changing requirements and changing technology • Teamwork • Continuous communication among key players • Immediate feedback from users POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe new trends in systems analysis and design, including service-oriented architecture, rapid application development, extreme programming, and agile methodology. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.10.7 TOPICS: System development trends KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 86. Using a system development method can help prevent which of the following system failures: a. High prices b. Users' needs that are not met c. Uninteresting user interface d. Lack of staff ANSWER: b RATIONALE: In the information systems field, system failure can happen for several reasons, including missed deadlines, users’ needs that are not met, dissatisfied customers, lack of support from top management, and exceeding the budget. Old equipment, being unable to handle the capacity and pick times, also causes system failure. Using a system development Copyright Cengage Learning. Powered by Cognero.

Page 41


Module 10: Building Successful Information Systems method can help prevent these failures. See 10-1: Systems Development Life Cycle: An Overview POINTS: 1 REFERENCES: Apply the systems development life cycle (SDLC) as a method for developing information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.1 KEYWORDS: apply DATE CREATED: 11/22/2019 4:19 PM DATE MODIFIED: 11/22/2019 4:22 PM 87. In the SDLC, projecting the organization's growth rate is _______. a. impossible b. important c. unimportant d. inefficient ANSWER: b RATIONALE: In addition, when designing information systems, projecting the organization’s growth rate is important; otherwise, the system could become inefficient shortly after it is designed. See 10-1: Systems Development Life Cycle: An Overview POINTS: 1 REFERENCES: Apply the systems development life cycle (SDLC) as a method for developing information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.1 KEYWORDS: apply DATE CREATED: 11/22/2019 4:25 PM DATE MODIFIED: 11/22/2019 4:28 PM 88. In the SDLC model, each phase's output becomes the _______ for the next phase. a. model b. program c. input d. example ANSWER: c RATIONALE: In this model, each phase’s output (results) becomes the input for the next phase. See 10-1: Systems Development Life Cycle: An Overview POINTS: 1 REFERENCES: Apply the systems development life cycle (SDLC) as a method for developing information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.1 Copyright Cengage Learning. Powered by Cognero.

Page 42


Module 10: Building Successful Information Systems KEYWORDS: DATE CREATED: DATE MODIFIED:

apply 11/22/2019 4:28 PM 11/22/2019 4:31 PM

89. Systems planning today is all about _____ all potential systems that need to be updated. a. eliminating b. reducing c. evaluating d. preventing ANSWER: c RATIONALE: Correct. Systems planning today is all about evaluating all potential systems that need to be updated. See 10-1: Systems Development Life Cycle: An Overview POINTS: 1 REFERENCES: Apply the systems development life cycle (SDLC) as a method for developing information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.1 KEYWORDS: apply DATE CREATED: 11/22/2019 4:31 PM DATE MODIFIED: 11/22/2019 4:48 PM 90. The main goal of an information system is delivering _____ in a timely manner to the right decision maker. a. cost savings b. new products c. useful information d. new technology ANSWER: c RATIONALE: Correct. When following this model, keep in mind that the main goal of an information system is delivering useful information in a timely manner to the right decision maker.See 10-1: Systems Development Life Cycle: An Overview POINTS: 1 REFERENCES: Apply the systems development life cycle (SDLC) as a method for developing information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.1 KEYWORDS: apply DATE CREATED: 11/22/2019 4:40 PM DATE MODIFIED: 11/22/2019 4:46 PM 91. The systems development life cycle (SDLC) is also known as the _____. a. ad hoc cycle b. self-sourcing model c. agile cycle Copyright Cengage Learning. Powered by Cognero.

Page 43


Module 10: Building Successful Information Systems d. waterfall model ANSWER: RATIONALE:

d Correct. The SDLC is also known as the waterfall model. In this model, each phase’s output (results) becomes the input for the next phase. See 10-1: Systems Development Life Cycle: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Apply the systems development life cycle (SDLC) as a method for developing information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.1 TOPICS: System development phases KEYWORDS: Apply DATE CREATED: 11/22/2019 4:41 PM DATE MODIFIED: 11/22/2019 4:46 PM 92. In situations where an information system needs to be designed from scratch, the SDLC model is _____. a. usable only with modifications b. difficult to apply c. especially challenging d. particularly suitable ANSWER: d RATIONALE: Correct. Information system projects are often an extension of existing systems or involve replacing an old technology with a new one. However, sometimes an information system needs to be designed from scratch, and the SDLC model is particularly suitable in these situations. See 10-1: Systems Development Life Cycle: An Overview POINTS: 1 DIFFICULTY: Easy REFERENCES: Apply the systems development life cycle (SDLC) as a method for developing information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.1 TOPICS: System development phases KEYWORDS: Apply DATE CREATED: 11/22/2019 4:43 PM DATE MODIFIED: 11/22/2019 4:45 PM 93. In the information systems field, _______ can occur in response to factors including missed deadlines, old equipment, and dissatisfied customers. a. system failure b. organizational growth c. lack of competition Copyright Cengage Learning. Powered by Cognero.

Page 44


Module 10: Building Successful Information Systems d. new products entering the market ANSWER: a RATIONALE: In the information systems field, system failure can happen for several reasons, including missed deadlines, users’ needs that are not met, dissatisfied customers, lack of support from top management, and exceeding the budget. Old equipment, being unable to handle the capacity and pick times, also causes system failure. Using a system development method can help prevent these failures. POINTS: DIFFICULTY: REFERENCES:

1 Easy Apply the systems development life cycle (SDLC) as a method for developing information systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.1 TOPICS: System development phases KEYWORDS: Apply DATE CREATED: 11/22/2019 5:17 PM DATE MODIFIED: 11/22/2019 5:22 PM 94. In the _____ phase of the systems development life cycle (SDLC), a problem is defined and alternatives are generated for solving it. a. planning b. requirements-gathering and analysis c. designing and prototype-development d. implementation ANSWER: b RATIONALE: Correct. In the requirements-gathering and analysis phase of the SDLC, analysts define a problem and generate alternatives for solving it. See 10-3: Phase 2: Requirements Gathering and Analysis POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the requirements-gathering and analysis phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.3 TOPICS: Gathering and analyzing information System development phases KEYWORDS: Understand DATE CREATED: 11/22/2019 5:23 PM DATE MODIFIED: 11/22/2019 5:23 PM 95. In the context of structured systems analysis and design (SSAD) models, a _____ is a tool that illustrates the logical steps in a process but does not show data elements and associations. a. data flow diagram b. flowchart Copyright Cengage Learning. Powered by Cognero.

Page 45


Module 10: Building Successful Information Systems c. context diagram d. conceptual data model ANSWER: b RATIONALE: Correct. In the context of SSAD models, a flowchart is a tool that illustrates the logical steps in a process but does not show data elements and associations. It can supplement a data flow diagram and help analysts understand and document how a process works. See 10-3: Phase 2: Requirements Gathering and Analysis POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the requirements-gathering and analysis phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.3 TOPICS: Gathering and analyzing information System development phases KEYWORDS: Understand DATE CREATED: 11/22/2019 5:36 PM DATE MODIFIED: 11/22/2019 5:36 PM 96. During the maintenance phase of the systems development life cycle (SDLC), hardware and software components have been _____. a. planned and assessed b. not yet tested c. developed and tested d. prototyped but not developed ANSWER: c RATIONALE: Correct. During the maintenance phase of the SDLC, an information system is operating, enhancements and modifications to the system have been developed and tested, and hardware and software components have been added or replaced. See 10-6: Phase 5: Maintenance POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the maintenance phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.6 TOPICS: System development phases System maintenance KEYWORDS: Understand DATE CREATED: 11/22/2019 5:42 PM DATE MODIFIED: 11/22/2019 5:48 PM 97. Gathering _____ is part of the maintenance phase of the software development life cycle (SLDC). a. new funding b. requests for proposals (RFPs) Copyright Cengage Learning. Powered by Cognero.

Page 46


Module 10: Building Successful Information Systems c. competitive data d. performance data ANSWER: RATIONALE:

d Correct. As part of this phase, the team collects performance data and gathers information on whether the system is meeting its objectives by talking with users, customers, and other people affected by the new system. See 10-6: Phase 5: Maintenance POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the maintenance phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.6 TOPICS: System development phases System maintenance KEYWORDS: Understand DATE CREATED: 11/22/2019 5:48 PM DATE MODIFIED: 11/22/2019 5:54 PM 98. Creating a _____ is a task in the maintenance phase of the software development life cycle (SLDC). a. prototype b. help desk c. code block d. outsourcing strategy ANSWER: b RATIONALE: Correct. As part of this phase, the team collects performance data and gathers information on whether the system is meeting its objectives by talking with users, customers, and other people affected by the new system. If the system’s objectives are not being met, the team must take corrective action. Creating a help desk to support users is another important task in this phase. See 10-6: Phase 5: Maintenance POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the maintenance phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.6 TOPICS: System development phases System maintenance KEYWORDS: Understand DATE CREATED: 11/22/2019 5:51 PM DATE MODIFIED: 11/22/2019 5:54 PM 99. During the maintenance phase of the software development life cycle, the team may decide to start the SDLC cycle over if: a. an employees leaves the organization b. assessing the system would be time-consuming Copyright Cengage Learning. Powered by Cognero.

Page 47


Module 10: Building Successful Information Systems c. the system is not working correctly d. the system is running smoothly ANSWER: c RATIONALE: Correct. If the system’s objectives are not being met, the team must take corrective action. With the ongoing nature of the SDLC approach, maintenance can lead to starting the cycle over at the planning phase if the team discovers the system is not working correctly. See 10-6: Phase 5: Maintenance POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the maintenance phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.6 TOPICS: System development phases System maintenance KEYWORDS: Understand DATE CREATED: 11/22/2019 5:54 PM DATE MODIFIED: 11/22/2019 5:59 PM 100. During the maintenance phase of the software development life cycle, the information system is ______. a. considered unusable b. being redesigned c. no longer a concern d. operating ANSWER: d RATIONALE: Correct. During the maintenance phase, the information system is operating, enhancements and modifications to the system have been developed and tested, and hardware and software components have been added or replaced. See 10-6: Phase 5: Maintenance POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the maintenance phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.6 TOPICS: System development phases System maintenance KEYWORDS: Understand DATE CREATED: 11/22/2019 6:00 PM DATE MODIFIED: 11/22/2019 6:04 PM 101. During the maintenance phase of the SDLC, the team gathers information on ______. a. how to redesign the system b. whether the system is more expensive than the previous system c. whether the system is meeting its objectives d. when the system will need to be replaced Copyright Cengage Learning. Powered by Cognero.

Page 48


Module 10: Building Successful Information Systems ANSWER: RATIONALE:

c Correct. During the maintenance phase, the information system is operating, enhancements and modifications to the system have been developed and tested, and hardware and software components have been added or replaced. The maintenance team assesses how the system is working and takes steps to keep the system up and running. As part of this phase, the team collects performance data and gathers information on whether the system is meeting its objectives by talking with users, customers, and other people affected by the new system. See 10-6: Phase 5: Maintenance POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the maintenance phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.6 TOPICS: System development phases System maintenance KEYWORDS: Understand DATE CREATED: 11/22/2019 6:05 PM DATE MODIFIED: 11/22/2019 6:08 PM 102. _____ feasibility is concerned with whether a new system can be completed on time. a. Economic b. Technical c. Operational d. Scheduling ANSWER: d RATIONALE: Correct. Scheduling feasibility is concerned with whether a new system can be completed on time. For example, an organization might need a wireless network immediately because of a disaster that destroyed the existing network. See 10-2: Phase 1: Planning POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe new trends in systems analysis and design, including service-oriented architecture, rapid application development, extreme programming, and agile methodology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.2 TOPICS: System development trends KEYWORDS: Understand DATE CREATED: 11/22/2019 6:19 PM DATE MODIFIED: 11/22/2019 6:22 PM 103. _____ feasibility is concerned with issues such as political repercussions of using an information system and meeting the requirements of the Information Privacy Act. a. Scheduling b. Legal Copyright Cengage Learning. Powered by Cognero.

Page 49


Module 10: Building Successful Information Systems c. Operational d. Technical ANSWER: RATIONALE:

b Correct. Legal feasibility is concerned with legal issues; it typically addresses issues such as political repercussions of using an information system and whether the system takes the Information Privacy Act into account. See 10-2: Phase 1: Planning POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe new trends in systems analysis and design, including service-oriented architecture, rapid application development, extreme programming, and agile methodology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.2 TOPICS: System development trends KEYWORDS: Understand DATE CREATED: 11/22/2019 6:23 PM DATE MODIFIED: 11/22/2019 6:24 PM 104. During the maintenance phase of the SDLC, the team must _____ if a system's objectives are not being met. a. start from scratch b. take corrective action c. take punitive action d. take no action ANSWER: b RATIONALE: Correct. During the maintenance phase, the information system is operating, enhancements and modifications to the system have been developed and tested, and hardware and software components have been added or replaced. The maintenance team assesses how the system is working and takes steps to keep the system up and running. If the system’s objectives are not being met, the team must take corrective action. See 10-6: Phase 5: Maintenance POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the maintenance phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.6 TOPICS: System development phases System maintenance KEYWORDS: Understand DATE CREATED: 11/22/2019 6:44 PM DATE MODIFIED: 11/22/2019 6:48 PM 105. The ____ phase of the SDLC involves gathering information on whether the system is meeting its objectives. a. planning b. implementation Copyright Cengage Learning. Powered by Cognero.

Page 50


Module 10: Building Successful Information Systems c. maintenance d. design ANSWER: RATIONALE:

c Correct. During the maintenance phase, the information system is operating, enhancements and modifications to the system have been developed and tested, and hardware and software components have been added or replaced. The maintenance team assesses how the system is working and takes steps to keep the system up and running. If the system’s objectives are not being met, the team must take corrective action. See 10-6: Phase 5: Maintenance POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the maintenance phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.6 TOPICS: System development phases System maintenance KEYWORDS: Understand DATE CREATED: 11/22/2019 6:48 PM DATE MODIFIED: 11/22/2019 6:50 PM 106. During the maintenance phase of the software development life cycle, the maintenance team takes steps to _____. a. design an economically feasible system b. gather requirements and analysis c. keep the system up and running d. find out what users need to perform their jobs ANSWER: c RATIONALE: Correct. During the maintenance phase, the information system is operating, enhancements and modifications to the system have been developed and tested, and hardware and software components have been added or replaced. The maintenance team assesses how the system is working and takes steps to keep the system up and running. See 10-6: Phase 5: Maintenance POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain the tasks involved in the maintenance phase. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.10.6 TOPICS: System development phases System maintenance KEYWORDS: Understand DATE CREATED: 11/22/2019 6:51 PM DATE MODIFIED: 11/22/2019 6:54 PM

Copyright Cengage Learning. Powered by Cognero.

Page 51


Module 11: Enterprise Systems True / False 1. Supply chains exist in both service and manufacturing organizations. a. True b. False ANSWER: True RATIONALE: Correct Supply chains exist in both service and manufacturing organizations, although the chain’s complexity can vary widely in different organizations and industries. A supply chain is an integrated network consisting of an organization, its suppliers, transportation companies, and brokers used to deliver goods and services to customers. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 2. A key decision in supply chain management (SCM) related to manufacturing is pricing. a. True b. False ANSWER: False RATIONALE: Correct Four key decisions in SCM related to manufacturing are location, inventory, production, and transportation. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 3. In the context of supply chain management technologies, using the Internet and Web protocols for electronic data interchange (EDI) increases the cost of transmitting documents. a. True b. False ANSWER: False Copyright Cengage Learning. Powered by Cognero.

Page 1


Module 11: Enterprise Systems RATIONALE:

Correct Using the Internet and Web protocols for EDI lowers the cost of transmitting documents. This method is called “Web-based EDI” or “Open EDI.” It also has the advantage of being platform independent and easy to use. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 4. Transmitting documents across the Internet involves lower security risks than traditional electronic data interchange (EDI). a. True b. False ANSWER: False RATIONALE: Correct Transmitting documents across the Internet involves more security risks than traditional EDI, which uses proprietary protocols and networks. Using the Internet and Web protocols for EDI lowers the cost of transmitting documents. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 5. One of the disadvantages of an e-marketplace is that it cannot provide a single platform for prices. a. True b. False ANSWER: False RATIONALE: Correct One of the ways in which e-marketplaces help businesses maintain a competitive edge in the supply chain is by providing a single platform for prices, availability, and stock levels that is accessible to all participants. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. Copyright Cengage Learning. Powered by Cognero.

Page 2


Module 11: Enterprise Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 6. Auctions help determine the price of goods and services when there is no set price in the marketplace. a. True b. False ANSWER: True RATIONALE: Correct Auctions help determine the price of goods and services when there is no set price in the marketplace. By using the Internet, an online auction brings traditional auctions to customers around the globe and makes it possible to sell far more goods and services than at a traditional auction. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 7. With a structured process of sharing information among supply chain members, retailers can compare customer demands or sales forecasts with a manufacturer’s order forecast. a. True b. False ANSWER: True RATIONALE: Correct With a structured process of sharing information among supply chain members, retailers can compare customer demands or sales forecasts with a manufacturer’s order forecast. Any data collected with point-of-sale systems is shared with all members of the supply chain, which is useful in coordinating production and planning for inventory needs. See 111: Supply Chain Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management Copyright Cengage Learning. Powered by Cognero.

Page 3


Module 11: Enterprise Systems KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 12/5/2019 11:53 AM 12/5/2019 11:53 AM

8. Businesses find attracting new customers less expensive than maintaining current customers. a. True b. False ANSWER: False RATIONALE: Correct Businesses know that keeping and maintaining current customers is less expensive than attracting new customers, and an effective customer relationship management system is useful in meeting this goal. See 11-2: Customer Relationship Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe customer relationship management systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 9. A grocery store offering loyalty cards with discounts to its customers is an example of how transaction data can be used in a customer relationship management (CRM) system. a. True b. False ANSWER: True RATIONALE: Correct A grocery store offering loyalty cards with discounts to its customers is an example of how transaction data can be used in a CRM system. Knowing that a customer bought 4 gallons of milk the previous week does not give a grocery store much information, but with loyalty cards, the store can track all sorts of information on specific customers. See 11-2: Customer Relationship Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe customer relationship management systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 10. Organizations sometimes pay external agencies for additional data about their potential customers. Copyright Cengage Learning. Powered by Cognero.

Page 4


Module 11: Enterprise Systems a. True b. False ANSWER: RATIONALE:

True Correct Organizations can pay external agencies for additional data about their potential customers. This data might be public or semiprivate, such as whether they own their homes, the value of their homes, and their estimated mortgage or rent payments. See 11-2: Customer Relationship Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe customer relationship management systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 11. Collaborative filtering is one of the IT tools that can be used to implement a personalization system. a. True b. False ANSWER: True RATIONALE: Correct To implement a personalization system, several IT tools are needed, including the Internet, databases, data warehouse/data marts, data-mining tools, mobile networks, and collaborative filtering. One application of collaborative filtering is making automatic predictions about customers’ preferences and interests based on similar users. See 11-2: Customer Relationship Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe customer relationship management systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 12. Knowledge management draws on concepts of organizational learning and organizational culture. a. True b. False ANSWER: True RATIONALE: Correct Knowledge management draws on concepts of organizational learning, organizational Copyright Cengage Learning. Powered by Cognero.

Page 5


Module 11: Enterprise Systems culture, and best practices to convert tacit knowledge into explicit knowledge, create a knowledge-sharing culture in an organization, and eliminate obstacles to sharing knowledge. See 11-3: Knowledge Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe knowledge management systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.3 TOPICS: Knowledge management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 13. Information management is broader in scope than knowledge management because the latter tends to focus on just explicit knowledge. a. True b. False ANSWER: False RATIONALE: Correct Knowledge management shares many of the goals of information management but is broader in scope because information management tends to focus on just explicit knowledge. See 11-3: Knowledge Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe knowledge management systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.3 TOPICS: Knowledge management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 14. In the context of knowledge management, tacit knowledge can be captured easily in data repositories. a. True b. False ANSWER: False RATIONALE: Correct Explicit knowledge, such as how to close a sale, can be captured in data repositories and shared. Tacit knowledge, however, cannot be captured as easily. See 11-3: Knowledge Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe knowledge management systems. Copyright Cengage Learning. Powered by Cognero.

Page 6


Module 11: Enterprise Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.3 TOPICS: Knowledge management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 15. The best way to gather tacit knowledge is interactively, such as asking an employee specific questions about how he or she would handle an issue. a. True b. False ANSWER: True RATIONALE: Correct Typically, the best way to gather tacit knowledge is interactively, such as asking an employee specific questions about how he or she would handle an issue. Knowledge that someone has gained through experience might vary depending on the situation in which it was used-the context. See 11-3: Knowledge Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe knowledge management systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.3 TOPICS: Knowledge management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 16. One of the drawbacks of a well-designed enterprise resource planning (ERP) system is that it tends to increase the cost of inventories. a. True b. False ANSWER: False RATIONALE: Correct One of the benefits of a well-designed ERP system is that it reduces inventory costs. Having modular components is a major factor in the success of ERP systems because it keeps costs down. See 11-4: Enterprise Resource Planning POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe enterprise resource planning systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.4 TOPICS: Enterprise resource planning systems Copyright Cengage Learning. Powered by Cognero.

Page 7


Module 11: Enterprise Systems KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 12/5/2019 11:53 AM 12/5/2019 11:53 AM

17. A simple knowledge management system might consist of using collaboration software. a. True b. False ANSWER: True RATIONALE: Correct A simple knowledge management system might consist of using collaboration software, such as Google Apps for Work or Microsoft SharePoint Server, to create, manage, and distribute documents in an organization. See 11-3: Knowledge Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe knowledge management systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.3 TOPICS: Knowledge management KEYWORDS: Understand DATE CREATED: 12/6/2019 8:35 AM DATE MODIFIED: 12/6/2019 8:37 AM 18. The type of knowledge stored in a knowledge management system is noncontextual. a. True b. False ANSWER: False RATIONALE: Correct Knowledge is more than information and data. It is also contextual. Explicit knowledge, such as how to close a sale, can be captured in data repositories and shared. See 11-3: Knowledge Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe knowledge management systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.3 TOPICS: Knowledge management KEYWORDS: Understand DATE CREATED: 12/6/2019 8:37 AM DATE MODIFIED: 12/6/2019 8:40 AM 19. Knowledge of how to close a sale is an example of tacit knowledge that cannot be easily captured. a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 8


Module 11: Enterprise Systems ANSWER: RATIONALE:

False Correct Explicit knowledge, such as how to close a sale, can be captured in data repositories and shared. See 11-3: Knowledge Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe knowledge management systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.3 TOPICS: Knowledge management KEYWORDS: Understand DATE CREATED: 12/6/2019 8:40 AM DATE MODIFIED: 12/6/2019 8:42 AM 20. A knowledge management system must include a decision support tool. a. True b. False ANSWER: False RATIONALE: Correct A simple knowledge management system might consist of using collaboration software, such as Google Apps for Work or Microsoft SharePoint Server, to create, manage, and distribute documents in an organization. Other tools and technologies might include database management systems, data-mining tools, and decision support systems. See 11-3: Knowledge Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe knowledge management systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.3 TOPICS: Knowledge management KEYWORDS: Understand DATE CREATED: 12/6/2019 8:42 AM DATE MODIFIED: 12/6/2019 8:46 AM 21. A Chief Knowledge Officer tries to minimize the return on investment related to knowledge management systems and processes. a. True b. False ANSWER: False RATIONALE: Correct A Chief Knowledge Officer tries to maximize the return on investment (ROI) related to knowledge management, knowledge management systems, and processes. See 11-3: Knowledge Management POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 9


Module 11: Enterprise Systems DIFFICULTY: Moderate REFERENCES: Describe knowledge management systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.3 TOPICS: Knowledge management KEYWORDS: Understand DATE CREATED: 12/6/2019 8:54 AM DATE MODIFIED: 12/6/2019 8:56 AM 22. A knowledge management system should encourage open communication and the exchange of ideas. a. True b. False ANSWER: True RATIONALE: Correct Because interaction is a key part of managing tacit knowledge, a knowledge management system must encourage open communication and the exchange of ideas, typically via emails, instant messaging, internal company wikis, video conferencing, and tools such as WebEx or GoToMeeting, which create virtual instructional environments. See 11-3: Knowledge Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe knowledge management systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.3 TOPICS: Knowledge management KEYWORDS: Understand DATE CREATED: 12/6/2019 8:57 AM DATE MODIFIED: 12/6/2019 8:58 AM 23. Procedures constitute one component in a typical enterprise resource planning system. a. True b. False ANSWER: True RATIONALE: Correct A typical ERP system has many components, including hardware, software, procedures, and input from all functional areas. See 11-4: Enterprise Resource Planning POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe enterprise resource planning systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.4 Copyright Cengage Learning. Powered by Cognero.

Page 10


Module 11: Enterprise Systems TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Enterprise resource planning systems Understand 12/6/2019 8:59 AM 12/6/2019 9:08 AM

24. Hardware is one component in a typical enterprise resource planning system. a. True b. False ANSWER: True RATIONALE: Correct A typical ERP system has many components, including hardware, software, procedures, and input from all functional areas. See 11-4: Enterprise Resource Planning POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe enterprise resource planning systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.4 TOPICS: Enterprise resource planning systems KEYWORDS: Understand DATE CREATED: 12/6/2019 9:07 AM DATE MODIFIED: 12/6/2019 9:09 AM 25. Sales constitute one component in a typical enterprise resource planning system. a. True b. False ANSWER: False RATIONALE: Correct A typical ERP system has many components, including hardware, software, procedures, and input from all functional areas. See 11-4: Enterprise Resource Planning POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe enterprise resource planning systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.4 TOPICS: Enterprise resource planning systems KEYWORDS: Understand DATE CREATED: 12/6/2019 9:08 AM DATE MODIFIED: 12/6/2019 9:09 AM 26. A well-designed enterprise resource planning system helps to reduce labor costs. a. True Copyright Cengage Learning. Powered by Cognero.

Page 11


Module 11: Enterprise Systems b. False ANSWER: RATIONALE:

True Correct A well-designed ERP system offers the following benefits: Reduction in labor costs. See 11-4: Enterprise Resource Planning POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe enterprise resource planning systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.4 TOPICS: Enterprise resource planning systems KEYWORDS: Understand DATE CREATED: 12/6/2019 9:10 AM DATE MODIFIED: 12/6/2019 9:11 AM 27. An enterprise resource planning system reduces the need for extensive training. a. True b. False ANSWER: False RATIONALE: Correct Along with all its advantages, an ERP system also has drawbacks, such as high cost, difficulties in installation, a need for extensive training, and compatibility problems with legacy systems. See 11-4: Enterprise Resource Planning POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe enterprise resource planning systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.4 TOPICS: Enterprise resource planning systems KEYWORDS: Understand DATE CREATED: 12/6/2019 9:12 AM DATE MODIFIED: 12/6/2019 9:16 AM 28. An enterprise resource planning system reduces the need for extensive training. a. True b. False ANSWER: False RATIONALE: Correct Along with all its advantages, an ERP system also has drawbacks, such as high cost, difficulties in installation, a need for extensive training, and compatibility problems with legacy systems. See 11-4: Enterprise Resource Planning POINTS: 1 DIFFICULTY: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 12


Module 11: Enterprise Systems REFERENCES: Describe enterprise resource planning systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.4 TOPICS: Enterprise resource planning systems KEYWORDS: Understand DATE CREATED: 12/6/2019 10:25 AM DATE MODIFIED: 12/6/2019 10:25 AM 29. A cloud-based enterprise system is generally less secure than an on-premise system. a. True b. False ANSWER: False RATIONALE: Correct. The specific advantages of a cloud-based enterprise system include improved security. Although some people think that cloud computing may be less secure than traditional you should remember that most providers of cloud services will have multiple copies of your data for redundancy, often in different geographic locations. Therefore, it is highly unlikely that they will lose your data. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain advantages and disadvantages of cloud-based enterprise systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.5 TOPICS: cloud-based enterprise systems KEYWORDS: Understand DATE CREATED: 12/6/2019 10:27 AM DATE MODIFIED: 12/6/2019 10:28 AM 30. In a cloud-based enterprise system, cloud providers are responsible for providing hardware, software, and other needed utility programs. a. True b. False ANSWER: True RATIONALE: Correct. Cloud computing is accessed through remote servers and customers use it similarly as utility services. Cloud providers are responsible for providing hardware, software, and other needed utility programs. For the most part, advantages and disadvantages of cloud computing in general apply to enterprise systems as well, with minor differences. See 11-5: Cloud-Based Enterprise Systems POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Moderate Explain advantages and disadvantages of cloud-based enterprise systems. True / False

Copyright Cengage Learning. Powered by Cognero.

Page 13


Module 11: Enterprise Systems HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.5 TOPICS: cloud-based enterprise systems KEYWORDS: Understand DATE CREATED: 12/6/2019 10:37 AM DATE MODIFIED: 12/6/2019 10:39 AM 31. In a cloud-based enterprise system, providers must supply hardware, software, and other needed utility programs. a. True b. False ANSWER: True RATIONALE: Correct. Cloud computing is accessed through remote servers and customers use it similarly as utility services. Cloud providers are responsible for providing hardware, software, and other needed utility programs. For the most part, advantages and disadvantages of cloud computing in general apply to enterprise systems as well, with minor differences. See 11-5: Cloud-Based Enterprise Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain advantages and disadvantages of cloud-based enterprise systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.5 TOPICS: cloud-based enterprise systems KEYWORDS: Understand DATE CREATED: 12/6/2019 10:39 AM DATE MODIFIED: 12/6/2019 10:42 AM 32. Customers use a cloud-based enterprise system similarly to the way they use cloud utility services. a. True b. False ANSWER: True RATIONALE: Correct. Cloud computing is accessed through remote servers and customers use it similarly as utility services. Cloud providers are responsible for providing hardware, software, and other needed utility programs. For the most part, advantages and disadvantages of cloud computing in general apply to enterprise systems as well, with minor differences. See 11-5: Cloud-Based Enterprise Systems POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Moderate Explain advantages and disadvantages of cloud-based enterprise systems. True / False False

Copyright Cengage Learning. Powered by Cognero.

Page 14


Module 11: Enterprise Systems LEARNING OBJECTIVES: MIS.10e.11.5 TOPICS: cloud-based enterprise systems KEYWORDS: Understand DATE CREATED: 12/6/2019 10:40 AM DATE MODIFIED: 12/6/2019 10:41 AM Multiple Choice 33. In a manufacturing firm’s supply chain, raw materials flow from _____ to manufacturers, where they are transformed into finished goods. a. suppliers b. traders c. retailers d. distributors ANSWER: a RATIONALE: Correct. In a manufacturing firm’s supply chain, raw materials flow from suppliers to manufacturers (where they are transformed into finished goods), then to distributors, then to retailers, and finally to consumers. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 34. In manufacturing, which is one of the major links in the supply chain? a. Virtual networking b. Foreign keys c. Application generation d. Distribution centers ANSWER: d RATIONALE: Correct. In manufacturing, the major links in the supply chain are suppliers, manufacturing facilities, distribution centers, retailers, and customers. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management Copyright Cengage Learning. Powered by Cognero.

Page 15


Module 11: Enterprise Systems KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 12/5/2019 11:53 AM 12/5/2019 11:53 AM

35. In real estate firms, which is considered one of the major links in the supply chain? a. Service providers b. Manufacturing facilities c. Production units d. Retailers ANSWER: a RATIONALE: Correct. In service organizations-such as those in real estate, the travel industry, temporary labor, and advertising-the major links in the supply chain include suppliers (service providers), distribution centers (such as travel agencies), and customers. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 36. Which function is coordinated by a supply chain management (SCM) system? a. Procuring materials and transforming them into intermediate and finished products or services b. Capturing information about customer interactions for sales personnel and customer service representatives c. Focusing on long-term relationships with customers d. Improving budget allocation and managing cash flows ANSWER: a RATIONALE: Correct. An SCM system coordinates procuring materials (in service organizations, this can include resources and information), transforming materials into intermediate and finished products or services, and distributing finished products or services to customers. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM Copyright Cengage Learning. Powered by Cognero.

Page 16


Module 11: Enterprise Systems DATE MODIFIED:

12/5/2019 11:53 AM

37. In a manufacturing firm’s supply chain management (SCM) system, which area oversees order transmission? a. Product flow b. Information flow c. Stock location flow d. Finances flow ANSWER: b RATIONALE: Correct. Overseeing order transmissions is part of the information flow in a manufacturing firm’s SCM system. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 38. In a manufacturing firm’s supply chain management (SCM) system, which area handles credit terms and payment schedules? a. Product flow b. Information flow c. Finances flow d. Stock location flow ANSWER: c RATIONALE: Correct. In a manufacturing firm’s SCM system, handling credit terms, payment schedules, and consignment and title ownership arrangements is part of the finances flow. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 39. Which is considered a key decision in supply chain management (SCM) related to manufacturing? Copyright Cengage Learning. Powered by Cognero.

Page 17


Module 11: Enterprise Systems a. Consumer type b. Initial investment c. Revenue d. Location ANSWER: RATIONALE:

d Correct. Four key decisions in SCM related to manufacturing are location, inventory, production, and transportation. One of the key decisions in SCM is “Where should manufacturing facilities be placed?” See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 40. In supply chain management (SCM) related to manufacturing, which of the following is considered a key decision about inventory? a. Which transportation systems will reduce cost? b. What should be produced? c. How much should be ordered? d. Where should the manufacturing facilities be located? ANSWER: c RATIONALE: Correct. In SCM related to manufacturing, decisions about inventory are taken by considering the following questions: 1) When should an order be placed? 2) How much should be ordered? See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 41. Which vendor offers comprehensive solutions for organizations that do not have in-house resources to develop a supply chain management (SCM) system? a. SAP Copyright Cengage Learning. Powered by Cognero.

Page 18


Module 11: Enterprise Systems b. Sun Microsystems c. Microsoft d. Red Hat ANSWER: RATIONALE:

a Correct. For organizations that do not have in-house resources to develop an SCM system, several vendors offer comprehensive solutions: SAP (www.sap.com/solution/lob/scm/software/overview/highlights.html), Oracle (www.oracle.com/us/solutions/scm/index.htm), JDA Software (www.jda.com), Ariba (www.ariba.com), and Manhattan Associates (www.manh.com). See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 42. In the context of supply chain management (SCM) technologies, _____ enables business partners to send and receive information on business transactions. a. a global positioning system b. a local positioning system c. electronic data interchange d. direct digital synthesis ANSWER: c RATIONALE: Correct. Electronic data interchange (EDI) enables business partners to send and receive information on business transactions. Many companies substitute EDI for printing, mailing, and faxing paper documents, such as purchase orders, invoices, and shipping notices. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 43. In supply chain management (SCM), many companies substitute electronic _____ for printing, mailing, and faxing paper documents, such as purchase orders, invoices, and shipping notices. a. data interchange Copyright Cengage Learning. Powered by Cognero.

Page 19


Module 11: Enterprise Systems b. design automation c. design processing d. data validation ANSWER: RATIONALE:

a Correct. In SCM, many companies substitute electronic data interchange (EDI) for printing, mailing, and faxing paper documents, such as purchase orders, invoices, and shipping notices. By using the Internet and established Web protocols for the electronic exchange of information, companies can improve the efficiency and effectiveness of the supply chain process. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 44. In the context of electronic exchange of information, which is used by companies to improve the efficiency and effectiveness of the supply chain process? a. Really Simple Syndication feeds b. Traditional client-server interfaces c. Paper documents d. The Internet and established Web protocols ANSWER: d RATIONALE: Correct. By using the Internet and established Web protocols for the electronic exchange of information, companies can improve the efficiency and effectiveness of the supply chain process. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 45. Which statement is true of Web-based electronic data interchange (Open EDI)? a. It reduces the cost of transmitting documents. b. It has a disadvantage of being platform dependent. c. It consists of international agreements on privacy protection and data security. Copyright Cengage Learning. Powered by Cognero.

Page 20


Module 11: Enterprise Systems d. It provides more secure data transmission than traditional EDI. ANSWER: a RATIONALE: Correct. Using the Internet and Web protocols for EDI lowers the cost of transmitting documents. This method is called Web-based EDI or Open EDI. It also has the advantage of being platform independent and easy to use. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 46. Which statement is true of electronic data interchange (EDI)? a. It uses proprietary protocols and networks. b. It is more beneficial when there are more companies in its network. c. When Web-based EDI is used, the process of sales forecasting is disrupted. d. When it uses the Internet and Web protocols, the cost of transmitting documents increases. ANSWER: b RATIONALE: Correct. EDI is more beneficial when there are more companies in the EDI network, because when the number of partners is small, the cost per partner is higher. For this reason, large companies tend to insist on their suppliers and distributors becoming part of the same EDI network, which many small suppliers and distributors cannot afford. See 111: Supply Chain Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 47. In the context of supply chain management (SCM) systems, which of the following markup languages has helped organizations use the Internet and Open electronic data interchange (EDI) perform the same function as that of traditional EDI? a. XML b. HTML c. SGML d. SML Copyright Cengage Learning. Powered by Cognero.

Page 21


Module 11: Enterprise Systems ANSWER: RATIONALE:

a Correct. With the advent of XML, organizations can use the Internet and Open EDI to perform the same function that EDI performs, so traditional EDI has declined in popularity. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 48. In the context of Internet-enabled supply chain management (SCM), which SCM activity involves bargaining and renegotiating prices and term agreements? a. Order processing b. Purchasing/procurement c. Production scheduling d. Inventory management ANSWER: b RATIONALE: Correct. In Internet-enabled SCM, purchasing/procurement involves purchasing and paying for goods and services online, bargaining and renegotiating prices and term agreements, and using global procurement strategies. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 49. In the context of Internet-enabled supply chain management (SCM), which of the following SCM activities involves providing real-time stock information and replenishing stock efficiently? a. Customer service b. Advertising scheduling c. Purchasing/procurement d. Inventory management ANSWER: d RATIONALE: Correct. In the context of Internet-enabled SCM, inventory management involves Copyright Cengage Learning. Powered by Cognero.

Page 22


Module 11: Enterprise Systems providing real-time stock information, replenishing stock quickly and efficiently, and tracking out-of-stock items. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 50. In the context of Internet-enabled supply chain management (SCM), which SCM activity involves handling returned goods and out-of-stock notifications to customers? a. Order processing b. Customer service c. Production scheduling d. Inventory management ANSWER: a RATIONALE: Correct. Order processing involves checking order placement and order status, improving the speed and quality of order processing, and handling returned goods and out-of-stock notifications to customers. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 51. In Internet-enabled supply chain management (SCM), activities such as coordinating just-in-time (JIT) inventory programs with vendors and suppliers and conducting customer demand analysis are part of _____. a. production scheduling b. procurement c. inventory management d. order processing ANSWER: a RATIONALE: Correct. Production scheduling involves coordinating JIT inventory programs with vendors and suppliers, coordinating production schedules between companies and their vendors and suppliers, and conducting customer demand analysis. See 11-1: Supply Chain Management Copyright Cengage Learning. Powered by Cognero.

Page 23


Module 11: Enterprise Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 52. Which is an example of an e-marketplace? a. An e-auction b. An internet service provider c. An e-distributor d. A uniform resource locator ANSWER: c RATIONALE: Correct. E-distributors are common examples of e-marketplaces. An e-distributor is a marketplace owned and operated by a third party that provides an electronic catalog of products. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 53. A company can purchase a maintenance, repair, and operation (MRO) package that might include services from different vendors, but an e-distributor coordinates them into one package for customers. This packaging is an example of a _____ market. a. vertical b. targeted c. horizontal d. database ANSWER: c RATIONALE: Correct. A company can purchase an MRO package that might include services from different vendors, but an e-distributor coordinates them into one package for customers. This packaging is an example of a horizontal market, which concentrates on coordinating a business process or function involving multiple vendors. See 11-1: Supply Chain Management POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 24


Module 11: Enterprise Systems DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 54. In the context of e-marketplaces, a _____ market concentrates on coordinating a business process or function involving multiple vendors. a. horizontal b. labor c. diagonal d. hierarchical ANSWER: a RATIONALE: Correct. A horizontal market concentrates on coordinating a business process or function involving multiple vendors. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 55. Which statement is true of an e-distributor? a. An e-distributor offers fast delivery of a wide selection of products and services. b. An e-distributor provides products and services at high prices. c. An e-distributor offers services from different vendors in separate packages. d. An e-distributor is responsible for distributing a handheld catalog of products. ANSWER: a RATIONALE: Correct. E-distributors offer fast delivery of a wide selection of products and services, usually at lower prices, and they help companies reduce the time and expense of searching for goods. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 25


Module 11: Enterprise Systems LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 56. Which is an example of a third-party exchange? a. Twitter.com b. WordPress.com c. Expedia.com d. Farms.com ANSWER: d RATIONALE: Correct. Farms.com is an example of a third-party exchange. Buyers can gather information on products and sellers, and sellers have access to more potential buyers. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 57. _____ help determine the price of goods and services when there is no set price in the marketplace. a. Bargains b. Auctions c. Barters d. Budgets ANSWER: b RATIONALE: Correct. Auctions help determine the price of goods and services when there is no set price in the marketplace. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM Copyright Cengage Learning. Powered by Cognero.

Page 26


Module 11: Enterprise Systems 58. An online auction is based on the _____, which brings buyers and sellers together in a virtual marketplace. a. franchise model b. recurring revenue business model c. brokerage business model d. subscription model ANSWER: c RATIONALE: Correct. An online auction is based on the brokerage business model, which brings buyers and sellers together in a virtual marketplace. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 59. Which statement is true of auctions? a. The organization hosting an auction collects transaction fees for the service. b. The number of goods sold via traditional auctions is higher than that sold via online auctions. c. Goods already having a set price in the marketplace are usually auctioned. d. Online auctions are based on the barter business model. ANSWER: a RATIONALE: Correct. Typically, the organization hosting an online auction collects transaction fees for the service. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 60. Online auctions are: a. cost-effective for selling excessive inventory. b. based on the barter business model. c. used to bring buyers and sellers together in a real marketplace. d. useful when goods already have a set price in the marketplace. ANSWER: a Copyright Cengage Learning. Powered by Cognero.

Page 27


Module 11: Enterprise Systems RATIONALE:

Correct. Online auctions are particularly cost-effective for selling excessive inventory. Auctions help determine the price of goods and services when there is no set price in the marketplace. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 61. In a(n) _____ auction, companies invite sellers to submit bids for products and services so that the buyer can choose the seller that offers the service or product at the lowest price. a. minimum bid b. absolute c. no reserve d. reverse ANSWER: d RATIONALE: Correct. Some companies use reverse auctions, which invite sellers to submit bids for products and services. By using the Internet, an online auction brings traditional auctions to customers around the globe and makes it possible to sell far more goods and services than at a traditional auction. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 62. Which statement is true of collaborative planning, forecasting, and replenishment (CPFR)? a. It aims to improve operational efficiency and manage inventory. b. It ensures that the accessibility of data collected with a point-of-sale system is not shared among the supply chain members. c. It ensures that inventory and sales data are not shared across the supply chain. d. It increases merchandising and logistics costs for all supply chain members. ANSWER: a RATIONALE: Correct. The goal of CPFR is to improve operational efficiency and manage inventory. With a structured process of sharing information among supply chain members, retailers Copyright Cengage Learning. Powered by Cognero.

Page 28


Module 11: Enterprise Systems can compare customer demands or sales forecasts with a manufacturer’s order forecast, for example. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 63. In the context of collaborative planning, forecasting, and replenishment (CPFR), handling unforeseen problems is called _____ management. a. sales b. design c. marketing d. exception ANSWER: d RATIONALE: Correct. Handling unforeseen problems is called “exception management,” and lessons learned during this process can be used in future planning. Even with an agreement in place, unforeseen problems can crop up, so planning for these exceptions is important. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 64. Which of the following systems’ goal is to improve services offered to clients and use client contact information for targeted marketing? a. An integrated marketing communication system b. A supply chain management system c. A customer relationship management system d. An enterprise resource planning system ANSWER: c RATIONALE: Correct. The main goal of a customer relationship management (CRM) system is to improve services offered to customers and use customer contact information for targeted marketing. Businesses know that keeping and maintaining current customers is less Copyright Cengage Learning. Powered by Cognero.

Page 29


Module 11: Enterprise Systems expensive than attracting new customers, and an effective CRM system is useful in meeting this goal. See 11-2: Customer Relationship Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe customer relationship management systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management Customer relationship management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 65. In a customer relationship management (CRM) system, marketing strategies focus on: a. long-term relationships with customers. b. transactions with customers. c. organizing contacts with business partners. d. abiding government regulations. ANSWER: a RATIONALE: Correct. Marketing strategies in a CRM system focus on long-term relationships with customers instead of transactions. To get the most out of these strategies, a CRM system helps organizations make better use of data, information, and knowledge to understand their customers. See 11-2: Customer Relationship Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe customer relationship management systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management Customer relationship management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 66. In a customer relationship management (CRM) system, e-commerce sites use _____ to confirm items purchased. a. extranets b. e-mail c. spectra d. data-mining tools ANSWER: b RATIONALE: Correct. E-commerce sites use e-mail to confirm items purchased, confirm shipping arrangements, and send notifications on new products and services. See 11-2: Customer Relationship Management Copyright Cengage Learning. Powered by Cognero.

Page 30


Module 11: Enterprise Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe customer relationship management systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management Customer relationship management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 6:52 PM 67. In a customer relationship management (CRM) system, which is effective in tracking and analyzing customers’ buying patterns? a. Web portals b. Data-mining tools c. Extranets d. Firewall networks ANSWER: b RATIONALE: Correct. Database systems, data warehouses, and data-mining tools are effective in tracking and analyzing customers’ buying patterns, which helps businesses meet customers’ needs. See 11-2: Customer Relationship Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe customer relationship management systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management Customer relationship management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 68. In the context of customer relationship management (CRM) applications, which approach is often chosen by organizations with an established IT infrastructure? a. Subscription-oriented CRM b. Cloud-based CRM c. Web-based CRM d. On-premises CRM ANSWER: d RATIONALE: Correct. Organizations with an established IT infrastructure often choose an on-premises CRM, which is implemented much like any other IT system. See 11-2: Customer Relationship Management POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 31


Module 11: Enterprise Systems DIFFICULTY: Easy REFERENCES: Describe customer relationship management systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 6:53 PM 69. Which feature of a customer relationship management (CRM) application assists with tasks such as controlling inventory and processing orders? a. Salesforce automation b. Web-based CRM c. Survey management d. Automated customer service ANSWER: a RATIONALE: Correct. Salesforce automation assists with tasks such as controlling inventory, processing orders, tracking customer interactions, and analyzing sales forecasts and performance. It also assists with collecting, storing, and managing sales contacts and leads. See 11-2: Customer Relationship Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe customer relationship management systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 70. In the context of customer relationship management (CRM), _____ requires gathering a lot of information about customers’ preferences and shopping patterns. a. idealization b. localization c. personalization d. visualization ANSWER: c RATIONALE: Correct. Using personalization requires gathering a lot of information about customers’ preferences and shopping patterns, and some customers get impatient with answering long surveys about their preferences. See 11-2: Customer Relationship Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe customer relationship management systems. Copyright Cengage Learning. Powered by Cognero.

Page 32


Module 11: Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 71. _____ is a search for specific information or patterns using input from multiple business partners and data sources. a. Sales configuring b. Cross merchandising c. Collaborative filtering d. Order revival ANSWER: c RATIONALE: Correct. Collaborative filtering is a search for specific information or patterns using input from multiple business partners and data sources. It identifies groups of people based on common interests and recommends products or services based on what members of the group purchased or did not purchase. See 11-2: Customer Relationship Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe customer relationship management systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 72. In the context of personalization technology, which of the following is a drawback of collaborative filtering (CF)? a. It cannot work well for a single product category. b. It needs a large sample of users and content to work well. c. It accepts inputs from only one data source at a time. d. It cannot make automatic predictions about customers’ interests. ANSWER: b RATIONALE: Correct. One drawback of CF is that it needs a large sample of users and content to work well. In addition, it is not useful for making recommendations across unrelated categories, such as predicting that customers who liked a certain CD would also like a particular computer. See 11-2: Customer Relationship Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe customer relationship management systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.2 Copyright Cengage Learning. Powered by Cognero.

Page 33


Module 11: Enterprise Systems TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Customer relationship management Understand 12/5/2019 11:53 AM 12/5/2019 11:53 AM

73. Which technique is used to improve customer relationship management (CRM) systems by identifying, storing, and disseminating facts about how to perform tasks? a. Sales automation b. Collaborative filtering c. Order processing d. Knowledge management ANSWER: d RATIONALE: Correct. Knowledge management (KM) is a technique used to improve CRM systems (and many other systems) by identifying, storing, and disseminating “know-how”-facts about how to perform tasks. See 11-3: Knowledge Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe knowledge management systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.3 TOPICS: Knowledge management Knowledge management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 74. Personal or informal knowledge is referred to as _____. a. explicit knowledge b. absolute knowledge c. comprehensive knowledge d. tacit knowledge ANSWER: d RATIONALE: Correct. Personal or informal knowledge is referred to as tacit knowledge. See 11-3: Knowledge Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe knowledge management systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.3 TOPICS: Knowledge management Knowledge management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM Copyright Cengage Learning. Powered by Cognero.

Page 34


Module 11: Enterprise Systems DATE MODIFIED:

12/5/2019 11:53 AM

75. Which tool is used to create virtual instructional environments? a. PicMarkr b. Scribus c. BibDesk d. WebEx ANSWER: d RATIONALE: Correct. WebEx is a tool used to create virtual instructional environments. Knowledge that someone has gained through experience might vary depending on the situation in which it was used-the context. Typically, the best way to gather this information is interactively, such as asking the employee specific questions about how he or she would handle an issue. See 11-3: Knowledge Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe knowledge management systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.3 TOPICS: Knowledge management Knowledge management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 76. A knowledge management system should help an organization: a. increase revenue by reducing the delivery time for products and services. b. promote automated downloads of data on product pricing and availability. c. capture, store, process, and display information in a geographic context. d. provide inventory status and inventory forecasts. ANSWER: a RATIONALE: Correct. A knowledge management system should help an organization do one or more of the following: 1) Promote innovation by encouraging the free exchange of ideas. 2) Improve customer service by reducing response time. 3) Increase revenue by reducing the delivery time for products and services. 4) Improve employee retention rates by rewarding employees for their knowledge. See 11-3: Knowledge Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe knowledge management systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.3 TOPICS: Knowledge management Knowledge management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM Copyright Cengage Learning. Powered by Cognero.

Page 35


Module 11: Enterprise Systems DATE MODIFIED:

12/5/2019 11:53 AM

77. In the context of knowledge management, which task is performed by the chief knowledge officer (CKO) in an organization? a. Ensuring that key knowledge resources are properly collected, stored, and disseminated among the consumers b. Ensuring that the organization profits from knowledge resources c. Focusing on gaining and leveraging a keen understanding of consumers d. Identifying groups of people based on common interests and recommending products or services ANSWER: b RATIONALE: Correct. The CKO ensures that the organization profits from knowledge resources, including its employees, its processes, and its intellectual property. He/she makes sure that key knowledge resources are properly collected, stored, and disseminated among the key decision makers. See 11-3: Knowledge Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe knowledge management systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.3 TOPICS: Knowledge management Knowledge management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 78. The _____ component of an enterprise resource planning (ERP) system collects and analyzes relevant internal and external information needed by other functions. a. unified database b. supply chain c. accounting d. e-commerce ANSWER: a RATIONALE: Correct. The unified database component of an ERP system collects and analyzes relevant internal and external data and information needed by other functions. See 11-4: Enterprise Resource Planning POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe enterprise resource planning systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.4 TOPICS: Enterprise resource planning Enterprise resource planning systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM Copyright Cengage Learning. Powered by Cognero.

Page 36


Module 11: Enterprise Systems DATE MODIFIED:

12/5/2019 11:53 AM

79. Which of the following components of an enterprise resource planning (ERP) system provides information on assessing job candidates? a. The human resources b. The supply chain c. The unified database d. The customer relationship management ANSWER: a RATIONALE: Correct. The human resources component of an ERP system provides information on assessing job candidates, scheduling and assigning employees, and predicting future personnel needs. See 11-4: Enterprise Resource Planning POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe enterprise resource planning systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.4 TOPICS: Enterprise resource planning Enterprise resource planning systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 80. Which component of an enterprise resource planning (ERP) system provides information related to e-procurement? a. The purchasing component b. The vendor integration component c. The human resources component d. The accounting component ANSWER: a RATIONALE: Correct. The purchasing component of an ERP system provides information related to the purchasing function, including e-procurement. See 11-4: Enterprise Resource Planning POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe enterprise resource planning systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.4 TOPICS: Enterprise resource planning Enterprise resource planning systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 81. Which component of an enterprise resource planning (ERP) system tracks financial information, such as budget Copyright Cengage Learning. Powered by Cognero.

Page 37


Module 11: Enterprise Systems allocations and debits and credits? a. The purchasing component b. The vendor integration component c. The human resources component d. The accounting component ANSWER: d RATIONALE: Correct. The accounting component of an ERP system tracks financial information, such as budget allocations and debits and credits. See 11-4: Enterprise Resource Planning POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe enterprise resource planning systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.4 TOPICS: Enterprise resource planning Enterprise resource planning systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 82. Which component of an enterprise resource planning (ERP) system provides business-to-consumer (B2C) information related to order status and business-to-business (B2B) information related to suppliers and business partners? a. The customer relationship management b. The vendor integration c. The unified database d. The e-commerce ANSWER: d RATIONALE: Correct. The e-commerce component of an ERP system provides B2C information related to order status and B2B information related to suppliers and business partners. See 11-4: Enterprise Resource Planning POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe enterprise resource planning systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.4 TOPICS: Enterprise resource planning Enterprise resource planning systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 83. Which component of an enterprise resource planning (ERP) system provides information on marketing? a. The purchasing component b. The sales component Copyright Cengage Learning. Powered by Cognero.

Page 38


Module 11: Enterprise Systems c. The manufacturing component d. The accounting component ANSWER: b RATIONALE: Correct. The sales component of an ERP system provides information on sales and marketing. See 11-4: Enterprise Resource Planning POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe enterprise resource planning systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.4 TOPICS: Enterprise resource planning Enterprise resource planning systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 84. Which is a benefit offered by a well-designed enterprise resource planning (ERP) system? a. Increased timeliness of integrated information b. Better compatibility with legacy systems c. Increased ease of installation d. Reduced costs ANSWER: a RATIONALE: Correct. A well-designed ERP system offers the following benefits: increased availability and timeliness of integrated information, increased data accuracy and improved response time, improved customer satisfaction, improved employee satisfaction, improved planning and scheduling, improved supplier relationship, improved reliability of information, reduction in inventory costs, reduction in labor costs, and reduction in order-to-fulfillment time. See 11-4: Enterprise Resource Planning POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe enterprise resource planning systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.4 TOPICS: Enterprise resource planning Enterprise resource planning systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 85. Which is true of an enterprise resource planning (ERP) system? a. It has compatibility problems with legacy systems. b. It results in increased labor costs. c. It increases order-to-fulfillment time. Copyright Cengage Learning. Powered by Cognero.

Page 39


Module 11: Enterprise Systems d. It reduces data accuracy and results in slow response time. ANSWER: a RATIONALE: Correct. An ERP system has drawbacks, such as high cost, difficulties in installation, a need for extensive training, and compatibility problems with legacy systems. See 11-4: Enterprise Resource Planning POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe enterprise resource planning systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.4 TOPICS: Enterprise resource planning Enterprise resource planning systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 86. A(n) _____ system is an application used in all the functions of a business and supports decision making throughout the organization. a. enterprise b. collaboration c. decentralized d. analog ANSWER: a RATIONALE: An enterprise system is an application used in all the functions of a business and supports decision making throughout the organization. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 87. A _____ is an integrated network consisting of an organization, its vendors, transportation companies, and brokers used to deliver goods and services to customers. a. supply chain b. performance tracker c. database system d. resource hub ANSWER: a RATIONALE: A supply chain is an integrated network consisting of an organization, its suppliers, Copyright Cengage Learning. Powered by Cognero.

Page 40


Module 11: Enterprise Systems transportation companies, and brokers used to deliver goods and services to customers. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 88. In the context of a manufacturing firm’s supply chain management (SCM) system, the _____ flow area manages the movement of goods all the way from suppliers to customers, including customer service and support. a. product b. information c. finances d. statistics ANSWER: a RATIONALE: Product flow involves managing the movement of goods all the way from suppliers to customers, including customer service and support. An SCM system must manage communication in various areas as part of overseeing the manufacturing process and managing inventory and delivery. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 89. The _____ flow area in a manufacturing firms’ supply chain management (SCM) system oversees order transmissions throughout the order-processing cycle. a. product b. information c. finances d. cash ANSWER: b RATIONALE: Information flow oversees order transmissions and delivery status updates throughout the order-processing cycle. An SCM system must manage communication in various areas as part of overseeing the manufacturing process and managing inventory and delivery. See Copyright Cengage Learning. Powered by Cognero.

Page 41


Module 11: Enterprise Systems 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 90. Hosting services are now available for supply chain management (SCM) systems. This trend is called _____ as a service. a. platform b. infrastructure c. software d. network ANSWER: c RATIONALE: Hosting services are now available for supply chain management (SCM) systems. This trend is called “software as a service.” For organizations that do not have in-house resources to develop an SCM system, several vendors offer comprehensive solutions. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 91. An _____ is a third-party exchange that provides a platform for buyers and sellers to interact with each other and trade more efficiently online. a. e-marketplace b. e-host c. e-exhibition d. e-media ANSWER: a RATIONALE: An e-marketplace is a third-party exchange that provides a platform for buyers and sellers to interact with each other and trade more efficiently online. E-distributors are common examples of e-marketplaces. See 11-1: Supply Chain Management POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 42


Module 11: Enterprise Systems DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 92. _____ is used to coordinate supply chain members through point-of-sale (POS) data sharing and joint planning. a. Confidentiality, integrity, and availability b. Electronic data interchange c. Customer relationship management d. Collaborative planning, forecasting, and replenishment ANSWER: d RATIONALE: Collaborative planning, forecasting, and replenishment is used to coordinate supply chain members through POS data sharing and joint planning. In other words, any data collected with POS systems is shared with all members of the supply chain, which is useful in coordinating production and planning for inventory needs. See 11-1: Supply Chain Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 93. _____ consists of the processes a company uses to track and organize its contacts with consumers. a. Customer relationship management b. Production management c. The partnership model d. The strategic management model ANSWER: a RATIONALE: Customer relationship management (CRM) consists of the processes a company uses to track and organize its contacts with customers. The main goal of a CRM system is to improve services offered to customers and use customer contact information for targeted marketing. See 11-2: Customer Relationship Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe customer relationship management systems. Copyright Cengage Learning. Powered by Cognero.

Page 43


Module 11: Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 94. _____ is a practice where a store sends coupons to a customer, who has already bought a product from the store, for a more expensive brand of the same product, in the hope that the customer would prefer the expensive brand. a. Proactive selling b. Upselling c. Cross-selling d. Versatile selling ANSWER: b RATIONALE: Upselling is a practice where a store sends coupons to a customer, who has already bought a product from the store, for a more expensive brand of the same product, in the hope that the customer would prefer the expensive brand. See 11-2: Customer Relationship Management POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe customer relationship management systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 95. In the context of customer relationship management, _____ assists with tasks such as tracking customer interactions and analyzing sales forecasts. a. salesforce automation b. eCRM c. survey management d. automated customer service ANSWER: a RATIONALE: Salesforce automation assists with tasks such as controlling inventory, processing orders, tracking customer interactions, and analyzing sales forecasts and performance. It also assists with collecting, storing, and managing sales contacts and leads. See 11-2: Customer Relationship Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe customer relationship management systems. QUESTION TYPE: Multiple Choice Copyright Cengage Learning. Powered by Cognero.

Page 44


Module 11: Enterprise Systems HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 96. In the context of customer relationship management, _____ is used to manage call centers and help desks. a. salesforce automation b. eCRM c. survey management d. automated customer service ANSWER: d RATIONALE: Automated customer service is used to manage call centers and help desks and can sometimes answer customers’ queries automatically. See 11-2: Customer Relationship Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe customer relationship management systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 97. _____ allows customers to modify the standard offering, such as selecting a different home page to be displayed each time you open your Web browser. a. Customization b. Virtualization c. Optimization d. Idealization ANSWER: a RATIONALE: Customization allows customers to modify the standard offering, such as selecting a different home page to be displayed each time you open your Web browser. See 11-2: Customer Relationship Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe customer relationship management systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 45


Module 11: Enterprise Systems DATE CREATED: DATE MODIFIED:

12/5/2019 11:53 AM 12/5/2019 11:53 AM

98. _____ is an executive position created for overseeing knowledge management within an organization. a. Lead knowledge worker b. Lead knowledge mobilizer c. Chief knowledge officer d. Chief knowledge programmer ANSWER: c RATIONALE: Because of the importance of knowledge, knowledge management, and knowledge management systems, some organizations have created an executive position called chief knowledge officer. This individual is responsible for overseeing knowledge management within an organization. See 11-3: Knowledge Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe knowledge management systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.3 TOPICS: Knowledge management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 99. _____ is an integrated system that collects and processes data and manages and coordinates resources, information, and functions throughout an organization. a. Enterprise resource planning b. Enterprise application integration c. Strategic human resource planning d. Human resource integration management ANSWER: a RATIONALE: Enterprise resource planning (ERP) is an integrated system that collects and processes data and manages and coordinates resources, information, and functions throughout an organization. A typical ERP system has many components, including hardware, software, procedures, and input from all functional areas. See 11-4: Enterprise Resource Planning POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe enterprise resource planning systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.4 TOPICS: Enterprise resource planning KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM Copyright Cengage Learning. Powered by Cognero.

Page 46


Module 11: Enterprise Systems 100. In an enterprise resource planning (ERP) system, the _____ component provides information on production costs and pricing. a. sales b. inventory management c. vendor integration d. manufacturing ANSWER: d RATIONALE: In an ERP system, the manufacturing component provides information on production costs and pricing. See 11-4: Enterprise Resource Planning POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe enterprise resource planning systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.4 TOPICS: Enterprise resource planning KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 101. When choosing an enterprise system, organizations can choose between a cloud system and a(n) _____ system. a. e-mail based b. face-to-face c. on-premise d. distributed ANSWER: c RATIONALE: Organizations have two options for choosing an enterprise system such as SCM, CRM, or ERP. They can either choose the on-premise option or the cloud version. See 11-5: CloudBased Enterprise Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain advantages and disadvantages of cloud-based enterprise systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.5 TOPICS: cloud-based enterprise systems KEYWORDS: Understand DATE CREATED: 12/6/2019 9:54 AM DATE MODIFIED: 12/6/2019 10:06 AM 102. A cloud-based enterprise system offers more _____ than traditional computing methods. a. accuracy b. flexibility and scale c. customization Copyright Cengage Learning. Powered by Cognero.

Page 47


Module 11: Enterprise Systems d. personalization ANSWER: RATIONALE:

b Correct. For the most part, advantages and disadvantages of cloud computing in general apply to enterprise systems as well, with minor differences. The specific advantages include flexibility and scale: Cloud computing offers much more flexibility and scale than traditional computing methods. It can offer vertical as well as horizontal flexibility and scale. See 11-5: Cloud-Based Enterprise Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain advantages and disadvantages of cloud-based enterprise systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.5 TOPICS: cloud-based enterprise systems KEYWORDS: Understand DATE CREATED: 12/6/2019 10:06 AM DATE MODIFIED: 12/6/2019 10:10 AM 103. A cloud-based enterprise system allows IT to focus on _____. a. innovation and growing the business b. constant server updates and other computing issues c. hardware requirements d. software updates ANSWER: a RATIONALE: Correct. For the most part, advantages and disadvantages of cloud computing in general apply to enterprise systems as well, with minor differences. The specific advantages include allowing IT to shift focus: No longer having to worry about constant server updates and other computing issues, the adopting organization will be free to concentrate on innovation and growing the business. Mission-critical applications become the main focus. See 11-5: Cloud-Based Enterprise Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain advantages and disadvantages of cloud-based enterprise systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.5 TOPICS: cloud-based enterprise systems KEYWORDS: Understand DATE CREATED: 12/6/2019 10:10 AM DATE MODIFIED: 12/6/2019 10:13 AM 104. Using a cloud-based enterprise system, organizations can store _____ data as they can on a private computer system. a. less b. more Copyright Cengage Learning. Powered by Cognero.

Page 48


Module 11: Enterprise Systems c. identical d. complementary ANSWER: RATIONALE:

b Correct. For the most part, advantages and disadvantages of cloud computing in general apply to enterprise systems as well, with minor differences. The specific advantages include increased storage: Organizations can store more data than on private computer systems and storage can grow as the organization grows. See 11-5: Cloud-Based Enterprise Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain advantages and disadvantages of cloud-based enterprise systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.5 TOPICS: cloud-based enterprise systems KEYWORDS: Understand DATE CREATED: 12/6/2019 10:13 AM DATE MODIFIED: 12/6/2019 10:17 AM 105. Identify one advantage of cloud-based enterprise systems as compared to on-premise systems. a. Security b. Customization c. Automation d. Vendor lock-in ANSWER: c RATIONALE: Correct. For the most part, advantages and disadvantages of cloud computing in general apply to enterprise systems as well, with minor differences. The specific advantages include flexibility and scale: Cloud computing offers much more flexibility and scale than traditional computing methods. It can offer vertical as well as horizontal flexibility and scale. See 11-5: Cloud-Based Enterprise Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain advantages and disadvantages of cloud-based enterprise systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.5 TOPICS: cloud-based enterprise systems KEYWORDS: Understand DATE CREATED: 12/6/2019 10:17 AM DATE MODIFIED: 12/6/2019 10:20 AM 106. When considering the security aspect of cloud-based enterprise systems, it's important to consider that cloud providers will store _____ copies of your data. a. less secure b. altered Copyright Cengage Learning. Powered by Cognero.

Page 49


Module 11: Enterprise Systems c. improved d. multiple ANSWER: RATIONALE:

d Correct. For the most part, advantages and disadvantages of cloud computing in general apply to enterprise systems as well, with minor differences. The specific advantages include improved security. You should remember that most providers of cloud services will have multiple copies of your data for redundancy, often in different geographic locations. Therefore, it is highly unlikely that they will lose your data. See 11-5: Cloud-Based Enterprise Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain advantages and disadvantages of cloud-based enterprise systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.5 TOPICS: cloud-based enterprise systems KEYWORDS: Understand DATE CREATED: 12/6/2019 10:21 AM DATE MODIFIED: 12/6/2019 10:24 AM 107. When considering the mobility aspect of cloud-based enterprise systems, it's important to consider that with a cloudbased system, employee can access information from _____. a. wherever they are b. company headquarters c. any computer within one mile of company headquarters d. an intranet ANSWER: a RATIONALE: Correct. For the most part, advantages and disadvantages of cloud computing in general apply to enterprise systems as well, with minor differences. The specific advantages include increased mobility: Employees can access information wherever they are, rather than having to remain at their desks. It offers true portability for both data and application. See 11-5: Cloud-Based Enterprise Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain advantages and disadvantages of cloud-based enterprise systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.5 TOPICS: cloud-based enterprise systems KEYWORDS: Understand DATE CREATED: 12/6/2019 10:30 AM DATE MODIFIED: 12/6/2019 10:33 AM 108. A cloud-based enterprise system is accessed through _____. Copyright Cengage Learning. Powered by Cognero.

Page 50


Module 11: Enterprise Systems a. on-premise servers b. remote servers c. a unified database d. a customer relationship management system ANSWER: b RATIONALE: Correct. Cloud computing is accessed through remote servers and customers use it similarly as utility services. Cloud providers are responsible for providing hardware, software, and other needed utility programs. See 11-5: Cloud-Based Enterprise Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain advantages and disadvantages of cloud-based enterprise systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.11.5 TOPICS: cloud-based enterprise systems KEYWORDS: Understand DATE CREATED: 12/6/2019 10:34 AM DATE MODIFIED: 12/6/2019 10:36 AM Essay 109. Discuss the functions coordinated by a supply chain management (SCM) system. ANSWER: Answers will vary. An SCM system coordinates the following functions: a. Procuring materials (in service organizations, this can include resources and information) b. Transforming materials into intermediate and finished products or services c. Distributing finished products or services to customers POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 110. Discuss some of the processes in which electronic data interchange (EDI) expedites the delivery of accurate information. ANSWER: Answers will vary. EDI expedites the delivery of accurate information in the following processes, among others: a. Transaction acknowledgments b. Financial reporting c. Invoice and payment processing Copyright Cengage Learning. Powered by Cognero.

Page 51


Module 11: Enterprise Systems d. Order status e. Purchasing f. Shipping and receiving g. Inventory management and sales forecasting POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 111. Discuss how electronic data interchange (EDI) is more beneficial when there are more companies in the EDI network. ANSWER: Answers will vary. EDI is more beneficial when there are more companies in the EDI network, because when the number of partners is small, the cost per partner is higher. For this reason, large companies tend to insist on their suppliers and distributors becoming part of the same EDI network, which many small suppliers and distributors cannot afford. With the advent of XML, organizations can use the Internet and Open EDI to perform the same function that EDI performs, so traditional EDI has declined in popularity. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 112. Discuss the supply chain management (SCM) activities that can be improved by Internet-enabled SCM. ANSWER: Answers will vary. Internet-enabled SCM can improve the following SCM activities: a. Purchasing/procurement: Purchasing and paying for goods and services online, bargaining and renegotiating prices and term agreements, using global procurement strategies b. Inventory management: Providing real-time stock information, replenishing stock quickly and efficiently, tracking out-of-stock items c. Transportation: Allowing customers to use the Internet for shipping and delivery information d. Order processing: Checking order placement and order status, improving the speed and quality of order processing, handling returned goods and out-of-stock notifications to Copyright Cengage Learning. Powered by Cognero.

Page 52


Module 11: Enterprise Systems customers e. Customer service: Responding to customers’ complaints, issuing notifications (such as product recalls), providing around-the-clock customer service f. Production scheduling: Coordinating just-in-time inventory programs with vendors and suppliers, coordinating production schedules between companies and their vendors and suppliers, conducting customer demand analysis POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 113. Describe the ways by which e-marketplaces help businesses maintain a competitive edge in the supply chain. ANSWER: Answers will vary. E-marketplaces help businesses maintain a competitive edge in the supply chain in the following ways: a. Providing opportunities for sellers and buyers to establish new trading partnerships b. Providing a single platform for prices, availability, and stock levels that is accessible to all participants c. Solving time-constraint problems for international trade and making it possible to conduct business around the clock d. Making it easy to compare prices and products from a single source instead of spending time contacting each seller e. Reducing marketing costs more than traditional sales channels can POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 114. Describe an e-distributor. ANSWER: Answers will vary. An e-distributor is a marketplace owned and operated by a third party that provides an electronic catalog of products. For example, an e-distributor might offer a catalog containing a variety of hardware and software products so that a network administrator can order all the equipment and applications needed for an organization’s network instead of purchasing components from several different vendors. Another Copyright Cengage Learning. Powered by Cognero.

Page 53


Module 11: Enterprise Systems common offering from e-distributors is maintenance, repair, and operations (MROs) services; a company can purchase an MRO package that might include services from different vendors, but the e-distributor coordinates them into one package for customers. This packaging is an example of a horizontal market, which concentrates on coordinating a business process or function involving multiple vendors. E-distributors offer fast delivery of a wide selection of products and services, usually at lower prices, and they help companies reduce the time and expense of searching for goods. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 115. Explain third-party exchanges. ANSWER: Answers will vary. Third-party exchanges bring together buyers and sellers in vertical and horizontal markets. Buyers can gather information on products and sellers, and sellers have access to more potential buyers. Examples of third-party exchanges include PowerSource Online (www.powersourceonline.com) and Farms.com (www.farms.com). POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 116. Discuss collaborative planning, forecasting, and replenishment (CPFR) and its advantages. ANSWER: Answers will vary. CPFR is used to coordinate supply chain members through point-ofsale (POS) data sharing and joint planning. In other words, any data collected with POS systems is shared with all members of the supply chain, which is useful in coordinating production and planning for inventory needs. The goal is to improve operational efficiency and manage inventory. CPFR has the advantage of decreasing merchandising, inventory, and logistics costs for all supply chain members. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain how supply chain management is used within an organization. Copyright Cengage Learning. Powered by Cognero.

Page 54


Module 11: Enterprise Systems QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.1 TOPICS: Supply chain management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 117. Briefly explain the marketing strategies in a customer relationship management (CRM) system. ANSWER: Answers will vary. Marketing strategies in a CRM system focus on long-term relationships with customers instead of transactions. These strategies include identifying customer segments, improving products and services to meet customers’ needs, improving customer retention, and identifying a company’s most profitable (and loyal) customers. To get the most out of these strategies, a CRM system helps organizations make better use of data, information, and knowledge to understand their customers. A CRM system captures information about customer interactions for sales personnel and customer service representatives so that they can perform their jobs more effectively and efficiently. This information can include customers’ preferences, background, income, gender, and education. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe customer relationship management systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 118. Discuss how customer relationship management (CRM) is more than just tracking and organizing contacts with customers. ANSWER: Answers will vary. CRM is more than just tracking and organizing contacts with customers. It gives organizations more complete pictures of their customers. CRM systems include tools for conducting complex analyses on customer data, such as a data warehouse and data-mining tools. With these systems, organizations can integrate demographic and other external data with customers’ transaction data to better understand customer behavior. Based on this analysis, organizations can better target products to customers and manage customer issues, which increases customer satisfaction and retention. In addition, organizations can classify customers based on how valuable they are to the organization and manage them accordingly. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe customer relationship management systems. QUESTION TYPE: Essay Copyright Cengage Learning. Powered by Cognero.

Page 55


Module 11: Enterprise Systems HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 119. Discuss what an organization can do with a customer relationship management (CRM) system. ANSWER: Answers will vary. With a CRM system, an organization can do the following: a. Provide services and products that meet customers’ needs. b. Offer better customer service through multiple channels (traditional as well as the Internet). c. Increase cross-selling and upselling of products to increase revenue from existing customers. d. Help sales personnel close deals faster by offering data on customers’ backgrounds. e. Retain existing customers and attract new ones. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe customer relationship management systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 120. In the context of customer relationship management (CRM), discuss how IT tools are used to improve customer service. ANSWER: Answers will vary. Several IT tools are used to improve customer service. For example, email, the Internet, Web portals, and automated call centers have played a major role in CRM systems. E-commerce sites use e-mail to confirm items purchased, confirm shipping arrangements, and send notifications on new products and services. Web portals and extranets, such as FedEx.com, allow customers to perform tasks, such as checking the status of shipments and arranging a package pickup. Database systems, data warehouses, and data-mining tools are effective in tracking and analyzing customers’ buying patterns, which helps businesses meet customers’ needs. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe customer relationship management systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management Copyright Cengage Learning. Powered by Cognero.

Page 56


Module 11: Enterprise Systems KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 12/5/2019 11:53 AM 12/5/2019 11:53 AM

121. In the context of customer relationship management (CRM) applications, describe eCRM. ANSWER: Answers will vary. eCRM or Web-based CRM allows Web-based customer interaction and is used to automate e-mail, call logs, Web site analytics, and campaign management. Companies use campaign management to customize marketing campaigns, such as designing a marketing campaign tailored to customers in southern California or customers in the 18-35 age bracket. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe customer relationship management systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 122. In the context of customer relationship management, briefly explain the process of personalization. ANSWER: Answers will vary. Personalization is the process of satisfying customers’ needs, building customer relationships, and increasing profits by designing goods and services that meet customers’ preferences better. It involves not only customers’ requests but also the interaction between customers and the company. Some Web sites tailor content based on customers’ interests and preferences. Amazon, for example, suggests products you might enjoy, based on your past browsing and purchasing habits. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe customer relationship management systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 123. Describe customization with an example. ANSWER: Answers will vary. Customization allows customers to modify the standard offering, such as selecting a different home page to be displayed each time a user opens his or her Web browser. As an example, after registering with Yahoo!, the user can customize the start page by choosing his or her preferred layout, content, and colors. The user can find many examples of customization in retail, too, such as Build-A-Bear Workshops where children Copyright Cengage Learning. Powered by Cognero.

Page 57


Module 11: Enterprise Systems can design their own teddy bears, or Nike, which allows customers to create their own shoes by selecting styles and colors. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe customer relationship management systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 124. Discuss an example of an application for collaborative filtering (CF). ANSWER: Answers will vary. One application of collaborative filtering is making automatic predictions about customers’ preferences and interests based on similar users. For example, if a user rates several movies and is then added to a database that contains other users’ ratings, a CF system can predict the user’s ratings for movies that he or she has not evaluated. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe customer relationship management systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.2 TOPICS: Customer relationship management KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 125. Discuss the importance of interaction in managing tacit knowledge. ANSWER: Answers will vary. Interaction is a key part of managing tacit knowledge. A knowledge management system must encourage open communication and the exchange of ideas, typically via e-mails, instant messaging, internal company wikis, videoconferencing, and tools such as WebEx or GoToMeeting, which create virtual instructional environments. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe knowledge management systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.3 TOPICS: Knowledge management Copyright Cengage Learning. Powered by Cognero.

Page 58


Module 11: Enterprise Systems KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 12/5/2019 11:53 AM 12/5/2019 11:53 AM

126. In the context of a knowledge management system, discuss how organizations can motivate employees to share their knowledge. ANSWER: Answers will vary. Employees might be reluctant to share their expertise because, once everybody knows what they know, their value to the organization would be diminished. To motivate them to share knowledge, rewards must be offered. A knowledge management system can track how often an employee participates in knowledge-sharing interactions with other employees and track any resulting improvements in performance. This information can be used to reward employees for sharing tacit knowledge. Reward systems can be set up for sharing explicit knowledge, too-by tracking how often an employee contributes to a company’s internal wiki, for example. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe knowledge management systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.3 TOPICS: Knowledge management systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 127. Briefly explain an enterprise resource planning (ERP) system. ANSWER: Answers will vary. ERP is an integrated system that collects and processes data and manages and coordinates resources, information, and functions throughout an organization. A typical ERP system has many components, including hardware, software, procedures, and input from all functional areas. To integrate information for the entire organization, most ERP systems use a unified database to store data for various functions. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe enterprise resource planning systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.4 TOPICS: Enterprise resource planning systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 128. Discuss the drawbacks of an enterprise resource planning (ERP) system. ANSWER: Answers will vary. ERP is an integrated system that collects and processes data and manages and coordinates resources, information, and functions throughout an organization. Copyright Cengage Learning. Powered by Cognero.

Page 59


Module 11: Enterprise Systems It has drawbacks such as high costs, difficulties in installation, a need for extensive training, and compatibility problems with legacy systems. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe enterprise resource planning systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.4 TOPICS: Enterprise resource planning systems KEYWORDS: Understand DATE CREATED: 12/5/2019 11:53 AM DATE MODIFIED: 12/5/2019 11:53 AM 129. Discuss the cost savings advantage of a cloud-based enterprise system versus an on-premise system. ANSWER: Answers will vary. For the most part, advantages and disadvantages of cloud computing in general apply to enterprise systems as well, with minor differences. The specific advantages include cost savings: Cloud computing cost is paid incrementally, saving organizations money. Also, because the software development cost is divided among many participants, it is generally cheaper than traditional computing methods. See 11-5: CloudBased Enterprise Systems. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain advantages and disadvantages of cloud-based enterprise systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.5 TOPICS: cloud-based enterprise systems KEYWORDS: Understand DATE CREATED: 12/6/2019 9:35 AM DATE MODIFIED: 12/6/2019 9:36 AM 130. Explain how using a cloud-based enterprise system versus an on-premise system allows IT to shift focus. ANSWER: Answers will vary. For the most part, advantages and disadvantages of cloud computing in general apply to enterprise systems as well, with minor differences. The specific advantages include: Allows IT to shift focus: No longer having to worry about constant server updates and other computing issues, the adopting organization will be free to concentrate on innovation and growing the business. Mission-critical applications become the main focus. See 11-5: Cloud-Based Enterprise Systems. POINTS: 1 DIFFICULTY: Challenging REFERENCES: Explain advantages and disadvantages of cloud-based enterprise systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic Copyright Cengage Learning. Powered by Cognero.

Page 60


Module 11: Enterprise Systems LEARNING OBJECTIVES: MIS.10e.11.5 TOPICS: cloud-based enterprise systems KEYWORDS: Understand DATE CREATED: 12/6/2019 9:39 AM DATE MODIFIED: 12/6/2019 9:41 AM 131. Explain the security advantage of a cloud-based enterprise system versus an on-premise system. ANSWER: Answers will vary. For the most part, advantages and disadvantages of cloud computing in general apply to enterprise systems as well, with minor differences. The specific advantages include improved security: Although some people think that cloud computing may be less secure than traditional computing, you should remember that most providers of cloud services will have multiple copies of your data for redundancy, often in different geographic locations. Therefore, it is highly unlikely that they will lose your data. See 115: Cloud-Based Enterprise Systems. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain advantages and disadvantages of cloud-based enterprise systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.5 TOPICS: cloud-based enterprise systems KEYWORDS: Understand DATE CREATED: 12/6/2019 9:41 AM DATE MODIFIED: 12/6/2019 9:43 AM 132. Discuss vendor lock-in as it relates to the advantages and disadvantages of a cloud-based enterprise system. ANSWER: Answers will vary. For the most part, advantages and disadvantages of cloud computing in general apply to enterprise systems as well, with minor differences. A few disadvantages that organizations should consider include vendor lock-in: When an organization signs a contract with a particular vendor, switching to another vendor may become difficult. In addition to cost, during the migration to another provider the organization’s data may get exposed, which could cause additional security and privacy risks. See 11-5: Cloud-Based Enterprise Systems. POINTS: 1 DIFFICULTY: Challenging REFERENCES: Explain advantages and disadvantages of cloud-based enterprise systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.5 TOPICS: cloud-based enterprise systems KEYWORDS: Understand DATE CREATED: 12/6/2019 9:44 AM DATE MODIFIED: 12/6/2019 9:46 AM Copyright Cengage Learning. Powered by Cognero.

Page 61


Module 11: Enterprise Systems 133. Discuss possible downtime as it relates to the advantages and disadvantages of a cloud-based enterprise system. ANSWER: Answers will vary. For the most part, advantages and disadvantages of cloud computing in general apply to enterprise systems as well, with minor differences. A few disadvantages that organizations should consider include possible downtime: Cloud platforms sometimes go down and this is a major disadvantage. Service outages are always a possibility and can occur for many reasons, although cloud platforms are increasingly becoming more reliable. See 11-5: Cloud-Based Enterprise Systems. POINTS: 1 DIFFICULTY: Challenging REFERENCES: Explain advantages and disadvantages of cloud-based enterprise systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.5 TOPICS: cloud-based enterprise systems KEYWORDS: Understand DATE CREATED: 12/6/2019 9:47 AM DATE MODIFIED: 12/6/2019 9:48 AM 134. Discuss lack of customization as it relates to the advantages and disadvantages of a cloud-based enterprise system. ANSWER: Answers will vary. For the most part, advantages and disadvantages of cloud computing in general apply to enterprise systems as well, with minor differences. A few disadvantages that organizations should consider include lack of customization: The adapting organization has to accept the standard offering of the cloud provider and it may not meet the specific needs of a particular organization. For this reason, some specific manufacturing operations are still using on-premise ERP systems that are best suited for that specific operation. See 11-5: Cloud-Based Enterprise Systems. POINTS: 1 DIFFICULTY: Challenging REFERENCES: Explain advantages and disadvantages of cloud-based enterprise systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.5 TOPICS: cloud-based enterprise systems KEYWORDS: Understand DATE CREATED: 12/6/2019 9:49 AM DATE MODIFIED: 12/6/2019 9:50 AM 135. Discuss increased mobility as it relates to the advantages and disadvantages of a cloud-based enterprise system. ANSWER: Answers will vary. For the most part, advantages and disadvantages of cloud computing in general apply to enterprise systems as well, with minor differences. Specific advantages include increased mobility: Employees can access information wherever they are, rather than having to remain at their desks. It offers true portability for both data and application. See 11-5: Cloud-Based Enterprise Systems. POINTS: 1 DIFFICULTY: Challenging Copyright Cengage Learning. Powered by Cognero.

Page 62


Module 11: Enterprise Systems REFERENCES: Explain advantages and disadvantages of cloud-based enterprise systems. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.11.5 TOPICS: cloud-based enterprise systems KEYWORDS: Understand DATE CREATED: 12/6/2019 9:51 AM DATE MODIFIED: 12/6/2019 9:54 AM

Copyright Cengage Learning. Powered by Cognero.

Page 63


Module 12: Supporting Decisions and Processes True / False 1. Unstructured decisions are often used in computer configuration. a. True b. False ANSWER: False RATIONALE: Correct Semistructured decisions are often used in sales forecasting, budget preparation, capital acquisition analysis, and computer configuration. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Organization decision types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 2. Information technologies are a major support tool for making unstructured decisions. a. True b. False ANSWER: False RATIONALE: Correct The decision maker’s intuition plays the most important role, as information technology offers little support for unstructured decisions. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Organization decision types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 3. In the intelligence phase of the decision-making process, a decision maker defines criteria and generates alternatives to meet the criteria. a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 1


Module 12: Supporting Decisions and Processes ANSWER: RATIONALE:

False Correct In the intelligence phase, a decision maker (a marketing manager, for example) examines the organization’s environment for conditions that need decisions. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Decision-making process KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 4. Criteria are goals and objectives that decision makers establish to achieve certain performance levels. a. True b. False ANSWER: True RATIONALE: Correct Criteria are goals and objectives that decision makers establish in order to achieve certain performance levels. In the design phase, the objective is to define criteria for the decision, generate alternatives for meeting the criteria, and define associations between the criteria and the alternatives. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Decision-making process KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 5. In a decision support system (DSS), the user interface manages and coordinates the database and model base. a. True b. False ANSWER: False RATIONALE: Correct In a DSS, the DSS engine manages and coordinates the major components. See 12-2: Decision Support Systems POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 2


Module 12: Supporting Decisions and Processes DIFFICULTY: Easy REFERENCES: Describe a decision support system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 6. A user interface enables a decision support system (DSS) to analyze information. a. True b. False ANSWER: False RATIONALE: Correct The model base component includes mathematical and statistical models that, along with the database, enable a DSS to analyze information. See 12-2: Decision Support Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a decision support system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 11:28 AM 7. The technical designer usually addresses how data should be stored in a decision support system (DSS). a. True b. False ANSWER: True RATIONALE: Correct The technical designer focuses on how the DSS should be implemented and usually addresses how data should be stored in a DSS (centralized, decentralized, or distributed). POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a decision support system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM Copyright Cengage Learning. Powered by Cognero.

Page 3


Module 12: Supporting Decisions and Processes DATE MODIFIED:

12/3/2019 11:30 AM

8. Decision support systems (DSS) are focused on efficiency rather than effectiveness. a. True b. False ANSWER: False RATIONALE: Correct DSSs are focused on effectiveness rather than efficiency; hence, cost and benefits can be hard to assess. See 12-2: Decision Support Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a decision support system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 9. Effective design and implementation of an executive information system (EIS) requires top management support and user involvement. a. True b. False ANSWER: True RATIONALE: Correct As with other management support systems, effective design and implementation of an EIS requires top management support, user involvement, and the right technologies. See 12-3: Executive Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain an executive information system’s importance in decision making. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.3 TOPICS: Executive information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 10. Executive information systems (EISs) are used for reporting exceptions. a. True b. False ANSWER: True RATIONALE: Correct Copyright Cengage Learning. Powered by Cognero.

Page 4


Module 12: Supporting Decisions and Processes With EISs, managers can spot trends and report exceptions, such as gathering data on profitability and production costs at a manufacturing plant to determine whether closing the plant is more beneficial than keeping it open. See 12-3: Executive Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain an executive information system’s importance in decision making. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.3 TOPICS: Executive information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 11:34 AM 11. Collaboration software helps a group of decision makers coordinate and communicate, provided they are all in the same location. a. True b. False ANSWER: False RATIONALE: Correct Collaboration software assists teams in communicating, collaborating, and coordinating their activities. It enables a decision maker to coordinate and collaborate with team members scattered throughout the world. See 12-5: Collaboration Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe collaboration systems or software including their types and criteria for their selection. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.5 TOPICS: Collaboration systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 11:56 AM 12. Communication software can include audio conferencing, video conferencing, and text messaging. a. True b. False ANSWER: True RATIONALE: Correct Communication software, which also includes audio and video conferencing, provides chat, messaging, or video features that enable real-time communication. See 12-5: Collaboration Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe collaboration systems or software including their types and criteria for Copyright Cengage Learning. Powered by Cognero.

Page 5


Module 12: Supporting Decisions and Processes their selection. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.5 TOPICS: Collaboration systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 12:02 PM 13. A geographic information system (GIS) can integrate maps and database data with queries. a. True b. False ANSWER: True RATIONALE: Correct A GIS can integrate maps and database data with queries, such as finding zip codes with a high population of senior citizens with relatively high income. See 12-5: Geographic Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the uses for a geographic information system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.4 TOPICS: Geographic information systems KEYWORDS: Apply DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 14. According to the guidelines for designing a management support system, when benefits are intangible, the design team should associate the benefits with a measurable factor, such as increased sales. a. True b. False ANSWER: True RATIONALE: Correct Costs are always in dollars, but benefits are qualitative. According to the guidelines for designing a management support system, when benefits are intangible, such as improving customer service, the design team should associate the benefit with a measurable factor, such as increased sales. See 12-6: Guidelines for Designing a Management Support System POINTS: 1 DIFFICULTY: Easy REFERENCES: Apply the eight guidelines for designing a management support system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.6 Copyright Cengage Learning. Powered by Cognero.

Page 6


Module 12: Supporting Decisions and Processes TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Management support systems System design Apply 10/22/2019 1:32 PM 10/22/2019 1:32 PM

15. Management support systems have a somewhat different purpose than other information systems. a. True b. False ANSWER: True RATIONALE: Correct. MSSs have a somewhat different purpose than other information systems. See 126: Guidelines for Designing a Management Support System POINTS: 1 DIFFICULTY: Easy REFERENCES: Apply the eight guidelines for designing a management support system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.6 TOPICS: Management support systems System design KEYWORDS: Apply DATE CREATED: 12/3/2019 4:55 PM DATE MODIFIED: 12/3/2019 4:57 PM 16. When designing a management support system, guidelines recommend ignoring costs and benefits in order to focus on the interface. a. True b. False ANSWER: False RATIONALE: Correct. When designing a management support system, the design team should spend time identifying all costs and benefits in order to present a convincing case to top management. When benefits are intangible, such as improving customer service, the design team should associate the benefit with a measurable factor, such as increased sales. See 126: Guidelines for Designing a Management Support System POINTS: 1 DIFFICULTY: Easy REFERENCES: Apply the eight guidelines for designing a management support system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.6 TOPICS: Management support systems System design KEYWORDS: Apply DATE CREATED: 12/3/2019 4:57 PM DATE MODIFIED: 12/3/2019 5:03 PM Copyright Cengage Learning. Powered by Cognero.

Page 7


Module 12: Supporting Decisions and Processes 17. Over time, almost all aspects of a management support system change because of developments in technology and the dynamic business environment. a. True b. False ANSWER: True RATIONALE: Correct. When designing a management support system, designing a flexible system is important. Almost all aspects of a management support system change because of rapid developments in technology and the dynamic business environment. See 12-6: Guidelines for Designing a Management Support System POINTS: 1 DIFFICULTY: Easy REFERENCES: Apply the eight guidelines for designing a management support system. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.6 TOPICS: Management support systems System design KEYWORDS: Apply DATE CREATED: 12/3/2019 5:04 PM DATE MODIFIED: 12/3/2019 5:07 PM Multiple Choice 18. _____ decisions can be automated because a well-defined standard operating procedure exists for these types of decisions. a. Structured b. Semistructured c. Unstructured d. Pseudostructured ANSWER: a RATIONALE: Correct. Structured decisions, or programmable tasks, can be automated because a welldefined standard operating procedure exists for these types of decisions. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Organization decision types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 12:11 PM 19. Record keeping, payroll, and simple inventory problems are examples of _____ tasks. Copyright Cengage Learning. Powered by Cognero.

Page 8


Module 12: Supporting Decisions and Processes a. structured b. semistructured c. unstructured d. pseudostructured ANSWER: RATIONALE:

a Correct. Record keeping, payroll, and simple inventory problems are examples of structured tasks. Structured decisions, or programmable tasks, can be automated because a well-defined standard operating procedure exists for these types of decisions. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the phases of the decision-making process in a typical organization and the types of decisions that are made. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Organization decision types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 20. _____ decisions are vaguely defined by standard operating procedures but include a structured aspect that benefits from information retrieval, analytical models, and information systems technology. a. Structured b. Semistructured c. Unstructured d. Pseudostructured ANSWER: b RATIONALE: Correct. Semistructured decisions are not quite as well defined by standard operating procedures as structured decisions, but they include a structured aspect that benefits from information retrieval, analytical models, and information systems technology. For example, preparing budgets has a structured aspect in calculating percentages of available funds for each department. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Organization decision types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 21. Semistructured decisions are often used in _____. Copyright Cengage Learning. Powered by Cognero.

Page 9


Module 12: Supporting Decisions and Processes a. payroll development b. record keeping c. sales forecasting d. hiring and firing ANSWER: RATIONALE:

c Correct. Semistructured decisions are often used in sales forecasting, capital acquisition analysis, and computer configuration. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Organization decision types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 22. _____ involves semistructured decisions. a. Record keeping b. Budget preparation c. Hiring and firing d. Research and development ANSWER: b RATIONALE: Correct. Semistructured decisions are often used in sales forecasting, budget preparation, capital acquisition analysis, and computer configuration. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Organization decision types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 23. Identify a true statement about unstructured decisions. a. They are heavily influenced by the decision maker’s intuitions. b. They involve programmable tasks. c. They have a standard operating procedure. d. They are well supported by information technology. Copyright Cengage Learning. Powered by Cognero.

Page 10


Module 12: Supporting Decisions and Processes ANSWER: RATIONALE:

a Correct. Unstructured decisions are typically one-time decisions, with no standard operating procedure pertaining to them. The decision maker’s intuition plays the most important role, as information technology offers little support for these decisions. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Organization decision types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 12:18 PM 24. Which is true of semistructured decisions? a. They involve multiple criteria. b. They rely excessively on information technologies. c. They require automation. d. They involve programmable tasks. ANSWER: a RATIONALE: Correct. Semistructured decisions are challenging because they involve multiple criteria, and often users have to choose between conflicting objectives. For example, a manager might want to give raises to employees to boost morale and increase employee retention but has been asked to reduce the total cost of production. These two objectives conflict, at least in the short run. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Organization decision types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 25. _____ is an area that involves unstructured decisions. a. Record keeping b. Sales forecasting c. Research and development d. Capital acquisition analysis Copyright Cengage Learning. Powered by Cognero.

Page 11


Module 12: Supporting Decisions and Processes ANSWER: RATIONALE:

c Correct. Areas involving unstructured decisions include research and development, hiring and firing, and introducing a new product. Unstructured decisions are typically one-time decisions, with no standard operating procedure pertaining to them. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Organization decision types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 26. Unstructured decisions are often used in _____. a. introducing a new product b. capital acquisition analysis c. record keeping d. simple inventory problems ANSWER: a RATIONALE: Correct. Areas involving unstructured decisions include research and development, hiring and firing, and introducing a new product. The decision maker’s intuition plays the most important role, as information technology offers little support for unstructured decisions. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Organization decision types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 27. In the context of organizational decisions at the strategic management level, a merger involves _____ decisions. a. pseudostructured b. semistructured c. unstructured d. structured ANSWER: b Copyright Cengage Learning. Powered by Cognero.

Page 12


Module 12: Supporting Decisions and Processes RATIONALE:

Correct. In the context of organizational decisions at the strategic management level, a merger involves semistructured decisions. Semistructured decisions are not quite as well defined by standard operating procedures as structured decisions, but they include a structured aspect that benefits from information retrieval, analytical models, and information systems technology. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Organization decision types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 28. In the context of organizational decisions at the tactical management level, _____ decisions are often used in resolving conflicts between two divisions. a. pseudostructured b. semistructured c. unstructured d. structured ANSWER: c RATIONALE: Correct. In the context of organizational decisions at the tactical management level, unstructured decisions are often used in resolving conflicts between two divisions. Unstructured decisions have no standard operating procedure pertaining to them. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Organization decision types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 29. In the context of organizational decisions at the tactical management level, _____ decisions are often used in setting queue priorities. a. structured b. semistructured c. unstructured d. pseudostructured Copyright Cengage Learning. Powered by Cognero.

Page 13


Module 12: Supporting Decisions and Processes ANSWER: RATIONALE:

c Correct. In the context of organizational decisions at the tactical management level, unstructured decisions are often used in setting queue priorities. Unstructured decisions have no standard operating procedure pertaining to them. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Organization decision types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 30. In the context of organizational decisions at the strategic management level, _____ decisions are often used in deciding the plant location of an organization. a. pseudo structured b. semistructured c. unstructured d. structured ANSWER: d RATIONALE: Correct. In the context of organizational decisions at the strategic management level, structured decisions are often used in deciding the plant location of an organization. Structured decisions, or programmable tasks, can be automated because a well-defined standard operating procedure exists for these types of decisions. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Organization decision types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 31. Decisions related to _____ are considered structured decisions at the operational management level of an organization. a. payroll b. accounts receivable c. setting queue priorities d. sales forecast Copyright Cengage Learning. Powered by Cognero.

Page 14


Module 12: Supporting Decisions and Processes ANSWER: RATIONALE:

a Correct. Decisions related to payroll are considered structured decisions at the operational management level of an organization. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Organization decision types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 32. In the _____ phase of the decision-making process, data is collected from a variety of internal and external sources and processed. a. choice b. intelligence c. implementation d. design ANSWER: b RATIONALE: Correct. In the intelligence phase, a decision maker examines the organization’s environment for conditions that need decisions. Data is collected from a variety of sources (internal and external) and processed. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the phases of the decision-making process in a typical organization and the types of decisions that are made. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Decision-making process KEYWORDS: Remember DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 12:52 PM 33. Which component of a decision support system (DSS) manages and coordinates the other major components? a. database b. engine c. model base d. user interface ANSWER: b RATIONALE: Correct. A DSS includes three major components: a database, a model base, and a user interface. In addition, a fourth component, the DSS engine, manages and coordinates these Copyright Cengage Learning. Powered by Cognero.

Page 15


Module 12: Supporting Decisions and Processes major components. See 12-2: Decision Support Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a decision support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 34. The _____ component of a decision support system (DSS) includes mathematical and statistical models that, along with the database, enable a DSS to analyze information. a. user interface b. DSS engine c. model base d. database model ANSWER: c RATIONALE: Correct. The model base component of a DSS includes mathematical and statistical models that, along with the database, enable a DSS to analyze information. A model base management system performs tasks similar to a database management system in accessing, maintaining, and updating models in the model base. See 12-2: Decision Support Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a decision support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 35. In the context of the features of a decision support system (DSS), _____ analysis enables you to apply different variables in decision making. a. what-if b. data c. sensitivity d. exception reporting ANSWER: c RATIONALE: Correct. Sensitivity analysis enables you to apply different variables, such as determining the maximum price you could pay for raw materials and still make a profit. See 12-2: Decision Support Systems POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 16


Module 12: Supporting Decisions and Processes DIFFICULTY: Easy REFERENCES: Describe a decision support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 36. In the context of the roles in the decision support system (DSS) environment, which of the following questions does a managerial designer address? a. What should the balance between aggregated and disaggregated data be? b. What are the operations of the model? c. What type of file structure should be used? d. What are the assumptions required to create and use a model? ANSWER: a RATIONALE: Correct. A managerial designer addresses questions such as “What should the balance between aggregated and disaggregated data be?” and “How should the data be organized?” See 12-2: Decision Support Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a decision support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 37. In a decision support system (DSS), decisions about the type of file structure to be used are taken by the _____ designer. a. technical b. managerial c. model d. database ANSWER: a RATIONALE: Correct. The technical designer focuses on how a DSS is implemented and usually addresses questions, such as what type of file structure should be used (sequential, random, or indexed sequential) and how should the data be stored (centralized, decentralized, and distributed). See 12-2: Decision Support Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a decision support system. Copyright Cengage Learning. Powered by Cognero.

Page 17


Module 12: Supporting Decisions and Processes QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 38. In the decision support system (DSS) environment, the _____ focuses on how a DSS is implemented and usually addresses questions about data storage, user access, response time, and security measures. a. managerial designer b. technical designer c. model builder d. user ANSWER: b RATIONALE: Correct. The technical designer focuses on how a DSS is implemented and usually addresses questions about data storage, file structure, user access, response time, and security measures. The technical designer might be a computer specialist or a consultant from outside the company and may use a commercial DSS package or write the system’s code from scratch. See 12-2: Decision Support Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a decision support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 39. In a decision support system (DSS) environment, a _____ is the liaison between users and designers. a. system architect b. managerial designer c. model builder d. database builder ANSWER: c RATIONALE: Correct. A model builder is the liaison between users and designers. The model builder is responsible for supplying information on what the model does, what data inputs it accepts, how the model’s output should be interpreted, and what assumptions go into creating and using the model. See 12-2: Decision Support Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a decision support system. QUESTION TYPE: Multiple Choice Copyright Cengage Learning. Powered by Cognero.

Page 18


Module 12: Supporting Decisions and Processes HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 40. Identify a true statement about decision support systems (DSSs). a. DSSs facilitate improvements but do not necessarily cause them. b. DSSs focus on efficiency rather than effectiveness. c. DSSs take more time than conventional decision-making processes. d. DSSs generate generic solutions and do not provide one-of-a-kind solutions. ANSWER: a RATIONALE: Correct. A DSS facilitates improvements but does not necessarily cause them. For example, how do you assign a monetary value to facilitating communication or expediting problem solving? See 12-2: Decision Support Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a decision support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 41. According to Peter G. Keen, a former MIT professor, which is a benefit of a decision support system (DSS)? a. Easy assessment of costs and benefits b. Ability to cause improvements c. Focus on efficiency rather than effectiveness d. Fast response to unexpected situations ANSWER: d RATIONALE: Correct. According to Peter G. Keen, a former MIT professor, a benefit of a DSS is fast response to unexpected situations. Other benefits include ability to make one-of-a-kind decisions, improved control over operations, and better use of data resources. See 12-2: Decision Support Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a decision support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 19


Module 12: Supporting Decisions and Processes DATE CREATED: DATE MODIFIED:

10/22/2019 1:32 PM 10/22/2019 1:32 PM

42. For a(n) _____ system to be useful, it should collect data related to an organization’s critical success factors-issues that make or break a business. a. group support b. decision support c. executive information d. geographic information ANSWER: c RATIONALE: Correct. For an executive information system (EIS) to be useful, it should also collect data related to an organization’s "critical success factors"-issues that make or break a business. An EIS should be designed to provide information related to an organization’s critical success factors. See 12-3: Executive Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain an executive information system’s importance in decision making. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.3 TOPICS: Executive information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 1:18 PM 43. Which feature of an executive information system (EIS) enables users to examine and analyze information? a. ease of use b. intelligent agent c. secure login d. digital dashboard ANSWER: d RATIONALE: Correct. EISs include “drill-down” features and a digital dashboard for examining and analyzing information. See 12-3: Executive Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain an executive information system’s importance in decision making. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.3 TOPICS: Executive information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 1:27 PM 44. A typical executive information system (EIS) offers which of the following capabilities? Copyright Cengage Learning. Powered by Cognero.

Page 20


Module 12: Supporting Decisions and Processes a. video conferencing b. slice-and-dice c. collaboration d. messaging ANSWER: RATIONALE:

b Correct. A typical digital dashboard offers four capabilities including consolidation, drilldown, slice-and-dice, and pivot analysis. See 12-3: Executive Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain an executive information system’s importance in decision making. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.3 TOPICS: Executive information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 1:31 PM 45. Which capability of an executive information system (EIS) is responsible for aggregating data such as sales figures? a. slice-and-dice b. ease of use c. analysis d. consolidation ANSWER: d RATIONALE: Correct. A typical digital dashboard offers four capabilities including consolidation, drilldown, slice-and-dice, and pivot analysis. Consolidation usually aggregates data. For example, sales for northern, central, and southern California are added in order to generate the total sales for the state of California. See 12-3: Executive Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain an executive information system’s importance in decision making. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.3 TOPICS: Executive information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 1:35 PM 46. Managers use executive information systems (EISs) to: a. communicate via videoconferences. b. work in groups. c. track inventories. d. spot trends. Copyright Cengage Learning. Powered by Cognero.

Page 21


Module 12: Supporting Decisions and Processes ANSWER: RATIONALE:

d Correct. Generally, managers perform six tasks for which an EIS is useful: tracking performance, flagging exceptions, ranking, comparing, spotting trends, and investigating/exploring. See 12-3: Executive Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain an executive information system’s importance in decision making. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.3 TOPICS: Executive information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 47. In the context of executive information systems (EISs), _____ allows managers to flag data that is unusual or out of normal boundaries. a. forecasting b. text mining c. variance reporting d. data reporting ANSWER: c RATIONALE: Correct. Exception or variance reporting is another useful technique that managers use to flag data that is unusual or out of normal boundaries. Most EIS packages provide tools for managerial tasks, such as displaying summaries of data in report or chart format and sequencing screens to produce slide shows. See 12-3: Executive Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain an executive information system’s importance in decision making. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.3 TOPICS: Executive information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 1:38 PM 48. Which programs carry out repetitive tasks and can be programmed to make decisions based on specified conditions? a. Intelligent agents b. Cyclic trackers c. Data stabilizers d. Sequential recorders ANSWER: a RATIONALE: Correct. Intelligent agents are “smart” programs that carry out repetitive tasks and can be programmed to make decisions based on specified conditions. See 12-3: Executive Copyright Cengage Learning. Powered by Cognero.

Page 22


Module 12: Supporting Decisions and Processes Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain an executive information system’s importance in decision making. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.3 TOPICS: Executive information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 1:39 PM 49. Another commonly used name for collaborative computing is _____ computing. a. GIS b. DSS c. group d. analysis ANSWER: c RATIONALE: Correct. In today’s business environment, decision makers often work in groups, so you hear the terms group computing or collaborative computing used often. See 12-4: Collaboration Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe collaboration systems or software including their types and criteria for their selection. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.5 TOPICS: Collaboration systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 2:07 PM 50. A collaboration system supports decision makers by providing access to_____. a. personnel records b. decision making criteria c. a shared environment d. GIS tools ANSWER: c RATIONALE: Correct. A collaboration system is a collection of applications that supports decision makers by providing access to a shared environment and information. See 12-5: Collaboration Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe collaboration systems or software including their types and criteria for Copyright Cengage Learning. Powered by Cognero.

Page 23


Module 12: Supporting Decisions and Processes their selection. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.5 TOPICS: Collaboration systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 2:18 PM 51. Asynchronous software enables team members to work together at _____. a. an agreed-upon location b. a location in which a server computer is present c. different times d. the same time ANSWER: c RATIONALE: Correct. Asynchronous software enables team members to work together at different times. E-mail is an example of an asynchronous tool. See 12-5: Collaboration Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe collaboration systems or software including their types and criteria for their selection. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.5 TOPICS: Collaboration systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 2:22 PM 52. Identify a true statement about collaboration software. a. It decreases the effectiveness of decision makers in comparison with other users. b. Shyness is not as much of an issue when using it as in face-to-face meetings. c. It complicates teamwork. d. It requires additional travel from decision makers. ANSWER: b RATIONALE: Correct. An advantage of collaboration software includes: Shyness is not as much of an issue when using collaboration software as it is in face-to-face meetings. See 12-5: Collaboratiaon Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe collaboration systems or software including their types and criteria for their selection. QUESTION TYPE: Multiple Choice Copyright Cengage Learning. Powered by Cognero.

Page 24


Module 12: Supporting Decisions and Processes HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.5 TOPICS: Collaboration systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 2:25 PM 53. _______ enables decision makers in different locations to communicate in real time. a. E-mail software b. Task management software c. Communication software d. Geographic information system software ANSWER: c RATIONALE: Correct. Communication software, which also includes audio and video conferencing, provides chat, messaging, or video features that enable real-time communication. See 12-5: Collaboration Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe collaboration systems or software including their types and criteria for their selection. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.5 TOPICS: Collaboration systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 2:28 PM 54. _____ software enables team members to prioritize and track tasks by providing features such as boards, timelines, and calendars. a. Video conferencing. b. Content management. c. Communication. d. Task management. ANSWER: d RATIONALE: Correct. Task management software enables team members to prioritize and track tasks, which helps to keep track of deadlines. To make this process more efficient the software provides boards, timelines, and calendars. See 12-5: Collaboration Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe collaboration systems or software including their types and criteria for their selection. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.5 Copyright Cengage Learning. Powered by Cognero.

Page 25


Module 12: Supporting Decisions and Processes TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Collaboration systems Understand 10/22/2019 1:32 PM 12/3/2019 2:32 PM

55. Disadvantages of collaboration software include _____. a. It requires the presence of the human touch. b. It reduces the effectiveness of decision makers. c. It can cause unnecessary meetings. d. It increases the need for face-to-face meetings. ANSWER: c RATIONALE: Correct. Disadvantages of collaboration software include: unnecessary meetings—because arranging a collaboration session is easy, there is a tendency to schedule more meetings than are necessary, which wastes time and energy. See 12-5: Collaboration Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe collaboration systems or software including their types and criteria for their selection. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.5 TOPICS: Collaboration systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 2:36 PM 56. Which type of software enables team members to store, share, and work together on different files? a. Content management software b. Task management software c. Communication software d. Geographic information system ANSWER: a RATIONALE: Correct. Content management software enables team members to store, share, and work together on different files. See 12-5: Collaboration Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe collaboration systems or software including their types and criteria for their selection. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.5 TOPICS: Collaboration systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 2:47 PM Copyright Cengage Learning. Powered by Cognero.

Page 26


Module 12: Supporting Decisions and Processes 57. Google Apps for Work, Confluence, and Samepage are examples of ____ software. a. document management b. communication c. GIS d. decision support system ANSWER: a RATIONALE: Correct. The top three software programs in the document and content management software group include Google Apps for Work, Confluence, and Samepage. See 12-5: Collaboration Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe collaboration systems or software including their types and criteria for their selection. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.5 TOPICS: Collaboration systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 2:51 PM 58. Identify one difference between task management software and project management software. a. Task management apps emphasize improving the productivity of each team member. b. Project management apps emphasize improving the productivity of each team member. c. Task management apps focus on teams that are widely dispersed. d. Project management apps focus on smaller projects. ANSWER: a RATIONALE: Correct. On the other hand, project management software (discussed in Modules 2 and 10) is all about collaboration and coordination in order to finish a project. There are some overlaps between project management tools and task management apps. The latter emphasizes on improving the productivity of each member of the team. See 12-5: Collaboration Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe collaboration systems or software including their types and criteria for their selection. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.5 TOPICS: Collaboration systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 2:57 PM 59. A(n) _____ system uses spatial and nonspatial data and specialized techniques for storing coordinates of networks of Copyright Cengage Learning. Powered by Cognero.

Page 27


Module 12: Supporting Decisions and Processes lines (roads, rivers, streets) and reporting zones (zip codes, cities, counties, states). a. group support b. geographic information c. executive information d. electronic meeting ANSWER: b RATIONALE: Correct. A GIS uses spatial and nonspatial data and specialized techniques for storing coordinates of complex geographic objects, including networks of lines (roads, rivers, streets) and reporting zones (zip codes, cities, counties, states). GISs integrate and analyze spatial data from a variety of sources. Although they are used mainly in government and utility companies, more businesses are using them, particularly in marketing, manufacturing, insurance, and real estate. See 12-5: Geographic Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the uses for a geographic information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.4 TOPICS: Geographic information systems KEYWORDS: Apply DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 60. Which geographic object of a geographic information system (GIS) is most likely used to show the location of an airport? a. Points b. Areas c. Lines d. Regions ANSWER: a RATIONALE: Correct. Points are the geographic objects of a GIS that show the intersections of lines on a map, such as the location of an airport or a restaurant. See 12-5: Geographic Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the uses for a geographic information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.4 TOPICS: Geographic information systems KEYWORDS: Apply DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 61. Which geographic object of a geographic information system (GIS) is most likely used to show a street or a river? Copyright Cengage Learning. Powered by Cognero.

Page 28


Module 12: Supporting Decisions and Processes a. Points b. Lines c. Areas d. Regions ANSWER: RATIONALE:

b Correct. Lines are the geographic objects of a GIS that usually show a series of points on a map (a street or a river, for example). See 12-5: Geographic Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the uses for a geographic information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.4 TOPICS: Geographic information systems KEYWORDS: Apply DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 62. Which geographic object of a geographic information system (GIS) is most likely used to show a particular zip code or a large tourist attraction? a. Points b. Lines c. Areas d. Intersections ANSWER: c RATIONALE: Correct. Areas are the geographic objects of a GIS that usually show a section of a map, such as a particular zip code or a large tourist attraction. See 12-5: Geographic Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the uses for a geographic information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.4 TOPICS: Geographic information systems KEYWORDS: Apply DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 63. Which task is performed by a geographic information system (GIS)? a. Finding zip codes of areas with high population b. Recognizing the location where an accident has occurred c. Identifying areas with less oxygen d. Showing the number of people walking across a bridge Copyright Cengage Learning. Powered by Cognero.

Page 29


Module 12: Supporting Decisions and Processes ANSWER: RATIONALE:

a Correct. A GIS can integrate maps and database data with queries, such as finding zip codes with a high population of senior citizens with relatively high income. See 12-5: Geographic Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the uses for a geographic information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.4 TOPICS: Geographic information systems KEYWORDS: Apply DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 3:02 PM 64. A geographic information system (GIS) with analytical capabilities evaluates the impact of decisions by interpreting _____ data. a. spatial b. non spatial c. preexisting d. assumed ANSWER: a RATIONALE: Correct. A GIS with analytical capabilities evaluates the impact of decisions by interpreting spatial data. Modeling tools and statistical functions are used for forecasting purposes, including trend analysis and simulations. See 12-5: Geographic Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the uses for a geographic information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.4 TOPICS: Geographic information systems KEYWORDS: Apply DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 65. In _____, a geographic information system (GIS) is used to track changes in ridership on mass-transit systems. a. marketing operations b. education planning c. real estate businesses d. urban planning ANSWER: d RATIONALE: Correct. In urban planning, a GIS is used to track changes in ridership on mass-transit systems. Urban planning also involves analyzing demographic data to determine new Copyright Cengage Learning. Powered by Cognero.

Page 30


Module 12: Supporting Decisions and Processes voting districts, among many other uses. See 12-5: Geographic Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the uses for a geographic information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.4 TOPICS: Geographic information systems KEYWORDS: Apply DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 66. In _____, a geographic information system (GIS) is used to make the best use of personnel and equipment while dealing with a tight budget and maintaining crime statistics. a. government b. logistics c. marketing operations d. real estate businesses ANSWER: a RATIONALE: Correct. In government, a GIS is used to make the best use of personnel and equipment while dealing with a tight budget and maintaining crime statistics. A GIS also helps in dispatching personnel and equipment to crime and fire locations. See 12-5: Geographic Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the uses for a geographic information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.4 TOPICS: Geographic information systems KEYWORDS: Apply DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 67. _____ uses a geographic information system (GIS) application to dispatch personnel and equipment to crime and fire locations. a. Transportation and logistics b. Urban planning c. Government d. Insurance ANSWER: c RATIONALE: Correct. Government uses a GIS application to dispatch personnel and equipment to crime and fire locations. A GIS also makes the best use of personnel and equipment while dealing with a tight budget. See 12-5: Geographic Information Systems POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 31


Module 12: Supporting Decisions and Processes DIFFICULTY: Easy REFERENCES: Summarize the uses for a geographic information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.4 TOPICS: Geographic information systems KEYWORDS: Apply DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 3:05 PM 68. In the context of defining the objectives and benefits of a management support system (MSS), which is an intangible benefit? a. Increasing profits b. Increasing demand c. Improving customer service d. Improving the organization’s revenue ANSWER: c RATIONALE: Correct. In the context of defining the objectives and benefits of an MSS, when benefits are intangible, such as improving customer service, the design team should associate the benefit with a measurable factor, such as increased sales. See 12-6: Guidelines for Designing a Management Support System POINTS: 1 DIFFICULTY: Moderate REFERENCES: Apply the eight guidelines for designing a management support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.6 TOPICS: Management support systems System design KEYWORDS: Apply DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 69. What ensures that key decision makers are involved in designing a management support system (MSS)? a. Clearly defining objectives and benefits. b. Keeping lines of communication open. c. Identifying executives’ information needs. d. Designing a flexible system. ANSWER: b RATIONALE: Correct. Keeping lines of communication open is important to ensure that key decision makers are involved in designing an MSS. Because MSSs have a somewhat different purpose than other information systems, keeping lines of communication open is one of the important factors that need to be considered in designing an MSS. See 12-6: Guidelines for Designing a Management Support System POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 32


Module 12: Supporting Decisions and Processes DIFFICULTY: Easy REFERENCES: Apply the eight guidelines for designing a management support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.6 TOPICS: Management support systems System design KEYWORDS: Apply DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 70. Which is an important factor in designing a management support system (MSS)? a. Making the system’s complexity visible b. Keeping the interface simple c. Ensuring closed lines of communication d. Varying the look and feel ANSWER: b RATIONALE: Correct. Important factors to consider while designing an MSS are hiding the system’s complexity and keeping the interface simple. Avoid using technical jargon when explaining the system to executives because they might lose interest if they think the system is too technical. See 12-6: Guidelines for Designing a Management Support System POINTS: 1 DIFFICULTY: Easy REFERENCES: Apply the eight guidelines for designing a management support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.6 TOPICS: Management support systems System design KEYWORDS: Apply DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 3:11 PM 71. In a typical organization, _____ decisions are often used in capital acquisition analysis. a. structured b. semistructured c. unstructured d. pseudo structured ANSWER: b RATIONALE: Semistructured decisions are often used in sales forecasting, budget preparation, capital acquisition analysis, and computer configuration. Semistructured decisions are not quite as well defined by standard operating procedures as structured decisions, but they include a structured aspect that benefits from information retrieval, analytical models, and information systems technology. See 12-1: Types of Decisions in an Organization POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 33


Module 12: Supporting Decisions and Processes DIFFICULTY: REFERENCES:

Easy Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Organization decision types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 72. The different types of information systems that have been developed to support certain aspects and types of decisions are collectively called _____ systems. a. management support b. supply chain management c. electronic meeting d. geographic information ANSWER: a RATIONALE: Management support systems (MSSs) are the different types of information systems that have been developed to support certain aspects and types of decisions. Each type of MSS is designed with unique goals and objectives. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Organization decision types KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 73. During the _____ phase of the decision-making process, ideas are converted into actions. a. intelligence b. design c. choice d. implementation ANSWER: d RATIONALE: In the implementation phase, an organization devises a plan for carrying out the alternative selected in the choice phase and obtains the resources to implement the plan. In others words, ideas are converted into actions. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy Copyright Cengage Learning. Powered by Cognero.

Page 34


Module 12: Supporting Decisions and Processes REFERENCES:

Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Decision-making process KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 74. During the _____ phase of the decision-making process, the best and most effective course of action is selected. a. intelligence b. design c. choice d. implementation ANSWER: c RATIONALE: The choice phase is usually straightforward. From the practical alternatives, the best and most effective course of action is chosen. It starts with analyzing each alternative and its relationship to the criteria to determine whether it is feasible. See 12-1: Types of Decisions in an Organization POINTS: 1 DIFFICULTY: Easy REFERENCES: Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Decision-making process KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 75. A(n) _____ is an interactive information system consisting of hardware, software, data, and models (mathematical and statistical) designed to assist strategy makers in an organization. a. decision support b. supply chain management c. employee monitoring d. logistics management ANSWER: a RATIONALE: A decision support system (DSS) is an interactive information system consisting of hardware, software, data, and models (mathematical and statistical) designed to assist decision makers in an organization. Its three major components are a database, a model base, and a user interface. See 12-2: Decision Support Systems POINTS: 1 DIFFICULTY: Easy Copyright Cengage Learning. Powered by Cognero.

Page 35


Module 12: Supporting Decisions and Processes REFERENCES: Describe a decision support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 3:18 PM 76. Which component of a decision support system (DSS) enables the DSS to perform analysis operations on the information stored in the system? a. model base b. user interface c. database d. DSS engine ANSWER: c RATIONALE: The database component of a DSS enables the DSS to perform data analysis operations. The database component includes both internal and external data, and a database management system (DBMS) is used for creating, modifying, and maintaining the database. See 12-2: Decision Support Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a decision support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 77. Which system performs tasks similar to a database management system (DBMS)? a. decision support b. model base management c. electronic meeting d. geographic information ANSWER: b RATIONALE: A model base management system (MBMS) performs tasks similar to a DBMS in accessing, maintaining, and updating models in the model base. See 12-2: Decision Support Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a decision support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 36


Module 12: Supporting Decisions and Processes LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 78. What analysis feature of a decision support system (DSS) pinpoints the region that generated the highest total sales? a. goal seeking b. sensitivity c. what-if d. exception reporting ANSWER: d RATIONALE: Exception reporting analysis monitors the performance of variables that are outside a defined range, such as pinpointing the region that generated the highest total sales or the production center that went over budget. See 12-2: Decision Support Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a decision support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 79. In the decision support system (DSS) environment, a _____ is responsible for supplying information on what a model does, what data inputs it accepts, how the model’s output should be interpreted, and what assumptions go into creating and using the model. a. model designer b. managerial designer c. model builder d. database builder ANSWER: c RATIONALE: A model builder is the liaison between users and designers. The model builder is responsible for supplying information on what a model does, what data inputs it accepts, how the model’s output should be interpreted, and what assumptions go into creating and using the model. See 12-2: Decision Support Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe a decision support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems Copyright Cengage Learning. Powered by Cognero.

Page 37


Module 12: Supporting Decisions and Processes KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 10/22/2019 1:32 PM 10/22/2019 1:32 PM

80. A(n) _____ system is a branch of decision support systems (DSSs) that gives managers easy access to internal and external data and typically includes drill-down features and a digital dashboard for examining and analyzing information. a. group support b. executive information c. electronic meeting d. geographic information ANSWER: b RATIONALE: Executive information systems (EISs), a branch of DSSs, are interactive information systems that give executives easy access to internal and external data and typically include drill-down features and a digital dashboard for examining and analyzing information. See 12-3: Executive Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain an executive information system’s importance in decision making. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.3 TOPICS: Executive information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 81. Most executive information systems include a _____, which integrates information from multiple sources and presents it in a unified, understandable format, often as charts and graphs. a. digital dashboard b. decision support system database c. model base d. decision support system engine ANSWER: a RATIONALE: A digital dashboard integrates information from multiple sources and presents it in a unified, understandable format, often as charts and graphs. It offers up-to-the minute snapshots of information and assists decision makers in identifying trends and potential problems. See 12-3: Executive Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain an executive information system’s importance in decision making. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.3 TOPICS: Executive information systems KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 38


Module 12: Supporting Decisions and Processes DATE CREATED: DATE MODIFIED:

10/22/2019 1:32 PM 10/22/2019 1:32 PM

82. Collaboration software that allows team members to work together at the same time is considered ______. a. asynchronous b. synchronous c. dashboard-based d. geography-based ANSWER: b RATIONALE: Correct. Collaboration software is divided into two groups: synchronous and asynchronous. Using synchronous or real-time software allows team members to work together at the same time. See 12-5: Collaboration Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe collaboration systems or software including their types and criteria for their selection. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.5 TOPICS: Collaboration software KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 3:42 PM 83. _____ is a collection of applications that supports decision makers by providing access to a shared environment and information. a. Databaseware b. Geographic information software c. Collaboration software d. Firmware ANSWER: c RATIONALE: Collaboration software is a collection of applications that supports decision makers by providing access to a shared environment and information. See 12-5: Collaboration Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe collaboration systems or software including their types and criteria for their selection. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.5 TOPICS: Collaboration systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 3:46 PM Copyright Cengage Learning. Powered by Cognero.

Page 39


Module 12: Supporting Decisions and Processes 84. _____ features allow team members to see and talk to each other regardless of their locations. a. Audio conferencing b. Video conferencing c. Face-to-face meeting d. Text ANSWER: b RATIONALE: Correct. Video-conferencing features enable team members to see and talk to each other regardless of their locations. See 12-5: Collaboration Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe group support systems, including groupware and electronic meeting systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.5 TOPICS: Collaboration systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 3:53 PM 85. What system captures, stores, processes, and displays information, such as showing the location of all streetlights on a map? a. executive information b. electronic meeting c. group support d. geographic information ANSWER: d RATIONALE: A geographic information system (GIS) captures, stores, processes, and displays geographic information or information in a geographic context, such as showing the location of all city streetlights on a map. See 12-5: Geographic Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the uses for a geographic information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.4 TOPICS: Geographic information systems KEYWORDS: Apply DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 86. When designing an MSS, designers should keep the ____ consistent. a. data points b. look and feel Copyright Cengage Learning. Powered by Cognero.

Page 40


Module 12: Supporting Decisions and Processes c. results d. objectives ANSWER: RATIONALE:

b Correct. Important factors to consider while designing an MSS include keeping the “look and feel” consistent—Designers should use standard layouts, formats, and colors in windows, menus, and dialog boxes for consistency and ease of use. That way, a user who has learned the database portion of the system, for example, should be able to switch to the report-generating portion with little trouble because the interface is familiar. See 12-6: Guidelines for Designing a Management Support System POINTS: 1 DIFFICULTY: Easy REFERENCES: Apply the eight guidelines for designing a management support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.6 TOPICS: Management support systems System design KEYWORDS: Apply DATE CREATED: 12/3/2019 4:29 PM DATE MODIFIED: 12/3/2019 4:37 PM 87. In a management support system, why is it is important to keep lines of communication open? a. It ensures key decision makers do not lose interest. b. It ensures key decision makers are involved in designing the MSS. c. It ensures support staff feel included in the decision-making process. d. It enables decision makers to identify objectives. ANSWER: b RATIONALE: Correct. Important factors to consider while designing an MSS include keeping lines of communication open. This is important to ensure that key decision makers are involved in designing the MSS. See 12-6: Guidelines for Designing a Management Support System POINTS: 1 DIFFICULTY: Easy REFERENCES: Apply the eight guidelines for designing a management support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.6 TOPICS: Management support systems System design KEYWORDS: Apply DATE CREATED: 12/3/2019 4:34 PM DATE MODIFIED: 12/3/2019 4:41 PM 88. When designing a management support system, using a(n) ____ can help reduce frustration. a. inflexible interface b. progress bar Copyright Cengage Learning. Powered by Cognero.

Page 41


Module 12: Supporting Decisions and Processes c. camera d. closed line of communication ANSWER: b RATIONALE: Correct. MSS designers must monitor the system’s response time at regular intervals, as executives rarely tolerate slow response times. In addition, when a system function takes more than a few seconds, make sure a message is displayed stating that the system is processing the request. Using a progress bar can help reduce frustration, too. See 12-6: Guidelines for Designing a Management Support System POINTS: 1 DIFFICULTY: Easy REFERENCES: Apply the eight guidelines for designing a management support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.6 TOPICS: Management support systems System design KEYWORDS: Apply DATE CREATED: 12/3/2019 4:37 PM DATE MODIFIED: 12/3/2019 4:41 PM 89. In a management support system, executives rarely tolerate ____. a. poor sales b. slow response times c. a user interface d. standard layouts ANSWER: b RATIONALE: Correct. MSS designers must monitor the system’s response time at regular intervals, as executives rarely tolerate slow response times. In addition, when a system function takes more than a few seconds, make sure a message is displayed stating that the system is processing the request. Using a progress bar can help reduce frustration, too. See 12-6: Guidelines for Designing a Management Support System POINTS: 1 DIFFICULTY: Easy REFERENCES: Apply the eight guidelines for designing a management support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.6 TOPICS: Management support systems System design KEYWORDS: Apply DATE CREATED: 12/3/2019 4:42 PM DATE MODIFIED: 12/3/2019 4:43 PM 90. In a management support system, it's important to examine the ____ that executives use. a. technical jargon b. audio-visual equipment Copyright Cengage Learning. Powered by Cognero.

Page 42


Module 12: Supporting Decisions and Processes c. decision-making process d. computer platform ANSWER: c RATIONALE: Correct. Important factors to consider while designing an MSS include examining

the decision-making process that executives use to find out what kinds of decisions they are making— structured, semistructured, or unstructured—and what kind of information they need to make these decisions. See 12-6: Guidelines for Designing a Management Support System POINTS: 1 DIFFICULTY: Easy REFERENCES: Apply the eight guidelines for designing a management support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.6 TOPICS: Management support systems System design KEYWORDS: Apply DATE CREATED: 12/3/2019 4:45 PM DATE MODIFIED: 12/3/2019 4:48 PM 91. While designing a management support system, it's important to remember that executives do not care about _____. a. sales figures b. choice of platform c. communication options d. support from the top ANSWER: b RATIONALE: Correct. Important factors to consider while designing an MSS include keeping the

system's complexity hidden. Avoid using technical jargon when explaining the system to executives because they might lose interest if they think the system is too technical. Executives are not interested in the choice of platform or software, for example. Their main concern is getting the information they need in the simplest way. See 12-6: Guidelines for Designing a Management Support System POINTS: 1 DIFFICULTY: Easy REFERENCES: Apply the eight guidelines for designing a management support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.6 TOPICS: Management support systems System design KEYWORDS: Apply DATE CREATED: 12/3/2019 4:48 PM DATE MODIFIED: 12/3/2019 4:51 PM 92. While designing a management support system, it's important to remember that executives' main concern is _____. Copyright Cengage Learning. Powered by Cognero.

Page 43


Module 12: Supporting Decisions and Processes a. getting support from all employees b. getting the information they need in the most technically advanced way c. identifying unquantifiable benefits d. getting the information they need in the simplest way ANSWER: b RATIONALE: Correct. Important factors to consider while designing an MSS include keeping the

system's complexity hidden. Avoid using technical jargon when explaining the system to executives because they might lose interest if they think the system is too technical. Executives are not interested in the choice of platform or software, for example. Their main concern is getting the information they need in the simplest way. See 12-6: Guidelines for Designing a Management Support System POINTS: 1 DIFFICULTY: Easy REFERENCES: Apply the eight guidelines for designing a management support system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.6 TOPICS: Management support systems System design KEYWORDS: Apply DATE CREATED: 12/3/2019 4:51 PM DATE MODIFIED: 12/3/2019 4:54 PM 93. A GIS with analytical capabilities evaluates the impact of decisions by interpreting _____. a. user data b. spatial data c. executive decisions d. lines and polygons ANSWER: b RATIONALE: Correct. A GIS with analytical capabilities evaluates the impact of decisions by interpreting spatial data. See 12-5: Geographic Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the uses for a geographic information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.4 TOPICS: Geographic information systems KEYWORDS: Apply DATE CREATED: 12/3/2019 5:18 PM DATE MODIFIED: 12/3/2019 5:21 PM 94. Google Maps is considered a DSS because you can change routes by dragging different points and have a

_____ performed on alternative routes. a. print or PDF option Copyright Cengage Learning. Powered by Cognero.

Page 44


Module 12: Supporting Decisions and Processes b. user review c. what-if analysis d. marketing analysis ANSWER: RATIONALE:

c

Correct. A common example of a GIS—and one you have probably used often—is getting driving directions from Google Maps. It is an interactive GIS that identifies routes from start to destination, overlays routes on a map, shows locations of nearby landmarks, and estimates distances and driving times. It is also considered a DSS because you can change routes by dragging different points and have a what-if analysis performed on alternative routes. See 12-5: Geographic Information Systems

POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize the uses for a geographic information system. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.12.4 TOPICS: Geographic information systems KEYWORDS: Apply DATE CREATED: 12/3/2019 5:22 PM DATE MODIFIED: 12/3/2019 5:26 PM Essay 95. Provide an example of the type of activities that take place during the intelligence phase of the decision-making process. ANSWER: Answers will vary. As an example, say an organization has noticed a decrease in total sales over the past six months. To pinpoint the cause of the problem, the organization can collect data from customers, the marketplace, and the competition. After the data has been processed, analysis can suggest possible remedies. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Decision-making process KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 96. Briefly describe the choice phase of the decision-making process. ANSWER: Answers will vary. The choice phase is usually straightforward. From the practical alternatives, the best and most effective course of action is chosen. It starts with analyzing Copyright Cengage Learning. Powered by Cognero.

Page 45


Module 12: Supporting Decisions and Processes each alternative and its relationship to the criteria to determine whether it is feasible. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Examine the types of decisions made in each phase of the decision-making process. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.12.1 TOPICS: Decision-making process KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 97. List the major components of a decision support system (DSS). ANSWER: Answers will vary. A DSS includes three major components: a database, a model base, and a user interface. In addition, a fourth component, the DSS engine, manages and coordinates these major components. See 12-2: Decision Support Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe a decision support system. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 3:58 PM 98. Describe the user interface component of a decision support system (DSS). ANSWER: Answers will vary. The user interface component is how users access the DSS, such as when querying the database or model base, for help in making decisions. From the end user’s point of view, the interface is the most important part of a DSS and must be as flexible and user friendly as possible. Because most DSS users are senior executives with little computer training, user friendliness is essential in these systems. See 12-2: Decision Support Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe a decision support system. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems Copyright Cengage Learning. Powered by Cognero.

Page 46


Module 12: Supporting Decisions and Processes KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 10/22/2019 1:32 PM 12/3/2019 3:59 PM

99. Describe the features that decision support systems (DSSs) include to support decision making. ANSWER: Answers will vary. DSSs include the following types of features to support decision making: a. What-if Analysis: This shows the effect of a change in one variable, answering questions such as “If labor costs increase by 4 percent, how is the final cost of a product affected?” and “If the advertising budget increases by 2 percent, what is the effect on total sales?” b. Goal seeking: This is the reverse of what-if analysis. It asks what has to be done to achieve a particular goal-for example, how much to charge for a product in order to generate $200,000 profit, or how much to advertise a product to increase total sales to $50,000,000. c. Sensitivity Analysis: This enables one to apply different variables, such as determining the maximum price he or she could pay for raw materials and still make a profit, or determining how much the interest rate has to go down for him or her to be able to afford a $100,000 house with a monthly payment of $700. d. Exception reporting Analysis: This monitors the performance of variables that are outside a defined range, such as pinpointing the region that generated the highest total sales or the production center that went over budget. e. Optimization Analysis: Enables a decision maker to manipulate a series of key variables in order to maximize profit or minimize cost. In these situations, the decision maker is given a series of constraints. For example, you have 100 units of labor and 200 units of leather. How many pairs of shoes and bags do you have to make in order to maximize profit? Naturally, each pair of shoes and each bag uses different amounts of resources and each one contributes to total profit with different margins. See 12-2: Decision Support Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe a decision support system. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 4:02 PM 100. List the roles involved in designing, implementing, and using a decision support system (DSS). ANSWER: Answers will vary. To design, implement, and use a DSS, several roles are involved. These roles include the user, managerial designer, technical designer, and model builder. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe a decision support system. QUESTION TYPE: Essay HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 47


Module 12: Supporting Decisions and Processes STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 101. Discuss the role of a model builder in the decision-making process with an example. ANSWER: Answers will vary. A model builder is the liaison between users and designers. For example, during the design phase, the model builder might explain users’ needs to the managerial designer or technical designer. Later, during the implementation phase, this person might explain the output of a regression analysis to users, describing the assumptions underlying the model, its limitations, and its strengths. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe a decision support system. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.12.2 TOPICS: Decision support systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 102. What is the function of a digital dashboard? ANSWER: Answers will vary. A digital dashboard offers up-to-the minute snapshots of information and assists decision makers in identifying trends and potential problems. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain an executive information system’s importance in decision making. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.12.3 TOPICS: Executive information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM 103. List any three important characteristics of an executive information system (EIS). ANSWER: Answers will vary. The following are some important characteristics of an EIS: a. Tailored to meet management’s information needs b. Can extract, compress, filter, and track critical data c. Provides online status access, trend analysis, and exception reporting d. Offers information in graphical, tabular, and text formats Copyright Cengage Learning. Powered by Cognero.

Page 48


Module 12: Supporting Decisions and Processes e. Includes statistical analysis techniques for summarizing and structuring data f. Retrieves data in a wide range of platforms and data formats g. Contains customized application-development tools h. Supports electronic communication, such as e-mail and video conferencing See 12-3: Executive Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain an executive information system’s importance in decision making. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.12.3 TOPICS: Executive information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 4:04 PM 104. Describe three ways in which managers can use an executive information system (EIS) to improve the efficiency and effectiveness of decision making. ANSWER: Answers will vary. Managers can use EISs to improve the efficiency and effectiveness of decision making in the following ways: a. Increase managers’ productivity by providing fast and easy access to relevant information. b. Convert information into other formats, such as bar charts or graphs, to help managers analyze different business scenarios and see the effect of certain decisions on the organization. c. Spot trends and report exceptions, such as gathering data on profitability and production costs at a manufacturing plant to determine whether closing the plant is more beneficial than keeping it open. See 12-3: Executive Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain an executive information system’s importance in decision making. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.12.3 TOPICS: Executive information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 4:05 PM 105. Explain the capabilities of a digital dashboard within an Executive Information System. ANSWER: Answers will vary. A digital dashboard integrated information from multiple

sources and presents it in a unified, understandable format, often as charts and graphs. Digital dashboards and scorecards offer up-to-the minute snapshots of information and assist deci- sion makers in identifying trends and potential Copyright Cengage Learning. Powered by Cognero.

Page 49


Module 12: Supporting Decisions and Processes

problems. A typical digital dashboard offers four capabilities including consolidation, drill-down, slice-and-dice, and pivot analysis. See 12-3: Executive Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain an executive information system’s importance in decision making. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.12.3 TOPICS: Executive information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 4:09 PM 106. What tasks do managers perform using an executive information system (EIS)? ANSWER: Answers will vary. Generally, managers perform six tasks using an EIS: tracking performance, flagging exceptions, ranking, comparing, spotting trends, and investigating/exploring. See 12-3: Executive Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain an executive information system’s importance in decision making. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.12.3 TOPICS: Executive information systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 4:11 PM 107. Discuss the advantages of collaboration software. ANSWER: Answers will vary. Advantages of GSSs include the following: a. Because decision makers do not have to travel as much (which includes paying for planes, hotels, and meals), costs as well as stress levels are reduced. b. Because decision makers are not traveling long distances, they have more time to talk with one another and solve problems. c. Shyness is not as much of an issue in GSS sessions as it is in face-to-face meetings. d. Increasing collaboration improves the effectiveness of decision makers. See 12-5: Collaboration Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe collaboration systems or software including their types and criteria for their selection. QUESTION TYPE: Essay HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 50


Module 12: Supporting Decisions and Processes STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.12.5 TOPICS: Collaboration systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 4:12 PM 108. How can a geographic information system (GIS) be used for marketing? ANSWER: Answers will vary. GISs are used in marketing to pinpoint areas with the greatest concentration of potential customers, display sales statistics in a geographic context, evaluate demographic and lifestyle data to identify new markets, target new products to specific populations, analyze market share and population growth in relation to new store locations, and evaluate a company’s market position based on geographic location. For example, Pepsico uses a GIS to find the best locations for new Pizza Hut and Taco Bell outlets. See 12-4: Geographic Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize the uses for a geographic information system. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.12.4 TOPICS: Geographic information systems KEYWORDS: Apply DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 4:16 PM 109. Describe the tasks and data management operations performed by a geographic information system (GIS). ANSWER: Answers will vary. A GIS can perform the following tasks: a. Associate spatial attributes, such as a manufacturing plant’s square footage, with points, lines, and polygons on maps b. Integrate maps and database data with queries, such as finding zip codes with a high population of senior citizens with relatively high income A GIS can support some sophisticated data management operations, such as the following: a. Show the customers who live within a 5-mile radius of the Super Grocery at the corner of 34th and Lexington. A database cannot answer this question because it cannot determine the latitude/longitude coordinates of the store, compute distances using the specified location as the center, identify all zip codes within this circle, and pull out the customers living in these zip codes. b. Show the customers whose driving route from work to home and back takes them through the intersection of 34th and Lexington. A database cannot address this query, either. In this case, the GIS maps customers’ home and work locations and determines all possible routes. It can then narrow down the customer list by picking only those whose shortest route takes them through the specified intersection. See 12-4: Geographic Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize the uses for a geographic information system. Copyright Cengage Learning. Powered by Cognero.

Page 51


Module 12: Supporting Decisions and Processes QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.12.4 TOPICS: Geographic information systems KEYWORDS: Apply DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 12/3/2019 4:18 PM 110. Discuss the importance of keeping a consistent look and feel for a management support system (MSS). ANSWER: Answers will vary. Designers should use standard layouts, formats, and colors in windows, menus, and dialog boxes for consistency and ease of use. That way, a user who has learned the database portion of the system, for example, should be able to switch to the reportgenerating portion with little trouble because the interface is familiar. One can see this factor in Microsoft Office, which uses similar features, such as formatting toolbars, in all its applications. Users accustomed to Word, for example, can learn how to use Excel quickly because the interface is familiar. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Apply the eight guidelines for designing a management support system. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.12.6 TOPICS: Management support systems System design KEYWORDS: Apply DATE CREATED: 10/22/2019 1:32 PM DATE MODIFIED: 10/22/2019 1:32 PM

Copyright Cengage Learning. Powered by Cognero.

Page 52


Module 13: Artificial Intelligence and Automation True / False 1. Artificial intelligence (AI) applications and technologies are more intelligent than traditional information systems. a. True b. False ANSWER: True RATIONALE: Correct Although AI applications and technologies may not offer true human intelligence, they are certainly more intelligent than traditional information systems. Over the years, the capabilities of these systems have improved in an attempt to close the gap between artificial intelligence and human intelligence. See 13-1: What Is Artificial Intelligence? POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define artificial intelligence, and explain how AI technologies support decision making. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.1 TOPICS: Artificial intelligence KEYWORDS: Remember DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 2. In the context of information technology, “what-is” decision-making analysis is used in systems that have the capability to report real-time information and predict what could happen in the future. a. True b. False ANSWER: False RATIONALE: Correct “What-is” analysis is commonly used in transaction-processing systems and management information systems. However, these systems lack the capability to report real-time information or predict what could happen in the future. See 13-1: What Is Artificial Intelligence? POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define artificial intelligence, and explain how AI technologies support decision making. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.1 TOPICS: Artificial intelligence KEYWORDS: Remember DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 11/25/2019 10:28 AM 3. Decision makers use “what-is” analysis to monitor the effect of a change in one or more variables. Copyright Cengage Learning. Powered by Cognero.

Page 1


Module 13: Artificial Intelligence and Automation a. True b. False ANSWER: RATIONALE:

False Correct Decision makers use “what-if” analysis to monitor the effect of a change in one or more variables. It is available in spreadsheet programs, such as Microsoft Excel. See 13-1: What Is Artificial Intelligence? POINTS: 1 DIFFICULTY: Easy REFERENCES: Define artificial intelligence, and explain how AI technologies support decision making. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.1 TOPICS: Artificial intelligence KEYWORDS: Remember DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 11/26/2019 1:16 PM 4. Robots are one of the most successful applications of artificial intelligence (AI). a. True b. False ANSWER: True RATIONALE: Correct Robots are one of the most successful applications of AI. They perform well at simple, repetitive tasks and can be used to free workers from tedious or hazardous jobs. See 13-1: What Is Artificial Intelligence? POINTS: 1 DIFFICULTY: Easy REFERENCES: Define artificial intelligence, and explain how AI technologies support decision making. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.1 TOPICS: Robotics KEYWORDS: Remember DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 5. Some robots have limited vision that is useful for locating and picking up objects, as long as the objects are isolated from other objects. a. True b. False ANSWER: True RATIONALE: Correct Some robots have limited vision that is useful for locating and picking up objects, as long Copyright Cengage Learning. Powered by Cognero.

Page 2


Module 13: Artificial Intelligence and Automation as the objects are isolated from other objects. Typically, their mobility is limited. See 13-1: What Is Artificial Intelligence? POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define artificial intelligence, and explain how AI technologies support decision making. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.1 TOPICS: Robotics KEYWORDS: Remember DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 6. Robots can be used in environments that are hazardous to humans. a. True b. False ANSWER: True RATIONALE: Correct Robots can be used in environments that are hazardous to humans, such as working with radioactive materials. Developments in artificial intelligence-related fields, such as expert systems and natural-language processing, will affect the future development of the robotics industry. See 13-1: What Is Artificial Intelligence? POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define artificial intelligence, and explain how AI technologies support decision making. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.1 TOPICS: Robotics KEYWORDS: Remember DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 7. For expert systems to be successful, they must be applied to an activity that human experts have not handled in the past. a. True b. False ANSWER: False RATIONALE: Correct For expert systems to be successful, they must be applied to an activity that human experts have already handled, such as tasks in medicine, geology, education, and oil exploration. Expert systems mimic human expertise in a particular field to solve a problem in a welldefined area. See 13-2: Expert Systems POINTS: 1 DIFFICULTY: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 3


Module 13: Artificial Intelligence and Automation REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 8. The user interface component of an expert system provides user-friendly access to the expert system. a. True b. False ANSWER: True RATIONALE: Correct The user interface component of an expert system is the same as the user interface component of a decision support system. It provides user-friendly access to the expert system. Although graphical user interfaces have improved this component, one goal of artificial intelligence technology is to provide a natural language for the user interface. See 13-2: Expert Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system components Expert systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 11/25/2019 10:36 AM 9. An expert system is not a good choice when a lot of human expertise is needed to tackle a problem. a. True b. False ANSWER: False RATIONALE: Correct An expert system should be used if a lot of human expertise is needed but a single expert cannot tackle the problem on his or her own. An expert system can integrate the experience and knowledge of several experts more easily. See 13-2: Expert Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.2 Copyright Cengage Learning. Powered by Cognero.

Page 4


Module 13: Artificial Intelligence and Automation TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Expert systems Expert system uses Understand 10/22/2019 1:33 PM 10/22/2019 1:33 PM

10. An expert system should be used when well-structured numerical problems are involved. a. True b. False ANSWER: False RATIONALE: Correct An expert system is unsuitable when there are well-structured numerical problems (such as payroll processing) involved. This means that standard transaction-processing methods can handle the situation more quickly and economically. See 13-2: Expert Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system uses Expert systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 11. Problems involving a combination of the five senses, such as taste and smell, are not suitable for expert systems. a. True b. False ANSWER: True RATIONALE: Correct An expert system is unsuitable when problems require human experts-for example, a combination of the five senses, such as taste and smell. Selecting a perfume is a problem better solved by human experts. See 13-2: Expert Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system uses Expert systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM Copyright Cengage Learning. Powered by Cognero.

Page 5


Module 13: Artificial Intelligence and Automation 12. Intelligent agents are used for virtual catalogs. a. True b. False ANSWER: True RATIONALE: Correct Intelligent agents are used for smart or interactive catalogs, called virtual catalogs. A virtual catalog displays product descriptions based on customers’ previous experiences and preferences. See 13-4: Intelligent Agents POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize each of the four types of intelligent agents and how they are used. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.4 TOPICS: Intelligent agents KEYWORDS: Apply DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 13. Fuzzy logic is used in refrigerators that set defrosting and cooling times based on usage patterns. a. True b. False ANSWER: True RATIONALE: Correct Fuzzy logic is used in refrigerators that set defrosting and cooling times based on usage patterns. Fuzzy logic has been used in search engines, chip design, database management systems, software development, and other areas. See 13-5: Fuzzy Logic POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe fuzzy logic and its uses. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.5 TOPICS: Fuzzy logic KEYWORDS: Remember DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 14. Integrating expert system capabilities into the user interface component can improve the quality and user friendliness of a DSS. a. True b. False ANSWER: True RATIONALE: Correct Integrating expert system capabilities into the user interface component can improve the quality and user friendliness of a DSS. See 13-9: Integrating AI Technologies into Copyright Cengage Learning. Powered by Cognero.

Page 6


Module 13: Artificial Intelligence and Automation Decision Support Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the five benefits of integrating AI technologies into decision support systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.9 TOPICS: Decision support systems KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 15. Contextual computing lacks the ability to tailor a course of action to a user in a particular situation and environment based on what it knows about the user. a. True b. False ANSWER: False RATIONALE: Correct The principle behind contextual computing is that computers can both sense and react to their environments similar to how human brains understand and interpret stimuli. In essence, contextual computing allows for tailoring a course of action to a user in a particular situation and environment based on what it knows about the user. See 13-10: Contextual Computing: Making Mobile Devices Smarter POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain contextual computing. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.10 TOPICS: Context-aware computing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 11/26/2019 1:27 PM 16. Fuzzy logic helps computers simulate greater precision when sufficient data about a situation is not available. a. True b. False ANSWER: False RATIONALE: Correct Fuzzy logic is designed to help computers simulate vagueness and uncertainty in common situations. See 13-5: Fuzzy Logic POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe fuzzy logic and its uses. Copyright Cengage Learning. Powered by Cognero.

Page 7


Module 13: Artificial Intelligence and Automation QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.5 TOPICS: Fuzzy logic KEYWORDS: Understand DATE CREATED: 11/26/2019 4:08 PM DATE MODIFIED: 11/26/2019 4:09 PM 17. Genetic algorithms can examine problems without assumptions of what the correct answer should be. a. True b. False ANSWER: True RATIONALE: Correct Genetic algorithms can examine complex problems without any assumptions of what the correct solution should be. See 13-7: Genetic Algorithms POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe how genetic algorithms are used. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.7 TOPICS: genetic algorithms KEYWORDS: Understand DATE CREATED: 11/26/2019 5:10 PM DATE MODIFIED: 11/26/2019 5:19 PM 18. In a GA system, the crossover technique tries combinations of different inputs and evaluates the results. a. True b. False ANSWER: False RATIONALE: Correct In a GA system, the following techniques are used: Chromosome—A set of parameters that defines a proposed solution to the problem the GA is trying to solve. It is usually represented as a simple string (sequence of characters); Selection or survival of the fittest—Gives preference or a higher weight to better outcomes; Crossover—Combines good portions of different outcomes to achieve a better outcome; Mutation—Tries combinations of different inputs randomly and evaluates the results; Chromosome—A set of parameters that defines a proposed solution to the problem the GA is trying to solve. It is usually represented as a simple string (sequence of characters). See 13-7: Genetic Algorithms POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe how genetic algorithms are used. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.7 Copyright Cengage Learning. Powered by Cognero.

Page 8


Module 13: Artificial Intelligence and Automation TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

genetic algorithms Understand 11/26/2019 5:15 PM 11/26/2019 5:18 PM

19. In a GA system, the chromosome technique is a set of parameters that defines a proposed solution, and is usually expressed as a simple string of characters. a. True b. False ANSWER: True RATIONALE: Correct In a GA system, the following techniques are used: Chromosome—A set of parameters that defines a proposed solution to the problem the GA is trying to solve. It is usually represented as a simple string (sequence of characters); Selection or survival of the fittest—Gives preference or a higher weight to better outcomes; Crossover—Combines good portions of different outcomes to achieve a better outcome; Mutation—Tries combinations of different inputs randomly and evaluates the results; Chromosome—A set of parameters that defines a proposed solution to the problem the GA is trying to solve. It is usually represented as a simple string (sequence of characters). See 13-7: Genetic Algorithms POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe how genetic algorithms are used. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.7 TOPICS: genetic algorithms KEYWORDS: Understand DATE CREATED: 11/26/2019 5:19 PM DATE MODIFIED: 11/26/2019 5:22 PM 20. Genetic algorithms are not yet being used with fuzzy logic systems. a. True b. False ANSWER: False RATIONALE: Correct Genetic algorithms are already used with neural networks and fuzzy logic systems to solve scheduling, engineering design, and marketing problems, among others. See 13-7: Genetic Algorithms POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe how genetic algorithms are used. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.7 TOPICS: genetic algorithms Copyright Cengage Learning. Powered by Cognero.

Page 9


Module 13: Artificial Intelligence and Automation KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 11/26/2019 5:22 PM 11/26/2019 5:24 PM

21. Improving access speed is one benefit of integrating an expert system into the database component of a DSS. a. True b. False ANSWER: True RATIONALE: Correct The benefits of integrating an expert system into the database component of a DSS include: improving access speed. See 13-9: Integrating AI Technologies into Decision Support Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the five benefits of integrating AI technologies into decision support systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.9 TOPICS: Decision support systems KEYWORDS: Analyze DATE CREATED: 11/26/2019 5:35 PM DATE MODIFIED: 11/26/2019 5:37 PM 22. Integrating NLP into the user interface component of a system makes it more difficult to use for decision makers who are not computer savvy. a. True b. False ANSWER: False RATIONALE: Correct Integrating NLP can improve the effectiveness of an interface, too, by making it easier to use, particularly for decision makers who are not computer savvy. See 13-9: Integrating AI Technologies into Decision Support Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the five benefits of integrating AI technologies into decision support systems. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.9 TOPICS: Decision support systems KEYWORDS: Analyze DATE CREATED: 11/26/2019 5:38 PM DATE MODIFIED: 11/26/2019 5:42 PM 23. Some contextual software is capable of sensing a user's mood. Copyright Cengage Learning. Powered by Cognero.

Page 10


Module 13: Artificial Intelligence and Automation a. True b. False ANSWER: RATIONALE:

True Correct Another example of context-aware software is Microsoft’s MoodScope, which is able to sense a user’s mood. See 13-10: Contextual Computing: Making Mobile Devices Smarter POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain contextual computing. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.10 TOPICS: Context-aware computing KEYWORDS: Understand DATE CREATED: 11/26/2019 5:48 PM DATE MODIFIED: 11/26/2019 5:51 PM 24. Contextual computing allows for tailoring a course of action based on what the computer knows about the user. a. True b. False ANSWER: True RATIONALE: Correct In essence, contextual computing allows for tailoring a course of action to a user in a particular situation and environment based on what it knows about the user. To achieve this, many of the information technologies discussed in this textbook may be used, including computer networks, software, hardware, database systems, and AI technologies. See 13-10: Contextual Computing: Making Mobile Devices Smarter POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain contextual computing. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.10 TOPICS: Context-aware computing KEYWORDS: Understand DATE CREATED: 11/26/2019 5:51 PM DATE MODIFIED: 11/26/2019 5:53 PM 25. Qualcomm has introduced a line of processors designed to expedite contextual computing. a. True b. False ANSWER: True RATIONALE: Correct Qualcomm, the chip maker for smartphones and other computing devices, has launched a line of Brain-Inspired Zeroth Processors to expedite contextual computing. According to the company, this line of software tools and technologies enables hand- held devices to Copyright Cengage Learning. Powered by Cognero.

Page 11


Module 13: Artificial Intelligence and Automation learn as they receive feedback from their environment. See 13-10: Contextual Computing: Making Mobile Devices Smarter POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain contextual computing. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.10 TOPICS: Context-aware computing KEYWORDS: Understand DATE CREATED: 11/26/2019 6:02 PM DATE MODIFIED: 11/26/2019 6:08 PM 26. Scenarios that involve drawing on past experiences and responding to new information, such as seeing a friend who looks sad, are easy for computers to understand. a. True b. False ANSWER: False RATIONALE: Correct Humans make decisions based on what they know and how they feel about something, drawing on experiences they have accumulated throughout their lives. For example, in a dark alley, when you hear a noise, you may quickly change directions. Alternatively, if you see a friend who looks sad, you ask them if there is something wrong. These scenarios would be difficult for computers to understand and perform a role in, but it is what contextual computing is designed to achieve. See 13-10: Contextual Computing: Making Mobile Devices Smarter POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain contextual computing. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.10 TOPICS: Context-aware computing KEYWORDS: Understand DATE CREATED: 11/26/2019 6:05 PM DATE MODIFIED: 11/26/2019 6:08 PM Multiple Choice 27. Which is a difference between information systems and artificial intelligence (AI) technologies? a. Unlike AI technologies, information systems are programmed by knowledge engineers. b. Unlike AI technologies, information systems are concerned with capturing and storing data. c. Unlike information systems, AI technologies are concerned with retrieving and working with data. d. Unlike information systems, AI technologies are designed and developed by system analysts. ANSWER: b RATIONALE: Correct. Information systems are concerned with capturing, storing, retrieving, and Copyright Cengage Learning. Powered by Cognero.

Page 12


Module 13: Artificial Intelligence and Automation working with data, but AI technologies are concerned with generating and displaying knowledge and facts. See 13-1: What Is Artificial Intelligence? POINTS: 1 DIFFICULTY: Challenging REFERENCES: Define artificial intelligence, and explain how AI technologies support decision making. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.1 TOPICS: Artificial intelligence Artificial intelligence systems KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 28. In a transaction-processing system, if you enter a customer account number, the system displays the customer’s current balance. In this scenario, _____ decision-making analysis has been used to display the desired results. a. if-else b. if-continue c. what-if d. what-is ANSWER: d RATIONALE: Correct. “What-is” analysis is commonly used in transaction-processing systems and management information systems. For example, if you enter a customer account number, the system displays the customer’s current balance. See 13-1: What Is Artificial Intelligence? POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define artificial intelligence, and explain how AI technologies support decision making. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.1 TOPICS: Artificial intelligence Artificial intelligence systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 11/26/2019 1:47 PM 29. In the context of decision makers using information technology, which decision-making analyses is available in spreadsheet programs, such as Microsoft Excel? a. if-else analysis b. if-continue analysis c. what-if analysis d. what-is analysis ANSWER: c Copyright Cengage Learning. Powered by Cognero.

Page 13


Module 13: Artificial Intelligence and Automation RATIONALE:

Correct. The what-if analysis is used in decision support systems. Decision makers use it to monitor the effect of a change in one or more variables. It is available in spreadsheet programs, such as Microsoft Excel. See 13-1: What Is Artificial Intelligence? POINTS: 1 DIFFICULTY: Easy REFERENCES: Define artificial intelligence, and explain how AI technologies support decision making. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.1 TOPICS: Artificial intelligence Artificial intelligence systems KEYWORDS: Remember DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 30. In the context of applications of artificial intelligence (AI), _____ perform well at simple, repetitive tasks and can be used to free workers from tedious or hazardous jobs. a. robots b. electronic trackers c. data mining agents d. firewalls ANSWER: a RATIONALE: Correct. Robots are one of the most successful applications of AI. They perform well at simple, repetitive tasks and can be used to free workers from tedious or hazardous jobs. See 13-1: What Is Artificial Intelligence? POINTS: 1 DIFFICULTY: Easy REFERENCES: Define artificial intelligence, and explain how AI technologies support decision making. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.1 TOPICS: Robotics Artificial intelligence KEYWORDS: Remember DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 31. What programming language is used for controlling robots? a. Extensible Markup b. Variable Assembly c. Maya Embedded d. Digital Command ANSWER: b Copyright Cengage Learning. Powered by Cognero.

Page 14


Module 13: Artificial Intelligence and Automation RATIONALE:

Correct. Programming languages for controlling robots include Variable Assembly Language, Functional Robotics, and A Manufacturing Language. These languages are usually proprietary, meaning they are specific to individual robot manufacturers. See 13-1: What Is Artificial Intelligence? POINTS: 1 DIFFICULTY: Easy REFERENCES: Define artificial intelligence, and explain how AI technologies support decision making. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.1 TOPICS: Robotics Artificial intelligence KEYWORDS: Remember DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 32. Which is true of personal robots? a. They have limited mobility. b. They have sensory capabilities. c. They have no speech capabilities. d. They are used mostly in the manufacturing industry. ANSWER: a RATIONALE: Correct. Personal robots have limited mobility, limited vision, and some speech capabilities. Currently, they are used mostly as prototypes to test such services as helping the elderly, bringing breakfast to the table, cooking, opening doors, and carrying trays and drinks. See 13-1: What Is Artificial Intelligence? POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define artificial intelligence, and explain how AI technologies support decision making. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.1 TOPICS: Robotics Artificial intelligence systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 33. A(n) _____ consists of programs that mimic human thought behavior in a specific area that human specialists have solved successfully. a. database system b. spiral model c. evolutionary model d. expert system Copyright Cengage Learning. Powered by Cognero.

Page 15


Module 13: Artificial Intelligence and Automation ANSWER: RATIONALE:

d Correct. An expert system consists of programs that mimic human thought behavior in a specific area that human experts have solved successfully. See 13-2: Expert Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system uses Expert systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 34. What was the first expert system developed to determine the chemical structure of molecules? a. ASIMO b. SHINE c. DENDRAL d. COGITO ANSWER: c RATIONALE: Correct. The first expert system, called DENDRAL, was developed in the mid-1960s at Stanford University to determine the chemical structure of molecules. Expert systems mimic human expertise in a particular field to solve a problem in a well-defined area. See 13-2: Expert Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system uses Expert systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 35. Which is an example of an expert system that can be applied to various financial applications? a. DENDRAL b. ASIMO c. Shyster d. PortBlue ANSWER: d RATIONALE: Correct. PortBlue (PortBlue Corporation) is an example of an expert system that can be applied to various financial applications, including examination of complex financial Copyright Cengage Learning. Powered by Cognero.

Page 16


Module 13: Artificial Intelligence and Automation structures, foreign exchange risk management, and more. See 13-2: Expert Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert systems Expert system uses KEYWORDS: Remember DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 36. Which is an expert system used for monitoring what consumers are saying in blogs, comment sections, message boards, and Web-based articles? a. ASIMO b. SHINE c. COGITO d. DENDRAL ANSWER: c RATIONALE: Correct. COGITO is used for monitoring what consumers are saying in blogs, comment sections, message boards, and Web-based articles. It is also used in search engines to better understand users’ queries. See 13-2: Expert Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system uses Expert systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 37. _____ consist of common sense, rules of thumb, educated guesses, and instinctive judgments. a. Turing machines b. Heuristics c. Quick response codes d. Swift codes ANSWER: b RATIONALE: Correct. Heuristics consist of common sense, rules of thumb, educated guesses, and instinctive judgments, and using heuristic data encourages applying knowledge based on experience to solve or describe a problem. Heuristic data is not formal knowledge, but it helps in finding a solution to a problem without following a rigorous algorithm. See 13-2: Copyright Cengage Learning. Powered by Cognero.

Page 17


Module 13: Artificial Intelligence and Automation Expert Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system uses Expert systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 38. In the context of an expert system, a _____ works with the knowledge base management system to ensure that the knowledge base is as up to date as possible. a. knowledge mining tool b. knowledge acquisition facility c. knowledge inference engine d. meta-knowledge system ANSWER: b RATIONALE: Correct. A knowledge acquisition facility works with the knowledge base management system to ensure that the knowledge base is as up to date as possible. It is a software package with manual or automated methods for acquiring and incorporating new rules and facts so that the expert system is capable of growth. See 13-2: Expert Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 39. The knowledge base component of an expert system must include _____ knowledge, which consists of rules related to a problem or discipline. a. metab. heuristic c. factual d. subjective ANSWER: b RATIONALE: Correct. The knowledge base component of an expert system must include heuristic knowledge. Heuristic knowledge consists of rules related to a problem or discipline. See 13-2: Expert Systems Copyright Cengage Learning. Powered by Cognero.

Page 18


Module 13: Artificial Intelligence and Automation POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 40. In the context of the knowledge base component of an expert system, _____ knowledge, enables an expert system to learn from experience and examine and extract relevant facts to determine the path to a solution. a. metab. factual c. heuristic d. dominant ANSWER: a RATIONALE: Correct. Meta-knowledge is knowledge about knowledge. It enables an expert system to learn from experience and examine and extract relevant facts to determine the path to a solution. See 13-2: Expert Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 41. In a loan evaluation expert system, the _____ states why an applicant was approved or rejected. a. explanation facility b. user interface c. inference engine d. meta-knowledge ANSWER: a RATIONALE: Correct. In a loan evaluation expert system, the explanation facility states why a loan applicant was approved or rejected. This component is important because it helps give users confidence in the system's results. See 13-2: Expert Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Multiple Choice Copyright Cengage Learning. Powered by Cognero.

Page 19


Module 13: Artificial Intelligence and Automation HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 11/26/2019 2:02 PM 42. In the context of the components of an expert system, a(n) _____ is similar to the model base component of a decision support system. a. user interface b. knowledge base c. inference engine d. explanation facility ANSWER: c RATIONALE: Correct. An inference engine is similar to the model base component of a decision support system. By using different techniques, such as forward and backward chaining, an inference engine manipulates a series of rules. See 13-2: Expert Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 43. Which component of an expert system uses forward and backward chaining to manipulate a series of rules? a. An explanation facility b. A knowledge base c. A user interface d. An inference engine ANSWER: d RATIONALE: Correct. By using different techniques, such as forward and backward chaining, an inference engine manipulates a series of rules. Some inference engines work from a matrix of facts that includes several rows of conditions and rules, similar to a decision table. See 13-2: Expert Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system components Copyright Cengage Learning. Powered by Cognero.

Page 20


Module 13: Artificial Intelligence and Automation KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 10/22/2019 1:33 PM 10/22/2019 1:33 PM

44. In the forward chaining technique, used by the inference engine component of an expert system, the _____ condition is evaluated first. a. if b. then c. what-is d. what-else ANSWER: a RATIONALE: Correct. In forward chaining, a series of “if-then-else” condition pairs is performed. The “if” condition is evaluated first, and then the corresponding “then-else” action is carried out. See 13-2: Expert Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system components Expert systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 45. In the backward chaining technique, used by the inference engine component of an expert system, the expert system starts with the goal, which is the _____ part, and backtracks to find the right solution. a. if b. then c. else d. what-is ANSWER: b RATIONALE: Correct. In backward chaining, the expert system starts with the goal-the “then” part-and backtracks to find the right solution. In other words, to achieve this goal, what conditions must be met? See 13-2: Expert Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system components Expert systems KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 21


Module 13: Artificial Intelligence and Automation DATE CREATED: DATE MODIFIED:

10/22/2019 1:33 PM 10/22/2019 1:33 PM

46. Which is true of case-based reasoning (CBR)? a. It solves a problem by going through a series of if-then-else rules. b. Each problem and its corresponding solution are stored on a global network. c. Each case in a database shares a common description and keyword. d. It matches a new problem with a previously solved problem and its solution. ANSWER: d RATIONALE: Correct. CBR is a problem-solving technique that matches a new case (problem) with a previously solved case and its solution, both stored in a database. Each case in the database is stored with a description and keywords that identify it. See 13-3: Case-Based Reasoning POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe case-based reasoning, including the four Rs involved in its design and implementation. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.3 TOPICS: Case-based reasoning KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 47. In design and implementation of any _____ reasoning application, there are 4 Rs involved: retrieve, reuse, revise, and retain. a. rule-based b. adductive c. deductive d. case-based ANSWER: d RATIONALE: Correct. In design and implementation of any case-based reasoning (CBR) application, there are 4 Rs involved: retrieve, reuse, revise, and retain. CBR is a problem-solving technique that matches a new case (problem) with a previously solved case and its solution, both stored in a database. See 13-3: Case-Based Reasoning POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe case-based reasoning, including the four Rs involved in its design and implementation. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.3 TOPICS: Case-based reasoning KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM Copyright Cengage Learning. Powered by Cognero.

Page 22


Module 13: Artificial Intelligence and Automation DATE MODIFIED:

10/22/2019 1:33 PM

48. _____ is one of the Rs involved in design and implementation of any case-based reasoning (CBR) application. a. React b. Reserve c. Reason d. Retain ANSWER: d RATIONALE: Correct. In design and implementation of any CBR application, there are 4 Rs involved: retrieve, reuse, revise, and retain. See 13-3: Case-Based Reasoning POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe case-based reasoning, including the four Rs involved in its design and implementation. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.3 TOPICS: Case-based reasoning KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 49. Intelligent agents are also known as _____. a. loggers b. bots c. reactors d. routers ANSWER: b RATIONALE: Correct. Intelligent agents are also known as bots (short for robots). They are software capable of reasoning and following rule-based processes. See 13-4: Intelligent Agents POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize each of the four types of intelligent agents and how they are used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.4 TOPICS: Intelligent agents KEYWORDS: Apply DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 50. Which software is capable of reasoning and following rule-based processes? a. Case-based reasoning systems b. Intelligent agents c. Enterprise resource planning systems Copyright Cengage Learning. Powered by Cognero.

Page 23


Module 13: Artificial Intelligence and Automation d. Quick Response codes ANSWER: b RATIONALE: Correct. Intelligent agents, also known as bots (short for robots), are software capable of reasoning and following rule-based processes. They are becoming more popular, especially in e-commerce. See 13-4: Intelligent Agents POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize each of the four types of intelligent agents and how they are used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.4 TOPICS: Intelligent agents KEYWORDS: Apply DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 51. The _____ characteristic of an intelligent agent demonstrates its ability to learn from previous knowledge and go beyond information given previously. a. autonomy b. adaptability c. reactivity d. mobility ANSWER: b RATIONALE: Correct. The adaptability characteristic of an intelligent agent demonstrates the agent’s ability to learn from previous knowledge and go beyond information given previously. In other words, the system can make adjustments. See 13-4: Intelligent Agents POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize each of the four types of intelligent agents and how they are used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.4 TOPICS: Intelligent agents KEYWORDS: Apply DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 52. What characteristic of a sophisticated intelligent agent demonstrates its ability to operate with minimum input? a. reactivity b. mobility c. autonomy d. adaptability ANSWER: c RATIONALE: Correct. The autonomy characteristic of an intelligent agent demonstrates the agent’s ability to operate with minimum input. The system can respond to environmental stimuli, Copyright Cengage Learning. Powered by Cognero.

Page 24


Module 13: Artificial Intelligence and Automation make a decision without users telling it to do so, and take preemptive action, if needed. See 13-4: Intelligent Agents POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize each of the four types of intelligent agents and how they are used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.4 TOPICS: Intelligent agents KEYWORDS: Apply DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 53. The _____ characteristic of a sophisticated intelligent agent demonstrates its ability to interact with users in a more natural language. a. humanlike interface b. adaptability c. collaborative behavior d. reactivity ANSWER: a RATIONALE: Correct. The humanlike interface characteristic of an intelligent agent demonstrates its ability to interact with users in a more natural language. See 13-4: Intelligent Agents POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize each of the four types of intelligent agents and how they are used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.4 TOPICS: Intelligent agents KEYWORDS: Apply DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 54. The _____ characteristic of an intelligent agent demonstrates the agent’s ability to migrate from one platform to another with a minimum of human intervention. a. reactivity b. adaptability c. autonomy d. mobility ANSWER: d RATIONALE: Correct. The mobility characteristic of an intelligent agent demonstrates the agent’s ability to migrate from one platform to another with a minimum of human intervention. See 13-4: Intelligent Agents POINTS: 1 DIFFICULTY: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 25


Module 13: Artificial Intelligence and Automation REFERENCES: Summarize each of the four types of intelligent agents and how they are used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.4 TOPICS: Intelligent agents KEYWORDS: Apply DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 55. Intelligent agents demonstrate _____, which is the ability to select problems or situations that need attention and act on them. a. adaptability b. collaborative behavior c. humanlike interface d. reactivity ANSWER: d RATIONALE: Correct. Intelligent agents demonstrate reactivity, which is the ability to select problems or situations that need attention and act on them. An agent with this capability typically responds to environmental stimuli. See 13-4: Intelligent Agents POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize each of the four types of intelligent agents and how they are used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.4 TOPICS: Intelligent agents KEYWORDS: Apply DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 56. In the context of intelligent agents, a _____ displays product descriptions based on customers’ previous experiences and preferences. a. mirror site b. generic report c. virtual catalog d. heuristic machine ANSWER: c RATIONALE: Correct. Intelligent agents are used for smart or interactive catalogs, called “virtual catalogs.” A virtual catalog displays product descriptions based on customers’ previous experiences and preferences. See 13-4: Intelligent Agents POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize each of the four types of intelligent agents and how they are used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 26


Module 13: Artificial Intelligence and Automation LEARNING OBJECTIVES: MIS.10e.13.4 TOPICS: Intelligent agents KEYWORDS: Apply DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 57. What can serve as search engines, site reminders, or personal surfing assistants? a. Monitoring and surveillance agents b. Heuristic-data agents c. Data-mining agents d. Shopping and information agents ANSWER: d RATIONALE: Correct. Shopping and information agents can navigate the Web much faster than humans and gather more consistent, detailed information. They can serve as search engines, site reminders, or personal surfing assistants. See 13-4: Intelligent Agents POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize each of the four types of intelligent agents and how they are used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.4 TOPICS: Intelligent agents KEYWORDS: Apply DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 58. A _____ agent can be used to perform specific tasks for a user, such as remembering information for filling out Web forms. a. surveillance b. shopping c. data-mining d. personal ANSWER: d RATIONALE: Correct. Personal agents perform specific tasks for a user, such as remembering information for filling out Web forms or completing e-mail addresses after the first few characters are typed. See 13-4: Intelligent Agents POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize each of the four types of intelligent agents and how they are used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.4 TOPICS: Intelligent agents KEYWORDS: Apply DATE CREATED: 10/22/2019 1:33 PM Copyright Cengage Learning. Powered by Cognero.

Page 27


Module 13: Artificial Intelligence and Automation DATE MODIFIED:

10/22/2019 1:33 PM

59. Data-mining agents work with a _____, detecting trends and discovering new information and relationships among data items that were not readily apparent. a. data warehouse b. knowledge base c. data catalog d. knowledge hub ANSWER: a RATIONALE: Correct. Data-mining agents work with a data warehouse, detecting trends and discovering new information and relationships among data items that were not readily apparent. See 13-4: Intelligent Agents POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize each of the four types of intelligent agents and how they are used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.4 TOPICS: Intelligent agents KEYWORDS: Apply DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 60. _____ agents usually track and report on computer equipment and network systems to predict when a system crash or failure might occur. a. Routing b. Monitoring and surveillance c. Data-mining and data-warehousing d. Personal ANSWER: b RATIONALE: Correct. Monitoring and surveillance agents usually track and report on computer equipment and network systems to predict when a system crash or failure might occur. See 13-4: Intelligent Agents POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize each of the four types of intelligent agents and how they are used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.4 TOPICS: Intelligent agents KEYWORDS: Apply DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 61. _____ is designed to help computers simulate vagueness and uncertainty in common situations. Copyright Cengage Learning. Powered by Cognero.

Page 28


Module 13: Artificial Intelligence and Automation a. Virtual reality b. Nanotechnology c. Fuzzy logic d. Turing machine ANSWER: RATIONALE:

c Correct. Fuzzy logic is designed to help computers simulate vagueness and uncertainty in common situations. It allows computers to reason in a fashion similar to humans and makes it possible to use approximations and vague data yet produce clear and definable answers. See 13-5: Fuzzy Logic POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe fuzzy logic and its uses. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.5 TOPICS: Fuzzy logic KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 62. In the context of fuzzy logic, which defines membership in a black-or-white fashion? a. A crisp set b. A coded set c. A mutable set d. A dynamic set ANSWER: a RATIONALE: Correct. In a conventional set, sometimes called a “crisp” set, membership is defined in a black-or-white fashion; there’s no room for gray. For instance, if 90 percent or higher means a “Pass” grade in a course, getting 89.99 percent does not give you membership in the “Pass” area of this crisp set. See 13-5: Fuzzy Logic POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe fuzzy logic and its uses. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.5 TOPICS: Fuzzy logic KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 63. TVs that adjust screen color and texture for each frame and stabilize the volume based on the viewer’s location in the room demonstrates the use of _____. a. fuzzy logic b. finite automata Copyright Cengage Learning. Powered by Cognero.

Page 29


Module 13: Artificial Intelligence and Automation c. artificial neural capabilities d. virtual reality simulations ANSWER: a RATIONALE: Correct. TVs that adjust screen color and texture for each frame and stabilize the volume based on the viewer’s location in the room demonstrates fuzzy logic. Fuzzy logic has been used in search engines, chip design, database management systems, software development, and other areas. See 13-5: Fuzzy Logic POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe fuzzy logic and its uses. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.5 TOPICS: Fuzzy logic KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 64. _____ is a process and procedure by which knowledge is gained through experience. a. Data mining b. Forward chaining c. Machine learning d. Backward chaining ANSWER: c RATIONALE: Correct. Machine learning is a process and procedure by which knowledge is gained through experience. In other words, computers learn without being explicitly programmed. See 13-6: Machine Learning POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain machine learning and artificial neural networks. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.6 TOPICS: Neural networks KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 65. _____ are networks that learn and are capable of performing tasks that are difficult with conventional computers. a. Storage area networks b. Artificial neural networks c. Enterprise private networks d. Virtual private networks ANSWER: b RATIONALE: Correct. Artificial neural networks (ANN) are networks that learn and are capable of Copyright Cengage Learning. Powered by Cognero.

Page 30


Module 13: Artificial Intelligence and Automation performing tasks that are difficult with conventional computers. Like expert systems, ANNs are used for poorly structured problems-when data is fuzzy and uncertainty is involved. See 13-6: Machine Learning POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain machine learning and artificial neural networks. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.6 TOPICS: Neural networks KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 66. _____ use patterns to find solutions instead of using the if-then-else rules that expert systems use. a. Virtual reality simulators b. Artificial neural networks c. Turing machines d. Heuristic machines ANSWER: b RATIONALE: Correct. Unlike an expert system, an artificial neural network (ANN) cannot supply an explanation for the solution it finds because an ANN uses patterns instead of the if-thenelse rules that expert systems use. An ANN creates a model based on input and output. See 13-6: Machine Learning POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain machine learning and artificial neural networks. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.6 TOPICS: Neural networks KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 67. Which is a type of artificial neural network (ANN) that includes many layers to deal with complex problems that may have very large data sets? a. Virtual computing b. Sparse sampling c. Compressive sensing d. Deep learning ANSWER: d RATIONALE: Correct. Every ANN has to be trained, and when organizational policies change, the network needs to be retrained so it can mimic the new policies. Deep learning is a type of ANN that includes many layers to deal with complex problems that may have very large Copyright Cengage Learning. Powered by Cognero.

Page 31


Module 13: Artificial Intelligence and Automation data sets. See 13-6: Machine Learning POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain machine learning and artificial neural networks. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.6 TOPICS: Neural networks KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 68. In the context of machine learning, an artificial neural network (ANN) is most likely used for: a. oil and gas exploration. b. portfolio development and analysis. c. problems that require the use of if-then-else rules. d. supplying explanations for solutions. ANSWER: a RATIONALE: Correct. ANNs are used for many tasks, including bankruptcy prediction, credit rating, investment analysis, oil and gas exploration, target marketing, and computer and network security. See 13-6: Machine Learning POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain machine learning and artificial neural networks. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.6 TOPICS: Neural networks KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 69. _____ are used with neural networks and fuzzy logic systems to solve scheduling, engineering design, and marketing problems. a. Quick response codes b. Biometric systems c. Genetic algorithms d. Feasibility prototypes ANSWER: c RATIONALE: Correct. Genetic algorithms are used with neural networks and fuzzy logic systems to solve scheduling, engineering design, and marketing problems, among others. For example, a docking algorithm uses a neural network and fuzzy functions with a GA to find the best and shortest route for a robot to take to a docking bay. See 13-7: Genetic Algorithms POINTS: 1 DIFFICULTY: Easy Copyright Cengage Learning. Powered by Cognero.

Page 32


Module 13: Artificial Intelligence and Automation REFERENCES: Describe how genetic algorithms are used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.7 TOPICS: Genetic algorithms KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 70. GeneHunter is a hybrid product that combines artificial intelligence (AI) technologies using _____. a. natural-language processing b. speech systems c. genetic algorithms d. biometric systems ANSWER: c RATIONALE: Correct. GeneHunter is a hybrid product that combines AI technologies using genetic algorithms (GAs). GAs are used for optimization problems that deal with many input variables, such as jet engine design, portfolio development, and network design. See 13-7: Genetic Algorithms POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe how genetic algorithms are used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.7 TOPICS: Genetic algorithms KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 11/26/2019 2:14 PM 71. _____ was developed so that users could communicate with computers in human language. a. Cryptanalysis b. Natural-language processing c. Context-aware software d. Personal agent technology ANSWER: b RATIONALE: Correct. Natural-language processing (NLP) was developed so that users could communicate with computers in human language. An NLP system provides a questionand-answer setting that is more natural and easier for people to use. See 13-8: NaturalLanguage Processing POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain natural-language processing and its major categories. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 33


Module 13: Artificial Intelligence and Automation LEARNING OBJECTIVES: MIS.10e.13.8 TOPICS: Natural-language processing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 72. A natural-language processing (NLP) system provides a question-and-answer setting that is particularly useful with _____. a. turing machines b. simulations c. databases d. virtual terminals ANSWER: c RATIONALE: Correct. An NLP system provides a question-and-answer setting that is more natural and easier for people to use. It is particularly useful with databases. See 13-8: NaturalLanguage Processing POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain natural-language processing and its major categories. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.8 TOPICS: Natural-language processing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 73. The size and complexity of the human language has made developing _____ systems difficult. a. natural-language processing b. database management c. human biometric d. virtual-reality language learning ANSWER: a RATIONALE: Correct. The size and complexity of the human language has made developing naturallanguage processing (NLP) systems difficult. However, progress has been steady, and NLP systems for tasks such as call routing, stock and bond trading, and banking by phone, among others, are already available. See 13-8: Natural-Language Processing POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain natural-language processing and its major categories. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.8 TOPICS: Natural-language processing KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 34


Module 13: Artificial Intelligence and Automation DATE CREATED: DATE MODIFIED:

10/22/2019 1:33 PM 10/22/2019 1:33 PM

74. Explanation capabilities can be added to a decision support system (DSS) by integrating it with a(n) _____. a. expert system b. artificial neural network c. database management library d. natural-language processing system ANSWER: a RATIONALE: Correct. Artificial intelligence-related technologies can improve the quality of DSSs. They can add explanation capabilities (by integrating expert systems) and learning capabilities (by integrating artificial neural networks) and create an interface that is easier to use (by integrating a natural-language processing system). See 13-9: Integrating AI Technologies into Decision Support Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the five benefits of integrating AI technologies into decision support systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.9 TOPICS: Artificial intelligence systems Decision support systems KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 75. Learning capabilities can be added to a decision support system (DSS) by integrating it with a(n) _____. a. expert system b. ANN c. database management library d. natural-language processing system ANSWER: b RATIONALE: Correct. Artificial intelligence-related technologies can improve the quality of DSSs. They can add learning capabilities by integrating ANNs. See 13-9: Integrating AI Technologies into Decision Support Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the five benefits of integrating AI technologies into decision support systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.9 TOPICS: Artificial intelligence systems Decision support systems KEYWORDS: Analyze Copyright Cengage Learning. Powered by Cognero.

Page 35


Module 13: Artificial Intelligence and Automation DATE CREATED: DATE MODIFIED:

10/22/2019 1:33 PM 11/26/2019 2:19 PM

76. Adding deductive reasoning to traditional database management system (DBMS) functions is a benefit of integrating an expert system into the database component of a(n) _____ system. a. transaction processing b. decision support c. global positioning d. executive information ANSWER: b RATIONALE: Correct. Adding deductive reasoning to traditional DBMS functions is a benefit of integrating an expert system into the database component of a decision support system (DSS). Artificial intelligence technologies, particularly expert systems and naturallanguage processing, can be integrated into the database, model base, and user interface components of a DSS. See 13-9: Integrating AI Technologies into Decision Support Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the five benefits of integrating AI technologies into decision support systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.9 TOPICS: Artificial intelligence systems Decision support systems KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 77. Which statement is true of integrating an expert system into the database component of a decision support system (DSS)? a. It adds the capability to handle uncertainty b. It reduces access speed. c. It adds inductive reasoning to traditional database management system functions. d. It complicates query operations. ANSWER: a RATIONALE: Correct. The following are the benefits of integrating an expert system into the database component of a DSS: adding deductive reasoning to traditional database management system functions, improving access speed, improving the creation and maintenance of databases, adding the capability to handle uncertainty and fuzzy data, and simplifying query operations with heuristic search algorithms. See 13-9: Integrating AI Technologies into Decision Support Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the five benefits of integrating AI technologies into decision support systems. QUESTION TYPE: Multiple Choice Copyright Cengage Learning. Powered by Cognero.

Page 36


Module 13: Artificial Intelligence and Automation HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.9 TOPICS: Decision support systems KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 78. Which statement is true of integrating an expert system into the database component of a decision support system (DSS)? a. It reduces access speed. b. It adds the capability to handle fuzzy data. c. It adds inductive reasoning to traditional database management system functions. d. It increases the time and cost of calculating data for models. ANSWER: b RATIONALE: Correct. Adding the capability to handle uncertainty and fuzzy data is a benefit of integrating an expert system into the database component of a DSS. Integrating expert system capabilities into the user interface component can improve the quality and user friendliness of a DSS. See 13-9: Integrating AI Technologies into Decision Support Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the five benefits of integrating AI technologies into decision support systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.9 TOPICS: Artificial intelligence systems Decision support systems KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 79. In the context of adding artificial intelligence (AI) technologies to a decision support system’s model base component, _____ can be added to include heuristics in the model base’s analysis capabilities. a. expert systems b. firmware c. spyware d. virtual reality systems ANSWER: a RATIONALE: Correct. AI technologies can be added to a decision support system’s model base component. For example, expert systems can be added to include heuristics in the model base’s analysis capabilities. See 13-9: Integrating AI Technologies into Decision Support Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the five benefits of integrating AI technologies into decision support Copyright Cengage Learning. Powered by Cognero.

Page 37


Module 13: Artificial Intelligence and Automation systems. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.9 TOPICS: Artificial intelligence systems Decision support systems KEYWORDS: Analyze DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 80. Which system carries the idea of GPS service further than simply telling you which route to take to arrive at a particular place? a. Apple’s Siri b. Google Chat c. Yahoo’s doodle pad d. YouTube ANSWER: a RATIONALE: Correct. Apple’s Siri is an example of context-aware software. A GPS system delivers location-based services-for example, telling you which street to take when you’re traveling from the eastern part of a city to the western part in order to arrive at a particular place. This is a great service for somebody who is not familiar with a city. Applications such as Apple’s Siri and Google Now carry this idea a bit further. See 13-10: Contextual Computing: Making Mobile Devices Smarter POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain contextual computing. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.10 TOPICS: Context-aware computing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 11/26/2019 2:26 PM 81. _____ computing refers to a computing environment that is always present, can feel our surroundings, and-based on who we are, where we are, and whom we are with-offer recommendations. a. Distributed b. Contextual c. Grid d. Cluster ANSWER: b RATIONALE: Correct. Contextual computing refers to a computing environment that is always present, can feel our surroundings, and-based on who we are, where we are, and whom we are withoffer recommendations. See 13-10: Contextual Computing: Making Mobile Devices Smarter POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 38


Module 13: Artificial Intelligence and Automation DIFFICULTY: Easy REFERENCES: Explain contextual computing. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.10 TOPICS: Context-aware computing KEYWORDS: Remember DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 82. _____ consists of related technologies that try to simulate and reproduce human thought behavior, including thinking, speaking, feeling, and reasoning. a. Cloud computing b. Data mining c. Artificial intelligence d. Grid computing ANSWER: c RATIONALE: Artificial intelligence (AI) consists of related technologies that try to simulate and reproduce human thought behavior, including thinking, speaking, feeling, and reasoning. AI technologies apply computers to areas that require knowledge, perception, reasoning, understanding, and cognitive abilities. See 13-1: What Is Artificial Intelligence? POINTS: 1 DIFFICULTY: Easy REFERENCES: Define artificial intelligence, and explain how AI technologies support decision making. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.1 TOPICS: Artificial intelligence KEYWORDS: Remember DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 83. In the context of the types of decision-making analyses, what type of analysis is used in decision support systems? a. case-based b. what-is c. what-if d. rule-based ANSWER: c RATIONALE: The what-if analysis is used in decision support systems. Decision makers use it to monitor the effect of a change in one or more variables. See 13-1: What Is Artificial Intelligence? POINTS: 1 DIFFICULTY: Easy REFERENCES: Define artificial intelligence, and explain how AI technologies support decision making. Copyright Cengage Learning. Powered by Cognero.

Page 39


Module 13: Artificial Intelligence and Automation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.1 TOPICS: Artificial intelligence KEYWORDS: Remember DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 84. In the context of the components of a typical expert system, _____ is a software package with manual or automated methods for acquiring and incorporating new rules and facts so that the expert system is capable of growth. a. knowledge base b. monitoring and surveillance agent c. knowledge acquisition facility d. personal agent ANSWER: c RATIONALE: A knowledge acquisition facility is a software package with manual or automated methods for acquiring and incorporating new rules and facts so that the expert system is capable of growth. This component works with the knowledge base management system to ensure that the knowledge base is as up to date as possible. See 13-2: Expert Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 85. In the context of the components of a typical expert system, _____ is similar to a database, but in addition to storing facts and figures it keeps track of rules and explanations associated with facts. a. a knowledge acquisition facility b. a knowledge base c. factual knowledge d. heuristic knowledge ANSWER: b RATIONALE: A knowledge base is similar to a database, but in addition to storing facts and figures it keeps track of rules and explanations associated with facts. For example, a financial expert system’s knowledge base might keep track of all figures constituting current assets, including cash, deposits, and accounts receivable. It might also keep track of the fact that current assets can be converted to cash within one year. See 13-2: Expert Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe an expert system, its applications, and its components. Copyright Cengage Learning. Powered by Cognero.

Page 40


Module 13: Artificial Intelligence and Automation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 11/26/2019 2:30 PM 86. A(n) _____ is the component of an expert system that performs tasks similar to what a human expert does by explaining to end users how recommendations are derived. a. user interface b. explanation facility c. inference engine d. knowledge base ANSWER: b RATIONALE: An explanation facility performs tasks similar to what a human expert does by explaining to end users how recommendations are derived. For example, in a loan evaluation expert system, the explanation facility states why an applicant was approved or rejected. See 13-2: Expert Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 87. In the context of the different techniques used by an inference engine to manipulate a series of rules, _____ refers to a series of “if-then-else” condition pairs. a. forward chaining b. backward chaining c. inductive reasoning d. abductive reasoning ANSWER: a RATIONALE: In forward chaining, a series of “if-then-else” condition pairs is performed. The “if” condition is evaluated first, and then the corresponding “then-else” action is carried out. See 13-2: Expert Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 41


Module 13: Artificial Intelligence and Automation LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 11/26/2019 2:33 PM 88. _____ is a problem-solving technique where each problem in a database is stored with a description and keywords that identify it. a. Rule-based reasoning b. Inductive reasoning c. Abductive reasoning d. Case-based reasoning ANSWER: d RATIONALE: Expert systems solve a problem by going through a series of if-then-else rules, but casebased reasoning is a problem-solving technique that matches a new case (problem) with a previously solved case and its solution, both stored in a database. See 13-3: Case-Based Reasoning POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe case-based reasoning. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.3 TOPICS: Case-based reasoning KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 89. _____ allows a smooth, gradual transition between human and computer vocabularies and deals with variations in linguistic terms by using a degree of membership. a. Fuzzy logic b. Digital analysis c. Data mining d. Finite automata ANSWER: a RATIONALE: Fuzzy logic allows a smooth, gradual transition between human and computer vocabularies and deals with variations in linguistic terms by using a degree of membership. A degree of membership shows how relevant an item or object is to a set. A higher number indicates it is more relevant, and a lower number shows it is less. See 13-5: Fuzzy Logic POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe fuzzy logic and its uses. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.5 Copyright Cengage Learning. Powered by Cognero.

Page 42


Module 13: Artificial Intelligence and Automation TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Fuzzy logic Understand 10/22/2019 1:33 PM 10/22/2019 1:33 PM

90. _____ are used when data is fuzzy and uncertainty is involved. a. Virtual reality simulations b. Artificial neural networks c. Backtracking algorithms d. Monitoring and surveillance agents ANSWER: b RATIONALE: Like expert systems, artificial neural networks (ANNs) are used for poorly structured problems-when data is fuzzy and uncertainty is involved. Unlike an expert system, an ANN cannot supply an explanation for the solution it finds because an ANN uses patterns instead of the if-then-else rules that expert systems use. See 13-6: Machine Learning POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain machine learning and artificial neural networks. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.6 TOPICS: Neural networks KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 91. _____ mimic the process of natural evolution to generate solutions to optimization and search problems. a. Genetic algorithms b. Greedy algorithms c. Firefly algorithms d. Backtracking algorithms ANSWER: a RATIONALE: Genetic algorithms are search algorithms that mimic the process of natural evolution. They are used to generate solutions to optimization and search problems using such techniques as mutation, selection, crossover, and chromosome. See 13-7: Genetic Algorithms POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe how genetic algorithms are used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.7 TOPICS: Genetic algorithms KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 11/26/2019 2:40 PM Copyright Cengage Learning. Powered by Cognero.

Page 43


Module 13: Artificial Intelligence and Automation 92. Which system provides an easier way for people to communicate with a computer than a graphical user interface (GUI)? a. data mining b. transaction-processing c. natural-language processing d. data abstraction ANSWER: c RATIONALE: Although GUI elements, such as menus and icons, have helped with communication problems between humans and computers, GUIs still involve some training, can be cumbersome to use, and often differ depending on the OS or application. A naturallanguage processing system provides a question-and-answer setting that is more natural and easier for people to use. See 13-8: Natural-Language Processing POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain natural-language processing and its major categories. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.8 TOPICS: Natural-language processing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 93. In a natural-language processing (NLP) system, the _____ activity involves accepting human language as input, carrying out the corresponding command, and generating the necessary output. a. interfacing b. knowledge acquisition c. analysis d. data warehousing ANSWER: a RATIONALE: NLP systems usually perform two types of activities. The first is interfacing: accepting human language as input, carrying out the corresponding command, and generating the necessary output. See 13-8: Natural-Language Processing POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain natural-language processing and its major categories. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.8 TOPICS: Natural-language processing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 11/26/2019 2:53 PM 94. In a natural-language processing (NLP) system, the _____ activity involves using the computer to read large amounts Copyright Cengage Learning. Powered by Cognero.

Page 44


Module 13: Artificial Intelligence and Automation of text and understanding the information well enough to summarize important points and store information so that the system can respond to inquiries about the content. a. interfacing b. knowledge acquisition c. analysis d. data warehousing ANSWER: b RATIONALE: The knowledge acquisition activity involves using the computer to read large amounts of text and understanding the information well enough to summarize important points and store information so that the system can respond to inquiries about the content. See 13-8: Natural-Language Processing POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain natural-language processing and its major categories. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.8 TOPICS: Natural-language processing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 95. In case-based reasoning, each case in the database is stored with _____. a. a solution to the case b. a description and keywords that identify the case c. data from previous cases like the current case d. questions about the case ANSWER: b RATIONALE: Correct. Case-based reasoning is a problem-solving technique that matches a new case (problem) with a previously solved case and its solution, both stored in a database. Each case in the database is stored with a description and keywords that identify it. See 13-3: Case-Based Reasoning POINTS: 1 REFERENCES: Describe case-based reasoning, including the four Rs involved in its design and implementation. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.3 TOPICS: case-based reasoning KEYWORDS: Understand DATE CREATED: 11/26/2019 3:21 PM DATE MODIFIED: 11/26/2019 3:37 PM 96. To solve a problem, a case-based reasoning application first ________ the most similar case from the library of past cases. Copyright Cengage Learning. Powered by Cognero.

Page 45


Module 13: Artificial Intelligence and Automation a. retrieves b. reconfigures c. revises d. repairs ANSWER: RATIONALE:

a Correct. To solve the current case (problem) the system compares it with the cases stored in the database and retrieves the most similar case from the library of the past cases. See 13-3: Case-Based Reasoning POINTS: 1 REFERENCES: Describe case-based reasoning, including the four Rs involved in its design and implementation. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.3 TOPICS: case-based reasoning KEYWORDS: Understand DATE CREATED: 11/26/2019 3:27 PM DATE MODIFIED: 11/26/2019 4:11 PM 97. In case-based reasoning, when a solution is found it is ________ for future use. a. revised and redesigned b. compared with other solutions c. retained as part of the library d. reprogrammed as part of the system ANSWER: c RATIONALE: Correct. In design and implementation of any case-based reasoning application there are four Rs involved: retrieve, reuse, revise, and retain. The final solution is retained as a part of the library for future use. See 13-3: Case-Based Reasoning POINTS: 1 REFERENCES: Describe case-based reasoning, including the four Rs involved in its design and implementation. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.3 TOPICS: case-based reasoning KEYWORDS: Understand DATE CREATED: 11/26/2019 3:33 PM DATE MODIFIED: 11/26/2019 3:36 PM 98. Some banks use a -based reasoning system to qualify customers for loans, using _____. a. bots designed to locate new customers b. recommendations from loan officers c. parameters from past customers stored in a database Copyright Cengage Learning. Powered by Cognero.

Page 46


Module 13: Artificial Intelligence and Automation d. email marketing campaigns based on past customer interactions ANSWER: c RATIONALE: Correct. As another example, some banks use a CBR system to qualify customers for loans, using parameters from past customers stored in a database. See 13-3: Case-Based Reasoning POINTS: 1 REFERENCES: Describe case-based reasoning, including the four Rs involved in its design and implementation. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.3 TOPICS: case-based reasoning KEYWORDS: Understand DATE CREATED: 11/26/2019 3:38 PM DATE MODIFIED: 11/26/2019 3:42 PM 99. In a case-based reasoning system, the CBS system _____ if there is no exact match between the new case and cases stored in the database. a. can query the user for clarification b. can request that the user reprogram the system c. automatically terminates d. designs a new solution ANSWER: a RATIONALE: Correct. If there is no exact match between the new case and cases stored in the database, the system can query the user for clarification or more information. See 13-3: Case-Based Reasoning POINTS: 1 REFERENCES: Describe case-based reasoning, including the four Rs involved in its design and implementation. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.3 TOPICS: case-based reasoning KEYWORDS: Understand DATE CREATED: 11/26/2019 3:43 PM DATE MODIFIED: 11/26/2019 3:51 PM 100. In fuzzy logic, a degree of membership indicates _______. a. how to solve a problem b. whether a series of actions will result in a solution c. whether the answer is yes or no d. how relevant an item or object is to a set ANSWER: d Copyright Cengage Learning. Powered by Cognero.

Page 47


Module 13: Artificial Intelligence and Automation RATIONALE:

Correct. Fuzzy logic allows a smooth, gradual transition between human and computer vocabularies and deals with variations in linguistic terms by using a degree of membership. A degree of membership shows how relevant an item or object is to a set. See 13-5: Fuzzy Logic POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe fuzzy logic and its uses. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.5 TOPICS: Fuzzy logic KEYWORDS: Understand DATE CREATED: 11/26/2019 3:52 PM DATE MODIFIED: 11/26/2019 4:07 PM 101. Fuzzy logic allows computers to ______ in a similar fashion to humans. a. reason b. speak c. travel d. remember ANSWER: a RATIONALE: Correct. Fuzzy logic allows computers to reason in a fashion similar to humans and makes it possible to use approximations and vague data yet produce clear and definable answers. See 13-5: Fuzzy Logic POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe fuzzy logic and its uses. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.5 TOPICS: Fuzzy logic KEYWORDS: Understand DATE CREATED: 11/26/2019 4:11 PM DATE MODIFIED: 11/26/2019 4:14 PM 102. Learning takes place within the _____ layer of an artificial neural network. a. output b. input c. middle d. newest ANSWER: c RATIONALE: Correct. An ANN has an output layer, an input layer, and a middle (hidden) layer where learning takes place. If you are using an ANN for approving loans in a bank, the middle layer is trained by using past data (from old loan applications, in which the deci- sions are known) that includes both accepted and rejected applications. See 13-6: Machine Learning Copyright Cengage Learning. Powered by Cognero.

Page 48


Module 13: Artificial Intelligence and Automation POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain machine learning and artificial neural networks. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.6 TOPICS: Neural networks KEYWORDS: Understand DATE CREATED: 11/26/2019 4:47 PM DATE MODIFIED: 11/26/2019 4:51 PM 103. Genetic algorithms are used for problems that deal with ______. a. few input variables b. many input variables c. few output variables d. many output variables ANSWER: b RATIONALE: Correct. Genetic algorithms are used for optimization problems that deal with many input variables, such as jet engine design, portfolio development, and network design. See 13-7: Genetic Algorithms POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe how genetic algorithms are used. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.7 TOPICS: Genetic algorithms KEYWORDS: Understand DATE CREATED: 11/26/2019 5:06 PM DATE MODIFIED: 11/26/2019 5:10 PM 104. A natural-language processing system provides a _______ for people to use. a. GUI environment b. question-and-answer setting c. command-line interface d. point and click environment ANSWER: b RATIONALE: Correct. Although GUI elements, such as menus and icons, have helped with communication problems between humans and computers, GUIs still involve some training, can be cumbersome to use, and often differ depending on the operating system or application. An NLP system provides a question-and-answer setting that is more natural and easier for people to use. See 13-8: Natural-Language Processing POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain natural-language processing and its major categories. Copyright Cengage Learning. Powered by Cognero.

Page 49


Module 13: Artificial Intelligence and Automation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.8 TOPICS: Natural-language processing KEYWORDS: Understand DATE CREATED: 11/26/2019 5:24 PM DATE MODIFIED: 11/26/2019 5:28 PM 105. Which type of computing draws on the human process of drawing on accumulated experiences and feelings to make a decision: a. database design b. case-based reasoning c. machine learning d. contextual computing ANSWER: d RATIONALE: Correct. Humans make decisions based on what they know and how they feel about something, drawing on experiences they have accumulated throughout their lives. For example, in a dark alley, when you hear a noise, you may quickly change directions. Alternatively, if you see a friend who looks sad, you ask them if there is something wrong. These scenarios would be difficult for computers to understand and perform a role in, but it is what con- textual computing is designed to achieve. See 13-10: Contextual Computing: Making Mobile Devices Smarter POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain contextual computing. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.13.10 TOPICS: Context-aware computing KEYWORDS: Understand DATE CREATED: 11/26/2019 5:54 PM DATE MODIFIED: 11/26/2019 6:01 PM Essay 106. Describe the advantages offered by robots over humans in the workplace. ANSWER: Answers will vary. Robots offer the following advantages over humans in the workplace: a. They do not fall in love with coworkers, get insulted, or call in sick. b. They are consistent. c. They can be used in environments that are hazardous to humans, such as working with radioactive materials. d. They do not spy for competitors, ask for a raise, or lobby for longer breaks. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Define artificial intelligence, and explain how AI technologies support decision making. Copyright Cengage Learning. Powered by Cognero.

Page 50


Module 13: Artificial Intelligence and Automation QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.13.1 TOPICS: Robotics KEYWORDS: Remember DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 107. In the context of expert systems, briefly describe heuristic data. ANSWER: Answers will vary. Decision support systems generate information by using data, models, and well-defined algorithms, but expert systems work with heuristic data. Heuristics consist of common sense, rules of thumb, educated guesses, and instinctive judgments, and using heuristic data encourages applying knowledge based on experience to solve or describe a problem. In other words, heuristic data is not formal knowledge, but it helps in finding a solution to a problem without following a rigorous algorithm. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 108. In the context of an expert system, explain the factual knowledge component of a knowledge base with an example. ANSWER: Answers will vary. A knowledge base is similar to a database, but in addition to storing facts and figures, it keeps track of rules and explanations associated with facts. One of the components of a knowledge base is factual knowledge. Factual knowledge consists of facts related to a specific discipline, subject, or problem. For example, facts related to kidney problems might include kidney size, blood levels of certain enzymes, and duration and location of pain. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM Copyright Cengage Learning. Powered by Cognero.

Page 51


Module 13: Artificial Intelligence and Automation 109. In the context of an expert system, briefly explain the meta-knowledge component of a knowledge base. ANSWER: Answers will vary. Meta-knowledge is knowledge about knowledge. It enables an expert system to learn from experience and examine and extract relevant facts to determine the path to a solution. It also guides future planning or execution phases of an expert system. For example, knowing how an expert system makes decisions is considered metaknowledge. Although this type of knowledge is not currently available in expert systems, integrating neural networks into expert systems is one possibility for acquiring metaknowledge. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 110. In the context of the components of an expert system, briefly describe an explanation facility. ANSWER: Answers will vary. An explanation facility performs tasks similar to what a human expert does by explaining to end users how recommendations are derived. For example, in a loan evaluation expert system, the explanation facility states why an applicant was approved or rejected. In a medical expert system, it explains why the system concluded that a patient has a kidney stone, for instance. This component is important because it helps give users confidence in the system’s results. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system components KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 111. With the help of an example, explain the difference between forward chaining and backward chaining techniques used by an expert system. ANSWER: Answers will vary. The following example will help one understand the differences between forward chaining and backward chaining techniques. In an expert system that provides financial investment advice for investors, the system might use forward chaining and ask 50 questions to determine which of five investment categories-oil-gas, bonds, common stocks, public utilities, and transportation-is more suitable for an investor. In Copyright Cengage Learning. Powered by Cognero.

Page 52


Module 13: Artificial Intelligence and Automation addition, each investor is in a specific tax bracket, and each investment solution provides a different tax shelter. In forward chaining, the system evaluates all the “if-then-else” conditions before making the final recommendation. In backward chaining, the system might start with the public utilities category, specified by the investor, and go through all the “if” conditions to see whether this investor qualifies for this investment category. The backward chaining technique can be faster in some situations because it does not have to consider irrelevant rules, but the solution the system recommends might not be the best one. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 112. Briefly discuss the areas where expert systems are widely used. ANSWER: Answers will vary. Many companies are engaged in research and development of expert systems, and these systems are now used in areas such as the following: • Airline industry-American Airlines developed an expert system to manage frequent flier transactions. • Forensics lab work-Expert systems are used to review DNA samples from crime scenes and generate results quickly and accurately, helping reduce the backlog in labs and get data entered in national crime databases faster. • Banking and finance-JPMorgan Chase developed a foreign currency trade expert system to assess historical trends, new events, and buying and selling factors. • Education-Arizona State University developed an expert system to teach math and evaluate students’ math skills. • Food industry-Campbell’s Soup Company developed an expert system to capture expertise that a highly specialized, long-time employee had about plant operations and sterilizing techniques. • Personnel management-IBM developed an expert system to assist in training technicians; it has reduced training time. • Security-Canada Trust Bank developed an expert system to track credit card holders’ purchasing trends and report deviations, such as unusual activity on a card. • U.S. government-Expert systems have been developed to monitor nuclear power plants and assist departments such as the IRS, INS, U.S. Postal Service, Department of Transportation, Department of Energy, and Department of Defense in decision-making process. • Agriculture-The National Institute of Agricultural Extension Management has designed an expert system to diagnose pests and diseases in rice crops and suggest preventive measures. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe an expert system, its applications, and its components. Copyright Cengage Learning. Powered by Cognero.

Page 53


Module 13: Artificial Intelligence and Automation QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert system uses KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 113. Discuss the advantages that an expert system has over humans. ANSWER: Answers will vary. An expert system can have the following advantages over humans: • It never becomes distracted, forgetful, or tired. Therefore, it is particularly suitable for monotonous tasks that human workers might object to. • It duplicates and preserves the expertise of scarce experts and can incorporate the expertise of many experts. • It preserves the expertise of employees who are retiring or leaving an organization. • It creates consistency in decision making and improves the decision-making skills of nonexperts. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe an expert system, its applications, and its components. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.13.2 TOPICS: Expert systems KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 114. Discuss an application of intelligent agents that is in use today. ANSWER: Answers will vary. One important application of intelligent agents that is already available is Web marketing. Intelligent agents can collect information about customers, such as items purchased, demographic information, and expressed and implied preferences. Ecommerce sites then use this information to better market their products and services to customers. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize each of the four types of intelligent agents and how they are used. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.13.4 TOPICS: Intelligent agents KEYWORDS: Apply DATE CREATED: 10/22/2019 1:33 PM Copyright Cengage Learning. Powered by Cognero.

Page 54


Module 13: Artificial Intelligence and Automation DATE MODIFIED:

10/22/2019 1:33 PM

115. Briefly discuss shopping and information agents. ANSWER: Answers will vary. Shopping and information agents help users navigate through the vast resources available on the Web and provide better results in finding information. These agents can navigate the Web much faster than humans and gather more consistent, detailed information. They can serve as search engines, site reminders, or personal surfing assistants. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize each of the four types of intelligent agents and how they are used. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.13.4 TOPICS: Intelligent agents KEYWORDS: Apply DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 116. Discuss the tasks that an e-mail personal agent performs. ANSWER: Answers will vary. An e-mail personal agent can usually perform the following tasks: a. Generate auto-response messages b. Forward incoming messages c. Create e-mail replies based on the content of incoming messages POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize each of the four types of intelligent agents and how they are used. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.13.4 TOPICS: Intelligent agents KEYWORDS: Apply DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 117. Briefly explain data-mining agents. ANSWER: Answers will vary. Data-mining agents work with a data warehouse, detecting trends and discovering new information and relationships among data items that were not readily apparent. Volkswagen Group uses a data-mining agent that acts as an early-warning system about market conditions. For example, the data-mining agent might detect a problem that could cause economic conditions to worsen, resulting in delayed payments from customers. Having this information early enables decision makers to come up with a solution that minimizes the negative effects of the problem. POINTS: 1 DIFFICULTY: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 55


Module 13: Artificial Intelligence and Automation REFERENCES: Summarize each of the four types of intelligent agents and how they are used. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.13.4 TOPICS: Intelligent agents KEYWORDS: Apply DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 118. Describe how fuzzy logic works with an example. ANSWER: Answers will vary. Fuzzy logic works based on the degree of membership in a set (a collection of objects). For example, 4 feet, 5 feet, and 6 feet could constitute a set of heights for a population. Fuzzy sets have values between 0 and 1, indicating the degree to which an element has membership in the set. At 0, the element has no membership; at 1, it has full membership. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe fuzzy logic and its uses. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.13.5 TOPICS: Fuzzy logic KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 119. Explain how an artificial neural network (ANN) creates a model. ANSWER: Answers will vary. ANNs are networks that learn and are capable of performing tasks that are difficult with conventional computers. An ANN creates a model based on input and output. An ANN has an output layer, an input layer, and a middle (hidden) layer where learning takes place. Based on the pattern of data entered in the input layer and the results in the output layer, nodes in the middle layer are assigned different weights. These weights determine how the nodes react to a new set of input data and mimic decisions based on what they have learned. For example, in a loan application problem, input data consists of income, assets, number of dependents, job history, and residential status. The output data is acceptance or rejection of the loan application. After processing many loan applications, an ANN can establish a pattern that determines whether an application should be approved or rejected. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain machine learning and artificial neural networks. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic Copyright Cengage Learning. Powered by Cognero.

Page 56


Module 13: Artificial Intelligence and Automation LEARNING OBJECTIVES: MIS.10e.13.6 TOPICS: Neural networks KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 120. List few tasks where artificial neural networks (ANNs) are used. ANSWER: Answers will vary. ANNs are used for the following tasks: a. Bankruptcy prediction b. Credit rating c. Investment analysis d. Oil and gas exploration e. Target marketing f. Computer and network security POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain machine learning and artificial neural networks. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.13.6 TOPICS: Neural networks KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 121. Discuss the different techniques used in a genetic algorithm (GA) system. ANSWER: Answers will vary. In a GA system, the following techniques are used: a. Selection or survival of the fittest: Gives preference or a higher weight to better outcomes b. Crossover: Combines good portions of different outcomes to achieve a better outcome c. Mutation: Tries combinations of different inputs randomly and evaluates the results d. Chromosome: A set of parameters that defines a proposed solution to the problem the GA is trying to solve. It is usually represented as a simple string (sequence of characters). POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe how genetic algorithms are used. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.13.7 TOPICS: Genetic algorithms KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM Copyright Cengage Learning. Powered by Cognero.

Page 57


Module 13: Artificial Intelligence and Automation 122. Discuss the different categories of a natural-language processing (NLP) system. ANSWER: Answers will vary. NLP systems are generally divided into the following categories: • Interface to databases • Machine translation, such as translating from French to English • Text scanning and intelligent indexing programs for summarizing large amounts of text • Generating text for automated production of standard documents • Speech systems for voice interaction with computers POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain natural-language processing and its major categories. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.13.8 TOPICS: Natural-language processing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 123. Briefly discuss the types of activities performed by a natural-language processing (NLP) system. ANSWER: Answers will vary. NLP systems usually perform two types of activities. The first is interfacing: accepting human language as input, carrying out the corresponding command, and generating the necessary output. The second is knowledge acquisition: using the computer to read large amounts of text and understand the information well enough to summarize important points and store information so that the system can respond to inquiries about the content. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain natural-language processing and its major categories. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.13.8 TOPICS: Natural-language processing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 124. Briefly discuss Microsoft’s MoodScope. ANSWER: Answers will vary. Microsoft’s MoodScope is an example of context-aware software. It is able to sense a user’s mood. By analyzing phone calls, text messages, Internet access, and other smartphone activities, this “mood sensor” app is able to predict the mood of a user. Although this application is in development stages, it showed 93 percent accuracy in a small sample size of 32 users in China and the United States. These kinds of applications could have significant commercial value. For example, a user’s mood could be shared with Spotify (the commercial music streaming service) to play a special song, or sent to a user’s Facebook timeline in order to encourage or discourage other types of communication. It Copyright Cengage Learning. Powered by Cognero.

Page 58


Module 13: Artificial Intelligence and Automation could also be shared with an online Web site that could target the user with comfort food. However, such applications must be used carefully in order not to invade a user’s privacy. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain contextual computing. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.13.10 TOPICS: Context-aware computing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 125. Briefly explain the principle behind contextual computing. ANSWER: Answers will vary. The principle behind contextual computing is that computers can both sense and react to their environments similar to how human brains understand and interpret stimuli. In essence, contextual computing allows for tailoring a course of action to a user in a particular situation and environment based on what it knows about the user. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Explain contextual computing. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.13.10 TOPICS: Context-aware computing KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM

Copyright Cengage Learning. Powered by Cognero.

Page 59


Module 14: Emerging Trends, Technologies, and Applications True / False 1. Pull technology is adequate for marketing most products and services because people request marketing information frequently. a. True b. False ANSWER: False RATIONALE: Correct Pull technology is not adequate for marketing certain products and services or for providing customized information. With pull technology, a user states a need before getting information, as when a URL is entered in a Web browser so that the user can go to a certain Web site. See 14-1: Trends in Software and Service Distribution POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize new trends in software and service distribution. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.1 TOPICS: Software distribution KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 11/30/2019 5:00 PM 2. Push technology can be effective for both business-to-consumer (B2C) and business-to-business (B2B) marketing. a. True b. False ANSWER: True RATIONALE: Correct Push technology can be effective for B2C and B2B marketing as well. For example, a car manufacturer can send the latest information on new models, prices, and features to all its dealers in real time. See 14-1: Trends in Software and Service Distribution POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize new trends in software and service distribution. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.1 TOPICS: Software distribution KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 3. In virtual environment (VR) terminology, the everyday physical world is referred to as a “micro environment.” a. True b. False ANSWER: False Copyright Cengage Learning. Powered by Cognero.

Page 1


Module 14: Emerging Trends, Technologies, and Applications RATIONALE:

Correct VR uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world environment. In VR terminology, the everyday physical world is referred to as an “information environment.” See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe virtual reality components and applications. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 4. Augmented reality users are immersed in the virtual world while interacting with objects. a. True b. False ANSWER: False RATIONALE: Correct Augmented reality is similar to virtual reality with one distinction between the two: augmented reality users stay in the real-world environment while interacting with objects, while virtual reality users are immersed in the virtual world. See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe virtual reality components and applications. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 5. In an exocentric environment of virtual reality (VR), users can interact with objects. a. True b. False ANSWER: False RATIONALE: Correct In an exocentric environment, a user is given a “window view.” Data is still rendered in 3D, but users can only view it on screen. They cannot interact with objects, as in an egocentric environment. See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe virtual reality components and applications. Copyright Cengage Learning. Powered by Cognero.

Page 2


Module 14: Emerging Trends, Technologies, and Applications QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 6. People can enter other cave automatic virtual environments (CAVEs) in other locations, no matter how far away they are geographically. a. True b. False ANSWER: True RATIONALE: Correct People can enter other CAVEs in other locations, no matter how far away they are geographically, and interact with the other users. High-speed digital cameras capture one user’s presence and movements and then re-create and send these images to users in other CAVEs. See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe virtual reality components and applications. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 7. In grid computing, each participant is referred to as a branch. a. True b. False ANSWER: False RATIONALE: Correct Each participant in a grid is referred to as a node. Improved reliability is an advantage of grid computing. It means that if one node in the grid fails, another node can take over. See 14-3: Cloud Computing: Foundation, Applications, and Models POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the foundation, models, and applications of cloud computing QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 3


Module 14: Emerging Trends, Technologies, and Applications DATE CREATED: DATE MODIFIED:

10/22/2019 1:33 PM 11/30/2019 6:36 PM

8. Utility computing is incompatible with the software as a service (SaaS) model. a. True b. False ANSWER: False RATIONALE: Correct Utility (on-demand) computing is the provision of IT services on demand. Utility computing can work with the SaaS model. See See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the foundations, models, and applications of cloud computing. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 9:47 AM 9. Google AppEngine is an example of a private cloud service. a. True b. False ANSWER: False RATIONALE: Correct Google AppEngine is an example of a public cloud service. Major private cloud services are Eucalyptus, Elastra Enterprise Cloud Server, VMware Private-Cloud Architecture, and Microsoft Azure. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the foundation, models, and applications of cloud computing. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 9:49 AM 10. Nanomaterials have been applied as coatings on eyewear for increased comfort. a. True b. False ANSWER: True Copyright Cengage Learning. Powered by Cognero.

Page 4


Module 14: Emerging Trends, Technologies, and Applications RATIONALE:

Correct Nanomaterials have been applied as coatings on eyewear for increased comfort. Nanomaterials have also been added to sports gear, such as tennis and golf balls and tennis rackets, to make them more durable and improve their responsiveness. See 14-4: Nanotechnology POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss uses of nanotechnology. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Nanotechnology KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 9:50 AM 11. Scientists are working on nanotechnology devices that can unclog arteries, detect and eradicate cancer cells, and filter water pollution.

a. True b. False ANSWER: RATIONALE:

True Correct. Scientists are working on nanotechnology devices that can unclog arteries, detect and eradicate cancer cells, filter water pollution, and more. See 14-4: Nanotechnology POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss uses of nanotechnology. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Nanotechnology KEYWORDS: Understand DATE CREATED: 12/1/2019 3:18 PM DATE MODIFIED: 12/1/2019 3:21 PM 12. Nanotechnology incorporates techniques that involve the use of cloud-based computing. a. True b. False ANSWER: False RATIONALE: Correct. Nanotechnology incorporates techniques that involve the structure and composition of materials on a nanoscale. See 14-4: Nanotechnology POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss uses of nanotechnology. QUESTION TYPE: True / False HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 5


Module 14: Emerging Trends, Technologies, and Applications LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Nanotechnology KEYWORDS: Understand DATE CREATED: 12/1/2019 3:22 PM DATE MODIFIED: 12/1/2019 4:51 PM 13. Nanocapsules have the capacity to be far more accurate than traditional drug administration methods such as IV. a. True b. False ANSWER: True RATIONALE: Correct. Researchers are developing nanocapsules for a “clot-busting” drug. The nanocapsule can target a specific clot and break open and release medication exactly when its needed. This is far more accurate than the traditional methods, such as when a drug is administered through an IV. See 14-4: Nanotechnology POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss uses of nanotechnology. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Nanotechnology KEYWORDS: Understand DATE CREATED: 12/1/2019 3:24 PM DATE MODIFIED: 12/1/2019 3:26 PM 14. In the field of information systems, nanotechnology might reach its limit in the next decade, so new technologies beyond nanotechnology will be necessary. a. True b. False ANSWER: False RATIONALE: Correct. In the field of information systems, the current technology for miniaturizing transistors and other microprocessor components might reach its limit in the next decade, so new technologies, including nanotechnology, will be necessary. See 14-4: Nanotechnology POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss uses of nanotechnology. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Nanotechnology KEYWORDS: Understand DATE CREATED: 12/1/2019 3:27 PM DATE MODIFIED: 12/1/2019 3:29 PM Copyright Cengage Learning. Powered by Cognero.

Page 6


Module 14: Emerging Trends, Technologies, and Applications 15. The first consumer goods that incorporate nanotechnology are projected to enter the market in the next 10-15 years. a. True b. False ANSWER: False RATIONALE: Correct. Some consumer goods incorporating nanotechnology are already on the market. See 14-4: Nanotechnology POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss uses of nanotechnology. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Nanotechnology KEYWORDS: Understand DATE CREATED: 12/1/2019 3:29 PM DATE MODIFIED: 12/1/2019 3:34 PM 16. IBM is replacing silicon in its computer chips with carbon nanotubes. a. True b. False ANSWER: False RATIONALE: Correct. IBM is replacing silicon with carbon nanotubes (CNTs) in its computer chips. See 14-4: Nanotechnology POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss uses of nanotechnology. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Nanotechnology KEYWORDS: Understand DATE CREATED: 12/1/2019 3:31 PM DATE MODIFIED: 12/1/2019 3:31 PM 17. Blockchain technology has recently been outpaced in the market by Apple Pay and PayPal. a. True b. False ANSWER: False RATIONALE: Correct. Blockchain technology is a relatively recent application of computer networks, the Internet, and encryption technology. See 14-5: Blockchain technology and cryptocurrency POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe blockchain technology and cryptocurrency. QUESTION TYPE: True / False Copyright Cengage Learning. Powered by Cognero.

Page 7


Module 14: Emerging Trends, Technologies, and Applications HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Blockchain technology and cryptocurrency KEYWORDS: Understand DATE CREATED: 12/1/2019 3:34 PM DATE MODIFIED: 12/1/2019 3:39 PM 18. A blockchain is a decentralized and distributed network that is used to record transactions across connected devices as blocks of data. a. True b. False ANSWER: True RATIONALE: Correct. A blockchain is a decentralized and distributed network that is used to record transactions across connected devices as blocks of data. See 14-5: Blockchain technology and cryptocurrency POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe blockchain technology and cryptocurrency. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Blockchain technology and cryptocurrency KEYWORDS: Understand DATE CREATED: 12/1/2019 3:38 PM DATE MODIFIED: 12/1/2019 3:40 PM 19. With the growing applications of IoT, blockchain’s role and applications are gradually decreasing. a. True b. False ANSWER: False RATIONALE: Correct. With the growing applications of IoT, blockchain’s role and applications are increasing on a daily basis in business and society. See 14-5: Blockchain Technology and Cryptocurrency POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe blockchain technology and cryptocurrency. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Blockchain technology and cryptocurrency KEYWORDS: Understand DATE CREATED: 12/1/2019 3:41 PM DATE MODIFIED: 12/1/2019 3:45 PM 20. Blockchain technology enables transactions to be verified and processed independently, without a central Copyright Cengage Learning. Powered by Cognero.

Page 8


Module 14: Emerging Trends, Technologies, and Applications administrator. a. True b. False ANSWER: RATIONALE:

True Correct. In a blockchain environment, the network is directly shared without a central administrator and transactions can be verified and processed independently. See 145: Blockchain Technology and Cryptocurrency POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe blockchain technology and cryptocurrency. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Blockchain technology and cryptocurrency KEYWORDS: Understand DATE CREATED: 12/1/2019 3:45 PM DATE MODIFIED: 12/1/2019 3:48 PM 21. In a blockchain environment, data quality is higher than in most other types of networks. a. True b. False ANSWER: True RATIONALE: Correct. Due to its high security, the data quality is higher in a blockchain environment and transactions are processed faster at a lower cost. See 14-5: Blockchain Technology and Cryptocurrency POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe blockchain technology and cryptocurrency. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Blockchain technology and cryptocurrency KEYWORDS: Understand DATE CREATED: 12/1/2019 3:48 PM DATE MODIFIED: 12/1/2019 3:51 PM 22. In the field of quantum computing, a quantum bit is known as a qubit. a. True b. False ANSWER: True RATIONALE: Correct. Quantum computing uses quantum mechanics that generates and manipulates quantum bits, or qubits. See 14-6: Quantum Computing POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain quantum computing and its applications. Copyright Cengage Learning. Powered by Cognero.

Page 9


Module 14: Emerging Trends, Technologies, and Applications QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.6 TOPICS: Quantum computing KEYWORDS: Understand DATE CREATED: 12/1/2019 4:54 PM DATE MODIFIED: 12/1/2019 5:02 PM 23. Quantum computers will soon replace all classic computers. a. True b. False ANSWER: False RATIONALE: Correct. Quantum computers are not going to replace classic computers as they are not suitable for all applications. See 14-6: Quantum Computing POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain quantum computing and its applications. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.6 TOPICS: Quantum computing KEYWORDS: Understand DATE CREATED: 12/1/2019 5:00 PM DATE MODIFIED: 12/1/2019 5:04 PM 24. Some companies are using quantum computing to develop lighter and more powerful batteries for electric cars. a. True b. False ANSWER: True RATIONALE: Correct. Some companies are already using quantum computing to develop lighter and more powerful batteries for electric cars. See 14-6: Quantum Computing POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain quantum computing and its applications. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.6 TOPICS: Quantum computing KEYWORDS: Understand DATE CREATED: 12/1/2019 5:02 PM DATE MODIFIED: 12/1/2019 5:04 PM 25. NASA is using quantum computing to analyze the vast amount of data they collect about the universe. a. True Copyright Cengage Learning. Powered by Cognero.

Page 10


Module 14: Emerging Trends, Technologies, and Applications b. False ANSWER: RATIONALE:

True Correct. NASA is using quantum computing to analyze the vast amount of data they collect about the universe, as well as research better and safer methods of space missions. See 146: Quantum Computing POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain quantum computing and its applications. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.6 TOPICS: Quantum computing KEYWORDS: Understand DATE CREATED: 12/1/2019 5:05 PM DATE MODIFIED: 12/1/2019 5:07 PM 26. In the world of quantum computing, entanglement means that the data within a binary pair has become corrupted. a. True b. False ANSWER: False RATIONALE: Correct. By deploying the quantum properties of superposition and entanglement, qubits offer exponentially greater computing power than binary bits. Entanglement means that the two members of a pair exist in a single quantum state. See 14-6: Quantum Computing POINTS: 1 DIFFICULTY: Easy REFERENCES: Explain quantum computing and its applications. QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.6 TOPICS: Quantum computing KEYWORDS: Understand DATE CREATED: 12/1/2019 5:07 PM DATE MODIFIED: 12/1/2019 5:10 PM Multiple Choice 27. With _____ technology, a Web server delivers information to users, who have signed up for the service, instead of waiting for them to request the information be sent to them. a. push b. pull c. virtual reality d. radio frequency identification ANSWER: a RATIONALE: Correct. With push technology, also known as “webcasting,” a Web server delivers information to users (who have signed up for the service) instead of waiting for them to Copyright Cengage Learning. Powered by Cognero.

Page 11


Module 14: Emerging Trends, Technologies, and Applications request the information be sent to them. With push technology, your favorite Web content can be updated in real time and sent to your desktop or your mobile device. See 14-1: Trends in Software and Service Distribution POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize new trends in software and service distribution. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.1 TOPICS: Software distribution KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 28. Network administrators use _____ technology when they need antivirus updates to be automatically downloaded on employees' workstations. a. pull b. artificial intelligence c. push d. data mining ANSWER: c RATIONALE: Correct. Network administrators also use push technology when they need antivirus updates to be automatically downloaded on employees’ workstations. See 14-1: Trends in Software and Service Distribution POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize new trends in software and service distribution. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.1 TOPICS: Software distribution KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 11:51 AM 29. Which is true of push technology? a. It cannot provide customized information automatically. b. It cannot update Web content in real time. c. It streamlines the process of users getting software updates. d. It requires users to state their needs before providing information. ANSWER: c RATIONALE: Correct. Push technology streamlines the process of users getting software updates and updated content. It benefits vendors, too, because by keeping in constant touch with users, they build customer loyalty. See 14-1: Trends in Software and Service Distribution POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 12


Module 14: Emerging Trends, Technologies, and Applications DIFFICULTY: Moderate REFERENCES: Summarize new trends in software and service distribution. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.1 TOPICS: Software distribution KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 30. Alconac Systems, a software start-up company, uses a technology in which the employees have to key in certain names and their respective codes to access information from different departments. Given this information, it can be concluded that Alconac Systems uses _____ to access information from different departments. a. pull technology b. artificial intelligence c. push technology d. data mining ANSWER: a RATIONALE: Correct. With pull technology, a user states a need before getting information, as when a URL is entered in a Web browser so the user can go to a certain Web site. See 14-1: Trends in Software and Service Distribution POINTS: 1 DIFFICULTY: Challenging REFERENCES: Summarize new trends in software and service distribution. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.1 TOPICS: Software distribution KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 11:54 AM 31. With the _____ model, users do not need to be concerned with new software versions and compatibility problems because the application service providers (ASPs) offer the most recent version of the software. a. software distribution b. software as a service c. radio frequency identification d. automatic virtual environment ANSWER: b RATIONALE: Correct. With the software as a service (SaaS) model, users do not need to be concerned with new software versions and compatibility problems because the ASPs offer the most recent version of the software. SaaS, also known as “on-demand software,” is a model in which ASPs deliver software to users for a fee; the software is for temporary or long-term use. See 14-1: Trends in Software and Service Distribution POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 13


Module 14: Emerging Trends, Technologies, and Applications DIFFICULTY: Easy REFERENCES: Summarize new trends in software and service distribution. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.1 TOPICS: Software as a Service KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 32. In the context of application software providers (ASPs), which of the following is also known as on-demand software? a. Assembly software b. Software as a service c. Software as a product d. Systems software ANSWER: b RATIONALE: Correct. Software as a service is also known as “on-demand software.” It is a model for ASPs to deliver software to users for a fee; the software is for temporary or long-term use. See 14-1: Trends in Software and Service Distribution POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize new trends in software and service distribution. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.1 TOPICS: Software as a Service KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 33. Saving data on the application service provider’s (ASP’s) servers instead of on users’ own workstations might cause: a. inconvenience for those who work in different locations. b. the data to be exposed to theft by attackers. c. the data to become immune to change. d. problems related to the compatibility of the software versions. ANSWER: b RATIONALE: Correct. ASPs face privacy and security issues. Saving data on the ASP’s servers instead of on users’ own workstations might leave this data more exposed to theft or corruption by attackers. See 14-1: Trends in Software and Service Distribution POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize new trends in software and service distribution. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 14


Module 14: Emerging Trends, Technologies, and Applications LEARNING OBJECTIVES: MIS.10e.14.1 TOPICS: Software as a Service KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 34. Which is an advantage of application service providers (ASPs)? a. They offer software customized to users’ needs. b. They integrate a customer’s other applications and systems easily. c. They ensure that software is kept up to date, based on users’ requests. d. They ensure that applications fully meet an organization’s needs. ANSWER: c RATIONALE: Correct. ASPs ensure that software is kept up to date, based on users’ requests. With ASPs, software development costs are spread over several customers, so vendors can absorb some expenses of software development and develop more improved software. See 14-1: Trends in Software and Service Distribution POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize new trends in software and service distribution. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.1 TOPICS: Software as a Service KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 35. One of the major disadvantages of application service providers (ASPs) is that they: a. are highly expensive and deliver information at a slow rate. b. do not guarantee that applications will fully meet an organization’s needs. c. do not provide any level of technical support to an organization. d. often fail to keep applications up to date despite users’ requests. ANSWER: b RATIONALE: Correct. With ASPs, because the organization has less control over how applications are developed, there is the risk that applications might not fully meet the organization’s needs. Integration with the customer’s other applications and systems might also be

challenging. See 14-1: Trends in Software and Service Distribution POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize new trends in software and service distribution. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.1 TOPICS: Software as a Service KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 15


Module 14: Emerging Trends, Technologies, and Applications DATE CREATED: DATE MODIFIED:

10/22/2019 1:33 PM 12/1/2019 11:59 AM

36. _____ uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world environment. a. Nanotechnology b. Cloud computing c. Virtual reality d. Grid computing ANSWER: c RATIONALE: Correct. Virtual reality (VR) uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world environment. In VR terminology, the everyday physical world is referred to as an “information environment.” See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe virtual reality components and applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 12:24 PM 37. In a virtual reality (VR) environment, giving objects texture and shading for a three-dimensional (3D) appearance is known as _____. a. interaction b. simulation c. transmission d. immersion ANSWER: b RATIONALE: Correct. Giving objects in a VR environment texture and shading for a 3D appearance is known as simulation. In VR terminology, the everyday physical world is referred to as an “information environment.” See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe virtual reality components and applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM Copyright Cengage Learning. Powered by Cognero.

Page 16


Module 14: Emerging Trends, Technologies, and Applications 38. In a virtual reality (VR) environment, enabling users to act on objects, such as using a data glove to pick up and move objects, is known as _____. a. interaction b. simulation c. telepresence d. immersion ANSWER: a RATIONALE: Correct. Enabling users to act on objects in a VR environment, such as using a data glove to pick up and move objects, is known as interaction. With a data glove, users can point to, “grab,” and manipulate objects and experience limited tactile sensations, such as determining an object’s shape, size, and hardness or softness. See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe virtual reality components and applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 39. In the context of virtual reality (VR) technology, _____ refers to giving users the sense that they are in another location, even one geographically far away, and can manipulate objects as though they are actually in that location. a. immersion b. inherence c. telepresence d. interaction ANSWER: c RATIONALE: Correct. In the context of VR technology, telepresence refers to giving users the sense that they are in another location, even one geographically far away, and can manipulate objects as though they are actually in that location. Telepresence systems use a variety of sophisticated hardware. See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe virtual reality components and applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 40. In the context of virtual reality (VR), allowing users in different locations to interact and manipulate the same world at the same time by connecting two or more virtual worlds is known as _____. Copyright Cengage Learning. Powered by Cognero.

Page 17


Module 14: Emerging Trends, Technologies, and Applications a. full-body immersion b. networked communication c. simulation d. interaction ANSWER: b RATIONALE: Correct. Allowing users in different locations to interact and manipulate the same world at the same time by connecting two or more virtual worlds is known as networked communication. In VR terminology, the everyday physical world is referred to as an “information environment.” See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe virtual reality components and applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 41. In the context of virtual reality (VR) technology, the main technology used in an exocentric environment is _____. a. quick response codes b. grid computations c. 3D graphics d. nanotechnologies ANSWER: c RATIONALE: Correct. The main technology used in an exocentric environment is 3D graphics. Users cannot interact with objects, as in an egocentric environment. See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe virtual reality components and applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 42. Identify the component of a virtual reality (VR) system that generates and manipulates high-quality graphics. a. The central coordinating processor and software system b. Visual and aural systems c. The manual control system d. Radio frequency identification systems Copyright Cengage Learning. Powered by Cognero.

Page 18


Module 14: Emerging Trends, Technologies, and Applications ANSWER: RATIONALE:

a Correct. The central coordinating processor and software system generates and manipulates high-quality graphics, so it needs a very fast processor. To display images in real time, 3D image graphics must be rendered rapidly, and the screen’s refresh rate has to be extremely fast. See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe virtual reality components and applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 43. Which of the following is true of a cave automatic virtual environment (CAVE)? a. It consists of white modules arranged in a grid on a black background. b. It is developed to make computers faster and smaller, with more memory. c. It consists of a cube-shaped room in which the walls are rear-projection screens. d. It is environment friendly and produces green energy systems. ANSWER: c RATIONALE: Correct. A CAVE is a virtual environment consisting of a cube-shaped room in which the walls are rear-projection screens. It uses holographic devices that create, capture, and display images in true 3D form. See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe virtual reality components and applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 12:32 PM 44. A _____ can be used to create and test prototypes, develop interfaces, and simulate factory layouts and assembly lines, without investing in physical equipment and layouts. a. rapid prototyping machine b. cave automatic virtual environment c. radio frequency identification tag d. quick response code ANSWER: b RATIONALE: Correct. With a cave automatic virtual environment (CAVE), users can create and test prototypes, develop interfaces, and simulate factory layouts and assembly lines, for Copyright Cengage Learning. Powered by Cognero.

Page 19


Module 14: Emerging Trends, Technologies, and Applications example, without investing in physical equipment and layouts. Many universities, including Brown University, the University of Illinois at Urbana-Champaign, and Duke University, use CAVEs for geological research, architectural studies, and anatomy studies. See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe virtual reality components and applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 45. Which is a problem associated with virtual reality (VR) systems? a. VR systems cannot be of any assistance to the disabled. b. VR systems cannot be used in educational games and simulation. c. VR systems can cause confusion between the VR environment and the real environment. d. VR systems can increase the cost of training airline pilots. ANSWER: c RATIONALE: Correct. One major obstacle to using VR technology is that it can cause confusion between the VR environment and the real environment. The possibility of users becoming unable to distinguish reality from virtual reality is a potential danger, particularly if people come to believe that anything they do in the virtual environment is acceptable in the real world. See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe virtual reality components and applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 46. A(n) _____ is a simulated environment designed for users to interact via avatars. a. real world b. virtual world c. artificial neural network d. personal area network ANSWER: b RATIONALE: Correct. A virtual world is a simulated environment designed for users to interact via avatars. An avatar is a 2D or 3D graphical representation of a person in the virtual world, Copyright Cengage Learning. Powered by Cognero.

Page 20


Module 14: Emerging Trends, Technologies, and Applications used in chat rooms and online games. See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe virtual reality components and applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 47. In the context of grid computing, each participant in a grid is referred to as a(n) _____. a. element b. node c. pivot d. iota ANSWER: b RATIONALE: Correct. In the context of grid computing, each participant in a grid is referred to as a node. Improved reliability is an advantage of grid computing. It means that if one node in the grid fails, another node can take over. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the foundation, models, and applications of cloud computing. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 12:45 PM 48. In the context of networking, on-demand computing is also known as ____ computing. a. hybrid b. grid c. nano d. utility ANSWER: d RATIONALE: Correct. On-demand computing is also known as utility computing. Convenience and cost savings are two main advantages of utility computing, but this service does have drawbacks in the areas of privacy and security. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Easy Copyright Cengage Learning. Powered by Cognero.

Page 21


Module 14: Emerging Trends, Technologies, and Applications REFERENCES: Describe the foundation, models, and applications of cloud computing. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 12:48 PM 49. _____ incorporates many recent technologies under one platform, including the software as a service (SaaS) model, Web 2.0, grid computing, and utility computing. a. A biometric system b. Distributed computing c. Cloud computing d. A mainframe computer system ANSWER: c RATIONALE: Correct. Cloud computing incorporates, under one platform, many recent technologies, including the SaaS model, Web 2.0, grid computing, and utility computing; hence, a variety of resources can be provided to users over the Internet. Business applications are accessed via a Web browser, and data is stored on the providers’ servers. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the foundation, models, and applications of cloud computing. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 12:49 PM 50. In the context of cloud computing, infrastructure as a service (IaaS) is also known as _____ as a service. a. platform b. software c. hardware d. backend ANSWER: c RATIONALE: Correct. IaaS is also called hardware as a service. It is a type of cloud computing whereby computer infrastructure (such as storage, hardware, servers, and networking components) are delivered as a service. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the foundation, models, and applications of cloud computing. Copyright Cengage Learning. Powered by Cognero.

Page 22


Module 14: Emerging Trends, Technologies, and Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 12:50 PM 51. LiquidIQ offers virtual data centers that allow users to combine memory, storage, and computing capabilities. In the context of cloud computing services, it is evident that LiquidIQ provides _____ computing services. a. utility b. VR c. SaaS d. security ANSWER: a RATIONALE: Correct. Universities and research centers take advantage of utility computing to run complex programs for which they do not have the necessary resources. Sun Microsystems (now a part of Oracle) and IBM offer this service in the form of storage and virtual servers. Other companies offer virtual data centers that allow users to combine memory, storage, and computing capabilities—Liquid Computing’s LiquidIQ, for example. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Challenging REFERENCES: Describe the foundation, models, and applications of cloud computing. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 12:58 PM 52. Platform as a service (PaaS) services are hosted in the cloud and accessed by clients through their _____. a. data gloves b. Web browsers c. smart cards d. Web avatars ANSWER: b RATIONALE: Correct. PaaS services are hosted in the cloud and accessed by clients through their Web browsers. PaaS automates the configuration, deployment, and ongoing management of applications in the cloud. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe new trends in networking, including grid, utility, and cloud computing. Copyright Cengage Learning. Powered by Cognero.

Page 23


Module 14: Emerging Trends, Technologies, and Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 1:01 PM 53. In the context of cloud computing, _____ as a service automates the configuration, deployment, and ongoing management of applications in the cloud. a. infrastructure b. software c. backend d. platform ANSWER: d RATIONALE: Correct. Platform as a service (PaaS) automates the configuration, deployment, and ongoing management of applications in the cloud. PaaS provides a computing platform and a solution as a service. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe new trends in networking, including grid, utility, and cloud computing. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 1:01 PM 54. Parallel processing is one advantage of _____. a. virtual reality b. grid computing c. edge computing d. nanotechnology ANSWER: b RATIONALE: Correct. Advantages of grid computing include parallel processing—Complex tasks can be performed in parallel, which improves performance. In other words, a large complex task can be split into smaller tasks that run simultaneously on several nodes. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Challenging Describe the foundation, models, and applications of cloud computing. Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 24


Module 14: Emerging Trends, Technologies, and Applications HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 1:06 PM 55. The International DIY Association wants its users to be able to connect with an off-site infrastructure over the internet. Scalability and collaboration is more important to this organization than security and privacy. Which of the following cloud computing options would be the most suitable for the International DIY Association? a. A private cloud b. A public cloud c. A hybrid cloud d. A community cloud ANSWER: b RATIONALE: Correct. With a public cloud, users connect with an off- site infrastructure over the Internet. Because the public cloud services and the infrastructure are shared by a large number of users, this option offers the highest cost savings and is the most popular of the four. However, it also carries higher security and privacy risks. Therefore, it is more suitable for organizations that need scalability, do collaborative projects over the Web, and/or offer standard applications over the Web. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Challenging REFERENCES: Describe the foundation, models, and applications of cloud computing. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 1:14 PM 56. _____ clouds are more suitable for organizations that want to offer standard applications over the Web, such as e-mail, with little involvement by IT managers. a. Private b. Hybrid c. Community d. Public ANSWER: d RATIONALE: Correct. Public clouds are more suitable for organizations that need scalability, do collaborative projects over the Web, and offer standard applications over the Web, such as e-mail. Public cloud computing requires the least amount of involvement by IT managers. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 25


Module 14: Emerging Trends, Technologies, and Applications DIFFICULTY: Easy REFERENCES: Describe the foundation, models, and applications of cloud computing. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 1:17 PM 57. In a _____ cloud, a participating organization purchases and maintains the software and infrastructure itself. a. public b. private c. community d. hybrid ANSWER: b RATIONALE: Correct. A private cloud offers higher security and privacy than a public cloud. Because a participating organization purchases and maintains the software and infrastructure itself, this option offers less cost savings than a public cloud. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the foundation, models, and applications of cloud computing. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 1:25 PM 58. GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which cloud computing option would be most suitable for GuardIN? a. A public cloud b. A community cloud c. A hybrid cloud d. A private cloud ANSWER: d RATIONALE: Correct. A private cloud would be the most suitable option for GuardIN. A private cloud offers higher security and privacy than a public cloud. Because a participating organization purchases and maintains the software and infrastructure itself, this option offers less cost savings than a public cloud. It is recommended for organizations that operate on highly secure data. See 14-3: Cloud Computing: Foundation, Applications, And Models Copyright Cengage Learning. Powered by Cognero.

Page 26


Module 14: Emerging Trends, Technologies, and Applications POINTS: 1 DIFFICULTY: Challenging REFERENCES: Describe the foundation, models, and applications of cloud computing. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 1:26 PM 59. A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world. a. hybrid b. private c. point d. community ANSWER: a RATIONALE: Correct. A hybrid cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world. This option may require multiple security platforms. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the foundation, models, and applications of cloud computing. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 1:28 PM 60. Widget Corp. wants to shift its list of inventory to a cloud so that its different branches can access it easily. The company needs a cloud computing option that would provide high flexibility to add or drop resources. The cloud computing option should be cost-effective and should not expose mission-critical applications and data to the outside world. Which cloud computing option would be most suitable for Widget Corp.? a. A public cloud b. A private cloud c. A hybrid cloud d. A community cloud ANSWER: c RATIONALE: Correct. A hybrid cloud would be the most suitable option for Widget Corp. A hybrid cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical Copyright Cengage Learning. Powered by Cognero.

Page 27


Module 14: Emerging Trends, Technologies, and Applications applications and data to the outside world. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Challenging REFERENCES: Describe the foundation, models, and applications of cloud computing. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 1:30 PM 61. Which is true of community cloud computing? a. The costs are spread over fewer users than with a public cloud. b. The infrastructure can be owned by just one organization. c. It offers higher security as compared to private clouds. d. It exposes mission-critical applications and data to the outside world. ANSWER: a RATIONALE: Correct. With community cloud computing, the costs are spread over fewer users than with a public cloud (but more than with a private cloud) to realize its full cost-saving potential. Allocation of costs and responsibilities, governance, and the implementation of a tight security system are among the challenges that must be overcome when choosing this option. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the foundation, models, and applications of cloud computing. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 1:31 PM 62. In a technological conference, all the participating IT firms agreed to transfer the data pertaining to their human resources to a cloud. The objective behind this is to improve talent acquisition process and communication among HR professionals around the globe. The cloud referred to in this scenario is a _____ cloud. a. public b. private c. hybrid d. community ANSWER: d RATIONALE: Correct. The cloud referred to in this scenario is a community cloud. With the community option, the cloud infrastructure is designed for exclusive use by a specific community of Copyright Cengage Learning. Powered by Cognero.

Page 28


Module 14: Emerging Trends, Technologies, and Applications users from organizations that share common concerns. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Challenging REFERENCES: Describe the foundation, models, and applications of cloud computing. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 1:31 PM 63. Data _____ is a cloud-computing risk that deals with how a particular type of data is to be kept separate from other data in the cloud. a. transmission b. abstraction c. location d. segregation ANSWER: d RATIONALE: Correct. In a cloud computing environment, there are two types of security issues: client (the user) side and server (the provider) side. Data segregation is a cloud computing risk that deals with how a particular type of data is to be kept separate from other data in the cloud. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the foundation, models, and applications of cloud computing. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 1:48 PM 64. Nanomaterials, if added to golf balls, can increase the _____ of the golf balls. a. frailty b. brittleness c. responsiveness d. delicacy ANSWER: c RATIONALE: Correct. Nanomaterials have been added to sports gear, such as tennis and golf balls and tennis rackets, to make them more durable and improve their responsiveness; tennis balls incorporating nanomaterials bounce better. Nanomaterials have also been applied as coatings on eyewear for increased comfort and durability, and they are used in clothing and Copyright Cengage Learning. Powered by Cognero.

Page 29


Module 14: Emerging Trends, Technologies, and Applications footwear to cut down bacteria growth and improve stain resistance. See 14-4: Nanotechnology POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss uses of nanotechnology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Nanotechnology KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 1:50 PM 65. The _____ is capable of imaging atoms and incorporating nanomaterial layers into hard disk recording heads and magnetic disk coatings. a. scanning tunneling microscope b. head-mounted display c. cave automatic virtual environment d. heads-up display ANSWER: a RATIONALE: Correct. IBM has developed the scanning tunneling microscope (STM), which is capable of imaging atoms and incorporating nanomaterial layers into hard disk recording heads and magnetic disk coatings. This technology might also improve electronic circuits and data storage devices. See 14-4: Nanotechnology POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss uses of nanotechnology. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Nanotechnology KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 1:51 PM 66. With _____ a user states a need before getting information, as when a uniform resource locator (URL) is entered in a Web browser so that the user can go to a certain Web site. a. pull technology b. data mining technology c. push technology d. virtual reality technology ANSWER: a RATIONALE: With pull technology, a user states a need before getting information, as when a URL is entered in a Web browser so that the user can go to a certain Web site. However, this technology is not adequate for marketing certain products and services or for providing Copyright Cengage Learning. Powered by Cognero.

Page 30


Module 14: Emerging Trends, Technologies, and Applications customized information. See 14-1: Trends in Software and Service Distribution POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize new trends in software and service distribution. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.1 TOPICS: Software distribution KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 67. Push technology is also known as _____. a. prototyping b. grid computing c. webcasting d. utility computing ANSWER: c RATIONALE: Push technology is also known as webcasting. With push technology, a Web server delivers information to users (who have signed up for the service) instead of waiting for them to request the information be sent to them. See 14-1: Trends in Software and Service Distribution POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize new trends in software and service distribution. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.1 TOPICS: Software distribution KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 68. _____ provide access to software or services for a fee. a. Web browsers b. Business service providers c. Web Sites d. Application service providers ANSWER: d RATIONALE: Under a recent business model, called application service providers (ASPs), access to software or services is provided for a fee. Software as a service, also known as “on-demand software,” is a model in which ASPs deliver software to users for a fee. See 14-1: Trends in Software and Service Distribution POINTS: 1 DIFFICULTY: Easy Copyright Cengage Learning. Powered by Cognero.

Page 31


Module 14: Emerging Trends, Technologies, and Applications REFERENCES: Summarize new trends in software and service distribution. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.1 TOPICS: Software as a service KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 69. _____ is a model in which application service providers (ASPs) deliver software to users for a fee. a. Platform as a service b. Software as a service c. Application-based platform service d. Open source software service ANSWER: b RATIONALE: Software as a service (SaaS), also known as “on-demand software,” is a model in which ASPs deliver software to users for a fee; the software is for temporary or long-term use. See 14-1: Trends in Software and Service Distribution POINTS: 1 DIFFICULTY: Easy REFERENCES: Summarize new trends in software and service distribution. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.1 TOPICS: Software as a service KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 70. In the context of virtual reality (VR), _____ refers to allowing users to move around freely by combining interactive environments with cameras, monitors, and other devices. a. full-body immersion b. simulation c. abstraction d. networked communication ANSWER: a RATIONALE: In the context of virtual reality (VR), full-body immersion refers to allowing users to move around freely by combining interactive environments with cameras, monitors, and other devices. In VR terminology, the everyday physical world is referred to as an “information environment.” See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe virtual reality components and applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 32


Module 14: Emerging Trends, Technologies, and Applications LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 71. In which environment is a user is totally immersed in the virtual reality (VR) world? a. exocentric b. two-dimensional c. one-dimensional d. egocentric ANSWER: d RATIONALE: In an egocentric environment, a user is totally immersed in the VR world. The most common technology used with this environment is a head-mounted display. See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe virtual reality components and applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 72. In which environment is a user is given a “window" view? a. exocentric b. egocentric c. one-dimensional d. two-dimensional ANSWER: a RATIONALE: In an exocentric environment, a user is given a “window view.” Data is still rendered in 3D, but users can only view it on screen. See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe virtual reality components and applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM Copyright Cengage Learning. Powered by Cognero.

Page 33


Module 14: Emerging Trends, Technologies, and Applications 73. A _____ is the most commonly used device that enables users to navigate in the virtual reality (VR) environment and manually control various objects. a. data glove b. head-mounted display c. virtual retinal display d. smart card ANSWER: a RATIONALE: A data glove is the most commonly used device that enables users to navigate in the virtual reality (VR) environment and control various objects. With it, users can point to, “grab,” and manipulate objects and experience limited tactile sensations, such as determining an object’s shape, size, and hardness or softness. See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe virtual reality components and applications. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 10/22/2019 1:33 PM 74. With _____ computing, users can make use of other computers’ resources within an organization to solve problems involving large-scale, complex calculations, such as circuit analysis or mechanical design-problems that a single computer is not capable of solving in a timely manner. a. utility b. cloud c. mobile d. grid ANSWER: d RATIONALE: Generally, grid computing involves combining the processing powers of various computers. With this configuration, users can make use of other computers’ resources to solve problems involving large-scale, complex calculations, such as circuit analysis or mechanical design-problems that a single computer is not capable of solving in a timely manner. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the foundation, models, and applications of cloud computing. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 2:02 PM Copyright Cengage Learning. Powered by Cognero.

Page 34


Module 14: Emerging Trends, Technologies, and Applications 75. In grid computing, when a large complex task is split into smaller tasks that run simultaneously on several nodes, it is known as _____ processing. a. serial b. multi c. parallel d. event ANSWER: c RATIONALE: In grid computing, complex tasks can be performed in parallel, which improves performance. In other words, a large complex task can be split into smaller tasks that run simultaneously on several nodes. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the foundation, models, and applications of cloud computing. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 2:03 PM 76. _____ computing is the provision of IT services on demand. a. Utility b. Grid c. Mobile d. Portable ANSWER: a RATIONALE: Utility (on-demand) computing is the provision of IT services on demand. Users pay for computing or storage resources on an as-needed basis, similar to the way one pays for utilities such as heat and water. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe the foundation, models, and applications of cloud computing. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Wireless networks KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 2:05 PM 77. Nanotechnology is based on a unit of measure called a(n) _____. a. atom Copyright Cengage Learning. Powered by Cognero.

Page 35


Module 14: Emerging Trends, Technologies, and Applications b. nanometer c. blockchain d. geiger ANSWER: RATIONALE:

c Correct. Based on the nanometer, which is one billionth of a meter, it has become an exciting development in many fields. See 14-4: Nanotechnology POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss uses of nanotechnology QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Nanotechnology KEYWORDS: Understand DATE CREATED: 12/1/2019 2:37 PM DATE MODIFIED: 12/1/2019 2:40 PM 78. Nanotechnology is being developed to make computers much faster and _____. a. larger b. smaller c. more secure d. cheaper ANSWER: b RATIONALE: Correct. Nanotechnology is also being developed to make computers much faster and smaller, with more memory. See 14-4: Nanotechnology POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss uses of nanotechnology QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Nanotechnology KEYWORDS: Understand DATE CREATED: 12/1/2019 2:43 PM DATE MODIFIED: 12/1/2019 3:03 PM 79. Consumer goods such as sports gear that incorporate nanotechnology use what are called _____. a. computers b. nanomaterials c. information tehcnologies d. recyclable materials ANSWER: b RATIONALE: Correct. Some consumer goods incorporating nanotechnology are already on the market. They use what are called nanomaterials. Nanomaterials have been added to sports gear, Copyright Cengage Learning. Powered by Cognero.

Page 36


Module 14: Emerging Trends, Technologies, and Applications such as tennis and golf balls and tennis rackets, to make them more durable and improve their responsiveness. See 14-4: Nanotechnology POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss uses of nanotechnology QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Nanotechnology KEYWORDS: Understand DATE CREATED: 12/1/2019 3:04 PM DATE MODIFIED: 12/1/2019 3:11 PM 80. Researchers are using nanotechnology to develop _____ for a "clot-busting" drug. a. microorganisms b. nanotools c. reprogramming tools d. nanocapsules ANSWER: d RATIONALE: Correct. Researchers are developing nanocapsules for a “clot-busting” drug. The nanocapsule can target a specific clot and break open and release medication exactly when its needed. See 14-4: Nanotechnology POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss uses of nanotechnology QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Nanotechnology KEYWORDS: Understand DATE CREATED: 12/1/2019 3:11 PM DATE MODIFIED: 12/1/2019 3:14 PM 81. Nanotechnology incorporates techniques that involve the ______ on a nanoscale. a. structure and composition of materials b. structure of networked components c. restructuring of programming code d. composition of current nodes ANSWER: a RATIONALE: Correct. Nanotechnology incorporates techniques that involve the structure and composition of materials on a nanoscale. See 14-4: Nanotechnology POINTS: 1 DIFFICULTY: Easy REFERENCES: Discuss uses of nanotechnology Copyright Cengage Learning. Powered by Cognero.

Page 37


Module 14: Emerging Trends, Technologies, and Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Nanotechnology KEYWORDS: Understand DATE CREATED: 12/1/2019 3:15 PM DATE MODIFIED: 12/1/2019 3:18 PM 82. The name blockchain came about due to the fact that _____. a. transactions are blocked if they are not valid b. transactions are grouped together into blocks c. there is a personal chain of command controlling each transaction d. each transaction is chained to a particular person ANSWER: b RATIONALE: Correct. A blockchain is a decentralized and distributed network that is used to record transactions across connected devices as blocks of data that cannot be altered after being recorded (see Exhibit 14.7). When they are recorded, those transactions are grouped together into blocks, which are then linked together to create chains, hence how the name blockchain came about. See 14-5: Blockchain Technology and Cryptocurrency POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe blockchain technology and cryptocurrency. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Blockchain technology and cryptocurrency KEYWORDS: Understand DATE CREATED: 12/1/2019 3:52 PM DATE MODIFIED: 12/1/2019 3:56 PM 83. In a blockchain environment, the network is shared without _____. a. the Internet b. encryption c. a central administrator d. a computer network ANSWER: c RATIONALE: Correct. In a blockchain environment, the network is directly shared without a central administrator. See 14-5: Blockchain Technology and Cryptocurrency POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe blockchain technology and cryptocurrency. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Blockchain technology and cryptocurrency Copyright Cengage Learning. Powered by Cognero.

Page 38


Module 14: Emerging Trends, Technologies, and Applications KEYWORDS: DATE CREATED: DATE MODIFIED:

Understand 12/1/2019 3:58 PM 12/1/2019 4:09 PM

84. In a blockchain environment, the distributed network is protected through _____ that makes the network accessible only to the authorized users. a. an email trail b. a firewall c. encryption technology d. a user profile ANSWER: c RATIONALE: Correct. In a blockchain environment, the network is directly shared without a central administrator and transactions can be verified and processed independently. The distributed network is protected through encryption technology that makes the network accessible only to the authorized users. See 14-5: Blockchain Technology and Cryptocurrency POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe blockchain technology and cryptocurrency. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Blockchain technology and cryptocurrency KEYWORDS: Understand DATE CREATED: 12/1/2019 4:00 PM DATE MODIFIED: 12/1/2019 4:04 PM 85. Digital content management is one application of _____ technology. a. nano b. blockchain c. private cloud d. AI ANSWER: b RATIONALE: Correct. Digital content management is one application of blockchain technology. Blockchain-based tools help manage copyrights and other intellectual properties by proving authorship of content and tracking who has accessed the content, therefore reducing piracy. See 14-5: Blockchain Technology and Cryptocurrency POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe blockchain technology and cryptocurrency. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Blockchain technology and cryptocurrency KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 39


Module 14: Emerging Trends, Technologies, and Applications DATE CREATED: DATE MODIFIED:

12/1/2019 4:10 PM 12/1/2019 4:13 PM

86. Digital money created from computer codes is known as _____. a. nanocash b. cryptocurrency c. electronic funds transfer (EFT) d. transaction currency ANSWER: b RATIONALE: Correct. Cryptocurrency is digital money created from computer codes. See 14-5: Blockchain Technology and Cryptocurrency POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe blockchain technology and cryptocurrency. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Blockchain technology and cryptocurrency KEYWORDS: Understand DATE CREATED: 12/1/2019 4:14 PM DATE MODIFIED: 12/1/2019 4:16 PM 87. Blockchain technology can be used in the mortgage approval process to give borrowers _____. a. additional cash reserves b. an alternative to escrow c. the option of storing their financial information in a secure network d. the option to bid on houses without relying on a realtor ANSWER: c RATIONALE: Correct. Blockchain-based tools could give mortgage borrowers the option of storing their financial information in a secure blockchain network and then share it with potential lenders, which can significantly speed up the mortgage approval process. See 14-5: Blockchain Technology and Cryptocurrency POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe blockchain technology and cryptocurrency. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Blockchain technology and cryptocurrency KEYWORDS: Understand DATE CREATED: 12/1/2019 4:17 PM DATE MODIFIED: 12/1/2019 4:20 PM 88. One major difference between Facebook's cryptocurrency and other cryptocurrencies is _____. a. its greater volatility Copyright Cengage Learning. Powered by Cognero.

Page 40


Module 14: Emerging Trends, Technologies, and Applications b. its low transaction fee c. its higher value d. its smartphone accessibility ANSWER: b RATIONALE: Correct. There are several differences between Libra and other cryptocurrencies such as Bitcoin. Because of major backing by companies such as Mastercard, Uber, Visa, and many others and its low transaction fee, it is expected to receive widespread adoption. See 14-5: Blockchain Technology and Cryptocurrency POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe blockchain technology and cryptocurrency. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Blockchain technology and cryptocurrency KEYWORDS: Understand DATE CREATED: 12/1/2019 4:20 PM DATE MODIFIED: 12/1/2019 4:27 PM 89. The name of Facebook's cryptocurrency is _____. a. Leo b. Virgo c. Gemini d. Libra ANSWER: d RATIONALE: Correct. A major new cryptocurrency is Facebook's Libra. See 14-5: Blockchain Technology and Cryptocurrency POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe blockchain technology and cryptocurrency. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Blockchain technology and cryptocurrency KEYWORDS: Understand DATE CREATED: 12/1/2019 4:20 PM DATE MODIFIED: 12/1/2019 4:22 PM 90. One disadvantage of a cryptocurrency is that _____. a. there is no way to reverse a payment b. it can easily be counterfeited c. it's available only to Android users d. it involves higher transaction fees ANSWER: a Copyright Cengage Learning. Powered by Cognero.

Page 41


Module 14: Emerging Trends, Technologies, and Applications RATIONALE:

Correct. Some of the advantages of a cryptocurrency include the following: Cannot be counterfeited or reversed by the sender; Immediate settlement—can be sent from person to person similar to an e-mail; Lower transaction fees; Available to anyone with a smartphone and or Internet access. Some of the disadvantages of a cryptocurrency include the following: No way to reverse the payment. See 14-5: Blockchain Technology and Cryptocurrency POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe blockchain technology and cryptocurrency. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Blockchain technology and cryptocurrency KEYWORDS: Understand DATE CREATED: 12/1/2019 4:27 PM DATE MODIFIED: 12/1/2019 4:31 PM 91. The main difference among an electronic payment system and cryptocurrency is not having a(n) ____ between the sender and receiver. a. payment obligation b. e-commerce relationship c. third party such as a bank or a financial institution d. set value for the payment ANSWER: c RATIONALE: Correct. The main difference among an electronic payment system, such as PayPal and credit and debit cards, and cryptocurrency, such as Bitcoin, is not having a third party such as a bank or a financial institution between the sender and receiver. It is a peer-to-peer operation that can take place between two parties anywhere in the world. See 14-5: Blockchain Technology and Cryptocurrency POINTS: 1 DIFFICULTY: Easy REFERENCES: Describe blockchain technology and cryptocurrency. QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Blockchain technology and cryptocurrency KEYWORDS: Understand DATE CREATED: 12/1/2019 4:38 PM DATE MODIFIED: 12/1/2019 4:43 PM 92. In the aviation industry, quantum computing can help with ____. a. routing and scheduling of aircrafts and keeping the sky safer b. adjusting weather conditions c. data encryption d. marketing to new potential customers ANSWER: a Copyright Cengage Learning. Powered by Cognero.

Page 42


Module 14: Emerging Trends, Technologies, and Applications RATIONALE:

Quantum computing is being applied to a diverse group of applications both in business and in the scientific world. In the aviation industry, it allows complex computer modeling and simulation of diverse aeronautical scenarios. This will help with routing and scheduling of aircrafts and keeping the sky safer. See 14-6: Quantum Computing POINTS: 1 DIFFICULTY: Easy QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.6 TOPICS: Quantum computing KEYWORDS: Understand DATE CREATED: 12/1/2019 5:10 PM DATE MODIFIED: 12/1/2019 5:15 PM 93. Quantum computing could significantly improve ____ scenarios such as the weather or economic cycles. a. preventing b. controlling c. forecasting d. illustrating ANSWER: c RATIONALE: Correct. Quantum computing could significantly improve forecasting complex scenarios such as the weather or economic cycles. See 14-6: Quantum Computing POINTS: 1 DIFFICULTY: Moderate QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.6 TOPICS: Quantum computing KEYWORDS: Understand DATE CREATED: 12/1/2019 5:16 PM DATE MODIFIED: 12/1/2019 5:20 PM 94. Quantum units of information deploy the properties of entanglement and ____ to offer exponentially greater computing power. a. superposition b. directionality c. effectiveness d. digital conversion ANSWER: a RATIONALE: Correct. By deploying the quantum properties of superposition and entanglement, qubits offer exponentially greater computing power than binary bits. See 14-6: Quantum Computing POINTS: 1 DIFFICULTY: Moderate QUESTION TYPE: Multiple Choice Copyright Cengage Learning. Powered by Cognero.

Page 43


Module 14: Emerging Trends, Technologies, and Applications HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.6 TOPICS: Quantum computing KEYWORDS: Understand DATE CREATED: 12/1/2019 5:21 PM DATE MODIFIED: 12/1/2019 5:24 PM 95. Compared with a large-scale integrated multi-purpose computer, a quantum computer is a ____ computer. a. slower integrated b. high-speed integrated c. high-speed parallel d. high-powered multi-purpose ANSWER: c RATIONALE: Correct. A difference between classic computers and quantum computers include: a classic computer is a large-scale integrated multipurpose computer, whereas a quantum computer is a high-speed parallel computer based on quantum mechanics. See 14-6: Quantum Computing POINTS: 1 DIFFICULTY: Moderate QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.6 TOPICS: Quantum computing KEYWORDS: Understand DATE CREATED: 12/1/2019 5:25 PM DATE MODIFIED: 12/1/2019 5:29 PM 96. In the field of pharmaceutical research, quantum computing can be used to ______. a. speed up the time it takes to bring a new drug to market b. promote new drugs more informatively c. lower drug prices d. create nanocapsules for drug administration ANSWER: a RATIONALE: Correct. There are countless possibilities about how different drugs could impact different patients and how patients may respond to various treatments. Currently it takes more than 10 years to bring a new drug to market and get FDA approval. Quantum computing could significantly expedite this process with its immense processing power. See 14-6: Quantum Computing POINTS: 1 DIFFICULTY: Moderate QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.6 TOPICS: Quantum computing KEYWORDS: Understand Copyright Cengage Learning. Powered by Cognero.

Page 44


Module 14: Emerging Trends, Technologies, and Applications DATE CREATED: DATE MODIFIED:

12/1/2019 5:30 PM 12/1/2019 5:35 PM

97. A quantum computer solves problems considered _____ for classic computers. a. too easy b. impossible c. inefficient d. too frivolous ANSWER: b RATIONALE: Correct. A quantum computer solves problems considered impossible for classic computers. See 14-6: Quantum Computing POINTS: 1 DIFFICULTY: Moderate QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.6 TOPICS: Quantum computing KEYWORDS: Understand DATE CREATED: 12/1/2019 5:35 PM DATE MODIFIED: 12/1/2019 5:38 PM 98. Quantum computing can assist with data analytics by _____. a. offering more imaginative solutions to problems b. solving problems that do not involve variables c. solving problems on a large scale with multiple variables d. anticipating human behavior ANSWER: c RATIONALE: Correct. In data analytics, quantum computing can assist in solving problems on a large scale with multiple variables. See 14-6: Quantum Computing POINTS: 1 DIFFICULTY: Easy QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.6 TOPICS: Quantum computing KEYWORDS: Understand DATE CREATED: 12/1/2019 5:38 PM DATE MODIFIED: 12/1/2019 5:42 PM 99. Quantum computing can provide much _____ encryption technology. a. more personalized b. faster c. stronger d. less optimized Copyright Cengage Learning. Powered by Cognero.

Page 45


Module 14: Emerging Trends, Technologies, and Applications ANSWER: RATIONALE:

c Correct. Quantum computing is able to provide much stronger encryption technology that will help to provide strong protection for digital assets and will make it nearly impossible to break encrypted documents or networks. See 14-6: Quantum Computing POINTS: 1 DIFFICULTY: Moderate QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.6 TOPICS: Quantum computing KEYWORDS: Understand DATE CREATED: 12/1/2019 5:43 PM DATE MODIFIED: 12/1/2019 5:48 PM 100. According to security experts, it could take at least ____ to get quantum-proof encryption developed and deployed on a mass scale. a. 15 years b. 20 years c. 25 years d. 5 years ANSWER: b RATIONALE: Correct. According to security experts, it could take at least 20 years to get quantum-proof encryption developed and deployed on a mass scale. See 14-6: Quantum Computing POINTS: 1 DIFFICULTY: Moderate QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.6 TOPICS: Quantum computing KEYWORDS: Understand DATE CREATED: 12/1/2019 5:49 PM DATE MODIFIED: 12/1/2019 5:51 PM 101. Quantum computing may pose a security threat because ____. a. quantum computers are too new b. quantum-proof encryption is not yet developed and deployed on a mass scale c. quantum-proof security is not feasible d. encryption on a mass scale will soon be outdated ANSWER: b RATIONALE: Correct. Encryption technology is the greatest defense against hackers and protecting information assets, in particular those that deal with financial and medical information. According to security experts, it could take at least 20 years to get quantum-proof encryption developed and deployed on a mass scale. A powerful quantum computer could crack a sophisticated encryption algorithm in a fraction of the time that it takes a classic computer. See 14-6: Quantum Computing Copyright Cengage Learning. Powered by Cognero.

Page 46


Module 14: Emerging Trends, Technologies, and Applications POINTS: 1 DIFFICULTY: Moderate QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: MIS.10e.14.6 TOPICS: Quantum computing KEYWORDS: Understand DATE CREATED: 12/1/2019 5:52 PM DATE MODIFIED: 12/1/2019 5:56 PM Essay 102. In the context of recent trends in software and service distribution, provide an example of push technology in action. ANSWER: Answers will vary. Users often see notices such as “A newer version of Adobe Flash is available. Would you like to install it?” In this case, the vendor (Adobe) is pushing the updated product to the users as soon as it is available, which is the event triggering the push. This example assumes that the users have already downloaded a previous version of Adobe Flash; by doing so, they have signed up for pushed updates. See 14-1: Trends in Software and Service Distribution POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize new trends in software and service distribution. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.14.1 TOPICS: Software distribution KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 2:42 PM 103. With the help of an example, explain how software as a service (SaaS) might work. ANSWER: Answers will vary. Here is a simple example of how SaaS might work: you want to edit a document, X.doc, and you need word-processing software for this task. With SaaS, you do not need the software installed on your computer. You can simply access it from the SaaS provider site. You can then run the software from the provider’s server (and not take up your computing resources) or on your computer. The location of the X.doc file does not matter. You can make use of the provider’s SaaS service to edit the document, which stays on your hard drive (or wherever you had it stored-a flash drive, for example). The wordprocessing application is not stored on your computer, so the next time you access the word-processing software from the provider’s SaaS site, you might get a newer version of the word-processing software. SaaS deals only with software, not with data and document storage or with hardware resources, such as processing power and memory. See 14-1: Trends in Software and Service Distribution POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize new trends in software and service distribution. Copyright Cengage Learning. Powered by Cognero.

Page 47


Module 14: Emerging Trends, Technologies, and Applications QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.14.1 TOPICS: Software as a Service KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 2:11 PM 104. List the different forms of the software as a service (SaaS) model. ANSWER: Answers will vary. The SaaS model can take several forms, such as the following: a. Software services for general use, such as office suite packages b. A specific service, such as credit card processing c. A service in a vertical market, such as software solutions for doctors, accountants, and attorneys See 14-1: Trends in Software and Service Distribution POINTS: 1 DIFFICULTY: Moderate REFERENCES: Summarize new trends in software and service distribution. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.14.1 TOPICS: Software as a Service KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 2:11 PM 105. Discuss the advantages and disadvantages of application service providers (ASPs). ANSWER: Answers will vary. ASPs have some specific advantages. They are the following: a. The customer does not need to be concerned about whether software is current. b. Information systems (IS) personnel time is freed up to focus on applications (such as customer relationship management and financial information systems) that are more strategically important to the organization. c. Software development costs are spread over several customers, so vendors can absorb some expenses of software development and develop more improved software. d. Software is kept up to date, based on users’ requests. e. The ASP contract guarantees a certain level of technical support. f. An organization’s software costs can be reduced to a predictable monthly fee. Some disadvantages of ASPs include the following: a. Generally, users must accept applications as provided by ASPs; software customized to users’ needs is not offered. b. Because the organization has less control over how applications are developed, there is the risk that applications might not fully meet the organization’s needs. c. Integration with the customer’s other applications and systems might be challenging. See 14-1: Trends in Software and Service Distribution POINTS: 1 DIFFICULTY: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 48


Module 14: Emerging Trends, Technologies, and Applications REFERENCES: Summarize new trends in software and service distribution. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.14.1 TOPICS: Software as a Service KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 2:12 PM 106. How do head-mounted displays (HMDs) work? ANSWER: Answers will vary. HMDs contain two small TV screens, one in front of each eye, along with a magnifying lens to generate the view. Sensing devices on top of the helmet determine the orientation and position of the user’s head. The information is then transmitted to the computer, which generates two pictures so that each eye has a slightly different view, just as humans’ eyes do. See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe virtual reality components and applications. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 2:13 PM 107. Describe the function of the central coordinating processor and software system in a virtual reality (VR) system. ANSWER: Answers will vary. The central coordinating processor and software system generates and manipulates high-quality graphics in real time, so it needs a very fast processor. To display images in real time, 3D image graphics must be rendered rapidly, and the screen’s refresh rate has to be extremely fast. See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe virtual reality components and applications. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 2:13 PM Copyright Cengage Learning. Powered by Cognero.

Page 49


Module 14: Emerging Trends, Technologies, and Applications 108. How can virtual reality (VR) systems be used in architectural design? ANSWER: Answers will vary. Architects and engineers use VR systems to create blueprints and build prototypes to show to clients. With a VR system, several versions of a design can be created to demonstrate to clients the outcome of modifying different factors. Architects and engineers can also use VR systems to test different conditions (such as wind shear) without the expense of using physical materials. See 14-2: Virtual Reality POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe virtual reality components and applications. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.14.2 TOPICS: Virtual Reality KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 2:14 PM 109. Discuss the drawbacks of grid computing. ANSWER: Answers will vary. Grid computing does have some drawbacks. Some applications cannot be spread among nodes, so they are not suitable for grid computing, and applications requiring extensive memory that a single node cannot provide cannot be used on a grid. In addition, licensing agreements can be challenging, and synchronizing operations in several different network domains can be difficult and require sophisticated network management tools. Finally, some organizations are resistant to sharing resources, even if doing so benefits them. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the foundation, models, and applications of cloud computing. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 2:17 PM 110. Why do companies consider cost saving as a major advantage of grid computing? ANSWER: Answers will vary. Cost saving is a major advantage of grid computing because companies do not have to purchase additional equipment. In addition, processing on overused nodes can be switched to idle servers and even desktop systems. Grid computing has already been used in bioinformatics, oil and gas drilling, and financial applications. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe new trends in networking, including grid, utility, and cloud computing. Copyright Cengage Learning. Powered by Cognero.

Page 50


Module 14: Emerging Trends, Technologies, and Applications QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 2:17 PM 111. Discuss the advantages and disadvantages of cloud computing. ANSWER: Answers will vary. Cloud computing has many of the advantages and disadvantages of distributed computing. With this platform, users can request services, applications, and storage. For small and medium businesses, it means they do not have to invest in expensive equipment to compete effectively with large companies and can concentrate on the services and products they provide. Cloud computing services typically require a fee, although some are free. Google Apps, which includes Gmail, Google Talk, and Google Docs, provides commonly used applications accessed via a Web browser; software and data are stored on Google’s servers, not on the user’s computer. The standard edition for personal use is free. See 14-3: Cloud Computing: Foundation, Applications, And Models POINTS: 1 DIFFICULTY: Moderate REFERENCES: Describe the foundation, models, and applications of cloud computing. QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.14.3 TOPICS: Networking KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 2:18 PM 112. Discuss some of the future uses of nanotechnology. ANSWER: Answers will vary. In the field of information systems, the current technology for miniaturizing transistors and other microprocessor components might reach its limit in the next decade, so new technologies, including nanotechnology, will be necessary. Nanotechnology might also play a role in the following areas: a. Energy (reduction of energy consumption, increase in the efficiency of energy production, more environmentally friendly energy systems) b. Information and communication (larger and faster storage devices, faster and cheaper computers, display monitors with low energy consumption) c. Heavy industry (aerospace, construction, refineries, vehicle manufacturing) See 14-4: Nanotechnology POINTS: 1 DIFFICULTY: Moderate REFERENCES: Discuss uses of nanotechnology. QUESTION TYPE: Essay HAS VARIABLES: False Copyright Cengage Learning. Powered by Cognero.

Page 51


Module 14: Emerging Trends, Technologies, and Applications STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: MIS.10e.14.5 TOPICS: Nanotechnology KEYWORDS: Understand DATE CREATED: 10/22/2019 1:33 PM DATE MODIFIED: 12/1/2019 2:20 PM

Copyright Cengage Learning. Powered by Cognero.

Page 52


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.