TEST BANK for Principles of Information Systems, 14th Edition, by Ralph Stair and George Reynolds.

Page 1


Chapter 01 - Information Systems: People, Technology, Processes, and Structure True / False 1. A set of random or unrelated tasks performed to achieve a definite outcome is called a process. a. True b. False ANSWER: False RATIONALE: A process is a structured set of related activities that takes input, adds value, and creates an output for the customer of that process. FEEDBACK: Correct A process is a structured set of related activities that takes input, adds value, and creates an output for the customer of that process. Incorrect A process is a structured set of related activities that takes input, adds value, and creates an output for the customer of that process.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information Systems—A Means to Achieve Competitive Advantage QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.2 - State three reasons why organizations employ the Leavitt’s Diamond model to introduce new systems into the workplace. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:59 PM DATE MODIFIED: 11/27/2019 5:05 PM 2. An information system is a set of interrelated components that work together to collect, process, store, and disseminate information that lacks a feedback mechanism to monitor and control its operation. a. True b. False ANSWER: False RATIONALE: An information system is a set of interrelated components that work together to collect, process, store, and disseminate information. A well-designed information system includes some form of feedback mechanism to monitor and control its operation. FEEDBACK: Correct An information system is a set of interrelated components that work together to collect, process, store, and disseminate information. A well-designed information system includes some form of feedback mechanism to monitor and control its operation. Incorrect An information system is a set of interrelated components that work together to collect, process, store, and disseminate information. A well-designed information system includes some form of feedback mechanism to monitor and control its operation.

POINTS: 1 DIFFICULTY: Easy REFERENCES: What is an Information System QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.1 - Identify two key management responsibilities in implementing successful information systems. Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 01 - Information Systems: People, Technology, Processes, and Structure NATIONAL STANDARDS: KEYWORDS: DATE CREATED: DATE MODIFIED:

United States - BUSPROG: Technology Blooms: Remember 11/19/2019 5:59 PM 11/28/2019 7:32 AM

3. Organizations cannot have many value chains. a. True b. False ANSWER: False RATIONALE: The value chain is a series (or chain) of activities that an organization performs to transform inputs into outputs in such a way that the value of the input is increased. An organization may have many value chains, and different organizations in different industries will have different value chains. FEEDBACK: Correct The value chain is a series (or chain) of activities that an organization performs to transform inputs into outputs in such a way that the value of the input is increased. An organization may have many value chains, and different organizations in different industries will have different value chains. Incorrect The value chain is a series (or chain) of activities that an organization performs to transform inputs into outputs in such a way that the value of the input is increased. An organization may have many value chains, and different organizations in different industries will have different value chains.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Value Chain QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.4 - Discuss the traditional and contemporary view of the role that information systems play in an organization’s value chains. NATIONAL STANDARDS: United States - BUSPROG: Communication - Communication KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:59 PM DATE MODIFIED: 11/27/2019 5:23 PM 4. The concept of a value chain is not significant to organizations unless they manufacture products. a. True b. False ANSWER: False RATIONALE: In a manufacturing organization, the supply chain is a key value chain whose primary processes include inbound logistics, operations, outbound logistics, marketing and sales, and service. The concept of value chain is also meaningful to companies that don’t manufacture products. FEEDBACK: Correct In a manufacturing organization, the supply chain is a key value chain whose primary processes include inbound logistics, operations, outbound logistics, marketing and sales, and service. The concept of value chain is also meaningful to companies that don’t manufacture products. Incorrect In a manufacturing organization, the supply chain is a key value chain whose primary processes include inbound logistics, operations, outbound logistics, marketing and sales, and service. The concept of value chain is also meaningful to Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 01 - Information Systems: People, Technology, Processes, and Structure companies that don’t manufacture products.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Value Chain QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.4 - Discuss the traditional and contemporary view of the role that information systems play in an organization’s value chains. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:59 PM DATE MODIFIED: 11/27/2019 5:34 PM 5. If an IS organization is viewed as a cost center/service provider, its strategic planning process is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better. a. True b. False ANSWER: True RATIONALE: In a survey of more than 700 CIOs, 38 percent said that their IS organization is viewed as a cost center/service provider that is expected to reduce IS costs and improve IS services. The strategic planning process for such an organization is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better. FEEDBACK: Correct In a survey of more than 700 CIOs, 38 percent said that their IS organization is viewed as a cost center/service provider that is expected to reduce IS costs and improve IS services. The strategic planning process for such an organization is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better. Incorrect In a survey of more than 700 CIOs, 38 percent said that their IS organization is viewed as a cost center/service provider that is expected to reduce IS costs and improve IS services. The strategic planning process for such an organization is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information System Strategic Planning QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.7 - Identify three ways the IS organization can be perceived by the rest of the organization, and how each can influence the IS strategy. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:59 PM DATE MODIFIED: 11/29/2019 6:52 AM 6. The role of a systems analyst is narrowly defined and seldom involves communications with others. a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 01 - Information Systems: People, Technology, Processes, and Structure ANSWER: RATIONALE:

False Systems analysis often communicate with others. Systems analysts frequently consult with management and users to define the scope of and requirements for new information systems. They convey system requirements to software developers and network architects for implementation.

FEEDBACK:

Correct

Systems analysts frequently consult with management and users to define the scope of and requirements for new information systems. They convey system requirements to software developers and network architects for implementation. Incorrect Systems analysts frequently consult with management and users to define the scope of and requirements for new information systems. They convey system requirements to software developers and network architects for implementation.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Typical Information System Roles QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.8 - Identify six non-technical skills needed to be an effective information system worker. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:59 PM DATE MODIFIED: 11/29/2019 6:57 AM 7. For someone to be a good CIO, technical ability is the most important characteristic. a. True b. False ANSWER: False RATIONALE: CIOs need strong technical, business, and inter-personal skills. FEEDBACK: Correct CIOs need strong technical, business, and inter-personal skills. Incorrect CIOs need strong technical, business, and inter-personal skills.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Typical Information System Roles QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.8 - Identify six non-technical skills needed to be an effective information system worker. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:59 PM DATE MODIFIED: 11/29/2019 7:00 AM 8. One of the primary roles of a senior IS manager is to provide subordinates with leadership and direction that will help the organization achieve its goals. a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 01 - Information Systems: People, Technology, Processes, and Structure ANSWER: RATIONALE:

True A good CIO is typically a visionary who provides leadership and direction to the IS department to help an organization achieve its goals.

FEEDBACK:

Correct

A good CIO is typically a visionary who provides leadership and direction to the IS department to help an organization achieve its goals. Incorrect A good CIO is typically a visionary who provides leadership and direction to the IS department to help an organization achieve its goals.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Typical Information System Roles QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.8 - Identify six non-technical skills needed to be an effective information system worker. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:59 PM DATE MODIFIED: 11/29/2019 7:07 AM 9. Managers of the business functions most affected by the new information system have a key responsibility to ensure that the people, processes, and human structure components are fully addressed. a. True b. False ANSWER: True RATIONALE: Managers of the business functions most affected by the new information system have a key responsibility to ensure that the people, processes, and human structure components are fully addressed. FEEDBACK: Correct Managers of the business functions most affected by the new information system have a key responsibility to ensure that the people, processes, and human structure components are fully addressed. Incorrect Managers of the business functions most affected by the new information system have a key responsibility to ensure that the people, processes, and human structure components are fully addressed.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information Systems—A Means to Achieve Competitive Advantage QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.1 - Identify two key management responsibilities in implementing successful information systems. KEYWORDS: Bloom's: Remember DATE CREATED: 11/29/2019 1:52 PM DATE MODIFIED: 11/29/2019 1:53 PM 10. Organizations use processes, procedures, and differentiation strategies to introduce new systems into the workplace in a manner that lowers stress, encourages teamwork, and increases the probability of a successful implementation. Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 01 - Information Systems: People, Technology, Processes, and Structure a. True b. False ANSWER: RATIONALE:

FEEDBACK:

False Leavitt’s Diamond was defined by American psychologist and organizational scientist Harold Leavitt. Organizations use this model to introduce new systems into the workplace in a manner that lowers stress, encourages teamwork, and increases the probability of a successful implementation. Correct

Leavitt’s Diamond was defined by American psychologist and organizational scientist Harold Leavitt. Organizations use this model to introduce new systems into the workplace in a manner that lowers stress, encourages teamwork, and increases the probability of a successful implementation. Incorrect Leavitt’s Diamond was defined by American psychologist and organizational scientist Harold Leavitt. Organizations use this model to introduce new systems into the workplace in a manner that lowers stress, encourages teamwork, and increases the probability of a successful implementation.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information Systems—A Means to Achieve Competitive Advantage QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.2 - State three reasons why organizations employ the Leavitt’s Diamond model to introduce new systems into the workplace. KEYWORDS: Bloom's: Remember DATE CREATED: 11/29/2019 2:06 PM DATE MODIFIED: 11/29/2019 2:11 PM 11. The strategic plan of an information system (IS) must identify those technologies, vendors, competencies, people, systems, and projects in which an organization will invest to support the corporate and business unit strategies. a. True b. False ANSWER: True RATIONALE: The strategic plan of an information system (IS) must identify those technologies, vendors, competencies, people, systems, and projects in which an organization will invest to support the corporate and business unit strategies. FEEDBACK: Correct The strategic plan of an information system (IS) must identify those technologies, vendors, competencies, people, systems, and projects in which an organization will invest to support the corporate and business unit strategies. Incorrect The strategic plan of an information system (IS) must identify those technologies, vendors, competencies, people, systems, and projects in which an organization will invest to support the corporate and business unit strategies.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information System Strategic Planning QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.6 - Identify four drivers that help set the information system organizational strategy. Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 01 - Information Systems: People, Technology, Processes, and Structure KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 12/5/2019 12:57 PM 12/5/2019 12:59 PM

12. New technology innovations rarely influence an organization's information system strategic plan since it is so strongly determined by corporate strategy. a. True b. False ANSWER: False RATIONALE: The strategic plan of an information system (IS) must identify those technologies, vendors, competencies, people, systems, and projects in which an organization will invest to support the corporate and business unit strategies. This plan is strongly influenced by new technology innovations. FEEDBACK: Correct The information system strategic plan is strongly influenced by new technology innovations. Incorrect The information system strategic plan is strongly influenced by new technology innovations.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information System Strategic Planning QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.6 - Identify four drivers that help set the information system organizational strategy. KEYWORDS: Bloom's: Remember DATE CREATED: 12/5/2019 12:59 PM DATE MODIFIED: 12/5/2019 1:04 PM 13. The strategic planning process for Sandeep's IS organization should be the same whether the rest of the organization perceives it as a cost center, business partner, or game changer. a. True b. False ANSWER: False RATIONALE: The strategic planning process for the IS organization is strongly influenced by how the IS organization is perceived by the rest of the organization. FEEDBACK: Correct The strategic planning process for the IS organization is strongly influenced by how the IS organization is perceived by the rest of the organization. Incorrect The strategic planning process for the IS organization is strongly influenced by how the IS organization is perceived by the rest of the organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information System Strategic Planning QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.6 - Identify four drivers that help set the information system organizational strategy. Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 01 - Information Systems: People, Technology, Processes, and Structure KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 12/5/2019 4:51 PM 12/5/2019 5:10 PM

14. Billie Jean doesn't need to consider her information system strategic plan when she chooses projects to assign to the contractors she is supervising. a. True b. False ANSWER: False RATIONALE: The strategic plan of an information system (IS) must identify those technologies, vendors, competencies, people, systems, and projects in which an organization will invest to support the corporate and business unit strategies. FEEDBACK: Correct The strategic plan of an information system (IS) must identify those technologies, vendors, competencies, people, systems, and projects in which an organization will invest to support the corporate and business unit strategies. Incorrect The strategic plan of an information system (IS) must identify those technologies, vendors, competencies, people, systems, and projects in which an organization will invest to support the corporate and business unit strategies.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Information System Strategic Planning QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.6 - Identify four drivers that help set the information system organizational strategy. KEYWORDS: Bloom's: Remember DATE CREATED: 12/5/2019 5:14 PM DATE MODIFIED: 12/5/2019 5:20 PM 15. The release of a new and more powerful mobile computing device or data-crunching software package can influence the strategic plan of an information system. a. True b. False ANSWER: True RATIONALE: The strategic plan of an information system (IS) is strongly influenced by new technology innovations. These innovations include increasingly more powerful mobile devices and advanced software that can analyze large amounts of structured and unstructured data. FEEDBACK: Correct The strategic plan of an information system (IS) is strongly influenced by new technology innovations. These innovations include increasingly more powerful mobile devices and advanced software that can analyze large amounts of structured and unstructured data. Incorrect The strategic plan of an information system (IS) is strongly influenced by new technology innovations. These innovations include increasingly more powerful mobile devices and advanced software that can analyze large amounts of structured and unstructured data.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 01 - Information Systems: People, Technology, Processes, and Structure REFERENCES: Information System Strategic Planning QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.6 - Identify four drivers that help set the information system organizational strategy. KEYWORDS: Bloom's: Remember DATE CREATED: 12/5/2019 5:21 PM DATE MODIFIED: 12/5/2019 5:25 PM Multiple Choice 16. In terms of information systems, a collaboration tool that helps a team communicate, organize, plan, schedule, track, and delegate jobs would be an example of _________. a. a personal information system b. a workgroup information system c. an enterprise information system d. an organizational complement ANSWER: b RATIONALE: A workgroup information system supports teamwork and enables people to work together effectively, whether team members are in the same location or dispersed around the world. These systems are also known as collaboration systems. Examples of workgroup information systems include instant messaging software, electronic conferencing software, and collaboration software used to move groups through the steps of a process toward their goals. FEEDBACK: a. A workgroup information system supports teamwork and enables people to work together effectively, whether team members are in the same location or dispersed around the world. These systems are also known as collaboration systems. Examples of workgroup information systems include instant messaging software, electronic conferencing software, and collaboration software used to move groups through the steps of a process toward their goals. b. A workgroup information system supports teamwork and enables people to work together effectively, whether team members are in the same location or dispersed around the world. These systems are also known as collaboration systems. Examples of workgroup information systems include instant messaging software, electronic conferencing software, and collaboration software used to move groups through the steps of a process toward their goals. c. A workgroup information system supports teamwork and enables people to work together effectively, whether team members are in the same location or dispersed around the world. These systems are also known as collaboration systems. Examples of workgroup information systems include instant messaging software, electronic conferencing software, and collaboration software used to move groups through the steps of a process toward their goals. d. A workgroup information system supports teamwork and enables people to work together effectively, whether team members are in the same location or dispersed around the world. These systems are also known as collaboration systems. Examples of workgroup information systems include instant messaging software, electronic conferencing software, and collaboration software used to move groups through the steps of a process toward their goals.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Easy Types of Information Systems Multiple Choice False

Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 01 - Information Systems: People, Technology, Processes, and Structure LEARNING OBJECTIVES: POIS.14e.1.3 - Describe four fundamental information system types based on their sphere of influence. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:59 PM DATE MODIFIED: 11/28/2019 7:33 AM 17. When the IS organization and its resources are focused on efforts that support the key objectives defined in the managers' strategic plan for the business, the organization is in _________. a. alignment b. compliance c. development d. construction ANSWER: a RATIONALE: The strategic plan of an information system (IS) must identify those technologies, vendors, competencies, people, systems, and projects in which an organization will invest to support the corporate and business unit strategies. No matter how an IS organization is perceived, the odds of achieving good alignment between the IS strategic plan and the rest of the business are vastly increased if IS workers have experience in the business and can talk to business managers in business terms rather than technology terms. FEEDBACK: a. The strategic plan of an information system (IS) must identify those technologies, vendors, competencies, people, systems, and projects in which an organization will invest to support the corporate and business unit strategies. No matter how an IS organization is perceived, the odds of achieving good alignment between the IS strategic plan and the rest of the business are vastly increased if IS workers have experience in the business and can talk to business managers in business terms rather than technology terms. b. The strategic plan of an information system (IS) must identify those technologies, vendors, competencies, people, systems, and projects in which an organization will invest to support the corporate and business unit strategies. No matter how an IS organization is perceived, the odds of achieving good alignment between the IS strategic plan and the rest of the business are vastly increased if IS workers have experience in the business and can talk to business managers in business terms rather than technology terms. c. The strategic plan of an information system (IS) must identify those technologies, vendors, competencies, people, systems, and projects in which an organization will invest to support the corporate and business unit strategies. No matter how an IS organization is perceived, the odds of achieving good alignment between the IS strategic plan and the rest of the business are vastly increased if IS workers have experience in the business and can talk to business managers in business terms rather than technology terms. d. The strategic plan of an information system (IS) must identify those technologies, vendors, competencies, people, systems, and projects in which an organization will invest to support the corporate and business unit strategies. No matter how an IS organization is perceived, the odds of achieving good alignment between the IS strategic plan and the rest of the business are vastly increased if IS workers have experience in the business and can talk to business managers in business terms rather than technology terms.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Easy Information System Strategic Planning Multiple Choice False

Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 01 - Information Systems: People, Technology, Processes, and Structure LEARNING OBJECTIVES: POIS.14e.1.5 - Identify four benefits of creating a strategic plan. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:59 PM DATE MODIFIED: 11/28/2019 7:38 AM 18. _____ is/are considered to be the most important element in computer-based information systems. a. Bandwidth b. Software applications c. Standard operating procedures d. People ANSWER: d RATIONALE: It comes as no surprise that people are the most important element of information systems. Indeed, people are involved in information systems in many ways: people envision information systems and the benefits they can deliver, people design and build information systems, people support and maintain information systems, and people use information systems to achieve worthwhile results. FEEDBACK: a. It comes as no surprise that people are the most important element of information systems. Indeed, people are involved in information systems in many ways: people envision information systems and the benefits they can deliver, people design and build information systems, people support and maintain information systems, and people use information systems to achieve worthwhile results. b. It comes as no surprise that people are the most important element of information systems. Indeed, people are involved in information systems in many ways: people envision information systems and the benefits they can deliver, people design and build information systems, people support and maintain information systems, and people use information systems to achieve worthwhile results. c. It comes as no surprise that people are the most important element of information systems. Indeed, people are involved in information systems in many ways: people envision information systems and the benefits they can deliver, people design and build information systems, people support and maintain information systems, and people use information systems to achieve worthwhile results. d. It comes as no surprise that people are the most important element of information systems. Indeed, people are involved in information systems in many ways: people envision information systems and the benefits they can deliver, people design and build information systems, people support and maintain information systems, and people use information systems to achieve worthwhile results.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information Systems—A Means to Achieve Competitive Advantage QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.2 - State three reasons why organizations employ the Leavitt’s Diamond model to introduce new systems into the workplace. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:59 PM DATE MODIFIED: 11/27/2019 4:54 PM 19. _____ are people who work directly with information systems to get results. a. System analysts b. Database administrators Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 01 - Information Systems: People, Technology, Processes, and Structure c. System developers ANSWER: RATIONALE:

FEEDBACK:

d. End users d End users are people who work directly with information systems to get results. They can include anyone in the organization—receptionists, financial managers, product development personnel, salespeople, human resource managers, marketing representatives, warehouse workers, executives, and manufacturing line operators. a. End users are people who work directly with information systems to get results.

They can include anyone in the organization—receptionists, financial managers, product development personnel, salespeople, human resource managers, marketing representatives, warehouse workers, executives, and manufacturing line operators. b. End users are people who work directly with information systems to get results. They can include anyone in the organization—receptionists, financial managers, product development personnel, salespeople, human resource managers, marketing representatives, warehouse workers, executives, and manufacturing line operators. c. End users are people who work directly with information systems to get results. They can include anyone in the organization—receptionists, financial managers, product development personnel, salespeople, human resource managers, marketing representatives, warehouse workers, executives, and manufacturing line operators. d. End users are people who work directly with information systems to get results. They can include anyone in the organization—receptionists, financial managers, product development personnel, salespeople, human resource managers, marketing representatives, warehouse workers, executives, and manufacturing line operators.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information Systems—A Means to Achieve Competitive Advantage QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.2 - State three reasons why organizations employ the Leavitt’s Diamond model to introduce new systems into the workplace. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:59 PM DATE MODIFIED: 11/27/2019 4:58 PM 20. Finn designs and sells screen-printed t-shirts. He is reviewing sales data from previous years to decide which colors are the most popular, and would therefore be the best investments for his next batch of t-shirts. This is an example of _________. a. business analytics b. a management information system c. data science d. all of these answers ANSWER: a RATIONALE: Business analysts are responsible for improving a company’s competitiveness and performance across a broad spectrum of criteria. They must collect, review, and analyze information that enables them to make sound recommendations. FEEDBACK: a. Business analysts are responsible for improving a company’s competitiveness and performance across a broad spectrum of criteria. They must collect, review,

Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 01 - Information Systems: People, Technology, Processes, and Structure and analyze information that enables them to make sound recommendations.

b. Business analysts are responsible for improving a company’s competitiveness

and performance across a broad spectrum of criteria. They must collect, review, and analyze information that enables them to make sound recommendations. c. Business analysts are responsible for improving a company’s competitiveness and performance across a broad spectrum of criteria. They must collect, review, and analyze information that enables them to make sound recommendations. d. Business analysts are responsible for improving a company’s competitiveness and performance across a broad spectrum of criteria. They must collect, review, and analyze information that enables them to make sound recommendations.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Typical Information System Roles QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.8 - Identify six non-technical skills needed to be an effective information system worker. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:59 PM DATE MODIFIED: 11/29/2019 7:10 AM 21. In a manufacturing organization, the supply chain is a key value chain whose primary activities include all of the following EXCEPT: a. inbound logistics. b. finance and accounting. c. marketing and sales. d. customer service. ANSWER: b RATIONALE: In a manufacturing organization, the supply chain is a key value chain whose primary processes include inbound logistics, operations, outbound logistics, marketing and sales, and service. FEEDBACK: a. In a manufacturing organization, the supply chain is a key value chain whose primary processes include inbound logistics, operations, outbound logistics, marketing and sales, and service. b. In a manufacturing organization, the supply chain is a key value chain whose primary processes include inbound logistics, operations, outbound logistics, marketing and sales, and service. c. In a manufacturing organization, the supply chain is a key value chain whose primary processes include inbound logistics, operations, outbound logistics, marketing and sales, and service. d. In a manufacturing organization, the supply chain is a key value chain whose primary processes include inbound logistics, operations, outbound logistics, marketing and sales, and service.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Value Chain QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.4 - Discuss the traditional and contemporary view of the role that information Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 01 - Information Systems: People, Technology, Processes, and Structure NATIONAL STANDARDS: KEYWORDS: DATE CREATED: DATE MODIFIED:

systems play in an organization’s value chains. United States - BUSPROG: Legal - Legal Bloom's: Remember 11/19/2019 5:59 PM 11/27/2019 5:38 PM

22. _____ encompasses all the activities required to get the right product into the right consumer’s hands in the right quantity at the right time and at the right cost, from acquisition of raw materials through customer delivery. a. Supply chain management b. Value chain management c. Inventory management d. Customer management ANSWER: a RATIONALE: An organization’s supply chain encompasses the processes required to get the right product or service into the right consumer’s hands in the right quantity at the right time and at the right cost. These primary processes are directly concerned with the creation and/or delivery of the product or service. FEEDBACK: a. An organization’s supply chain encompasses the processes required to get the right product or service into the right consumer’s hands in the right quantity at the right time and at the right cost. These primary processes are directly concerned with the creation and/or delivery of the product or service. b. An organization’s supply chain encompasses the processes required to get the right product or service into the right consumer’s hands in the right quantity at the right time and at the right cost. These primary processes are directly concerned with the creation and/or delivery of the product or service. c. An organization’s supply chain encompasses the processes required to get the right product or service into the right consumer’s hands in the right quantity at the right time and at the right cost. These primary processes are directly concerned with the creation and/or delivery of the product or service. d. An organization’s supply chain encompasses the processes required to get the right product or service into the right consumer’s hands in the right quantity at the right time and at the right cost. These primary processes are directly concerned with the creation and/or delivery of the product or service.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Value Chain QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.4 - Discuss the traditional and contemporary view of the role that information systems play in an organization’s value chains. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:59 PM DATE MODIFIED: 11/27/2019 5:41 PM 23. In the contemporary view of information systems, they are considered an integral part of the supply chain management process mainly because they: _________. a. aid in product transformation b. produce output c. provide input into the process d. all of these ANSWER: d Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 01 - Information Systems: People, Technology, Processes, and Structure RATIONALE:

A traditional view of information systems holds that organizations use information systems to control and monitor processes and to ensure effectiveness and efficiency. In this view, information systems are external to the supply chain management process and serve to monitor or control it. A more contemporary view, however, holds that information systems are often so intimately involved that they are part of the process itself. From this perspective, the information system plays an integral role in the process, whether providing input, aiding product transformation, or producing output.

FEEDBACK:

a. A more contemporary view holds that information systems are often so intimately involved that they are part of the process itself. From this perspective, the information system plays an integral role in the process, whether providing input, aiding product transformation, or producing output. b. A more contemporary view holds that information systems are often so intimately involved that they are part of the process itself. From this perspective, the information system plays an integral role in the process, whether providing input, aiding product transformation, or producing output. c. A more contemporary view holds that information systems are often so intimately involved that they are part of the process itself. From this perspective, the information system plays an integral role in the process, whether providing input, aiding product transformation, or producing output. d. A more contemporary view holds that information systems are often so intimately involved that they are part of the process itself. From this perspective, the information system plays an integral role in the process, whether providing input, aiding product transformation, or producing output.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Value Chain QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.4 - Discuss the traditional and contemporary view of the role that information systems play in an organization’s value chains. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:59 PM DATE MODIFIED: 11/28/2019 7:26 AM 24. Suppose you need to advise someone about getting a certification. Which of the following will be appropriate advice? a. Getting a certification is guaranteed to increase your income. b. Certifications are often vendor-specific. c. Certifications are the same as courses offered at universities. d. You need a college degree before you can take any certification exam. ANSWER: b RATIONALE: Certification is a process for testing skills and knowledge; successful completion of a certification exam results in an endorsement by the certifying authority that an individual is capable of performing particular tasks or jobs. Certification frequently involves specific, vendor-provided, or vendor-endorsed coursework. FEEDBACK: a. Certification is a process for testing skills and knowledge; successful completion of a certification exam results in an endorsement by the certifying authority that an individual is capable of performing particular tasks or jobs. Certification frequently involves specific, vendor-provided, or vendor-endorsed coursework.

Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 01 - Information Systems: People, Technology, Processes, and Structure b. Certification is a process for testing skills and knowledge; successful completion

of a certification exam results in an endorsement by the certifying authority that an individual is capable of performing particular tasks or jobs. Certification frequently involves specific, vendor-provided, or vendor-endorsed coursework. c. Certification is a process for testing skills and knowledge; successful completion of a certification exam results in an endorsement by the certifying authority that an individual is capable of performing particular tasks or jobs. Certification frequently involves specific, vendor-provided, or vendor-endorsed coursework. d. Certification is a process for testing skills and knowledge; successful completion of a certification exam results in an endorsement by the certifying authority that an individual is capable of performing particular tasks or jobs. Certification frequently involves specific, vendor-provided, or vendor-endorsed coursework.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Continuous Education QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.9 - Identify two benefits of obtaining a certification in an IS subject area. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:59 PM DATE MODIFIED: 12/6/2019 2:40 PM 25. Which of the following is NOT one of the four main components in Leavitt's Diamond? a. people b. systems c. processes d. technology infrastructure ANSWER: b RATIONALE: Leavitt’s Diamond is a model that states an organization’s information systems operate within a context of people, technology infrastructure, processes, and structure. FEEDBACK: a. Leavitt’s Diamond is a model that states an organization’s information systems operate within a context of people, technology infrastructure, processes, and structure. b. Leavitt’s Diamond is a model that states an organization’s information systems operate within a context of people, technology infrastructure, processes, and structure. c. Leavitt’s Diamond is a model that states an organization’s information systems operate within a context of people, technology infrastructure, processes, and structure. d. Leavitt’s Diamond is a model that states an organization’s information systems operate within a context of people, technology infrastructure, processes, and structure.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information Systems—A Means to Achieve Competitive Advantage QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.2 - State three reasons why organizations employ the Leavitt’s Diamond model to introduce new systems into the workplace. Copyright Cengage Learning. Powered by Cognero.

Page 16


Chapter 01 - Information Systems: People, Technology, Processes, and Structure NATIONAL STANDARDS: KEYWORDS: DATE CREATED: DATE MODIFIED:

United States - BUSPROG: Technology Bloom's: Remember 11/19/2019 5:59 PM 11/27/2019 5:01 PM

26. You might be a successful information systems worker if you _________. a. prefer a slow-paced environment where technology rarely changes b. prefer to work only on the computer and are not interested in the business c. enjoy learning new techniques and enjoy working with people d. are good at book-keeping, like an accountant ANSWER: c RATIONALE: Successful information system workers must enjoy working in a fast-paced, dynamic environment where the underlying technology changes all the time. They must be comfortable with meeting deadlines and solving unexpected challenges. They need good communication skills and often serve as translators between business needs and technologybased solutions. Successful information systems workers must have solid analytical and decision-making skills and be able to translate ill-defined business problems and opportunities into effective technology-based solutions. They must develop effective team and leadership skills and be adept at implementing organizational change. Last, but not least, they need to be prepared to engage in lifelong learning in a rapidly changing field. FEEDBACK: a. Successful information system workers need good communication skills and often serve as translators between business needs and technology-based solutions. They need to be prepared to engage in lifelong learning in a rapidly changing field. b. Successful information system workers need good communication skills and often serve as translators between business needs and technology-based solutions. They need to be prepared to engage in lifelong learning in a rapidly changing field. c. Successful information system workers need good communication skills and often serve as translators between business needs and technology-based solutions. They need to be prepared to engage in lifelong learning in a rapidly changing field. d. Successful information system workers need good communication skills and often serve as translators between business needs and technology-based solutions. They need to be prepared to engage in lifelong learning in a rapidly changing field.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Information Systems Careers QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.8 - Identify six non-technical skills needed to be an effective information system worker. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:59 PM DATE MODIFIED: 11/29/2019 7:15 AM 27. Important functions of the chief information officer include Copyright Cengage Learning. Powered by Cognero.

Page 17


Chapter 01 - Information Systems: People, Technology, Processes, and Structure a. employing an IS department's equipment and staff to help the organization reach its goals. b. monitoring the financial considerations of the IS department, such as return on investment. c. ensuring the organization complies with laws and regulations. d. all of these ANSWER: d RATIONALE: The role of the chief information officer (CIO) is to employ an IS department’s equipment and personnel in a manner to best achieve the goals of the organization. CIOs must understand finance, accounting, and return on investment and be able to make wise choices on which of many projects to fund and staff. They can help companies avoid damaging ethical challenges by monitoring how their firms are complying with a large number of laws and regulations. FEEDBACK: a. The role of the chief information officer (CIO) is to employ an IS department’s equipment and personnel in a manner to best achieve the goals of the organization. CIOs must understand finance, accounting, and return on investment and be able to make wise choices on which of many projects to fund and staff. They can help companies avoid damaging ethical challenges by monitoring how their firms are complying with a large number of laws and regulations. b. The role of the chief information officer (CIO) is to employ an IS department’s equipment and personnel in a manner to best achieve the goals of the organization. CIOs must understand finance, accounting, and return on investment and be able to make wise choices on which of many projects to fund and staff. They can help companies avoid damaging ethical challenges by monitoring how their firms are complying with a large number of laws and regulations. c. The role of the chief information officer (CIO) is to employ an IS department’s equipment and personnel in a manner to best achieve the goals of the organization. CIOs must understand finance, accounting, and return on investment and be able to make wise choices on which of many projects to fund and staff. They can help companies avoid damaging ethical challenges by monitoring how their firms are complying with a large number of laws and regulations. d. The role of the chief information officer (CIO) is to employ an IS department’s equipment and personnel in a manner to best achieve the goals of the organization. CIOs must understand finance, accounting, and return on investment and be able to make wise choices on which of many projects to fund and staff. They can help companies avoid damaging ethical challenges by monitoring how their firms are complying with a large number of laws and regulations.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Typical Information System Roles QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.8 - Identify six non-technical skills needed to be an effective information system worker. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:59 PM DATE MODIFIED: 11/29/2019 12:00 PM Copyright Cengage Learning. Powered by Cognero.

Page 18


Chapter 01 - Information Systems: People, Technology, Processes, and Structure 28. In a large IS organization, the professional who is responsible for maintaining the security and integrity of the organization's systems and data is the __________. a. data center manager b. data security manager c. system security operator d. information systems security analyst ANSWER: d RATIONALE: IS security analysts are responsible for planning, designing, implementing, and maintaining the security and integrity of their organizations’ systems and data. FEEDBACK: a. IS security analysts are responsible for planning, designing, implementing, and maintaining the security and integrity of their organizations’ systems and data.

b. IS security analysts are responsible for planning, designing, implementing, and maintaining the security and integrity of their organizations’ systems and data. c. IS security analysts are responsible for planning, designing, implementing, and maintaining the security and integrity of their organizations’ systems and data. d. IS security analysts are responsible for planning, designing, implementing, and maintaining the security and integrity of their organizations’ systems and data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Typical Information System Roles QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.8 - Identify six non-technical skills needed to be an effective information system worker. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:59 PM DATE MODIFIED: 11/29/2019 12:04 PM 29. Which of the following is NOT a task typically associated with the systems analyst role? a. conveying system requirements to software developers and network architects b. troubleshooting problems after implementation c. collaborating with others to build a software product from scratch d. choosing and configuring hardware and software ANSWER: c RATIONALE: Systems analysts convey system requirements to software developers and network architects for implementation. They also assist in choosing and configuring hardware and software, matching technology to users’ needs, monitoring and testing the system in operation, and troubleshooting problems after implementation. FEEDBACK: a. Systems analysts convey system requirements to software developers and network architects for implementation. They also assist in choosing and configuring hardware and software, matching technology to users’ needs, monitoring and testing the system in operation, and troubleshooting problems after implementation. b. Systems analysts convey system requirements to software developers and network architects for implementation. They also assist in choosing and configuring hardware and software, matching technology to users’ needs, monitoring and testing the system in operation, and troubleshooting problems after implementation. c. Systems analysts convey system requirements to software developers and

Copyright Cengage Learning. Powered by Cognero.

Page 19


Chapter 01 - Information Systems: People, Technology, Processes, and Structure network architects for implementation. They also assist in choosing and configuring hardware and software, matching technology to users’ needs, monitoring and testing the system in operation, and troubleshooting problems after implementation. d. Systems analysts convey system requirements to software developers and network architects for implementation. They also assist in choosing and configuring hardware and software, matching technology to users’ needs, monitoring and testing the system in operation, and troubleshooting problems after implementation.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Typical Information System Roles QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.8 - Identify six non-technical skills needed to be an effective information system worker. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:59 PM DATE MODIFIED: 11/29/2019 12:07 PM 30. Managers can help their organizations gain _____ through cost leadership, differentiation, or focus. a. a competitive advantage b. information systems expertise c. a set of procedures d. technology infrastructure ANSWER: a RATIONALE: A competitive advantage enables an organization to generate more sales or achieve superior profit margins compared to its rivals. The advantage can be gained in one of three ways: (1) by providing the same value as competitors but at a lower price (cost leadership), (2) by charging higher prices for providing products that are perceived by the customer as being better (differentiation), or (3) by understanding and servicing a target market better than anyone else (focus). FEEDBACK: a. A competitive advantage enables an organization to generate more sales or achieve superior profit margins compared to its rivals. The advantage can be gained in one of three ways: (1) by providing the same value as competitors but at a lower price (cost leadership), (2) by charging higher prices for providing products that are perceived by the customer as being better (differentiation), or (3) by understanding and servicing a target market better than anyone else (focus). b. A competitive advantage enables an organization to generate more sales or achieve superior profit margins compared to its rivals. The advantage can be gained in one of three ways: (1) by providing the same value as competitors but at a lower price (cost leadership), (2) by charging higher prices for providing products that are perceived by the customer as being better (differentiation), or (3) by understanding and servicing a target market better than anyone else (focus). c. A competitive advantage enables an organization to generate more sales or achieve superior profit margins compared to its rivals. The advantage can be gained in one of three ways: (1) by providing the same value as competitors but

Copyright Cengage Learning. Powered by Cognero.

Page 20


Chapter 01 - Information Systems: People, Technology, Processes, and Structure at a lower price (cost leadership), (2) by charging higher prices for providing products that are perceived by the customer as being better (differentiation), or (3) by understanding and servicing a target market better than anyone else (focus). d. A competitive advantage enables an organization to generate more sales or achieve superior profit margins compared to its rivals. The advantage can be gained in one of three ways: (1) by providing the same value as competitors but at a lower price (cost leadership), (2) by charging higher prices for providing products that are perceived by the customer as being better (differentiation), or (3) by understanding and servicing a target market better than anyone else (focus).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information Systems—A Means to Achieve Competitive Advantage QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.1 - Identify two key management responsibilities in implementing successful information systems. KEYWORDS: Bloom's: Knowledge DATE CREATED: 11/29/2019 12:52 PM DATE MODIFIED: 11/29/2019 12:56 PM 31. An upper-level IS manager proposes that his organization implement a system to consolidate shipping and exception data from multiple carriers so that consumers know when their purchase will ship and when it will arrive. What business strategy does this represent? a. high standards b. cost leadership c. differentiation d. focus ANSWER: c RATIONALE: A competitive advantage can be gained in one of three ways: (1) by providing the same value as competitors but at a lower price (cost leadership), (2) by charging higher prices for providing products that are perceived by the customer as being better (differentiation), or (3) by understanding and servicing a target market better than anyone else (focus). La-Z-Boy differentiates itself from competitors by implementing a system to consolidate shipping and exception data from dozens of carriers so that consumers know when their purchase is shipping from the retailer and when they can expect to see it at their door step. FEEDBACK: a. La-Z-Boy differentiates itself from competitors by implementing a system to consolidate shipping and exception data from dozens of carriers so that consumers know when their purchase is shipping from the retailer and when they can expect to see it at their door step. b. La-Z-Boy differentiates itself from competitors by implementing a system to consolidate shipping and exception data from dozens of carriers so that consumers know when their purchase is shipping from the retailer and when they can expect to see it at their door step. c. La-Z-Boy differentiates itself from competitors by implementing a system to consolidate shipping and exception data from dozens of carriers so that consumers know when their purchase is shipping from the retailer and when they can expect to see it at their door step. d. La-Z-Boy differentiates itself from competitors by implementing a system to

Copyright Cengage Learning. Powered by Cognero.

Page 21


Chapter 01 - Information Systems: People, Technology, Processes, and Structure consolidate shipping and exception data from dozens of carriers so that consumers know when their purchase is shipping from the retailer and when they can expect to see it at their door step.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Information Systems—A Means to Achieve Competitive Advantage QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.1 - Identify two key management responsibilities in implementing successful information systems. KEYWORDS: Bloom's: Remember DATE CREATED: 11/29/2019 12:59 PM DATE MODIFIED: 11/29/2019 1:05 PM 32. A senior IS manager implements a vendor-managed inventory system that reduces both the administrative costs of managing inventory and inventory holding costs. What business strategy does this represent? a. high standards b. cost leadership c. differentiation d. focus ANSWER: b RATIONALE: A competitive advantage can be gained in one of three ways: (1) by providing the same value as competitors but at a lower price (cost leadership), (2) by charging higher prices for providing products that are perceived by the customer as being better (differentiation), or (3) by understanding and servicing a target market better than anyone else (focus). Walmart employs a vendor-managed inventory system to streamline product flow and better manage its store inventories. This system reduces the administrative costs of managing inventory, lowers inventory holding costs, and increases sales through reductions of out-of-stock situations in its stores. FEEDBACK: a. Walmart, well known for its cost leadership, employs a vendor-managed inventory system to streamline product flow and better manage its store inventories. This system reduces the administrative costs of managing inventory, lowers inventory holding costs, and increases sales through reductions of out-of-stock situations in its stores. b. Walmart, well known for its cost leadership, employs a vendor-managed inventory system to streamline product flow and better manage its store inventories. This system reduces the administrative costs of managing inventory, lowers inventory holding costs, and increases sales through reductions of out-of-stock situations in its stores. c. Walmart, well known for its cost leadership, employs a vendor-managed inventory system to streamline product flow and better manage its store inventories. This system reduces the administrative costs of managing inventory, lowers inventory holding costs, and increases sales through reductions of out-of-stock situations in its stores. d. Walmart, well known for its cost leadership, employs a vendor-managed inventory system to streamline product flow and better manage its store inventories. This system reduces the administrative costs of managing inventory, lowers inventory holding costs, and increases sales through reductions of out-of-stock situations in its stores.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 22


Chapter 01 - Information Systems: People, Technology, Processes, and Structure DIFFICULTY: Moderate REFERENCES: Information Systems—A Means to Achieve Competitive Advantage QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.1 - Identify two key management responsibilities in implementing successful information systems. KEYWORDS: Bloom's: Remember DATE CREATED: 11/29/2019 1:06 PM DATE MODIFIED: 11/29/2019 1:12 PM 33. An IS manager recommends that his organization invest in improving its customer information system so as to more clearly define the target market and improve service to that market. What business strategy does this represent? a. high standards b. cost leadership c. differentiation d. focus ANSWER: d RATIONALE: A competitive advantage can be gained in one of three ways: (1) by providing the same value as competitors but at a lower price (cost leadership), (2) by charging higher prices for providing products that are perceived by the customer as being better (differentiation), or (3) by understanding and servicing a target market better than anyone else (focus). FEEDBACK: a. A competitive advantage can be gained in one of three ways: (1) by providing the same value as competitors but at a lower price (cost leadership), (2) by charging higher prices for providing products that are perceived by the customer as being better (differentiation), or (3) by understanding and servicing a target market better than anyone else (focus). b. A competitive advantage can be gained in one of three ways: (1) by providing the same value as competitors but at a lower price (cost leadership), (2) by charging higher prices for providing products that are perceived by the customer as being better (differentiation), or (3) by understanding and servicing a target market better than anyone else (focus). c. A competitive advantage can be gained in one of three ways: (1) by providing the same value as competitors but at a lower price (cost leadership), (2) by charging higher prices for providing products that are perceived by the customer as being better (differentiation), or (3) by understanding and servicing a target market better than anyone else (focus). d. A competitive advantage can be gained in one of three ways: (1) by providing the same value as competitors but at a lower price (cost leadership), (2) by charging higher prices for providing products that are perceived by the customer as being better (differentiation), or (3) by understanding and servicing a target market better than anyone else (focus).

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Information Systems—A Means to Achieve Competitive Advantage QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.1 - Identify two key management responsibilities in implementing successful information systems. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 23


Chapter 01 - Information Systems: People, Technology, Processes, and Structure DATE CREATED: DATE MODIFIED:

11/29/2019 1:15 PM 11/29/2019 1:23 PM

34. A high-level IS manager has his firm utilize sophisticated information systems to digitally design its products so that design defects can be detected and removed early in the process, reducing development cost. What business strategy does this represent? a. high standards b. cost leadership c. differentiation d. focus ANSWER: b RATIONALE: A competitive advantage can be gained in one of three ways: (1) by providing the same value as competitors but at a lower price (cost leadership), (2) by charging higher prices for providing products that are perceived by the customer as being better (differentiation), or (3) by understanding and servicing a target market better than anyone else (focus). Boeing employs sophisticated information systems that enable the digital design of various aircraftrelated systems. These systems allow early detection and removal of design defects and reduce development cost and time. FEEDBACK: a. Boeing employs sophisticated information systems that enable the digital design of various aircraft-related systems. These systems allow early detection and removal of design defects and reduce development cost and time. b. Boeing employs sophisticated information systems that enable the digital design of various aircraft-related systems. These systems allow early detection and removal of design defects and reduce development cost and time. c. Boeing employs sophisticated information systems that enable the digital design of various aircraft-related systems. These systems allow early detection and removal of design defects and reduce development cost and time. d. Boeing employs sophisticated information systems that enable the digital design of various aircraft-related systems. These systems allow early detection and removal of design defects and reduce development cost and time.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Information Systems—A Means to Achieve Competitive Advantage QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.1 - Identify two key management responsibilities in implementing successful information systems. KEYWORDS: Bloom's: Remember DATE CREATED: 11/29/2019 1:24 PM DATE MODIFIED: 11/29/2019 1:29 PM 35. A senior IS manager decides to invest in an information system that will reduce subcontractor labor costs for her organization by facilitating relocation of tools and materials to more optimal locations while rearranging workflows. What business strategy does this represent? a. high standards b. cost leadership c. differentiation d. focus Copyright Cengage Learning. Powered by Cognero.

Page 24


Chapter 01 - Information Systems: People, Technology, Processes, and Structure ANSWER: RATIONALE:

b A competitive advantage can be gained in one of three ways: (1) by providing the same value as competitors but at a lower price (cost leadership), (2) by charging higher prices for providing products that are perceived by the customer as being better (differentiation), or (3) by understanding and servicing a target market better than anyone else (focus). Skanska USA, a construction firm, employs an information system to track and analyze the movement and tasks of subcontractors on the job. With this system, Skanska can relocate tools and materials to more optimal locations and rearrange workflows to speed up the building process and to reduce labor costs.

FEEDBACK:

a. Skanska USA, a construction firm, employs an information system to track and

analyze the movement and tasks of subcontractors on the job. With this system, Skanska can relocate tools and materials to more optimal locations and rearrange workflows to speed up the building process and to reduce labor costs. b. Skanska USA, a construction firm, employs an information system to track and analyze the movement and tasks of subcontractors on the job. With this system, Skanska can relocate tools and materials to more optimal locations and rearrange workflows to speed up the building process and to reduce labor costs. c. Skanska USA, a construction firm, employs an information system to track and analyze the movement and tasks of subcontractors on the job. With this system, Skanska can relocate tools and materials to more optimal locations and rearrange workflows to speed up the building process and to reduce labor costs. d. Skanska USA, a construction firm, employs an information system to track and analyze the movement and tasks of subcontractors on the job. With this system, Skanska can relocate tools and materials to more optimal locations and rearrange workflows to speed up the building process and to reduce labor costs.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Information Systems—A Means to Achieve Competitive Advantage QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.1 - Identify two key management responsibilities in implementing successful information systems. KEYWORDS: Bloom's: Remember DATE CREATED: 11/29/2019 1:38 PM DATE MODIFIED: 11/29/2019 1:43 PM 36. When IS managers introduce new systems within an organization, they often experience a rough system start-up and frustrated employees because they focus too narrowly on _____. a. people b. processes c. human structure d. technology infrastructure ANSWER: d RATIONALE: Unfortunately, company leaders often focus too narrowly on just the technology infrastructure component when introducing a new information system. When they do so, they fail to consider the people, processes, and human structure components. This failure can create a rough system start-up, frustrated employees, and missed organizational expectations that can lead to system failure or the need to redo much of the implementation effort. FEEDBACK: a. Unfortunately, company leaders often focus too narrowly on just the technology Copyright Cengage Learning. Powered by Cognero.

Page 25


Chapter 01 - Information Systems: People, Technology, Processes, and Structure infrastructure component when introducing a new information system.

b. Unfortunately, company leaders often focus too narrowly on just the technology infrastructure component when introducing a new information system. c. Unfortunately, company leaders often focus too narrowly on just the technology infrastructure component when introducing a new information system. d. Unfortunately, company leaders often focus too narrowly on just the technology infrastructure component when introducing a new information system.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information Systems—A Means to Achieve Competitive Advantage QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.1 - Identify two key management responsibilities in implementing successful information systems. KEYWORDS: Bloom's: Remember DATE CREATED: 11/29/2019 1:44 PM DATE MODIFIED: 11/29/2019 1:49 PM 37. A successful IS manager recognizes that sustaining a competitive advantage _____. a. means evolving to account for changes in customer needs b. requires little effort compared with initially gaining that advantage c. is outside the IS department's roles in most organizations d. primarily involves consistency in product and service offerings ANSWER: a RATIONALE: Organizations must recognize that considerable effort may be required to sustain a competitive advantage. Organizations and their products and services must continually evolve to account for changes in customer needs, market conditions, industry conditions, and competitor actions. FEEDBACK: a. Organizations must recognize that considerable effort may be required to sustain a competitive advantage. Organizations and their products and services must continually evolve to account for changes in customer needs, market conditions, industry conditions, and competitor actions. b. Organizations must recognize that considerable effort may be required to sustain a competitive advantage. Organizations and their products and services must continually evolve to account for changes in customer needs, market conditions, industry conditions, and competitor actions. c. Organizations must recognize that considerable effort may be required to sustain a competitive advantage. Organizations and their products and services must continually evolve to account for changes in customer needs, market conditions, industry conditions, and competitor actions. d. Organizations must recognize that considerable effort may be required to sustain a competitive advantage. Organizations and their products and services must continually evolve to account for changes in customer needs, market conditions, industry conditions, and competitor actions.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Information Systems—A Means to Achieve Competitive Advantage Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 26


Chapter 01 - Information Systems: People, Technology, Processes, and Structure HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.1 - Identify two key management responsibilities in implementing successful information systems. KEYWORDS: Bloom's: Remember DATE CREATED: 11/29/2019 1:56 PM DATE MODIFIED: 11/29/2019 2:04 PM 38. Which of the following components forms the foundation of every computer-based information system and includes resources such as hardware, software, and data center facilities? a. people b. processes c. technology infrastructure d. structure ANSWER: c RATIONALE: An organization’s technology infrastructure includes all of its hardware, software, databases, networks, facilities (such as data centers and server rooms) and services provided by third parties (such as outside consultants, rented hardware, third-party software, and outside storage). The technology infrastructure forms the foundation of every computer-based information system. FEEDBACK: a. An organization’s technology infrastructure includes all of its hardware, software, databases, networks, facilities (such as data centers and server rooms) and services provided by third parties (such as outside consultants, rented hardware, third-party software, and outside storage). The technology infrastructure forms the foundation of every computer-based information system. b. An organization’s technology infrastructure includes all of its hardware, software, databases, networks, facilities (such as data centers and server rooms) and services provided by third parties (such as outside consultants, rented hardware, third-party software, and outside storage). The technology infrastructure forms the foundation of every computer-based information system. c. An organization’s technology infrastructure includes all of its hardware, software, databases, networks, facilities (such as data centers and server rooms) and services provided by third parties (such as outside consultants, rented hardware, third-party software, and outside storage). The technology infrastructure forms the foundation of every computer-based information system. d. An organization’s technology infrastructure includes all of its hardware, software, databases, networks, facilities (such as data centers and server rooms) and services provided by third parties (such as outside consultants, rented hardware, third-party software, and outside storage). The technology infrastructure forms the foundation of every computer-based information system.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information Systems—A Means to Achieve Competitive Advantage QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.2 - State three reasons why organizations employ the Leavitt’s Diamond model to introduce new systems into the workplace. KEYWORDS: Bloom's: Remember DATE CREATED: 11/29/2019 2:12 PM DATE MODIFIED: 11/29/2019 2:18 PM Copyright Cengage Learning. Powered by Cognero.

Page 27


Chapter 01 - Information Systems: People, Technology, Processes, and Structure 39. When entering a customer order, Josie ensures that the desired end result is achieved and any problems are reported to the correct person by following a(n) _____. a. process b. EDI standard c. procedure d. supply chain ANSWER: c RATIONALE: A procedure defines the steps to follow to achieve a specific end result, such as how to enter a customer order, how to pay a supplier invoice, or how to request a current inventory report. Good procedures describe how to achieve the desired end result, who does what and when, and what to do in the event something goes wrong. FEEDBACK: a. A procedure defines the steps to follow to achieve a specific end result, such as how to enter a customer order, how to pay a supplier invoice, or how to request a current inventory report. Good procedures describe how to achieve the desired end result, who does what and when, and what to do in the event something goes wrong. b. A procedure defines the steps to follow to achieve a specific end result, such as how to enter a customer order, how to pay a supplier invoice, or how to request a current inventory report. Good procedures describe how to achieve the desired end result, who does what and when, and what to do in the event something goes wrong. c. A procedure defines the steps to follow to achieve a specific end result, such as how to enter a customer order, how to pay a supplier invoice, or how to request a current inventory report. Good procedures describe how to achieve the desired end result, who does what and when, and what to do in the event something goes wrong. d. A procedure defines the steps to follow to achieve a specific end result, such as how to enter a customer order, how to pay a supplier invoice, or how to request a current inventory report. Good procedures describe how to achieve the desired end result, who does what and when, and what to do in the event something goes wrong.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information Systems—A Means to Achieve Competitive Advantage QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.2 - State three reasons why organizations employ the Leavitt’s Diamond model to introduce new systems into the workplace. KEYWORDS: Bloom's: Remember DATE CREATED: 11/29/2019 2:18 PM DATE MODIFIED: 11/29/2019 2:25 PM 40. Procedures are an important component of an IS implementation approach because _____. a. they can increase the time required to complete key tasks b. good ones are quick and easy to develop and implement c. employee motivation, authority, and support depend on them d. they can help avoid lengthy business disruptions following a natural disaster ANSWER: d Copyright Cengage Learning. Powered by Cognero.

Page 28


Chapter 01 - Information Systems: People, Technology, Processes, and Structure RATIONALE:

Good procedures can help companies take advantage of new opportunities and avoid lengthy business disruptions in the event of natural disasters. Poorly developed and inadequately implemented procedures, however, can cause people to waste their time on useless rules or can result in inadequate responses to disasters.

FEEDBACK:

a. Good procedures can help companies take advantage of new opportunities and

avoid lengthy business disruptions in the event of natural disasters. Poorly developed and inadequately implemented procedures, however, can cause people to waste their time on useless rules or can result in inadequate responses to disasters. b. Good procedures can help companies take advantage of new opportunities and avoid lengthy business disruptions in the event of natural disasters. Poorly developed and inadequately implemented procedures, however, can cause people to waste their time on useless rules or can result in inadequate responses to disasters. c. Good procedures can help companies take advantage of new opportunities and avoid lengthy business disruptions in the event of natural disasters. Poorly developed and inadequately implemented procedures, however, can cause people to waste their time on useless rules or can result in inadequate responses to disasters. d. Good procedures can help companies take advantage of new opportunities and avoid lengthy business disruptions in the event of natural disasters. Poorly developed and inadequately implemented procedures, however, can cause people to waste their time on useless rules or can result in inadequate responses to disasters.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information Systems—A Means to Achieve Competitive Advantage QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.2 - State three reasons why organizations employ the Leavitt’s Diamond model to introduce new systems into the workplace. KEYWORDS: Bloom's: Remember DATE CREATED: 11/29/2019 2:25 PM DATE MODIFIED: 11/29/2019 2:35 PM 41. Which component of Leavitt's Diamond defines roles, responsibilities, and lines of authority among members of the organization, which must be understood and accepted for the organization to operate successfully? a. structure b. technology infrastructure c. people d. processes ANSWER: a RATIONALE: An organization’s structure defines relationships among members of the organization. In addition, it defines the roles, responsibilities, and lines of authority that are necessary to complete various activities. Employees must understand and accept their roles and responsibilities, and these roles and responsibilities often change with the introduction of a new information system. FEEDBACK: a. An organization’s structure defines relationships among members of the organization. In addition, it defines the roles, responsibilities, and lines of authority that are necessary to complete various activities. Employees must understand

Copyright Cengage Learning. Powered by Cognero.

Page 29


Chapter 01 - Information Systems: People, Technology, Processes, and Structure and accept their roles and responsibilities, and these roles and responsibilities often change with the introduction of a new information system. b. An organization’s structure defines relationships among members of the organization. In addition, it defines the roles, responsibilities, and lines of authority that are necessary to complete various activities. Employees must understand and accept their roles and responsibilities, and these roles and responsibilities often change with the introduction of a new information system. c. An organization’s structure defines relationships among members of the organization. In addition, it defines the roles, responsibilities, and lines of authority that are necessary to complete various activities. Employees must understand and accept their roles and responsibilities, and these roles and responsibilities often change with the introduction of a new information system. d. An organization’s structure defines relationships among members of the organization. In addition, it defines the roles, responsibilities, and lines of authority that are necessary to complete various activities. Employees must understand and accept their roles and responsibilities, and these roles and responsibilities often change with the introduction of a new information system.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information Systems—A Means to Achieve Competitive Advantage QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.2 - State three reasons why organizations employ the Leavitt’s Diamond model to introduce new systems into the workplace. KEYWORDS: Bloom's: Remember DATE CREATED: 11/29/2019 2:36 PM DATE MODIFIED: 11/29/2019 2:44 PM 42. An IS manager is focusing on the people component of Leavitt's Diamond when he or she _____. a. delegates the responsibility for creating new procedures b. ensures that the IS help desk is available during work hours c. selects new IS software and service providers d. clarifies the changes in employee roles related to a new IS ANSWER: b RATIONALE: People make the difference between success and failure in all organizations. Employees must be well trained and understand the need for the information system, what their role is in using or operating the system, and how to get the results they need from the system. They must be motivated to use the information system and have access to system support people as needed. FEEDBACK: a. Employees must be well trained and understand the need for the information system, what their role is in using or operating the system, and how to get the results they need from the system. They must be motivated to use the information system and have access to system support people as needed. b. Employees must be well trained and understand the need for the information system, what their role is in using or operating the system, and how to get the results they need from the system. They must be motivated to use the information system and have access to system support people as needed. c. Employees must be well trained and understand the need for the information system, what their role is in using or operating the system, and how to get the results they need from the system. They must be motivated to use the information system and have access to system support people as needed.

Copyright Cengage Learning. Powered by Cognero.

Page 30


Chapter 01 - Information Systems: People, Technology, Processes, and Structure d. Employees must be well trained and understand the need for the information

system, what their role is in using or operating the system, and how to get the results they need from the system. They must be motivated to use the information system and have access to system support people as needed.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Information Systems—A Means to Achieve Competitive Advantage QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.2 - State three reasons why organizations employ the Leavitt’s Diamond model to introduce new systems into the workplace. KEYWORDS: Bloom's: Remember DATE CREATED: 11/29/2019 2:47 PM DATE MODIFIED: 11/29/2019 3:04 PM 43. Bubba creates a web application that allows his coworkers to generate reports providing information on sales, costs, and inventory that they need for their job functions without assistance. Bubba has developed a(n) _____. a. personal information system b. workgroup information system c. enterprise information system d. interorganizational information system ANSWER: a RATIONALE: Personal information systems include information systems that improve the productivity of individual users in performing stand-alone tasks. Examples of personal IS include wordprocessing, presentation, time management, and spreadsheet software. FEEDBACK: a. Personal information systems include information systems that improve the productivity of individual users in performing stand-alone tasks. Examples of personal IS include word-processing, presentation, time management, and spreadsheet software. b. Personal information systems include information systems that improve the productivity of individual users in performing stand-alone tasks. Examples of personal IS include word-processing, presentation, time management, and spreadsheet software. c. Personal information systems include information systems that improve the productivity of individual users in performing stand-alone tasks. Examples of personal IS include word-processing, presentation, time management, and spreadsheet software. d. Personal information systems include information systems that improve the productivity of individual users in performing stand-alone tasks. Examples of personal IS include word-processing, presentation, time management, and spreadsheet software.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Types of Information Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.3 - Describe four fundamental information system types based on their sphere of influence. Copyright Cengage Learning. Powered by Cognero.

Page 31


Chapter 01 - Information Systems: People, Technology, Processes, and Structure KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 11/30/2019 3:01 PM 11/30/2019 3:27 PM

44. When Josephine uses an instant messaging application to ask her coworkers questions related to a presentation she is developing for an upcoming conference, she is improving her productivity using a(n) _____. a. personal information system b. workgroup information system c. enterprise information system d. interorganizational information system ANSWER: b RATIONALE: A workgroup information system supports teamwork and enables people to work together effectively, whether team members are in the same location or dispersed around the world. These systems are also known as collaboration systems. Examples of workgroup information systems include instant messaging software, electronic conferencing software, and collaboration software used to move groups through the steps of a process toward their goals. FEEDBACK: a. Examples of workgroup information systems include instant messaging software, electronic conferencing software, and collaboration software used to move groups through the steps of a process toward their goals. b. Examples of workgroup information systems include instant messaging software, electronic conferencing software, and collaboration software used to move groups through the steps of a process toward their goals. c. Examples of workgroup information systems include instant messaging software, electronic conferencing software, and collaboration software used to move groups through the steps of a process toward their goals. d. Examples of workgroup information systems include instant messaging software, electronic conferencing software, and collaboration software used to move groups through the steps of a process toward their goals.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Types of Information Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.3 - Describe four fundamental information system types based on their sphere of influence. KEYWORDS: Bloom's: Remember DATE CREATED: 11/30/2019 3:16 PM DATE MODIFIED: 11/30/2019 3:27 PM 45. Collaboration between two or more organizations that lowers costs and reduces manual effort among employees is enabled by a(n) _____. a. personal information system b. workgroup information system c. enterprise information system d. interorganizational information system ANSWER: d RATIONALE: An interorganizational IS enables the sharing of information across organizational Copyright Cengage Learning. Powered by Cognero.

Page 32


Chapter 01 - Information Systems: People, Technology, Processes, and Structure boundaries. Information sharing supports collaboration between two or more organizations and provides benefits such as lower costs, reduced manual effort, and decreased time to conduct business. FEEDBACK:

a. An interorganizational IS enables the sharing of information across organizational boundaries. Information sharing supports collaboration between two or more organizations and provides benefits such as lower costs, reduced manual effort, and decreased time to conduct business. b. An interorganizational IS enables the sharing of information across organizational boundaries. Information sharing supports collaboration between two or more organizations and provides benefits such as lower costs, reduced manual effort, and decreased time to conduct business. c. An interorganizational IS enables the sharing of information across organizational boundaries. Information sharing supports collaboration between two or more organizations and provides benefits such as lower costs, reduced manual effort, and decreased time to conduct business. d. An interorganizational IS enables the sharing of information across organizational boundaries. Information sharing supports collaboration between two or more organizations and provides benefits such as lower costs, reduced manual effort, and decreased time to conduct business.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Types of Information Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.3 - Describe four fundamental information system types based on their sphere of influence. KEYWORDS: Bloom's: Remember DATE CREATED: 11/30/2019 3:23 PM DATE MODIFIED: 11/30/2019 3:29 PM 46. Which type of information system do organizations use to define structured interactions among employees or between the organizational and external customers, suppliers, or business partners? a. personal information system b. workgroup information system c. enterprise information system d. interorganizational information system ANSWER: c RATIONALE: An enterprise information system is an information system that an organization uses to define structured interactions among its own employees and/or with external customers, suppliers, government agencies, and other business partners. FEEDBACK: a. An enterprise information system is an information system that an organization uses to define structured interactions among its own employees and/or with external customers, suppliers, government agencies, and other business partners. b. An enterprise information system is an information system that an organization uses to define structured interactions among its own employees and/or with external customers, suppliers, government agencies, and other business partners. c. An enterprise information system is an information system that an organization

Copyright Cengage Learning. Powered by Cognero.

Page 33


Chapter 01 - Information Systems: People, Technology, Processes, and Structure uses to define structured interactions among its own employees and/or with external customers, suppliers, government agencies, and other business partners. d. An enterprise information system is an information system that an organization uses to define structured interactions among its own employees and/or with external customers, suppliers, government agencies, and other business partners.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Types of Information Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.3 - Describe four fundamental information system types based on their sphere of influence. KEYWORDS: Bloom's: Remember DATE CREATED: 11/30/2019 3:29 PM DATE MODIFIED: 11/30/2019 3:35 PM 47. Which of the following is classified as a workgroup information system? a. Allan Bros, Inc.'s system that informs workers when to prune grape vines and predicts grape crop quality b. the Monterey Bay Aquarium's tool that helps staff communicate, organize, plan, schedule, and track jobs c. Kroger's ClickList system, which allows customers to choose and purchase grocery items d. Walmart's vendor-managed inventory system, which allows suppliers to manage warehouse inventory ANSWER: b RATIONALE: A workgroup information system supports teamwork and enables people to work together effectively, whether team members are in the same location or dispersed around the world. These systems are also known as collaboration systems. Examples of workgroup information systems include instant messaging software, electronic conferencing software, and collaboration software used to move groups through the steps of a process toward their goals. At the Monterey Bay Aquarium in California, each team for a project uses a group collaboration tool to help them communicate, organize, plan, schedule, track, and delegate jobs. The tool provides visibility and easy access to all ongoing projects and gives team members the opportunity to jump in and help each other out. FEEDBACK:

a. At the Monterey Bay Aquarium in California, each team for a project uses a group collaboration tool to help them communicate, organize, plan, schedule, track, and delegate jobs. The tool provides visibility and easy access to all ongoing projects and gives team members the opportunity to jump in and help each other out. b. At the Monterey Bay Aquarium in California, each team for a project uses a group collaboration tool to help them communicate, organize, plan, schedule, track, and delegate jobs. The tool provides visibility and easy access to all ongoing projects and gives team members the opportunity to jump in and help each other out. c. At the Monterey Bay Aquarium in California, each team for a project uses a group collaboration tool to help them communicate, organize, plan, schedule, track, and delegate jobs. The tool provides visibility and easy access to all ongoing projects and gives team members the opportunity to jump in and help each other out. d. At the Monterey Bay Aquarium in California, each team for a project uses a group collaboration tool to help them communicate, organize, plan, schedule, track, and delegate jobs. The tool provides visibility and easy access to all ongoing projects and gives team members the opportunity to jump in and help each other out.

Copyright Cengage Learning. Powered by Cognero.

Page 34


Chapter 01 - Information Systems: People, Technology, Processes, and Structure POINTS: 1 DIFFICULTY: Easy REFERENCES: Types of Information Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.3 - Describe four fundamental information system types based on their sphere of influence. KEYWORDS: Bloom's: Remember DATE CREATED: 11/30/2019 3:35 PM DATE MODIFIED: 11/30/2019 3:45 PM 48. Companies that share data with other organizations in a manner that conforms to rigidly defined industry standards are using a type of _____. a. personal information system b. workgroup information system c. enterprise information system d. interorganizational information system ANSWER: d RATIONALE: An interorganizational IS enables the sharing of information across organizational boundaries. Information sharing supports collaboration between two or more organizations and provides benefits such as lower costs, reduced manual effort, and decreased time to conduct business. Many different types of IOS exist, and they vary in purpose and scope. Electronic data interchange (EDI) is an interorganizational information system that expedites purchasing, invoicing, and payment by sending orders, invoices, and payments in standardized electronic message formats from one organization’s computer to another organization’s computer. All companies that use EDI send their data according to rigidly defined industry standards. FEEDBACK:

a. Electronic data interchange (EDI) is an interorganizational information system that expedites purchasing, invoicing, and payment by sending orders, invoices, and payments in standardized electronic message formats from one organization’s computer to another organization’s computer. All companies that use EDI send their data according to rigidly defined industry standards. b. Electronic data interchange (EDI) is an interorganizational information system that expedites purchasing, invoicing, and payment by sending orders, invoices, and payments in standardized electronic message formats from one organization’s computer to another organization’s computer. All companies that use EDI send their data according to rigidly defined industry standards. c. Electronic data interchange (EDI) is an interorganizational information system that expedites purchasing, invoicing, and payment by sending orders, invoices, and payments in standardized electronic message formats from one organization’s computer to another organization’s computer. All companies that use EDI send their data according to rigidly defined industry standards. d. Electronic data interchange (EDI) is an interorganizational information system that expedites purchasing, invoicing, and payment by sending orders, invoices, and payments in standardized electronic message formats from one organization’s computer to another organization’s computer. All companies that use EDI send their data according to rigidly defined industry standards.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 35


Chapter 01 - Information Systems: People, Technology, Processes, and Structure REFERENCES: Types of Information Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.3 - Describe four fundamental information system types based on their sphere of influence. KEYWORDS: Bloom's: Remember DATE CREATED: 11/30/2019 3:45 PM DATE MODIFIED: 11/30/2019 3:51 PM 49. Franklin is responsible for helping to ensure that his organization meets the Payment Card Industry Data Security Standard when handling customers' credit card information. Franklin maintains information systems with influence within the _____. a. personal sphere b. workgroup sphere c. enterprise sphere d. interorganizational sphere ANSWER: c RATIONALE: An enterprise information system is used to meet organization-wide business needs and typically shares data with other enterprise applications used within the organization. Enterprise applications support processes in logistics, manufacturing, human resources, marketing and sales, order processing, accounting, inventory control, customer relationship management, and other essential business functions. Enterprise applications are required to comply with an organization’s security guidelines and may also be required to comply with standards defined by government agencies or industry groups to which the organization belongs. For example, all organizations that store, process, and transmit cardholder data strive to meet the Payment Card Industry Data Security Standard. FEEDBACK: a. Enterprise applications are required to comply with an organization’s security guidelines and may also be required to comply with standards defined by government agencies or industry groups to which the organization belongs. For example, all organizations that store, process, and transmit cardholder data strive to meet the Payment Card Industry Data Security Standard. b. Enterprise applications are required to comply with an organization’s security guidelines and may also be required to comply with standards defined by government agencies or industry groups to which the organization belongs. For example, all organizations that store, process, and transmit cardholder data strive to meet the Payment Card Industry Data Security Standard. c. Enterprise applications are required to comply with an organization’s security guidelines and may also be required to comply with standards defined by government agencies or industry groups to which the organization belongs. For example, all organizations that store, process, and transmit cardholder data strive to meet the Payment Card Industry Data Security Standard. d. Enterprise applications are required to comply with an organization’s security guidelines and may also be required to comply with standards defined by government agencies or industry groups to which the organization belongs. For example, all organizations that store, process, and transmit cardholder data strive to meet the Payment Card Industry Data Security Standard.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Types of Information Systems Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 36


Chapter 01 - Information Systems: People, Technology, Processes, and Structure HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.3 - Describe four fundamental information system types based on their sphere of influence. KEYWORDS: Bloom's: Remember DATE CREATED: 11/30/2019 3:52 PM DATE MODIFIED: 11/30/2019 4:01 PM 50. June and her team are planning the implementation of a new company-wide order processing information system. One of June's major concerns is the need to _____. a. collaborate with others b. comply with EDI standards c. redesign key work processes d. complete stand-alone tasks ANSWER: c RATIONALE: An enterprise information system is used to meet organization-wide business needs and typically shares data with other enterprise applications used within the organization. Enterprise applications support processes in logistics, manufacturing, human resources, marketing and sales, order processing, accounting, inventory control, customer relationship management, and other essential business functions. Successful implementation of these systems often requires the radical redesign of fundamental work processes, the automation of new processes, and re-training of personnel. FEEDBACK: a. Successful implementation of enterprise information systems often requires the radical redesign of fundamental work processes, the automation of new processes, and re-training of personnel. b. Successful implementation of enterprise information systems often requires the radical redesign of fundamental work processes, the automation of new processes, and re-training of personnel. c. Successful implementation of enterprise information systems often requires the radical redesign of fundamental work processes, the automation of new processes, and re-training of personnel. d. Successful implementation of enterprise information systems often requires the radical redesign of fundamental work processes, the automation of new processes, and re-training of personnel.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Types of Information Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.3 - Describe four fundamental information system types based on their sphere of influence. KEYWORDS: Bloom's: Understand DATE CREATED: 11/30/2019 4:04 PM DATE MODIFIED: 11/30/2019 4:15 PM 51. The upper-level managers at LaDonna's organization hold a traditional view of information systems, so LaDonna's major goals for her IS department include _____. a. aiding in product transformation b. ensuring effectiveness and efficiency of processes Copyright Cengage Learning. Powered by Cognero.

Page 37


Chapter 01 - Information Systems: People, Technology, Processes, and Structure c. integrating information systems into the supply chain d. providing useful input in key value chain decisions ANSWER: b RATIONALE: What role do information systems play in supply chain management activities and other organizational activities? A traditional view of information systems holds that organizations use information systems to control and monitor processes and to ensure effectiveness and efficiency. In this view, information systems are external to the supply chain management process and serve to monitor or control it. A more contemporary view, however, holds that information systems are often so intimately involved that they are part of the process itself. From this perspective, the information system plays an integral role in the process, whether providing input, aiding product transformation, or producing output. FEEDBACK: a. A traditional view of information systems holds that organizations use information systems to control and monitor processes and to ensure effectiveness and efficiency. In this view, information systems are external to the supply chain management process and serve to monitor or control it. b. A traditional view of information systems holds that organizations use information systems to control and monitor processes and to ensure effectiveness and efficiency. In this view, information systems are external to the supply chain management process and serve to monitor or control it. c. A traditional view of information systems holds that organizations use information systems to control and monitor processes and to ensure effectiveness and efficiency. In this view, information systems are external to the supply chain management process and serve to monitor or control it. d. A traditional view of information systems holds that organizations use information systems to control and monitor processes and to ensure effectiveness and efficiency. In this view, information systems are external to the supply chain management process and serve to monitor or control it.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Value Chain QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.4 - Discuss the traditional and contemporary view of the role that information systems play in an organization’s value chains. KEYWORDS: Bloom's: Remember DATE CREATED: 12/1/2019 7:26 AM DATE MODIFIED: 12/2/2019 5:50 PM 52. The concept of a value chain is meaningful to tax preparers and restaurants because these businesses _____. a. require technology infrastructure b. manufacture products for retail sale c. add value to their products and services d. rely on effective human resource management ANSWER: c RATIONALE: The concept of value chain is also meaningful to companies that don’t manufacture products. These companies include tax preparers, restaurants, book publishers, legal firms, and other service providers. By adding a significant amount of value to their products and services, companies ensure their success. Copyright Cengage Learning. Powered by Cognero.

Page 38


Chapter 01 - Information Systems: People, Technology, Processes, and Structure FEEDBACK:

a. The concept of value chain is also meaningful to companies that don’t

manufacture products. These companies include tax preparers, restaurants, book publishers, legal firms, and other service providers. By adding a significant amount of value to their products and services, companies ensure their success. b. The concept of value chain is also meaningful to companies that don’t manufacture products. These companies include tax preparers, restaurants, book publishers, legal firms, and other service providers. By adding a significant amount of value to their products and services, companies ensure their success. c. The concept of value chain is also meaningful to companies that don’t manufacture products. These companies include tax preparers, restaurants, book publishers, legal firms, and other service providers. By adding a significant amount of value to their products and services, companies ensure their success. d. The concept of value chain is also meaningful to companies that don’t manufacture products. These companies include tax preparers, restaurants, book publishers, legal firms, and other service providers. By adding a significant amount of value to their products and services, companies ensure their success.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Value Chain QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.4 - Discuss the traditional and contemporary view of the role that information systems play in an organization’s value chains. KEYWORDS: Bloom's: Remember DATE CREATED: 12/2/2019 5:13 PM DATE MODIFIED: 12/2/2019 5:49 PM 53. Which of the following is considered a primary rather than a support process within a supply chain? a. accounting and finance b. procurement c. human resource management d. marketing and sales ANSWER: d RATIONALE: In a manufacturing organization, the supply chain is a key value chain whose primary processes include inbound logistics, operations, outbound logistics, marketing and sales, and service. FEEDBACK: a. In a manufacturing organization, the supply chain is a key value chain whose primary processes include inbound logistics, operations, outbound logistics, marketing and sales, and service. b. In a manufacturing organization, the supply chain is a key value chain whose primary processes include inbound logistics, operations, outbound logistics, marketing and sales, and service. c. In a manufacturing organization, the supply chain is a key value chain whose primary processes include inbound logistics, operations, outbound logistics, marketing and sales, and service. d. In a manufacturing organization, the supply chain is a key value chain whose primary processes include inbound logistics, operations, outbound logistics, marketing and sales, and service.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 39


Chapter 01 - Information Systems: People, Technology, Processes, and Structure DIFFICULTY: Easy REFERENCES: Value Chain QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.4 - Discuss the traditional and contemporary view of the role that information systems play in an organization’s value chains. KEYWORDS: Bloom's: Remember DATE CREATED: 12/2/2019 5:37 PM DATE MODIFIED: 12/2/2019 5:49 PM 54. The process that helps managers identify initiatives and projects that will achieve organizational objectives is known as _____. a. innovation b. corporate strategy c. the value chain d. strategic planning ANSWER: d RATIONALE: Strategic planning is a process that helps managers identify initiatives and projects that will achieve organizational objectives. The strategic plan must take into account that the organization and everything around it is in a state of flux. FEEDBACK: a. Strategic planning is a process that helps managers identify initiatives and projects that will achieve organizational objectives. b. Strategic planning is a process that helps managers identify initiatives and projects that will achieve organizational objectives. c. Strategic planning is a process that helps managers identify initiatives and projects that will achieve organizational objectives. d. Strategic planning is a process that helps managers identify initiatives and projects that will achieve organizational objectives.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Strategic Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.5 - Identify four benefits of creating a strategic plan. KEYWORDS: Bloom's: Remember DATE CREATED: 12/3/2019 5:24 PM DATE MODIFIED: 12/3/2019 5:30 PM 55. Common themes in setting organizational strategies include "_____." a. increase both sales and costs b. attract and retain customers c. train customer behaviors d. limit product availability ANSWER: b RATIONALE: An organization develops an overall strategic plan, which sets the direction for all the other business units of the organization. Common themes in setting strategies include “increase Copyright Cengage Learning. Powered by Cognero.

Page 40


Chapter 01 - Information Systems: People, Technology, Processes, and Structure revenue,” “attract and retain new customers,” “increase customer loyalty,” and “reduce the time required to deliver new products to market.” FEEDBACK:

a. An organization develops an overall strategic plan, which sets the direction for all

the other business units of the organization. Common themes in setting strategies include “increase revenue,” “attract and retain new customers,” “increase customer loyalty,” and “reduce the time required to deliver new products to market.” b. An organization develops an overall strategic plan, which sets the direction for all the other business units of the organization. Common themes in setting strategies include “increase revenue,” “attract and retain new customers,” “increase customer loyalty,” and “reduce the time required to deliver new products to market.” c. An organization develops an overall strategic plan, which sets the direction for all the other business units of the organization. Common themes in setting strategies include “increase revenue,” “attract and retain new customers,” “increase customer loyalty,” and “reduce the time required to deliver new products to market.” d. An organization develops an overall strategic plan, which sets the direction for all the other business units of the organization. Common themes in setting strategies include “increase revenue,” “attract and retain new customers,” “increase customer loyalty,” and “reduce the time required to deliver new products to market.”

POINTS: 1 DIFFICULTY: Easy REFERENCES: Strategic Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.5 - Identify four benefits of creating a strategic plan. KEYWORDS: Bloom's: Remember DATE CREATED: 12/3/2019 5:33 PM DATE MODIFIED: 12/3/2019 5:42 PM 56. Jude, a senior executive, and the managers who report to him must make many decisions for their business units. To assist them with this, they rely on strategic planning to provide _____. a. a framework and a clearly defined direction b. the human and material resources they need c. new and loyal customers d. a reactive approach to market changes ANSWER: a RATIONALE: Strategic planning provides the following benefits: • • • •

A framework and a clearly defined direction to guide decision making at all levels and across all organizational units The most effective use of the organization’s resources by focusing those resources on agreed-on key priorities The ability of the organization to be proactive and to take advantage of opportunities and trends, rather than passively reacting to them Improved communication among management, employees, the board of directors, shareholders, and other interested parties

Copyright Cengage Learning. Powered by Cognero.

Page 41


Chapter 01 - Information Systems: People, Technology, Processes, and Structure FEEDBACK:

a. Strategic planning provides many benefits, including a framework and a clearly defined direction to guide decision making at all levels and across all organizational units. b. Strategic planning provides many benefits, including a framework and a clearly defined direction to guide decision making at all levels and across all organizational units. c. Strategic planning provides many benefits, including a framework and a clearly defined direction to guide decision making at all levels and across all organizational units. d. Strategic planning provides many benefits, including a framework and a clearly defined direction to guide decision making at all levels and across all organizational units.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Strategic Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.5 - Identify four benefits of creating a strategic plan. KEYWORDS: Bloom's: Remember DATE CREATED: 12/3/2019 5:47 PM DATE MODIFIED: 12/3/2019 5:56 PM 57. One benefit of strategic planning is that it enables the most effective use of the organization's resources by _____. a. prioritizing communication b. empowering lower-level managers c. focusing them on agreed-on key priorities d. speeding delivery of products to market ANSWER: c RATIONALE: Strategic planning provides the following benefits: • • • •

FEEDBACK:

A framework and a clearly defined direction to guide decision making at all levels and across all organizational units The most effective use of the organization’s resources by focusing those resources on agreed-on key priorities The ability of the organization to be proactive and to take advantage of opportunities and trends, rather than passively reacting to them Improved communication among management, employees, the board of directors, shareholders, and other interested parties

a. Strategic planning provides many benefits, including the most effective use of the

organization’s resources by focusing those resources on agreed-on key priorities. b. Strategic planning provides many benefits, including the most effective use of the organization’s resources by focusing those resources on agreed-on key priorities. c. Strategic planning provides many benefits, including the most effective use of the organization’s resources by focusing those resources on agreed-on key priorities. d. Strategic planning provides many benefits, including the most effective use of the organization’s resources by focusing those resources on agreed-on key priorities.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 42


Chapter 01 - Information Systems: People, Technology, Processes, and Structure REFERENCES: Strategic Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.5 - Identify four benefits of creating a strategic plan. KEYWORDS: Bloom's: Remember DATE CREATED: 12/4/2019 9:39 AM DATE MODIFIED: 12/4/2019 9:47 AM 58. Autumn develops a strategic plan that will allow her organization to take advantage of opportunities and trends by _____. a. staying focused on costs b. being proactive c. reacting passively d. remaining in state of flux ANSWER: b RATIONALE: Strategic planning provides the following benefits: • • • •

FEEDBACK:

A framework and a clearly defined direction to guide decision making at all levels and across all organizational units The most effective use of the organization’s resources by focusing those resources on agreed-on key priorities The ability of the organization to be proactive and to take advantage of opportunities and trends, rather than passively reacting to them Improved communication among management, employees, the board of directors, shareholders, and other interested parties

a. Strategic planning provides many benefits, including the ability of the organization to be proactive and to take advantage of opportunities and trends, rather than passively reacting to them. b. Strategic planning provides many benefits, including the ability of the organization to be proactive and to take advantage of opportunities and trends, rather than passively reacting to them. c. Strategic planning provides many benefits, including the ability of the organization to be proactive and to take advantage of opportunities and trends, rather than passively reacting to them. d. Strategic planning provides many benefits, including the ability of the organization to be proactive and to take advantage of opportunities and trends, rather than passively reacting to them.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Strategic Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.5 - Identify four benefits of creating a strategic plan. KEYWORDS: Bloom's: Remember DATE CREATED: 12/4/2019 9:47 AM DATE MODIFIED: 12/4/2019 9:56 AM Copyright Cengage Learning. Powered by Cognero.

Page 43


Chapter 01 - Information Systems: People, Technology, Processes, and Structure 59. Tremaine knows his firm would be more successful if communication among management, employees, the board of directors, shareholders, and other interested parties were improved through the development of _____. a. a personal information system b. a value chain c. a strategic plan d. new procedures ANSWER: c RATIONALE: Strategic planning provides the following benefits: • • • •

FEEDBACK:

A framework and a clearly defined direction to guide decision making at all levels and across all organizational units The most effective use of the organization’s resources by focusing those resources on agreed-on key priorities The ability of the organization to be proactive and to take advantage of opportunities and trends, rather than passively reacting to them Improved communication among management, employees, the board of directors, shareholders, and other interested parties

a. Strategic planning provides many benefits, including improved communication

among management, employees, the board of directors, shareholders, and other interested parties. b. Strategic planning provides many benefits, including improved communication among management, employees, the board of directors, shareholders, and other interested parties. c. Strategic planning provides many benefits, including improved communication among management, employees, the board of directors, shareholders, and other interested parties. d. Strategic planning provides many benefits, including improved communication among management, employees, the board of directors, shareholders, and other interested parties.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Strategic Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.5 - Identify four benefits of creating a strategic plan. KEYWORDS: Bloom's: Remember DATE CREATED: 12/4/2019 10:01 AM DATE MODIFIED: 12/4/2019 10:09 AM 60. Valencia, a business unit manager, must keep several things in mind when choosing from alternative strategies for her department. Which statement about Valencia's decision making is false? a. She should choose strategies that are consistent with those of competitors. b. She should consider the long-term impact of each strategy on revenue and profit. c. She should choose strategies that are consistent with the overall organizational plan. d. She should consider the amount and types of resources that each strategy will require. ANSWER: a RATIONALE: In choosing from alternative strategies, managers should consider the long-term impact of Copyright Cengage Learning. Powered by Cognero.

Page 44


Chapter 01 - Information Systems: People, Technology, Processes, and Structure each strategy on revenue and profit, the degree of risk involved, the amount and types of resources that will be required, and the potential competitive reaction. Managers of the various business units also develop a strategic plan that is consistent with the overall organizational plan. FEEDBACK:

a. In choosing from alternative strategies, managers should consider the long-term

impact of each strategy on revenue and profit, the degree of risk involved, the amount and types of resources that will be required, and the potential competitive reaction. Managers of the various business units also develop a strategic plan that is consistent with the overall organizational plan. b. In choosing from alternative strategies, managers should consider the long-term impact of each strategy on revenue and profit, the degree of risk involved, the amount and types of resources that will be required, and the potential competitive reaction. Managers of the various business units also develop a strategic plan that is consistent with the overall organizational plan. c. In choosing from alternative strategies, managers should consider the long-term impact of each strategy on revenue and profit, the degree of risk involved, the amount and types of resources that will be required, and the potential competitive reaction. Managers of the various business units also develop a strategic plan that is consistent with the overall organizational plan. d. In choosing from alternative strategies, managers should consider the long-term impact of each strategy on revenue and profit, the degree of risk involved, the amount and types of resources that will be required, and the potential competitive reaction. Managers of the various business units also develop a strategic plan that is consistent with the overall organizational plan.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Strategic Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.5 - Identify four benefits of creating a strategic plan. KEYWORDS: Bloom's: Remember DATE CREATED: 12/4/2019 10:09 AM DATE MODIFIED: 12/4/2019 10:21 AM 61. Janelle is helping create a strategic plan for her organization. What should she anticipate will be stable--that is, change little, if at all--over time? a. competitors b. suppliers c. economic growth d. importance of planning ANSWER: d RATIONALE: The strategic plan must take into account that the organization and everything around it is in a state of flux. This includes consumers’ likes and dislikes, changes in competitors, and suppliers leaving and entering the marketplace. In addition, the costs and availability of raw materials and labor fluctuate, the fundamental economic environment (interest rates, growth in gross domestic product, inflation rates) changes; and the degree of industry and government regulation varies. FEEDBACK: a. The strategic plan must take into account that the organization and everything around it is in a state of flux. This includes consumers’ likes and dislikes, changes in competitors, and suppliers leaving and entering the marketplace. In addition,

Copyright Cengage Learning. Powered by Cognero.

Page 45


Chapter 01 - Information Systems: People, Technology, Processes, and Structure the costs and availability of raw materials and labor fluctuate, the fundamental economic environment (interest rates, growth in gross domestic product, inflation rates) changes; and the degree of industry and government regulation varies. b. The strategic plan must take into account that the organization and everything around it is in a state of flux. This includes consumers’ likes and dislikes, changes in competitors, and suppliers leaving and entering the marketplace. In addition, the costs and availability of raw materials and labor fluctuate, the fundamental economic environment (interest rates, growth in gross domestic product, inflation rates) changes; and the degree of industry and government regulation varies. c. The strategic plan must take into account that the organization and everything around it is in a state of flux. This includes consumers’ likes and dislikes, changes in competitors, and suppliers leaving and entering the marketplace. In addition, the costs and availability of raw materials and labor fluctuate, the fundamental economic environment (interest rates, growth in gross domestic product, inflation rates) changes; and the degree of industry and government regulation varies. d. The strategic plan must take into account that the organization and everything around it is in a state of flux. This includes consumers’ likes and dislikes, changes in competitors, and suppliers leaving and entering the marketplace. In addition, the costs and availability of raw materials and labor fluctuate, the fundamental economic environment (interest rates, growth in gross domestic product, inflation rates) changes; and the degree of industry and government regulation varies.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Strategic Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.5 - Identify four benefits of creating a strategic plan. KEYWORDS: Bloom's: Remember DATE CREATED: 12/4/2019 2:25 PM DATE MODIFIED: 12/4/2019 2:47 PM 62. Amazon's decision to explore the possible use of delivery drones to gain a real competitive advantage over competitors who rely on less efficient ground transportation is an example of _____. a. inbound logistics b. strategic planning c. procurement d. human resource management ANSWER: b RATIONALE: An organization develops an overall strategic plan, which sets the direction for all the other business units of the organization. Amazon has made a strategic decision to explore the possible use of delivery drones to gain a real competitive advantage over competitors who rely on less efficient ground transportation. Such a strategy has the potential to attract new customers and increase revenue. FEEDBACK: a. An organization develops an overall strategic plan, which sets the direction for all the other business units of the organization. Amazon has made a strategic decision to explore the possible use of delivery drones to gain a real competitive advantage over competitors who rely on less efficient ground transportation. Such a strategy has the potential to attract new customers and increase revenue. b. An organization develops an overall strategic plan, which sets the direction for all the other business units of the organization. Amazon has made a strategic

Copyright Cengage Learning. Powered by Cognero.

Page 46


Chapter 01 - Information Systems: People, Technology, Processes, and Structure decision to explore the possible use of delivery drones to gain a real competitive advantage over competitors who rely on less efficient ground transportation. Such a strategy has the potential to attract new customers and increase revenue. c. An organization develops an overall strategic plan, which sets the direction for all the other business units of the organization. Amazon has made a strategic decision to explore the possible use of delivery drones to gain a real competitive advantage over competitors who rely on less efficient ground transportation. Such a strategy has the potential to attract new customers and increase revenue. d. An organization develops an overall strategic plan, which sets the direction for all the other business units of the organization. Amazon has made a strategic decision to explore the possible use of delivery drones to gain a real competitive advantage over competitors who rely on less efficient ground transportation. Such a strategy has the potential to attract new customers and increase revenue.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Strategic Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.5 - Identify four benefits of creating a strategic plan. KEYWORDS: Bloom's: Remember DATE CREATED: 12/4/2019 5:41 PM DATE MODIFIED: 12/4/2019 5:53 PM 63. What does Doug, an IS manager, consult when he needs to identify competencies for his organization to invest in? a. information system strategic plan b. high-demand certifications list c. procedural manuals d. enterprise information system ANSWER: a RATIONALE: The strategic plan of an information system (IS) must identify those technologies, vendors, competencies, people, systems, and projects in which an organization will invest to support the corporate and business unit strategies. FEEDBACK: a. The strategic plan of an information system (IS) must identify those technologies, vendors, competencies, people, systems, and projects in which an organization will invest to support the corporate and business unit strategies. b. The strategic plan of an information system (IS) must identify those technologies, vendors, competencies, people, systems, and projects in which an organization will invest to support the corporate and business unit strategies. c. The strategic plan of an information system (IS) must identify those technologies, vendors, competencies, people, systems, and projects in which an organization will invest to support the corporate and business unit strategies. d. The strategic plan of an information system (IS) must identify those technologies, vendors, competencies, people, systems, and projects in which an organization will invest to support the corporate and business unit strategies.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Information System Strategic Planning Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 47


Chapter 01 - Information Systems: People, Technology, Processes, and Structure HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.6 - Identify four drivers that help set the information system organizational strategy. KEYWORDS: Bloom's: Remember DATE CREATED: 12/5/2019 5:30 PM DATE MODIFIED: 12/5/2019 5:36 PM 64. Fabiola's IS management team is formulating their IS strategic plan. Fabiola reminds them that they must consider _____. a. the IS organization isolated from the rest of the organization b. corporate strategy and business unit strategies c. limiting communication with lower-level managers d. previous but not future IT investments ANSWER: b RATIONALE: Planners must consider many factors in setting IS organizational strategy: corporate strategy, business unit strategies, innovative thinking, technology innovations, and IT investments. FEEDBACK: a. Planners must consider many factors in setting IS organizational strategy: corporate strategy, business unit strategies, innovative thinking, technology innovations, and IT investments. b. Planners must consider many factors in setting IS organizational strategy: corporate strategy, business unit strategies, innovative thinking, technology innovations, and IT investments. c. Planners must consider many factors in setting IS organizational strategy: corporate strategy, business unit strategies, innovative thinking, technology innovations, and IT investments. d. Planners must consider many factors in setting IS organizational strategy: corporate strategy, business unit strategies, innovative thinking, technology innovations, and IT investments.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information System Strategic Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.6 - Identify four drivers that help set the information system organizational strategy. KEYWORDS: Bloom's: Remember DATE CREATED: 12/5/2019 5:36 PM DATE MODIFIED: 12/5/2019 5:50 PM 65. Which statement about the drivers that help set information system organizational strategy is false? a. They include the perception of the IS organization by the rest of the organization. b. They include technology innovations in hardware and software. c. They include more general organizational strategies at the corporate level. d. They include innovative thinkers inside, but not outside, the organization. ANSWER: d RATIONALE: The strategic plan of an information system is strongly influenced by new technology innovations. These innovations include increasingly more powerful mobile devices and Copyright Cengage Learning. Powered by Cognero.

Page 48


Chapter 01 - Information Systems: People, Technology, Processes, and Structure advanced software that can analyze large amounts of structured and unstructured data. Innovative thinkers inside and outside the organization also influence the plan. Planners must consider many factors in setting IS organizational strategy: corporate strategy, business unit strategies, innovative thinking, and technology innovations. FEEDBACK:

a. The strategic plan of an information system is strongly influenced by new

technology innovations. These innovations include increasingly more powerful mobile devices and advanced software that can analyze large amounts of structured and unstructured data. Innovative thinkers inside and outside the organization also influence the plan. Planners must consider many factors in setting IS organizational strategy: corporate strategy, business unit strategies, innovative thinking, and technology innovations. b. The strategic plan of an information system is strongly influenced by new technology innovations. These innovations include increasingly more powerful mobile devices and advanced software that can analyze large amounts of structured and unstructured data. Innovative thinkers inside and outside the organization also influence the plan. Planners must consider many factors in setting IS organizational strategy: corporate strategy, business unit strategies, innovative thinking, and technology innovations. c. The strategic plan of an information system is strongly influenced by new technology innovations. These innovations include increasingly more powerful mobile devices and advanced software that can analyze large amounts of structured and unstructured data. Innovative thinkers inside and outside the organization also influence the plan. Planners must consider many factors in setting IS organizational strategy: corporate strategy, business unit strategies, innovative thinking, and technology innovations. d. The strategic plan of an information system is strongly influenced by new technology innovations. These innovations include increasingly more powerful mobile devices and advanced software that can analyze large amounts of structured and unstructured data. Innovative thinkers inside and outside the organization also influence the plan. Planners must consider many factors in setting IS organizational strategy: corporate strategy, business unit strategies, innovative thinking, and technology innovations.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information System Strategic Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.6 - Identify four drivers that help set the information system organizational strategy. KEYWORDS: Bloom's: Remember DATE CREATED: 12/5/2019 5:51 PM DATE MODIFIED: 12/5/2019 5:58 PM 66. Corporate strategy, business unit strategies, innovative thinking, and technology innovations are all _____. a. components of Leavitt's Diamond b. spheres of influence for types of information systems c. drivers that set information system organizational strategy d. elements of the value chain ANSWER: c RATIONALE: Drivers that set IS organizational strategy and determine information system investments include corporate strategy, business unit strategies, innovative thinking, and technology Copyright Cengage Learning. Powered by Cognero.

Page 49


Chapter 01 - Information Systems: People, Technology, Processes, and Structure innovations, as shown in Figure 1.3. FEEDBACK:

a. Drivers that set IS organizational strategy and determine information system investments include corporate strategy, business unit strategies, innovative thinking, and technology innovations, as shown in Figure 1.3. b. Drivers that set IS organizational strategy and determine information system investments include corporate strategy, business unit strategies, innovative thinking, and technology innovations, as shown in Figure 1.3. c. Drivers that set IS organizational strategy and determine information system investments include corporate strategy, business unit strategies, innovative thinking, and technology innovations, as shown in Figure 1.3. d. Drivers that set IS organizational strategy and determine information system investments include corporate strategy, business unit strategies, innovative thinking, and technology innovations, as shown in Figure 1.3.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information System Strategic Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.6 - Identify four drivers that help set the information system organizational strategy. KEYWORDS: Bloom's: Remember DATE CREATED: 12/5/2019 6:00 PM DATE MODIFIED: 12/6/2019 7:41 AM 67. Francis will need to adjust his information system strategic plan when _____. a. his department requires a larger budget b. the contract with a major vendor comes up for renewal c. his firm's corporate strategy changes d. he completes a high-profile project ANSWER: c RATIONALE: The strategic plan of an information system (IS) must identify those technologies, vendors, competencies, people, systems, and projects in which an organization will invest to support the corporate and business unit strategies. Drivers that set IS organizational strategy and determine information system investments include corporate strategy, business unit strategies, innovative thinking, and technology innovations, as shown in Figure 1.3. FEEDBACK: a. Drivers that set IS organizational strategy and determine information system investments include corporate strategy, business unit strategies, innovative thinking, and technology innovations, as shown in Figure 1.3. b. Drivers that set IS organizational strategy and determine information system investments include corporate strategy, business unit strategies, innovative thinking, and technology innovations, as shown in Figure 1.3. c. Drivers that set IS organizational strategy and determine information system investments include corporate strategy, business unit strategies, innovative thinking, and technology innovations, as shown in Figure 1.3. d. Drivers that set IS organizational strategy and determine information system investments include corporate strategy, business unit strategies, innovative thinking, and technology innovations, as shown in Figure 1.3.

POINTS: DIFFICULTY:

1 Moderate

Copyright Cengage Learning. Powered by Cognero.

Page 50


Chapter 01 - Information Systems: People, Technology, Processes, and Structure REFERENCES: Information System Strategic Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.6 - Identify four drivers that help set the information system organizational strategy. KEYWORDS: Bloom's: Remember DATE CREATED: 12/6/2019 7:44 AM DATE MODIFIED: 12/6/2019 7:55 AM 68. A slight majority (52%) of 700 CIOs surveyed reported that their IS organization is viewed as a _____. a. cost center or service provider b. value chain c. game changer d. business partner or peer ANSWER: d RATIONALE: The majority of CIOs surveyed, about 52 percent, said that their IS organization is viewed as a business partner/business peer that is expected to control IS costs and to expand IS services in support of business initiatives. FEEDBACK: a. The majority of CIOs surveyed, about 52 percent, said that their IS organization is viewed as a business partner/business peer that is expected to control IS costs and to expand IS services in support of business initiatives. b. The majority of CIOs surveyed, about 52 percent, said that their IS organization is viewed as a business partner/business peer that is expected to control IS costs and to expand IS services in support of business initiatives. c. The majority of CIOs surveyed, about 52 percent, said that their IS organization is viewed as a business partner/business peer that is expected to control IS costs and to expand IS services in support of business initiatives. d. The majority of CIOs surveyed, about 52 percent, said that their IS organization is viewed as a business partner/business peer that is expected to control IS costs and to expand IS services in support of business initiatives.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information System Strategic Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.7 - Identify three ways the IS organization can be perceived by the rest of the organization, and how each can influence the IS strategy. KEYWORDS: Bloom's: Remember DATE CREATED: 12/6/2019 7:58 AM DATE MODIFIED: 12/6/2019 5:54 PM 69. When an IS organization is viewed as a cost center/service provider: a. the strategic planning process is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better. b. the strategic planning process is based on understanding the collective business plans for the next year and determining what those mean for the IS organization. c. their strategic planning process is outwardly focused and involves meeting with customers, suppliers, and Copyright Cengage Learning. Powered by Cognero.

Page 51


Chapter 01 - Information Systems: People, Technology, Processes, and Structure leading IS consultants and vendors to answer questions like “What do we want to be?” d. achieving alignment between the IS strategic plan and the rest of the business is less important than it would be if the IS organization was perceived in a different way. ANSWER: a RATIONALE: In a survey of more than 700 CIOs, 38 percent said that their IS organization is viewed as a cost center/service provider that is expected to reduce IS costs and improve IS services. The strategic planning process for such an organization is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better. The majority of CIOs surveyed, about 52 percent, said that their IS organization is viewed as a business partner/business peer that is expected to control IS costs and to expand IS services in support of business initiatives. The strategic planning process of these organizations is based on understanding the collective business plans for the next year and determining what those mean for the IS organization in terms of new technologies, vendors, competencies, people, systems, and projects. Only 10 percent of surveyed CIOs stated that their IS organization is viewed by fellow employees as a game-changing organization that is asked to lead product innovation efforts and open new markets. Their strategic planning process is outwardly focused and involves meeting with customers, suppliers, and leading IS consultants and vendors to answer questions like “What do we want to be?” and “How can we create competitive advantage?” FEEDBACK: a. In a survey of more than 700 CIOs, 38 percent said that their IS organization is viewed as a cost center/service provider that is expected to reduce IS costs and improve IS services. The strategic planning process for such an organization is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better. b. In a survey of more than 700 CIOs, 38 percent said that their IS organization is viewed as a cost center/service provider that is expected to reduce IS costs and improve IS services. The strategic planning process for such an organization is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better. c. In a survey of more than 700 CIOs, 38 percent said that their IS organization is viewed as a cost center/service provider that is expected to reduce IS costs and improve IS services. The strategic planning process for such an organization is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better. d. In a survey of more than 700 CIOs, 38 percent said that their IS organization is viewed as a cost center/service provider that is expected to reduce IS costs and improve IS services. The strategic planning process for such an organization is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information System Strategic Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.7 - Identify three ways the IS organization can be perceived by the rest of the organization, and how each can influence the IS strategy. KEYWORDS: Bloom's: Remember DATE CREATED: 12/6/2019 8:04 AM DATE MODIFIED: 12/6/2019 8:19 AM 70. When an IS organization is viewed as a business partner/business peer: Copyright Cengage Learning. Powered by Cognero.

Page 52


Chapter 01 - Information Systems: People, Technology, Processes, and Structure a. the strategic planning process is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better. b. the strategic planning process is based on understanding the collective business plans for the next year and determining what those mean for the IS organization. c. their strategic planning process is outwardly focused and involves meeting with customers, suppliers, and leading IS consultants and vendors to answer questions like “What do we want to be?” d. achieving alignment between the IS strategic plan and the rest of the business is less important than it would be if the IS organization was perceived in a different way. ANSWER: b RATIONALE: In a survey of more than 700 CIOs, 38 percent said that their IS organization is viewed as a cost center/service provider that is expected to reduce IS costs and improve IS services. The strategic planning process for such an organization is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better. The majority of CIOs surveyed, about 52 percent, said that their IS organization is viewed as a business partner/business peer that is expected to control IS costs and to expand IS services in support of business initiatives. The strategic planning process of these organizations is based on understanding the collective business plans for the next year and determining what those mean for the IS organization in terms of new technologies, vendors, competencies, people, systems, and projects. Only 10 percent of surveyed CIOs stated that their IS organization is viewed by fellow employees as a game-changing organization that is asked to lead product innovation efforts and open new markets. Their strategic planning process is outwardly focused and involves meeting with customers, suppliers, and leading IS consultants and vendors to answer questions like “What do we want to be?” and “How can we create competitive advantage?” FEEDBACK: a. The majority of CIOs surveyed said that their IS organization is viewed as a business partner/business peer. The strategic planning process of these organizations is based on understanding the collective business plans for the next year and determining what those mean for the IS organization in terms of new technologies, vendors, competencies, people, systems, and projects. b. The majority of CIOs surveyed said that their IS organization is viewed as a business partner/business peer. The strategic planning process of these organizations is based on understanding the collective business plans for the next year and determining what those mean for the IS organization in terms of new technologies, vendors, competencies, people, systems, and projects. c. The majority of CIOs surveyed said that their IS organization is viewed as a business partner/business peer. The strategic planning process of these organizations is based on understanding the collective business plans for the next year and determining what those mean for the IS organization in terms of new technologies, vendors, competencies, people, systems, and projects. d. The majority of CIOs surveyed said that their IS organization is viewed as a business partner/business peer. The strategic planning process of these organizations is based on understanding the collective business plans for the next year and determining what those mean for the IS organization in terms of new technologies, vendors, competencies, people, systems, and projects.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information System Strategic Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.7 - Identify three ways the IS organization can be perceived by the rest of the organization, and how each can influence the IS strategy. Copyright Cengage Learning. Powered by Cognero.

Page 53


Chapter 01 - Information Systems: People, Technology, Processes, and Structure KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 12/6/2019 8:21 AM 12/6/2019 8:25 AM

71. When an IS organization is viewed as a game changer: a. the strategic planning process is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better. b. the strategic planning process is based on understanding the collective business plans for the next year and determining what those mean for the IS organization. c. their strategic planning process is outwardly focused and involves meeting with customers, suppliers, and leading IS consultants and vendors to answer questions like “What do we want to be?” d. achieving alignment between the IS strategic plan and the rest of the business is less important than it would be if the IS organization was perceived in a different way. ANSWER: c RATIONALE: In a survey of more than 700 CIOs, 38 percent said that their IS organization is viewed as a cost center/service provider that is expected to reduce IS costs and improve IS services. The strategic planning process for such an organization is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better. The majority of CIOs surveyed, about 52 percent, said that their IS organization is viewed as a business partner/business peer that is expected to control IS costs and to expand IS services in support of business initiatives. The strategic planning process of these organizations is based on understanding the collective business plans for the next year and determining what those mean for the IS organization in terms of new technologies, vendors, competencies, people, systems, and projects. Only 10 percent of surveyed CIOs stated that their IS organization is viewed by fellow employees as a game-changing organization that is asked to lead product innovation efforts and open new markets. Their strategic planning process is outwardly focused and involves meeting with customers, suppliers, and leading IS consultants and vendors to answer questions like “What do we want to be?” and “How can we create competitive advantage?” FEEDBACK: a. Only 10 percent of surveyed CIOs stated that their IS organization is viewed by fellow employees as a game-changing organization that is asked to lead product innovation efforts and open new markets. Their strategic planning process is outwardly focused and involves meeting with customers, suppliers, and leading IS consultants and vendors to answer questions like “What do we want to be?” and “How can we create competitive advantage?” b. Only 10 percent of surveyed CIOs stated that their IS organization is viewed by fellow employees as a game-changing organization that is asked to lead product innovation efforts and open new markets. Their strategic planning process is outwardly focused and involves meeting with customers, suppliers, and leading IS consultants and vendors to answer questions like “What do we want to be?” and “How can we create competitive advantage?” c. Only 10 percent of surveyed CIOs stated that their IS organization is viewed by fellow employees as a game-changing organization that is asked to lead product innovation efforts and open new markets. Their strategic planning process is outwardly focused and involves meeting with customers, suppliers, and leading IS consultants and vendors to answer questions like “What do we want to be?” and “How can we create competitive advantage?” d. Only 10 percent of surveyed CIOs stated that their IS organization is viewed by fellow employees as a game-changing organization that is asked to lead product innovation efforts and open new markets. Their strategic planning process is outwardly focused and involves meeting with customers, suppliers, and leading IS consultants and vendors to answer questions like “What do we want to be?” and

Copyright Cengage Learning. Powered by Cognero.

Page 54


Chapter 01 - Information Systems: People, Technology, Processes, and Structure “How can we create competitive advantage?”

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information System Strategic Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.7 - Identify three ways the IS organization can be perceived by the rest of the organization, and how each can influence the IS strategy. KEYWORDS: Bloom's: Remember DATE CREATED: 12/6/2019 1:03 PM DATE MODIFIED: 12/6/2019 1:06 PM 72. Because Marcus works within an IS organization viewed as a cost center and service provider by the rest of his organization, one of his major goals is to _____. a. regularly collaborate with and educate external customers b. consolidate IS resources and eliminate redundant functions c. eliminate barriers to closing sales with customers d. employ newer technologies such as mobile computing ANSWER: b RATIONALE: The IS organization of the state of Delaware is viewed as a cost center/service provider. One of the organization’s primary strategic initiatives is to consolidate IS resources and to eliminate redundant functions and resources within the various state agencies. The goal is to deliver significant improvements in customer service and to reduce costs. FEEDBACK: a. The IS organization of the state of Delaware is viewed as a cost center/service provider. One of the organization’s primary strategic initiatives is to consolidate IS resources and to eliminate redundant functions and resources within the various state agencies. The goal is to deliver significant improvements in customer service and to reduce costs. b. The IS organization of the state of Delaware is viewed as a cost center/service provider. One of the organization’s primary strategic initiatives is to consolidate IS resources and to eliminate redundant functions and resources within the various state agencies. The goal is to deliver significant improvements in customer service and to reduce costs. c. The IS organization of the state of Delaware is viewed as a cost center/service provider. One of the organization’s primary strategic initiatives is to consolidate IS resources and to eliminate redundant functions and resources within the various state agencies. The goal is to deliver significant improvements in customer service and to reduce costs. d. The IS organization of the state of Delaware is viewed as a cost center/service provider. One of the organization’s primary strategic initiatives is to consolidate IS resources and to eliminate redundant functions and resources within the various state agencies. The goal is to deliver significant improvements in customer service and to reduce costs.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Easy Information System Strategic Planning Multiple Choice False

Copyright Cengage Learning. Powered by Cognero.

Page 55


Chapter 01 - Information Systems: People, Technology, Processes, and Structure LEARNING OBJECTIVES: POIS.14e.1.7 - Identify three ways the IS organization can be perceived by the rest of the organization, and how each can influence the IS strategy. KEYWORDS: Bloom's: Remember DATE CREATED: 12/6/2019 1:08 PM DATE MODIFIED: 12/6/2019 1:18 PM 73. Krysta, who manages the IS organization for her company, is continually striving to expand IS services and capitalize on the latest technology developments to support her company's business plans through the coming months. Her IS organization is perceived as a _____. a. game changer b. cost center or service provider c. value chain d. business partner or peer ANSWER: d RATIONALE: The majority of CIOs surveyed, about 52 percent, said that their IS organization is viewed as a business partner/business peer that is expected to control IS costs and to expand IS services in support of business initiatives. The strategic planning process of these organizations is based on understanding the collective business plans for the next year and determining what those mean for the IS organization in terms of new technologies, vendors, competencies, people, systems, and projects. The IS organization for the city of Seattle operates under the constraint of a decreasing budget but is continually striving to expand its services and capitalize on the latest technology developments. It employs newer technologies, such as mobile computing, to improve the interaction of city government with its constituents and to support city services on the move. The organization also seeks opportunities to access shared computer resources through cloud-based applications to gain advantages and efficiencies where it makes sense. FEEDBACK: a. The strategic planning process of organizations viewed as business partners/peers is based on understanding the collective business plans for the next year and determining what those mean for the IS organization in terms of new technologies, vendors, competencies, people, systems, and projects. The IS organization for the city of Seattle operates under the constraint of a decreasing budget but is continually striving to expand its services and capitalize on the latest technology developments. b. The strategic planning process of organizations viewed as business partners/peers is based on understanding the collective business plans for the next year and determining what those mean for the IS organization in terms of new technologies, vendors, competencies, people, systems, and projects. The IS organization for the city of Seattle operates under the constraint of a decreasing budget but is continually striving to expand its services and capitalize on the latest technology developments. c. The strategic planning process of organizations viewed as business partners/peers is based on understanding the collective business plans for the next year and determining what those mean for the IS organization in terms of new technologies, vendors, competencies, people, systems, and projects. The IS organization for the city of Seattle operates under the constraint of a decreasing budget but is continually striving to expand its services and capitalize on the latest technology developments. d. The strategic planning process of organizations viewed as business partners/peers is based on understanding the collective business plans for the next year and determining what those mean for the IS organization in terms of new technologies, vendors, competencies, people, systems, and projects. The IS organization for the city of Seattle operates under the constraint of a decreasing

Copyright Cengage Learning. Powered by Cognero.

Page 56


Chapter 01 - Information Systems: People, Technology, Processes, and Structure budget but is continually striving to expand its services and capitalize on the latest technology developments.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information System Strategic Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.7 - Identify three ways the IS organization can be perceived by the rest of the organization, and how each can influence the IS strategy. KEYWORDS: Bloom's: Remember DATE CREATED: 12/6/2019 1:18 PM DATE MODIFIED: 12/6/2019 1:27 PM 74. Santiago's IS organization developed a mobile app that allows salespeople to include images of how a customer's bathroom would look with new tiles installed when they generate a quote for a customer. Santiago's IS organization is viewed as a _____. a. value chain b. cost center or service provider c. business partner or peer d. game changer ANSWER: d RATIONALE: Only 10 percent of surveyed CIOs stated that their IS organization is viewed by fellow employees as a game-changing organization that is asked to lead product innovation efforts and open new markets. GAF developed a mobile app that allows a contractor to take a photo of a prospect’s house and then use that photo to allow the prospect to preview different GAF shingle styles and colors on an actual image of their home. The app was a game changer for the organization as it helps GAF contractors demonstrate the beauty of GAF shingles and eliminates one of the biggest barriers to closing the sale—answering the question, “How will it look on my house?” FEEDBACK: a. GAF developed a mobile app that allows a contractor to take a photo of a prospect’s house and then use that photo to allow the prospect to preview different GAF shingle styles and colors on an actual image of their home. The app was a game changer for the organization as it helps GAF contractors demonstrate the beauty of GAF shingles and eliminates one of the biggest barriers to closing the sale—answering the question, “How will it look on my house?” b. GAF developed a mobile app that allows a contractor to take a photo of a prospect’s house and then use that photo to allow the prospect to preview different GAF shingle styles and colors on an actual image of their home. The app was a game changer for the organization as it helps GAF contractors demonstrate the beauty of GAF shingles and eliminates one of the biggest barriers to closing the sale—answering the question, “How will it look on my house?” c. GAF developed a mobile app that allows a contractor to take a photo of a prospect’s house and then use that photo to allow the prospect to preview different GAF shingle styles and colors on an actual image of their home. The app was a game changer for the organization as it helps GAF contractors demonstrate the beauty of GAF shingles and eliminates one of the biggest barriers to closing the sale—answering the question, “How will it look on my house?”

Copyright Cengage Learning. Powered by Cognero.

Page 57


Chapter 01 - Information Systems: People, Technology, Processes, and Structure d. GAF developed a mobile app that allows a contractor to take a photo of a

prospect’s house and then use that photo to allow the prospect to preview different GAF shingle styles and colors on an actual image of their home. The app was a game changer for the organization as it helps GAF contractors demonstrate the beauty of GAF shingles and eliminates one of the biggest barriers to closing the sale—answering the question, “How will it look on my house?”

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information System Strategic Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.7 - Identify three ways the IS organization can be perceived by the rest of the organization, and how each can influence the IS strategy. KEYWORDS: Bloom's: Remember DATE CREATED: 12/6/2019 1:27 PM DATE MODIFIED: 12/6/2019 1:37 PM 75. In organizations where IS becomes a catalyst for achieving new business objectives unreachable without IS, IS organizational strategies _____. a. support the plans of the business b. involve using IS to achieve a competitive advantage c. react to the strategic plans of business units d. are inward looking ANSWER: b RATIONALE: Only 10 percent of surveyed CIOs stated that their IS organization is viewed by fellow employees as a game-changing organization that is asked to lead product innovation efforts and open new markets. Their strategic planning process is outwardly focused and involves meeting with customers, suppliers, and leading IS consultants and vendors to answer questions like “What do we want to be?” and “How can we create competitive advantage?” In such organizations, IS is not only a means for implementing business-defined objectives but also a catalyst for achieving new business objectives unreachable without IS. FEEDBACK: a. In organizations where the IS organization is viewed as a game changer, IS is not only a means for implementing business-defined objectives but also a catalyst for achieving new business objectives unreachable without IS. b. In organizations where the IS organization is viewed as a game changer, IS is not only a means for implementing business-defined objectives but also a catalyst for achieving new business objectives unreachable without IS. c. In organizations where the IS organization is viewed as a game changer, IS is not only a means for implementing business-defined objectives but also a catalyst for achieving new business objectives unreachable without IS. d. In organizations where the IS organization is viewed as a game changer, IS is not only a means for implementing business-defined objectives but also a catalyst for achieving new business objectives unreachable without IS.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Information System Strategic Planning Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 58


Chapter 01 - Information Systems: People, Technology, Processes, and Structure HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.7 - Identify three ways the IS organization can be perceived by the rest of the organization, and how each can influence the IS strategy. KEYWORDS: Bloom's: Remember DATE CREATED: 12/6/2019 1:41 PM DATE MODIFIED: 12/6/2019 1:52 PM 76. Tim relies on his solid analytical and decision-making skills when converting a program design he receives from Minnie, the systems analyst, to a working program written in one of the languages used at his firm. Who is Tim? a. an information systems security analyst b. a chief information officer c. a programmer d. a business analyst ANSWER: c RATIONALE: Programmers convert a program design developed by a systems analyst or software developer into a working program written in one of many computer languages. Successful information systems workers must have solid analytical and decision-making skills and be able to translate ill-defined business problems and opportunities into effective technologybased solutions. FEEDBACK: a. Programmers convert a program design developed by a systems analyst or software developer into a working program written in one of many computer languages. b. Programmers convert a program design developed by a systems analyst or software developer into a working program written in one of many computer languages. c. Programmers convert a program design developed by a systems analyst or software developer into a working program written in one of many computer languages. d. Programmers convert a program design developed by a systems analyst or software developer into a working program written in one of many computer languages.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Typical Information System Roles QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.8 - Identify six non-technical skills needed to be an effective information system worker. KEYWORDS: Bloom's: Remember DATE CREATED: 12/6/2019 2:15 PM DATE MODIFIED: 12/6/2019 2:20 PM 77. Sandra, a software developer, must serve as a translator between business needs and technology-based solutions when she builds a software product according to a customer's specifications. To be a successful translator, she must demonstrate _____. a. technical support expertise b. good communication skills Copyright Cengage Learning. Powered by Cognero.

Page 59


Chapter 01 - Information Systems: People, Technology, Processes, and Structure c. strategic planning principles d. project management skills ANSWER: b RATIONALE: Successful information system workers need good communication skills and often serve as translators between business needs and technology-based solutions. Software developers frequently collaborate with management, clients, and others to build a software product from scratch, according to a customer’s specifications, or to modify existing software to meet new business needs. FEEDBACK: a. Successful information system workers need good communication skills and often serve as translators between business needs and technology-based solutions. b. Successful information system workers need good communication skills and often serve as translators between business needs and technology-based solutions. c. Successful information system workers need good communication skills and often serve as translators between business needs and technology-based solutions. d. Successful information system workers need good communication skills and often serve as translators between business needs and technology-based solutions.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information Systems Careers QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.8 - Identify six non-technical skills needed to be an effective information system worker. KEYWORDS: Bloom's: Remember DATE CREATED: 12/6/2019 2:26 PM DATE MODIFIED: 12/6/2019 2:34 PM 78. Leonard, a data scientist working in an information systems organization, is considering pursuing a certification in either Hadoop or Python. How would this benefit Leonard? a. It would increase his expertise in network administration. b. It may expand his career possibilities. c. It would allow him to collaborate more frequently. d. It may enhance his nontechnical more than his technical skills. ANSWER: b RATIONALE: Getting certified from a software, database, or network company may open the door to new career possibilities or result in an increase in pay. High-demand business analytics certifications include: • •

FEEDBACK:

Hadoop (an open source distributed processing framework that manages data processing and storage for big data applications) Python (a general-purpose programming language that can be used for Web development, data analysis, artificial intelligence, and scientific computing)

a. Getting certified from a software, database, or network company may open the door to new career possibilities or result in an increase in pay. b. Getting certified from a software, database, or network company may open the door to new career possibilities or result in an increase in pay. c. Getting certified from a software, database, or network company may open the

Copyright Cengage Learning. Powered by Cognero.

Page 60


Chapter 01 - Information Systems: People, Technology, Processes, and Structure door to new career possibilities or result in an increase in pay.

d. Getting certified from a software, database, or network company may open the door to new career possibilities or result in an increase in pay.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Continuous Education QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.9 - Identify two benefits of obtaining a certification in an IS subject area. KEYWORDS: Bloom's: Remember DATE CREATED: 12/6/2019 2:44 PM DATE MODIFIED: 12/6/2019 4:07 PM 79. Surveys indicate that a solid majority of employers use IT certifications to _____. a. train new information system workers b. make decisions about raises in pay c. substitute for on-the-job experience d. qualify or disqualify applicants for certain jobs ANSWER: d RATIONALE: Getting certified from a software, database, or network company may open the door to new career possibilities or result in an increase in pay. According to one survey, 65 percent of employers use IT certifications to differentiate between equally qualified candidates, while 72 percent of employers require some form of IT certification for certain job roles. FEEDBACK: a. According to one survey, 65 percent of employers use IT certifications to differentiate between equally qualified candidates, while 72 percent of employers require some form of IT certification for certain job roles. b. According to one survey, 65 percent of employers use IT certifications to differentiate between equally qualified candidates, while 72 percent of employers require some form of IT certification for certain job roles. c. According to one survey, 65 percent of employers use IT certifications to differentiate between equally qualified candidates, while 72 percent of employers require some form of IT certification for certain job roles. d. According to one survey, 65 percent of employers use IT certifications to differentiate between equally qualified candidates, while 72 percent of employers require some form of IT certification for certain job roles.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Continuous Education QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.9 - Identify two benefits of obtaining a certification in an IS subject area. KEYWORDS: Bloom's: Remember DATE CREATED: 12/6/2019 4:16 PM DATE MODIFIED: 12/6/2019 4:21 PM 80. A certification in Cisco network LINUX/UNIX, or Check Point Firewall administration or a CISSP credential could benefit one's career in _____. Copyright Cengage Learning. Powered by Cognero.

Page 61


Chapter 01 - Information Systems: People, Technology, Processes, and Structure a. database administration b. business analytics c. networking/security d. project management ANSWER: c RATIONALE: High-demand certifications in networking/security include Cisco network administration, LINUX/UNIX administration, Certified Information Systems Security Professional (CISSP), and Check Point Firewall administration. FEEDBACK: a. High-demand certifications in networking/security include Cisco network administration, LINUX/UNIX administration, Certified Information Systems Security Professional (CISSP), and Check Point Firewall administration. b. High-demand certifications in networking/security include Cisco network administration, LINUX/UNIX administration, Certified Information Systems Security Professional (CISSP), and Check Point Firewall administration. c. High-demand certifications in networking/security include Cisco network administration, LINUX/UNIX administration, Certified Information Systems Security Professional (CISSP), and Check Point Firewall administration. d. High-demand certifications in networking/security include Cisco network administration, LINUX/UNIX administration, Certified Information Systems Security Professional (CISSP), and Check Point Firewall administration.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Continuous Education QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.9 - Identify two benefits of obtaining a certification in an IS subject area. KEYWORDS: Bloom's: Remember DATE CREATED: 12/6/2019 4:27 PM DATE MODIFIED: 12/6/2019 4:29 PM 81. Romanius, a programmer, would like to open up his career possibilities by taking of advantage of the knowledge and skills he already has. He has worked primarily on successful applications based on .NET in recent years. What would you suggest Romanius do? a. obtain a certification in .NET development b. pursue a certification in database administration c. gain experience with .NET outside the workplace d. broaden his skills implementing shadow IT ANSWER: a RATIONALE: Getting certified from a software, database, or network company may open the door to new career possibilities or result in an increase in pay. High-demand certifications in application and web development include AJAX development, C# development, Java development, .NET development, PHP development, and Sharepoint. FEEDBACK: a. Getting certified from a software, database, or network company may open the door to new career possibilities or result in an increase in pay. High-demand certifications in application and web development include AJAX development, C# development, Java development, .NET development, PHP development, and Sharepoint. b. Getting certified from a software, database, or network company may open the

Copyright Cengage Learning. Powered by Cognero.

Page 62


Chapter 01 - Information Systems: People, Technology, Processes, and Structure door to new career possibilities or result in an increase in pay. High-demand certifications in application and web development include AJAX development, C# development, Java development, .NET development, PHP development, and Sharepoint. c. Getting certified from a software, database, or network company may open the door to new career possibilities or result in an increase in pay. High-demand certifications in application and web development include AJAX development, C# development, Java development, .NET development, PHP development, and Sharepoint. d. Getting certified from a software, database, or network company may open the door to new career possibilities or result in an increase in pay. High-demand certifications in application and web development include AJAX development, C# development, Java development, .NET development, PHP development, and Sharepoint.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Continuous Education QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.9 - Identify two benefits of obtaining a certification in an IS subject area. KEYWORDS: Bloom's: Remember DATE CREATED: 12/6/2019 4:32 PM DATE MODIFIED: 12/6/2019 4:49 PM 82. Business analytics certifications in high demand include _____. a. AJAX, C#, and Sharepoint b. SAP Business Objects, Hadoop, and Ruby on Rails c. Cisco, LINUX/UNIX, and CISSP d. .NET, PHP, and Java ANSWER: b RATIONALE: Certifications in high demand in business analytics include: • • • •

FEEDBACK:

SAP Business Objects (platform that enables business users to discover data, perform analysis to derive insights, and create reports that visualize the insights. Hadoop (an open source distributed processing framework that manages data processing and storage for big data applications) Python (a general-purpose programming language that can be used for Web development, data analysis, artificial intelligence, and scientific computing) Ruby on Rails (Ruby is a general-purpose programming language frequently used to develop Web applications, and Rails is a development tool that is used by Web developers)

a. Certifications in high demand in business analytics include SAP Business Objects, Hadoop, Python, and Ruby on Rails. b. Certifications in high demand in business analytics include SAP Business Objects, Hadoop, Python, and Ruby on Rails. c. Certifications in high demand in business analytics include SAP Business Objects, Hadoop, Python, and Ruby on Rails. d. Certifications in high demand in business analytics include SAP Business Objects, Hadoop, Python, and Ruby on Rails.

Copyright Cengage Learning. Powered by Cognero.

Page 63


Chapter 01 - Information Systems: People, Technology, Processes, and Structure POINTS: 1 DIFFICULTY: Easy REFERENCES: Continuous Education QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.9 - Identify two benefits of obtaining a certification in an IS subject area. KEYWORDS: Bloom's: Remember DATE CREATED: 12/6/2019 4:49 PM DATE MODIFIED: 12/6/2019 5:04 PM 83. Tracey has an endorsement from an authority (a high-profile technology vendor) that she is capable of performing a set of tasks. What process has Tracey completed? a. registration b. business analytics c. strategic planning d. certification ANSWER: d RATIONALE: Certification is a process for testing skills and knowledge; successful completion of a certification exam results in an endorsement by the certifying authority that an individual is capable of performing particular tasks or jobs. Certification frequently involves specific, vendor-provided, or vendor-endorsed coursework. FEEDBACK: a. Certification is a process for testing skills and knowledge; successful completion of a certification exam results in an endorsement by the certifying authority that an individual is capable of performing particular tasks or jobs. b. Certification is a process for testing skills and knowledge; successful completion of a certification exam results in an endorsement by the certifying authority that an individual is capable of performing particular tasks or jobs. c. Certification is a process for testing skills and knowledge; successful completion of a certification exam results in an endorsement by the certifying authority that an individual is capable of performing particular tasks or jobs. d. Certification is a process for testing skills and knowledge; successful completion of a certification exam results in an endorsement by the certifying authority that an individual is capable of performing particular tasks or jobs.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Continuous Education QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.9 - Identify two benefits of obtaining a certification in an IS subject area. KEYWORDS: Bloom's: Remember DATE CREATED: 12/6/2019 5:05 PM DATE MODIFIED: 12/6/2019 5:15 PM 84. Why would Claire, who has a Certified Information Systems Security Professional credential, object to shadow IT efforts at her company? a. Issues can arise over the responsibility to fix shadow IT solutions when they break. b. Shadow IT provides the opportunity to evaluate and test many more information system initiatives. Copyright Cengage Learning. Powered by Cognero.

Page 64


Chapter 01 - Information Systems: People, Technology, Processes, and Structure c. Shadow IT systems and processes may lack necessary levels of security required to meet compliance standards. d. Shadow IT delays testing of quick solutions to business needs. ANSWER: c RATIONALE: The Certified Information Systems Security Professional (CISSP) title indicates that someone has a certification in networking/security. Shadow IT solutions frequently employ nonapproved vendors, software, or hardware and may not meet the IS department standards for control, documentation, security, support, and reliability. This raises security risks and issues regarding compliance with essential government and industry standards. An information systems security analyst seeks to protect security and IS integrity by reducing risks. FEEDBACK: a. Shadow IT solutions frequently employ nonapproved vendors, software, or hardware and may not meet the IS department standards for control, documentation, security, support, and reliability. This raises security risks and issues regarding compliance with essential government and industry standards. b. Shadow IT solutions frequently employ nonapproved vendors, software, or hardware and may not meet the IS department standards for control, documentation, security, support, and reliability. This raises security risks and issues regarding compliance with essential government and industry standards. c. Shadow IT solutions frequently employ nonapproved vendors, software, or hardware and may not meet the IS department standards for control, documentation, security, support, and reliability. This raises security risks and issues regarding compliance with essential government and industry standards. d. Shadow IT solutions frequently employ nonapproved vendors, software, or hardware and may not meet the IS department standards for control, documentation, security, support, and reliability. This raises security risks and issues regarding compliance with essential government and industry standards.

POINTS: DIFFICULTY: REFERENCES:

1 Moderate Shadow IT Continuous Education QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.9 - Identify two benefits of obtaining a certification in an IS subject area. KEYWORDS: Bloom's: Remember DATE CREATED: 12/6/2019 5:16 PM DATE MODIFIED: 12/6/2019 5:31 PM 85. Clive completes specific coursework provided by a vendor to help him prepare to take an examination so that he can obtain _____. a. retirement benefits b. enterprise IS access c. a shadow IT position d. a certification ANSWER: d RATIONALE: Certification is a process for testing skills and knowledge; successful completion of a certification exam results in an endorsement by the certifying authority that an individual is capable of performing particular tasks or jobs. Certification frequently involves specific, vendor-provided, or vendor-endorsed coursework. Copyright Cengage Learning. Powered by Cognero.

Page 65


Chapter 01 - Information Systems: People, Technology, Processes, and Structure FEEDBACK:

a. Certification frequently involves specific, vendor-provided, or vendor-endorsed coursework.

b. Certification frequently involves specific, vendor-provided, or vendor-endorsed coursework. c. Certification frequently involves specific, vendor-provided, or vendor-endorsed coursework. d. Certification frequently involves specific, vendor-provided, or vendor-endorsed coursework.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Continuous Education QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.1.9 - Identify two benefits of obtaining a certification in an IS subject area. KEYWORDS: Bloom's: Remember DATE CREATED: 12/6/2019 5:32 PM DATE MODIFIED: 12/6/2019 5:41 PM Essay 86. Describe and name examples of the four types of information systems classified based on their sphere of influence. ANSWER: It is useful to divide information systems into four types based on their sphere of influence: personal information system, workgroup information system, enterprise information system, and interorganizational information system. Personal information systems include information systems that improve the productivity of individual users in performing stand-alone tasks. Examples of personal IS include wordprocessing, presentation, time management, and spreadsheet software. A workgroup information system supports teamwork and enables people to work together effectively, whether team members are in the same location or dispersed around the world. These systems are also known as collaboration systems. Examples of workgroup information systems include instant messaging software, electronic conferencing software, and collaboration software used to move groups through the steps of a process toward their goals. An enterprise information system is used to meet organization-wide business needs and typically shares data with other enterprise applications used within the organization. Enterprise applications support processes in logistics, manufacturing, human resources, marketing and sales, order processing, accounting, inventory control, customer relationship management, and other essential business functions. These processes require cross-functional collaboration with employees from multiple organizational units. Enterprise applications are required to comply with an organization’s security guidelines and may also be required to comply with standards defined by government agencies or industry groups to which the organization belongs. An interorganizational IS enables the sharing of information across organizational boundaries. Information sharing supports collaboration between two or more organizations and provides benefits such as lower costs, reduced manual effort, and decreased time to conduct business. Many different types of IOS exist, and they vary in purpose and scope. Electronic data interchange (EDI) is an interorganizational information system that expedites Copyright Cengage Learning. Powered by Cognero.

Page 66


Chapter 01 - Information Systems: People, Technology, Processes, and Structure

RATIONALE:

purchasing, invoicing, and payment by sending orders, invoices, and payments in standardized electronic message formats from one organization’s computer to another organization’s computer. Walmart employs an interorganizational information system it calls vendor-managed inventory (VMI) to streamline product flow and better manage its store inventories. It is useful to divide information systems into four types based on their sphere of influence: personal information system, workgroup information system, enterprise information system, and interorganizational information system. Personal information systems include information systems that improve the productivity of individual users in performing stand-alone tasks. Examples of personal IS include wordprocessing, presentation, time management, and spreadsheet software. A workgroup information system supports teamwork and enables people to work together effectively, whether team members are in the same location or dispersed around the world. These systems are also known as collaboration systems. Examples of workgroup information systems include instant messaging software, electronic conferencing software, and collaboration software used to move groups through the steps of a process toward their goals. An enterprise information system is used to meet organization-wide business needs and typically shares data with other enterprise applications used within the organization. Enterprise applications support processes in logistics, manufacturing, human resources, marketing and sales, order processing, accounting, inventory control, customer relationship management, and other essential business functions. These processes require cross-functional collaboration with employees from multiple organizational units. Enterprise applications are required to comply with an organization’s security guidelines and may also be required to comply with standards defined by government agencies or industry groups to which the organization belongs.

POINTS: RUBRIC:

An interorganizational IS enables the sharing of information across organizational boundaries. Information sharing supports collaboration between two or more organizations and provides benefits such as lower costs, reduced manual effort, and decreased time to conduct business. Many different types of IOS exist, and they vary in purpose and scope. Electronic data interchange (EDI) is an interorganizational information system that expedites purchasing, invoicing, and payment by sending orders, invoices, and payments in standardized electronic message formats from one organization’s computer to another organization’s computer. Walmart employs an interorganizational information system it calls vendor-managed inventory (VMI) to streamline product flow and better manage its store inventories. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Identifies the four types of information systems. Defines each type. Lists examples of each type.

DIFFICULTY:

Moderate

Copyright Cengage Learning. Powered by Cognero.

Page 67


Chapter 01 - Information Systems: People, Technology, Processes, and Structure REFERENCES: Types of Information Systems QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.1.3 - Describe four fundamental information system types based on their sphere of influence. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:59 PM DATE MODIFIED: 11/28/2019 7:31 AM 87. Define the term value chain and briefly discuss the purpose of the supply chain component in a manufacturing organization. ANSWER: The value chain is a series (chain) of activities that an organization performs to transform inputs into outputs in such a way that the value of the input is increased. In a manufacturing organization, the supply chain is a key value chain whose primary processes include inbound logistics, operations, outbound logistics, marketing and sales, and service. These primary activities are directly concerned with the creation and/or delivery of the product or service. There are also four main support processes, including technology infrastructure, human resource management, accounting and finance, and procurement. RATIONALE: The value chain is a series (chain) of activities that an organization performs to transform inputs into outputs in such a way that the value of the input is increased. In a manufacturing organization, the supply chain is a key value chain whose primary processes include inbound logistics, operations, outbound logistics, marketing and sales, and service. These primary activities are directly concerned with the creation and/or delivery of the product or service. There are also four main support processes, including technology infrastructure, human resource management, accounting and finance, and procurement. POINTS: 1 RUBRIC: 0 1 2 3 4 Criteria

Failure

Below Expectations

Developing

Competent

Mastery

Defines the term "value chain." Discusses the purposes of the manufacturing organization's supply chain.

DIFFICULTY: Moderate REFERENCES: Value Chain QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.1.4 - Discuss the traditional and contemporary view of the role that information systems play in an organization’s value chains. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:59 PM Copyright Cengage Learning. Powered by Cognero.

Page 68


Chapter 01 - Information Systems: People, Technology, Processes, and Structure DATE MODIFIED:

11/28/2019 7:30 AM

88. Identify three ways the IS organization can be perceived by the rest of the organization, and how each can influence the IS strategy. ANSWER: An IS organization can be viewed as a cost center/service provider, as a business partner/business peer, or as a game changer. The strategic planning process for the IS organization is also strongly influenced by how the IS organization is perceived by the rest of the organization.

RATIONALE:

POINTS: RUBRIC:

When the IS organization is viewed as a cost center/service provider that is expected to reduce IS costs and improve IS services., its strategic planning process is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better. An IS organization that is viewed as a business partner/business peer is expected to control IS costs and to expand IS services in support of business initiatives. The strategic planning process of these organizations is based on understanding the collective business plans for the next year and determining what those mean for the IS organization in terms of new technologies, vendors, competencies, people, systems, and projects. When an IS organization is viewed by fellow employees as a game-changing organization that is asked to lead product innovation efforts and open new markets, its strategic planning process is outwardly focused and involves meeting with customers, suppliers, and leading IS consultants and vendors to answer questions like “What do we want to be?” and “How can we create competitive advantage?” In such organizations, IS is not only a means for implementing business-defined objectives but also a catalyst for achieving new business objectives unreachable without IS. An IS organization can be viewed as a cost center/service provider, as a business partner/business peer, or as a game changer. The strategic planning process for the IS organization is also strongly influenced by how the IS organization is perceived by the rest of the organization. When the IS organization is viewed as a cost center/service provider that is expected to reduce IS costs and improve IS services., its strategic planning process is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better. An IS organization that is viewed as a business partner/business peer is expected to control IS costs and to expand IS services in support of business initiatives. The strategic planning process of these organizations is based on understanding the collective business plans for the next year and determining what those mean for the IS organization in terms of new technologies, vendors, competencies, people, systems, and projects. When an IS organization is viewed by fellow employees as a game-changing organization that is asked to lead product innovation efforts and open new markets, its strategic planning process is outwardly focused and involves meeting with customers, suppliers, and leading IS consultants and vendors to answer questions like “What do we want to be?” and “How can we create competitive advantage?” In such organizations, IS is not only a means for implementing business-defined objectives but also a catalyst for achieving new business objectives unreachable without IS. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Identifies three ways an IS organization can be perceived by the rest of the organization. Copyright Cengage Learning. Powered by Cognero.

Page 69


Chapter 01 - Information Systems: People, Technology, Processes, and Structure Explains how IS strategy is influenced by each of the three views of the IS organization.

DIFFICULTY: Moderate REFERENCES: Information System Strategic Planning QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.1.7 - Identify three ways the IS organization can be perceived by the rest of the organization, and how each can influence the IS strategy. KEYWORDS: Bloom's: Remember DATE CREATED: 12/6/2019 2:06 PM DATE MODIFIED: 12/6/2019 2:07 PM 89. Describe two major perspectives on the role information systems play in supply chain management activities. ANSWER: What role do information systems play in supply chain management activities and other organizational activities? A traditional view of information systems holds that organizations use information systems to control and monitor processes and to ensure effectiveness and efficiency. In this view, information systems are external to the supply chain management process and serve to monitor or control it. A more contemporary view, however, holds that information systems are often so intimately involved that they are part of the process itself. From this perspective, the information system plays an integral role in the process, whether providing input, aiding product transformation, or producing output. RATIONALE: What role do information systems play in supply chain management activities and other organizational activities? A traditional view of information systems holds that organizations use information systems to control and monitor processes and to ensure effectiveness and efficiency. In this view, information systems are external to the supply chain management process and serve to monitor or control it. A more contemporary view, however, holds that information systems are often so intimately involved that they are part of the process itself. From this perspective, the information system plays an integral role in the process, whether providing input, aiding product transformation, or producing output. POINTS: 1 RUBRIC: 0 1 2 3 4 Criteria

Failure

Below Expectations

Developing

Competent

Mastery

Describes the traditional view of information systems' role in supply chain management. Describes the contemporary view of information systems' role in supply chain management.

DIFFICULTY: REFERENCES:

Easy Value Chain

Copyright Cengage Learning. Powered by Cognero.

Page 70


Chapter 01 - Information Systems: People, Technology, Processes, and Structure QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.1.4 - Discuss the traditional and contemporary view of the role that information systems play in an organization’s value chains. KEYWORDS: Bloom's: Remember DATE CREATED: 12/2/2019 5:45 PM DATE MODIFIED: 12/2/2019 5:49 PM 90. What is certification? Name two benefits of earning a certification in an IS subject area and one topic area for which certifications are in high demand. ANSWER: Certification is a process for testing skills and knowledge; successful completion of a certification exam results in an endorsement by the certifying authority that an individual is capable of performing particular tasks or jobs. Certification frequently involves specific, vendor-provided, or vendor-endorsed coursework. Getting certified from a software, database, or network company may open the door to new career possibilities or result in an increase in pay.

RATIONALE:

POINTS: RUBRIC:

High-demand areas of certification include application and web development, database administration, business analytics, networking/security, and project management. Certification is a process for testing skills and knowledge; successful completion of a certification exam results in an endorsement by the certifying authority that an individual is capable of performing particular tasks or jobs. Certification frequently involves specific, vendor-provided, or vendor-endorsed coursework. Getting certified from a software, database, or network company may open the door to new career possibilities or result in an increase in pay. High-demand areas of certification include application and web development, database administration, business analytics, networking/security, and project management (see Table 1.5). 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Define "certification." Name two benefits of obtaining a certification. Name one area of certification in high demand (from Table 1.5).

DIFFICULTY: Moderate REFERENCES: Continuous Education QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.1.9 - Identify two benefits of obtaining a certification in an IS subject area. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 71


Chapter 01 - Information Systems: People, Technology, Processes, and Structure DATE CREATED: DATE MODIFIED:

12/6/2019 4:09 PM 12/6/2019 4:15 PM

Copyright Cengage Learning. Powered by Cognero.

Page 72


Chapter 02 - Secure Information Systems True / False 1. As the complexity of a network increases, the possibility of security breaches decreases. a. True b. False ANSWER: False RATIONALE: The computing environment continues to increase in complexity every day and soon will include billions of communicating devices. The number of possible entry points to a network expands continually as more devices are added, further increasing the possibility of security breaches. FEEDBACK: Correct The computing environment continues to increase in complexity every day and soon will include billions of communicating devices. The number of possible entry points to a network expands continually as more devices are added, further increasing the possibility of security breaches. Incorrect The computing environment continues to increase in complexity every day and soon will include billions of communicating devices. The number of possible entry points to a network expands continually as more devices are added, further increasing the possibility of security breaches.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Why Computer Incidents Are So Prevalent QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.1 - State four reasons why computer incidents have become so prevalent. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/15/2019 4:26 PM 2. An attack that takes place before the security community and/or software developers become aware of and fix a security vulnerability is called a zero-day attack. a. True b. False ANSWER: True RATIONALE: Of special concern is a zero-day attack, which is an attack that takes place before the security community becomes aware of and fixes a security vulnerability. Zero-day attacks are rare—just eight were identified in 2016 and 49 were identified in 2017. FEEDBACK: Correct Of special concern is a zero-day attack, which is an attack that takes place before the security community becomes aware of and fixes a security vulnerability. Zero-day attacks are rare—just eight were identified in 2016 and 49 were identified in 2017. Incorrect Of special concern is a zero-day attack, which is an attack that takes place before the security community becomes aware of and fixes a security vulnerability. Zero-day attacks are rare—just eight were identified in 2016 and 49 were identified in 2017.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 02 - Secure Information Systems REFERENCES: Why Computer Incidents Are So Prevalent QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.1 - State four reasons why computer incidents have become so prevalent. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/20/2019 4:00 PM 3. Discovery of a vulnerability in a software program can potentially be sold to the government. a. True b. False ANSWER: True RATIONALE: While one would hope that the discoverer of a zero-day vulnerability would immediately inform the original software manufacturer so that a fix could be created for the problem, that is not always the case. In some cases, this knowledge is instead sold on the black market to cyberterrorists, governments, or large organizations that may then use it to launch their own cyberattacks. FEEDBACK: Correct In some cases, knowledge of a zero-day vulnerability is sold on the black market to cyberterrorists, governments, or large organizations that may then use it to launch their own cyberattacks. Incorrect In some cases, knowledge of a zero-day vulnerability is sold on the black market to cyberterrorists, governments, or large organizations that may then use it to launch their own cyberattacks.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Why Computer Incidents Are So Prevalent QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.1 - State four reasons why computer incidents have become so prevalent. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/20/2019 4:08 PM 4. You see a deceptive pop-up that says that your computer is infected, and then you are forced to visit a website where you pay for "computer clean-up" in order to access data from your hard drive. You have just become a victim of ransomware. a. True b. False ANSWER: True RATIONALE: Ransomware is malware that stops you from using your computer or accessing the data on your computer until you meet certain demands, such as paying a ransom or, in some cases, sending compromising photos to the attacker. Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 02 - Secure Information Systems FEEDBACK:

Correct

Ransomware is malware that stops you from using your computer or accessing the data on your computer until you meet certain demands, such as paying a ransom or, in some cases, sending compromising photos to the attacker. Incorrect Ransomware is malware that stops you from using your computer or accessing the data on your computer until you meet certain demands, such as paying a ransom or, in some cases, sending compromising photos to the attacker.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Cyberattacks That Pose Serious Threats QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.5 - Identify five cyberthreats that pose a serious threat for organizations. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/20/2019 4:14 PM 5. Even legitimate organizations sometimes use worms, unsolicited email messages sent to large numbers of people, to promote their products. a. True b. False ANSWER: False RATIONALE: There are numerous types of attack vectors. One is spam, the use of email systems to send unsolicited email to large numbers of people. Another is a worm, a harmful program that resides in the active memory of the computer and duplicates itself. FEEDBACK: Correct A worm is a harmful program that resides in the active memory of the computer and duplicates itself. Incorrect A worm is a harmful program that resides in the active memory of the computer and duplicates itself.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Types of Attack Vectors QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.4 - Identify at least three commonly used attack vectors. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/20/2019 4:24 PM 6. A zombie computer sends requests for access to a target site again and again. a. True b. False ANSWER: True RATIONALE: In a DDoS attack, a tiny program is downloaded surreptitiously from the attacker’s Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 02 - Secure Information Systems computer to dozens, hundreds, or even thousands of computers all over the world. The term botnet is used to describe a large group of such computers, which are controlled from one or more remote locations by hackers, without the knowledge or consent of their legitimate owners. Based on a command by the attacker or at a preset time, the botnet computers (called zombies) go into action, each sending a simple request for access to the target site again and again—dozens of times per second. FEEDBACK:

Correct

In a DDoS attack, botnet computers (called zombies) go into action, each sending a simple request for access to the target site again and again—dozens of times per second. Incorrect In a DDoS attack, botnet computers (called zombies) go into action, each sending a simple request for access to the target site again and again—dozens of times per second.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Cyberattacks That Pose Serious Threats QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.5 - Identify five cyberthreats that pose a serious threat for organizations. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/20/2019 4:32 PM 7. When you receive a text message that there is a problem with your bank account and you are required you to click on a link to submit some information, you are likely facing a vishing attack. a. True b. False ANSWER: False RATIONALE: There are numerous types of attack vectors. One is phishing, the act of fraudulently using email to try to get the recipient to reveal personal data. Smishing is a variation of phishing that involves the use of texting. Vishing is similar to smishing except that the victims receive a voice mail message telling them to call a phone number or access a Web site. FEEDBACK: Correct Smishing is a variation of phishing that involves the use of texting. Vishing is similar to smishing except that the victims receive a voice mail message telling them to call a phone number or access a Web site. Incorrect Smishing is a variation of phishing that involves the use of texting. Vishing is similar to smishing except that the victims receive a voice mail message telling them to call a phone number or access a Web site.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Types of Attack Vectors QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.4 - Identify at least three commonly used attack vectors. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 02 - Secure Information Systems DATE CREATED: DATE MODIFIED:

11/19/2019 5:58 PM 12/20/2019 4:36 PM

8. You discover that an unknown party has gained administrator-level access to your computer, but the programs allowing this invasion are not visible to the legitimate system administrators. You have probably been hit by a rootkit. a. True b. False ANSWER: True RATIONALE: There are numerous types of attack vectors. One is a rootkit, a set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system and even obscure the presence of the rootkit from legitimate system administrators. FEEDBACK: Correct A rootkit is a set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system and even obscure the presence of the rootkit from legitimate system administrators. Incorrect A rootkit is a set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system and even obscure the presence of the rootkit from legitimate system administrators.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Types of Attack Vectors QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.4 - Identify at least three commonly used attack vectors. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/20/2019 4:41 PM 9. Downloading games from unknown websites can be risky. The software may be a Trojan horse. a. True b. False ANSWER: True RATIONALE: There are numerous types of attack vectors. One is a Trojan horse, a seemingly harmless program in which malicious code is hidden. A victim on the receiving end of a Trojan horse is usually tricked into opening it because it appears to be useful software from a legitimate source. FEEDBACK: Correct A Trojan horse is a seemingly harmless program in which malicious code is hidden. A victim on the receiving end of a Trojan horse is usually tricked into opening it because it appears to be useful software from a legitimate source. Incorrect A Trojan horse is a seemingly harmless program in which malicious code is hidden. A victim on the receiving end of a Trojan horse is usually tricked into opening it because it appears to be useful software from a legitimate source.

POINTS: DIFFICULTY: REFERENCES:

1 Moderate Types of Attack Vectors

Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 02 - Secure Information Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.4 - Identify at least three commonly used attack vectors. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/20/2019 4:44 PM 10. You work at a call center of a large bank, where you answer credit card services-related questions from customers. Lately, you have noticed an increased number of customers enquiring whether your organization initiated a call about their account. There might be a vishing scam in progress. a. True b. False ANSWER: True RATIONALE: There are numerous types of attack vectors. One is vishing, in which victims receive a voice mail message telling them to call a phone number or access a Web site. This is a way to fraudulently try to get the recipient to reveal personal data. FEEDBACK: Correct In vishing, victims receive a voice mail message telling them to call a phone number or access a Web site. Incorrect In vishing, victims receive a voice mail message telling them to call a phone number or access a Web site.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Types of Attack Vectors QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.4 - Identify at least three commonly used attack vectors. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/20/2019 4:54 PM 11. Transmitting a program, code, or command that causes harm to a computer is a crime. a. True b. False ANSWER: True RATIONALE: Over the years, the United States Congress has enacted multiple laws to help prosecute those responsible for computer-related crime. The Computer Fraud and Abuse Act addresses fraud and related activities in association with computers, including transmitting a program, code, or command that causes harm to a computer. FEEDBACK: Correct The Computer Fraud and Abuse Act addresses fraud and related activities in association with computers, including transmitting a program, code, or command that causes harm to a computer. Incorrect The Computer Fraud and Abuse Act addresses fraud and related activities in association with computers, including transmitting a program, code, or command that causes harm to a computer.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 02 - Secure Information Systems DIFFICULTY: Easy REFERENCES: Federal Laws for Prosecuting Computer Attacks QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.7 - Identify five federal laws that address computer crime. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/22/2019 5:47 PM 12. Those convicted of cyberterrorism are subject to a prison term of 6 months to 1 year. a. True b. False ANSWER: False RATIONALE: Those convicted of cyberterrorism are subject to a prison term of 5–20 years. FEEDBACK: Correct Those convicted of cyberterrorism are subject to a prison term of 5–20 years. Incorrect Those convicted of cyberterrorism are subject to a prison term of 5–20 years.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Federal Laws for Prosecuting Computer Attacks QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.7 - Identify five federal laws that address computer crime. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/22/2019 5:53 PM 13. A strong security program begins by assessing the backgrounds of the employees in the organization. a. True b. False ANSWER: False RATIONALE: Confidentiality, integrity, and availability are referred to as the CIA security triad. Implementing CIA begins at the organizational level with the definition of an overall security strategy, performance of a risk assessment, laying out plans for disaster recovery, setting security policies, conducting security audits, ensuring regulatory standards compliance, and creating a security dashboard. FEEDBACK: Correct Implementing CIA begins at the organizational level with the definition of an overall security strategy, performance of a risk assessment, laying out plans for disaster recovery, setting security policies, conducting security audits, ensuring regulatory standards compliance, and creating a security dashboard. Incorrect Implementing CIA begins at the organizational level with the definition of an overall security strategy, performance of a risk assessment, laying out plans for disaster recovery, setting security policies, conducting security audits, ensuring regulatory standards compliance, and creating a security dashboard.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 02 - Secure Information Systems DIFFICULTY: Easy REFERENCES: Implementing CIA at the Organizational Level QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.8 - Discuss how the CIA security triad can be implemented at the organization, network, application, and end user levels to safeguard against cyberattacks. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/22/2019 5:58 PM 14. Default usernames and passwords should always be changed. a. True b. False ANSWER: True RATIONALE: System administrators must be vigilant about changing the default usernames and passwords for specific devices when they are added to an organization’s network. Cybercriminals and others looking to access the networks of various organizations can easily find information online regarding the default username and password combinations for many vendors’ products. FEEDBACK: Correct System administrators must be vigilant about changing the default usernames and passwords for specific devices when they are added to an organization’s network. Incorrect System administrators must be vigilant about changing the default usernames and passwords for specific devices when they are added to an organization’s network.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementing CIA at the Organizational Level QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.8 - Discuss how the CIA security triad can be implemented at the organization, network, application, and end user levels to safeguard against cyberattacks. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/22/2019 6:00 PM 15. An employee who is about to be laid off by his organization sends threatening emails to his boss, stating that he is going to delete sensitive data. This employee can be charged under the Computer Fraud and Abuse Act. a. True b. False ANSWER: True RATIONALE: The Computer Fraud and Abuse Act addresses fraud and related activities in association with computers, including accessing a computer without authorization or exceeding Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 02 - Secure Information Systems authorized access and threatening to cause damage to a protected computer. FEEDBACK:

Correct

The Computer Fraud and Abuse Act addresses fraud and related activities in association with computers, including accessing a computer without authorization or exceeding authorized access and threatening to cause damage to a protected computer. Incorrect The Computer Fraud and Abuse Act addresses fraud and related activities in association with computers, including accessing a computer without authorization or exceeding authorized access and threatening to cause damage to a protected computer.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Federal Laws for Prosecuting Computer Attacks QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.7 - Identify five federal laws that address computer crime. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/22/2019 6:04 PM 16. A "virus signature" contains the email address of the virus developer. a. True b. False ANSWER: False RATIONALE: Antivirus software should be installed on each user’s personal computer to scan a computer’s memory and disk drives regularly for viruses. Antivirus software scans for a specific sequence of bytes, known as a virus signature, that indicates the presence of a specific virus. FEEDBACK: Correct Antivirus software scans for a specific sequence of bytes, known as a virus signature, that indicates the presence of a specific virus. Incorrect Antivirus software scans for a specific sequence of bytes, known as a virus signature, that indicates the presence of a specific virus.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementing CIA at the End-User Level QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.8 - Discuss how the CIA security triad can be implemented at the organization, network, application, and end user levels to safeguard against cyberattacks. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/22/2019 6:07 PM 17. Any Internet traffic that is not explicitly permitted into the internal network is denied entry through a firewall. a. True Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 02 - Secure Information Systems b. False ANSWER: RATIONALE:

FEEDBACK:

True A firewall is a system of software, hardware, or a combination of both that stands guard between an organization’s internal network and the Internet, and limits network access based on the organization’s access policy. Any Internet traffic that is not explicitly permitted into the internal network is denied entry through a firewall. Correct

Any Internet traffic that is not explicitly permitted into the internal network is denied entry through a firewall. Incorrect Any Internet traffic that is not explicitly permitted into the internal network is denied entry through a firewall.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementing CIA at the Network Level QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.8 - Discuss how the CIA security triad can be implemented at the organization, network, application, and end user levels to safeguard against cyberattacks. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/22/2019 6:09 PM 18. Scanning a computer's hard drive for viruses is essential, but scanning live memory is only important in certain situations. a. True b. False ANSWER: False RATIONALE: Antivirus software should be installed on each user’s personal computer to scan a computer’s memory and disk drives regularly for viruses. Good antivirus software checks vital system files when the system is booted up, monitors the system continuously for virus-like activity, scans disks, scans memory when a program is run, checks programs when they are downloaded, and scans email attachments before they are opened. FEEDBACK: Correct Antivirus software should be installed on each user’s personal computer to scan a computer’s memory and disk drives regularly for viruses. Incorrect Antivirus software should be installed on each user’s personal computer to scan a computer’s memory and disk drives regularly for viruses.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementing CIA at the End-User Level QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.8 - Discuss how the CIA security triad can be implemented at the organization, network, application, and end user levels to safeguard against cyberattacks. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 02 - Secure Information Systems DATE CREATED: DATE MODIFIED:

11/19/2019 5:58 PM 12/22/2019 6:15 PM

19. When a computer security incident occurs, it is recommended that the organization NOT reveal all they know in public forums. a. True b. False ANSWER: True RATIONALE: A key element of any response plan is to define who to notify and who not to notify in the event of a computer security incident. Most security experts recommend against giving out specific information about a compromise in public forums, such as news reports, conferences, professional meetings, and online discussion groups. FEEDBACK: Correct Most security experts recommend against giving out specific information about a compromise in public forums, such as news reports, conferences, professional meetings, and online discussion groups. Incorrect Most security experts recommend against giving out specific information about a compromise in public forums, such as news reports, conferences, professional meetings, and online discussion groups.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Response QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.11 - Describe five actions an organization must take in response to a successful cyberattack. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/22/2019 6:18 PM 20. There are laws that require businesses to prove that their data are secure. a. True b. False ANSWER: True RATIONALE: Keeping up with computer criminals—and with new laws and regulations—can be daunting for organizations. Laws such as HIPAA, Sarbanes-Oxley, and the USA Patriot Act require businesses to prove that they are securing their data. FEEDBACK: Correct Laws such as HIPAA, Sarbanes-Oxley, and the USA Patriot Act require businesses to prove that they are securing their data. Incorrect Laws such as HIPAA, Sarbanes-Oxley, and the USA Patriot Act require businesses to prove that they are securing their data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Using a Managed Security Service Provider (MSSP) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.12 - Describe the role of a managed security service provider. Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 02 - Secure Information Systems NATIONAL STANDARDS: KEYWORDS: DATE CREATED: DATE MODIFIED:

United States - BUSPROG: Technology Bloom's: Remember 11/19/2019 5:58 PM 12/22/2019 6:26 PM

21. It is considered ethical for an organization to conceal information about a data loss event to avoid bad publicity and loss of customers. a. True b. False ANSWER: False RATIONALE: A critical ethical decision that must be made is what to tell customers and others whose personal data may have been compromised by a computer incident. Many organizations are tempted to conceal such information for fear of bad publicity and loss of customers. Because such inaction is perceived by many to be unethical and harmful, several state and federal laws have been passed to force organizations to reveal when customer data has been breached. FEEDBACK: Correct Many organizations are tempted to conceal information regarding whose personal data may have been compromised by a computer incident for fear of bad publicity and loss of customers, but such inaction is perceived by many to be unethical and harmful. Incorrect Many organizations are tempted to conceal information regarding whose personal data may have been compromised by a computer incident for fear of bad publicity and loss of customers, but such inaction is perceived by many to be unethical and harmful.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Response QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.11 - Describe five actions an organization must take in response to a successful cyberattack. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/26/2019 9:57 AM 22. If an attack is dangerous enough, it may warrant shutting down or disconnecting critical systems from the network. a. True b. False ANSWER: True RATIONALE: Often, it is necessary to act quickly to contain an attack and to keep a bad situation from becoming even worse. The incident response plan should clearly define the process for deciding if an attack is dangerous enough to warrant shutting down or disconnecting critical systems from the network. FEEDBACK: Correct Often, it is necessary to act quickly to contain an attack and to keep a bad situation from becoming even worse. The incident response plan should clearly define the process for deciding if an attack is dangerous enough to warrant shutting down or disconnecting critical systems from the network. Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 02 - Secure Information Systems Incorrect Often, it is necessary to act quickly to contain an attack and to keep a bad situation from becoming even worse. The incident response plan should clearly define the process for deciding if an attack is dangerous enough to warrant shutting down or disconnecting critical systems from the network.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Response QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.11 - Describe five actions an organization must take in response to a successful cyberattack. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/26/2019 10:01 AM 23. Suppose your computer network was compromised in a large-scale virus attack last Thursday. Most of the data files were corrupted beyond repair. The last data backup was done the Sunday before the virus attack. This means your company has an adequate backup process in place. a. True b. False ANSWER: False RATIONALE: It is imperative to back up critical applications and data regularly. Many organizations, however, have implemented inadequate backup processes and found that they could not fully restore original data after a security incident. All backups should be created with enough frequency to enable a full and quick restoration of data if an attack destroys the original, and this process must be tested to confirm that it works. FEEDBACK: Correct All backups should be created with enough frequency to enable a full and quick restoration of data if an attack destroys the original, and this process must be tested to confirm that it works. Incorrect All backups should be created with enough frequency to enable a full and quick restoration of data if an attack destroys the original, and this process must be tested to confirm that it works.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Response QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.11 - Describe five actions an organization must take in response to a successful cyberattack. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/26/2019 10:08 AM Multiple Choice Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 02 - Secure Information Systems 24. Someone who violates computer or Internet security maliciously or for illegal personal gain is known as a(n) _______. a. lone wolf attacker b. industrial spy c. hacktivist d. cyberterrorist ANSWER: a RATIONALE: A lone wolf attacker is someone who violates computer or Internet security maliciously or for illegal personal gain. Currently, although the lone wolf and cyberterrorist receive a lot of publicity, they are not considered among the most serious sources of cyberattacks. FEEDBACK: a. A lone wolf attacker is someone who violates computer or Internet security maliciously or for illegal personal gain. b. A lone wolf attacker is someone who violates computer or Internet security maliciously or for illegal personal gain. c. A lone wolf attacker is someone who violates computer or Internet security maliciously or for illegal personal gain. d. A lone wolf attacker is someone who violates computer or Internet security maliciously or for illegal personal gain.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Perpetrators Most Likely to Initiate a Cyberattack QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.2 - Identify four classes of perpetrators mostly likely to initiate a cyberattack. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/26/2019 10:13 AM 25. A hacktivist is someone who _______. a. attempts to gain financially and/or disrupt a company’s information systems and business operations b. hacks computers or Web sites in an attempt to promote a political ideology c. attempts to destroy the infrastructure components of governments d. violates computer or Internet security maliciously or for illegal personal gain ANSWER: b RATIONALE: A hacktivist is an individual who hacks computers or Web sites in order to promote a political ideology. FEEDBACK: a. A hacktivist is an individual who hacks computers or Web sites in order to promote a political ideology. b. A hacktivist is an individual who hacks computers or Web sites in order to promote a political ideology. c. A hacktivist is an individual who hacks computers or Web sites in order to promote a political ideology. d. A hacktivist is an individual who hacks computers or Web sites in order to promote a political ideology.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 02 - Secure Information Systems REFERENCES: Perpetrators Most Likely to Initiate a Cyberattack QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.2 - Identify four classes of perpetrators mostly likely to initiate a cyberattack. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/26/2019 11:07 AM 26. These days, the biggest threats to IT security are from ________. a. “geeks” working on their own and motivated by the desire to gain some degree of notoriety b. international drug cartels c. terrorist organizations d. organized groups that have ample resources, including money and sophisticated tools, to support their efforts ANSWER: d RATIONALE: Previously, computer troublemakers were stereotyped as introverted “geeks” who were working independently and who were motivated by the desire to gain some degree of notoriety. These individuals were armed with specialized, but limited, knowledge of computers and networks and used rudimentary tools, perhaps downloaded from the Internet, to execute exploits. While such individuals still exist, today’s computer menace is much better organized and may be part of an organized group (such as Anonymous, Chaos Computer Club, Lizard Squad, TeslaTeam) that has an agenda and that targets specific organizations and Web sites. Some of these groups have ample resources, including money and sophisticated tools, to support their efforts. FEEDBACK: a. Today’s computer menace is much better organized and may be part of an organized group that has an agenda and that targets specific organizations and Web sites. Some of these groups have ample resources, including money and sophisticated tools, to support their efforts. b. Today’s computer menace is much better organized and may be part of an organized group that has an agenda and that targets specific organizations and Web sites. Some of these groups have ample resources, including money and sophisticated tools, to support their efforts. c. Today’s computer menace is much better organized and may be part of an organized group that has an agenda and that targets specific organizations and Web sites. Some of these groups have ample resources, including money and sophisticated tools, to support their efforts. d. Today’s computer menace is much better organized and may be part of an organized group that has an agenda and that targets specific organizations and Web sites. Some of these groups have ample resources, including money and sophisticated tools, to support their efforts.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Why Computer Incidents Are So Prevalent QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.1 - State four reasons why computer incidents have become so prevalent. NATIONAL STANDARDS: United States - BUSPROG: Technology Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 02 - Secure Information Systems KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 11/19/2019 5:58 PM 12/26/2019 11:13 AM

27. Your business has a web server that has suddenly become unresponsive. When you study the server's logs there are a huge number of requests from what appear to be legitimate computers. The problem is likely because of _____. a. a CAPTCHA issue b. a distributed denial-of-service attack c. too many Spam emails d. a logic bomb ANSWER: b RATIONALE: A distributed denial-of-service (DDoS) attack is one in which a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks. The target computers become so overwhelmed by requests for service that legitimate users are unable to get through to the target computer. FEEDBACK: a. A distributed denial-of-service (DDoS) attack is one in which a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks. b. A distributed denial-of-service (DDoS) attack is one in which a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks. c. A distributed denial-of-service (DDoS) attack is one in which a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks. d. A distributed denial-of-service (DDoS) attack is one in which a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Cyberattacks That Pose Serious Threats QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.5 - Identify five cyberthreats that pose a serious threat for organizations. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/26/2019 11:19 AM 28. A botnet is a ____. a. network of robots that control an assembly line at a factory b. network of servers that exchange traffic data c. network of devices that are used for managing security d. network of computers that send out access requests to servers repeatedly ANSWER: d RATIONALE: The term botnet is used to describe a large group of such computers, which are controlled from one or more remote locations by hackers, without the knowledge or consent of their Copyright Cengage Learning. Powered by Cognero.

Page 16


Chapter 02 - Secure Information Systems legitimate owners. Based on a command by the attacker or at a preset time, the botnet computers (called zombies) go into action, each sending a simple request for access to the target site again and again—dozens of times per second. FEEDBACK:

a. The term botnet is used to describe a large group of such computers, which are controlled from one or more remote locations by hackers, without the knowledge or consent of their legitimate owners. Based on a command by the attacker or at a preset time, the botnet computers (called zombies) go into action, each sending a simple request for access to the target site again and again—dozens of times per second. b. The term botnet is used to describe a large group of such computers, which are controlled from one or more remote locations by hackers, without the knowledge or consent of their legitimate owners. Based on a command by the attacker or at a preset time, the botnet computers (called zombies) go into action, each sending a simple request for access to the target site again and again—dozens of times per second. c. The term botnet is used to describe a large group of such computers, which are controlled from one or more remote locations by hackers, without the knowledge or consent of their legitimate owners. Based on a command by the attacker or at a preset time, the botnet computers (called zombies) go into action, each sending a simple request for access to the target site again and again—dozens of times per second. d. The term botnet is used to describe a large group of such computers, which are controlled from one or more remote locations by hackers, without the knowledge or consent of their legitimate owners. Based on a command by the attacker or at a preset time, the botnet computers (called zombies) go into action, each sending a simple request for access to the target site again and again—dozens of times per second.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Cyberattacks That Pose Serious Threats QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.5 - Identify five cyberthreats that pose a serious threat for organizations. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/26/2019 11:22 AM 29. Once a _____ is installed, the attacker can gain full access to the computer. a. botnet b. zombie c. worm d. rootkit ANSWER: d RATIONALE: There are numerous types of attack vectors. One is a rootkit, a set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system and even obscure the presence of the rootkit from legitimate system administrators. FEEDBACK: a. Once a rootkit is installed, the attacker can gain full control of the system and Copyright Cengage Learning. Powered by Cognero.

Page 17


Chapter 02 - Secure Information Systems even obscure the presence of the rootkit from legitimate system administrators. b. Once a rootkit is installed, the attacker can gain full control of the system and even obscure the presence of the rootkit from legitimate system administrators. c. Once a rootkit is installed, the attacker can gain full control of the system and even obscure the presence of the rootkit from legitimate system administrators. d. Once a rootkit is installed, the attacker can gain full control of the system and even obscure the presence of the rootkit from legitimate system administrators.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Types of Attack Vectors QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.4 - Identify at least three commonly used attack vectors. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/26/2019 11:27 AM 30. The purpose of an advanced persistent threat usually is to ____. a. steal money b. interrupt service c. steal data d. annoy the users ANSWER: c RATIONALE: There are numerous types of attack vectors. One is an advanced persistent threat, a network attack in which an intruder gains access to a network and stays there—undetected—with the intention of stealing data over a long period of time. FEEDBACK: a. An advanced persistent threat is a network attack in which an intruder gains access to a network and stays there—undetected—with the intention of stealing data over a long period of time. b. An advanced persistent threat is a network attack in which an intruder gains access to a network and stays there—undetected—with the intention of stealing data over a long period of time. c. An advanced persistent threat is a network attack in which an intruder gains access to a network and stays there—undetected—with the intention of stealing data over a long period of time. d. An advanced persistent threat is a network attack in which an intruder gains access to a network and stays there—undetected—with the intention of stealing data over a long period of time.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Types of Attack Vectors QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.4 - Identify at least three commonly used attack vectors. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 18


Chapter 02 - Secure Information Systems DATE CREATED: DATE MODIFIED:

11/19/2019 5:58 PM 12/26/2019 11:31 AM

31. The US-CERT incident reporting system is used to ____. a. alert the bank about stolen credit cards b. alert the government about missing computers c. alert the Border Patrol about undocumented workers d. alert the Department of Homeland Security about information security incidents ANSWER: d RATIONALE: The Department of Homeland Security Web site (www.dhs.gov) provides a link that enables users to report cyber incidents. Incident reports go to the US-CERT Incident Reporting System, which assists analysts of the U.S. Computer Emergency Readiness Team (US-CERT) (a partnership between the Department of Homeland Security and the public and private sectors) in providing timely handling of security incidents as well as in conducting improved analysis of such incidents. Established in 2003 to protect the nation’s Internet infrastructure against cyberattacks, US-CERT serves as a clearinghouse for information on new viruses, worms, and other computer security topics. FEEDBACK: a. Incident reports go to the US-CERT Incident Reporting System, which assists analysts of the U.S. Computer Emergency Readiness Team (US-CERT) (a partnership between the Department of Homeland Security and the public and private sectors) in providing timely handling of security incidents as well as in conducting improved analysis of such incidents. b. Incident reports go to the US-CERT Incident Reporting System, which assists analysts of the U.S. Computer Emergency Readiness Team (US-CERT) (a partnership between the Department of Homeland Security and the public and private sectors) in providing timely handling of security incidents as well as in conducting improved analysis of such incidents. c. Incident reports go to the US-CERT Incident Reporting System, which assists analysts of the U.S. Computer Emergency Readiness Team (US-CERT) (a partnership between the Department of Homeland Security and the public and private sectors) in providing timely handling of security incidents as well as in conducting improved analysis of such incidents. d. Incident reports go to the US-CERT Incident Reporting System, which assists analysts of the U.S. Computer Emergency Readiness Team (US-CERT) (a partnership between the Department of Homeland Security and the public and private sectors) in providing timely handling of security incidents as well as in conducting improved analysis of such incidents.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Cyberattacks That Pose Serious Threats QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.5 - Identify five cyberthreats that pose a serious threat for organizations. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/26/2019 4:07 PM 32. In a denial-of-service (DDoS) attack, the perpetrator ____. Copyright Cengage Learning. Powered by Cognero.

Page 19


Chapter 02 - Secure Information Systems a. instructs the zombie computers to send simple access requests to target computers b. sends out a huge number of spam emails to everyone in your contacts list c. changes the configuration information of the infected computers d. refuses to accept any email from any sender ANSWER: a RATIONALE: In a DDoS attack, a tiny program is downloaded surreptitiously from the attacker’s computer to dozens, hundreds, or even thousands of computers all over the world. The term botnet is used to describe a large group of such computers, which are controlled from one or more remote locations by hackers, without the knowledge or consent of their legitimate owners. Based on a command by the attacker or at a preset time, the botnet computers (called zombies) go into action, each sending a simple request for access to the target site again and again—dozens of times per second. FEEDBACK: a. In a DDoS attack, based on a command by the attacker or at a preset time, the botnet computers (called zombies) each send a simple request for access to the target site again and again—dozens of times per second. b. In a DDoS attack, based on a command by the attacker or at a preset time, the botnet computers (called zombies) each send a simple request for access to the target site again and again—dozens of times per second. c. In a DDoS attack, based on a command by the attacker or at a preset time, the botnet computers (called zombies) each send a simple request for access to the target site again and again—dozens of times per second. d. In a DDoS attack, based on a command by the attacker or at a preset time, the botnet computers (called zombies) each send a simple request for access to the target site again and again—dozens of times per second.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Cyberattacks That Pose Serious Threats QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.5 - Identify five cyberthreats that pose a serious threat for organizations. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/26/2019 4:14 PM 33. A company's risk assessment process can consider numerous threats to the computers and networks. Which of the following should an organization identify as loss events or threats to assess? a. distributed denial-of-service attack b. email attachment with harmful worm c. harmful virus d. all of the above ANSWER: d RATIONALE: Step 2 of the risk assessment process is to identify the loss events or the risks or threats that could occur. Table 2.4 identifies the following examples of such adverse events: data breach of customer account data, distributed denial-of-service (DDoS) attack, email attachment with harmful worm, harmful viruses, and invoice and payment fraud. Copyright Cengage Learning. Powered by Cognero.

Page 20


Chapter 02 - Secure Information Systems FEEDBACK:

a. Table 2.4 identifies the following examples of such adverse events: data breach of customer account data, distributed denial-of-service (DDoS) attack, email attachment with harmful worm, harmful viruses, and invoice and payment fraud. b. Table 2.4 identifies the following examples of such adverse events: data breach of customer account data, distributed denial-of-service (DDoS) attack, email attachment with harmful worm, harmful viruses, and invoice and payment fraud. c. Table 2.4 identifies the following examples of such adverse events: data breach of customer account data, distributed denial-of-service (DDoS) attack, email attachment with harmful worm, harmful viruses, and invoice and payment fraud. d. Table 2.4 identifies the following examples of such adverse events: data breach of customer account data, distributed denial-of-service (DDoS) attack, email attachment with harmful worm, harmful viruses, and invoice and payment fraud.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementing CIA at the Organizational Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.8 - Discuss how the CIA security triad can be implemented at the organization, network, application, and end user levels to safeguard against cyberattacks. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/26/2019 4:25 PM 34. Which of the following laws covers false claims regarding unauthorized use of credit cards? a. Computer Fraud and Abuse Act b. Fraud and Related Activity in Connection with Access Devices Statute c. Identity Theft and Assumption Deterrence Act d. Stored Wire and Electronic Communications and Transactional Records Access Statutes ANSWER: b RATIONALE: The Fraud and Related Activity in Connection with Access Devices Statute (U.S. Code Title 18, Section 1029) covers false claims regarding unauthorized use of credit cards. FEEDBACK: a. The Fraud and Related Activity in Connection with Access Devices Statute (U.S. Code Title 18, Section 1029) covers false claims regarding unauthorized use of credit cards. b. The Fraud and Related Activity in Connection with Access Devices Statute (U.S. Code Title 18, Section 1029) covers false claims regarding unauthorized use of credit cards. c. The Fraud and Related Activity in Connection with Access Devices Statute (U.S. Code Title 18, Section 1029) covers false claims regarding unauthorized use of credit cards. d. The Fraud and Related Activity in Connection with Access Devices Statute (U.S. Code Title 18, Section 1029) covers false claims regarding unauthorized use of credit cards.

POINTS: DIFFICULTY: REFERENCES:

1 Easy Federal Laws for Prosecuting Computer Attacks

Copyright Cengage Learning. Powered by Cognero.

Page 21


Chapter 02 - Secure Information Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.7 - Identify five federal laws that address computer crime. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/26/2019 4:29 PM 35. Which of the following activities does the USA Patriot Act define? a. cyberterrorism b. identity theft c. credit card fraud d. transmitting virus programs ANSWER: a RATIONALE: The USA Patriot Act defines cyberterrorism and associated penalties. FEEDBACK: a. The USA Patriot Act defines cyberterrorism and associated penalties. b. The USA Patriot Act defines cyberterrorism and associated penalties. c. The USA Patriot Act defines cyberterrorism and associated penalties. d. The USA Patriot Act defines cyberterrorism and associated penalties. POINTS: 1 DIFFICULTY: Easy REFERENCES: Federal Laws for Prosecuting Computer Attacks QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.7 - Identify five federal laws that address computer crime. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/26/2019 4:31 PM 36. Which of these organizations offers guidelines on developing security policies? a. DHS b. SANS c. IBM d. CISCO ANSWER: b RATIONALE: The SANS (SysAdmin, Audit, Network, Security) Institute’s Web site (www.sans.org) offers several security-related policy templates that can help an organization to quickly develop effective security policies. FEEDBACK: a. The SANS (SysAdmin, Audit, Network, Security) Institute’s Web site offers several security-related policy templates that can help an organization to quickly develop effective security policies. b. The SANS (SysAdmin, Audit, Network, Security) Institute’s Web site offers several security-related policy templates that can help an organization to quickly develop effective security policies.

Copyright Cengage Learning. Powered by Cognero.

Page 22


Chapter 02 - Secure Information Systems c. The SANS (SysAdmin, Audit, Network, Security) Institute’s Web site offers several security-related policy templates that can help an organization to quickly develop effective security policies. d. The SANS (SysAdmin, Audit, Network, Security) Institute’s Web site offers several security-related policy templates that can help an organization to quickly develop effective security policies.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementing CIA at the Organizational Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.8 - Discuss how the CIA security triad can be implemented at the organization, network, application, and end user levels to safeguard against cyberattacks. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/26/2019 4:34 PM 37. You have been hired as the new Information Security consultant at XYZ Inc. Which of these employee behaviors would be a top security concern? a. leaving laptop computers unattended in public spaces b. using office computers for personal emails c. drinking water or coffee while working on computers d. banging on the keyboard when the computer is running slowly ANSWER: a RATIONALE: Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow security policies. Users must understand that they are a key part of the security system and that they have certain responsibilities. For example, users must help protect an organization’s information systems and data by taking care to ensure that portable computing and data storage devices are protected (hundreds of thousands of laptops are lost or stolen per year). FEEDBACK: a. Users must understand that they are a key part of the security system and that they have certain responsibilities. For example, users must help protect an organization’s information systems and data by taking care to ensure that portable computing and data storage devices are protected. b. Users must understand that they are a key part of the security system and that they have certain responsibilities. For example, users must help protect an organization’s information systems and data by taking care to ensure that portable computing and data storage devices are protected. c. Users must understand that they are a key part of the security system and that they have certain responsibilities. For example, users must help protect an organization’s information systems and data by taking care to ensure that portable computing and data storage devices are protected. d. Users must understand that they are a key part of the security system and that they have certain responsibilities. For example, users must help protect an organization’s information systems and data by taking care to ensure that portable computing and data storage devices are protected.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 23


Chapter 02 - Secure Information Systems DIFFICULTY: Moderate REFERENCES: Implementing CIA at the End-User Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.8 - Discuss how the CIA security triad can be implemented at the organization, network, application, and end user levels to safeguard against cyberattacks. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/26/2019 4:38 PM 38. Which of the following is the correct description of a firewall? a. software that deletes viruses from attachments b. hardware that prevents unauthorized data from entering a private network c. a software and hardware combination that limits incoming and outgoing Internet traffic d. a concept used in developing security policies ANSWER: c RATIONALE: A firewall is a system of software, hardware, or a combination of both that stands guard between an organization’s internal network and the Internet, and limits network access based on the organization’s access policy. Any Internet traffic that is not explicitly permitted into the internal network is denied entry through a firewall. Similarly, most firewalls can be configured so that internal network users can be blocked from gaining access to Web sites deemed inappropriate for employees. FEEDBACK: a. A firewall is a system of software, hardware, or a combination of both that stands guard between an organization’s internal network and the Internet, and limits network access based on the organization’s access policy. b. A firewall is a system of software, hardware, or a combination of both that stands guard between an organization’s internal network and the Internet, and limits network access based on the organization’s access policy. c. A firewall is a system of software, hardware, or a combination of both that stands guard between an organization’s internal network and the Internet, and limits network access based on the organization’s access policy. d. A firewall is a system of software, hardware, or a combination of both that stands guard between an organization’s internal network and the Internet, and limits network access based on the organization’s access policy.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementing CIA at the Network Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.8 - Discuss how the CIA security triad can be implemented at the organization, network, application, and end user levels to safeguard against cyberattacks. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:58 PM Copyright Cengage Learning. Powered by Cognero.

Page 24


Chapter 02 - Secure Information Systems DATE MODIFIED:

12/26/2019 4:42 PM

39. Which of the following is NOT a popular vendor of firewall software? a. Red Hat b. Check Point c. Kaspersky d. Total Defense ANSWER: a RATIONALE: Software vendors Agnitum, Check Point, Comodo, Kaspersky, and Total Defense provide some of the top-rated firewall software used to protect personal computers. Their software provides antivirus, firewall, antispam, parental control, and phishing protection capabilities and sell for $30–$80 per single user license. FEEDBACK: a. Software vendors Agnitum, Check Point, Comodo, Kaspersky, and Total Defense provide some of the top-rated firewall software used to protect personal computers. b. Software vendors Agnitum, Check Point, Comodo, Kaspersky, and Total Defense provide some of the top-rated firewall software used to protect personal computers. c. Software vendors Agnitum, Check Point, Comodo, Kaspersky, and Total Defense provide some of the top-rated firewall software used to protect personal computers. d. Software vendors Agnitum, Check Point, Comodo, Kaspersky, and Total Defense provide some of the top-rated firewall software used to protect personal computers.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementing CIA at the Network Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.8 - Discuss how the CIA security triad can be implemented at the organization, network, application, and end user levels to safeguard against cyberattacks. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/26/2019 4:44 PM 40. You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database. It is considered a security risk. What is an appropriate action to reduce the risk? a. Install a two-step login procedure, where the user has to key in additional information for logging in. b. Install and provide stronger anti-virus software on the users' computers. c. Tweak the firewall parameters so that outgoing traffic can be better controlled. d. Assign roles and privileges to users so that only job-relevant data is accessible to the user. ANSWER: d RATIONALE: An important safeguard at the application level is the creation of roles and user accounts so that once users are authenticated, they have the authority to perform their responsibilities and nothing more. Even within one department, not all members should be given the same capabilities. Copyright Cengage Learning. Powered by Cognero.

Page 25


Chapter 02 - Secure Information Systems FEEDBACK:

a. An important safeguard at the application level is the creation of roles and user accounts so that once users are authenticated, they have the authority to perform their responsibilities and nothing more. b. An important safeguard at the application level is the creation of roles and user accounts so that once users are authenticated, they have the authority to perform their responsibilities and nothing more. c. An important safeguard at the application level is the creation of roles and user accounts so that once users are authenticated, they have the authority to perform their responsibilities and nothing more. d. An important safeguard at the application level is the creation of roles and user accounts so that once users are authenticated, they have the authority to perform their responsibilities and nothing more.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Implementing CIA at the Application Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.8 - Discuss how the CIA security triad can be implemented at the organization, network, application, and end user levels to safeguard against cyberattacks. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/26/2019 4:48 PM 41. Which of the following shortcomings may be revealed during an IT security audit? a. whether the IT budget is adequate or not b. whether the users are satisfied with IT services or not c. whether only the appropriate personnel have access to critical data d. whether the firewall is tall enough ANSWER: c RATIONALE: The security audit should review who has access to key systems and data and what level of authority each user has. It is not unusual for an audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs. FEEDBACK: a. The security audit should review who has access to key systems and data and what level of authority each user has. It is not unusual for an audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs. b. The security audit should review who has access to key systems and data and what level of authority each user has. It is not unusual for an audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs. c. The security audit should review who has access to key systems and data and what level of authority each user has. It is not unusual for an audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs. d. The security audit should review who has access to key systems and data and what level of authority each user has. It is not unusual for an audit to reveal that too many people have access to critical data and that many people have

Copyright Cengage Learning. Powered by Cognero.

Page 26


Chapter 02 - Secure Information Systems capabilities beyond those needed to perform their jobs.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementing CIA at the Organizational Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.8 - Discuss how the CIA security triad can be implemented at the organization, network, application, and end user levels to safeguard against cyberattacks. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/26/2019 4:54 PM 42. Assume your organization is experiencing an intruder attack. You have an intrusion detection system (IDS) set up. Which of the following events occurs first? a. Messages from the IDS are routed to the network security team. b. The IDS warns the firewall of suspicious traffic. c. The network router sends traffic to the firewall as well as to the IDS. d. The network security team decides to block traffic from that IP address. ANSWER: c RATIONALE: An intrusion detection system (IDS) is software and/or hardware that monitors system and network resources and activities and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment. Figure 2.8 shows that the first step in the process is that the organization’s network router sends network traffic to both IDS and firewall. FEEDBACK: a. Figure 2.8 shows that the first step in the process is that the organization’s network router sends network traffic to both IDS and firewall. b. Figure 2.8 shows that the first step in the process is that the organization’s network router sends network traffic to both IDS and firewall. c. Figure 2.8 shows that the first step in the process is that the organization’s network router sends network traffic to both IDS and firewall. d. Figure 2.8 shows that the first step in the process is that the organization’s network router sends network traffic to both IDS and firewall.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Detection of a Cyberattack QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.8 - Discuss how the CIA security triad can be implemented at the organization, network, application, and end user levels to safeguard against cyberattacks. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/26/2019 4:58 PM Copyright Cengage Learning. Powered by Cognero.

Page 27


Chapter 02 - Secure Information Systems 43. Which of the following security incidents is least costly to fix? a. theft of program source code b. alteration of corporate database c. theft of trade secrets d. defacing of web pages ANSWER: d If a Web site was simply defaced, it is easy to fix or restore the site’s HTML (Hypertext RATIONALE: Markup Language—the code that describes to your browser how a Web page should look). However, what if the intruders inflicted more serious damage, such as erasing proprietary program source code or the contents of key corporate databases? What if they stole company trade secrets? Expert crackers can conceal their identity and tracking them down can take a long time as well as a tremendous amount of corporate resources. FEEDBACK: a. If a Web site was simply defaced, it is easy to fix or restore the site’s HTML. b. If a Web site was simply defaced, it is easy to fix or restore the site’s HTML. c. If a Web site was simply defaced, it is easy to fix or restore the site’s HTML. d. If a Web site was simply defaced, it is easy to fix or restore the site’s HTML. POINTS: 1 DIFFICULTY: Easy REFERENCES: Response QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.11 - Describe five actions an organization must take in response to a successful cyberattack. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/27/2019 12:06 PM 44. A data breach at your business resulted in the loss of some customer data. Several angry customers have filed charges. What is a recommended course of action to prepare for future events? a. activate the forensics analysis team and prepare documentation b. meet with your lawyers to prepare to counter-sue the customers c. settle with the customers, however much it may cost d. none of these answers ANSWER: a RATIONALE: Computer forensics is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law. A computer forensics investigation may be opened in response to a criminal investigation or civil litigation. It may also be launched for a variety of other reasons, for example, to retrace steps taken when data has been lost, assess damage following a computer incident, investigate the unauthorized disclosure of personal or corporate confidential data, or to confirm or evaluate the impact of industrial espionage. FEEDBACK: a. A computer forensics investigation may be opened in response to a criminal investigation or civil litigation, to retrace steps taken when data has been lost, or to assess damage following a computer incident.

Copyright Cengage Learning. Powered by Cognero.

Page 28


Chapter 02 - Secure Information Systems b. A computer forensics investigation may be opened in response to a criminal

investigation or civil litigation, to retrace steps taken when data has been lost, or to assess damage following a computer incident. c. A computer forensics investigation may be opened in response to a criminal investigation or civil litigation, to retrace steps taken when data has been lost, or to assess damage following a computer incident. d. A computer forensics investigation may be opened in response to a criminal investigation or civil litigation, to retrace steps taken when data has been lost, or to assess damage following a computer incident.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Computer Forensics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.13 - Define the term computer forensics. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/27/2019 12:14 PM 45. You wish to use your personal laptop computer at work, but the IT department folks will not allow this. The likely reason is that ______. a. you will use your laptop for non-work-related activities b. your productivity could not be accurately measured c. your non-work-related use of the laptop could increase vulnerability d. your activities could not be monitored ANSWER: c RATIONALE: Bring your own device (BYOD) is a business policy that permits, and in some cases encourages, employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications. This practice raises many potential security issues as it is highly likely that such devices are also used for nonwork activity, such as browsing Web sites, blogging, shopping, and visiting social networks. This nonwork activity exposes the devices to malware much more frequently than a device that is used strictly for business purposes. FEEDBACK: a. It is highly likely that personal devices are also used for nonwork activity, which exposes the devices to malware much more frequently than a device that is used strictly for business purposes. b. It is highly likely that personal devices are also used for nonwork activity, which exposes the devices to malware much more frequently than a device that is used strictly for business purposes. c. It is highly likely that personal devices are also used for nonwork activity, which exposes the devices to malware much more frequently than a device that is used strictly for business purposes. d. It is highly likely that personal devices are also used for nonwork activity, which exposes the devices to malware much more frequently than a device that is used strictly for business purposes.

POINTS: DIFFICULTY:

1 Moderate

Copyright Cengage Learning. Powered by Cognero.

Page 29


Chapter 02 - Secure Information Systems REFERENCES: Why Computer Incidents Are So Prevalent QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.1 - State four reasons why computer incidents have become so prevalent. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/27/2019 12:23 PM 46. Which of the following companies develops one of the most widely used antivirus software products? a. Microsoft b. Symantec c. US-CERT d. Agnitum ANSWER: b RATIONALE: Good antivirus software checks vital system files when the system is booted up, monitors the system continuously for virus-like activity, scans disks, scans memory when a program is run, checks programs when they are downloaded, and scans email attachments before they are opened. Two of the most widely used antivirus software products are Norton AntiVirus from Symantec and Personal Firewall from McAfee. FEEDBACK: a. Two of the most widely used antivirus software products are Norton AntiVirus from Symantec and Personal Firewall from McAfee. b. Two of the most widely used antivirus software products are Norton AntiVirus from Symantec and Personal Firewall from McAfee. c. Two of the most widely used antivirus software products are Norton AntiVirus from Symantec and Personal Firewall from McAfee. d. Two of the most widely used antivirus software products are Norton AntiVirus from Symantec and Personal Firewall from McAfee.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementing CIA at the End-User Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.8 - Discuss how the CIA security triad can be implemented at the organization, network, application, and end user levels to safeguard against cyberattacks. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/27/2019 12:30 PM 47. In computing, an attack on an information system that takes advantage of a particular system vulnerability is called a(n) _______. a. vector b. exploit Copyright Cengage Learning. Powered by Cognero.

Page 30


Chapter 02 - Secure Information Systems c. DDoS attack d. data breach ANSWER: RATIONALE:

b In computing, an exploit is an attack on an information system that takes advantage of a particular system vulnerability. Often this attack is made possible due to poor system design or implementation.

FEEDBACK:

a. In computing, an exploit is an attack on an information system that takes advantage of a particular system vulnerability. b. In computing, an exploit is an attack on an information system that takes advantage of a particular system vulnerability. c. In computing, an exploit is an attack on an information system that takes advantage of a particular system vulnerability. d. In computing, an exploit is an attack on an information system that takes advantage of a particular system vulnerability.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Why Computer Incidents Are So Prevalent QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.1 - State four reasons why computer incidents have become so prevalent. KEYWORDS: Blooms's: Remember DATE CREATED: 12/27/2019 12:38 PM DATE MODIFIED: 12/27/2019 12:42 PM 48. Someone who attempts to destroy the infrastructure components of governments is known as a ______________. a. cybercriminal b. lone wolf attacker c. cyberterrorist d. hacktivist ANSWER: c RATIONALE: A cyberterrorist is a state-sponsored individual or group who attempts to destroy the infrastructure components of governments, financial institutions, corporations, utilities, and emergency response units. Currently, although the lone wolf and cyberterrorist receive a lot of publicity, they are not considered among the most serious sources of cyberattacks. FEEDBACK: a. A cyberterrorist is a state-sponsored individual or group who attempts to destroy the infrastructure components of governments, financial institutions, corporations, utilities, and emergency response units. b. A cyberterrorist is a state-sponsored individual or group who attempts to destroy the infrastructure components of governments, financial institutions, corporations, utilities, and emergency response units. c. A cyberterrorist is a state-sponsored individual or group who attempts to destroy the infrastructure components of governments, financial institutions, corporations, utilities, and emergency response units. d. A cyberterrorist is a state-sponsored individual or group who attempts to destroy the infrastructure components of governments, financial institutions, corporations, utilities, and emergency response units.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 31


Chapter 02 - Secure Information Systems DIFFICULTY: Easy REFERENCES: Perpetrators Most Likely to Initiate a Cyberattack QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.2 - Identify four classes of perpetrators mostly likely to initiate a cyberattack. KEYWORDS: Bloom's: Remember DATE CREATED: 12/27/2019 1:00 PM DATE MODIFIED: 12/27/2019 1:03 PM 49. The attack vector that relies on email messaging to deceive the victim into revealing personal data is known as _____. a. phishing b. a worm c. a rootkit d. smishing ANSWER: a RATIONALE: There are numerous types of attack vectors. One is phishing, the act of fraudulently using email to try to get the recipient to reveal personal data. FEEDBACK: a. There are numerous types of attack vectors. One is phishing, the act of fraudulently using email to try to get the recipient to reveal personal data. b. There are numerous types of attack vectors. One is phishing, the act of fraudulently using email to try to get the recipient to reveal personal data. c. There are numerous types of attack vectors. One is phishing, the act of fraudulently using email to try to get the recipient to reveal personal data. d. There are numerous types of attack vectors. One is phishing, the act of fraudulently using email to try to get the recipient to reveal personal data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Types of Attack Vectors QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.3 - Define the term attack vector. KEYWORDS: Bloom's: Remember DATE CREATED: 12/27/2019 1:08 PM DATE MODIFIED: 12/27/2019 1:12 PM 50. A hacker writes some programming code that will cause a computer to behave in an unexpected and undesirable manner, but disguises it as something else to make it difficult to detect. Which attack vector has this attacker chosen to use? a. rootkit b. worm c. vishing d. virus ANSWER: d RATIONALE: There are numerous types of attack vectors. One is a virus, a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and Copyright Cengage Learning. Powered by Cognero.

Page 32


Chapter 02 - Secure Information Systems usually undesirable manner. FEEDBACK:

a. There are numerous types of attack vectors. One is a virus, a piece of

programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. b. There are numerous types of attack vectors. One is a virus, a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. c. There are numerous types of attack vectors. One is a virus, a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. d. There are numerous types of attack vectors. One is a virus, a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Types of Attack Vectors QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.3 - Define the term attack vector. KEYWORDS: Bloom's: Remember DATE CREATED: 12/27/2019 1:26 PM DATE MODIFIED: 12/27/2019 1:31 PM 51. Brandon, a security specialist, explains that IS security managers must use their judgment to ensure that the cost of security risk control does not exceed the system’s benefits or the risks involved. Brandon is discussing the concept of _____. a. reasonable assurance b. business continuity c. disaster recovery d. the CIA security triad ANSWER: a RATIONALE: Step 7 of risk assessment is to perform a cost-benefit analysis to ensure that your efforts will be cost effective. No amount of resources can guarantee a perfect security system, so organizations must balance the risk of a security breach with the cost of preventing one. The concept of reasonable assurance in connection with IT security recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved. FEEDBACK: a. The concept of reasonable assurance in connection with IT security recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved. b. The concept of reasonable assurance in connection with IT security recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved. c. The concept of reasonable assurance in connection with IT security recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved. d. The concept of reasonable assurance in connection with IT security recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved.

Copyright Cengage Learning. Powered by Cognero.

Page 33


Chapter 02 - Secure Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementing CIA at the Organizational Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.10 - Identify eight steps that must be taken to perform a thorough security risk assessment. KEYWORDS: Bloom's: Remember DATE CREATED: 12/27/2019 1:40 PM DATE MODIFIED: 12/27/2019 1:45 PM 52. Your ex-colleague was apprehended and charged with a crime based on the Fraud and Related Activity in Connection with Access Devices Statute. He was caught using unauthorized or stolen _________. a. computer passwords b. email addresses c. application code d. credit cards ANSWER: d RATIONALE: Over the years, the United States Congress has enacted multiple laws to help prosecute those responsible for computer-related crime. The Fraud and Related Activity in Connection with Access Devices Statute (U.S. Code Title 18, Section 1029) covers false claims regarding unauthorized use of credit cards. FEEDBACK: a. The Fraud and Related Activity in Connection with Access Devices Statute covers false claims regarding unauthorized use of credit cards. b. The Fraud and Related Activity in Connection with Access Devices Statute covers false claims regarding unauthorized use of credit cards. c. The Fraud and Related Activity in Connection with Access Devices Statute covers false claims regarding unauthorized use of credit cards. d. The Fraud and Related Activity in Connection with Access Devices Statute covers false claims regarding unauthorized use of credit cards.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Federal Laws for Prosecuting Computer Attacks QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.7 - Identify five federal laws that address computer crime. KEYWORDS: Bloom's: Remember DATE CREATED: 12/27/2019 1:50 PM DATE MODIFIED: 12/27/2019 1:53 PM 53. The US-CERT newsletter has alerted you about a specific vulnerability in some software installed on your organization's computers. To detect any attempts at exploiting this vulnerability, you employ a(n) ____-based intrusion detection system. a. incident b. knowledge c. behavior Copyright Cengage Learning. Powered by Cognero.

Page 34


Chapter 02 - Secure Information Systems d. firewall ANSWER: RATIONALE:

FEEDBACK:

b Knowledge-based approaches and behavior-based approaches are two fundamentally different approaches to intrusion detection. Knowledge-based intrusion detection systems contain information about specific attacks and system vulnerabilities and watch for attempts to exploit these vulnerabilities, such as repeated failed login attempts or recurring attempts to download a program to a server. When such an attempt is detected, an alarm is triggered. a. Knowledge-based intrusion detection systems contain information about

specific attacks and system vulnerabilities and watch for attempts to exploit these vulnerabilities. b. Knowledge-based intrusion detection systems contain information about specific attacks and system vulnerabilities and watch for attempts to exploit these vulnerabilities. c. Knowledge-based intrusion detection systems contain information about specific attacks and system vulnerabilities and watch for attempts to exploit these vulnerabilities. d. Knowledge-based intrusion detection systems contain information about specific attacks and system vulnerabilities and watch for attempts to exploit these vulnerabilities.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Detection of a Cyberattack QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.11 - Describe five actions an organization must take in response to a successful cyberattack. KEYWORDS: Bloom's: Understand DATE CREATED: 12/27/2019 1:59 PM DATE MODIFIED: 12/27/2019 2:04 PM 54. Many organizations outsource their network security operations to a(n) _____. a. VPN b. HIPAA c. MSSP d. CSFA ANSWER: c RATIONALE: For most small and midsized organizations, the level of in-house network security expertise needed to protect their business operations can be too costly to acquire and maintain. As a result, many organizations outsource their network security operations to a managed security service provider (MSSP), which is a company that monitors, manages, and maintains computer and network security for other organizations. FEEDBACK: a. Many organizations outsource their network security operations to a managed security service provider (MSSP), which is a company that monitors, manages, and maintains computer and network security for other organizations. b. Many organizations outsource their network security operations to a managed security service provider (MSSP), which is a company that monitors, manages, and maintains computer and network security for other organizations.

Copyright Cengage Learning. Powered by Cognero.

Page 35


Chapter 02 - Secure Information Systems c. Many organizations outsource their network security operations to a managed

security service provider (MSSP), which is a company that monitors, manages, and maintains computer and network security for other organizations. d. Many organizations outsource their network security operations to a managed security service provider (MSSP), which is a company that monitors, manages, and maintains computer and network security for other organizations.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Using a Managed Security Service Provider (MSSP) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.12 - Describe the role of a managed security service provider. KEYWORDS: Bloom's: Remember DATE CREATED: 12/27/2019 2:06 PM DATE MODIFIED: 12/27/2019 2:11 PM 55. What discipline combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law? a. CIA implementation b. risk assessment c. computer forensics d. security policy ANSWER: c RATIONALE: Computer forensics is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law. FEEDBACK: a. Computer forensics is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law. b. Computer forensics is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law. c. Computer forensics is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law. d. Computer forensics is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 36


Chapter 02 - Secure Information Systems REFERENCES: Computer Forensics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.13 - Define the term computer forensics. KEYWORDS: Bloom's: Remember DATE CREATED: 12/27/2019 2:13 PM DATE MODIFIED: 12/27/2019 2:17 PM 56. Which of the following is considered the most likely source of cyberattacks, based on a poll of global executives, information security managers, and IT leaders? a. lone wolf attackers b. careless insiders c. cyberterrorists d. MSSPs ANSWER: b RATIONALE: In 2017–2018, professional service firm Ernst & Young polled 1,735 global executives, information security managers, and IT leaders, and found that in descending order, careless insiders, cyber criminals, malicious employees, and hacktivists were considered the most likely sources of a cyberattack. Currently, although the lone wolf and cyberterrorist receive a lot of publicity, they are not considered among the most serious sources of cyberattacks. FEEDBACK: a. In descending order, careless insiders, cyber criminals, malicious employees, and hacktivists were considered the most likely sources of a cyberattack. b. In descending order, careless insiders, cyber criminals, malicious employees, and hacktivists were considered the most likely sources of a cyberattack. c. In descending order, careless insiders, cyber criminals, malicious employees, and hacktivists were considered the most likely sources of a cyberattack. d. In descending order, careless insiders, cyber criminals, malicious employees, and hacktivists were considered the most likely sources of a cyberattack.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Perpetrators Most Likely to Initiate a Cyberattack QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.2 - Identify four classes of perpetrators mostly likely to initiate a cyberattack. KEYWORDS: Bloom's: Remember DATE CREATED: 12/27/2019 3:50 PM DATE MODIFIED: 12/27/2019 3:55 PM 57. You discover that one of your organization's computers has stopped working properly due to malware. Who is most likely responsible for the presence of malware on this machine? a. a "geek" engaged in a prank b. a malicious individual c. a state-sponsored hacker d. a careless coworker ANSWER: d Copyright Cengage Learning. Powered by Cognero.

Page 37


Chapter 02 - Secure Information Systems RATIONALE:

IBM found that 55–60 percent of all cyberattacks are initiated through the actions of insiders. These insiders include employees, business partners, clients, contractors, and consultants who have physical or remote access to a company’s assets. Careless (or untrained) insiders might not be acting with criminal intent but they might fail to follow your organization’s cybersecurity policies and do something foolish such as creating a weak password or opening an email attachment containing malware.

FEEDBACK:

a. Careless (or untrained) insiders might not be acting with criminal intent but they

might fail to follow your organization’s cybersecurity policies and do something foolish such as creating a weak password or opening an email attachment containing malware. b. Careless (or untrained) insiders might not be acting with criminal intent but they might fail to follow your organization’s cybersecurity policies and do something foolish such as creating a weak password or opening an email attachment containing malware. c. Careless (or untrained) insiders might not be acting with criminal intent but they might fail to follow your organization’s cybersecurity policies and do something foolish such as creating a weak password or opening an email attachment containing malware. d. Careless (or untrained) insiders might not be acting with criminal intent but they might fail to follow your organization’s cybersecurity policies and do something foolish such as creating a weak password or opening an email attachment containing malware.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Perpetrators Most Likely to Initiate a Cyberattack QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.2 - Identify four classes of perpetrators mostly likely to initiate a cyberattack. KEYWORDS: Bloom's: Remember DATE CREATED: 12/27/2019 3:56 PM DATE MODIFIED: 12/27/2019 4:07 PM 58. After being passed over for a promotion, an accountant accesses his firm's database and deletes or alters key information in an effort to take revenge on his superiors. This is an example of a cyberattack initiated by _____. a. a malicious employee b. a careless insider c. a cybercriminal d. a lone wolf attacker ANSWER: a RATIONALE: IBM found that 55–60 percent of all cyberattacks are initiated through the actions of insiders. These insiders include employees, business partners, clients, contractors, and consultants who have physical or remote access to a company’s assets. A malicious employee is an insider who deliberately attempts to gain access to and/or disrupt a company’s information systems and business operations. FEEDBACK: a. A malicious employee is an insider who deliberately attempts to gain access to and/or disrupt a company’s information systems and business operations. b. A malicious employee is an insider who deliberately attempts to gain access to and/or disrupt a company’s information systems and business operations.

Copyright Cengage Learning. Powered by Cognero.

Page 38


Chapter 02 - Secure Information Systems c. A malicious employee is an insider who deliberately attempts to gain access to and/or disrupt a company’s information systems and business operations. d. A malicious employee is an insider who deliberately attempts to gain access to and/or disrupt a company’s information systems and business operations.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Perpetrators Most Likely to Initiate a Cyberattack QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.2 - Identify four classes of perpetrators mostly likely to initiate a cyberattack. KEYWORDS: Bloom's: Remember DATE CREATED: 12/27/2019 4:08 PM DATE MODIFIED: 12/27/2019 4:16 PM 59. Debbie is a programmer who attacks corporate computer networks for financial gain. She is a _____. a. careless insider b. malicious insider c. cyberterrorist d. cybercriminal ANSWER: d RATIONALE: In 2017–2018, professional service firm Ernst & Young polled 1,735 global executives, information security managers, and IT leaders, and found that in descending order, careless insiders, cyber criminals, malicious employees, and hacktivists were considered the most likely sources of a cyberattack. A cybercriminal is someone who attacks a computer system or network for financial gain. FEEDBACK: a. A cybercriminal is someone who attacks a computer system or network for financial gain.

b. A cybercriminal is someone who attacks a computer system or network for financial gain. c. A cybercriminal is someone who attacks a computer system or network for financial gain. d. A cybercriminal is someone who attacks a computer system or network for financial gain.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Perpetrators Most Likely to Initiate a Cyberattack QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.2 - Identify four classes of perpetrators mostly likely to initiate a cyberattack. KEYWORDS: Bloom's: Remember DATE CREATED: 12/27/2019 4:18 PM DATE MODIFIED: 12/27/2019 4:22 PM 60. What is an attack vector? Copyright Cengage Learning. Powered by Cognero.

Page 39


Chapter 02 - Secure Information Systems a. a person who attacks a computer system or network for financial gain b. the technique used to gain unauthorized access to a device or a network c. a large group of computers controlled from one or more remote locations by hackers d. a vulnerable communications protocol or system ANSWER: b RATIONALE: An attack vector is the technique used to gain unauthorized access to a device or a network. FEEDBACK: a. An attack vector is the technique used to gain unauthorized access to a device or a network. b. An attack vector is the technique used to gain unauthorized access to a device or a network. c. An attack vector is the technique used to gain unauthorized access to a device or a network. d. An attack vector is the technique used to gain unauthorized access to a device or a network.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Types of Attack Vectors QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.3 - Define the term attack vector. KEYWORDS: Bloom's: Remember DATE CREATED: 12/27/2019 4:23 PM DATE MODIFIED: 12/27/2019 4:29 PM 61. Miles falls prey to a con artist who uses deception to trick him into revealing the data required to access his employer's information system. Miles has experienced an attack vector known as _____. a. social engineering b. smishing c. an advanced persistent threat d. a Trojan horse ANSWER: a RATIONALE: Perpetrators of computer crimes use an attack vector to gain unauthorized access to a device or a network and to initiate a cyberattack. There are numerous types of attack vectors. One is social engineering, the use of deception to trick individuals into divulging data needed to gain access to an information system or network. FEEDBACK: a. There are numerous types of attack vectors. One is social engineering, the use of deception to trick individuals into divulging data needed to gain access to an information system or network. b. There are numerous types of attack vectors. One is social engineering, the use of deception to trick individuals into divulging data needed to gain access to an information system or network. c. There are numerous types of attack vectors. One is social engineering, the use of deception to trick individuals into divulging data needed to gain access to an information system or network. d. There are numerous types of attack vectors. One is social engineering, the use of deception to trick individuals into divulging data needed to gain access to an information system or network.

Copyright Cengage Learning. Powered by Cognero.

Page 40


Chapter 02 - Secure Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Types of Attack Vectors QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.3 - Define the term attack vector. KEYWORDS: Bloom's: Remember DATE CREATED: 12/27/2019 4:30 PM DATE MODIFIED: 12/27/2019 4:38 PM 62. Viruses and worms are both attack vectors, but they differ in that _____. a. worms combine the features of a virus, a Trojan horse, and other malicious code b. viruses are symptomless c. worms can propagate without human intervention d. viruses can send copies of themselves to other computers ANSWER: c RATIONALE: Perpetrators of computer crimes use an attack vector to gain unauthorized access to a device or a network and to initiate a cyberattack. There are numerous types of attack vectors. One is a virus, a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Another is a worm, a harmful program that resides in the active memory of the computer and duplicates itself. Worms differ from viruses in that they can propagate without human intervention, often sending copies of themselves to other computers by email. FEEDBACK: a. Worms differ from viruses in that they can propagate without human intervention, often sending copies of themselves to other computers by email. b. Worms differ from viruses in that they can propagate without human intervention, often sending copies of themselves to other computers by email. c. Worms differ from viruses in that they can propagate without human intervention, often sending copies of themselves to other computers by email. d. Worms differ from viruses in that they can propagate without human intervention, often sending copies of themselves to other computers by email.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Types of Attack Vectors QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.3 - Define the term attack vector. KEYWORDS: Bloom's: Remember DATE CREATED: 12/27/2019 4:39 PM DATE MODIFIED: 12/27/2019 4:45 PM 63. Jennifer is a programmer who develops malware and deploys it in the computer systems of her organization's competitors so that she can secretly steal data about new product plans and designs, thus gaining a competitive advantage for her organization. What type of cyberattack is Jennifer involved in? a. data breach b. cyberespionage Copyright Cengage Learning. Powered by Cognero.

Page 41


Chapter 02 - Secure Information Systems c. distributed denial-of-service attack d. ransomware ANSWER: b RATIONALE: Cyberespionage involves the deployment of malware that secretly steals data in the computer systems of organizations. These organizations include government agencies, military contractors, political organizations, and manufacturing firms. The type of data most frequently targeted includes data that can provide an unfair competitive advantage to the perpetrator. This data is typically not public knowledge and may even be protected via patent, copyright, or trade secret. FEEDBACK: a. Cyberespionage involves the deployment of malware that secretly steals data in the computer systems of organizations. b. Cyberespionage involves the deployment of malware that secretly steals data in the computer systems of organizations. c. Cyberespionage involves the deployment of malware that secretly steals data in the computer systems of organizations. d. Cyberespionage involves the deployment of malware that secretly steals data in the computer systems of organizations.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Cyberattacks That Pose Serious Threats QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.5 - Identify five cyberthreats that pose a serious threat for organizations. KEYWORDS: Bloom's: Remember DATE CREATED: 12/27/2019 4:49 PM DATE MODIFIED: 12/27/2019 4:55 PM 64. Why is an iceberg, most of which is underwater, an appropriate analogy for the consequences of a cyberattack? a. most large businesses conceal the effects of cyberattacks from the public b. most people only think of the direct impact of the attack, not the many other, oft-hidden effects c. most of the consequences of a cyberattack cannot be assessed in terms of costs to a business d. An iceberg is not an appropriate analogy for the consequences of a cyberattack. ANSWER: b RATIONALE: The image of the iceberg is appropriate for a discussion of the successful consequences of a cyberattack because most people only think of the direct impact of a successful cyberattack and do not consider all the other oft-hidden effects. FEEDBACK: a. The image of the iceberg is appropriate for a discussion of the successful consequences of a cyberattack because most people only think of the direct impact of a successful cyberattack and do not consider all the other oft-hidden effects. b. The image of the iceberg is appropriate for a discussion of the successful consequences of a cyberattack because most people only think of the direct impact of a successful cyberattack and do not consider all the other oft-hidden effects. c. The image of the iceberg is appropriate for a discussion of the successful consequences of a cyberattack because most people only think of the direct impact of a successful cyberattack and do not consider all the other oft-hidden

Copyright Cengage Learning. Powered by Cognero.

Page 42


Chapter 02 - Secure Information Systems effects. d. The image of the iceberg is appropriate for a discussion of the successful consequences of a cyberattack because most people only think of the direct impact of a successful cyberattack and do not consider all the other oft-hidden effects.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Consequences of a Successful Cyberattack QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.6 - Identify five consequences of a successful cyberattack. KEYWORDS: Bloom's: Remember DATE CREATED: 12/28/2019 3:36 PM DATE MODIFIED: 12/28/2019 4:01 PM 65. A health insurance firm is hit by a successful cyberattack. The value of the assets stolen or damaged due to the cyberattack is considered _____. a. the direct impact of the cyberattack b. the business disruption caused by the cyberattack c. the recovery cost of the cyberattack d. the legal consequences of the cyberattack ANSWER: a RATIONALE: The direct impact of a cyberattack is the value of the assets (cash, inventory, equipment, patents, copyrights, trade secrets, data) stolen or damaged due to the cyberattack. Shareholders of the organizations will also experience a direct impact from the drop in the share price that typically follows a major cyberattack. FEEDBACK: a. The direct impact of a cyberattack is the value of the assets (cash, inventory, equipment, patents, copyrights, trade secrets, data) stolen or damaged due to the cyberattack. b. The direct impact of a cyberattack is the value of the assets (cash, inventory, equipment, patents, copyrights, trade secrets, data) stolen or damaged due to the cyberattack. c. The direct impact of a cyberattack is the value of the assets (cash, inventory, equipment, patents, copyrights, trade secrets, data) stolen or damaged due to the cyberattack. d. The direct impact of a cyberattack is the value of the assets (cash, inventory, equipment, patents, copyrights, trade secrets, data) stolen or damaged due to the cyberattack.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Consequences of a Successful Cyberattack QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.6 - Identify five consequences of a successful cyberattack. KEYWORDS: Bloom's: Remember DATE CREATED: 12/28/2019 4:03 PM DATE MODIFIED: 12/28/2019 4:22 PM Copyright Cengage Learning. Powered by Cognero.

Page 43


Chapter 02 - Secure Information Systems 66. After a successful cyberattack on its information systems, a toy manufacturer is unable to operate effectively for two weeks, and thus misses out on some significant customer orders during this time owing to _____. a. business disruption b. recovery costs c. legal obligations d. reputation damage ANSWER: a RATIONALE: A successful cyberattack may make it impossible for the organization to operate in an effective manner for several hours or days. This business disruption can cause a loss of existing business and customers as well as the loss of potential new business and customers. In addition, resources may be diverted from their regular duties to scramble to operate some sort of back-up procedures that enables essential business processes to continue—albeit at a lower level of efficiency. FEEDBACK: a. A successful cyberattack may make it impossible for the organization to operate in an effective manner for several hours or days. This business disruption can cause a loss of existing business and customers as well as the loss of potential new business and customers. b. A successful cyberattack may make it impossible for the organization to operate in an effective manner for several hours or days. This business disruption can cause a loss of existing business and customers as well as the loss of potential new business and customers. c. A successful cyberattack may make it impossible for the organization to operate in an effective manner for several hours or days. This business disruption can cause a loss of existing business and customers as well as the loss of potential new business and customers. d. A successful cyberattack may make it impossible for the organization to operate in an effective manner for several hours or days. This business disruption can cause a loss of existing business and customers as well as the loss of potential new business and customers.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Consequences of a Successful Cyberattack QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.6 - Identify five consequences of a successful cyberattack. KEYWORDS: Bloom's: Remember DATE CREATED: 12/28/2019 4:24 PM DATE MODIFIED: 12/28/2019 4:51 PM 67. Violating the European Union General Data Protection Regulation guidelines will most likely increase a successful cyberattack's _____. a. direct impacts b. recovery costs c. legal consequences d. reputation damage ANSWER: c RATIONALE: Legal consequences of cyberattacks include the prospect of monetary penalties for Copyright Cengage Learning. Powered by Cognero.

Page 44


Chapter 02 - Secure Information Systems businesses that fail to comply with data protection legislation. For example, the European Union General Data Protection Regulation (GDPR) has established strong guidelines for how organizations process and handle data so that the personal information of individuals is protected. Organizations that violate these guidelines can be fined 20 million euros ($23 million U.S. dollars), or 4 percent of global annual revenue—whichever is greater. FEEDBACK:

a. Legal consequences of cyberattacks include the prospect of monetary

penalties for businesses that fail to comply with data protection legislation. For example, the European Union General Data Protection Regulation (GDPR) has established strong guidelines for how organizations process and handle data so that the personal information of individuals is protected. b. Legal consequences of cyberattacks include the prospect of monetary penalties for businesses that fail to comply with data protection legislation. For example, the European Union General Data Protection Regulation (GDPR) has established strong guidelines for how organizations process and handle data so that the personal information of individuals is protected. c. Legal consequences of cyberattacks include the prospect of monetary penalties for businesses that fail to comply with data protection legislation. For example, the European Union General Data Protection Regulation (GDPR) has established strong guidelines for how organizations process and handle data so that the personal information of individuals is protected. d. Legal consequences of cyberattacks include the prospect of monetary penalties for businesses that fail to comply with data protection legislation. For example, the European Union General Data Protection Regulation (GDPR) has established strong guidelines for how organizations process and handle data so that the personal information of individuals is protected.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Consequences of a Successful Cyberattack QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.6 - Identify five consequences of a successful cyberattack. KEYWORDS: Bloom's: Remember DATE CREATED: 12/28/2019 4:52 PM DATE MODIFIED: 12/28/2019 4:59 PM 68. The percentage of adults in an area who are interested in opening an account with an investment company drops significantly after the media reports on a successful cyberattack on this organization. This is most likely the result of _____. a. the direct impact of the cyberattack b. recovery procedures followed after the cyberattack c. legal ramifications of the cyberattack d. reputation damage related to the cyberattack ANSWER: d RATIONALE: A successful cyberattack can erode the trust your organization has established with your customers, suppliers, business partners, and shareholders. This damage to your organization’s reputation leads to a devaluation of the products and services of your organization resulting in a drop in stock price, loss of customers, supplier turnover, strained business partner relationships, and ultimately, a loss of sales and decrease in profits. FEEDBACK: a. Damage to your organization’s reputation following a cyberattack leads to a Copyright Cengage Learning. Powered by Cognero.

Page 45


Chapter 02 - Secure Information Systems devaluation of the products and services of your organization resulting in a drop in stock price, loss of customers, supplier turnover, strained business partner relationships, and ultimately, a loss of sales and decrease in profits. b. Damage to your organization’s reputation following a cyberattack leads to a devaluation of the products and services of your organization resulting in a drop in stock price, loss of customers, supplier turnover, strained business partner relationships, and ultimately, a loss of sales and decrease in profits. c. Damage to your organization’s reputation following a cyberattack leads to a devaluation of the products and services of your organization resulting in a drop in stock price, loss of customers, supplier turnover, strained business partner relationships, and ultimately, a loss of sales and decrease in profits. d. Damage to your organization’s reputation following a cyberattack leads to a devaluation of the products and services of your organization resulting in a drop in stock price, loss of customers, supplier turnover, strained business partner relationships, and ultimately, a loss of sales and decrease in profits.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Consequences of a Successful Cyberattack QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.6 - Identify five consequences of a successful cyberattack. KEYWORDS: Bloom's: Remember DATE CREATED: 12/28/2019 5:01 PM DATE MODIFIED: 12/28/2019 5:08 PM 69. After a successful cyberattack, the funds spent on repairing affected systems, restoring lost data, and performing a post-incident analysis are considered part of the _____. a. direct impact b. business disruption c. recovery cost d. legal consequences ANSWER: c RATIONALE: Cyberattacks may entail significant recovery costs. It may take people from the IS organization and business areas days or weeks to repair affected systems and recover lost or compromised data. Resources will need to be drawn from their normal work responsibilities to perform a post-incident analysis to identify the scope, cause, and impact of the cyberattack and to determine measures to prevent a reoccurrence. FEEDBACK: a. Cyberattacks may entail significant recovery costs. It may take people from the IS organization and business areas days or weeks to repair affected systems and recover lost or compromised data. Resources will need to be drawn from their normal work responsibilities to perform a post-incident analysis. b. Cyberattacks may entail significant recovery costs. It may take people from the IS organization and business areas days or weeks to repair affected systems and recover lost or compromised data. Resources will need to be drawn from their normal work responsibilities to perform a post-incident analysis. c. Cyberattacks may entail significant recovery costs. It may take people from the IS organization and business areas days or weeks to repair affected systems and recover lost or compromised data. Resources will need to be drawn from their normal work responsibilities to perform a post-incident analysis. d. Cyberattacks may entail significant recovery costs. It may take people from the

Copyright Cengage Learning. Powered by Cognero.

Page 46


Chapter 02 - Secure Information Systems IS organization and business areas days or weeks to repair affected systems and recover lost or compromised data. Resources will need to be drawn from their normal work responsibilities to perform a post-incident analysis.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Consequences of a Successful Cyberattack QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.6 - Identify five consequences of a successful cyberattack. KEYWORDS: Bloom's: Remember DATE CREATED: 12/28/2019 5:11 PM DATE MODIFIED: 12/28/2019 5:18 PM 70. Legal consequences following a successful cyberattack on a well-known organization often include _____. a. the loss of cash, inventory, equipment, patents, copyrights, trade secrets, and data b. the diversion of resources to the operation of back-up procedures c. lawsuits initiated by consumers who incurred damages d. an erosion of trust previously established with customers, suppliers, and partners ANSWER: c RATIONALE: Consumers are almost certain to initiate lawsuits to recover any damages incurred from a cyberattack. Many organizations that suffer a cyberattack that compromises the personal data of employees, customers, or patients provide one or two years of identity theft insurance or consumer credit monitoring for those impacted. FEEDBACK: a. Consumers are almost certain to initiate lawsuits to recover any damages incurred from a cyberattack.

b. Consumers are almost certain to initiate lawsuits to recover any damages incurred from a cyberattack. c. Consumers are almost certain to initiate lawsuits to recover any damages incurred from a cyberattack. d. Consumers are almost certain to initiate lawsuits to recover any damages incurred from a cyberattack.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Consequences of a Successful Cyberattack QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.6 - Identify five consequences of a successful cyberattack. KEYWORDS: Bloom's: Remember DATE CREATED: 12/28/2019 5:23 PM DATE MODIFIED: 12/28/2019 5:32 PM 71. Thanks to the Identity Theft and Assumption Deterrence Act, _____. a. identity theft is a federal crime for which perpetrators may be sentenced to up to 15 years in prison. b. the definition of and legal penalties for identity theft are determined at the state government level. c. the maximum term of imprisonment for convicted identity thieves is the same as for cyberterrorists. d. identity theft has become much less common and is no longer a major security threat. Copyright Cengage Learning. Powered by Cognero.

Page 47


Chapter 02 - Secure Information Systems ANSWER: RATIONALE:

FEEDBACK:

a The Identity Theft and Assumption Deterrence Act (U.S. Code Title 18, Section 1028) makes identity theft a federal crime, with penalties of up to 15 years of imprisonment and a maximum fine of $250,000. Those convicted of cyberterrorism are subject to a prison term of 5–20 years. a. The Identity Theft and Assumption Deterrence Act makes identity theft a

federal crime, with penalties of up to 15 years of imprisonment and a maximum fine of $250,000. b. The Identity Theft and Assumption Deterrence Act makes identity theft a federal crime, with penalties of up to 15 years of imprisonment and a maximum fine of $250,000. c. The Identity Theft and Assumption Deterrence Act makes identity theft a federal crime, with penalties of up to 15 years of imprisonment and a maximum fine of $250,000. d. The Identity Theft and Assumption Deterrence Act makes identity theft a federal crime, with penalties of up to 15 years of imprisonment and a maximum fine of $250,000.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Federal Laws for Prosecuting Computer Attacks QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.7 - Identify five federal laws that address computer crime. KEYWORDS: Bloom's: Remember DATE CREATED: 12/29/2019 4:11 PM DATE MODIFIED: 12/29/2019 4:24 PM 72. While conducting a security self-assessment of his personal laptop use, Vann realizes that he is putting himself at risk by _____. a. upgrading his operating system too often b. installing both firewall and antivirus software at the same time c. purchasing new anti-malware software before it has been reviewed by other consumers d. putting off installing available software updates that he has been notified about ANSWER: d RATIONALE: According to the self-assessment security test in Table 2.6, you are minimizing your risk of cyberattack at the end-user level if you do the following: • • •

FEEDBACK:

have the most current version of your computer’s operating system installed have the most current version of firewall, antivirus, and malware software installed install updates to all your software when you receive notice that a new update is available

a. According to the self-assessment security test in Table 2.6, you should have

the most current version of your computer’s operating system installed; have the most current version of firewall, antivirus, and malware software installed; and install updates to all your software when you receive notice that a new update is available. b. According to the self-assessment security test in Table 2.6, you should have the most current version of your computer’s operating system installed; have the most current version of firewall, antivirus, and malware software installed; Copyright Cengage Learning. Powered by Cognero.

Page 48


Chapter 02 - Secure Information Systems and install updates to all your software when you receive notice that a new update is available. c. According to the self-assessment security test in Table 2.6, you should have the most current version of your computer’s operating system installed; have the most current version of firewall, antivirus, and malware software installed; and install updates to all your software when you receive notice that a new update is available. d. According to the self-assessment security test in Table 2.6, you should have the most current version of your computer’s operating system installed; have the most current version of firewall, antivirus, and malware software installed; and install updates to all your software when you receive notice that a new update is available.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementing CIA at the End-User Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.9 - Conduct a security self-assessment of your own computer and usage habits. KEYWORDS: Bloom's: Understand DATE CREATED: 12/29/2019 4:28 PM DATE MODIFIED: 12/29/2019 4:39 PM 73. Imagine you are conducting a security self-assessment. Which of the following might indicate one of your account passwords is too weak? a. it includes a mixture of capital and lower-case letters b. it includes several special characters c. it contains fewer than 12 characters d. it contains numbers as well as letters ANSWER: c RATIONALE: According to the self-assessment security test in Table 2.6, you should use different, strong passwords for each of your accounts and applications—a minimum of 12 characters, with a mix of capital and lowercase letters, numbers, and special characters. FEEDBACK: a. According to the self-assessment security test in Table 2.6, you should use different, strong passwords for each of your accounts and applications—a minimum of 12 characters, with a mix of capital and lowercase letters, numbers, and special characters. b. According to the self-assessment security test in Table 2.6, you should use different, strong passwords for each of your accounts and applications—a minimum of 12 characters, with a mix of capital and lowercase letters, numbers, and special characters. c. According to the self-assessment security test in Table 2.6, you should use different, strong passwords for each of your accounts and applications—a minimum of 12 characters, with a mix of capital and lowercase letters, numbers, and special characters. d. According to the self-assessment security test in Table 2.6, you should use different, strong passwords for each of your accounts and applications—a minimum of 12 characters, with a mix of capital and lowercase letters, numbers, and special characters.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 49


Chapter 02 - Secure Information Systems DIFFICULTY: Easy REFERENCES: Implementing CIA at the End-User Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.9 - Conduct a security self-assessment of your own computer and usage habits. KEYWORDS: Bloom's: Remember DATE CREATED: 12/29/2019 5:04 PM DATE MODIFIED: 12/29/2019 5:13 PM 74. Which of the following choices will help you score better (that is, as more secure) on a security self-assessment? a. accessing corporate applications directly rather than via a VPN b. setting your home wireless router's encryption method to WPA2 c. utilizing the default name and password on your home wireless router d. checking email while using a free, public wireless network ANSWER: b RATIONALE: According to the self-assessment security test in Table 2.6, you are minimizing your risk of cyberattack at the end-user level if you do the following: •

• •

FEEDBACK:

become familiar with and follow your organization’s policies for accessing corporate Web sites and applications from your home or remote locations (e.g., access via a VPN) set the encryption method to WPA2 and changed the default name and password on your home wireless router when using a free, public wireless network, avoid checking your email or accessing Web sites requiring a username and password

a. According to the self-assessment security test in Table 2.6, you should become familiar with and follow your organization’s policies for accessing corporate Web sites and applications from your home or remote locations (e.g., access via a VPN); set the encryption method to WPA2 and changed the default name and password on your home wireless router; and when using a free, public wireless network, avoid checking your email or accessing Web sites requiring a username and password. b. According to the self-assessment security test in Table 2.6, you should become familiar with and follow your organization’s policies for accessing corporate Web sites and applications from your home or remote locations (e.g., access via a VPN); set the encryption method to WPA2 and changed the default name and password on your home wireless router; and when using a free, public wireless network, avoid checking your email or accessing Web sites requiring a username and password. c. According to the self-assessment security test in Table 2.6, you should become familiar with and follow your organization’s policies for accessing corporate Web sites and applications from your home or remote locations (e.g., access via a VPN); set the encryption method to WPA2 and changed the default name and password on your home wireless router; and when using a free, public wireless network, avoid checking your email or accessing Web sites requiring a username and password. d. According to the self-assessment security test in Table 2.6, you should become familiar with and follow your organization’s policies for accessing corporate Web sites and applications from your home or remote locations (e.g., access

Copyright Cengage Learning. Powered by Cognero.

Page 50


Chapter 02 - Secure Information Systems via a VPN); set the encryption method to WPA2 and changed the default name and password on your home wireless router; and when using a free, public wireless network, avoid checking your email or accessing Web sites requiring a username and password.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Implementing CIA at the End-User Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.9 - Conduct a security self-assessment of your own computer and usage habits. KEYWORDS: Bloom's: Remember DATE CREATED: 12/29/2019 5:16 PM DATE MODIFIED: 12/29/2019 5:24 PM 75. A security self-assessment revealed that Penelope, who owns one laptop computer, is putting herself at risk for cyberattack by _____. a. avoiding signing in to her Amazon.com account while using free wifi at the coffee shop b. deleting emails from people or businesses unfamiliar to her c. refraining from clicking on URLs in the bodies of email messages d. backing up critical files to a single folder on her laptop once every three months ANSWER: d RATIONALE: According to the self-assessment security test in Table 2.6, you are minimizing your risk of cyberattack at the end-user level if you do the following: • • •

FEEDBACK:

when using a free, public wireless network, avoid checking your email or accessing Web sites requiring a username and password refrain from clicking on a URL in an email from someone you do not know back up critical files to a separate device at least once a week

a. According to the self-assessment security test in Table 2.6, you should refrain

from clicking on a URL in an email from someone you do not know; back up critical files to a separate device at least once a week; and, when using a free, public wireless network, avoid checking your email or accessing Web sites requiring a username and password. b. According to the self-assessment security test in Table 2.6, you should refrain from clicking on a URL in an email from someone you do not know; back up critical files to a separate device at least once a week; and, when using a free, public wireless network, avoid checking your email or accessing Web sites requiring a username and password. c. According to the self-assessment security test in Table 2.6, you should refrain from clicking on a URL in an email from someone you do not know; back up critical files to a separate device at least once a week; and, when using a free, public wireless network, avoid checking your email or accessing Web sites requiring a username and password. d. According to the self-assessment security test in Table 2.6, you should refrain from clicking on a URL in an email from someone you do not know; back up critical files to a separate device at least once a week; and, when using a free, public wireless network, avoid checking your email or accessing Web sites requiring a username and password. Copyright Cengage Learning. Powered by Cognero.

Page 51


Chapter 02 - Secure Information Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementing CIA at the End-User Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.9 - Conduct a security self-assessment of your own computer and usage habits. KEYWORDS: Bloom's: Remember DATE CREATED: 12/29/2019 5:26 PM DATE MODIFIED: 12/29/2019 5:34 PM 76. To improve his score on a security self-assessment, Saul set up his laptop so that the first thing he must do when he turns it on is _____. a. install new software updates b. log in to his employer's VPN c. enter a strong security password d. run a file backup procedure ANSWER: c RATIONALE: According to the self-assessment security test in Table 2.6, you should arm your device with a security passcode that must be entered before it accepts further input. FEEDBACK: a. According to the self-assessment security test in Table 2.6, you should arm your device with a security passcode that must be entered before it accepts further input. b. According to the self-assessment security test in Table 2.6, you should arm your device with a security passcode that must be entered before it accepts further input. c. According to the self-assessment security test in Table 2.6, you should arm your device with a security passcode that must be entered before it accepts further input. d. According to the self-assessment security test in Table 2.6, you should arm your device with a security passcode that must be entered before it accepts further input.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Implementing CIA at the End-User Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.9 - Conduct a security self-assessment of your own computer and usage habits. KEYWORDS: Bloom's: Understand DATE CREATED: 12/29/2019 5:35 PM DATE MODIFIED: 12/29/2019 5:40 PM 77. When Tiffany takes a security self-assessment, she discovers that she is increasing her risk of a cyberattack by _____. a. leaving her tablet computer unattended at the bistro table while she purchases her lunch at the counter b. installing Locate My Device or a similar program that she downloaded online c. following her employer's policies regarding personal data storage Copyright Cengage Learning. Powered by Cognero.

Page 52


Chapter 02 - Secure Information Systems d. accessing database applications from her home computer via a VPN ANSWER: a RATIONALE: According to the self-assessment security test in Table 2.6, you are minimizing your risk of cyberattack at the end-user level if you do the following: •

• • •

FEEDBACK:

become familiar with and follow your organization’s policies for accessing corporate Web sites and applications from your home or remote locations (e.g., access via a VPN) become familiar with and follow your organization’s policies regarding the storage of personal or confidential data on your device install Locate My Device or similar software in case your device is lost or stolen make sure not to leave your device unattended in a public place where it can be easily stolen

a. According to the self-assessment security test in Table 2.6, you should install

Locate My Device or similar software in case your device is lost or stolen and make sure not to leave your device unattended in a public place where it can be easily stolen. b. According to the self-assessment security test in Table 2.6, you should install Locate My Device or similar software in case your device is lost or stolen and make sure not to leave your device unattended in a public place where it can be easily stolen. c. According to the self-assessment security test in Table 2.6, you should install Locate My Device or similar software in case your device is lost or stolen and make sure not to leave your device unattended in a public place where it can be easily stolen. d. According to the self-assessment security test in Table 2.6, you should install Locate My Device or similar software in case your device is lost or stolen and make sure not to leave your device unattended in a public place where it can be easily stolen.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementing CIA at the End-User Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.9 - Conduct a security self-assessment of your own computer and usage habits. KEYWORDS: Bloom's: Remember DATE CREATED: 12/30/2019 6:40 AM DATE MODIFIED: 12/30/2019 6:50 AM 78. After completing a security self-assessment, Hal decides to improve his practices related to use of social media sites such as Facebook. How can he make his social media use safer? a. access social media sites via a VPN b. change his password to one that includes only numbers and is eight characters long c. review, understand, and if necessary adjust his privacy settings for these sites d. run his antivirus software just before he logs in to these sites ANSWER: c RATIONALE: According to the self-assessment security test in Table 2.6, you should review, and ensure you understand, the privacy settings that control who can see or read what you do on Copyright Cengage Learning. Powered by Cognero.

Page 53


Chapter 02 - Secure Information Systems Facebook and other social media sites. VPNs are security measures used when accessing corporate Web sites and applications from home or remote locations. Running antivirus software is useful, but doing so before visiting a social media site will be less helpful than adjusting the privacy settings. FEEDBACK:

a. According to the self-assessment security test in Table 2.6, you should review, and ensure you understand, the privacy settings that control who can see or read what you do on Facebook and other social media sites. b. According to the self-assessment security test in Table 2.6, you should review, and ensure you understand, the privacy settings that control who can see or read what you do on Facebook and other social media sites. c. According to the self-assessment security test in Table 2.6, you should review, and ensure you understand, the privacy settings that control who can see or read what you do on Facebook and other social media sites. d. According to the self-assessment security test in Table 2.6, you should review, and ensure you understand, the privacy settings that control who can see or read what you do on Facebook and other social media sites.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementing CIA at the End-User Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.9 - Conduct a security self-assessment of your own computer and usage habits. KEYWORDS: Bloom's: Remember DATE CREATED: 12/30/2019 6:51 AM DATE MODIFIED: 12/30/2019 7:02 AM 79. The first two steps an organization must take to perform a security risk assessment are to identify _____, respectively. a. the impact and frequency of each possible loss event b. the costs of each possible loss event and the benefits of investing resources to prevent each c. the current protections against cyberattacks that are already in place and the least expensive ways to upgrade or expand them d. hardware, software, and information systems used to achieve business objectives and possible occurrences that would negatively impact them ANSWER: d RATIONALE: The goal of risk assessment is to identify which investments of time and resources will best protect the organization from its most likely and serious threats. In the context of an IT risk assessment, an asset is any hardware, software, information system, network, or database that is used by the organization to achieve its business objectives. A loss event is any occurrence that has a negative impact on an asset. Examples of loss events include a computer contracting a virus or a Web site undergoing a DDoS attack. The first two steps in a general security risk assessment process are as follows: •

Step 1—Identify the set of IT assets about which the organization is most concerned. Priority is typically given to those assets that support the organization’s mission and the meeting of its primary business goals. Step 2—Identify the loss events or the risks or threats that could occur, such as a DDoS attack or insider fraud.

Copyright Cengage Learning. Powered by Cognero.

Page 54


Chapter 02 - Secure Information Systems FEEDBACK:

a. The first two steps in a general security risk assessment process are as

follows: Step 1—Identify the set of IT assets about which the organization is most concerned. Priority is typically given to those assets that support the organization’s mission and the meeting of its primary business goals. Step 2— Identify the loss events or the risks or threats that could occur, such as a DDoS attack or insider fraud. b. The first two steps in a general security risk assessment process are as follows: Step 1—Identify the set of IT assets about which the organization is most concerned. Priority is typically given to those assets that support the organization’s mission and the meeting of its primary business goals. Step 2— Identify the loss events or the risks or threats that could occur, such as a DDoS attack or insider fraud. c. The first two steps in a general security risk assessment process are as follows: Step 1—Identify the set of IT assets about which the organization is most concerned. Priority is typically given to those assets that support the organization’s mission and the meeting of its primary business goals. Step 2— Identify the loss events or the risks or threats that could occur, such as a DDoS attack or insider fraud. d. The first two steps in a general security risk assessment process are as follows: Step 1—Identify the set of IT assets about which the organization is most concerned. Priority is typically given to those assets that support the organization’s mission and the meeting of its primary business goals. Step 2— Identify the loss events or the risks or threats that could occur, such as a DDoS attack or insider fraud.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementing CIA at the Organizational Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.10 - Identify eight steps that must be taken to perform a thorough security risk assessment. KEYWORDS: Bloom's: Remember DATE CREATED: 12/30/2019 7:06 AM DATE MODIFIED: 12/30/2019 9:56 AM 80. Because some threats, such as insider fraud, are more likely to occur than others, step 3 of the risk assessment process is to _____. a. identify the set of IT assets about which the organization is most concerned b. assess the frequency of events or the likelihood of each potential threat c. perform a cost-benefit analysis to ensure that your efforts will be cost effective d. determine how each threat can be mitigated so it becomes less likely to occur ANSWER: b RATIONALE: The third step in a general security risk assessment process is as follows: Step 3—Assess the frequency of events or the likelihood of each potential threat; some threats, such as insider fraud, are more likely to occur than others. FEEDBACK: a. The third step in a general security risk assessment process is as follows: Step 3—Assess the frequency of events or the likelihood of each potential threat. b. The third step in a general security risk assessment process is as follows: Step 3—Assess the frequency of events or the likelihood of each potential threat. c. The third step in a general security risk assessment process is as follows: Step

Copyright Cengage Learning. Powered by Cognero.

Page 55


Chapter 02 - Secure Information Systems 3—Assess the frequency of events or the likelihood of each potential threat. d. The third step in a general security risk assessment process is as follows: Step 3—Assess the frequency of events or the likelihood of each potential threat.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementing CIA at the Organizational Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.10 - Identify eight steps that must be taken to perform a thorough security risk assessment. KEYWORDS: Bloom's: Remember DATE CREATED: 12/30/2019 2:27 PM DATE MODIFIED: 12/30/2019 2:31 PM 81. Eboni is part of a workgroup conducting a security risk assessment at her firm and is currently helping to determine the impact of each threat they have identified, should it occur. Because a later step in the assessment process involves performing a cost-benefit analysis, Eboni will include _____. a. the estimated cost of the direct impact, business disruption, recovery efforts, and legal and reputation damages b. a documented process for recovering an organization's business information system assets c. a document that includes an organization's disaster recovery plan, continuity of operations plan, and incident management plan d. reasonable assurance that the cost of control does not exceed the system's benefits or the risks involved ANSWER: a RATIONALE: The fourth step in a general security risk assessment process is as follows: Step 4— Determine the impact of each threat occurring. Would the threat have a minor impact on the organization, or could it keep the organization from carrying out its mission for a lengthy period of time? Step 7 is to perform a cost-benefit analysis to ensure that your efforts will be cost effective. Table 2.4 illustrates a risk assessment for a hypothetical organization. The estimated cost includes the cost of the direct impact, the business disruption, the recovery efforts, and the legal and reputational damage. FEEDBACK: a. The fourth step in a general security risk assessment process is as follows: Step 4—Determine the impact of each threat occurring. The estimated cost used in the cost-benefit analysis in step 7 includes the cost of the direct impact, the business disruption, the recovery efforts, and the legal and reputational damage. b. The fourth step in a general security risk assessment process is as follows: Step 4—Determine the impact of each threat occurring. The estimated cost used in the cost-benefit analysis in step 7 includes the cost of the direct impact, the business disruption, the recovery efforts, and the legal and reputational damage. c. The fourth step in a general security risk assessment process is as follows: Step 4—Determine the impact of each threat occurring. The estimated cost used in the cost-benefit analysis in step 7 includes the cost of the direct impact, the business disruption, the recovery efforts, and the legal and reputational damage. d. The fourth step in a general security risk assessment process is as follows: Step 4—Determine the impact of each threat occurring. The estimated cost used in the cost-benefit analysis in step 7 includes the cost of the direct impact, the business disruption, the recovery efforts, and the legal and reputational damage.

Copyright Cengage Learning. Powered by Cognero.

Page 56


Chapter 02 - Secure Information Systems POINTS: 1 DIFFICULTY: Moderate REFERENCES: Implementing CIA at the Organizational Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.10 - Identify eight steps that must be taken to perform a thorough security risk assessment. KEYWORDS: Bloom's: Remember DATE CREATED: 12/30/2019 2:33 PM DATE MODIFIED: 12/30/2019 2:48 PM 82. Steps 5 and 6 of the security risk assessment process are to determine the possible ways to accomplish a key task and how feasible each option would be to implement. What is that task? a. threat mitigation b. asset replacement c. event identification d. cost-benefit analysis ANSWER: a RATIONALE: The goal of risk assessment is to identify which investments of time and resources will best protect the organization from its most likely and serious threats. In the context of an IT risk assessment, an asset is any hardware, software, information system, network, or database that is used by the organization to achieve its business objectives. A loss event is any occurrence that has a negative impact on an asset. Examples of loss events include a computer contracting a virus or a Web site undergoing a DDoS attack. The fifth and sixth steps in a general security risk assessment process are as follows: •

FEEDBACK:

Step 5—Determine how each threat can be mitigated so that it becomes much less likely to occur or, if it does occur, has less of an impact on the organization. For example, installing virus protection on all computers makes it much less likely that a computer will contract a virus. Due to time and resource limitations, most organizations choose to focus on just those threats that have a high (relative to all other threats) probability of occurrence and a high (relative to all other threats) impact. In other words, first address those threats that are likely to occur and that would have a high negative impact on the organization. Step 6—Assess the feasibility of implementing the mitigation options.

a. The fifth and sixth steps in a general security risk assessment process are as

follows: Step 5—Determine how each threat can be mitigated so that it becomes much less likely to occur or, if it does occur, has less of an impact on the organization. Step 6—Assess the feasibility of implementing the mitigation options. b. The fifth and sixth steps in a general security risk assessment process are as follows: Step 5—Determine how each threat can be mitigated so that it becomes much less likely to occur or, if it does occur, has less of an impact on the organization. Step 6—Assess the feasibility of implementing the mitigation options. c. The fifth and sixth steps in a general security risk assessment process are as follows: Step 5—Determine how each threat can be mitigated so that it becomes much less likely to occur or, if it does occur, has less of an impact on Copyright Cengage Learning. Powered by Cognero.

Page 57


Chapter 02 - Secure Information Systems the organization. Step 6—Assess the feasibility of implementing the mitigation options. d. The fifth and sixth steps in a general security risk assessment process are as follows: Step 5—Determine how each threat can be mitigated so that it becomes much less likely to occur or, if it does occur, has less of an impact on the organization. Step 6—Assess the feasibility of implementing the mitigation options.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Implementing CIA at the Organizational Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.10 - Identify eight steps that must be taken to perform a thorough security risk assessment. KEYWORDS: Bloom's: Remember DATE CREATED: 12/30/2019 2:50 PM DATE MODIFIED: 12/30/2019 2:58 PM 83. Kenneth is assisting with step 7 of his organization's security risk assessment. He and his team compare the risks of potential security breaches against the estimated costs of preventing them from happening. Why is this an important step? a. Data availability requires implementing products, services, policies, and procedures to ensure that data are accessible. b. Periodic security audits are needed to ensure that individuals are following established policies. c. No amount of resources can guarantee a perfect security system, so one must balance risks with prevention costs. d. Taking action to prevent cyberattacks, such as installing protective software, makes them much less likely to occur. ANSWER: c RATIONALE: Step 7 is to perform a cost-benefit analysis to ensure that your efforts will be cost effective. No amount of resources can guarantee a perfect security system, so organizations must balance the risk of a security breach with the cost of preventing one. FEEDBACK: a. Step 7 is to perform a cost-benefit analysis to ensure that your efforts will be cost effective. No amount of resources can guarantee a perfect security system, so organizations must balance the risk of a security breach with the cost of preventing one. b. Step 7 is to perform a cost-benefit analysis to ensure that your efforts will be cost effective. No amount of resources can guarantee a perfect security system, so organizations must balance the risk of a security breach with the cost of preventing one. c. Step 7 is to perform a cost-benefit analysis to ensure that your efforts will be cost effective. No amount of resources can guarantee a perfect security system, so organizations must balance the risk of a security breach with the cost of preventing one. d. Step 7 is to perform a cost-benefit analysis to ensure that your efforts will be cost effective. No amount of resources can guarantee a perfect security system, so organizations must balance the risk of a security breach with the cost of preventing one.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 58


Chapter 02 - Secure Information Systems REFERENCES: Implementing CIA at the Organizational Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.10 - Identify eight steps that must be taken to perform a thorough security risk assessment. KEYWORDS: Bloom's: Remember DATE CREATED: 12/30/2019 3:00 PM DATE MODIFIED: 12/30/2019 3:13 PM 84. The final step in the security risk assessment process is to _____. a. analyze the costs and benefits of various countermeasures b. decide whether or not to implement particular countermeasures c. create a chart that identifies loss events, their frequency, and their monetary costs d. assess the feasibility of implementing each of the identified mitigation measures ANSWER: b RATIONALE: Step 8 is to make the decision on whether or not to implement a particular countermeasure. If you decide against implementing a particular countermeasure, you need to reassess if the threat is truly serious and, if so, identify a less costly countermeasure. FEEDBACK: a. Step 8 is to make the decision on whether or not to implement a particular countermeasure. b. Step 8 is to make the decision on whether or not to implement a particular countermeasure. c. Step 8 is to make the decision on whether or not to implement a particular countermeasure. d. Step 8 is to make the decision on whether or not to implement a particular countermeasure.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementing CIA at the Organizational Level QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.10 - Identify eight steps that must be taken to perform a thorough security risk assessment. KEYWORDS: Bloom's: Remember DATE CREATED: 12/30/2019 3:15 PM DATE MODIFIED: 12/30/2019 3:19 PM 85. What do AT&T, Computer Sciences Corporation, Dell SecureWorks, IBM, Symantec, and Verizon have in common? a. they recently suffered massive data breaches b. they pioneered bring your own device policies c. they have reduced their security risk to zero d. they are managed security service providers ANSWER: d RATIONALE: Managed security service providers (MSSPs) include such companies as AT&T, Computer Sciences Corporation, Dell SecureWorks, IBM, Symantec, and Verizon. FEEDBACK: a. Managed security service providers (MSSPs) include such companies as Copyright Cengage Learning. Powered by Cognero.

Page 59


Chapter 02 - Secure Information Systems AT&T, Computer Sciences Corporation, Dell SecureWorks, IBM, Symantec, and Verizon. b. Managed security service providers (MSSPs) include such companies as AT&T, Computer Sciences Corporation, Dell SecureWorks, IBM, Symantec, and Verizon. c. Managed security service providers (MSSPs) include such companies as AT&T, Computer Sciences Corporation, Dell SecureWorks, IBM, Symantec, and Verizon. d. Managed security service providers (MSSPs) include such companies as AT&T, Computer Sciences Corporation, Dell SecureWorks, IBM, Symantec, and Verizon.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Using a Managed Security Service Provider (MSSP) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.12 - Describe the role of a managed security service provider. KEYWORDS: Bloom's: Remember DATE CREATED: 12/30/2019 3:46 PM DATE MODIFIED: 12/30/2019 3:49 PM 86. What is the role of an MSSP? a. limiting the Web sites and data that employees can access b. monitoring system and network traffic automatically c. combining elements of law and computer science to collect IS data d. monitoring, managing, and maintaining computer and network security ANSWER: d RATIONALE: Many organizations outsource their network security operations to a managed security service provider (MSSP), which is a company that monitors, manages, and maintains computer and network security for other organizations. FEEDBACK: a. Many organizations outsource their network security operations to a managed security service provider (MSSP), which is a company that monitors, manages, and maintains computer and network security for other organizations. b. Many organizations outsource their network security operations to a managed security service provider (MSSP), which is a company that monitors, manages, and maintains computer and network security for other organizations. c. Many organizations outsource their network security operations to a managed security service provider (MSSP), which is a company that monitors, manages, and maintains computer and network security for other organizations. d. Many organizations outsource their network security operations to a managed security service provider (MSSP), which is a company that monitors, manages, and maintains computer and network security for other organizations.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Using a Managed Security Service Provider (MSSP) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.12 - Describe the role of a managed security service provider. Copyright Cengage Learning. Powered by Cognero.

Page 60


Chapter 02 - Secure Information Systems KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 12/30/2019 3:50 PM 12/30/2019 3:57 PM

87. Why do many small and mid-sized businesses hire MSSPs? a. unavailability of effective antivirus and firewall software b. legal injunctions imposed following HIPAA violations c. lack of adequate in-house network security expertise d. need for computer forensics services during legal proceedings ANSWER: c RATIONALE: Keeping up with computer criminals—and with new laws and regulations—can be daunting for organizations. Criminal hackers are constantly poking and prodding, trying to breach the security defenses of organizations. Also, laws such as HIPAA, Sarbanes-Oxley, and the USA Patriot Act require businesses to prove that they are securing their data. For most small and midsized organizations, the level of in-house network security expertise needed to protect their business operations can be too costly to acquire and maintain. As a result, many organizations outsource their network security operations to a managed security service provider (MSSP), which is a company that monitors, manages, and maintains computer and network security for other organizations. FEEDBACK: a. For most small and midsized organizations, the level of in-house network security expertise needed to protect their business operations can be too costly to acquire and maintain. As a result, many organizations outsource their network security operations to a managed security service provider (MSSP). b. For most small and midsized organizations, the level of in-house network security expertise needed to protect their business operations can be too costly to acquire and maintain. As a result, many organizations outsource their network security operations to a managed security service provider (MSSP). c. For most small and midsized organizations, the level of in-house network security expertise needed to protect their business operations can be too costly to acquire and maintain. As a result, many organizations outsource their network security operations to a managed security service provider (MSSP). d. For most small and midsized organizations, the level of in-house network security expertise needed to protect their business operations can be too costly to acquire and maintain. As a result, many organizations outsource their network security operations to a managed security service provider (MSSP).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Using a Managed Security Service Provider (MSSP) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.12 - Describe the role of a managed security service provider. KEYWORDS: Bloom's: Remember DATE CREATED: 12/30/2019 3:58 PM DATE MODIFIED: 12/30/2019 4:06 PM 88. Samantha owns a small business that handles a lot of sensitive customer data and would be devastated by a data breach. Her IS department, which consists of one part-time consultant named Nikki, is overwhelmed by the number of alerts and false alarms constantly issued by her security-monitoring systems, and expresses concerns about their data security. What should Samantha do about this? Copyright Cengage Learning. Powered by Cognero.

Page 61


Chapter 02 - Secure Information Systems a. consider a managed security service provider b. ask Nikki to disable the alerts and alarms c. research different security software options d. change her passwords more often ANSWER: a RATIONALE: For most small and midsized organizations, the level of in-house network security expertise needed to protect their business operations can be too costly to acquire and maintain. As a result, many organizations outsource their network security operations to a managed security service provider (MSSP), which is a company that monitors, manages, and maintains computer and network security for other organizations. MSSPs provide a valuable service for IS departments drowning in reams of alerts and false alarms coming from virtual private networks (VPNs); antivirus, firewall, and intrusion detection systems; and other security-monitoring systems. FEEDBACK: a. For most small and midsized organizations, the level of in-house network security expertise needed to protect their business operations can be too costly to acquire and maintain. MSSPs provide a valuable service for IS departments drowning in reams of alerts and false alarms coming from security-monitoring systems. b. For most small and midsized organizations, the level of in-house network security expertise needed to protect their business operations can be too costly to acquire and maintain. MSSPs provide a valuable service for IS departments drowning in reams of alerts and false alarms coming from security-monitoring systems. c. For most small and midsized organizations, the level of in-house network security expertise needed to protect their business operations can be too costly to acquire and maintain. MSSPs provide a valuable service for IS departments drowning in reams of alerts and false alarms coming from security-monitoring systems. d. For most small and midsized organizations, the level of in-house network security expertise needed to protect their business operations can be too costly to acquire and maintain. MSSPs provide a valuable service for IS departments drowning in reams of alerts and false alarms coming from security-monitoring systems.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Using a Managed Security Service Provider (MSSP) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.12 - Describe the role of a managed security service provider. KEYWORDS: Bloom's: Remember DATE CREATED: 12/30/2019 4:07 PM DATE MODIFIED: 12/30/2019 4:17 PM 89. Managed security service providers primarily help organizations keep pace with _____. a. invoices and accounts receivable b. cybercriminals and new laws and regulations c. business objectives and mission-critical processes d. market demands and customer expectations ANSWER: b Copyright Cengage Learning. Powered by Cognero.

Page 62


Chapter 02 - Secure Information Systems RATIONALE:

Keeping up with computer criminals—and with new laws and regulations—can be daunting for organizations. Criminal hackers are constantly poking and prodding, trying to breach the security defenses of organizations. Also, laws such as HIPAA, Sarbanes-Oxley, and the USA Patriot Act require businesses to prove that they are securing their data. For most small and midsized organizations, the level of in-house network security expertise needed to protect their business operations can be too costly to acquire and maintain. As a result, many organizations outsource their network security operations to a managed security service provider (MSSP), which is a company that monitors, manages, and maintains computer and network security for other organizations.

FEEDBACK:

a. Keeping up with computer criminals—and with new laws and regulations—can be daunting for organizations. As a result, many organizations outsource their network security operations to a managed security service provider (MSSP), which is a company that monitors, manages, and maintains computer and network security for other organizations. b. Keeping up with computer criminals—and with new laws and regulations—can be daunting for organizations. As a result, many organizations outsource their network security operations to a managed security service provider (MSSP), which is a company that monitors, manages, and maintains computer and network security for other organizations. c. Keeping up with computer criminals—and with new laws and regulations—can be daunting for organizations. As a result, many organizations outsource their network security operations to a managed security service provider (MSSP), which is a company that monitors, manages, and maintains computer and network security for other organizations. d. Keeping up with computer criminals—and with new laws and regulations—can be daunting for organizations. As a result, many organizations outsource their network security operations to a managed security service provider (MSSP), which is a company that monitors, manages, and maintains computer and network security for other organizations.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Using a Managed Security Service Provider (MSSP) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.12 - Describe the role of a managed security service provider. KEYWORDS: Bloom's: Remember DATE CREATED: 12/30/2019 4:18 PM DATE MODIFIED: 12/30/2019 4:26 PM 90. Assessing damage following a computer incident, investigating the unauthorized disclosure of corporate confidential data, and confirming or evaluating the impact of industrial espionage are tasks most appropriate for _____. a. managed security service providers b. computer forensics c. the CIA security triad d. a security dashboard ANSWER: b RATIONALE: A computer forensics investigation may be opened in response to a criminal investigation or civil litigation. It may also be launched for a variety of other reasons, for example, to retrace steps taken when data has been lost, assess damage following a computer incident, investigate the unauthorized disclosure of personal or corporate confidential data, or to Copyright Cengage Learning. Powered by Cognero.

Page 63


Chapter 02 - Secure Information Systems confirm or evaluate the impact of industrial espionage. FEEDBACK:

a. A computer forensics investigation may be launched for a variety of reasons,

for example, to retrace steps taken when data has been lost, assess damage following a computer incident, investigate the unauthorized disclosure of personal or corporate confidential data, or to confirm or evaluate the impact of industrial espionage. b. A computer forensics investigation may be launched for a variety of reasons, for example, to retrace steps taken when data has been lost, assess damage following a computer incident, investigate the unauthorized disclosure of personal or corporate confidential data, or to confirm or evaluate the impact of industrial espionage. c. A computer forensics investigation may be launched for a variety of reasons, for example, to retrace steps taken when data has been lost, assess damage following a computer incident, investigate the unauthorized disclosure of personal or corporate confidential data, or to confirm or evaluate the impact of industrial espionage. d. A computer forensics investigation may be launched for a variety of reasons, for example, to retrace steps taken when data has been lost, assess damage following a computer incident, investigate the unauthorized disclosure of personal or corporate confidential data, or to confirm or evaluate the impact of industrial espionage.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Computer Forensics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.13 - Define the term computer forensics. KEYWORDS: Bloom's: Remember DATE CREATED: 12/30/2019 4:31 PM DATE MODIFIED: 12/30/2019 4:40 PM 91. The accounting, tax, and advisory company Grant Thornton International has several IS labs around the world that employ experts who examine digital evidence for use in legal cases. Their activities are best characterized as an example of _____. a. firewalls b. loss event mitigation c. computer forensics d. risk assessment ANSWER: c RATIONALE: Computer forensics investigators work as a team to investigate an incident and conduct the forensic analysis using various methodologies and tools to ensure the computer network system is secure in an organization. For example, accounting, tax, and advisory company Grant Thornton International has several IS labs around the world that employ numerous forensic experts who examine digital evidence for use in legal cases. FEEDBACK: a. Computer forensics investigators such as those at Grant Thornton International work as a team to investigate an incident and conduct the forensic analysis using various methodologies and tools to ensure the computer network system is secure in an organization. b. Computer forensics investigators such as those at Grant Thornton International work as a team to investigate an incident and conduct the forensic analysis

Copyright Cengage Learning. Powered by Cognero.

Page 64


Chapter 02 - Secure Information Systems using various methodologies and tools to ensure the computer network system is secure in an organization. c. Computer forensics investigators such as those at Grant Thornton International work as a team to investigate an incident and conduct the forensic analysis using various methodologies and tools to ensure the computer network system is secure in an organization. d. Computer forensics investigators such as those at Grant Thornton International work as a team to investigate an incident and conduct the forensic analysis using various methodologies and tools to ensure the computer network system is secure in an organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Computer Forensics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.13 - Define the term computer forensics. KEYWORDS: Bloom's: Remember DATE CREATED: 12/30/2019 4:43 PM DATE MODIFIED: 12/30/2019 4:49 PM 92. To successfully fight computer crime in a court of law, prosecutors and victims depend on a properly handled _____. a. security education initiative b. intrusion detection system c. corporate security risk assessment d. computer forensics investigation ANSWER: d RATIONALE: Proper handling of a computer forensics investigation is the key to fighting computer crime successfully in a court of law. FEEDBACK: a. Proper handling of a computer forensics investigation is the key to fighting computer crime successfully in a court of law. b. Proper handling of a computer forensics investigation is the key to fighting computer crime successfully in a court of law. c. Proper handling of a computer forensics investigation is the key to fighting computer crime successfully in a court of law. d. Proper handling of a computer forensics investigation is the key to fighting computer crime successfully in a court of law.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Computer Forensics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.13 - Define the term computer forensics. KEYWORDS: Bloom's: Remember DATE CREATED: 12/30/2019 4:50 PM DATE MODIFIED: 12/30/2019 4:53 PM 93. The CCE, CISSP, CSFA, and GCFA certifications all indicate that someone has expertise in _____. Copyright Cengage Learning. Powered by Cognero.

Page 65


Chapter 02 - Secure Information Systems a. computer forensics b. security risk assessment c. corporate reputation management d. social engineering ANSWER: a RATIONALE: Proper handling of a computer forensics investigation is the key to fighting computer crime successfully in a court of law. In addition, extensive training and certification increases the stature of a computer forensics investigator in a court of law. Numerous certifications relate to computer forensics, including the CCE (Certified Computer Examiner), CISSP (Certified Information Systems Security Professional), CSFA (CyberSecurity Forensic Analyst), and GCFA (Global Information Assurance Certification Certified Forensics Analyst). FEEDBACK: a. Numerous certifications relate to computer forensics, including the CCE (Certified Computer Examiner), CISSP (Certified Information Systems Security Professional), CSFA (CyberSecurity Forensic Analyst), and GCFA (Global Information Assurance Certification Certified Forensics Analyst). b. Numerous certifications relate to computer forensics, including the CCE (Certified Computer Examiner), CISSP (Certified Information Systems Security Professional), CSFA (CyberSecurity Forensic Analyst), and GCFA (Global Information Assurance Certification Certified Forensics Analyst). c. Numerous certifications relate to computer forensics, including the CCE (Certified Computer Examiner), CISSP (Certified Information Systems Security Professional), CSFA (CyberSecurity Forensic Analyst), and GCFA (Global Information Assurance Certification Certified Forensics Analyst). d. Numerous certifications relate to computer forensics, including the CCE (Certified Computer Examiner), CISSP (Certified Information Systems Security Professional), CSFA (CyberSecurity Forensic Analyst), and GCFA (Global Information Assurance Certification Certified Forensics Analyst).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Computer Forensics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.2.13 - Define the term computer forensics. KEYWORDS: Bloom's: Remember DATE CREATED: 12/30/2019 4:58 PM DATE MODIFIED: 12/30/2019 5:03 PM Essay 94. You are being consulted for recommendations on software for sales report management. There are two choices. Choice #1 is a product from an industry leader that costs more than $1,000 per license per year. Choice #2 is a free, opensource software application that is free to download and install. The free software is written in a language that your programmers do not have expertise in. You may be able to convince management to hire the right programmer to install the free and open-source software. Considering the importance of data security, what solution would you recommend, and why? ANSWER: I would recommend choosing the product from the industry leader. Since the software is from the industry leader, it is likely to have fewer vulnerabilities, and thus will be less risky. Large software development companies have the resources to quickly create and issue patches when new vulnerabilities are discovered. The open-source software may Copyright Cengage Learning. Powered by Cognero.

Page 66


Chapter 02 - Secure Information Systems have vulnerabilities that have been discovered yet, or contributors to the software may not have the resources to respond rapidly when they become aware of new vulnerabilities. For these reasons, I would recommend the first solution—to purchase the software license from the industry leader. RATIONALE:

POINTS: RUBRIC:

In computing, an exploit is an attack on an information system that takes advantage of a particular system vulnerability. Often this attack is made possible due to poor system design or implementation. Once the vulnerability is discovered, software developers create and issue a “fix,” or patch, to eliminate the problem. Note that the number of new software vulnerabilities identified in 2016 was 15,000—an average of 41 per day. Clearly, it can be difficult to keep up with all the required patches to fix these vulnerabilities. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Identify the recommended software choice. Provide a rationale for selecting this software choice over the other option.

DIFFICULTY: Easy REFERENCES: Why Computer Incidents Are So Prevalent QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.2.1 - State four reasons why computer incidents have become so prevalent. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/27/2019 2:37 PM 95. Pam, your new marketing manager, is exploring the purchase of tens of thousands of email addresses from a legitimate source for the purpose of sending product information to the masses. She has asked your opinion. Would you agree or disagree with her idea? Why or why not? ANSWER: I would not agree with her idea to buy tens of thousands of email addresses and send mass emails to them. It will be considered spam and potentially marked as spam by the email filters. The email filters are quite sophisticated these days. Those emails may not make it to the inboxes of the intended audience. Given the general opinion that spam is not welcome, the email marketing campaign is not destined to make any net positive impact on the potential audience. In addition, having received "junk email" from our business would leave a not-so-good impression on people. They may reject any future, recipient-specific emails from our business. For these reasons, I would not agree with Pam. RATIONALE:

There are numerous types of attack vectors. One is spam, the use of email systems to send unsolicited email to large numbers of people. It could be considered unwise to associate one's organization with a technique that is commonly used for cyberattacks.

Copyright Cengage Learning. Powered by Cognero.

Page 67


Chapter 02 - Secure Information Systems POINTS: RUBRIC:

1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

State a position on the use of unsolicited emails for marketing purposes. Provide a rationale for the stated position using information about attack vectors.

DIFFICULTY: Moderate REFERENCES: Types of Attack Vectors QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.2.3 - Define the term attack vector. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/27/2019 2:43 PM 96. You have been invited to speak to senior citizens about the Internet in general and email in particular. What topics would you choose to talk about to benefit your audience the most? ANSWER:

Knowing that phishing is an attack vector that exploits people's use of email, I would caution the senior citizens against phishing attacks. I would explain what phishing is and how to identify emails using this attack vector. I would show them samples of phishing emails and describe what happens if someone responds to them. I would also demonstrate how following a link from the email can lead to websites with malicious codes. I would give them some guidelines on what to do in case they become victims of phishing attacks. I would also discuss spam, another attack vector that involves email. I would warn the senior citizens that they may receive messages from people or organizations they do not know or do not currently do business with, and that it is wise to set up a spam filter to automatically delete unsolicited messages and allow only mass messages that they have willingly signed up for into the mail program's inbox.

RATIONALE:

POINTS: RUBRIC:

Perpetrators of computer crimes use an attack vector to gain unauthorized access to a device or a network and to initiate a cyberattack. There are numerous types of attack vectors. One is phishing, the act of fraudulently using email to try to get the recipient to reveal personal data. Another attack vector that involves email is span, the use of email systems to send unsolicited email to large numbers of people. 1 Criteria

Copyright Cengage Learning. Powered by Cognero.

0

1

2

3

4

Failure

Below

Developing

Competent

Mastery Page 68


Chapter 02 - Secure Information Systems Expectations Identify and describe topics to be covered during a presentation on email security.

DIFFICULTY: Moderate REFERENCES: Types of Attack Vectors QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.2.3 - Define the term attack vector. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/27/2019 2:59 PM 97. Your company has acquired Joggers PLC, a smaller company. The integration of the information systems can take up to 6 months, and until then Joggers PLC workers will continue following their policies. You have been tasked with ensuring that their IT practices will be safe and lead to a secure system. What advice would you give your manager regarding information security? ANSWER: I would ensure Joggers' infrastructure is well protected by firewalls, antivirus software, and updated applications. I would enforce a password policy to make guessing the passwords improbable. I would recommend they institute a data backup policy to perform regular backups of all data. I would also restrict data access to that required for users' roles. RATIONALE:

A security policy defines an organization’s security requirements, as well as the controls and sanctions needed to meet those requirements. A good security policy delineates responsibilities and the behavior expected of members of the organization. Experienced IT managers understand that users will often attempt to circumvent security policies or simply ignore them altogether. Because of that, automated system rules should mirror an organization’s written policies whenever possible. Installation of a corporate firewall is the most common security precaution taken by businesses. A firewall is a system of software, hardware, or a combination of both that stands guard between an organization’s internal network and the Internet, and limits network access based on the organization’s access policy. Antivirus software should be installed on each user’s personal computer to scan a computer’s memory and disk drives regularly for viruses. Files and databases can be protected by making a copy of all files and databases changed during the last few days or the last week, a technique called incremental backup.

POINTS: RUBRIC:

Another important safeguard is to create roles and user accounts so that users have the authority to perform their responsibilities and nothing more. An effective system administrator will identify the similarities among users and create roles and user accounts associated with these groups. 1 Criteria

Copyright Cengage Learning. Powered by Cognero.

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery Page 69


Chapter 02 - Secure Information Systems Explain how to implement CIA at several levels to minimize risk when new hardware, software, and users are brought into an organization.

DIFFICULTY: Moderate REFERENCES: The CIA Security Triad QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.2.8 - Discuss how the CIA security triad can be implemented at the organization, network, application, and end user levels to safeguard against cyberattacks. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/27/2019 3:16 PM 98. You have been called in to collect information regarding a recent data breach at your organization. What specific information would you collect and for what reasons would you seek that information? ANSWER: I would collect the information needed to write a formal incident report outlining exactly what happened (how the data breach occurred) and evaluating how the organization responded. This would include a detailed chronology of events and the impact of the incident, and in particular would identify any mistakes that led to the data breach so they will not be repeated in the future. Specific data I would collect would include the following: • • • • • • • • • • • • •

RATIONALE:

IP address and name of host computer(s) involved The date and time when the incident was discovered The length of the incident How the incident was discovered The method used to gain access to the host computer A detailed discussion of vulnerabilities that were exploited A determination of whether or not the host was compromised as a result of the attack The nature of the data stored on the computer (customer, employee, financial, etc.) A determination of whether the accessed data is considered personal, private, or confidential The number of hours the system was down The overall impact on the business An estimate of total monetary damage from the incident A detailed chronology of all events associated with the incident

A review should be conducted after an incident to determine exactly what happened and to evaluate how the organization responded. One approach is to write a formal incident report that includes a detailed chronology of events and the impact of the incident. This report

Copyright Cengage Learning. Powered by Cognero.

Page 70


Chapter 02 - Secure Information Systems should identify any mistakes so that they are not repeated in the future. The experience from this incident should be used to update and revise the security incident response plan. The key elements of a formal incident report should include the following: • • • • • • • • • • • • •

POINTS: RUBRIC:

IP address and name of host computer(s) involved The date and time when the incident was discovered The length of the incident How the incident was discovered The method used to gain access to the host computer A detailed discussion of vulnerabilities that were exploited A determination of whether or not the host was compromised as a result of the attack The nature of the data stored on the computer (customer, employee, financial, etc.) A determination of whether the accessed data is considered personal, private, or confidential The number of hours the system was down The overall impact on the business An estimate of total monetary damage from the incident A detailed chronology of all events associated with the incident

1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Describe the data that should be collected in response to a successful cyberattack. Explain how this information will be used.

DIFFICULTY: Moderate REFERENCES: Response QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.2.11 - Describe five actions an organization must take in response to a successful cyberattack. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:58 PM DATE MODIFIED: 12/27/2019 3:29 PM

Copyright Cengage Learning. Powered by Cognero.

Page 71


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues True / False 1. Anonymous remailers both help protect freedom of speech by keeping communications anonymous and prevent people from using email for illegal or unethical purposes. a. True b. False ANSWER: False RATIONALE: Internet users who want to remain anonymous can send email to an anonymous remailer service, which uses a computer program to strip the originating header and/or IP number from the message. It then forwards the message to its intended recipient—an individual, a chat room, or a newsgroup—with either no IP address or a fake one, ensuring that the header information cannot be used to identify the author. The use of a remailer keeps communications anonymous; what is communicated, and whether it is ethical or legal, is up to the sender. The use of remailers by people committing unethical or even illegal acts in some states or countries has spurred controversy. FEEDBACK: Correct The use of a remailer keeps communications anonymous; what is communicated, and whether it is ethical or legal, is up to the sender. Incorrect The use of a remailer keeps communications anonymous; what is communicated, and whether it is ethical or legal, is up to the sender.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Measures Protecting Freedom of Speech QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.11 - Discuss how the First Amendment and anonymous expression safeguard our freedom of speech. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/2/2020 3:24 PM 2. If an activity is defined as legal then it is ethical. a. True b. False ANSWER: False RATIONALE: Legal acts conform to the law. Ethical acts conform to what an individual believes to be the right thing to do. Laws can proclaim an act as legal, although many people may consider the act unethical. Laws may also proclaim an act as illegal, although many people may consider the act ethical. FEEDBACK: Correct Laws can proclaim an act as legal, although many people may consider the act unethical. Incorrect Laws can proclaim an act as legal, although many people may consider the act unethical.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Ethical Versus Legal True / False

Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.1 - Explain the difference between ethical and legal. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/2/2020 3:30 PM 3. Laws and regulations have thoroughly addressed concerns about privacy and data management in private organizations and federal agencies. a. True b. False ANSWER: False RATIONALE: Many people object to the data collection policies of governments and businesses on the grounds that they strip individuals of the power to control their own personal information. For these people, the existing hodgepodge of privacy laws and practices fails to provide adequate protection. Instead, it causes confusion that promotes distrust and skepticism, which are further fueled by additional disclosures of threats to privacy. FEEDBACK: Correct Many people object to the data collection policies of governments and businesses. For these people, the existing hodgepodge of privacy laws and practices fails to provide adequate protection. Incorrect Many people object to the data collection policies of governments and businesses. For these people, the existing hodgepodge of privacy laws and practices fails to provide adequate protection.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information Systems and Privacy QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.8 - Identify four measures you should take to protect your personal privacy. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/2/2020 3:42 PM 4. The GDPR obligates organizations that operate in the European Union to obtain the consent of the people they collect information about. a. True b. False ANSWER: True RATIONALE: The General Data Protection Regulation (GDPR) is a set of data privacy requirements that apply across the European Union including non-EU organizations that market to or process information of individuals in the European Union. In general, it increases the rights of individuals and gives them more control over their information. GDPR places obligations on organizations to obtain the consent of people they collect information about and to better manage this data. This includes putting in place a data protection officer and data protection policies, performing data protection assessments, providing training for employees to ensure that they are aware of their responsibilities related to personal data, and having written Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues documentation explaining how data is processed. FEEDBACK:

Correct

GDPR places obligations on organizations to obtain the consent of people they collect information about and to better manage this data. Incorrect GDPR places obligations on organizations to obtain the consent of people they collect information about and to better manage this data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Measures Protecting Personal Data QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.6 - Summarize the differences between U.S. and EU fair information practices. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/4/2020 3:12 PM 5. In the U.S., there is some debate over privacy between those who favor data collection as a means to increase national security and those who view such programs as a violation of rights guaranteed by the Constitution and the Bill of Rights. a. True b. False ANSWER: True RATIONALE: In recent years, new laws addressing government electronic surveillance have been added and old laws amended in reaction to the development of new communication technologies and a heightened awareness of potential terrorist threats. The net result is that the scope of government surveillance has greatly expanded—going from collecting data on as few people as necessary to collecting as much data as possible on as many people as possible. Many of the resulting surveillance activities are viewed by some as an unconstitutional violation of the Fourth Amendment, which protects us from illegal searches and seizures. As a result, there are frequent court challenges to these government actions, as well as an ongoing public debate about whether such activities make Americans safer or simply erode our rights to privacy. FEEDBACK: Correct There are frequent court challenges to government surveillance activities, as well as an ongoing public debate about whether such activities make Americans safer or simply erode our rights to privacy. Incorrect There are frequent court challenges to government surveillance activities, as well as an ongoing public debate about whether such activities make Americans safer or simply erode our rights to privacy.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information Systems and Government Surveillance QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.9 - Discuss the tradeoffs between security and privacy. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/2/2020 3:54 PM Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues 6. Some organizations choose to practice a form of Internet censorship by installing Internet filters on their employees' computers to prevent them from viewing sites containing pornography or other objectionable material. a. True b. False ANSWER: True RATIONALE: Some organizations choose to install filters on their employees’ computers to prevent them from viewing sites that contain pornography or other objectionable material. Employees unwillingly exposed to such material would have a strong case for sexual harassment. The use of filters can also ensure that employees do not waste their time viewing nonbusinessrelated Web sites. FEEDBACK: Correct Some organizations choose to install filters on their employees’ computers to prevent them from viewing sites that contain pornography or other objectionable material. Incorrect Some organizations choose to install filters on their employees’ computers to prevent them from viewing sites that contain pornography or other objectionable material.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Internet Censorship QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.12 - Describe the impact of censorship on the operation of Internet service providers. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/2/2020 4:03 PM 7. Some non-health-care companies offer health and wellness programs that require employee participants to share personal data. They are required to employ standardized electronic transactions, codes, and identifiers under HIPAA regulations. a. True b. False ANSWER: False RATIONALE: The Health Insurance Portability and Accountability Act (HIPAA) requires health care organizations to employ standardized electronic transactions, codes, and identifiers to enable them to fully digitize medical records, thus making it possible to exchange medical data over the Internet. HIPPA assigns responsibility to health care organizations for certifying that their business partners (billing agents, insurers, debt collectors, research firms, government agencies, and charitable organizations) also comply with HIPAA security and privacy rules. FEEDBACK: Correct The Health Insurance Portability and Accountability Act (HIPAA) requires health care organizations to employ standardized electronic transactions, codes, and identifiers and assigns responsibility to health care organizations for certifying that their business partners also comply with HIPAA security and privacy rules. Incorrect The Health Insurance Portability and Accountability Act (HIPAA) requires health care organizations to employ standardized electronic transactions, codes, and identifiers and assigns responsibility to health care organizations for certifying that their business partners also comply with HIPAA security and privacy rules. Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues POINTS: 1 DIFFICULTY: Easy REFERENCES: Measures Protecting Personal Data QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.7 - Identify three subject areas where measures have been taken to protect personal data. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/2/2020 4:20 PM 8. U.S. federal law permits employers to prevent viewing of pornography in the workplace by employees. a. True b. False ANSWER: True RATIONALE: If an employee sees a coworker viewing porn on a workplace computer, that employee may be able to claim that the company has created a hostile work environment. Such a claim opens the organization to a sexual harassment lawsuit that can cost hundreds of thousands of dollars and tie up managers and executives in endless depositions and court appearances. Many companies believe that they have a duty to stop the viewing of pornography in the workplace. As long as they can show that they took reasonable steps and determined actions to prevent it, they have a valid defense if they become the subject of a sexual harassment lawsuit. FEEDBACK: Correct Many companies believe that they have a duty to stop the viewing of pornography in the workplace. As long as they can show that they took reasonable steps and determined actions to prevent it, they have a valid defense if they become the subject of a sexual harassment lawsuit. Incorrect Many companies believe that they have a duty to stop the viewing of pornography in the workplace. As long as they can show that they took reasonable steps and determined actions to prevent it, they have a valid defense if they become the subject of a sexual harassment lawsuit.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Internet Censorship QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.13 - Identify measures taken to address defamation, hate speech, and pornography on the Internet. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/2/2020 4:33 PM 9. Never send sensitive personal data such as credit card numbers, bank account numbers, or passwords via text or IM; only send them through Web sites that don't begin with https or cause a padlock icon to appear in the Address bar or status bar. Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues a. True b. False ANSWER: RATIONALE:

FEEDBACK:

False Take extra care when purchasing anything from a Web site. Make sure that you safeguard your credit card numbers, passwords, and personal information. Do not do business with a site unless you know that it handles credit card information securely. (Look for a seal of approval from organizations such as the Better Business Bureau Online or TRUSTe. When you open the Web page where you enter credit card information or other personal data, make sure that the Web address begins with https and check to see if a locked padlock icon appears in the Address bar or status bar.) Correct

When you open the Web page where you enter credit card information or other personal data, make sure that the Web address begins with https and check to see if a locked padlock icon appears in the Address bar or status bar. Incorrect When you open the Web page where you enter credit card information or other personal data, make sure that the Web address begins with https and check to see if a locked padlock icon appears in the Address bar or status bar.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Individual Efforts to Protect Privacy QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.8 - Identify four measures you should take to protect your personal privacy. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/2/2020 4:43 PM 10. Amy is doing some online research for a term paper. She'd like to access some information on a particular Web site, but the Web site is asking her to put in her email address before allowing her to view the information. She wonders what the Web site owner will do with that information, but there is no way for her to know how data collected via a Web site will be used. a. True b. False ANSWER: False RATIONALE: Most organizations feel a strong need to create a privacy policy that describes how it gathers, stores, shares, and sells data about its visitors. FEEDBACK: Correct Most organizations feel a strong need to create a privacy policy that describes how it gathers, stores, shares, and sells data about its visitors. Incorrect Most organizations feel a strong need to create a privacy policy that describes how it gathers, stores, shares, and sells data about its visitors.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Web Site Privacy Policy QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.8 - Identify four measures you should take to protect your personal privacy. NATIONAL STANDARDS: United States - BUSPROG: Technology Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 11/19/2019 5:54 PM 1/2/2020 4:48 PM

11. It's safe for you to input personal data into your Facebook profile because Facebook is not allowed to share this information with law enforcement officials or third parties for any reason. a. True b. False ANSWER: False RATIONALE: Downstream (formerly PRISM) is an NSA surveillance program that collects Internet data, such as search histories; photos sent and received; and the contents of email, file transfers, and voice and video chats from the servers of AOL, Apple, Facebook, Google, Microsoft, Paltalk, Skype, Yahoo, and YouTube. FEEDBACK: Correct Downstream (formerly PRISM) is an NSA surveillance program that collects Internet data, such as search histories; photos sent and received; and the contents of email, file transfers, and voice and video chats from the servers of AOL, Apple, Facebook, Google, Microsoft, Paltalk, Skype, Yahoo, and YouTube. Incorrect Downstream (formerly PRISM) is an NSA surveillance program that collects Internet data, such as search histories; photos sent and received; and the contents of email, file transfers, and voice and video chats from the servers of AOL, Apple, Facebook, Google, Microsoft, Paltalk, Skype, Yahoo, and YouTube.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information Systems and Government Surveillance QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.10 - Discuss how three U.S. federal statutes protect citizens from government surveillance while at the same time authorize the government to collect data. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/2/2020 4:57 PM 12. Software developers have created filtering software that blocks children from viewing inappropriate or harmful Internet sites at home or school, but to date developers have been unsuccessful in creating a similar software for use in the workplace. a. True b. False ANSWER: False RATIONALE: An Internet filter is software that can be used to block access to certain Web sites that contain material deemed inappropriate or offensive. The best Internet filters use a combination of URL, keyword, and dynamic content filtering. In an attempt to protect children from accessing pornography and other explicit material online, Congress passed the Children’s Internet Protection Act (CIPA) in 2000. The act required federally financed schools and libraries to use some form of technological protection (such as an Internet filter) to block computer access to obscene material, pornography, and anything else considered harmful to minors. Some organizations choose to install filters on their employees’ computers to prevent them from viewing sites that contain pornography or other objectionable material. Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues FEEDBACK:

Correct

An Internet filter is software that can be used to block access to certain Web sites that contain material deemed inappropriate or offensive. Some organizations choose to install filters on their employees’ computers to prevent them from viewing sites that contain pornography or other objectionable material. Incorrect An Internet filter is software that can be used to block access to certain Web sites that contain material deemed inappropriate or offensive. Some organizations choose to install filters on their employees’ computers to prevent them from viewing sites that contain pornography or other objectionable material.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Internet Censorship QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.13 - Identify measures taken to address defamation, hate speech, and pornography on the Internet. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/2/2020 5:07 PM 13. The U.S. Congress has made several attempts to pass and maintain legislation that limits children's exposure to online pornography, but eventually each of these laws has been ruled out because they were unconstitutional. a. True b. False ANSWER: False RATIONALE: To date, only a few laws have been implemented to protect children online, and several of these have been ruled unconstitutional under the First Amendment and its protection of freedom of expression. Nonetheless, Congress passed the Children’s Internet Protection Act (CIPA) in 2000. The act required federally financed schools and libraries to use some form of technological protection (such as an Internet filter) to block computer access to obscene material, pornography, and anything else considered harmful to minors. FEEDBACK: Correct Congress passed the Children’s Internet Protection Act (CIPA) in 2000. The act required federally financed schools and libraries to use some form of technological protection (such as an Internet filter) to block computer access to obscene material, pornography, and anything else considered harmful to minors. Incorrect Congress passed the Children’s Internet Protection Act (CIPA) in 2000. The act required federally financed schools and libraries to use some form of technological protection (such as an Internet filter) to block computer access to obscene material, pornography, and anything else considered harmful to minors.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Internet Censorship QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.13 - Identify measures taken to address defamation, hate speech, and pornography on the Internet. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues DATE CREATED: DATE MODIFIED:

11/19/2019 5:54 PM 1/2/2020 5:19 PM

14. The American Recovery and Reinvestment Act Title XIII helped establish the National Fraud Alert system to help prevent identity theft. a. True b. False ANSWER: False RATIONALE: The Fair and Accurate Credit Transactions Act was passed in 2003 as an amendment to the Fair Credit Reporting Act, and it allows consumers to request and obtain a free credit report once each year from each of the three primary consumer credit reporting companies (Equifax, Experian, and TransUnion). The act also helped establish the National Fraud Alert system to help prevent identity theft. FEEDBACK: Correct The Fair and Accurate Credit Transactions Act helped establish the National Fraud Alert system to help prevent identity theft. Incorrect The Fair and Accurate Credit Transactions Act helped establish the National Fraud Alert system to help prevent identity theft.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Measures Protecting Personal Data QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.7 - Identify three subject areas where measures have been taken to protect personal data. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/2/2020 5:24 PM 15. The term ethics refers to the set of principles about what is right and wrong that individuals use to make choices, whereas the term law refers to a system of rules that tells us what we can and cannot do. a. True b. False ANSWER: True RATIONALE: Ethics is the set of principles about what is right and wrong that individuals use to make choices to guide their decisions. Law is a system of rules that tells us what we can and cannot do. FEEDBACK: Correct Ethics is the set of principles about what is right and wrong that individuals use to make choices to guide their decisions. Law is a system of rules that tells us what we can and cannot do. Incorrect Ethics is the set of principles about what is right and wrong that individuals use to make choices to guide their decisions. Law is a system of rules that tells us what we can and cannot do.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Ethical Versus Legal True / False

Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.1 - Explain the difference between ethical and legal. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/2/2020 5:36 PM 16. The pages on a university's website are maintained by individual departments and organizational units. It is a useful policy to require that every change a user makes to his department pages be reviewed and approved. a. True b. False ANSWER: RATIONALE:

FEEDBACK:

True Reviewing changes made to department Web pages can help protect the university and its employees from legal action. In a 1909 ruling (United States v. New York Central & Hudson River Railroad Co.), the U.S. Supreme Court established that an employer can be held responsible for the acts of its employees even if the employees act in a manner contrary to corporate policy and their employer’s directions. The principle established is called respondeat superior, or “let the master answer.” Correct

Reviewing changes made to department Web pages can help protect the university and its employees from legal action in light of the legal principle called respondeat superior, or “let the master answer.” Incorrect Reviewing changes made to department Web pages can help protect the university and its employees from legal action in light of the legal principle called respondeat superior, or “let the master answer.”

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Fostering Corporate Social Responsibility and Good Business Ethics QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.2 - Identify five reasons for an organization to promote a work environment where employees are encouraged to act ethically. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/2/2020 5:44 PM 17. If you use Google, the NSA can access your search history data without obtaining a court order. a. True b. False ANSWER: True RATIONALE: Downstream (formerly PRISM) is an NSA surveillance program that collects Internet data, such as search histories; photos sent and received; and the contents of email, file transfers, and voice and video chats from the servers of AOL, Apple, Facebook, Google, Microsoft, Paltalk, Skype, Yahoo, and YouTube. FEEDBACK: Correct Downstream (formerly PRISM) is an NSA surveillance program that collects Internet data, such as search histories; photos sent and received; and the contents Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues of email, file transfers, and voice and video chats from the servers of AOL, Apple, Facebook, Google, Microsoft, Paltalk, Skype, Yahoo, and YouTube. Incorrect Downstream (formerly PRISM) is an NSA surveillance program that collects Internet data, such as search histories; photos sent and received; and the contents of email, file transfers, and voice and video chats from the servers of AOL, Apple, Facebook, Google, Microsoft, Paltalk, Skype, Yahoo, and YouTube.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Information Systems and Government Surveillance QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.10 - Discuss how three U.S. federal statutes protect citizens from government surveillance while at the same time authorize the government to collect data. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/2/2020 5:49 PM Multiple Choice 18. _____ involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation. a. Vishing b. Slander c. Libel d. Phishing ANSWER: c RATIONALE: Making either an oral or a written statement of alleged fact that is false and that harms another person is defamation. The harm is often of a financial nature, in that it reduces a person’s ability to earn a living, work in a profession, or run for an elected office, for example. An oral defamatory statement is slander, and a written defamatory statement is libel. FEEDBACK: a. Making a written statement of alleged fact that is false and that harms another person is a form of defamation known as libel. b. Making a written statement of alleged fact that is false and that harms another person is a form of defamation known as libel. c. Making a written statement of alleged fact that is false and that harms another person is a form of defamation known as libel. d. Making a written statement of alleged fact that is false and that harms another person is a form of defamation known as libel.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Internet Censorship QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.13 - Identify measures taken to address defamation, hate speech, and pornography on the Internet. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues DATE CREATED: DATE MODIFIED:

11/19/2019 5:54 PM 1/3/2020 2:53 PM

19. The _____ requires telephone companies to hold customer telephone records and Internet metadata and to respond to queries about from the National Security Agency if the agency can prove that the records are relevant to a terrorism investigation. a. Foreign Intelligence Surveillance Act b. Right to Financial Privacy Act c. USA PATRIOT Act of 2001 d. USA Freedom Act of 2015 ANSWER: d RATIONALE: The USA Freedom Act terminated the bulk collection of telephone records and Internet metadata by the NSA. Instead, telecommunications providers are now required to hold the data and respond to NSA queries on the data. The bill authorizes the government to collect from the phone companies up to “two hops” of call records related to a target—provided the government can prove it has reasonable suspicion that the target is linked to a terrorist organization. FEEDBACK: a. The USA Freedom Act requires telecommunications providers to hold customer data and respond to NSA queries on the data, providing up to “two hops” of call records related to a target—provided the government can prove it has reasonable suspicion that the target is linked to a terrorist organization. b. The USA Freedom Act requires telecommunications providers to hold customer data and respond to NSA queries on the data, providing up to “two hops” of call records related to a target—provided the government can prove it has reasonable suspicion that the target is linked to a terrorist organization. c. The USA Freedom Act requires telecommunications providers to hold customer data and respond to NSA queries on the data, providing up to “two hops” of call records related to a target—provided the government can prove it has reasonable suspicion that the target is linked to a terrorist organization. d. The USA Freedom Act requires telecommunications providers to hold customer data and respond to NSA queries on the data, providing up to “two hops” of call records related to a target—provided the government can prove it has reasonable suspicion that the target is linked to a terrorist organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Federal Statutes That Protect Citizens from Government Surveillance QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.10 - Discuss how three U.S. federal statutes protect citizens from government surveillance while at the same time authorize the government to collect data. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/3/2020 3:12 PM 20. A professional _____ states the principles and core values that an organization wishes to develop in its leaders and members and therefore defines desired behavior in these individuals. a. code of ethics b. code of conduct c. code of civil procedure d. code of norms ANSWER: a RATIONALE: A professional code of ethics states the principles and core values that an organization wishes Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues to develop in its leaders and members. The primary intent of a code of ethics is to define desired behavior. FEEDBACK:

a. A professional code of ethics states the principles and core values that an organization wishes to develop in its leaders and members.

b. A professional code of ethics states the principles and core values that an organization wishes to develop in its leaders and members. c. A professional code of ethics states the principles and core values that an organization wishes to develop in its leaders and members. d. A professional code of ethics states the principles and core values that an organization wishes to develop in its leaders and members.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Professional Code of Ethics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.4 - Define the primary intent and two key elements of an effective code of ethics. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/3/2020 3:23 PM 21. Which legislation helps to combat the growing crime of identity theft? a. E-Government Act of 2002 b. USA Freedom Act of 2015 c. USA Patriot Act of 2001 d. Fair and Accurate Credit Transactions Act of 2003 ANSWER: d RATIONALE: The Fair and Accurate Credit Transactions Act was passed in 2003 as an amendment to the Fair Credit Reporting Act, and it allows consumers to request and obtain a free credit report once each year from each of the three primary consumer credit reporting companies (Equifax, Experian, and TransUnion). The act also helped establish the National Fraud Alert system to help prevent identity theft. Under this system, consumers who suspect that they have been or may become a victim of identity theft can place an alert on their credit files. FEEDBACK: a. The Fair and Accurate Credit Transactions Act helped establish the National Fraud Alert system to help prevent identity theft. b. The Fair and Accurate Credit Transactions Act helped establish the National Fraud Alert system to help prevent identity theft. c. The Fair and Accurate Credit Transactions Act helped establish the National Fraud Alert system to help prevent identity theft. d. The Fair and Accurate Credit Transactions Act helped establish the National Fraud Alert system to help prevent identity theft.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Measures Protecting Personal Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.7 - Identify three subject areas where measures have been taken to protect personal data. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 11/19/2019 5:54 PM 1/3/2020 3:28 PM

22. Harold is thinking about setting up profiles on Facebook and Twitter. Which of the following information should he avoid sharing on these social media platforms? a. his professional credentials b. his photograph c. his favorite movies d. his place of birth ANSWER: d RATIONALE: Be careful when you share information about yourself. Keep personal information such as your birth date, place of birth, home address, and phone number off social networks. FEEDBACK: a. Keep personal information such as your birth date, place of birth, home address, and phone number off social networks.

b. Keep personal information such as your birth date, place of birth, home address, and phone number off social networks. c. Keep personal information such as your birth date, place of birth, home address, and phone number off social networks. d. Keep personal information such as your birth date, place of birth, home address, and phone number off social networks.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Individual Efforts to Protect Privacy QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.8 - Identify four measures you should take to protect your personal privacy. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/3/2020 3:44 PM 23. Anne and Jordan have two preteen sons and they're concerned about what their kids might see and share on the Internet. They should probably invest in _______. a. Internet licensing b. filtering software c. security passwords d. privacy screening ANSWER: b RATIONALE: An Internet filter is software that can be used to block access to certain Web sites that contain material deemed inappropriate or offensive. The best Internet filters use a combination of URL, keyword, and dynamic content filtering. FEEDBACK: a. An Internet filter is software that can be used to block access to certain Web sites that contain material deemed inappropriate or offensive. b. An Internet filter is software that can be used to block access to certain Web sites that contain material deemed inappropriate or offensive. c. An Internet filter is software that can be used to block access to certain Web sites that contain material deemed inappropriate or offensive. d. An Internet filter is software that can be used to block access to certain Web sites that contain material deemed inappropriate or offensive.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues DIFFICULTY: Moderate REFERENCES: Internet Censorship QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.13 - Identify measures taken to address defamation, hate speech, and pornography on the Internet. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/3/2020 3:55 PM 24. Although Roberta had signed a form preventing her doctor from sharing her personal medical records with the company she worked for, she later discovered that the doctor's office had, in fact, shared her data with her health insurance provider and her employer, which caused her to be terminated. Because the doctor's practice violated its own privacy policy, she was able to file a lawsuit under the ________. a. Health Insurance Portability and Accountability Act b. Health and Medical Records Privacy Act c. Gramm-Leach-Bliley Act d. none of these answers ANSWER: a RATIONALE: The Health Insurance Portability and Accountability Act (HIPAA) requires health care organizations to employ standardized electronic transactions, codes, and identifiers to enable them to fully digitize medical records, thus making it possible to exchange medical data over the Internet. Under the HIPAA provisions, health care providers must obtain written consent from patients prior to disclosing any information in their medical records. In addition, health care providers are required to keep track of everyone who receives information from a patient’s medical file. FEEDBACK: a. Under Health Insurance Portability and Accountability Act (HIPAA) provisions, health care providers must obtain written consent from patients prior to disclosing any information in their medical records. b. Under Health Insurance Portability and Accountability Act (HIPAA) provisions, health care providers must obtain written consent from patients prior to disclosing any information in their medical records. c. Under Health Insurance Portability and Accountability Act (HIPAA) provisions, health care providers must obtain written consent from patients prior to disclosing any information in their medical records. d. Under Health Insurance Portability and Accountability Act (HIPAA) provisions, health care providers must obtain written consent from patients prior to disclosing any information in their medical records.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Measures Protecting Personal Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.7 - Identify three subject areas where measures have been taken to protect personal data. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues DATE MODIFIED:

1/3/2020 4:01 PM

25. The Better Business Bureau recommends that an organization publish a privacy notice on its Web site that addresses all of the following elements EXCEPT ________. a. choice b. selling c. access d. redress ANSWER: b RATIONALE: The Better Business Bureau recommends that a privacy notice should be based on the following five elements: • • • • •

FEEDBACK:

Notice (what personal information is being collected on the site) Choice (what options the customer has about how/whether personal data is collected and used) Access (how a customer can see what data has been collected and change/correct it if necessary) Security (state how any data that is collected is stored/protected) Redress (what customer can do if privacy policy is not met)

a. The Better Business Bureau recommends that a privacy notice should be based on the following five elements: notice, choice, access, security, and redress. b. The Better Business Bureau recommends that a privacy notice should be based on the following five elements: notice, choice, access, security, and redress. c. The Better Business Bureau recommends that a privacy notice should be based on the following five elements: notice, choice, access, security, and redress. d. The Better Business Bureau recommends that a privacy notice should be based on the following five elements: notice, choice, access, security, and redress.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Web Site Privacy Policy QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.7 - Identify three subject areas where measures have been taken to protect personal data. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/3/2020 4:11 PM 26. Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend and probably all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon? a. gathering information b. developing a problem statement c. identifying alternatives d. choosing an alternative ANSWER: d RATIONALE: Choose an alternative: Once a set of alternatives has been identified, the group must evaluate them based on numerous criteria, such as effectiveness of addressing the issue, the extent of risk associated with each alternative, cost, and time to implement. As part of the evaluation Copyright Cengage Learning. Powered by Cognero.

Page 16


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues process, weigh various laws, guidelines, and principles that may apply. You certainly do not want to violate a law that can lead to a fine or imprisonment for yourself or others. Consider the likely consequences of each alternative from several perspectives. FEEDBACK:

a. Choose an alternative. As part of the evaluation process, weigh various laws, guidelines, and principles that may apply. b. Choose an alternative. As part of the evaluation process, weigh various laws, guidelines, and principles that may apply. c. Choose an alternative. As part of the evaluation process, weigh various laws, guidelines, and principles that may apply. d. Choose an alternative. As part of the evaluation process, weigh various laws, guidelines, and principles that may apply.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Including Ethical Considerations in Decision Making QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.3 - Outline a five-step ethical decision-making process. NATIONAL STANDARDS: United States - BUSPROG: Ethics KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/3/2020 4:53 PM 27. While giving her students a physics exam, Professor Thompson noticed that Jack, one of her students who has been struggling with the course material, appeared to be copying answers from Graydon, one of the best students in the class. She decides that she should compare their answers when the class period is over before deciding what to do about the situation. In which phase of the ethical decision-making process is Professor Thompson? a. developing a problem statement b. implementing the decision c. identifying alternatives d. choosing an alternative ANSWER: a RATIONALE: A problem statement is a clear, concise description of the issue that needs to be addressed. You must gather and analyze facts to develop a good problem statement. Seek information and opinions from a variety of people (include those who experience the problem first hand and those who will be affected by any changes) to broaden your frame of reference. During this process, you must be extremely careful not to make assumptions about the situation and carefully check key facts for validity. FEEDBACK: a. You must gather and analyze facts to develop a good problem statement. b. You must gather and analyze facts to develop a good problem statement. c. You must gather and analyze facts to develop a good problem statement. d. You must gather and analyze facts to develop a good problem statement. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Including Ethical Considerations in Decision Making QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.3 - Outline a five-step ethical decision-making process. NATIONAL STANDARDS: United States - BUSPROG: Ethics Copyright Cengage Learning. Powered by Cognero.

Page 17


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 11/19/2019 5:54 PM 1/4/2020 2:12 PM

28. Which of the following legislation is directed at Web sites catering to children and requires Web site owners to obtain parental consent before they collect any personal information from children under 13 years old? a. Children's Internet Protection Act b. American Recovery and Reinvestment Act c. Children's Online Privacy Protection Act d. Family Educational Rights and Privacy Act ANSWER: c RATIONALE: According to Children’s Online Privacy Protection Act (COPPA), any Web site that caters to children must offer comprehensive privacy policies, notify parents or guardians about its data collection practices, and receive parental consent before collecting any personal information from children under 13 years of age. COPPA was implemented in 1998 to give parents more control over the collection, use, and disclosure of their children’s personal information; it does not cover the dissemination of information to children. FEEDBACK: a. According to Children’s Online Privacy Protection Act (COPPA), any Web site that caters to children must offer comprehensive privacy policies, notify parents or guardians about its data collection practices, and receive parental consent before collecting any personal information from children under 13 years of age. b. According to Children’s Online Privacy Protection Act (COPPA), any Web site that caters to children must offer comprehensive privacy policies, notify parents or guardians about its data collection practices, and receive parental consent before collecting any personal information from children under 13 years of age. c. According to Children’s Online Privacy Protection Act (COPPA), any Web site that caters to children must offer comprehensive privacy policies, notify parents or guardians about its data collection practices, and receive parental consent before collecting any personal information from children under 13 years of age. d. According to Children’s Online Privacy Protection Act (COPPA), any Web site that caters to children must offer comprehensive privacy policies, notify parents or guardians about its data collection practices, and receive parental consent before collecting any personal information from children under 13 years of age.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Measures Protecting Personal Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.7 - Identify three subject areas where measures have been taken to protect personal data. KEYWORDS: Bloom's: Remember DATE CREATED: 1/4/2020 2:38 PM DATE MODIFIED: 1/4/2020 2:42 PM 29. Which of the following legislation protects Facebook, Twitter, and other social networking organizations from defamation suits in connection with posts made by their users? a. Section 230 of the Communications Decency Act b. Children's Internet Protection Act Copyright Cengage Learning. Powered by Cognero.

Page 18


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues c. Network Enforcement Act d. Fake News Censorship Act ANSWER: a RATIONALE: Title V of the Telecommunications Act was the Communications Decency Act (CDA), aimed at protecting children from pornography. Section 230 of the CDA, which was not ruled unconstitutional, provides immunity to an Internet service provider (ISP) that publishes usergenerated content, provided its actions do not rise to the level of a content provider. It states that “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider” (47 U.S.C. § 230). This portion of the CDA protects social networking companies such as Facebook and Twitter from defamation suits in connection with user postings that appear on their sites. FEEDBACK: a. Section 230 of the CDA protects social networking companies such as Facebook and Twitter from defamation suits in connection with user postings that appear on their sites. b. Section 230 of the CDA protects social networking companies such as Facebook and Twitter from defamation suits in connection with user postings that appear on their sites. c. Section 230 of the CDA protects social networking companies such as Facebook and Twitter from defamation suits in connection with user postings that appear on their sites. d. Section 230 of the CDA protects social networking companies such as Facebook and Twitter from defamation suits in connection with user postings that appear on their sites.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Internet Censorship QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.13 - Identify measures taken to address defamation, hate speech, and pornography on the Internet. KEYWORDS: Bloom's: Remember DATE CREATED: 1/4/2020 2:53 PM DATE MODIFIED: 1/4/2020 2:58 PM 30. Fair information practices is a term for _____. a. a system of rules enforced by a set of institutions that tells us what we can and cannot do b. a set of guidelines that govern the collection and use of personal data c. a set of guidelines for fostering good business practices and avoiding bad publicity d. a set of principles about what is right and wrong that individuals use to make choices ANSWER: b RATIONALE: Fair information practices is a term for a set of guidelines that govern the collection and use of personal data. Various organizations as well as countries have developed their own set of such guidelines and call them by different names. The overall goal of such guidelines is to stop the unlawful storage of personal data, eliminate the storage of inaccurate personal data, and prevent the abuse or unauthorized disclosure of such data. FEEDBACK: a. Fair information practices is a term for a set of guidelines that govern the collection and use of personal data. b. Fair information practices is a term for a set of guidelines that govern the

Copyright Cengage Learning. Powered by Cognero.

Page 19


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues collection and use of personal data.

c. Fair information practices is a term for a set of guidelines that govern the collection and use of personal data. d. Fair information practices is a term for a set of guidelines that govern the collection and use of personal data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Measures Protecting Personal Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.6 - Summarize the differences between U.S. and EU fair information practices. KEYWORDS: Bloom's: Remember DATE CREATED: 1/4/2020 3:04 PM DATE MODIFIED: 1/4/2020 3:10 PM 31. A candidate for political office makes a campaign promise that she will work to stop the unlawful storage of personal data, eliminate the storage of inaccurate personal data, and prevent the abuse or unauthorized disclosure of such data. She is promising to promote _____. a. protection of safety-critical systems b. corporate social responsibility c. our First Amendment rights d. fair information practices ANSWER: d RATIONALE: Fair information practices is a term for a set of guidelines that govern the collection and use of personal data. Various organizations as well as countries have developed their own set of such guidelines and call them by different names. The overall goal of such guidelines is to stop the unlawful storage of personal data, eliminate the storage of inaccurate personal data, and prevent the abuse or unauthorized disclosure of such data. FEEDBACK: a. The overall goal of fair information practices guidelines is to stop the unlawful storage of personal data, eliminate the storage of inaccurate personal data, and prevent the abuse or unauthorized disclosure of such data. b. The overall goal of fair information practices guidelines is to stop the unlawful storage of personal data, eliminate the storage of inaccurate personal data, and prevent the abuse or unauthorized disclosure of such data. c. The overall goal of fair information practices guidelines is to stop the unlawful storage of personal data, eliminate the storage of inaccurate personal data, and prevent the abuse or unauthorized disclosure of such data. d. The overall goal of fair information practices guidelines is to stop the unlawful storage of personal data, eliminate the storage of inaccurate personal data, and prevent the abuse or unauthorized disclosure of such data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Measures Protecting Personal Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.6 - Summarize the differences between U.S. and EU fair information practices. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 20


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues DATE CREATED: DATE MODIFIED:

1/4/2020 3:16 PM 1/4/2020 3:36 PM

32. How do fair information practices in the United States and the European Union differ? a. Unlike the EU, the U.S. has no single, overarching national data privacy policy. b. Unlike the U.S., the EU has implemented numerous data privacy laws. c. Unlike the EU, the U.S. addresses potential abuses by private industry but not by the government. d. Unlike the U.S., the EU divides their data privacy laws into three ares: financial, health related, and child specific. ANSWER: a RATIONALE: The situation in regards to fair information practices in the United States is much different than in the European Union. Although numerous laws have been implemented over time, no single, overarching national data privacy policy has been developed in the United States. Nor is there an established advisory agency that recommends acceptable privacy practices to businesses. Instead, there are laws that address potential abuses by the government, with little restrictions for private industry. Legislation that protects people from data privacy abuses by corporations is almost nonexistent. The various major federal laws that govern data privacy can be divided into the following topics: financial data, health information, and children’s personal data. FEEDBACK: a. Although numerous laws have been implemented over time, no single, overarching national data privacy policy has been developed in the United States. b. Although numerous laws have been implemented over time, no single, overarching national data privacy policy has been developed in the United States. c. Although numerous laws have been implemented over time, no single, overarching national data privacy policy has been developed in the United States. d. Although numerous laws have been implemented over time, no single, overarching national data privacy policy has been developed in the United States.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Measures Protecting Personal Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.6 - Summarize the differences between U.S. and EU fair information practices. KEYWORDS: Bloom's: Remember DATE CREATED: 1/4/2020 3:37 PM DATE MODIFIED: 1/4/2020 3:47 PM 33. In the United States, legislation that protects people from data privacy abuses by corporations _____. a. was passed only recently b. is quite similar to the EU's General Data Protection Regulation c. requires firms to respond within one month to data requests from individuals d. is almost nonexistent ANSWER: d RATIONALE: The situation in regards to fair information practices in the United States is much different than in the European Union. Although numerous laws have been implemented over time, no single, overarching national data privacy policy has been developed in the United States. Nor is there an established advisory agency that recommends acceptable privacy practices to Copyright Cengage Learning. Powered by Cognero.

Page 21


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues businesses. Instead, there are laws that address potential abuses by the government, with little restrictions for private industry. Legislation that protects people from data privacy abuses by corporations is almost nonexistent. The various major federal laws that govern data privacy can be divided into the following topics: financial data, health information, and children’s personal data. FEEDBACK:

a. Legislation that protects people from data privacy abuses by corporations is almost nonexistent. b. Legislation that protects people from data privacy abuses by corporations is almost nonexistent. c. Legislation that protects people from data privacy abuses by corporations is almost nonexistent. d. Legislation that protects people from data privacy abuses by corporations is almost nonexistent.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Measures Protecting Personal Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.6 - Summarize the differences between U.S. and EU fair information practices. KEYWORDS: Bloom's: Remember DATE CREATED: 1/4/2020 3:59 PM DATE MODIFIED: 1/4/2020 4:07 PM 34. Vincent holds an executive position within an organization that processes individual customers' information. If those customers live in the European Union, Vincent _____. a. must audit and document his team's compliance with the Right to Financial Privacy Act b. must ensure his team maintains data protection policies and employs a data protection officer c. has fewer obligations related to fair information practices than if they lived in the United States d. is not subject to an established advisory agency or legally defined acceptable privacy practices ANSWER: b RATIONALE: The General Data Protection Regulation (GDPR) is a set of data privacy requirements that apply across the European Union including non-EU organizations that market to or process information of individuals in the European Union. GDPR places obligations on organizations to obtain the consent of people they collect information about and to better manage this data. This includes putting in place a data protection officer and data protection policies, performing data protection assessments, providing training for employees to ensure that they are aware of their responsibilities related to personal data, and having written documentation explaining how data is processed. The situation in regards to fair information practices in the United States is much different. Although numerous laws have been implemented over time, no single, overarching national data privacy policy has been developed in the United States. Nor is there an established advisory agency that recommends acceptable privacy practices to businesses. FEEDBACK: a. In the European Union, GDPR places obligations on organizations to obtain the consent of people they collect information about and to better manage this data. This includes putting in place a data protection officer and data protection policies. b. In the European Union, GDPR places obligations on organizations to obtain the consent of people they collect information about and to better manage this data. This includes putting in place a data protection officer and data protection

Copyright Cengage Learning. Powered by Cognero.

Page 22


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues policies.

c. In the European Union, GDPR places obligations on organizations to obtain the

consent of people they collect information about and to better manage this data. This includes putting in place a data protection officer and data protection policies. d. In the European Union, GDPR places obligations on organizations to obtain the consent of people they collect information about and to better manage this data. This includes putting in place a data protection officer and data protection policies.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Measures Protecting Personal Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.6 - Summarize the differences between U.S. and EU fair information practices. KEYWORDS: Bloom's: Remember DATE CREATED: 1/4/2020 4:08 PM DATE MODIFIED: 1/4/2020 4:22 PM 35. Which federal statute protects individuals against unreasonable searches and seizures by requiring warrants to be issued only upon probable cause? a. Foreign Intelligence Surveillance Act b. First Amendment c. Fourth Amendment d. USA Freedom Act ANSWER: c RATIONALE: The Fourth Amendment reads as follows: "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." FEEDBACK: a. The Fourth Amendment reads as follows: "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." b. The Fourth Amendment reads as follows: "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." c. The Fourth Amendment reads as follows: "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." d. The Fourth Amendment reads as follows: "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to

Copyright Cengage Learning. Powered by Cognero.

Page 23


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues be searched, and the persons or things to be seized."

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information Systems and Government Surveillance QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.10 - Discuss how three U.S. federal statutes protect citizens from government surveillance while at the same time authorize the government to collect data. KEYWORDS: Bloom's: Remember DATE CREATED: 1/4/2020 4:31 PM DATE MODIFIED: 1/4/2020 4:33 PM 36. It is not against the law for Ethel to possess an automatic weapon, but she believes possessing one is the wrong thing to do. For Ethel, possessing an automatic weapon is _____. a. illegal but ethical b. illegal and unethical c. legal but unethical d. legal and ethical ANSWER: c RATIONALE: Legal acts conform to the law. Ethical acts conform to what an individual believes to be the right thing to do. Laws can proclaim an act as legal, although many people may consider the act unethical. Examples of this include abortion or possession of an automatic weapon. Laws may also proclaim an act as illegal, although many people may consider the act ethical. Examples of this include using marijuana to relieve stress and nausea for people undergoing chemotherapy treatment for cancer. FEEDBACK: a. Laws can proclaim an act as legal, although many people may consider the act unethical. Examples of this include abortion or possession of an automatic weapon. b. Laws can proclaim an act as legal, although many people may consider the act unethical. Examples of this include abortion or possession of an automatic weapon. c. Laws can proclaim an act as legal, although many people may consider the act unethical. Examples of this include abortion or possession of an automatic weapon. d. Laws can proclaim an act as legal, although many people may consider the act unethical. Examples of this include abortion or possession of an automatic weapon.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Ethical Versus Legal QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.1 - Explain the difference between ethical and legal. KEYWORDS: Bloom's: Remember DATE CREATED: 1/5/2020 7:50 AM DATE MODIFIED: 1/5/2020 7:56 AM Copyright Cengage Learning. Powered by Cognero.

Page 24


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues 37. Robin Hood famously steals from the rich to give to the poor. Robin considers this his moral responsibility because he believes it is unjust for a few wealthy people to live in luxury while many others struggle to meet their basic needs. Given that it is against the law to steal, for Robin, his activities are _____. a. illegal but ethical b. illegal and unethical c. legal but unethical d. legal and ethical ANSWER: a RATIONALE: Legal acts conform to the law. Ethical acts conform to what an individual believes to be the right thing to do. Laws can proclaim an act as legal, although many people may consider the act unethical. Examples of this include abortion or possession of an automatic weapon. Laws may also proclaim an act as illegal, although many people may consider the act ethical. Examples of this include using marijuana to relieve stress and nausea for people undergoing chemotherapy treatment for cancer. FEEDBACK: a. Legal acts conform to the law. Ethical acts conform to what an individual believes to be the right thing to do. b. Legal acts conform to the law. Ethical acts conform to what an individual believes to be the right thing to do. c. Legal acts conform to the law. Ethical acts conform to what an individual believes to be the right thing to do. d. Legal acts conform to the law. Ethical acts conform to what an individual believes to be the right thing to do.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Ethical Versus Legal QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.1 - Explain the difference between ethical and legal. KEYWORDS: Bloom's: Remember DATE CREATED: 1/5/2020 7:57 AM DATE MODIFIED: 1/5/2020 8:03 AM 38. Which statement about ethics and laws is true? a. Laws are static, whereas ethics are constantly modified. b. Laws provide a complete guide to behavior, whereas ethics merely raise issues. c. All legal acts are ethical, but not all ethical acts are legal. d. Legal acts conform to the law, whereas ethical acts conform to an individual's beliefs. ANSWER: d RATIONALE: Laws are not static; new laws are constantly being introduced and existing laws repealed or modified. As a result, the precise meaning of a particular law may be different in the future from what it is today. Legal acts conform to the law. Ethical acts conform to what an individual believes to be the right thing to do. Laws can proclaim an act as legal, although many people may consider the act unethical. Laws raise important and complex issues concerning equality, fairness, and justice, but do not provide a complete guide to ethical behavior. FEEDBACK: a. Legal acts conform to the law. Ethical acts conform to what an individual believes to be the right thing to do.

Copyright Cengage Learning. Powered by Cognero.

Page 25


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues b. Legal acts conform to the law. Ethical acts conform to what an individual believes to be the right thing to do.

c. Legal acts conform to the law. Ethical acts conform to what an individual believes to be the right thing to do. d. Legal acts conform to the law. Ethical acts conform to what an individual believes to be the right thing to do.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Ethical Versus Legal QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.1 - Explain the difference between ethical and legal. KEYWORDS: Bloom's: Remember DATE CREATED: 1/5/2020 8:05 AM DATE MODIFIED: 1/5/2020 8:12 AM 39. Corporate social responsibility activities such as philanthropy benefit for-profit organizations because they _____. a. improve consistency of operations b. gain the goodwill of the community c. foster good business practices d. provide protection from legal action ANSWER: b RATIONALE: Although organizations exist primarily to earn profits or provide services to customers, they also have some fundamental responsibilities to society. Companies often declare these responsibilities in specific corporate social responsibility (CSR) goals. Philanthropy is one way in which an organization can demonstrate its values in action and make a positive connection with its customers, employees, suppliers, business partners, and other parties. The goodwill that CSR activities generate can make it easier for corporations to conduct their business. FEEDBACK: a. Philanthropy is one way in which an organization can demonstrate its values in action and make a positive connection with its customers, employees, suppliers, business partners, and other parties. b. Philanthropy is one way in which an organization can demonstrate its values in action and make a positive connection with its customers, employees, suppliers, business partners, and other parties. c. Philanthropy is one way in which an organization can demonstrate its values in action and make a positive connection with its customers, employees, suppliers, business partners, and other parties. d. Philanthropy is one way in which an organization can demonstrate its values in action and make a positive connection with its customers, employees, suppliers, business partners, and other parties.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Fostering Corporate Social Responsibility and Good Business Ethics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.2 - Identify five reasons for an organization to promote a work environment where employees are encouraged to act ethically. Copyright Cengage Learning. Powered by Cognero.

Page 26


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 1/5/2020 8:14 AM 1/5/2020 8:20 AM

40. Using the values held by his organization, Don has defined an ethical approach for dealing with the needs of his team members and their customers that he has implemented within his department. His team members know what is expected of them, and their customers know what to expect from the organization. The primary benefit of this approach for Don's department is _____. a. avoiding publicity b. consistent operation c. protection from legal action d. fostering good business practices ANSWER: b RATIONALE: Organizations develop and abide by values to create an organizational culture and to define a consistent approach for dealing with the needs of their stakeholders. Stakeholders include shareholders, employees, customers, suppliers, and the community. Such consistency ensures that employees know what is expected of them and can employ the organization’s values to help them in their decision making. Consistency also means that shareholders, customers, suppliers, and the community know what they can expect of the organization. FEEDBACK: a. Organizations develop and abide by values to define a consistent approach for dealing with the needs of their stakeholders. Such consistency ensures that employees know what is expected of them and shareholders, customers, suppliers, and the community know what they can expect of the organization. b. Organizations develop and abide by values to define a consistent approach for dealing with the needs of their stakeholders. Such consistency ensures that employees know what is expected of them and shareholders, customers, suppliers, and the community know what they can expect of the organization. c. Organizations develop and abide by values to define a consistent approach for dealing with the needs of their stakeholders. Such consistency ensures that employees know what is expected of them and shareholders, customers, suppliers, and the community know what they can expect of the organization. d. Organizations develop and abide by values to define a consistent approach for dealing with the needs of their stakeholders. Such consistency ensures that employees know what is expected of them and shareholders, customers, suppliers, and the community know what they can expect of the organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Fostering Corporate Social Responsibility and Good Business Ethics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.2 - Identify five reasons for an organization to promote a work environment where employees are encouraged to act ethically. KEYWORDS: Bloom's: Remember DATE CREATED: 1/6/2020 2:39 PM DATE MODIFIED: 1/6/2020 3:45 PM 41. Ethical business practices _____. a. create a negative discrepancy between employee and organizational values b. increase employee turnover when workers feel their actions are overly restricted Copyright Cengage Learning. Powered by Cognero.

Page 27


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues c. are usually more expensive for a business over the long term than unethical ones d. often raise an organization's priority with suppliers and other business partners ANSWER: d RATIONALE: Companies that produce safe and effective products avoid costly recalls and lawsuits. Companies that develop and maintain strong employee relations enjoy lower turnover rates and better employee morale. Suppliers and other business partners often place a priority on working with companies that operate in a fair and ethical manner. All these factors tend to increase revenue and profits while decreasing expenses. Bad ethics can have a negative impact on employees, many of whom may develop negative attitudes if they perceive a difference between their own values and those stated or implied by an organization’s actions. When such a discrepancy between employee and organizational ethics occurs, it destroys employee commitment to organizational goals and objectives, creates low morale, fosters poor performance, erodes employee involvement in organizational improvement initiatives, and builds indifference to the organization’s needs. FEEDBACK:

a. Suppliers and other business partners often place a priority on working with companies that operate in a fair and ethical manner. b. Suppliers and other business partners often place a priority on working with companies that operate in a fair and ethical manner. c. Suppliers and other business partners often place a priority on working with companies that operate in a fair and ethical manner. d. Suppliers and other business partners often place a priority on working with companies that operate in a fair and ethical manner.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Fostering Corporate Social Responsibility and Good Business Ethics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.2 - Identify five reasons for an organization to promote a work environment where employees are encouraged to act ethically. KEYWORDS: Bloom's: Remember DATE CREATED: 1/6/2020 3:46 PM DATE MODIFIED: 1/6/2020 3:56 PM 42. Felicity, who works at a bank, opens multiple credit card accounts for customers without their authorization in order to improve her customer sales, and thus her apparent job performance. This behavior is explicitly forbidden by bank policies and the instructions her manager gave her. Which statement is true in this situation? a. The bank can be held responsible for Felicity's behavior despite its ethical policies. b. The bank cannot be held responsible for Felicity's actions since they were contrary to bank policies. c. This situation demonstrates how bad organizational ethics can lead to bad business results. d. The principle called respondeat superior, meaning "let the master answer," does not apply. ANSWER: a RATIONALE: In a 1909 ruling (United States v. New York Central & Hudson River Railroad Co.), the U.S. Supreme Court established that an employer can be held responsible for the acts of its employees even if the employees act in a manner contrary to corporate policy and their employer’s directions. The principle established is called respondeat superior, or “let the master answer.” FEEDBACK: a. The U.S. Supreme Court established that an employer can be held responsible Copyright Cengage Learning. Powered by Cognero.

Page 28


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues for the acts of its employees even if the employees act in a manner contrary to corporate policy and their employer’s directions. b. The U.S. Supreme Court established that an employer can be held responsible for the acts of its employees even if the employees act in a manner contrary to corporate policy and their employer’s directions. c. The U.S. Supreme Court established that an employer can be held responsible for the acts of its employees even if the employees act in a manner contrary to corporate policy and their employer’s directions. d. The U.S. Supreme Court established that an employer can be held responsible for the acts of its employees even if the employees act in a manner contrary to corporate policy and their employer’s directions.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Fostering Corporate Social Responsibility and Good Business Ethics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.2 - Identify five reasons for an organization to promote a work environment where employees are encouraged to act ethically. KEYWORDS: Bloom's: Remember DATE CREATED: 1/6/2020 3:58 PM DATE MODIFIED: 1/6/2020 4:09 PM 43. A social networking service loses a lot of business from ad buyers and marketers after the media reveal that it has published misleading statistics about the average viewing time of video ads on its platform. Building a strong ethics program would have prevented this loss of sales by _____. a. promoting consistent operations b. gaining community goodwill c. avoiding unfavorable publicity d. fostering good business practices ANSWER: c RATIONALE: The public reputation of a company strongly influences the value of its stock, how consumers regard its products and services, the degree of oversight it receives from government agencies, and the amount of support and cooperation it receives from its business partners. Thus, many organizations are motivated to build a strong ethics program to avoid negative publicity. If an organization is perceived as operating ethically, customers, business partners, shareholders, consumer advocates, financial institutions, and regulatory bodies will usually regard it more favorably. Prominent ad buyers and marketers are angry with Facebook after finding out that the world’s largest online social network service greatly exaggerated the average viewing time of video ads on its platform. FEEDBACK: a. Many organizations are motivated to build a strong ethics program to avoid negative publicity. b. Many organizations are motivated to build a strong ethics program to avoid negative publicity. c. Many organizations are motivated to build a strong ethics program to avoid negative publicity. d. Many organizations are motivated to build a strong ethics program to avoid negative publicity.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 29


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues DIFFICULTY: Easy REFERENCES: Fostering Corporate Social Responsibility and Good Business Ethics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.2 - Identify five reasons for an organization to promote a work environment where employees are encouraged to act ethically. KEYWORDS: Bloom's: Remember DATE CREATED: 1/6/2020 4:10 PM DATE MODIFIED: 1/6/2020 4:19 PM 44. Which of the following is a good problem statement with which to begin the ethical decision-making process? a. Better systems for approving time off requests and assigning work tasks should be implemented to improve employee morale. b. Our employees require training to correct their misconceptions regarding the time off request and work scheduling procedures. c. Employee morale has declined by 15% based on survey data, and the reported cause is favoritism in granting time off requests and assigning work tasks. d. Employee morale seems worse lately. ANSWER: c RATIONALE: A problem statement is a clear, concise description of the issue that needs to be addressed. A good problem statement answers the following questions: What do people observe that causes them to think there is a problem? Who is directly affected by the problem? Is anyone else affected? How often does the problem occur? What is the impact of the problem? How serious is the problem? You must gather and analyze facts to develop a good problem statement. A possible solution is not a problem statement. FEEDBACK: a. A problem statement is a clear, concise description of the issue that needs to be addressed. You must gather and analyze facts to develop a good problem statement. A possible solution is not a problem statement. b. A problem statement is a clear, concise description of the issue that needs to be addressed. You must gather and analyze facts to develop a good problem statement. A possible solution is not a problem statement. c. A problem statement is a clear, concise description of the issue that needs to be addressed. You must gather and analyze facts to develop a good problem statement. A possible solution is not a problem statement. d. A problem statement is a clear, concise description of the issue that needs to be addressed. You must gather and analyze facts to develop a good problem statement. A possible solution is not a problem statement.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Including Ethical Considerations in Decision Making QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.3 - Outline a five-step ethical decision-making process. KEYWORDS: Bloom's: Remember DATE CREATED: 1/6/2020 4:21 PM DATE MODIFIED: 1/6/2020 4:53 PM Copyright Cengage Learning. Powered by Cognero.

Page 30


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues 45. In which step of the ethical decision-making process is it essential to communicate well with all stakeholders and have someone they trust and respect explain why things are changing and how this will benefit them? a. evaluate the results b. implement the decision c. choose an alternative d. identify alternatives ANSWER: b RATIONALE: Once an alternative is selected, it should be implemented in an efficient, effective, and timely manner. This is often much easier said than done, because people tend to resist change. In fact, the bigger the change, the greater is the resistance to it. Communication is the key to helping people accept a change. It is imperative that someone whom the stakeholders trust and respect answer the following questions: • • •

FEEDBACK:

Why are we doing this? What is wrong with the current way we do things? How will the change benefit us?

a. Communication is the key to helping people accept a change as a result of

implementing a decision. It is imperative that someone whom the stakeholders trust and respect answer the following questions: Why are we doing this? What is wrong with the current way we do things? How will the change benefit us? b. Communication is the key to helping people accept a change as a result of implementing a decision. It is imperative that someone whom the stakeholders trust and respect answer the following questions: Why are we doing this? What is wrong with the current way we do things? How will the change benefit us? c. Communication is the key to helping people accept a change as a result of implementing a decision. It is imperative that someone whom the stakeholders trust and respect answer the following questions: Why are we doing this? What is wrong with the current way we do things? How will the change benefit us? d. Communication is the key to helping people accept a change as a result of implementing a decision. It is imperative that someone whom the stakeholders trust and respect answer the following questions: Why are we doing this? What is wrong with the current way we do things? How will the change benefit us?

POINTS: 1 DIFFICULTY: Easy REFERENCES: Including Ethical Considerations in Decision Making QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.3 - Outline a five-step ethical decision-making process. KEYWORDS: Bloom's: Remember DATE CREATED: 1/6/2020 4:55 PM DATE MODIFIED: 1/6/2020 5:05 PM 46. Which of the following outlines what an organization aspires to become and lists its rules and principles? a. professional code of ethics b. ethical decision-making process c. fair information practices d. corporate legal system ANSWER: a Copyright Cengage Learning. Powered by Cognero.

Page 31


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues RATIONALE:

A professional code of ethics states the principles and core values that an organization wishes to develop in its leaders and members. Most codes of ethics created by professional organizations have two main parts: The first outlines what the organization aspires to become, and the second typically lists rules and principles by which members of the organization are expected to abide.

FEEDBACK:

a. Most codes of ethics created by professional organizations have two main parts: The first outlines what the organization aspires to become, and the second typically lists rules and principles by which members of the organization are expected to abide. b. Most codes of ethics created by professional organizations have two main parts: The first outlines what the organization aspires to become, and the second typically lists rules and principles by which members of the organization are expected to abide. c. Most codes of ethics created by professional organizations have two main parts: The first outlines what the organization aspires to become, and the second typically lists rules and principles by which members of the organization are expected to abide. d. Most codes of ethics created by professional organizations have two main parts: The first outlines what the organization aspires to become, and the second typically lists rules and principles by which members of the organization are expected to abide.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Professional Code of Ethics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.4 - Define the primary intent and two key elements of an effective code of ethics. KEYWORDS: Bloom's: Remember DATE CREATED: 1/6/2020 5:07 PM DATE MODIFIED: 1/7/2020 7:32 AM 47. The 2,000-year-old Hippocratic oath, which medical schools offer as an affirmation to their graduating classes, is considered an example of _____. a. a professional code of ethics b. a set of fair information practices c. a safety-critical guideline d. an ethical decision ANSWER: a RATIONALE: A professional code of ethics states the principles and core values that an organization wishes to develop in its leaders and members. The primary intent of a code of ethics is to define desired behavior. For example, doctors adhere to varying versions of the 2,000-year-old Hippocratic oath, which medical schools offer as an affirmation to their graduating classes. FEEDBACK: a. The primary intent of a code of ethics is to define desired behavior. For example, doctors adhere to varying versions of the 2,000-year-old Hippocratic oath.

b. The primary intent of a code of ethics is to define desired behavior. For example, doctors adhere to varying versions of the 2,000-year-old Hippocratic oath. c. The primary intent of a code of ethics is to define desired behavior. For example, doctors adhere to varying versions of the 2,000-year-old Hippocratic oath. d. The primary intent of a code of ethics is to define desired behavior. For example, Copyright Cengage Learning. Powered by Cognero.

Page 32


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues doctors adhere to varying versions of the 2,000-year-old Hippocratic oath.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Professional Code of Ethics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.4 - Define the primary intent and two key elements of an effective code of ethics. KEYWORDS: Bloom's: Remember DATE CREATED: 1/7/2020 7:34 AM DATE MODIFIED: 1/7/2020 7:58 AM 48. Because Marigold wants to join CompTIA (the Computer Technology Industry Association), she agrees to adhere to this organization's professional code of ethics. This means that she _____. a. believes CompTIA has provided answers to every ethical dilemma she might face b. has promised to behave in a way that CompTIA has defined as desirable c. is prioritizing CompTIA's principles of right and wrong over her own d. wants to rely on CompTIA's guidelines primarily to avoid violating the law ANSWER: b RATIONALE: A professional code of ethics states the principles and core values that an organization wishes to develop in its leaders and members. The primary intent of a code of ethics is to define desired behavior. FEEDBACK: a. The primary intent of a code of ethics is to define desired behavior. b. The primary intent of a code of ethics is to define desired behavior. c. The primary intent of a code of ethics is to define desired behavior. d. The primary intent of a code of ethics is to define desired behavior. POINTS: 1 DIFFICULTY: Easy REFERENCES: Professional Code of Ethics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.4 - Define the primary intent and two key elements of an effective code of ethics. KEYWORDS: Bloom's: Remember DATE CREATED: 1/7/2020 7:42 AM DATE MODIFIED: 1/7/2020 7:59 AM 49. Which of the following is least likely to be included in a professional code of ethics? a. a description of what its leaders should become b. a list of rules and principles c. an outline of legal censures and fines d. a commitment to continuing education ANSWER: c RATIONALE: Most codes of ethics created by professional organizations have two main parts: The first outlines what the organization aspires to become, and the second typically lists rules and principles by which members of the organization are expected to abide. Many codes also Copyright Cengage Learning. Powered by Cognero.

Page 33


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues include a commitment to continuing education for those who practice the profession. FEEDBACK:

a. Most codes of ethics created by professional organizations have two main parts: The first outlines what the organization aspires to become, and the second typically lists rules and principles by which members of the organization are expected to abide. Many codes also include a commitment to continuing education for those who practice the profession. b. Most codes of ethics created by professional organizations have two main parts: The first outlines what the organization aspires to become, and the second typically lists rules and principles by which members of the organization are expected to abide. Many codes also include a commitment to continuing education for those who practice the profession. c. Most codes of ethics created by professional organizations have two main parts: The first outlines what the organization aspires to become, and the second typically lists rules and principles by which members of the organization are expected to abide. Many codes also include a commitment to continuing education for those who practice the profession. d. Most codes of ethics created by professional organizations have two main parts: The first outlines what the organization aspires to become, and the second typically lists rules and principles by which members of the organization are expected to abide. Many codes also include a commitment to continuing education for those who practice the profession.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Professional Code of Ethics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.4 - Define the primary intent and two key elements of an effective code of ethics. KEYWORDS: Bloom's: Remember DATE CREATED: 1/7/2020 8:06 AM DATE MODIFIED: 1/7/2020 8:13 AM 50. Following a professional code of ethics can improve ethical decision making because _____. a. it allows practitioners to compromise to meet day-to-day pressures b. it guarantees trust and respect from the general public c. it avoids the need for continual self-assessment among practitioners d. it provides a common set of core values practitioners can use as a guideline ANSWER: d RATIONALE: Following a professional code of ethics can produce four key benefits for an individual, a profession, and society as a whole. One is that it canimprove ethical decision making. Adherence to a professional code of ethics means that practitioners use a common set of core values and beliefs as a guideline for ethical decision making. FEEDBACK: a. Following a professional code of ethics can improve ethical decision making. Adherence to a professional code of ethics means that practitioners use a common set of core values and beliefs as a guideline for ethical decision making. b. Following a professional code of ethics can improve ethical decision making. Adherence to a professional code of ethics means that practitioners use a common set of core values and beliefs as a guideline for ethical decision making. c. Following a professional code of ethics can improve ethical decision making. Adherence to a professional code of ethics means that practitioners use a common set of core values and beliefs as a guideline for ethical decision making.

Copyright Cengage Learning. Powered by Cognero.

Page 34


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues d. Following a professional code of ethics can improve ethical decision making.

Adherence to a professional code of ethics means that practitioners use a common set of core values and beliefs as a guideline for ethical decision making.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Professional Code of Ethics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.5 - Identify four benefits of following a professional code of ethics. KEYWORDS: Bloom's: Remember DATE CREATED: 1/7/2020 8:18 AM DATE MODIFIED: 1/7/2020 8:27 AM 51. Sean's boss tries to pressure him to cut corners to reduce development time and costs. Sean objects, stating that this would be unethical and citing the code of ethics for the professional organization of which they are both members. Sean's boss agrees with him and allows him to proceed as he was. Which benefit of following a professional code of ethics does this best demonstrate? a. improve ethical decision making b. provide an evaluation benchmark c. set high standards of practice and ethical behavior d. engender trust and respect from the general public ANSWER: c RATIONALE: Following a professional code of ethics can produce four key benefits for an individual, a profession, and society as a whole. One is that it sets high standards of practice and ethical behavior. Adherence to a code of ethics reminds professionals of the responsibilities and duties that they may be tempted to compromise to meet the pressures of day-to-day business. The code also defines acceptable and unacceptable behaviors to guide professionals in their interactions with others. FEEDBACK: a. Following a professional code of ethics sets high standards of practice and ethical behavior. Adherence to a code of ethics reminds professionals of the responsibilities and duties that they may be tempted to compromise to meet the pressures of day-to-day business. b. Following a professional code of ethics sets high standards of practice and ethical behavior. Adherence to a code of ethics reminds professionals of the responsibilities and duties that they may be tempted to compromise to meet the pressures of day-to-day business. c. Following a professional code of ethics sets high standards of practice and ethical behavior. Adherence to a code of ethics reminds professionals of the responsibilities and duties that they may be tempted to compromise to meet the pressures of day-to-day business. d. Following a professional code of ethics sets high standards of practice and ethical behavior. Adherence to a code of ethics reminds professionals of the responsibilities and duties that they may be tempted to compromise to meet the pressures of day-to-day business.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Professional Code of Ethics Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 35


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.5 - Identify four benefits of following a professional code of ethics. KEYWORDS: Bloom's: Remember DATE CREATED: 1/7/2020 12:11 PM DATE MODIFIED: 1/7/2020 12:25 PM 52. Brown's Auto Repair Shop is the most popular business of its kind in the community thanks to good word of mouth from past customers. The employees there follow a professional code of ethics that requires them to tell customers the truth, including which less costly repair options are available, and warn them of any possible future issues associated with each option. The popularity of Brown's best demonstrates how following a professional code of ethics _____. a. improves ethical decision making b. engenders trust and respect from the general public c. sets high standards of practice and ethical behavior d. provides an evaluation benchmark ANSWER: b RATIONALE: Following a professional code of ethics can produce four key benefits for an individual, a profession, and society as a whole. One is that it engenders trust and respect from the general public. Public trust is built on the expectation that a professional will behave ethically. People must often depend on the integrity and good judgment of a professional to tell the truth, abstain from giving self-serving advice, and offer warnings about the potential negative side effects of their actions. Thus, adherence to a code of ethics enhances trust and respect for professionals and their profession. FEEDBACK: a. Following a professional code of ethics engenders trust and respect from the general public. Public trust is built on the expectation that a professional will behave ethically: tell the truth, abstain from giving self-serving advice, and offer warnings about the potential negative side effects of their actions. b. Following a professional code of ethics engenders trust and respect from the general public. Public trust is built on the expectation that a professional will behave ethically: tell the truth, abstain from giving self-serving advice, and offer warnings about the potential negative side effects of their actions. c. Following a professional code of ethics engenders trust and respect from the general public. Public trust is built on the expectation that a professional will behave ethically: tell the truth, abstain from giving self-serving advice, and offer warnings about the potential negative side effects of their actions. d. Following a professional code of ethics engenders trust and respect from the general public. Public trust is built on the expectation that a professional will behave ethically: tell the truth, abstain from giving self-serving advice, and offer warnings about the potential negative side effects of their actions.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Professional Code of Ethics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.5 - Identify four benefits of following a professional code of ethics. KEYWORDS: Bloom's: Remember DATE CREATED: 1/7/2020 12:26 PM DATE MODIFIED: 1/7/2020 12:39 PM 53. A code of professional ethics can be used to assess one's own performance or, more formally, to decide when an Copyright Cengage Learning. Powered by Cognero.

Page 36


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues organization should either reward or reprimand its members for their actions. This is because a code of ethics _____. a. improves ethical decision making b. sets high standards of practice and ethical behavior c. engenders trust and respect from the general public d. provides an evaluation benchmark ANSWER: d RATIONALE: Following a professional code of ethics can produce four key benefits for an individual, a profession, and society as a whole. One is that it provides an evaluation benchmark that a professional can use as a means of self-assessment. Peers of the professional can also use the code for recognition or censure. FEEDBACK: a. Following a professional code of ethics provides an evaluation benchmark that a professional can use as a means of self-assessment. Peers of the professional can also use the code for recognition or censure. b. Following a professional code of ethics provides an evaluation benchmark that a professional can use as a means of self-assessment. Peers of the professional can also use the code for recognition or censure. c. Following a professional code of ethics provides an evaluation benchmark that a professional can use as a means of self-assessment. Peers of the professional can also use the code for recognition or censure. d. Following a professional code of ethics provides an evaluation benchmark that a professional can use as a means of self-assessment. Peers of the professional can also use the code for recognition or censure.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Professional Code of Ethics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.5 - Identify four benefits of following a professional code of ethics. KEYWORDS: Bloom's: Remember DATE CREATED: 1/7/2020 12:40 PM DATE MODIFIED: 1/7/2020 12:46 PM 54. Which of the following statements about professional organizations for information systems professionals is true? a. Many codes of ethics have been developed by IS professional organizations and can be accessed on their Web sites. b. The merged Computer Technology Industry Association and Association of Information Technology Professionals has emerged as the preeminent IS professional organization. c. There is a universal code of ethics that all IS professional organizations recommend. d. IS professional organizations offer few opportunities for networking compared with similar organizations in other fields. ANSWER: a RATIONALE: No one information systems professional organization has emerged as preeminent, so there is no universal code of ethics for IS workers. However, the existence of such organizations is useful in a field that is rapidly growing and changing. To stay on top of the many new developments in their field, IS workers need to network with others, seek out new ideas, and continually build on their personal skills and expertise. Membership in an organization of IS workers enables you to associate with others of similar work experience, develop working relationships, and exchange ideas. These organizations disseminate information through Copyright Cengage Learning. Powered by Cognero.

Page 37


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues email, periodicals, Web sites, social media, meetings, and conferences. Furthermore, in recognition of the need for professional standards of competency and conduct, many of these organizations have developed codes of ethics which can be found at their Web site. FEEDBACK:

a. No one information systems professional organization has emerged as

preeminent, so there is no universal code of ethics for IS workers. Membership in an organization of IS workers enables you to associate with others of similar work experience, develop working relationships, and exchange ideas. Many of these organizations have developed codes of ethics which can be found at their Web site. b. No one information systems professional organization has emerged as preeminent, so there is no universal code of ethics for IS workers. Membership in an organization of IS workers enables you to associate with others of similar work experience, develop working relationships, and exchange ideas. Many of these organizations have developed codes of ethics which can be found at their Web site. c. No one information systems professional organization has emerged as preeminent, so there is no universal code of ethics for IS workers. Membership in an organization of IS workers enables you to associate with others of similar work experience, develop working relationships, and exchange ideas. Many of these organizations have developed codes of ethics which can be found at their Web site. d. No one information systems professional organization has emerged as preeminent, so there is no universal code of ethics for IS workers. Membership in an organization of IS workers enables you to associate with others of similar work experience, develop working relationships, and exchange ideas. Many of these organizations have developed codes of ethics which can be found at their Web site.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Professional Code of Ethics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.5 - Identify four benefits of following a professional code of ethics. KEYWORDS: Bloom's: Remember DATE CREATED: 1/7/2020 12:47 PM DATE MODIFIED: 1/7/2020 1:00 PM 55. What can you obtain for free once a year from three key agencies in order to find out what is stored about you in existing databases? a. privacy policy b. credit report c. credit score d. Freedom of Information Act report ANSWER: b RATIONALE: Find out what is stored about you in existing databases. Call the major credit bureaus to get a copy of your credit report. You are entitled to a free credit report every 12 months from each of the three major consumer reporting agencies (Equifax, Experian, and TransUnion). FEEDBACK: a. Find out what is stored about you in existing databases. You are entitled to a free credit report every 12 months from each of the three major consumer reporting agencies (Equifax, Experian, and TransUnion).

Copyright Cengage Learning. Powered by Cognero.

Page 38


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues b. Find out what is stored about you in existing databases. You are entitled to a free credit report every 12 months from each of the three major consumer reporting agencies (Equifax, Experian, and TransUnion). c. Find out what is stored about you in existing databases. You are entitled to a free credit report every 12 months from each of the three major consumer reporting agencies (Equifax, Experian, and TransUnion). d. Find out what is stored about you in existing databases. You are entitled to a free credit report every 12 months from each of the three major consumer reporting agencies (Equifax, Experian, and TransUnion).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Individual Efforts to Protect Privacy QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.8 - Identify four measures you should take to protect your personal privacy. KEYWORDS: Bloom's: Remember DATE CREATED: 1/7/2020 1:38 PM DATE MODIFIED: 1/7/2020 1:45 PM 56. Which of the following actions will likely endanger rather than protect someone's personal privacy? a. filling out a change-of-address form with the U.S. Postal Service b. obtaining an unlisted phone number c. shredding credit card statements before disposing of them d. visiting the Direct Marketing Association Web site ANSWER: a RATIONALE: Be proactive in protecting your privacy. You can get an unlisted phone number and ask the phone company to block caller ID systems from reading your phone number. If you change your address, don’t fill out a change-of-address form with the U.S. Postal Service; you can notify the people and companies that you want to have your new address. Destroy copies of your charge card bills and shred monthly statements before disposing of them in the garbage. You can also cut down on the junk mail and telemarketing calls you receive by visiting the Direct Marketing Association Web site (www.thedma.org). Go to the site and look under Consumer Help-Remove Name from Lists. FEEDBACK: a. If you change your address, don’t fill out a change-of-address form with the U.S. Postal Service; you can notify the people and companies that you want to have your new address. b. If you change your address, don’t fill out a change-of-address form with the U.S. Postal Service; you can notify the people and companies that you want to have your new address. c. If you change your address, don’t fill out a change-of-address form with the U.S. Postal Service; you can notify the people and companies that you want to have your new address. d. If you change your address, don’t fill out a change-of-address form with the U.S. Postal Service; you can notify the people and companies that you want to have your new address.

POINTS: DIFFICULTY: REFERENCES:

1 Easy Individual Efforts to Protect Privacy

Copyright Cengage Learning. Powered by Cognero.

Page 39


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.8 - Identify four measures you should take to protect your personal privacy. KEYWORDS: Bloom's: Remember DATE CREATED: 1/7/2020 1:46 PM DATE MODIFIED: 1/7/2020 1:54 PM 57. MYSTIC, Downstream, Upstream, the Secure Flight Program, and Stingray are all examples of _____. a. fair information practices b. safety-critical systems c. privacy-related legislation d. government surveillance systems ANSWER: d RATIONALE: Government surveillance systems (listed in Table 3.1) include MYSTIC, Downstream, Upstream, the Secure Flight Program, and Stingray. FEEDBACK: a. Government surveillance systems include MYSTIC, Downstream, Upstream, the Secure Flight Program, and Stingray. b. Government surveillance systems include MYSTIC, Downstream, Upstream, the Secure Flight Program, and Stingray. c. Government surveillance systems include MYSTIC, Downstream, Upstream, the Secure Flight Program, and Stingray. d. Government surveillance systems include MYSTIC, Downstream, Upstream, the Secure Flight Program, and Stingray.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information Systems and Government Surveillance QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.9 - Discuss the tradeoffs between security and privacy. KEYWORDS: Bloom's: Remember DATE CREATED: 1/7/2020 2:04 PM DATE MODIFIED: 1/7/2020 2:08 PM 58. In recent years, laws have been added or amended to expand the scope of government surveillance in reaction to _____. a. several U.S. Supreme Court rulings b. the public debate regarding safety versus privacy c. technological developments and potential terrorists threats d. major data breaches and media revelations about surveillance ANSWER: c RATIONALE: In recent years, new laws addressing government electronic surveillance have been added and old laws amended in reaction to the development of new communication technologies and a heightened awareness of potential terrorist threats. The net result is that the scope of government surveillance has greatly expanded—going from collecting data on as few people as necessary to collecting as much data as possible on as many people as possible. FEEDBACK: a. In recent years, new laws addressing government electronic surveillance have Copyright Cengage Learning. Powered by Cognero.

Page 40


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues been added and old laws amended in reaction to the development of new communication technologies and a heightened awareness of potential terrorist threats. b. In recent years, new laws addressing government electronic surveillance have been added and old laws amended in reaction to the development of new communication technologies and a heightened awareness of potential terrorist threats. c. In recent years, new laws addressing government electronic surveillance have been added and old laws amended in reaction to the development of new communication technologies and a heightened awareness of potential terrorist threats. d. In recent years, new laws addressing government electronic surveillance have been added and old laws amended in reaction to the development of new communication technologies and a heightened awareness of potential terrorist threats.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information Systems and Government Surveillance QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.9 - Discuss the tradeoffs between security and privacy. KEYWORDS: Bloom's: Remember DATE CREATED: 1/7/2020 2:21 PM DATE MODIFIED: 1/7/2020 2:35 PM 59. Some people believe that government electronic surveillance activities represent unreasonable searches and seizures, meaning that they violate the _____. a. USA PATRIOT Act b. USA Freedom Act c. First Amendment d. Fourth Amendment ANSWER: d RATIONALE: Many of the recently-initiated government surveillance activities are viewed by some as an unconstitutional violation of the Fourth Amendment, which protects us from illegal searches and seizures. FEEDBACK: a. Many of the recently-initiated government surveillance activities are viewed by some as an unconstitutional violation of the Fourth Amendment, which protects us from illegal searches and seizures. b. Many of the recently-initiated government surveillance activities are viewed by some as an unconstitutional violation of the Fourth Amendment, which protects us from illegal searches and seizures. c. Many of the recently-initiated government surveillance activities are viewed by some as an unconstitutional violation of the Fourth Amendment, which protects us from illegal searches and seizures. d. Many of the recently-initiated government surveillance activities are viewed by some as an unconstitutional violation of the Fourth Amendment, which protects us from illegal searches and seizures.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 41


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues REFERENCES: Information Systems and Government Surveillance QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.9 - Discuss the tradeoffs between security and privacy. KEYWORDS: Bloom's: Remember DATE CREATED: 1/7/2020 2:38 PM DATE MODIFIED: 1/7/2020 2:43 PM 60. Americans who are in favor of expanded government surveillance programs argue that _____. a. the U.S. government is obligated to do all that it can to ensure citizens' security b. the violation of any of the rights designed to protect citizens' privacy is unacceptable c. even citizens who aren't doing anything "wrong" are negatively affected by it d. they do not threaten anyone's privacy or freedom of expression and association ANSWER: a RATIONALE: Many Americans feel that the U.S. government is obligated to do all that it can do to provide for the security of its citizens, even it means violating some of the rights designed to protect our privacy. After all, they argue, if you are not doing anything “wrong” you should have no concerns. FEEDBACK: a. Many Americans feel that the U.S. government is obligated to do all that it can do to provide for the security of its citizens, even it means violating some of the rights designed to protect our privacy. b. Many Americans feel that the U.S. government is obligated to do all that it can do to provide for the security of its citizens, even it means violating some of the rights designed to protect our privacy. c. Many Americans feel that the U.S. government is obligated to do all that it can do to provide for the security of its citizens, even it means violating some of the rights designed to protect our privacy. d. Many Americans feel that the U.S. government is obligated to do all that it can do to provide for the security of its citizens, even it means violating some of the rights designed to protect our privacy.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Information Systems and Government Surveillance QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.9 - Discuss the tradeoffs between security and privacy. KEYWORDS: Bloom's: Remember DATE CREATED: 1/7/2020 2:46 PM DATE MODIFIED: 1/7/2020 4:10 PM 61. Which statement about the Foreign Intelligence Surveillance Act (FISA) is true? a. FISA does not allow any surveillance of communications to which a U.S. citizen is a party. b. FISA allows U.S. intelligence to target U.S. citizens outside the U.S. without a court order. c. FISA created a court that meets in secret to hear applications for surveillance orders in the U.S. d. FISA prohibits the use of surveillance assistance from communications common carriers. ANSWER: c Copyright Cengage Learning. Powered by Cognero.

Page 42


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues RATIONALE:

FISA, passed by Congress in 1978, describes procedures for the electronic surveillance and collection of foreign intelligence information in communications (e.g., phone calls, emails) between foreign powers and the agents of foreign powers. The act allows surveillance, without court order, within the United States for up to a year unless the “surveillance will acquire the contents of any communication to which a U.S. person is a party.” If a U.S. citizen is involved, judicial authorization is required within 72 hours after surveillance begins. The act also specifies that the U.S. attorney general may request a specific communications common carrier (a company that provides communications transmission services to the public) to furnish information, facilities, or technical assistance to accomplish the electronic surveillance. FISA requires the government to obtain an individualized court order before it can intentionally target a U.S. person anywhere in the world to collect the content of his/her communications. The FISA act also created the Foreign Intelligence Surveillance Act (FISA) court, which meets in secret to hear applications for orders approving electronic surveillance anywhere within the United States.

FEEDBACK:

a. The FISA act created the Foreign Intelligence Surveillance Act (FISA) court,

which meets in secret to hear applications for orders approving electronic surveillance anywhere within the United States. b. The FISA also created the Foreign Intelligence Surveillance Act (FISA) court, which meets in secret to hear applications for orders approving electronic surveillance anywhere within the United States. c. The FISA act created the Foreign Intelligence Surveillance Act (FISA) court, which meets in secret to hear applications for orders approving electronic surveillance anywhere within the United States. d. The FISA act created the Foreign Intelligence Surveillance Act (FISA) court, which meets in secret to hear applications for orders approving electronic surveillance anywhere within the United States.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Federal Statutes That Protect Citizens from Government Surveillance QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.10 - Discuss how three U.S. federal statutes protect citizens from government surveillance while at the same time authorize the government to collect data. KEYWORDS: Bloom's: Remember DATE CREATED: 1/7/2020 4:19 PM DATE MODIFIED: 1/7/2020 4:35 PM 62. Which of the following is a provision of the USA PATRIOT Act? a. termination of the bulk collection of telephone records and Internet metadata b. authorization of "snack and peak warrants" for law enforcement agencies c. gathering of foreign intelligence from non-Americans outside the U.S. d. requirement for judicial authorization within 72 hours after surveillance of U.S. citizens begins ANSWER: b RATIONALE: Title II of the Patriot Act amended FISA and greatly expanded the scope of surveillance permitted under U.S. law. Foreign intelligence could now be gathered from both U.S. citizens and foreigners, government agencies no longer needed to prove that a target is an agent of a foreign power, and the maximum duration of surveillance and investigations was lengthened. Copyright Cengage Learning. Powered by Cognero.

Page 43


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues In addition, law enforcement agencies were authorized to break into and enter premises without the owner’s consent and stealthily search the premises using so-called sneak and peak warrants. Roving wiretaps were allowed so that anyone who comes into contact with a suspected terrorist can be wiretapped. FEEDBACK:

a. Under Title II of the Patriot Act, law enforcement agencies were authorized to

break into and enter premises without the owner’s consent and stealthily search the premises using so-called sneak and peak warrants. b. Under Title II of the Patriot Act, law enforcement agencies were authorized to break into and enter premises without the owner’s consent and stealthily search the premises using so-called sneak and peak warrants. c. Under Title II of the Patriot Act, law enforcement agencies were authorized to break into and enter premises without the owner’s consent and stealthily search the premises using so-called sneak and peak warrants. d. Under Title II of the Patriot Act, law enforcement agencies were authorized to break into and enter premises without the owner’s consent and stealthily search the premises using so-called sneak and peak warrants.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Federal Statutes That Protect Citizens from Government Surveillance QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.10 - Discuss how three U.S. federal statutes protect citizens from government surveillance while at the same time authorize the government to collect data. KEYWORDS: Bloom's: Remember DATE CREATED: 1/7/2020 4:37 PM DATE MODIFIED: 1/7/2020 4:50 PM 63. American's rights to freedom of religion, freedom of expression, and freedom to assemble peaceably are protected by the _____. a. Fourth Amendment b. First Amendment c. COPPA d. HIPAA ANSWER: b RATIONALE: The First Amendment protects Americans’ rights to freedom of religion, freedom of expression, and freedom to assemble peaceably. FEEDBACK: a. The First Amendment protects Americans’ rights to freedom of religion, freedom of expression, and freedom to assemble peaceably. b. The First Amendment protects Americans’ rights to freedom of religion, freedom of expression, and freedom to assemble peaceably. c. The First Amendment protects Americans’ rights to freedom of religion, freedom of expression, and freedom to assemble peaceably. d. The First Amendment protects Americans’ rights to freedom of religion, freedom of expression, and freedom to assemble peaceably.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Measures Protecting Freedom of Speech Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 44


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.11 - Discuss how the First Amendment and anonymous expression safeguard our freedom of speech. KEYWORDS: Bloom's: Remember DATE CREATED: 1/7/2020 4:52 PM DATE MODIFIED: 1/7/2020 4:58 PM 64. The Bill of Rights protects many forms of expression, but the Supreme Court has ruled that it does NOT protect _____. a. sedition b. flag burning c. dance movements d. hand gestures ANSWER: a RATIONALE: Numerous court decisions have broadened the definition of speech to include nonverbal, visual, and symbolic forms of expression, such as flag burning, dance movements, and hand gestures. The Supreme Court has held that the following types of speech are not protected by the First Amendment and may be forbidden by the government: perjury, fraud, defamation, obscene speech, incitement of panic, incitement to crime, “fighting words,” and sedition (incitement of discontent or rebellion against a government). FEEDBACK: a. Numerous court decisions have broadened the definition of speech to include nonverbal, visual, and symbolic forms of expression, such as flag burning, dance movements, and hand gestures. b. Numerous court decisions have broadened the definition of speech to include nonverbal, visual, and symbolic forms of expression, such as flag burning, dance movements, and hand gestures. c. Numerous court decisions have broadened the definition of speech to include nonverbal, visual, and symbolic forms of expression, such as flag burning, dance movements, and hand gestures. d. Numerous court decisions have broadened the definition of speech to include nonverbal, visual, and symbolic forms of expression, such as flag burning, dance movements, and hand gestures.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Measures Protecting Freedom of Speech QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.11 - Discuss how the First Amendment and anonymous expression safeguard our freedom of speech. KEYWORDS: Bloom's: Remember DATE CREATED: 1/7/2020 5:00 PM DATE MODIFIED: 1/7/2020 5:06 PM 65. During the early formation of the United States, many influential writings criticizing British rule were published without the real names of their authors. These publications represented a form of _____. a. slander b. First Amendment expression Copyright Cengage Learning. Powered by Cognero.

Page 45


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues c. incitement to crime d. anonymous expression ANSWER: d RATIONALE: Anonymous expression is the expression of opinions by people who do not reveal their identity. Anonymous political expression played an important role in the early formation of the United States. Before and during the American Revolution, patriots who dissented against British rule often used anonymous pamphlets and leaflets to express their opinions. Thomas Paine was an influential writer, philosopher, and statesman of the Revolutionary War era. He published a pamphlet called Common Sense, in which he criticized the British monarchy and urged the colonies to become independent by establishing a republican government of their own. Published anonymously in 1776, the pamphlet sold more than 500,000 copies, at a time when the population of the colonies was estimated to have been less than 4 million; it provided a stimulus to produce the Declaration of Independence six months later. FEEDBACK: a. Anonymous expression is the expression of opinions by people who do not reveal their identity. Anonymous political expression played an important role in the early formation of the United States. b. Anonymous expression is the expression of opinions by people who do not reveal their identity. Anonymous political expression played an important role in the early formation of the United States. c. Anonymous expression is the expression of opinions by people who do not reveal their identity. Anonymous political expression played an important role in the early formation of the United States. d. Anonymous expression is the expression of opinions by people who do not reveal their identity. Anonymous political expression played an important role in the early formation of the United States.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Measures Protecting Freedom of Speech QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.11 - Discuss how the First Amendment and anonymous expression safeguard our freedom of speech. KEYWORDS: Bloom's: Remember DATE CREATED: 1/7/2020 5:07 PM DATE MODIFIED: 1/7/2020 5:18 PM 66. The Supreme Court has ruled that the right to anonymous expression is protected by _____. a. numerous legal precedents b. the Declaration of Independence c. the First Amendment d. the Fourth Amendment ANSWER: c RATIONALE: The Supreme Court has ruled that the First Amendment protects the right to speak anonymously as part of the guarantee of free speech. FEEDBACK: a. The Supreme Court has ruled that the First Amendment protects the right to speak anonymously as part of the guarantee of free speech. b. The Supreme Court has ruled that the First Amendment protects the right to speak anonymously as part of the guarantee of free speech.

Copyright Cengage Learning. Powered by Cognero.

Page 46


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues c. The Supreme Court has ruled that the First Amendment protects the right to speak anonymously as part of the guarantee of free speech.

d. The Supreme Court has ruled that the First Amendment protects the right to speak anonymously as part of the guarantee of free speech.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Measures Protecting Freedom of Speech QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.11 - Discuss how the First Amendment and anonymous expression safeguard our freedom of speech. KEYWORDS: Bloom's: Remember DATE CREATED: 1/7/2020 5:19 PM DATE MODIFIED: 1/7/2020 5:24 PM 67. Anonymous expression _____. a. on the Internet is equally important to and advocated by all computer users b. is specifically mentioned as a right of all Americans within the Bill of Rights c. through email messages is impossible, even when a remailer is used d. is an important right of a democratic society because it protects people from reprisals for their opinions ANSWER: d RATIONALE: Anonymous expression is the expression of opinions by people who do not reveal their identity. The freedom to express an opinion without fear of reprisal is an important right of a democratic society. Maintaining anonymity on the Internet is important to some computer users. Other Internet users, however, would prefer to ban Web anonymity because they think its use increases the risks of defamation, fraud, and libel, as well as the exploitation of children. The use of a remailer keeps communications anonymous. FEEDBACK: a. Anonymous expression is the expression of opinions by people who do not reveal their identity. The freedom to express an opinion without fear of reprisal is an important right of a democratic society. b. Anonymous expression is the expression of opinions by people who do not reveal their identity. The freedom to express an opinion without fear of reprisal is an important right of a democratic society. c. Anonymous expression is the expression of opinions by people who do not reveal their identity. The freedom to express an opinion without fear of reprisal is an important right of a democratic society. d. Anonymous expression is the expression of opinions by people who do not reveal their identity. The freedom to express an opinion without fear of reprisal is an important right of a democratic society.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Measures Protecting Freedom of Speech QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.11 - Discuss how the First Amendment and anonymous expression safeguard our freedom of speech. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 47


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues DATE CREATED: DATE MODIFIED:

1/7/2020 5:25 PM 1/7/2020 5:32 PM

68. Which intermediary in the process of speaking on the Internet often receives defamation or copyright infringement claims from government authorities or copyright holders who demand that material be taken down? a. Internet service provider b. upstream Internet service provider c. Web host server d. domain name service ANSWER: c RATIONALE: Internet censorship is the control or suppression of the publishing or accessing of information on the Internet. Speech on the Internet requires a series of intermediaries to reach its audience with each intermediary vulnerable to some degree to pressure from those who want to silence the speaker. Web hosting services are often the recipients of defamation or copyright infringement claims by government authorities or copyright holders, demanding the immediate takedown of hosted material that is deemed inappropriate or illegal. FEEDBACK: a. Web hosting services are often the recipients of defamation or copyright infringement claims by government authorities or copyright holders, demanding the immediate takedown of hosted material that is deemed inappropriate or illegal. b. Web hosting services are often the recipients of defamation or copyright infringement claims by government authorities or copyright holders, demanding the immediate takedown of hosted material that is deemed inappropriate or illegal. c. Web hosting services are often the recipients of defamation or copyright infringement claims by government authorities or copyright holders, demanding the immediate takedown of hosted material that is deemed inappropriate or illegal. d. Web hosting services are often the recipients of defamation or copyright infringement claims by government authorities or copyright holders, demanding the immediate takedown of hosted material that is deemed inappropriate or illegal.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Internet Censorship QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.12 - Describe the impact of censorship on the operation of Internet service providers. KEYWORDS: Bloom's: Remember DATE CREATED: 1/8/2020 9:39 AM DATE MODIFIED: 1/8/2020 9:46 AM 69. Government entities may pressure upstream Internet service providers to _____. a. immediately take down particular hosted material b. track and monitor the Internet activities of individuals c. deregister domains because of their hosted content d. accept defamation or copyright infringement claims Copyright Cengage Learning. Powered by Cognero.

Page 48


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues ANSWER: RATIONALE:

b Internet censorship is the control or suppression of the publishing or accessing of information on the Internet. Speech on the Internet requires a series of intermediaries to reach its audience with each intermediary vulnerable to some degree to pressure from those who want to silence the speaker. Government entities may pressure “upstream” Internet service providers to limit access to certain Web sites, allow access to only some content or modified content at certain Web sites, reject the use of certain keywords in search engine searches, and track and monitor the Internet activities of individuals.

FEEDBACK:

a. Government entities may pressure “upstream” Internet service providers to limit

access to certain Web sites, allow access to only some content or modified content at certain Web sites, reject the use of certain keywords in search engine searches, and track and monitor the Internet activities of individuals. b. Government entities may pressure “upstream” Internet service providers to limit access to certain Web sites, allow access to only some content or modified content at certain Web sites, reject the use of certain keywords in search engine searches, and track and monitor the Internet activities of individuals. c. Government entities may pressure “upstream” Internet service providers to limit access to certain Web sites, allow access to only some content or modified content at certain Web sites, reject the use of certain keywords in search engine searches, and track and monitor the Internet activities of individuals. d. Government entities may pressure “upstream” Internet service providers to limit access to certain Web sites, allow access to only some content or modified content at certain Web sites, reject the use of certain keywords in search engine searches, and track and monitor the Internet activities of individuals.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Internet Censorship QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.12 - Describe the impact of censorship on the operation of Internet service providers. KEYWORDS: Bloom's: Remember DATE CREATED: 1/8/2020 9:48 AM DATE MODIFIED: 1/8/2020 9:57 AM 70. In countries with "three strikes" laws, what action may Internet service providers be required to take? a. terminate the Internet connections of users who have repeatedly been caught posting illegal content b. pursue defamation or copyright infringement claims against their customers c. require users to enter certain keywords in search engine searches d. convert human-readable host and domain names into machine-readable, Internet Protocol addresses ANSWER: a RATIONALE: Several countries have enacted so-called three strikes laws that require ISPs to terminate a user’s Internet connection once that user has received a number of notifications of posting of content deemed inappropriate or illegal. FEEDBACK: a. Several countries have enacted so-called three strikes laws that require ISPs to terminate a user’s Internet connection once that user has received a number of notifications of posting of content deemed inappropriate or illegal. b. Several countries have enacted so-called three strikes laws that require ISPs to terminate a user’s Internet connection once that user has received a number of

Copyright Cengage Learning. Powered by Cognero.

Page 49


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues notifications of posting of content deemed inappropriate or illegal.

c. Several countries have enacted so-called three strikes laws that require ISPs to terminate a user’s Internet connection once that user has received a number of notifications of posting of content deemed inappropriate or illegal. d. Several countries have enacted so-called three strikes laws that require ISPs to terminate a user’s Internet connection once that user has received a number of notifications of posting of content deemed inappropriate or illegal.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Internet Censorship QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.12 - Describe the impact of censorship on the operation of Internet service providers. KEYWORDS: Bloom's: Remember DATE CREATED: 1/8/2020 11:18 AM DATE MODIFIED: 1/8/2020 11:24 AM 71. Which country has both the largest online population and probably the most rigorous Internet censorship in the world? a. China b. India c. United States d. Brazil ANSWER: a RATIONALE: China has the largest online population in the world, with over 772 million Internet users (see Table 3.2, which depicts the top 12 countries in terms of number of Internet users). Note, however, that Internet censorship in China is perhaps the most rigorous in the world. The Chinese government blocks access to Web sites that discuss any of a long list of topics that are considered objectionable. FEEDBACK: a. China has the largest online population in the world, yet Internet censorship in China is perhaps the most rigorous in the world.

b. China has the largest online population in the world, yet Internet censorship in China is perhaps the most rigorous in the world. c. China has the largest online population in the world, yet Internet censorship in China is perhaps the most rigorous in the world. d. China has the largest online population in the world, yet Internet censorship in China is perhaps the most rigorous in the world.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Internet Censorship QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.12 - Describe the impact of censorship on the operation of Internet service providers. KEYWORDS: Bloom's: Remember DATE CREATED: 1/8/2020 11:26 AM DATE MODIFIED: 1/8/2020 11:36 AM Copyright Cengage Learning. Powered by Cognero.

Page 50


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues 72. A high-quality software system _____. a. negatively affects productivity b. is easy to learn and use c. is the same as a safety-critical system d. reduces sales over the long term ANSWER: b RATIONALE: High-quality software systems are systems that are easy to learn and use because they perform quickly and efficiently; they meet their users’ needs; and they operate safely and reliably so that system downtime is kept to a minimum. A safety-critical system is one whose failure may cause human injury or death. FEEDBACK: a. High-quality software systems are systems that are easy to learn and use because they perform quickly and efficiently; they meet their users’ needs; and they operate safely and reliably so that system downtime is kept to a minimum. b. High-quality software systems are systems that are easy to learn and use because they perform quickly and efficiently; they meet their users’ needs; and they operate safely and reliably so that system downtime is kept to a minimum. c. High-quality software systems are systems that are easy to learn and use because they perform quickly and efficiently; they meet their users’ needs; and they operate safely and reliably so that system downtime is kept to a minimum. d. High-quality software systems are systems that are easy to learn and use because they perform quickly and efficiently; they meet their users’ needs; and they operate safely and reliably so that system downtime is kept to a minimum.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Ethical Issues in Developing Quality Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.14 - Distinguish between a high-quality software system and safety-critical system. KEYWORDS: Bloom's: Remember DATE CREATED: 1/8/2020 2:01 PM DATE MODIFIED: 1/8/2020 2:11 PM 73. Which of the following is a defining feature of a safety-critical software system? a. performs quickly and efficiently b. minimum system downtime c. defects could result in human injury d. meets users' needs completely ANSWER: c RATIONALE: A safety-critical system is one whose failure may cause human injury or death. FEEDBACK: a. A safety-critical system is one whose failure may cause human injury or death. b. A safety-critical system is one whose failure may cause human injury or death. c. A safety-critical system is one whose failure may cause human injury or death. d. A safety-critical system is one whose failure may cause human injury or death. POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 51


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues DIFFICULTY: Easy REFERENCES: Ethical Issues in Developing Quality Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.14 - Distinguish between a high-quality software system and safety-critical system. KEYWORDS: Bloom's: Remember DATE CREATED: 1/8/2020 2:11 PM DATE MODIFIED: 1/8/2020 2:17 PM 74. Which of the following will prevent a product from being rated as a high-quality software system? a. thorough testing b. slow development c. high cost d. software defects ANSWER: d RATIONALE: High-quality software systems are systems that are easy to learn and use because they perform quickly and efficiently; they meet their users’ needs; and they operate safely and reliably so that system downtime is kept to a minimum. A software defect is any error that, if not removed, could cause a software system to fail to meet its users’ needs or provide an open door for a cyberattacker. FEEDBACK: a. A software defect is any error that, if not removed, could cause a software system to fail to meet its users’ needs and therefore not quality as high-quality software. b. A software defect is any error that, if not removed, could cause a software system to fail to meet its users’ needs and therefore not quality as high-quality software. c. A software defect is any error that, if not removed, could cause a software system to fail to meet its users’ needs and therefore not quality as high-quality software. d. A software defect is any error that, if not removed, could cause a software system to fail to meet its users’ needs and therefore not quality as high-quality software.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Ethical Issues in Developing Quality Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.14 - Distinguish between a high-quality software system and safety-critical system. KEYWORDS: Bloom's: Remember DATE CREATED: 1/8/2020 2:18 PM DATE MODIFIED: 1/8/2020 2:26 PM 75. Fiat Chrysler recalled over a million trucks due to a software defect related to at least one fatality. This software defect was found in a _____. a. safety-critical software system b. high-quality software system c. pre-market software evaluation d. cybersecurity assessment Copyright Cengage Learning. Powered by Cognero.

Page 52


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues ANSWER: RATIONALE:

a A software defect is any error that, if not removed, could cause a software system to fail to meet its users’ needs or provide an open door for a cyberattacker. A safety-critical system is one whose failure may cause human injury or death.

FEEDBACK:

a. A safety-critical system is one whose failure may cause human injury or death. b. A safety-critical system is one whose failure may cause human injury or death. c. A safety-critical system is one whose failure may cause human injury or death. d. A safety-critical system is one whose failure may cause human injury or death.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Ethical Issues in Developing Quality Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.14 - Distinguish between a high-quality software system and safety-critical system. KEYWORDS: Bloom's: Remember DATE CREATED: 1/8/2020 2:27 PM DATE MODIFIED: 1/8/2020 2:31 PM 76. The process of building software for safety-critical systems _____. a. is less expensive than that for high-quality systems b. is just as expensive as that for high-quality systems c. takes much longer than that for high-quality systems d. takes much less time than that for high-quality systems ANSWER: c RATIONALE: The process of building software for safety critical systems takes much longer and is much more expensive than for high-quality systems. FEEDBACK: a. The process of building software for safety critical systems takes much longer and is much more expensive than for high-quality systems. b. The process of building software for safety critical systems takes much longer and is much more expensive than for high-quality systems. c. The process of building software for safety critical systems takes much longer and is much more expensive than for high-quality systems. d. The process of building software for safety critical systems takes much longer and is much more expensive than for high-quality systems.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Safety-Critical Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.15 - Give three reasons why developing a safety-critical system takes longer and is more expensive. KEYWORDS: Bloom's: Remember DATE CREATED: 1/8/2020 2:43 PM DATE MODIFIED: 1/8/2020 2:47 PM Copyright Cengage Learning. Powered by Cognero.

Page 53


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues 77. JoAnn is a developer hired to help code the software that will control a nuclear power plant reactor. Compared with her previous project, which involved software for sophisticated video games for PCs and home game consoles, JoAnn's current project will most likely _____. a. have a much smaller budget and a much shorter development schedule b. have a much larger budget and a much shorter development schedule c. have a much smaller budget and a much longer development schedule d. have a much larger budget and a much longer development schedule ANSWER: d RATIONALE: A safety-critical system is one whose failure may cause human injury or death. The safe operation of many safety-critical systems relies on the performance of software. Such systems control an ever-increasing array of products and applications, including antilock brakes, adaptive cruise control functionality, and a myriad of other safety-related features found in automobiles; nuclear power plant reactors; aircraft flight control; military weapons; and a wide range of medical devices. The process of building software for safety critical systems takes much longer and is much more expensive than for high-quality systems. FEEDBACK: a. The process of building software for safety critical systems takes much longer and is much more expensive than for high-quality systems. b. The process of building software for safety critical systems takes much longer and is much more expensive than for high-quality systems. c. The process of building software for safety critical systems takes much longer and is much more expensive than for high-quality systems. d. The process of building software for safety critical systems takes much longer and is much more expensive than for high-quality systems.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Safety-Critical Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.15 - Give three reasons why developing a safety-critical system takes longer and is more expensive. KEYWORDS: Bloom's: Remember DATE CREATED: 1/9/2020 10:59 AM DATE MODIFIED: 1/9/2020 11:10 AM 78. Why do software developers assigned to write code for a safety-critical system need to work closely with safety and systems engineers? a. Such systems typically include little hardware or other equipment. b. Software is typically only one of many components in such a system. c. Developers working on such systems must be experienced professionals. d. The software is often less essential than other components of such a system. ANSWER: b RATIONALE: The process of building software for safety-critical systems takes much longer and is much more expensive than for high-quality systems. One reason is that software developers working on a safety-critical system must be highly trained and experienced professionals who recognize that the software is only one component of the system; other components typically include system users or operators, hardware, and other equipment. Software developers need to work closely with safety and systems engineers to ensure that the entire system, not just Copyright Cengage Learning. Powered by Cognero.

Page 54


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues the software, operates in a safe manner. FEEDBACK:

a. Software developers working on a safety-critical system must be highly trained and experienced professionals who recognize that the software is only one component of the system; other components typically include system users or operators, hardware, and other equipment. b. Software developers working on a safety-critical system must be highly trained and experienced professionals who recognize that the software is only one component of the system; other components typically include system users or operators, hardware, and other equipment. c. Software developers working on a safety-critical system must be highly trained and experienced professionals who recognize that the software is only one component of the system; other components typically include system users or operators, hardware, and other equipment. d. Software developers working on a safety-critical system must be highly trained and experienced professionals who recognize that the software is only one component of the system; other components typically include system users or operators, hardware, and other equipment.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Safety-Critical Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.15 - Give three reasons why developing a safety-critical system takes longer and is more expensive. KEYWORDS: Bloom's: Remember DATE CREATED: 1/9/2020 11:11 AM DATE MODIFIED: 1/9/2020 11:20 AM 79. Developing safety-critical systems is more expensive than developing high-quality systems because _____. a. more thorough documentation is required for high-quality systems b. less extreme measures are taken to remove software defects from high-quality systems c. the tasks involved in developing high-quality systems require additional steps d. high-quality systems usually involve more non-software components ANSWER: b RATIONALE: The process of building software for safety-critical systems takes much longer and is much more expensive than for high-quality systems. One reason is that extreme measures must be taken to identify and remove software defects from safety-critical systems starting at the very earliest stages of software development—requirements definition and all the way through final testing. All tasks—including requirements definition, systems analysis, design, coding, fault analysis, testing, implementation, and change control—require additional steps, more thorough documentation, and vigilant checking and rechecking. FEEDBACK: a. Extreme measures must be taken to identify and remove software defects from safety-critical systems starting at the very earliest stages of software development—requirements definition and all the way through final testing. All tasks—including requirements definition, systems analysis, design, coding, fault analysis, testing, implementation, and change control—require additional steps, more thorough documentation, and vigilant checking and rechecking. b. Extreme measures must be taken to identify and remove software defects from safety-critical systems starting at the very earliest stages of software development—requirements definition and all the way through final testing. All

Copyright Cengage Learning. Powered by Cognero.

Page 55


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues tasks—including requirements definition, systems analysis, design, coding, fault analysis, testing, implementation, and change control—require additional steps, more thorough documentation, and vigilant checking and rechecking. c. Extreme measures must be taken to identify and remove software defects from safety-critical systems starting at the very earliest stages of software development—requirements definition and all the way through final testing. All tasks—including requirements definition, systems analysis, design, coding, fault analysis, testing, implementation, and change control—require additional steps, more thorough documentation, and vigilant checking and rechecking. d. Extreme measures must be taken to identify and remove software defects from safety-critical systems starting at the very earliest stages of software development—requirements definition and all the way through final testing. All tasks—including requirements definition, systems analysis, design, coding, fault analysis, testing, implementation, and change control—require additional steps, more thorough documentation, and vigilant checking and rechecking.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Safety-Critical Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.15 - Give three reasons why developing a safety-critical system takes longer and is more expensive. KEYWORDS: Bloom's: Remember DATE CREATED: 1/9/2020 11:20 AM DATE MODIFIED: 1/9/2020 11:33 AM 80. Cade's team is developing a safety-critical system so they _____. a. can expect the project to move forward quickly and within a tight budget b. are largely inexperienced and require additional training for success c. must invest a great deal of effort in risk aversion, mitigation, and detection d. should spend more time improving ease of use than identifying problems ANSWER: c RATIONALE: The process of building software for safety-critical systems takes much longer and is much more expensive than for high-quality systems. One reason is that a great deal of effort must be put into identifying what can go wrong, the likelihood and consequences of such occurrences, and how these risks can be averted, mitigated, or detected so the users can be warned. FEEDBACK: a. For safety-critical systems, a great deal of effort must be put into identifying what can go wrong, the likelihood and consequences of such occurrences, and how these risks can be averted, mitigated, or detected so the users can be warned. b. For safety-critical systems, a great deal of effort must be put into identifying what can go wrong, the likelihood and consequences of such occurrences, and how these risks can be averted, mitigated, or detected so the users can be warned. c. For safety-critical systems, a great deal of effort must be put into identifying what can go wrong, the likelihood and consequences of such occurrences, and how these risks can be averted, mitigated, or detected so the users can be warned. d. For safety-critical systems, a great deal of effort must be put into identifying what can go wrong, the likelihood and consequences of such occurrences, and how these risks can be averted, mitigated, or detected so the users can be warned.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 56


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues DIFFICULTY: Easy REFERENCES: Safety-Critical Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.15 - Give three reasons why developing a safety-critical system takes longer and is more expensive. KEYWORDS: Bloom's: Remember DATE CREATED: 1/9/2020 11:34 AM DATE MODIFIED: 1/9/2020 11:43 AM 81. What feature of the creation of safety-critical software often draws developers into ethical dilemmas? a. level of experience required b. nature of industries involved c. increased time and expense d. coordination with other teams ANSWER: c RATIONALE: The increased time and expense of completing safety-critical software can draw developers into ethical dilemmas. FEEDBACK: a. The increased time and expense of completing safety-critical software can draw developers into ethical dilemmas. b. The increased time and expense of completing safety-critical software can draw developers into ethical dilemmas. c. The increased time and expense of completing safety-critical software can draw developers into ethical dilemmas. d. The increased time and expense of completing safety-critical software can draw developers into ethical dilemmas.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Safety-Critical Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.16 - Identify two ethical dilemmas that software developers face when building high-quality or safety-critical systems. KEYWORDS: Bloom's: Remember DATE CREATED: 1/9/2020 11:59 AM DATE MODIFIED: 1/9/2020 12:07 PM 82. One example of an ethical dilemma related to safety-critical systems is whether to risk making the product more expensive, and potentially less appealing to customers, by _____. a. including hardware mechanisms to back up or verify software functions b. reducing redundancy in hardware and software components c. increasing its ease of operation d. copying a competitor's product ANSWER: a RATIONALE: The increased time and expense of completing safety-critical software can draw developers into ethical dilemmas. They must carefully weigh cost and ease of use issues in developing a Copyright Cengage Learning. Powered by Cognero.

Page 57


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues system that is safe and that also appeals to customers. For example, the use of hardware mechanisms or redundant software to back up or verify critical software functions can help ensure safe operation. However, such hardware or redundancy may make the final product more expensive to manufacture or harder for the user to operate—potentially making the product less attractive than a competitor’s. FEEDBACK:

a. The use of hardware mechanisms or redundant software to back up or verify

critical software functions can help ensure safe operation but may make the final product more expensive to manufacture, potentially making the product less attractive than a competitor’s. b. The use of hardware mechanisms or redundant software to back up or verify critical software functions can help ensure safe operation but may make the final product more expensive to manufacture, potentially making the product less attractive than a competitor’s. c. The use of hardware mechanisms or redundant software to back up or verify critical software functions can help ensure safe operation but may make the final product more expensive to manufacture, potentially making the product less attractive than a competitor’s. d. The use of hardware mechanisms or redundant software to back up or verify critical software functions can help ensure safe operation but may make the final product more expensive to manufacture, potentially making the product less attractive than a competitor’s.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Safety-Critical Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.16 - Identify two ethical dilemmas that software developers face when building high-quality or safety-critical systems. KEYWORDS: Bloom's: Remember DATE CREATED: 1/9/2020 12:08 PM DATE MODIFIED: 1/9/2020 12:15 PM 83. One example of a common and significant ethical dilemma related to safety-critical systems is deciding _____. a. how much software testing is sufficient b. how much skill users can be assumed to have c. how much documentation is necessary d. how many software engineers are needed ANSWER: a RATIONALE: The increased time and expense of completing safety-critical software can draw developers into ethical dilemmas. One key issue is deciding when sufficient software testing has been performed. How much testing is enough when you are building a product whose failure could cause loss of human life? At some point, software developers must determine that they have completed sufficient testing and then sign off to indicate their approval to release the product. Determining how much testing is sufficient demands careful decision making. FEEDBACK: a. One key issue when developing safety-critical software is deciding when sufficient software testing has been performed. b. One key issue when developing safety-critical software is deciding when sufficient software testing has been performed. c. One key issue when developing safety-critical software is deciding when sufficient

Copyright Cengage Learning. Powered by Cognero.

Page 58


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues software testing has been performed.

d. One key issue when developing safety-critical software is deciding when sufficient software testing has been performed.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Safety-Critical Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.16 - Identify two ethical dilemmas that software developers face when building high-quality or safety-critical systems. KEYWORDS: Bloom's: Remember DATE CREATED: 1/9/2020 12:17 PM DATE MODIFIED: 1/9/2020 12:24 PM 84. A key ethical question related specifically to safety-critical software development is: a. What is the impact on you, your organization, other stakeholders, and the environment? b. Do any corporate policies or guidelines apply? c. What is wrong with the current way we do things? d. How much testing is enough when you are building a product whose failure could cause loss of human life? ANSWER: d RATIONALE: The increased time and expense of completing safety-critical software can draw developers into ethical dilemmas. One key issue is deciding when sufficient software testing has been performed. How much testing is enough when you are building a product whose failure could cause loss of human life? At some point, software developers must determine that they have completed sufficient testing and then sign off to indicate their approval to release the product. Determining how much testing is sufficient demands careful decision making. FEEDBACK: a. One key issue when developing safety-critical software is deciding when sufficient software testing has been performed. b. One key issue when developing safety-critical software is deciding when sufficient software testing has been performed. c. One key issue when developing safety-critical software is deciding when sufficient software testing has been performed. d. One key issue when developing safety-critical software is deciding when sufficient software testing has been performed.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Safety-Critical Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.16 - Identify two ethical dilemmas that software developers face when building high-quality or safety-critical systems. KEYWORDS: Bloom's: Remember DATE CREATED: 1/9/2020 12:24 PM DATE MODIFIED: 1/9/2020 12:31 PM 85. Walter is a developer and part of a team that develops safety-critical systems. He often finds it an ethical challenge to Copyright Cengage Learning. Powered by Cognero.

Page 59


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues _____. a. make the final product more expensive to manufacture or harder to use b. choose between hardware mechanisms or redundant software to back up critical functions c. identify what can go wrong and the likelihood and consequences of such occurrences d. weigh cost and ease of use issues while keeping the system safe and appealing ANSWER: d RATIONALE: The increased time and expense of completing safety-critical software can draw developers into ethical dilemmas. They must carefully weigh cost and ease of use issues in developing a system that is safe and that also appeals to customers. For example, the use of hardware mechanisms or redundant software to back up or verify critical software functions can help ensure safe operation. However, such hardware or redundancy may make the final product more expensive to manufacture or harder for the user to operate—potentially making the product less attractive than a competitor’s. FEEDBACK: a. Developers working on safety-critical software must carefully weigh cost and ease of use issues in developing a system that is safe and that also appeals to customers. b. Developers working on safety-critical software must carefully weigh cost and ease of use issues in developing a system that is safe and that also appeals to customers. c. Developers working on safety-critical software must carefully weigh cost and ease of use issues in developing a system that is safe and that also appeals to customers. d. Developers working on safety-critical software must carefully weigh cost and ease of use issues in developing a system that is safe and that also appeals to customers.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Safety-Critical Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.3.16 - Identify two ethical dilemmas that software developers face when building high-quality or safety-critical systems. KEYWORDS: Bloom's: Remember DATE CREATED: 1/9/2020 12:31 PM DATE MODIFIED: 1/9/2020 12:41 PM Essay 86. Imagine that you are faced with an ethical dilemma at work, and you must determine the "right," or ethical, course of action. List the five steps you will go through to make this decision, including some of the questions you'll ask yourself at each step in the process. ANSWER: Most of us have developed a decision-making process that we execute automatically, without thinking about the steps we go through. For many of us, the process generally follows these steps: (1) develop problem statement, (2) identify alternatives, (3) choose an alternative, (4) implement the decision, and (5) evaluate the results. (1) Develop a Problem Statement A problem statement is a clear, concise description of the issue that needs to be addressed. A good problem statement answers the following questions: What do people observe that Copyright Cengage Learning. Powered by Cognero.

Page 60


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues causes them to think there is a problem? Who is directly affected by the problem? Is anyone else affected? How often does the problem occur? What is the impact of the problem? How serious is the problem? (2) Identify Alternatives During this stage of decision making, it is ideal to enlist the help of others to identify several alternative solutions to the problem. You will especially want to enlist the help of those with first-hand knowledge of the situation or those who will be affected by the decision. Brainstorming with others will increase your chances of identifying a broad range of alternatives and determining the best solution. (3) Choose an Alternative Once a set of alternatives has been identified, you must evaluate them based on numerous criteria, such as effectiveness of addressing the issue, the extent of risk associated with each alternative, cost, and time to implement. As part of the evaluation process, weigh various laws, guidelines, and principles that may apply. You certainly do not want to violate a law that can lead to a fine or imprisonment for yourself or others. Do any corporate policies or guidelines apply? Does the organizational code of ethics offer guidance? Do any of your own ethics apply? Consider the likely consequences of each alternative from several perspectives: What is the impact on you, your organization, other stakeholders (including your suppliers and customers), and the environment? Does this alternative do less harm than other alternatives? (4) Implement the Decision Once an alternative is selected, it should be implemented in an efficient, effective, and timely manner. This is often much easier said than done, because people tend to resist change. In fact, the bigger the change, the greater is the resistance to it. Communication is the key to helping people accept a change. It is imperative that someone whom the stakeholders trust and respect answer the following questions: Why are we doing this? What is wrong with the current way we do things? How will the change benefit us?

RATIONALE:

(5) Evaluate the Results After the solution to the problem has been implemented, monitor the results to see if the desired effect was achieved, and observe its impact on the organization and the various stakeholders. Were the success criteria fully met? Were there any unintended consequences? Was the implementation poorly executed? This evaluation may indicate that further refinements are needed. If so, return to the problem development step, refine the problem statement as necessary, and work through the process again. Most of us have developed a decision-making process that we execute automatically, without thinking about the steps we go through. For many of us, the process generally follows these steps: (1) develop problem statement, (2) identify alternatives, (3) choose an alternative, (4) implement the decision, and (5) evaluate the results. (1) Develop a Problem Statement A problem statement is a clear, concise description of the issue that needs to be addressed. A good problem statement answers the following questions: What do people observe that causes them to think there is a problem? Who is directly affected by the problem? Is anyone else affected? How often does the problem occur? What is the impact of the problem? How serious is the problem? (2) Identify Alternatives During this stage of decision making, it is ideal to enlist the help of others to identify several alternative solutions to the problem. You will especially want to enlist the help of those with

Copyright Cengage Learning. Powered by Cognero.

Page 61


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues

POINTS: RUBRIC:

first-hand knowledge of the situation or those who will be affected by the decision. Brainstorming with others will increase your chances of identifying a broad range of alternatives and determining the best solution. (3) Choose an Alternative Once a set of alternatives has been identified, you must evaluate them based on numerous criteria, such as effectiveness of addressing the issue, the extent of risk associated with each alternative, cost, and time to implement. As part of the evaluation process, weigh various laws, guidelines, and principles that may apply. You certainly do not want to violate a law that can lead to a fine or imprisonment for yourself or others. Do any corporate policies or guidelines apply? Does the organizational code of ethics offer guidance? Do any of your own ethics apply? Consider the likely consequences of each alternative from several perspectives: What is the impact on you, your organization, other stakeholders (including your suppliers and customers), and the environment? Does this alternative do less harm than other alternatives? (4) Implement the Decision Once an alternative is selected, it should be implemented in an efficient, effective, and timely manner. This is often much easier said than done, because people tend to resist change. In fact, the bigger the change, the greater is the resistance to it. Communication is the key to helping people accept a change. It is imperative that someone whom the stakeholders trust and respect answer the following questions: Why are we doing this? What is wrong with the current way we do things? How will the change benefit us? (5) Evaluate the Results After the solution to the problem has been implemented, monitor the results to see if the desired effect was achieved, and observe its impact on the organization and the various stakeholders. Were the success criteria fully met? Were there any unintended consequences? Was the implementation poorly executed? This evaluation may indicate that further refinements are needed. If so, return to the problem development step, refine the problem statement as necessary, and work through the process again. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Correctly identifies the five steps of the ethical decisionmaking process Describes each step, including appropriate selfdirected questions

DIFFICULTY: Moderate REFERENCES: Including Ethical Considerations in Decision Making QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.3.3 - Outline a five-step ethical decision-making process. NATIONAL STANDARDS: United States - BUSPROG: Ethics KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 1/5/2020 7:39 AM Copyright Cengage Learning. Powered by Cognero.

Page 62


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues 87. Define Internet censorship and explain how it can be imposed at several different points between the speaker and his or her audience. ANSWER: Internet censorship is the control or suppression of the publishing or accessing of information on the Internet. Speech on the Internet requires a series of intermediaries to reach its audience with each intermediary vulnerable to some degree to pressure from those who want to silence the speaker. Web hosting services are often the recipients of defamation or copyright infringement claims by government authorities or copyright holders, demanding the immediate takedown of hosted material that is deemed inappropriate or illegal. Government entities may pressure “upstream” Internet service providers to limit access to certain Web sites, allow access to only some content or modified content at certain Web sites, reject the use of certain keywords in search engine searches, and track and monitor the Internet activities of individuals.

RATIONALE:

POINTS: RUBRIC:

Several countries have enacted so called three strikes laws that require ISPs to terminate a user’s Internet connection once that user has received a number of notifications of posting of content deemed inappropriate or illegal. Censorship efforts may also focus on Domain Name System (DNS) servers, which convert human-readable host and domain names into the machine-readable, numeric Internet Protocol (IP) addresses that are used to point computers and other devices toward the correct servers on the Internet. Where authorities have control over DNS servers, officials can “deregister” a domain that hosts content that is deemed inappropriate or illegal so that the Web site is effectively invisible to users seeking access to the site. Internet censorship is the control or suppression of the publishing or accessing of information on the Internet. Speech on the Internet requires a series of intermediaries to reach its audience with each intermediary vulnerable to some degree to pressure from those who want to silence the speaker. Web hosting services are often the recipients of defamation or copyright infringement claims by government authorities or copyright holders, demanding the immediate takedown of hosted material that is deemed inappropriate or illegal. Government entities may pressure “upstream” Internet service providers to limit access to certain Web sites, allow access to only some content or modified content at certain Web sites, reject the use of certain keywords in search engine searches, and track and monitor the Internet activities of individuals. Several countries have enacted so called three strikes laws that require ISPs to terminate a user’s Internet connection once that user has received a number of notifications of posting of content deemed inappropriate or illegal. Censorship efforts may also focus on Domain Name System (DNS) servers, which convert human-readable host and domain names into the machine-readable, numeric Internet Protocol (IP) addresses that are used to point computers and other devices toward the correct servers on the Internet. Where authorities have control over DNS servers, officials can “deregister” a domain that hosts content that is deemed inappropriate or illegal so that the Web site is effectively invisible to users seeking access to the site. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Defines Internet censorship Names the intermediaries involved in Internet speech (Web host server, Copyright Cengage Learning. Powered by Cognero.

Page 63


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues upstream ISP, DNS, and ISP) Provides examples of how censorship is imposed through each of these intermediaries

DIFFICULTY: Moderate REFERENCES: Internet Censorship QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.3.12 - Describe the impact of censorship on the operation of Internet service providers. KEYWORDS: Bloom's: Remember DATE CREATED: 1/8/2020 11:38 AM DATE MODIFIED: 1/8/2020 11:42 AM 88. Define the terms high-quality software system and safety-critical system. How are these types of software related? ANSWER: A high-quality software system is a system that is easy to learn and use because it performs quickly and efficiently; it meets its users’ needs; and it operates safely and reliably so that system downtime is kept to a minimum. A safety-critical system is one whose failure may cause human injury or death. The safe operation of many safety-critical systems relies on the performance of software.

RATIONALE:

POINTS: RUBRIC:

They are related in that it is essential that safety-critical software systems be free of software defects--meaning that they should be high-quality software systems. A software defect is any error that, if not removed, could cause a software system to fail to meet its users’ needs or provide an open door for a cyberattacker. A high-quality software system is a system that is easy to learn and use because it performs quickly and efficiently; it meets its users’ needs; and it operates safely and reliably so that system downtime is kept to a minimum. A safety-critical system is one whose failure may cause human injury or death. The safe operation of many safety-critical systems relies on the performance of software. They are related in that it is essential that safety-critical software systems be free of software defects--meaning that they should be high-quality software systems. A software defect is any error that, if not removed, could cause a software system to fail to meet its users’ needs or provide an open door for a cyberattacker. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Defines highquality software system and safety-critical system Explains how they are related

DIFFICULTY:

Moderate

Copyright Cengage Learning. Powered by Cognero.

Page 64


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues REFERENCES: Ethical Issues in Developing Quality Software QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.3.14 - Distinguish between a high-quality software system and safety-critical system. KEYWORDS: Bloom's: Remember DATE CREATED: 1/8/2020 2:32 PM DATE MODIFIED: 1/8/2020 2:39 PM 89. Why does the process of building software for safety-critical systems take much longer and cost much more than building software for high-quality systems? ANSWER: The process of building software for safety-critical systems takes much longer and is much more expensive than for high-quality systems for the following reasons: •

RATIONALE:

Software developers working on a safety-critical system must be highly trained and experienced professionals who recognize that the software is only one component of the system; other components typically include system users or operators, hardware, and other equipment. Software developers need to work closely with safety and systems engineers to ensure that the entire system, not just the software, operates in a safe manner. Extreme measures must be taken to identify and remove software defects from safety-critical systems starting at the very earliest stages of software development— requirements definition and all the way through final testing. All tasks—including requirements definition, systems analysis, design, coding, fault analysis, testing, implementation, and change control—require additional steps, more thorough documentation, and vigilant checking and rechecking. As a result, safety-critical software takes much longer to complete and is much more expensive to develop. A great deal of effort must be put into identifying what can go wrong, the likelihood and consequences of such occurrences, and how these risks can be averted, mitigated, or detected so the users can be warned.

The process of building software for safety-critical systems takes much longer and is much more expensive than for high-quality systems for the following reasons: •

Software developers working on a safety-critical system must be highly trained and experienced professionals who recognize that the software is only one component of the system; other components typically include system users or operators, hardware, and other equipment. Software developers need to work closely with safety and systems engineers to ensure that the entire system, not just the software, operates in a safe manner. Extreme measures must be taken to identify and remove software defects from safety-critical systems starting at the very earliest stages of software development— requirements definition and all the way through final testing. All tasks—including requirements definition, systems analysis, design, coding, fault analysis, testing, implementation, and change control—require additional steps, more thorough documentation, and vigilant checking and rechecking. As a result, safety-critical software takes much longer to complete and is much more expensive to develop. A great deal of effort must be put into identifying what can go wrong, the likelihood and consequences of such occurrences, and how these risks can be averted, mitigated, or detected so the users can be warned.

Copyright Cengage Learning. Powered by Cognero.

Page 65


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues POINTS: RUBRIC:

1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Describes three reasons why safety-critical systems take longer and are more expensive to build

DIFFICULTY: Moderate REFERENCES: Safety-Critical Systems QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.3.15 - Give three reasons why developing a safety-critical system takes longer and is more expensive. KEYWORDS: Bloom's: Remember DATE CREATED: 1/9/2020 11:45 AM DATE MODIFIED: 1/9/2020 11:48 AM 90. Describe two ethical dilemmas that often confront developers working on safety-critical software. ANSWER: The increased time and expense of completing safety-critical software can draw developers into ethical dilemmas. They must carefully weigh cost and ease of use issues in developing a system that is safe and that also appeals to customers. For example, the use of hardware mechanisms or redundant software to back up or verify critical software functions can help ensure safe operation. However, such hardware or redundancy may make the final product more expensive to manufacture or harder for the user to operate—potentially making the product less attractive than a competitor’s.

RATIONALE:

POINTS:

Another key issue is deciding when sufficient software testing has been performed. How much testing is enough when you are building a product whose failure could cause loss of human life? At some point, software developers must determine that they have completed sufficient testing and then sign off to indicate their approval to release the product. Determining how much testing is sufficient demands careful decision making. The increased time and expense of completing safety-critical software can draw developers into ethical dilemmas. They must carefully weigh cost and ease of use issues in developing a system that is safe and that also appeals to customers. For example, the use of hardware mechanisms or redundant software to back up or verify critical software functions can help ensure safe operation. However, such hardware or redundancy may make the final product more expensive to manufacture or harder for the user to operate—potentially making the product less attractive than a competitor’s. Another key issue is deciding when sufficient software testing has been performed. How much testing is enough when you are building a product whose failure could cause loss of human life? At some point, software developers must determine that they have completed sufficient testing and then sign off to indicate their approval to release the product. Determining how much testing is sufficient demands careful decision making. 1

Copyright Cengage Learning. Powered by Cognero.

Page 66


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues RUBRIC: Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Describes two ethical dilemmas specific to safetycritical software development

DIFFICULTY: Moderate REFERENCES: Safety-Critical Systems QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.3.16 - Identify two ethical dilemmas that software developers face when building high-quality or safety-critical systems. KEYWORDS: Bloom's: Remember DATE CREATED: 1/9/2020 12:42 PM DATE MODIFIED: 1/9/2020 12:44 PM

Copyright Cengage Learning. Powered by Cognero.

Page 67


Chapter 04 - Hardware and Software True / False 1. Each central processing unit (CPU) produces a series of electronic pulses at a predetermined rate, called the clock speed, which affects machine cycle time. a. True b. False ANSWER: True RATIONALE: Each processor produces a series of electronic pulses at a predetermined rate, called the clock speed, which governs the speed at which these steps are completed. Clock speed affects machine cycle time. FEEDBACK: Correct Each processor produces a series of electronic pulses at a predetermined rate, called the clock speed, which governs the speed at which these steps are completed. Clock speed affects machine cycle time. Incorrect Each processor produces a series of electronic pulses at a predetermined rate, called the clock speed, which governs the speed at which these steps are completed. Clock speed affects machine cycle time.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Processor QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/25/2020 2:18 PM 2. Primary memory, which holds program instructions and data, is not associated with the central processing unit (CPU). a. True b. False ANSWER: False RATIONALE: Main memory provides the CPU with a working storage area for program instructions and data. The chief function of memory is to rapidly provide data and instructions to the CPU. FEEDBACK: Correct The chief function of main memory is to rapidly provide data and instructions to the CPU. Incorrect The chief function of main memory is to rapidly provide data and instructions to the CPU.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Main Memory QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 04 - Hardware and Software KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 11/19/2019 5:48 PM 1/25/2020 2:21 PM

3. RAM stands for random access memory, a form of memory that holds its contents even if the current is turned off or disrupted. a. True b. False ANSWER: False RATIONALE: Computer memory can take several forms. Instructions or data can be temporarily stored in and read from random access memory (RAM). As currently designed, RAM chips are volatile storage devices, meaning they lose their contents if the current is turned off or disrupted, which can be caused by a power surge, a brownout, or electrical noise generated by lightning or nearby machines. FEEDBACK: Correct As currently designed, RAM (random access memory) chips are volatile storage devices, meaning they lose their contents if the current is turned off or disrupted, which can be caused by a power surge, a brownout, or electrical noise generated by lightning or nearby machines. Incorrect As currently designed, RAM (random access memory) chips are volatile storage devices, meaning they lose their contents if the current is turned off or disrupted, which can be caused by a power surge, a brownout, or electrical noise generated by lightning or nearby machines.

POINTS: 1 DIFFICULTY: Easy REFERENCES: RAM and Cache QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/25/2020 2:25 PM 4. The image collection on your hard drive totals 500 million bytes in size. A 2-gigabyte storage device will be adequate to store those photos. a. True b. False ANSWER: True RATIONALE: In most cases, storage capacity is measured in bytes, with 1 byte equivalent to one character of data. One gigabyte is equal to 1,000,000,000 bytes. FEEDBACK: Correct In most cases, storage capacity is measured in bytes, with 1 byte equivalent to one character of data. One gigabyte is equal to 1,000,000,000 bytes. Incorrect In most cases, storage capacity is measured in bytes, with 1 byte equivalent to one character of data. One gigabyte is equal to 1,000,000,000 bytes.

POINTS: DIFFICULTY:

1 Moderate

Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 04 - Hardware and Software REFERENCES: Main Memory QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/25/2020 2:31 PM 5. Completing an instruction involves two phases (instruction and execution), each of which is broken down into three steps. a. True b. False ANSWER: False RATIONALE: Completing an instruction involves two phases (instruction or I-Time, and execution or ETime), which are broken down into the following four steps: fetch instruction, decode instruction, execute instruction, and store results. FEEDBACK: Correct Completing an instruction involves two phases (instruction or I-Time, and execution or E-Time), which are broken down into the following four steps: fetch instruction, decode instruction, execute instruction, and store results. Incorrect Completing an instruction involves two phases (instruction or I-Time, and execution or E-Time), which are broken down into the following four steps: fetch instruction, decode instruction, execute instruction, and store results.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Anatomy of a Computer QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/25/2020 2:35 PM 6. Massively parallel processing systems are a form of multiprocessing that speeds processing by linking hundreds or thousands of processors to operate at the same time. a. True b. False ANSWER: True RATIONALE: Systems with thousands of processors are known as massively parallel processing systems, a form of multiprocessing that speeds processing by linking hundreds or even thousands of processors to operate at the same time, or in parallel, with each processor having its own bus, memory, disks, copy of the operating system, and applications. FEEDBACK: Correct Systems with thousands of processors are known as massively parallel processing Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 04 - Hardware and Software systems, a form of multiprocessing that speeds processing by linking hundreds or even thousands of processors to operate at the same time, or in parallel, with each processor having its own bus, memory, disks, copy of the operating system, and applications. Incorrect Systems with thousands of processors are known as massively parallel processing systems, a form of multiprocessing that speeds processing by linking hundreds or even thousands of processors to operate at the same time, or in parallel, with each processor having its own bus, memory, disks, copy of the operating system, and applications.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Processor QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.2 - Explain the difference between multiprocessing, parallel processing, and grid computing. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/25/2020 2:39 PM 7. Secondary storage can store large amounts of data, instructions, and information more permanently than allowed with main memory. a. True b. False ANSWER: True RATIONALE: Secondary storage is a device that stores large amounts of data, instructions, and information more permanently than allowed with main memory. FEEDBACK: Correct Secondary storage is a device that stores large amounts of data, instructions, and information more permanently than allowed with main memory. Incorrect Secondary storage is a device that stores large amounts of data, instructions, and information more permanently than allowed with main memory.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Secondary Storage QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/25/2020 2:42 PM 8. Virtual tape technology can decrease data access time, lower the total cost of ownership, and reduce the amount of floor space consumed by tape operations. a. True Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 04 - Hardware and Software b. False ANSWER: RATIONALE:

FEEDBACK:

True Virtual tape is a storage technology suitable for less frequently needed data. Virtual tape technology can decrease data access time, lower the total cost of ownership, and reduce the amount of floor space consumed by tape operations. Correct

Virtual tape technology can decrease data access time, lower the total cost of ownership, and reduce the amount of floor space consumed by tape operations. Incorrect Virtual tape technology can decrease data access time, lower the total cost of ownership, and reduce the amount of floor space consumed by tape operations.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Secondary Storage QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/25/2020 2:44 PM 9. In a typical computer configuration, secondary storage has a much larger capacity than the volatile random access memory. a. True b. False ANSWER: True RATIONALE: For most organizations, the best overall data storage solution is likely a combination of different secondary storage options that can store large amounts of data, instructions, and information more permanently than allowed with main memory. Compared with memory, secondary storage offers the advantages of nonvolatility, greater capacity, and greater economy. FEEDBACK: Correct Compared with memory, secondary storage offers the advantages of nonvolatility, greater capacity, and greater economy. Incorrect Compared with memory, secondary storage offers the advantages of nonvolatility, greater capacity, and greater economy.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Secondary Storage QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/25/2020 2:47 PM Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 04 - Hardware and Software 10. A redundant array of independent/inexpensive disks (RAID) is a method of storing data so that data can be accessed more quickly. a. True b. False ANSWER: False RATIONALE: A redundant array of independent/inexpensive disks (RAID) is a method of storing data that generates extra bits of data from existing data, allowing the system to create a “reconstruction map” so that if a hard drive fails, it can rebuild lost data. Secondary data storage is not directly accessible by the CPU. FEEDBACK: Correct A redundant array of independent/inexpensive disks (RAID) is a method of storing data that generates extra bits of data from existing data, allowing the system to create a “reconstruction map” so that if a hard drive fails, it can rebuild lost data. Secondary data storage is not directly accessible by the CPU. Incorrect A redundant array of independent/inexpensive disks (RAID) is a method of storing data that generates extra bits of data from existing data, allowing the system to create a “reconstruction map” so that if a hard drive fails, it can rebuild lost data. Secondary data storage is not directly accessible by the CPU.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Secondary Storage QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/25/2020 2:52 PM 11. Disk mirroring is a method of storing data that duplicates only part of the existing data while generating extra bits of data from it, allowing the system to create a "reconstruction map" so that if a hard drive fails, it can rebuild lost data. a. True b. False ANSWER: False RATIONALE: RAID can be implemented in several ways. RAID 1 subsystems duplicate data on the hard drives. This process, called “disk mirroring,” provides an exact copy that protects users fully in the event of data loss. However, to keep complete duplicates of current backups, organizations need to double the amount of their storage capacity. Other RAID methods are less expensive because they duplicate only part of the data, allowing storage managers to minimize the amount of extra disk space they must purchase to protect data. FEEDBACK: Correct RAID can be implemented in several ways. RAID 1 subsystems duplicate data on the hard drives. This process, called “disk mirroring,” provides an exact copy that protects users fully in the event of data loss. Incorrect RAID can be implemented in several ways. RAID 1 subsystems duplicate data on the hard drives. This process, called “disk mirroring,” provides an exact copy that protects users fully in the event of data loss.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 04 - Hardware and Software DIFFICULTY: Easy REFERENCES: Secondary Storage QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/25/2020 2:57 PM 12. Solid state storage devices (SSDs) store data in hard disk drives or optical media rather than memory chips. a. True b. False ANSWER: False RATIONALE: A solid state storage device (SSD) stores data in memory chips rather than on hard disk drives or optical media. FEEDBACK: Correct A solid state storage device (SSD) stores data in memory chips rather than on hard disk drives or optical media. Incorrect A solid state storage device (SSD) stores data in memory chips rather than on hard disk drives or optical media.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Secondary Storage QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/25/2020 2:59 PM 13. To date, semiconductor fabricators have been able to make ICs (integrated circuits) that hold up to several million electronic components in an area the size of a fingernail. a. True b. False ANSWER: False RATIONALE: An integrated circuit (IC)—or chip—is a set of electronic circuits on one small piece of semiconductor material, normally silicon. ICs can be made extremely small with up to several billion electronic components packed into an area the size of a fingernail. FEEDBACK: Correct ICs can be made extremely small with up to several billion electronic components packed into an area the size of a fingernail. Incorrect ICs can be made extremely small with up to several billion electronic components packed into an area the size of a fingernail.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 04 - Hardware and Software DIFFICULTY: Moderate REFERENCES: Processor QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/25/2020 3:06 PM 14. A liquid crystal display (LCD) functions by exciting organic compounds with electric current to produce bright and sharp images. a. True b. False ANSWER: False RATIONALE: A liquid crystal display (LCD) uses several layers of charged liquid crystals placed between clear plates that are lit from behind by a fluorescent light to create light and images. An organic light-emitting diode (OLED) functions by exciting organic compounds with electric current to produce bright, sharp images. FEEDBACK: Correct A liquid crystal display (LCD) uses several layers of charged liquid crystals placed between clear plates that are lit from behind by a fluorescent light to create light and images. An organic light-emitting diode (OLED) functions by exciting organic compounds with electric current to produce bright, sharp images. Incorrect A liquid crystal display (LCD) uses several layers of charged liquid crystals placed between clear plates that are lit from behind by a fluorescent light to create light and images. An organic light-emitting diode (OLED) functions by exciting organic compounds with electric current to produce bright, sharp images.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Output Devices QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/25/2020 3:09 PM 15. Cache memory is available in two forms: level 1, which can be accessed over a high-speed dedicated interface, and level 2, which is found on the CPU chip. a. True b. False ANSWER: False RATIONALE: Cache memory is available in three forms. The level 1 (L1) cache is on the CPU chip. The level 2 (L2) cache memory can be accessed by the CPU over a high-speed dedicated Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 04 - Hardware and Software interface. The latest processors go a step further, placing the L2 cache directly on the CPU chip itself and providing high-speed support for a tertiary level 3 (L3) external cache. FEEDBACK:

Correct

Cache memory is available in three forms. The level 1 (L1) cache is on the CPU chip. The level 2 (L2) cache memory can be accessed by the CPU over a highspeed dedicated interface. Incorrect Cache memory is available in three forms. The level 1 (L1) cache is on the CPU chip. The level 2 (L2) cache memory can be accessed by the CPU over a highspeed dedicated interface.

POINTS: 1 DIFFICULTY: Easy REFERENCES: RAM and Cache QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/25/2020 3:15 PM 16. A tablet computer is a low-cost, centrally managed computer with no internal or external attached drives for data storage. a. True b. False ANSWER: False RATIONALE: A thin client is a low-cost, centrally managed computer with no internal or external attached drives for data storage. A tablet is a portable, lightweight computer that can come with or without a keyboard and allows you to roam the office, home, or factory floor, carrying the device like a clipboard. FEEDBACK: Correct A thin client is a low-cost, centrally managed computer with no internal or external attached drives for data storage. Incorrect A thin client is a low-cost, centrally managed computer with no internal or external attached drives for data storage.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Portable Computers QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.4 - Identify the three or four subclasses associated with each primary class of computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/25/2020 3:19 PM 17. Thin client computers are a type of portable single-user computers. Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 04 - Hardware and Software a. True b. False ANSWER: RATIONALE: FEEDBACK:

False Nonportable single-user computers include thin client computers, desktop computers, nettops, and workstations. Correct

Nonportable single-user computers include thin client computers, desktop computers, nettops, and workstations. Incorrect Nonportable single-user computers include thin client computers, desktop computers, nettops, and workstations.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Nonportable, Single-User Computers QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.4 - Identify the three or four subclasses associated with each primary class of computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/25/2020 3:27 PM 18. The scope of green computing is limited to the efficient and environmentally responsible design and manufacture of all types of computers. a. True b. False ANSWER: False RATIONALE: Green computing is concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IT-related products, including all types of computing devices (from smartphones to supercomputers), printers, printer materials such as cartridges and toner, and storage devices. FEEDBACK: Correct Green computing is concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IT-related products, including all types of computing devices, printers, printer materials such as cartridges and toner, and storage devices. Incorrect Green computing is concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IT-related products, including all types of computing devices, printers, printer materials such as cartridges and toner, and storage devices.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Green Computing QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.6 - State the three primary goals of the “green computing” program. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 04 - Hardware and Software DATE CREATED: DATE MODIFIED:

11/19/2019 5:48 PM 1/25/2020 3:31 PM

19. Depending on the brand of tablet you purchase, you may be able to enter data by typing on a keyboard, writing on the screen with a stylus, or speaking into the tablet's microphone. a. True b. False ANSWER: True RATIONALE: A tablet is a portable, lightweight computer that can come with or without a keyboard and allows you to roam the office, home, or factory floor, carrying the device like a clipboard. You can enter text with a writing stylus directly on the screen, thanks to built-in handwritingrecognition software. Other input methods include an onscreen keyboard and speech recognition. FEEDBACK: Correct You can enter text into a tablet with a writing stylus directly on the screen, thanks to built-in handwriting-recognition software. Other input methods include an onscreen keyboard and speech recognition. Incorrect You can enter text into a tablet with a writing stylus directly on the screen, thanks to built-in handwriting-recognition software. Other input methods include an onscreen keyboard and speech recognition.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Portable Computers QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.4 - Identify the three or four subclasses associated with each primary class of computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/25/2020 3:37 PM 20. System software consists of programs that help users solve particular computing problems. a. True b. False ANSWER: False RATIONALE: System software includes operating systems, utilities, and middleware that coordinate the activities and functions of the hardware and other programs throughout the computer system. Application software consists of programs that help users solve computing problems. FEEDBACK: Correct System software includes operating systems, utilities, and middleware that coordinate the activities and functions of the hardware and other programs throughout the computer system. Application software consists of programs that help users solve computing problems. Incorrect System software includes operating systems, utilities, and middleware that coordinate the activities and functions of the hardware and other programs throughout the computer system. Application software consists of programs that help users solve computing problems.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 04 - Hardware and Software REFERENCES: System Software QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.7 - List the two basic kinds of software and their associated subclasses. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember NOTES: Bloom’s: Knowledge DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/25/2020 3:39 PM 21. Windows 10 is an example of application software. a. True b. False ANSWER: False RATIONALE: System software can be divided into three types: operating systems, utility programs, and middleware. Examples of operating systems include Microsoft Windows, macOS, and Google Android. FEEDBACK: Correct System software can be divided into three types: operating systems, utility programs, and middleware. Examples of operating systems include Microsoft Windows, macOS, and Google Android. Incorrect System software can be divided into three types: operating systems, utility programs, and middleware. Examples of operating systems include Microsoft Windows, macOS, and Google Android.

POINTS: 1 DIFFICULTY: Easy REFERENCES: System Software QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.7 - List the two basic kinds of software and their associated subclasses. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/25/2020 3:45 PM 22. An operating system is a set of programs that controls the computer's hardware and acts as an interface with applications. a. True b. False ANSWER: True RATIONALE: An operating system (OS) is a set of programs that controls a computer’s hardware and acts as an interface with application software. FEEDBACK: Correct An operating system (OS) is a set of programs that controls a computer’s hardware and acts as an interface with application software. Incorrect An operating system (OS) is a set of programs that controls a computer’s hardware and acts as an interface with application software.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 04 - Hardware and Software DIFFICULTY: Easy REFERENCES: Operating Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.8 - Describe the role of the operating system. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/25/2020 3:47 PM 23. If 10 users can run programs at the same time on the same computer, it is known as multitasking. a. True b. False ANSWER: False RATIONALE: The multiuser approach to task management enables two or more users to run programs at the same time on the same computer. Multitasking enables more than one program to run concurrently. FEEDBACK: Correct The multiuser approach to task management enables two or more users to run programs at the same time on the same computer. Multitasking enables more than one program to run concurrently. Incorrect The multiuser approach to task management enables two or more users to run programs at the same time on the same computer. Multitasking enables more than one program to run concurrently.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Operating Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.8 - Describe the role of the operating system. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/25/2020 4:02 PM 24. Your friend has a Mac that runs OS X. If she needs to run a Windows app on it, she can set it up to run Windows also. a. True b. False ANSWER: True RATIONALE: Because macOS runs on Intel processors, Mac users can set up their computers to run both Windows and macOS and select the platform they want to work with when they boot their computers. Such an arrangement is called dual booting. FEEDBACK: Correct Because macOS runs on Intel processors, Mac users can set up their computers to run both Windows and macOS and select the platform they want to work with when they boot their computers. Incorrect Because macOS runs on Intel processors, Mac users can set up their computers to run both Windows and macOS and select the platform they want to work with when Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 04 - Hardware and Software they boot their computers.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Current Operating Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.8 - Describe the role of the operating system. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/25/2020 4:05 PM 25. Linux is an open-source operating system. a. True b. False ANSWER: True RATIONALE: Linux is an OS developed in 1991 by Linus Torvalds as a student in Finland. The OS is distributed under the GNU General Public License, and its source code is freely available to everyone. It is, therefore, called an open-source operating system. FEEDBACK: Correct Linux is distributed under the GNU General Public License, and its source code is freely available to everyone. It is, therefore, called an open-source operating system. Incorrect Linux is distributed under the GNU General Public License, and its source code is freely available to everyone. It is, therefore, called an open-source operating system.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Current Operating Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.8 - Describe the role of the operating system. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/25/2020 4:07 PM 26. Symbian is an operating system used in special-purpose computers. a. True b. False ANSWER: True RATIONALE: A special-purpose computer system is typical of a number of computers with specialized functions, such as those that control sophisticated military aircraft, digital cameras, or home appliances. Examples of OSs designed for these purposes include Windows Embedded, Symbian, and some distributions of Linux. FEEDBACK: Correct Examples of OSs designed for special-purpose computers include Windows Embedded, Symbian, and some distributions of Linux. Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 04 - Hardware and Software Incorrect Examples of OSs designed for special-purpose computers include Windows Embedded, Symbian, and some distributions of Linux.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Operating Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.8 - Describe the role of the operating system. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/25/2020 4:11 PM 27. An embedded system is a computer system that is implanted in and dedicated to the control of another device. a. True b. False ANSWER: True RATIONALE: An embedded system is a computer system that is implanted in and dedicated to the control of another device, often within a larger mechanical or electrical system. FEEDBACK: Correct An embedded system is a computer system that is implanted in and dedicated to the control of another device, often within a larger mechanical or electrical system. Incorrect An embedded system is a computer system that is implanted in and dedicated to the control of another device, often within a larger mechanical or electrical system.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Current Operating Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.8 - Describe the role of the operating system. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/25/2020 4:13 PM 28. Utility programs help to perform maintenance, correct problems, merge and sort sets of data, keep track of computer jobs, and compress data files. a. True b. False ANSWER: True RATIONALE: Utility programs perform a variety of tasks typically related to system maintenance or problem correction. For example, there are utility programs designed to merge and sort sets of data, keep track of computer jobs being run, compress data files before they are stored or transmitted over a network (thus saving space and time), and perform other important tasks. FEEDBACK: Correct There are utility programs designed to merge and sort sets of data, keep track of computer jobs being run, compress data files before they are stored or transmitted over a network (thus saving space and time), and perform other important tasks. Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 04 - Hardware and Software Incorrect There are utility programs designed to merge and sort sets of data, keep track of computer jobs being run, compress data files before they are stored or transmitted over a network (thus saving space and time), and perform other important tasks.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Current Operating Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.7 - List the two basic kinds of software and their associated subclasses. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/25/2020 4:16 PM 29. The primary function of application software is to apply the power of the computer to enable people, workgroups, and entire enterprises to solve problems and perform specific tasks. a. True b. False ANSWER: True RATIONALE: The primary function of application software is to apply the power of a computer system to enable people, workgroups, and entire enterprises to solve problems and perform specific tasks. FEEDBACK: Correct The primary function of application software is to apply the power of a computer system to enable people, workgroups, and entire enterprises to solve problems and perform specific tasks. Incorrect The primary function of application software is to apply the power of a computer system to enable people, workgroups, and entire enterprises to solve problems and perform specific tasks.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Application Software QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.7 - List the two basic kinds of software and their associated subclasses. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/25/2020 4:19 PM 30. Proprietary software is mass-produced by software vendors to address needs that are common across businesses, organizations, or individuals. a. True b. False ANSWER: False RATIONALE: Proprietary software is one-of-a-kind software designed for a specific application and for an individual company, organization, or person that uses it. Off-the-shelf software is produced Copyright Cengage Learning. Powered by Cognero.

Page 16


Chapter 04 - Hardware and Software by software vendors to address needs that are common across businesses, organizations, or individuals. FEEDBACK:

Correct

Proprietary software is one-of-a-kind software designed for a specific application and for an individual company, organization, or person that uses it. Off-the-shelf software is produced by software vendors to address needs that are common across businesses, organizations, or individuals. Incorrect Proprietary software is one-of-a-kind software designed for a specific application and for an individual company, organization, or person that uses it. Off-the-shelf software is produced by software vendors to address needs that are common across businesses, organizations, or individuals.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Overview of Application Software QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.11 - Identify three advantages of off-the-shelf versus proprietary software. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/25/2020 4:21 PM 31. Software as a Service (SaaS) allows businesses to subscribe to Web-delivered business application software by paying a monthly service charge or a per-use fee. a. True b. False ANSWER: True RATIONALE: Software as a service (SaaS) is a software distribution model under which a third-party provider hosts applications and makes them available to subscribers over the Internet. In most cases, subscribers pay a monthly service charge or a per-use fee. FEEDBACK: Correct Software as a service (SaaS) is a software distribution model under which a thirdparty provider hosts applications and makes them available to subscribers over the Internet. In most cases, subscribers pay a monthly service charge or a per-use fee. Incorrect Software as a service (SaaS) is a software distribution model under which a thirdparty provider hosts applications and makes them available to subscribers over the Internet. In most cases, subscribers pay a monthly service charge or a per-use fee.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Software as a Service (SaaS) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.12 - State four key advantages of the software-as-a-service model. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/25/2020 4:24 PM 32. A software suite is a collection of programs packaged together as a bundle and typically includes a word processor, Copyright Cengage Learning. Powered by Cognero.

Page 17


Chapter 04 - Hardware and Software spreadsheet program, graphics program, and more. a. True b. False ANSWER: True RATIONALE: A software suite is a collection of programs packaged together and sold in a bundle. A software suite might include a word processor, a spreadsheet program, a database management system, a graphics program, communications and note-taking tools, and organizers. FEEDBACK: Correct A software suite is a collection of programs packaged together and sold in a bundle. A software suite might include a word processor, a spreadsheet program, a database management system, a graphics program, communications and notetaking tools, and organizers. Incorrect A software suite is a collection of programs packaged together and sold in a bundle. A software suite might include a word processor, a spreadsheet program, a database management system, a graphics program, communications and notetaking tools, and organizers.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Software Suites and Integrated Software Packages QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.13 - Give an example of how application software is used in the personal, workgroup, and enterprise sphere of influence. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/25/2020 4:29 PM 33. Web-based productivity software suites that require no installation on the computer are available. a. True b. False ANSWER: True RATIONALE: Microsoft, Apple, and Google offer Web-based productivity software suites that do not require the installation of any software on your device except a Web browser. FEEDBACK: Correct Microsoft, Apple, and Google offer Web-based productivity software suites that do not require the installation of any software on your device except a Web browser. Incorrect Microsoft, Apple, and Google offer Web-based productivity software suites that do not require the installation of any software on your device except a Web browser.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Software Suites and Integrated Software Packages QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.13 - Give an example of how application software is used in the personal, workgroup, and enterprise sphere of influence. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember Copyright Cengage Learning. Powered by Cognero.

Page 18


Chapter 04 - Hardware and Software DATE CREATED: DATE MODIFIED:

11/19/2019 5:52 PM 1/25/2020 4:32 PM

34. Suppose a stock analyst wants to automate the retrieval of stock trade data, processing of the data, and production of analysis reports. His requirements can be met by writing custom software. a. True b. False ANSWER: True RATIONALE: Proprietary software is one-of-a-kind software designed for a specific application and for an individual company, organization, or person that uses it. An advantage of proprietary software is that you can get exactly what you need in terms of features, reports, and so on. FEEDBACK: Correct Proprietary software is one-of-a-kind software designed for a specific application and for an individual company, organization, or person that uses it. An advantage of proprietary software is that you can get exactly what you need in terms of features, reports, and so on. Incorrect Proprietary software is one-of-a-kind software designed for a specific application and for an individual company, organization, or person that uses it. An advantage of proprietary software is that you can get exactly what you need in terms of features, reports, and so on.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Overview of Application Software QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.11 - Identify three advantages of off-the-shelf versus proprietary software. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/25/2020 4:41 PM 35. Each programming language has a set of rules, called the program code of the language. a. True b. False ANSWER: False RATIONALE: Each programming language has its own set of rules, called the syntax of the language. Program code is the set of instructions that signal the CPU to perform circuit-switching operations. FEEDBACK: Correct Each programming language has its own set of rules, called the syntax of the language. Program code is the set of instructions that signal the CPU to perform circuit-switching operations. Incorrect Each programming language has its own set of rules, called the syntax of the language. Program code is the set of instructions that signal the CPU to perform circuit-switching operations.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Programming Languages True / False

Copyright Cengage Learning. Powered by Cognero.

Page 19


Chapter 04 - Hardware and Software HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.14 - Identify five tasks for which programming languages are commonly used. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/25/2020 4:43 PM 36. A single computer can be used by a single user or by multiple, simultaneous users. a. True b. False ANSWER: True RATIONALE: General-purpose computer systems can be divided into three primary classes: portable computers used by one user at a time, nonportable computers used by one person at a time, and systems used by multiple concurrent users. FEEDBACK: Correct General-purpose computer systems can be divided into three primary classes: portable computers used by one user at a time, nonportable computers used by one person at a time, and systems used by multiple concurrent users. Incorrect General-purpose computer systems can be divided into three primary classes: portable computers used by one user at a time, nonportable computers used by one person at a time, and systems used by multiple concurrent users.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Computer System Classes QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.3 - Describe how each of the three primary classes of computers is used within an organization. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/25/2020 4:49 PM 37. An example of a common hardware function performed by the operating system is presenting information on a monitor. a. True b. False ANSWER: True RATIONALE: The programs that make up the OS perform a variety of activities, including control of common computer hardware functions such as accepting input from the keyboard, retrieving data from a storage device, and displaying data on the screen. FEEDBACK: Correct The programs that make up the OS perform a variety of activities, including control of common computer hardware functions such as accepting input from the keyboard, retrieving data from a storage device, and displaying data on the screen. Incorrect The programs that make up the OS perform a variety of activities, including control of common computer hardware functions such as accepting input from the keyboard, retrieving data from a storage device, and displaying data on the screen.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 20


Chapter 04 - Hardware and Software DIFFICULTY: Easy REFERENCES: Operating Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.8 - Describe the role of the operating system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/25/2020 4:52 PM 38. Operating systems provide a measure of security by allowing users to access to those resources they've been cleared to use as well as other users' resources if those resources are beneficial. a. True b. False ANSWER: False RATIONALE: The programs that make up the OS perform a variety of activities, including controlling access to system resources to provide a high level of security against unauthorized access to the users’ data and programs as well as recording who is using the system and for how long. FEEDBACK: Correct The programs that make up the OS perform a variety of activities, including controlling access to system resources to provide a high level of security against unauthorized access to the users’ data and programs as well as recording who is using the system and for how long. Incorrect The programs that make up the OS perform a variety of activities, including controlling access to system resources to provide a high level of security against unauthorized access to the users’ data and programs as well as recording who is using the system and for how long.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Operating Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.8 - Describe the role of the operating system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/25/2020 4:55 PM 39. With the launch of Windows 10, Microsoft announced that it would publish ongoing, incremental upgrades instead of releasing new versions of the software every few years. However, IS professionals can opt out of frequent updates if they believe that making minimal changes will ensure reliable operations. a. True b. False ANSWER: True RATIONALE: With its launch of Windows 10, Microsoft announced that it is moving away from its usual practice of releasing major new versions of its Windows operating system every few years. Instead, the company provides ongoing, incremental upgrades and improvements, rolled out automatically, a few times each year. Unless users change the automatic update setting, they Copyright Cengage Learning. Powered by Cognero.

Page 21


Chapter 04 - Hardware and Software receive these updates as soon as they come out. Organizations, whose information systems professionals desire minimal change in order to ensure reliable operations of corporate applications, may elect to opt out of such frequent updates. FEEDBACK:

Correct

With its launch of Windows 10, Microsoft announced that it will provide ongoing, incremental upgrades and improvements, rolled out automatically, a few times each year. Organizations, whose information systems professionals desire minimal change in order to ensure reliable operations of corporate applications, may elect to opt out of such frequent updates. Incorrect With its launch of Windows 10, Microsoft announced that it will provide ongoing, incremental upgrades and improvements, rolled out automatically, a few times each year. Organizations, whose information systems professionals desire minimal change in order to ensure reliable operations of corporate applications, may elect to opt out of such frequent updates.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Current Operating Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.8 - Describe the role of the operating system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/25/2020 5:00 PM 40. Utility programs are used to perform system maintenance, such as repairing errors on a hard drive, improving system security, and optimizing sluggish system processes. a. True b. False ANSWER: True RATIONALE: Utility programs perform a variety of tasks typically related to system maintenance or problem correction. Utilities can be used to boost the performance of a slow PC, repair errors in the registry and on a hard drive, remove unnecessary files, improve system security and privacy, and optimize sluggish system processes. FEEDBACK: Correct Utility programs perform a variety of tasks typically related to system maintenance or problem correction. Utilities can be used to boost the performance of a slow PC, repair errors in the registry and on a hard drive, remove unnecessary files, improve system security and privacy, and optimize sluggish system processes. Incorrect Utility programs perform a variety of tasks typically related to system maintenance or problem correction. Utilities can be used to boost the performance of a slow PC, repair errors in the registry and on a hard drive, remove unnecessary files, improve system security and privacy, and optimize sluggish system processes.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Current Operating Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.7 - List the two basic kinds of software and their associated subclasses. NATIONAL STANDARDS: United States - BUSPROG: Technology Copyright Cengage Learning. Powered by Cognero.

Page 22


Chapter 04 - Hardware and Software KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 11/19/2019 5:52 PM 1/25/2020 5:02 PM

41. If a large organization wants software that will benefit the entire organization, the organization must develop it specifically for the business in order to get the functionality required. a. True b. False ANSWER: False RATIONALE: Off-the-shelf software is produced by software vendors to address needs that are common across businesses, organizations, or individuals. An example of off-the-shelf software is an enterprise application, software used to meet organization-wide business needs and typically shares data with other enterprise applications used within the organization. Enterprise applications support processes in logistics, manufacturing, human resources, marketing and sales, order processing, accounting, inventory control, customer relationship management, and other essential business functions. FEEDBACK: Correct Off-the-shelf software is produced by software vendors to address needs that are common across businesses, organizations, or individuals. An example of off-theshelf software is an enterprise application, software used to meet organization-wide business needs and typically shares data with other enterprise applications used within the organization. Incorrect Off-the-shelf software is produced by software vendors to address needs that are common across businesses, organizations, or individuals. An example of off-theshelf software is an enterprise application, software used to meet organization-wide business needs and typically shares data with other enterprise applications used within the organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Enterprise Application Software QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.7 - List the two basic kinds of software and their associated subclasses. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/25/2020 5:08 PM Multiple Choice 42. _____ is typically used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the central processing unit (CPU). a. Main memory b. A register c. The control unit d. The motherboard ANSWER: b RATIONALE: Completing an instruction involves two phases (instruction or I-Time, and execution or ETime), which are broken down into the following four steps. Instruction phase: Copyright Cengage Learning. Powered by Cognero.

Page 23


Chapter 04 - Hardware and Software •

Fetch instruction. The computer reads the next program instruction to be executed— along with any necessary data—into the processor. The instruction and data are typically held in a storage register. Decode instruction. The instruction is decoded and passed to the appropriate processor execution unit.

Execution phase: • •

FEEDBACK:

Execute instruction. The computer executes the instruction by making an arithmetic computation, logical comparison, bit shift, or vector operation. Store results. The results are stored in temporary storage locations called registers or in memory.

a. During the instruction phase of executing an instruction, the instruction and data

are typically held in a storage register. During the execution phase, the results are stored in temporary storage locations called registers or in memory. b. During the instruction phase of executing an instruction, the instruction and data are typically held in a storage register. During the execution phase, the results are stored in temporary storage locations called registers or in memory. c. During the instruction phase of executing an instruction, the instruction and data are typically held in a storage register. During the execution phase, the results are stored in temporary storage locations called registers or in memory. d. During the instruction phase of executing an instruction, the instruction and data are typically held in a storage register. During the execution phase, the results are stored in temporary storage locations called registers or in memory.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Anatomy of a Computer QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/30/2020 12:48 PM 43. A _____ is a climate- and access-controlled building or a set of buildings that houses the computer hardware that delivers an organization’s data and information services. a. data mart b. data warehouse c. data center d. data mine ANSWER: c RATIONALE: A data center is a climate- and access-controlled building or a set of buildings that houses the computer hardware that delivers an organization’s data and information services. FEEDBACK: a. A data center is a climate- and access-controlled building or a set of buildings that houses the computer hardware that delivers an organization’s data and information services. b. A data center is a climate- and access-controlled building or a set of buildings that

Copyright Cengage Learning. Powered by Cognero.

Page 24


Chapter 04 - Hardware and Software houses the computer hardware that delivers an organization’s data and information services. c. A data center is a climate- and access-controlled building or a set of buildings that houses the computer hardware that delivers an organization’s data and information services. d. A data center is a climate- and access-controlled building or a set of buildings that houses the computer hardware that delivers an organization’s data and information services.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Center QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.5 - Identify three primary features that distinguish tier 1, 2, 3, and 4 data centers. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/30/2020 12:52 PM 44. Completing an instruction involves two phases—instruction and execution—which are each broken down into two steps for a total of four steps. Which of the following is NOT one of the four steps? a. fetch instruction b. store results c. execute instruction d. process data ANSWER: d RATIONALE: Completing an instruction involves two phases (instruction or I-Time, and execution or ETime), which are broken down into the following four steps. Instruction phase: •

Fetch instruction. The computer reads the next program instruction to be executed— along with any necessary data—into the processor. The instruction and data are typically held in a storage register. Decode instruction. The instruction is decoded and passed to the appropriate processor execution unit.

Execution phase: • •

FEEDBACK:

Execute instruction. The computer executes the instruction by making an arithmetic computation, logical comparison, bit shift, or vector operation. Store results. The results are stored in temporary storage locations called registers or in memory.

a. Completing an instruction involves two phases (instruction or I-Time, and

execution or E-Time), which are broken down into the following four steps: fetch instruction, decode instruction, execute instruction, and store results. b. Completing an instruction involves two phases (instruction or I-Time, and execution or E-Time), which are broken down into the following four steps: fetch instruction, decode instruction, execute instruction, and store results. c. Completing an instruction involves two phases (instruction or I-Time, and Copyright Cengage Learning. Powered by Cognero.

Page 25


Chapter 04 - Hardware and Software execution or E-Time), which are broken down into the following four steps: fetch instruction, decode instruction, execute instruction, and store results. d. Completing an instruction involves two phases (instruction or I-Time, and execution or E-Time), which are broken down into the following four steps: fetch instruction, decode instruction, execute instruction, and store results.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Anatomy of a Computer QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/30/2020 12:55 PM 45. A type of memory whose contents are not lost if the power is turned off or interrupted is said to be _____. a. unarbitrary b. nonvolatile c. inaccessible d. nonadjacent ANSWER: b RATIONALE: As currently designed, RAM chips are volatile storage devices, meaning they lose their contents if the current is turned off or disrupted, which can be caused by a power surge, a brownout, or electrical noise generated by lightning or nearby machines. Read-only memory (ROM), another type of memory, is nonvolatile, meaning that its contents are not lost if the power is turned off or interrupted. FEEDBACK: a. Read-only memory (ROM) is nonvolatile, meaning that its contents are not lost if the power is turned off or interrupted. b. Read-only memory (ROM) is nonvolatile, meaning that its contents are not lost if the power is turned off or interrupted. c. Read-only memory (ROM) is nonvolatile, meaning that its contents are not lost if the power is turned off or interrupted. d. Read-only memory (ROM) is nonvolatile, meaning that its contents are not lost if the power is turned off or interrupted.

POINTS: 1 DIFFICULTY: Easy REFERENCES: RAM and Cache QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/30/2020 1:00 PM 46. _____ is the use of a collection of computers, often owned by many people or different organizations, to work in a Copyright Cengage Learning. Powered by Cognero.

Page 26


Chapter 04 - Hardware and Software coordinated manner to solve a common problem. a. Cloud computing b. Grid computing c. Parallel computing d. Web computing ANSWER: b RATIONALE: Grid computing is the use of a collection of computers, often owned by multiple individuals or organizations, that work in a coordinated manner to solve a common problem. Grid computing is a low-cost approach to parallel processing. FEEDBACK: a. Grid computing is the use of a collection of computers, often owned by multiple individuals or organizations, that work in a coordinated manner to solve a common problem. b. Grid computing is the use of a collection of computers, often owned by multiple individuals or organizations, that work in a coordinated manner to solve a common problem. c. Grid computing is the use of a collection of computers, often owned by multiple individuals or organizations, that work in a coordinated manner to solve a common problem. d. Grid computing is the use of a collection of computers, often owned by multiple individuals or organizations, that work in a coordinated manner to solve a common problem.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Processor QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.2 - Explain the difference between multiprocessing, parallel processing, and grid computing. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/30/2020 1:02 PM 47. _____ is an approach concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IS-related products. a. Green computing b. Grid computing c. Cloud computing d. Utility computing ANSWER: a RATIONALE: Green computing is concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IT-related products, including all types of computing devices (from smartphones to supercomputers), printers, printer materials such as cartridges and toner, and storage devices. FEEDBACK: a. Green computing is concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IT-related products, including all types of computing devices, printers, printer materials such as cartridges and toner, and storage devices. b. Green computing is concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IT-related products, including all types of computing devices, printers, printer materials such as cartridges and toner, and storage devices.

Copyright Cengage Learning. Powered by Cognero.

Page 27


Chapter 04 - Hardware and Software c. Green computing is concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IT-related products, including all types of computing devices, printers, printer materials such as cartridges and toner, and storage devices. d. Green computing is concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IT-related products, including all types of computing devices, printers, printer materials such as cartridges and toner, and storage devices.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Green Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.6 - State the three primary goals of the “green computing” program. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/30/2020 1:05 PM 48. The component of a computer that provides the CPU with a working storage area for program instructions and data is called the __________. a. main memory b. input/output device c. bus d. processor ANSWER: a RATIONALE: Main memory provides the CPU with a working storage area for program instructions and data. The chief function of memory is to rapidly provide data and instructions to the CPU. FEEDBACK: a. Main memory provides the CPU with a working storage area for program instructions and data. b. Main memory provides the CPU with a working storage area for program instructions and data. c. Main memory provides the CPU with a working storage area for program instructions and data. d. Main memory provides the CPU with a working storage area for program instructions and data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Main Memory QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/30/2020 1:08 PM 49. Carson's supervisor has asked him to review a variety of portable computers for possible purchase for their company's Copyright Cengage Learning. Powered by Cognero.

Page 28


Chapter 04 - Hardware and Software employees. Which of the following should Carson NOT consider buying? a. laptops b. notebooks c. nettops d. tablets ANSWER: c RATIONALE: General-purpose computer systems can be divided into three primary classes: portable computers used by one user at a time, nonportable computers used by one person at a time, and systems used by multiple concurrent users. Single-user portable computers include smartphones, laptops, notebooks, and tablets. Single-user nonportable computers include thin clients, desktops, nettops, and workstations. FEEDBACK: a. Single-user portable computers include smartphones, laptops, notebooks, and tablets. b. Single-user portable computers include smartphones, laptops, notebooks, and tablets. c. Single-user portable computers include smartphones, laptops, notebooks, and tablets. d. Single-user portable computers include smartphones, laptops, notebooks, and tablets.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Computer System Classes QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.3 - Describe how each of the three primary classes of computers is used within an organization. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/30/2020 1:13 PM 50. _____, a storage technology available since the 1950s, is often used to back up critical organizational data in the event of a disaster. a. Magnetic disk b. Compact disc c. Magnetic tape d. Cache memory ANSWER: c RATIONALE: Magnetic storage uses tape or disk devices covered with a thin magnetic coating that enables data to be stored as magnetic particles. Magnetic tape is a type of secondary storage medium, which is frequently used for storing backups of critical organizational data in the event of a disaster. Magnetic tape has been used as storage media since the time of the earliest computers, such as the 1951 Univac computer. FEEDBACK: a. Magnetic tape is a type of secondary storage medium, which is frequently used for storing backups of critical organizational data in the event of a disaster. b. Magnetic tape is a type of secondary storage medium, which is frequently used for storing backups of critical organizational data in the event of a disaster. c. Magnetic tape is a type of secondary storage medium, which is frequently used for storing backups of critical organizational data in the event of a disaster. d. Magnetic tape is a type of secondary storage medium, which is frequently used for storing backups of critical organizational data in the event of a disaster.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 29


Chapter 04 - Hardware and Software DIFFICULTY: Easy REFERENCES: Secondary Storage QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/30/2020 1:18 PM 51. 3D printing is ________. a. an emerging technology with few practical uses b. used to make solid objects from filaments or powder c. used more in homes than in commercial settings d. an extremely high-resolution form of 2D printing ANSWER: b RATIONALE: 3D printers have created a major breakthrough in how many items will be “manufactured.” 3D printing technology takes a three-dimensional model of an object stored on a computer and sends it to a 3D printer to create the object using strands of a plastic filament or synthetic powder. 3D printing is commonly used by aerospace firms, auto manufacturers, and other design-intensive companies. It is especially valuable during the conceptual stage of engineering design when the exact dimensions and material strength of the prototype are not critical. FEEDBACK: a. 3D printing technology takes a three-dimensional model of an object stored on a computer and sends it to a 3D printer to create the object using strands of a plastic filament or synthetic powder. b. 3D printing technology takes a three-dimensional model of an object stored on a computer and sends it to a 3D printer to create the object using strands of a plastic filament or synthetic powder. c. 3D printing technology takes a three-dimensional model of an object stored on a computer and sends it to a 3D printer to create the object using strands of a plastic filament or synthetic powder. d. 3D printing technology takes a three-dimensional model of an object stored on a computer and sends it to a 3D printer to create the object using strands of a plastic filament or synthetic powder.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Output Devices QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/30/2020 1:25 PM Copyright Cengage Learning. Powered by Cognero.

Page 30


Chapter 04 - Hardware and Software 52. A(n) _____ device provides data and instructions to the computer and receives results from it. a. back-side b. expansion c. internal d. input/output ANSWER: d RATIONALE: Input and output devices are the gateways to the computer system—you use them to provide data and instructions to the computer and receive results from it. Input and output devices are part of a computer’s user interface, which includes other hardware devices and software that allow you to interact with a computer system. FEEDBACK: a. Input and output devices are the gateways to the computer system—you use them to provide data and instructions to the computer and receive results from it. b. Input and output devices are the gateways to the computer system—you use them to provide data and instructions to the computer and receive results from it. c. Input and output devices are the gateways to the computer system—you use them to provide data and instructions to the computer and receive results from it. d. Input and output devices are the gateways to the computer system—you use them to provide data and instructions to the computer and receive results from it.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Input/Output Devices QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/30/2020 1:28 PM 53. _____ are used to grade standardized tests, including the SAT and GMAT tests, and to record votes in elections. a. Magnetic ink character recognition (MICR) devices b. Optical mark recognition (OMR) systems c. Speech recognition devices d. Optical character recognition (OCR) systems ANSWER: b RATIONALE: The two categories of optical data readers are optical mark recognition (OMR) and optical character recognition (OCR). OMR readers are used for tasks such as grading tests and scanning forms. OMR systems are used in standardized tests, including the SAT and GMAT tests, and to record votes in elections. FEEDBACK: a. OMR systems are used in standardized tests, including the SAT and GMAT tests, and to record votes in elections.

b. OMR systems are used in standardized tests, including the SAT and GMAT tests, and to record votes in elections. c. OMR systems are used in standardized tests, including the SAT and GMAT tests, and to record votes in elections. d. OMR systems are used in standardized tests, including the SAT and GMAT tests, and to record votes in elections.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 31


Chapter 04 - Hardware and Software REFERENCES: Input/Output Devices QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/30/2020 1:32 PM 54. Helen is 72 years old and is a retired school teacher on a fixed income. She would like to buy a new computer so that she can communicate via email, follow friends and family on social media, and occasionally access recipes and gardening tips from the Web. An important thing to consider is that Helen has arthritis in her hands, making it difficult for her to work with small buttons and gadgets. So, of the following options, her best choice is probably a(n) ________. a. smartphone b. e-book c. desktop d. nettop ANSWER: d RATIONALE: Nettop computers are a very small, inexpensive desktop computer typically used for Internet access, email, accessing Web-based applications, document processing, and audio/video playback. A key feature of nettop computers is that they require perhaps one-tenth the amount of power to operate as a typical desktop computer. Smartphones have small user interfaces with small touchscreen "buttons," and desktops are considerably more expensive than nettops. FEEDBACK: a. Nettop computers are a very small, inexpensive desktop computer typically used for Internet access, email, accessing Web-based applications, document processing, and audio/video playback. b. Nettop computers are a very small, inexpensive desktop computer typically used for Internet access, email, accessing Web-based applications, document processing, and audio/video playback. c. Nettop computers are a very small, inexpensive desktop computer typically used for Internet access, email, accessing Web-based applications, document processing, and audio/video playback. d. Nettop computers are a very small, inexpensive desktop computer typically used for Internet access, email, accessing Web-based applications, document processing, and audio/video playback.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Nonportable, Single-User Computers QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.4 - Identify the three or four subclasses associated with each primary class of computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/30/2020 1:37 PM 55. A _____ is a computer employed by many users to perform a specific task, such as running network or Internet Copyright Cengage Learning. Powered by Cognero.

Page 32


Chapter 04 - Hardware and Software applications. a. slim client c. server ANSWER: RATIONALE: FEEDBACK:

b. nettop d. mainframe c A server is a computer employed by many users to perform a specific task, such as running network or Internet applications. a. A server is a computer employed by many users to perform a specific task, such as running network or Internet applications. b. A server is a computer employed by many users to perform a specific task, such as running network or Internet applications. c. A server is a computer employed by many users to perform a specific task, such as running network or Internet applications. d. A server is a computer employed by many users to perform a specific task, such as running network or Internet applications.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Servers, Mainframes, and Supercomputers QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.4 - Identify the three or four subclasses associated with each primary class of computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/30/2020 1:41 PM 56. When choosing from various types of flat-panel displays, choose a(n) _______ for the lowest power consumption. a. liquid crystal display (LCD) b. light-emitting diode (LED) display c. plasma display d. organic light-emitting diode (OLED) display ANSWER: d RATIONALE: An organic light-emitting diode (OLED) display does not employ a backlight, which enables improved contrast and lower power consumption than LCD and LED displays. FEEDBACK: a. An organic light-emitting diode (OLED) display does not employ a backlight, which enables improved contrast and lower power consumption than LCD and LED displays. b. An organic light-emitting diode (OLED) display does not employ a backlight, which enables improved contrast and lower power consumption than LCD and LED displays. c. An organic light-emitting diode (OLED) display does not employ a backlight, which enables improved contrast and lower power consumption than LCD and LED displays. d. An organic light-emitting diode (OLED) display does not employ a backlight, which enables improved contrast and lower power consumption than LCD and LED displays.

POINTS: DIFFICULTY: REFERENCES:

1 Moderate Output Devices

Copyright Cengage Learning. Powered by Cognero.

Page 33


Chapter 04 - Hardware and Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/30/2020 1:46 PM 57. _____ are used to support engineering and technical users who perform heavy mathematical computing, computerassisted design (CAD), video editing, and other applications requiring a high-end processor. a. Desktops b. Nettops c. Workstations d. Notebooks ANSWER: c RATIONALE: Workstations are more powerful than personal computers but still small enough to fit on a desktop. They are used to support engineering and technical users who perform heavy mathematical computing, computer-assisted design (CAD), video editing, and other applications requiring a high-end processor. FEEDBACK: a. Workstations are used to support engineering and technical users who perform heavy mathematical computing, computer-assisted design (CAD), video editing, and other applications requiring a high-end processor. b. Workstations are used to support engineering and technical users who perform heavy mathematical computing, computer-assisted design (CAD), video editing, and other applications requiring a high-end processor. c. Workstations are used to support engineering and technical users who perform heavy mathematical computing, computer-assisted design (CAD), video editing, and other applications requiring a high-end processor. d. Workstations are used to support engineering and technical users who perform heavy mathematical computing, computer-assisted design (CAD), video editing, and other applications requiring a high-end processor.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Nonportable, Single-User Computers QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.4 - Identify the three or four subclasses associated with each primary class of computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/30/2020 1:49 PM 58. A _____ is a low-cost, centrally managed computer with limited capabilities and no internal or external attached drives for data storage. a. nettop computer b. cloud computer c. thin client d. workstation ANSWER: c Copyright Cengage Learning. Powered by Cognero.

Page 34


Chapter 04 - Hardware and Software RATIONALE:

A thin client is a low-cost, centrally managed computer with no internal or external attached drives for data storage. These computers have limited capabilities and perform only essential applications, so they remain “thin” in terms of the client applications they include.

FEEDBACK:

a. A thin client is a low-cost, centrally managed computer with no internal or external attached drives for data storage. These computers have limited capabilities and perform only essential applications, so they remain “thin” in terms of the client applications they include. b. A thin client is a low-cost, centrally managed computer with no internal or external attached drives for data storage. These computers have limited capabilities and perform only essential applications, so they remain “thin” in terms of the client applications they include. c. A thin client is a low-cost, centrally managed computer with no internal or external attached drives for data storage. These computers have limited capabilities and perform only essential applications, so they remain “thin” in terms of the client applications they include. d. A thin client is a low-cost, centrally managed computer with no internal or external attached drives for data storage. These computers have limited capabilities and perform only essential applications, so they remain “thin” in terms of the client applications they include.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Nonportable, Single-User Computers QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.4 - Identify the three or four subclasses associated with each primary class of computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/30/2020 1:52 PM 59. _____ are the most powerful computers with the fastest processing speed and highest performance. a. Blade servers b. Workstations c. Mainframe computers d. Supercomputers ANSWER: d RATIONALE: Supercomputers are the most powerful computers with the fastest processing speed and highest performance. They are special-purpose machines designed for applications that require extensive and rapid computational capabilities. FEEDBACK: a. Supercomputers are the most powerful computers with the fastest processing speed and highest performance. b. Supercomputers are the most powerful computers with the fastest processing speed and highest performance. c. Supercomputers are the most powerful computers with the fastest processing speed and highest performance. d. Supercomputers are the most powerful computers with the fastest processing speed and highest performance.

POINTS: DIFFICULTY: REFERENCES:

1 Easy Servers, Mainframes, and Supercomputers

Copyright Cengage Learning. Powered by Cognero.

Page 35


Chapter 04 - Hardware and Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.4 - Identify the three or four subclasses associated with each primary class of computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/30/2020 1:53 PM 60. CPU clock speed is the predetermined rate at which the processor _____. a. processes instructions b. produces a series of electronic pulses c. produces a number of files d. loads memory pages ANSWER: b RATIONALE: Each processor produces a series of electronic pulses at a predetermined rate, called the clock speed, which governs the speed at which these steps are completed. FEEDBACK: a. Each processor produces a series of electronic pulses at a predetermined rate, called the clock speed, which governs the speed at which these steps are completed. b. Each processor produces a series of electronic pulses at a predetermined rate, called the clock speed, which governs the speed at which these steps are completed. c. Each processor produces a series of electronic pulses at a predetermined rate, called the clock speed, which governs the speed at which these steps are completed. d. Each processor produces a series of electronic pulses at a predetermined rate, called the clock speed, which governs the speed at which these steps are completed.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Processor QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/30/2020 1:59 PM 61. An information system that operates in the _____ sphere of influence supports teamwork between two or more people who work together to achieve a common goal, regardless of where those team members live. a. personal b. workgroup c. enterprise d. social ANSWER: b RATIONALE: Workgroup application software is designed to support teamwork, whether team members are in the same location or dispersed around the world. Examples of workgroup software include group-scheduling software, electronic mail, instant messaging, project management, and Copyright Cengage Learning. Powered by Cognero.

Page 36


Chapter 04 - Hardware and Software other software that enables people to share ideas. FEEDBACK:

a. Workgroup application software is designed to support teamwork, whether team members are in the same location or dispersed around the world. b. Workgroup application software is designed to support teamwork, whether team members are in the same location or dispersed around the world. c. Workgroup application software is designed to support teamwork, whether team members are in the same location or dispersed around the world. d. Workgroup application software is designed to support teamwork, whether team members are in the same location or dispersed around the world.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Workgroup Application Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.13 - Give an example of how application software is used in the personal, workgroup, and enterprise sphere of influence. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/30/2020 2:08 PM 62. An operating system with _____ capabilities allows a user to run more than one program concurrently. a. networking b. hardware independence c. memory management d. multitasking ANSWER: d RATIONALE: Operating systems use five approaches to task management to increase the amount of processing that can be accomplished in a given amount of time. One is multitasking, which enables more than one program to run concurrently. FEEDBACK: a. Operating systems use five approaches to task management to increase the amount of processing that can be accomplished in a given amount of time. One is multitasking, which enables more than one program to run concurrently. b. Operating systems use five approaches to task management to increase the amount of processing that can be accomplished in a given amount of time. One is multitasking, which enables more than one program to run concurrently. c. Operating systems use five approaches to task management to increase the amount of processing that can be accomplished in a given amount of time. One is multitasking, which enables more than one program to run concurrently. d. Operating systems use five approaches to task management to increase the amount of processing that can be accomplished in a given amount of time. One is multitasking, which enables more than one program to run concurrently.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Operating Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.8 - Describe the role of the operating system. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal Copyright Cengage Learning. Powered by Cognero.

Page 37


Chapter 04 - Hardware and Software KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom’s: Remember 11/19/2019 5:52 PM 1/30/2020 2:11 PM

63. The _____ is the heart of the operating system and controls its most critical processes. a. user interface b. register c. kernel d. cache ANSWER: c RATIONALE: The kernel, as its name suggests, is the heart of the OS and controls its most critical processes. The kernel ties all OS components together and regulates other programs. FEEDBACK: a. The kernel, as its name suggests, is the heart of the OS and controls its most critical processes. The kernel ties all OS components together and regulates other programs. b. The kernel, as its name suggests, is the heart of the OS and controls its most critical processes. The kernel ties all OS components together and regulates other programs. c. The kernel, as its name suggests, is the heart of the OS and controls its most critical processes. The kernel ties all OS components together and regulates other programs. d. The kernel, as its name suggests, is the heart of the OS and controls its most critical processes. The kernel ties all OS components together and regulates other programs.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Operating Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.8 - Describe the role of the operating system. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/30/2020 2:13 PM 64. _____ is an open-source operating system whose source code is freely available to everyone. a. Linux b. Mac OS X c. Chrome d. UNIX ANSWER: a RATIONALE: Linux is an OS developed in 1991 by Linus Torvalds as a student in Finland. The OS is distributed under the GNU General Public License, and its source code is freely available to everyone. It is, therefore, called an open-source operating system. FEEDBACK: a. Linux is distributed under the GNU General Public License, and its source code is freely available to everyone. It is, therefore, called an open-source operating system. b. Linux is distributed under the GNU General Public License, and its source code is freely available to everyone. It is, therefore, called an open-source operating system. c. Linux is distributed under the GNU General Public License, and its source code is freely available to everyone. It is, therefore, called an open-source operating

Copyright Cengage Learning. Powered by Cognero.

Page 38


Chapter 04 - Hardware and Software system.

d. Linux is distributed under the GNU General Public License, and its source code is freely available to everyone. It is, therefore, called an open-source operating system.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Current Operating Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.8 - Describe the role of the operating system. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/30/2020 2:16 PM 65. Which of the following statements is NOT true about a mainframe computer? a. A single computer with a single user is typical of a mainframe computer. b. A mainframe computer provides the computing and storage capacity to meet massive data processing requirements. c. A mainframe computer can support dozens or even hundreds of concurrent users. d. A key feature of mainframe computers is their backward compatibility. ANSWER: a RATIONALE: A mainframe computer is a large, powerful computer shared by dozens or even hundreds of concurrent users connected to the machine over a network. Mainframe computers provide the data-processing power and data storage capacity that enables banks and brokerage firms to deliver new mobile services, credit card companies to detect identity theft, and government agencies to better serve citizens. A key feature of mainframe computers is backward compatibility or the ability of current mainframes to run software created decades ago. FEEDBACK: a. A mainframe computer is a large, powerful computer shared by dozens or even hundreds of concurrent users connected to the machine over a network. b. A mainframe computer is a large, powerful computer shared by dozens or even hundreds of concurrent users connected to the machine over a network. c. A mainframe computer is a large, powerful computer shared by dozens or even hundreds of concurrent users connected to the machine over a network. d. A mainframe computer is a large, powerful computer shared by dozens or even hundreds of concurrent users connected to the machine over a network.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Servers, Mainframes, and Supercomputers QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.4 - Identify the three or four subclasses associated with each primary class of computer. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM Copyright Cengage Learning. Powered by Cognero.

Page 39


Chapter 04 - Hardware and Software DATE MODIFIED:

1/30/2020 2:31 PM

66. New cars come with onboard computer systems that control antilock brakes, air bag deployment, fuel injection, etc. They run operating system software known as ____. a. a multi-user operating system b. an embedded operating system c. an enterprise operating system d. mobile application software ANSWER: b RATIONALE: An embedded system is a computer system that is implanted in and dedicated to the control of another device often within a larger mechanical or electrical system. The typical car contains many embedded systems, including those that control antilock brakes, air bag deployment, fuel injection, active suspension devices, transmission control, and cruise control. An embedded operating system is designed to run in computers with a limited amount of memory and it must be highly reliable. FEEDBACK: a. An embedded system is a computer system that is implanted in and dedicated to the control of another device often within a larger mechanical or electrical system. An embedded operating system is designed to run in computers with a limited amount of memory and it must be highly reliable. b. An embedded system is a computer system that is implanted in and dedicated to the control of another device often within a larger mechanical or electrical system. An embedded operating system is designed to run in computers with a limited amount of memory and it must be highly reliable. c. An embedded system is a computer system that is implanted in and dedicated to the control of another device often within a larger mechanical or electrical system. An embedded operating system is designed to run in computers with a limited amount of memory and it must be highly reliable. d. An embedded system is a computer system that is implanted in and dedicated to the control of another device often within a larger mechanical or electrical system. An embedded operating system is designed to run in computers with a limited amount of memory and it must be highly reliable.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Current Operating Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.8 - Describe the role of the operating system. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/30/2020 2:38 PM 67. Suppose you wish to run two different operating systems on one server. You can accomplish this by using _______. a. a multiprocessor operating system b. an embedded system c. the system utilities d. virtualization software ANSWER: d RATIONALE: Server virtualization is an approach to improving hardware utilization by logically dividing the resources of a single physical server to create multiple logical servers called virtual machines. Each virtual machine includes its own guest operating system to manage the user interface and control how the virtual machine uses the host server’s hardware. Thus, several different operating systems can run on a virtualized server. Copyright Cengage Learning. Powered by Cognero.

Page 40


Chapter 04 - Hardware and Software FEEDBACK:

a. Several different operating systems can run on a virtualized server. b. Several different operating systems can run on a virtualized server. c. Several different operating systems can run on a virtualized server. d. Several different operating systems can run on a virtualized server.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Current Operating Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.9 - State three cost savings benefits associated with server virtualization. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/30/2020 2:44 PM 68. One of the disadvantages of proprietary software is that ______________. a. it is hard to control the output even if one is involved in the development of the software b. it can take a long time and significant resources to develop the required software features c. it does not allow the modifications to features needed to counteract a competitor's initiative d. it is difficult to achieve what is required in terms of features and reports ANSWER: b RATIONALE: Disadvantages of proprietary software include: • •

FEEDBACK:

It can take a long time and a significant amount of resources to develop required features. In-house system development staff may be hard-pressed to provide the required level of ongoing support and maintenance because of pressure to move on to other new projects. The features and performance of software that has yet to be developed presents more potential risk.

a. One disadvantage of proprietary software is that it can take a long time and a significant amount of resources to develop required features. b. One disadvantage of proprietary software is that it can take a long time and a significant amount of resources to develop required features. c. One disadvantage of proprietary software is that it can take a long time and a significant amount of resources to develop required features. d. One disadvantage of proprietary software is that it can take a long time and a significant amount of resources to develop required features.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Overview of Application Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.11 - Identify three advantages of off-the-shelf versus proprietary software. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal Copyright Cengage Learning. Powered by Cognero.

Page 41


Chapter 04 - Hardware and Software KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Understand 11/19/2019 5:52 PM 1/30/2020 3:39 PM

69. One of the advantages of off-the-shelf software is that ________________. a. an organization does not have to pay for features that are not required and never used b. the software always matches current work processes and data standards c. the initial cost is lower because the software firm can spread the development costs over many customers d. the software contains important features, thus eliminating the need for future modification and customization ANSWER: c RATIONALE: The advantages of off-the-shelf software include: • •

FEEDBACK:

The initial cost is lower because the software firm can spread the development costs across many customers. The software is likely to meet the basic business needs. Users have the opportunity to more fully analyze existing features and the performance of the package before purchasing. The package is likely to be of high quality because many customer firms have tested the software and helped identify its bugs.

a. One advantage of off-the-shelf software is that the initial cost is lower because the software firm can spread the development costs across many customers. b. One advantage of off-the-shelf software is that the initial cost is lower because the software firm can spread the development costs across many customers. c. One advantage of off-the-shelf software is that the initial cost is lower because the software firm can spread the development costs across many customers. d. One advantage of off-the-shelf software is that the initial cost is lower because the software firm can spread the development costs across many customers.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Overview of Application Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.11 - Identify three advantages of off-the-shelf versus proprietary software. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/30/2020 3:45 PM 70. _____, IBM’s first 64-bit enterprise operating system, is capable of handling very heavy workloads. a. Mac OS X b. Unix c. Chrome d. z/OS ANSWER: d RATIONALE: The z/OS is IBM’s first 64-bit enterprise OS and is capable of handling very heavy workloads, including serving thousands of concurrent users and running an organization’s critical applications. (The z stands for zero downtime.) FEEDBACK: a. The z/OS is IBM’s first 64-bit enterprise OS and is capable of handling very heavy Copyright Cengage Learning. Powered by Cognero.

Page 42


Chapter 04 - Hardware and Software workloads, including serving thousands of concurrent users and running an organization’s critical applications. b. The z/OS is IBM’s first 64-bit enterprise OS and is capable of handling very heavy workloads, including serving thousands of concurrent users and running an organization’s critical applications. c. The z/OS is IBM’s first 64-bit enterprise OS and is capable of handling very heavy workloads, including serving thousands of concurrent users and running an organization’s critical applications. d. The z/OS is IBM’s first 64-bit enterprise OS and is capable of handling very heavy workloads, including serving thousands of concurrent users and running an organization’s critical applications.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Current Operating Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.8 - Describe the role of the operating system. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/30/2020 3:49 PM 71. The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called _____. a. cloud computing b. rapid application development c. service-oriented architecture d. software as a service ANSWER: c RATIONALE: The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called SOA. Service-oriented architecture (SOA) is a software design approach based on the use of discrete pieces of software (modules) to provide specific functions (such as displaying a customer’s bill statement) as services to other applications. FEEDBACK: a. The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called service-oriented architecture (SOA). b. The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called service-oriented architecture (SOA). c. The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called service-oriented architecture (SOA). d. The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called service-oriented architecture (SOA).

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Current Operating Systems Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 43


Chapter 04 - Hardware and Software HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.10 - Describe how the service-oriented architecture approach is used to build software and microservices. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/30/2020 3:56 PM 72. One advantage of proprietary software versus off-the-shelf software is that _____. a. the initial cost of the software is lower b. the software is likely to meet basic business needs that are common across organizations c. the software is likely to be high quality because many customer firms have tested the software and helped identify its bugs d. the software provides a company with a competitive advantage by solving problems in a unique manner ANSWER: d RATIONALE: The advantages of proprietary software include: • • •

FEEDBACK:

You can get exactly what you need in terms of features, reports, and so on. Being involved in the development offers more control over the results. You can more easily modify the software and add features. This can help you to counteract an initiative by competitors or to meet new supplier or customer demands.

a. One advantages of proprietary software is that you can more easily modify the software and add features. This can help you to counteract an initiative by competitors or to meet new supplier or customer demands. b. One advantages of proprietary software is that you can more easily modify the software and add features. This can help you to counteract an initiative by competitors or to meet new supplier or customer demands. c. One advantages of proprietary software is that you can more easily modify the software and add features. This can help you to counteract an initiative by competitors or to meet new supplier or customer demands. d. One advantages of proprietary software is that you can more easily modify the software and add features. This can help you to counteract an initiative by competitors or to meet new supplier or customer demands.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Overview of Application Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.11 - Identify three advantages of off-the-shelf versus proprietary software. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/30/2020 4:04 PM 73. When a business wishes to move away from hosting its own applications, a solution that offers many advantages is to use ______. a. proprietary software b. virtualization Copyright Cengage Learning. Powered by Cognero.

Page 44


Chapter 04 - Hardware and Software c. software as a service d. muti-boot options ANSWER: c RATIONALE: Software as a service (SaaS) is a software distribution model under which a third-party provider hosts applications and makes them available to subscribers over the Internet. There are several advantages associated with the SaaS model. FEEDBACK: a. Software as a service (SaaS) is a software distribution model under which a thirdparty provider hosts applications and makes them available to subscribers over the Internet. There are several advantages associated with the SaaS model. b. Software as a service (SaaS) is a software distribution model under which a thirdparty provider hosts applications and makes them available to subscribers over the Internet. There are several advantages associated with the SaaS model. c. Software as a service (SaaS) is a software distribution model under which a thirdparty provider hosts applications and makes them available to subscribers over the Internet. There are several advantages associated with the SaaS model. d. Software as a service (SaaS) is a software distribution model under which a thirdparty provider hosts applications and makes them available to subscribers over the Internet. There are several advantages associated with the SaaS model.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Software as a Service (SaaS) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.12 - State four key advantages of the software-as-a-service model. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/30/2020 4:11 PM 74. _____ application software includes a wide range of built-in functions for statistical, financial, logical, database, graphics, and date and time calculations. a. Word processing b. Desktop publishing (DTP) c. Spreadsheet d. Graphics ANSWER: c RATIONALE: Hundreds of thousands of personal software applications are available to meet the needs of individuals at school, home, and work—with new applications released daily. Spreadsheet personal application software can perform statistical, financial, logical, database, graphics, and date and time calculations using a wide range of built-in functions. FEEDBACK: a. Spreadsheet personal application software can perform statistical, financial, logical, database, graphics, and date and time calculations using a wide range of built-in functions. b. Spreadsheet personal application software can perform statistical, financial, logical, database, graphics, and date and time calculations using a wide range of built-in functions. c. Spreadsheet personal application software can perform statistical, financial, logical, database, graphics, and date and time calculations using a wide range of built-in functions. d. Spreadsheet personal application software can perform statistical, financial, logical, database, graphics, and date and time calculations using a wide range of built-in functions.

Copyright Cengage Learning. Powered by Cognero.

Page 45


Chapter 04 - Hardware and Software POINTS: 1 DIFFICULTY: Easy REFERENCES: Personal Application Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.13 - Give an example of how application software is used in the personal, workgroup, and enterprise sphere of influence. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/30/2020 4:15 PM 75. _____ is an example of a popular general-purpose software suite for personal computer users. a. Google Chrome b. Snow Leopard c. Mozilla Firefox d. Microsoft Office ANSWER: d RATIONALE: A software suite is a collection of programs packaged together and sold in a bundle. A software suite might include a word processor, a spreadsheet program, a database management system, a graphics program, communications and note-taking tools, and organizers. The most popular general-purpose software suites for personal computer users include Microsoft Office, Corel WordPerfect Office, Apache OpenOffice, Apple iWork, and G Suite. FEEDBACK: a. The most popular general-purpose software suites for personal computer users include Microsoft Office, Corel WordPerfect Office, Apache OpenOffice, Apple iWork, and G Suite. b. The most popular general-purpose software suites for personal computer users include Microsoft Office, Corel WordPerfect Office, Apache OpenOffice, Apple iWork, and G Suite. c. The most popular general-purpose software suites for personal computer users include Microsoft Office, Corel WordPerfect Office, Apache OpenOffice, Apple iWork, and G Suite. d. The most popular general-purpose software suites for personal computer users include Microsoft Office, Corel WordPerfect Office, Apache OpenOffice, Apple iWork, and G Suite.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Software Suites and Integrated Software Packages QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.13 - Give an example of how application software is used in the personal, workgroup, and enterprise sphere of influence. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/30/2020 4:20 PM 76. Currently, though many different programming languages are used, most software is developed using _____. Copyright Cengage Learning. Powered by Cognero.

Page 46


Chapter 04 - Hardware and Software a. a compiler c. a debugger ANSWER: RATIONALE:

FEEDBACK:

b. an integrated development environment d. personal application software b Most software today is created using an integrated development environment. An integrated development environment (IDE) combines all the tools required for software engineering into one package. For example, the popular IDE Microsoft Visual Studio includes an editor that supports several visual programming interfaces and languages (visual programming uses a graphical or “visual” interface combined with text-based commands), a compiler and an interpreter, programming automation tools, a debugger (a tool for finding errors in the code), and other tools that provide convenience to the developer. a. Most software today is created using an integrated development environment. An integrated development environment (IDE) combines all the tools required for software engineering into one package. b. Most software today is created using an integrated development environment. An integrated development environment (IDE) combines all the tools required for software engineering into one package. c. Most software today is created using an integrated development environment. An integrated development environment (IDE) combines all the tools required for software engineering into one package. d. Most software today is created using an integrated development environment. An integrated development environment (IDE) combines all the tools required for software engineering into one package.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Programming Languages QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.14 - Identify five tasks for which programming languages are commonly used. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/30/2020 4:28 PM 77. All of the following are examples of someone using personal productivity software EXCEPT _________. a. Shawna creating an electronic to-do list for the weekend b. Mark entering appointments into his online calendar c. Callie entering a customer's order into a restaurant's ordering system d. Brandon recording the number of miles he ran today in his exercise tracker ANSWER: c RATIONALE: In addition to these general-purpose programs, thousands of other personal computer applications perform specialized tasks that help users prepare their taxes, get in shape, lose weight, get medical advice, write wills and other legal documents, repair their computers, fix their cars, write music, and edit pictures and videos. This type of software, often called user software or personal productivity software, includes the general-purpose tools and programs that support individual needs. FEEDBACK: a. In addition to these general-purpose programs, thousands of other personal computer applications perform specialized tasks that help users prepare their taxes, get in shape, lose weight, get medical advice, write wills and other legal

Copyright Cengage Learning. Powered by Cognero.

Page 47


Chapter 04 - Hardware and Software documents, repair their computers, fix their cars, write music, and edit pictures and videos. This type of software, often called user software or personal productivity software, includes the general-purpose tools and programs that support individual needs. b. In addition to these general-purpose programs, thousands of other personal computer applications perform specialized tasks that help users prepare their taxes, get in shape, lose weight, get medical advice, write wills and other legal documents, repair their computers, fix their cars, write music, and edit pictures and videos. This type of software, often called user software or personal productivity software, includes the general-purpose tools and programs that support individual needs. c. In addition to these general-purpose programs, thousands of other personal computer applications perform specialized tasks that help users prepare their taxes, get in shape, lose weight, get medical advice, write wills and other legal documents, repair their computers, fix their cars, write music, and edit pictures and videos. This type of software, often called user software or personal productivity software, includes the general-purpose tools and programs that support individual needs. d. In addition to these general-purpose programs, thousands of other personal computer applications perform specialized tasks that help users prepare their taxes, get in shape, lose weight, get medical advice, write wills and other legal documents, repair their computers, fix their cars, write music, and edit pictures and videos. This type of software, often called user software or personal productivity software, includes the general-purpose tools and programs that support individual needs.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Personal Application Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.13 - Give an example of how application software is used in the personal, workgroup, and enterprise sphere of influence. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/30/2020 4:50 PM 78. All of the following are examples of activities performed by an operating system EXCEPT ________. a. managing system memory b. controlling common computer hardware functions c. managing files d. providing word processing capabilities to users ANSWER: d RATIONALE: The programs that make up the OS perform a variety of activities, including the following: • • • •

Control common computer hardware functions such as accepting input from the keyboard, retrieving data from a storage device, and displaying data on the screen. Provide a user interface and manage input/output operations. Provide a degree of hardware independence so that a software program can run on multiple computers, without concern for the specific underlying hardware. Manage memory is accessed, maximizing the use of available memory and storage to

Copyright Cengage Learning. Powered by Cognero.

Page 48


Chapter 04 - Hardware and Software • • •

FEEDBACK:

provide optimum efficiency. Manage processing tasks Provide networking capabilities so that computers can join together in a network to send and receive data and share computing resources Control access to system resources to provide a high level of security against unauthorized access to the users’ data and programs as well as record who is using the system and for how long. Manage files to ensure that files are available when needed and that they are protected from access by unauthorized users.

a. The programs that make up the OS perform a variety of activities, including the

following: control common computer hardware functions such as accepting input from the keyboard, retrieving data from a storage device, and displaying data on the screen; manage memory access, maximizing the use of available memory and storage to provide optimum efficiency; and manage files to ensure that files are available when needed and that they are protected from access by unauthorized users. b. The programs that make up the OS perform a variety of activities, including the following: control common computer hardware functions such as accepting input from the keyboard, retrieving data from a storage device, and displaying data on the screen; manage memory access, maximizing the use of available memory and storage to provide optimum efficiency; and manage files to ensure that files are available when needed and that they are protected from access by unauthorized users. c. The programs that make up the OS perform a variety of activities, including the following: control common computer hardware functions such as accepting input from the keyboard, retrieving data from a storage device, and displaying data on the screen; manage memory access, maximizing the use of available memory and storage to provide optimum efficiency; and manage files to ensure that files are available when needed and that they are protected from access by unauthorized users. d. The programs that make up the OS perform a variety of activities, including the following: control common computer hardware functions such as accepting input from the keyboard, retrieving data from a storage device, and displaying data on the screen; manage memory access, maximizing the use of available memory and storage to provide optimum efficiency; and manage files to ensure that files are available when needed and that they are protected from access by unauthorized users.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Operating Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.8 - Describe the role of the operating system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/30/2020 4:54 PM 79. Which of the following is NOT one of the common purposes of utility programs? a. file compression b. tracking computer jobs being run c. merging and sorting data d. creating spreadsheets Copyright Cengage Learning. Powered by Cognero.

Page 49


Chapter 04 - Hardware and Software ANSWER: RATIONALE:

d Utility programs perform a variety of tasks typically related to system maintenance or problem correction. For example, there are utility programs designed to merge and sort sets of data, keep track of computer jobs being run, compress data files before they are stored or transmitted over a network (thus saving space and time), and perform other important tasks.

FEEDBACK:

a. There are utility programs designed to merge and sort sets of data, keep track of computer jobs being run, compress data files before they are stored or transmitted over a network (thus saving space and time), and perform other important tasks. b. There are utility programs designed to merge and sort sets of data, keep track of computer jobs being run, compress data files before they are stored or transmitted over a network (thus saving space and time), and perform other important tasks. c. There are utility programs designed to merge and sort sets of data, keep track of computer jobs being run, compress data files before they are stored or transmitted over a network (thus saving space and time), and perform other important tasks. d. There are utility programs designed to merge and sort sets of data, keep track of computer jobs being run, compress data files before they are stored or transmitted over a network (thus saving space and time), and perform other important tasks.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Current Operating Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.7 - List the two basic kinds of software and their associated subclasses. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/30/2020 4:59 PM 80. The class of computer systems used by multiple concurrent users offers businesses the potential to increase their processing capability to handle more users, more data, or more transactions in a given period, which is known as _____. a. backward compatibility b. scalability c. quantum computing d. portability ANSWER: b RATIONALE: Servers, mainframes, and supercomputers are designed to support workgroups from a small department of two or three workers to large organizations with tens of thousands of employees and millions of customers. Servers offer great scalability, the ability to increase the processing capability of a computer system so that it can handle more users, more data, or more transactions in a given period. FEEDBACK: a. Servers, a type of multiuser computers, offer great scalability, the ability to increase the processing capability of a computer system so that it can handle more users, more data, or more transactions in a given period. b. Servers, a type of multiuser computers, offer great scalability, the ability to increase the processing capability of a computer system so that it can handle

Copyright Cengage Learning. Powered by Cognero.

Page 50


Chapter 04 - Hardware and Software more users, more data, or more transactions in a given period.

c. Servers, a type of multiuser computers, offer great scalability, the ability to

increase the processing capability of a computer system so that it can handle more users, more data, or more transactions in a given period. d. Servers, a type of multiuser computers, offer great scalability, the ability to increase the processing capability of a computer system so that it can handle more users, more data, or more transactions in a given period.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Servers, Mainframes, and Supercomputers QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.3 - Describe how each of the three primary classes of computers is used within an organization. KEYWORDS: Bloom's: Remember DATE CREATED: 1/30/2020 5:07 PM DATE MODIFIED: 1/30/2020 5:14 PM 81. The simultaneous execution of two or more instructions at once by a computer is known as _____. a. parallel processing b. grid computing c. multiprocessing d. massive computing ANSWER: c RATIONALE: Multiprocessing involves the simultaneous execution of two or more instructions at the same time. FEEDBACK: a. Multiprocessing involves the simultaneous execution of two or more instructions at the same time. b. Multiprocessing involves the simultaneous execution of two or more instructions at the same time. c. Multiprocessing involves the simultaneous execution of two or more instructions at the same time. d. Multiprocessing involves the simultaneous execution of two or more instructions at the same time.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Processor QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.2 - Explain the difference between multiprocessing, parallel processing, and grid computing. KEYWORDS: Bloom's: Remember DATE CREATED: 1/30/2020 5:18 PM DATE MODIFIED: 1/30/2020 5:24 PM 82. A firm that models, simulates, and analyzes large amounts of data quickly by using computers to execute the same task on multiple processors simultaneously is employing _____. Copyright Cengage Learning. Powered by Cognero.

Page 51


Chapter 04 - Hardware and Software a. parallel processing b. grid computing c. multiprocessing d. multithreading ANSWER: RATIONALE:

FEEDBACK:

a Parallel processing is the simultaneous execution of the same task on multiple processors to obtain results more quickly. The most frequent uses for parallel processing include modeling, simulation, and analyzing large amounts of data. a. Parallel processing is the simultaneous execution of the same task on multiple

processors to obtain results more quickly. The most frequent uses for parallel processing include modeling, simulation, and analyzing large amounts of data. b. Parallel processing is the simultaneous execution of the same task on multiple processors to obtain results more quickly. The most frequent uses for parallel processing include modeling, simulation, and analyzing large amounts of data. c. Parallel processing is the simultaneous execution of the same task on multiple processors to obtain results more quickly. The most frequent uses for parallel processing include modeling, simulation, and analyzing large amounts of data. d. Parallel processing is the simultaneous execution of the same task on multiple processors to obtain results more quickly. The most frequent uses for parallel processing include modeling, simulation, and analyzing large amounts of data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Processor QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.2 - Explain the difference between multiprocessing, parallel processing, and grid computing. KEYWORDS: Bloom's: Understand DATE CREATED: 1/30/2020 5:26 PM DATE MODIFIED: 1/30/2020 5:31 PM 83. Marley's computer has a math chip to perform mathematical calculations and a graphics chip to manipulate graphics while the CPU is busy with other activities.What processing approach is she using? a. grid computing with a central server b. a massively parallel processing system c. parallel processing using coprocessors d. multiprocessing using coprocessors ANSWER: d RATIONALE: Multiprocessing involves the simultaneous execution of two or more instructions at the same time. One form of multiprocessing uses coprocessors. A coprocessor speeds processing by executing specific types of instructions while the CPU works on another processing activity. Coprocessors can be internal or external to the CPU and can have different clock speeds than the CPU. Each type of coprocessor performs a specific function. For example, a math coprocessor chip speeds mathematical calculations, while a graphics coprocessor chip decreases the time it takes to manipulate graphics. FEEDBACK: a. One form of multiprocessing uses coprocessors. Each type of coprocessor performs a specific function, such as mathematical calculations or manipulating graphics.

Copyright Cengage Learning. Powered by Cognero.

Page 52


Chapter 04 - Hardware and Software b. One form of multiprocessing uses coprocessors. Each type of coprocessor

performs a specific function, such as mathematical calculations or manipulating graphics. c. One form of multiprocessing uses coprocessors. Each type of coprocessor performs a specific function, such as mathematical calculations or manipulating graphics. d. One form of multiprocessing uses coprocessors. Each type of coprocessor performs a specific function, such as mathematical calculations or manipulating graphics.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Processor QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.2 - Explain the difference between multiprocessing, parallel processing, and grid computing. KEYWORDS: Bloom's: Understand DATE CREATED: 1/30/2020 5:36 PM DATE MODIFIED: 1/30/2020 5:43 PM 84. Which class of general-purpose computer systems is the least expensive option that meets a wide range of personal computing needs, from data entry to computer-aided design or engineering, and from accessing Internet applications to software development? a. embedded computers b. single-user portable computers c. single-user nonportable computers d. multiple-user computers ANSWER: c RATIONALE: Single-user nonportable computers meet a wide range of personal computing needs from simply entering data and accessing applications via the Internet to running productivity software to performing computer intensive engineering, computer-aided design, and software development functions. Single-user portable computers are underpowered for some of these uses, while multiple-user computers are more expensive. FEEDBACK: a. Single-user nonportable computers meet a wide range of personal computing needs from simply entering data and accessing applications via the Internet to running productivity software to performing computer intensive engineering, computer-aided design, and software development functions. b. Single-user nonportable computers meet a wide range of personal computing needs from simply entering data and accessing applications via the Internet to running productivity software to performing computer intensive engineering, computer-aided design, and software development functions. c. Single-user nonportable computers meet a wide range of personal computing needs from simply entering data and accessing applications via the Internet to running productivity software to performing computer intensive engineering, computer-aided design, and software development functions. d. Single-user nonportable computers meet a wide range of personal computing needs from simply entering data and accessing applications via the Internet to running productivity software to performing computer intensive engineering, computer-aided design, and software development functions.

Copyright Cengage Learning. Powered by Cognero.

Page 53


Chapter 04 - Hardware and Software POINTS: 1 DIFFICULTY: Easy REFERENCES: Computer System Classes QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.3 - Describe how each of the three primary classes of computers is used within an organization. KEYWORDS: Bloom's: Remember DATE CREATED: 1/31/2020 2:09 PM DATE MODIFIED: 1/31/2020 2:16 PM 85. Adrian works for a company that relies on computers to run applications that perform intensive data calculations, to manage email, printing, and security for employees, and to provide massive data storage and retrieval capabilities. Which class of general-purpose computer systems can fulfill all of these business needs? a. embedded computers b. single-user portable computers c. single-user nonportable computers d. multiple-user computers ANSWER: d RATIONALE: Multiple-user computers meet the computing needs of an organization by supporting key functions such as email, printing, security, providing massive data storage and retrieval, and running applications that perform intensive data calculations. FEEDBACK: a. Multiple-user computers meet the computing needs of an organization by supporting key functions such as email, printing, security, providing massive data storage and retrieval, and running applications that perform intensive data calculations. b. Multiple-user computers meet the computing needs of an organization by supporting key functions such as email, printing, security, providing massive data storage and retrieval, and running applications that perform intensive data calculations. c. Multiple-user computers meet the computing needs of an organization by supporting key functions such as email, printing, security, providing massive data storage and retrieval, and running applications that perform intensive data calculations. d. Multiple-user computers meet the computing needs of an organization by supporting key functions such as email, printing, security, providing massive data storage and retrieval, and running applications that perform intensive data calculations.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Computer System Classes QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.3 - Describe how each of the three primary classes of computers is used within an organization. KEYWORDS: Bloom's: Remember DATE CREATED: 1/31/2020 2:18 PM DATE MODIFIED: 1/31/2020 2:30 PM Copyright Cengage Learning. Powered by Cognero.

Page 54


Chapter 04 - Hardware and Software 86. Traditional data centers require huge amounts of energy because _____. a. they constantly run powerful air-conditioning systems b. they employ large numbers of people to maintain the equipment c. their typical power usage effectiveness (PUE) is 1.0 d. they must be heated and humidified to protect the equipment ANSWER: a RATIONALE: Traditional data centers consist of warehouse-size buildings filled with row upon row of server racks and powerful air-conditioning systems designed to remove dust and humidity from the air and offset the heat generated by the processors. Such data centers can use as much energy as a small city and run up a power bill of millions of dollars per year. About half the energy usage of a traditional data center goes to operate its computers. The other half goes to cooling the computers, removing dust and humidity from the air, and lighting the facility, along with other systems that sustain the data center. Such a data center has a power usage effectiveness (PUE) of 2.0. (PUE = total power consumed/power required to run the computers). FEEDBACK: a. Traditional data centers consist of warehouse-size buildings filled with row upon row of server racks and powerful air-conditioning systems designed to remove dust and humidity from the air and offset the heat generated by the processors. About half the energy usage of a traditional data center goes to cooling the computers, removing dust and humidity from the air, and lighting the facility, along with other systems that sustain the data center. b. Traditional data centers consist of warehouse-size buildings filled with row upon row of server racks and powerful air-conditioning systems designed to remove dust and humidity from the air and offset the heat generated by the processors. About half the energy usage of a traditional data center goes to cooling the computers, removing dust and humidity from the air, and lighting the facility, along with other systems that sustain the data center. c. Traditional data centers consist of warehouse-size buildings filled with row upon row of server racks and powerful air-conditioning systems designed to remove dust and humidity from the air and offset the heat generated by the processors. About half the energy usage of a traditional data center goes to cooling the computers, removing dust and humidity from the air, and lighting the facility, along with other systems that sustain the data center. d. Traditional data centers consist of warehouse-size buildings filled with row upon row of server racks and powerful air-conditioning systems designed to remove dust and humidity from the air and offset the heat generated by the processors. About half the energy usage of a traditional data center goes to cooling the computers, removing dust and humidity from the air, and lighting the facility, along with other systems that sustain the data center.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Center QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.5 - Identify three primary features that distinguish tier 1, 2, 3, and 4 data centers. KEYWORDS: Bloom's: Remember DATE CREATED: 1/31/2020 2:32 PM DATE MODIFIED: 1/31/2020 2:46 PM Copyright Cengage Learning. Powered by Cognero.

Page 55


Chapter 04 - Hardware and Software 87. What criteria are used by the Uptime Institute to classify data centers into four tiers? a. quality of fire protection systems, physical security systems, and HVAC system b. expected annual downtime, fault tolerance, and power outage protection c. local climate, risk of natural disasters, and power usage effectiveness d. number of customers, reliability of power source, and quality of equipment ANSWER: b RATIONALE: The Uptime Institute is a U.S. advisory group that has defined four tiers of data center classification to enable organizations to quantify and qualify their ability to provide a predictable level of performance based on expected annual downtime, fault tolerance, and power outage protection. FEEDBACK: a. The Uptime Institute is a U.S. advisory group that has defined four tiers of data center classification to enable organizations to quantify and qualify their ability to provide a predictable level of performance based on expected annual downtime, fault tolerance, and power outage protection. b. The Uptime Institute is a U.S. advisory group that has defined four tiers of data center classification to enable organizations to quantify and qualify their ability to provide a predictable level of performance based on expected annual downtime, fault tolerance, and power outage protection. c. The Uptime Institute is a U.S. advisory group that has defined four tiers of data center classification to enable organizations to quantify and qualify their ability to provide a predictable level of performance based on expected annual downtime, fault tolerance, and power outage protection. d. The Uptime Institute is a U.S. advisory group that has defined four tiers of data center classification to enable organizations to quantify and qualify their ability to provide a predictable level of performance based on expected annual downtime, fault tolerance, and power outage protection.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Center QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.5 - Identify three primary features that distinguish tier 1, 2, 3, and 4 data centers. KEYWORDS: Bloom's: Remember DATE CREATED: 1/31/2020 4:18 PM DATE MODIFIED: 1/31/2020 4:26 PM 88. A tier 1 or 2 data center would be most appropriate for an organization with which characteristic? a. very large with many employees b. capable of conducting critical operations manually c. reliant on computer assistance to process orders d. vulnerable to business disruptions lasting a few hours ANSWER: b RATIONALE: Tiers 1 and 2 data centers may be appropriate for small organizations where a business disruption of several hours to a few days would not have a serious business impact and critical activities could be managed manually without computer assistance. Tiers 3 and 4 are needed by large organizations where a business disruption of a few hours would have serious financial consequences due to the inability to process customer orders, plan product shipments, manage manufacturing operations, and perform other critical activities. Copyright Cengage Learning. Powered by Cognero.

Page 56


Chapter 04 - Hardware and Software FEEDBACK:

a. Tiers 1 and 2 data centers may be appropriate for small organizations where a business disruption of several hours to a few days would not have a serious business impact and critical activities could be managed manually without computer assistance. b. Tiers 1 and 2 data centers may be appropriate for small organizations where a business disruption of several hours to a few days would not have a serious business impact and critical activities could be managed manually without computer assistance. c. Tiers 1 and 2 data centers may be appropriate for small organizations where a business disruption of several hours to a few days would not have a serious business impact and critical activities could be managed manually without computer assistance. d. Tiers 1 and 2 data centers may be appropriate for small organizations where a business disruption of several hours to a few days would not have a serious business impact and critical activities could be managed manually without computer assistance.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Center QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.5 - Identify three primary features that distinguish tier 1, 2, 3, and 4 data centers. KEYWORDS: Bloom's: Remember DATE CREATED: 1/31/2020 4:26 PM DATE MODIFIED: 1/31/2020 4:35 PM 89. A tier 3 or 4 data center would be most necessary for an organization with which characteristic? a. small with few employees b. prepared to process manual customer orders manually c. dependent on computers to manage manufacturing operations d. impacted by long-term but not short-term business disruptions ANSWER: c RATIONALE: Tiers 1 and 2 data centers may be appropriate for small organizations where a business disruption of several hours to a few days would not have a serious business impact and critical activities could be managed manually without computer assistance. Tiers 3 and 4 are needed by large organizations where a business disruption of a few hours would have serious financial consequences due to the inability to process customer orders, plan product shipments, manage manufacturing operations, and perform other critical activities. FEEDBACK: a. Tiers 3 and 4 are needed by large organizations where a business disruption of a few hours would have serious financial consequences due to the inability to process customer orders, plan product shipments, manage manufacturing operations, and perform other critical activities. b. Tiers 3 and 4 are needed by large organizations where a business disruption of a few hours would have serious financial consequences due to the inability to process customer orders, plan product shipments, manage manufacturing operations, and perform other critical activities. c. Tiers 3 and 4 are needed by large organizations where a business disruption of a few hours would have serious financial consequences due to the inability to process customer orders, plan product shipments, manage manufacturing operations, and perform other critical activities.

Copyright Cengage Learning. Powered by Cognero.

Page 57


Chapter 04 - Hardware and Software d. Tiers 3 and 4 are needed by large organizations where a business disruption of a few hours would have serious financial consequences due to the inability to process customer orders, plan product shipments, manage manufacturing operations, and perform other critical activities.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Center QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.5 - Identify three primary features that distinguish tier 1, 2, 3, and 4 data centers. KEYWORDS: Bloom's: Remember DATE CREATED: 1/31/2020 4:36 PM DATE MODIFIED: 1/31/2020 4:44 PM 90. Which type of of data center offers the highest and most predictable level of performance through redundant hardware, power-related devices, and alternate power sources? a. tier 1 b. tier 2 c. tier 3 d. tier 4 ANSWER: d RATIONALE: Tier 4 data centers offer the shortest expected annual downtime, greatest fault tolerance, and longest power outage protection duration. Tier 3 and 4 data centers employ redundant hardware, power-related devices, and alternate power sources. FEEDBACK: a. Tier 4 data centers offer the shortest expected annual downtime, greatest fault tolerance, and longest power outage protection duration. Tier 3 and 4 data centers employ redundant hardware, power-related devices, and alternate power sources. b. Tier 4 data centers offer the shortest expected annual downtime, greatest fault tolerance, and longest power outage protection duration. Tier 3 and 4 data centers employ redundant hardware, power-related devices, and alternate power sources. c. Tier 4 data centers offer the shortest expected annual downtime, greatest fault tolerance, and longest power outage protection duration. Tier 3 and 4 data centers employ redundant hardware, power-related devices, and alternate power sources. d. Tier 4 data centers offer the shortest expected annual downtime, greatest fault tolerance, and longest power outage protection duration. Tier 3 and 4 data centers employ redundant hardware, power-related devices, and alternate power sources.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Center QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.5 - Identify three primary features that distinguish tier 1, 2, 3, and 4 data centers. KEYWORDS: Bloom's: Remember DATE CREATED: 1/31/2020 4:45 PM Copyright Cengage Learning. Powered by Cognero.

Page 58


Chapter 04 - Hardware and Software DATE MODIFIED:

1/31/2020 4:50 PM

91. Because electronic devices are composed of materials such as beryllium, cadmium, lead, mercury, BFRs, selenium, and polyvinyl chloride, one of the three goals of green computing is to _____. a. reduce the use of hazardous material b. allow companies to lower their power-related costs c. prevent the disposal of computers and computer-related equipment d. improve corporate employee safety and public relations ANSWER: a RATIONALE: Electronic devices such as computers and smartphones contain hundreds—or even thousands—of components, which are, in turn, composed of many different materials, including some [such as beryllium, cadmium, lead, mercury, brominated flame retardants (BFRs), selenium, and polyvinyl chloride] that are known to be potentially harmful to humans and the environment. Green computing is concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IT-related products, including all types of computing devices (from smartphones to supercomputers), printers, printer materials such as cartridges and toner, and storage devices. Green computing has three goals: (1) reduce the use of hazardous material, (2) allow companies to lower their power-related costs, and (3) enable the safe disposal or recycling of computers and computerrelated equipment. FEEDBACK: a. Green computing has three goals: (1) reduce the use of hazardous material, (2) allow companies to lower their power-related costs, and (3) enable the safe disposal or recycling of computers and computer-related equipment. b. Green computing has three goals: (1) reduce the use of hazardous material, (2) allow companies to lower their power-related costs, and (3) enable the safe disposal or recycling of computers and computer-related equipment. c. Green computing has three goals: (1) reduce the use of hazardous material, (2) allow companies to lower their power-related costs, and (3) enable the safe disposal or recycling of computers and computer-related equipment. d. Green computing has three goals: (1) reduce the use of hazardous material, (2) allow companies to lower their power-related costs, and (3) enable the safe disposal or recycling of computers and computer-related equipment.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Green Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.6 - State the three primary goals of the “green computing” program. KEYWORDS: Bloom's: Remember DATE CREATED: 2/1/2020 8:08 AM DATE MODIFIED: 2/2/2020 4:44 PM 92. Which of the goals of green computing, if implemented successfully, would be the BEST practice for reducing the hazards posed by e-waste in the United States? a. reduce the use of hazardous material b. allow companies to lower their power-related costs c. dispose of or recycle computers and computer-related equipment d. improve corporate employee safety and public relations Copyright Cengage Learning. Powered by Cognero.

Page 59


Chapter 04 - Hardware and Software ANSWER: RATIONALE:

a The United States generates more e-waste (includes discarded cell phones, computers, copiers, DVD players, fax machines, monitors, printers, TVs, VCRs) than any other country in the world—9.4 million tons/year. Only about 12.5 percent of this is recycled. E-waste is the fastest growing municipal waste stream in the United States, according to the EPA. Because it is impossible for manufacturers to ensure safe recycling or disposal, the best practice would be for them to eliminate the use of toxic substances, particularly since recycling of used computers, monitors, and printers has raised concerns about toxicity and carcinogenicity of some of the substances. However, until manufacturers stop using these toxic substances, safe disposal and reclamation operations must be carried out carefully to avoid exposure in recycling operations and leaching of materials, such as heavy metals, from landfills and incinerator ashes.

FEEDBACK:

a. Because it is impossible for manufacturers to ensure safe recycling or disposal,

the best practice would be for them to eliminate the use of toxic substances, particularly since recycling of used computers, monitors, and printers has raised concerns about toxicity and carcinogenicity of some of the substances. b. Because it is impossible for manufacturers to ensure safe recycling or disposal, the best practice would be for them to eliminate the use of toxic substances, particularly since recycling of used computers, monitors, and printers has raised concerns about toxicity and carcinogenicity of some of the substances. c. Because it is impossible for manufacturers to ensure safe recycling or disposal, the best practice would be for them to eliminate the use of toxic substances, particularly since recycling of used computers, monitors, and printers has raised concerns about toxicity and carcinogenicity of some of the substances. d. Because it is impossible for manufacturers to ensure safe recycling or disposal, the best practice would be for them to eliminate the use of toxic substances, particularly since recycling of used computers, monitors, and printers has raised concerns about toxicity and carcinogenicity of some of the substances.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Green Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.6 - State the three primary goals of the “green computing” program. KEYWORDS: Bloom's: Remember DATE CREATED: 2/2/2020 4:46 PM DATE MODIFIED: 2/2/2020 4:55 PM 93. Which of the following strategies is the LEAST effective way to implement green computing? a. prevent leaching of materials such as heavy metals from landfills b. develop safe alternatives to the toxic components used in electronics c. facilitate reduced power use in the commercial sector d. export used electronics to companies in undeveloped countries ANSWER: d RATIONALE: Green computing has three goals: (1) reduce the use of hazardous material, (2) allow companies to lower their power-related costs, and (3) enable the safe disposal or recycling of computers and computer-related equipment. Because it is impossible for manufacturers to ensure safe recycling or disposal, the best practice would be for them to eliminate the use of toxic substances, particularly since recycling of used computers, monitors, and printers has Copyright Cengage Learning. Powered by Cognero.

Page 60


Chapter 04 - Hardware and Software raised concerns about toxicity and carcinogenicity of some of the substances. However, until manufacturers stop using these toxic substances, safe disposal and reclamation operations must be carried out carefully to avoid exposure in recycling operations and leaching of materials, such as heavy metals, from landfills and incinerator ashes. In many cases, recycling companies export large quantities of used electronics to companies in undeveloped countries. Unfortunately, many of these countries do not have strong environmental laws, and they sometimes fail to recognize the potential dangers of dealing with hazardous materials. FEEDBACK:

a. In many cases, recycling companies export large quantities of used electronics to companies in undeveloped countries. Unfortunately, many of these countries do not have strong environmental laws, and they sometimes fail to recognize the potential dangers of dealing with hazardous materials. b. In many cases, recycling companies export large quantities of used electronics to companies in undeveloped countries. Unfortunately, many of these countries do not have strong environmental laws, and they sometimes fail to recognize the potential dangers of dealing with hazardous materials. c. In many cases, recycling companies export large quantities of used electronics to companies in undeveloped countries. Unfortunately, many of these countries do not have strong environmental laws, and they sometimes fail to recognize the potential dangers of dealing with hazardous materials. d. In many cases, recycling companies export large quantities of used electronics to companies in undeveloped countries. Unfortunately, many of these countries do not have strong environmental laws, and they sometimes fail to recognize the potential dangers of dealing with hazardous materials.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Green Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.6 - State the three primary goals of the “green computing” program. KEYWORDS: Bloom's: Remember DATE CREATED: 2/2/2020 4:56 PM DATE MODIFIED: 2/2/2020 5:09 PM 94. Hardware utilization can be improved by logically dividing the resources of a single physical server to create multiple logical servers. This approach is known as _____. a. real-time task scheduling b. multithreading c. server virtualization d. multiprocessing ANSWER: c RATIONALE: Server virtualization is an approach to improving hardware utilization by logically dividing the resources of a single physical server to create multiple logical servers called virtual machines. Each virtual machine acts as its own dedicated machine. FEEDBACK: a. Server virtualization is an approach to improving hardware utilization by logically dividing the resources of a single physical server to create multiple logical servers called virtual machines. b. Server virtualization is an approach to improving hardware utilization by logically dividing the resources of a single physical server to create multiple logical servers called virtual machines.

Copyright Cengage Learning. Powered by Cognero.

Page 61


Chapter 04 - Hardware and Software c. Server virtualization is an approach to improving hardware utilization by logically

dividing the resources of a single physical server to create multiple logical servers called virtual machines. d. Server virtualization is an approach to improving hardware utilization by logically dividing the resources of a single physical server to create multiple logical servers called virtual machines.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Current Operating Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.9 - State three cost savings benefits associated with server virtualization. KEYWORDS: Bloom's: Remember DATE CREATED: 2/2/2020 5:15 PM DATE MODIFIED: 2/2/2020 5:18 PM 95. Operating virtual servers requires software to control the host processor and resources, allocate necessary resources to virtual machines, and prevent virtual machines from disrupting each other. What type of software performs these functions? a. operating system b. hypervisor c. utility program d. middleware ANSWER: b RATIONALE: The hypervisor is a virtual server program that controls the host processor and resources, allocates the necessary resources to each virtual machine, and ensures that they do not disrupt each other. VMware from Dell Technologies and Microsoft Hyper-V are the two dominant hypervisor vendors. FEEDBACK: a. The hypervisor is a virtual server program that controls the host processor and resources, allocates the necessary resources to each virtual machine, and ensures that they do not disrupt each other. b. The hypervisor is a virtual server program that controls the host processor and resources, allocates the necessary resources to each virtual machine, and ensures that they do not disrupt each other. c. The hypervisor is a virtual server program that controls the host processor and resources, allocates the necessary resources to each virtual machine, and ensures that they do not disrupt each other. d. The hypervisor is a virtual server program that controls the host processor and resources, allocates the necessary resources to each virtual machine, and ensures that they do not disrupt each other.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Current Operating Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.9 - State three cost savings benefits associated with server virtualization. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 62


Chapter 04 - Hardware and Software DATE CREATED: DATE MODIFIED:

2/2/2020 5:19 PM 2/2/2020 5:25 PM

96. Server virtualization offers significant cost savings because _____. a. it can be administered without specialized software b. it utilizes discrete pieces of software to perform specific functions c. it increases the number of physical servers in each data center d. it increases the total operating capacity of each physical server ANSWER: d RATIONALE: With server virtualization, the server can run several server applications concurrently and operate at much higher level of total capacity—perhaps 80 percent or more. As a result, a data center with say 400 physical servers could be converted to a virtualized environment with perhaps as few as 24 virtualized servers. There would be a huge savings in capital costs for hardware and because there are fewer servers, there would be additional ongoing savings in energy costs to power the servers and cool the data center. Also, fewer software licenses are required for fewer physical machines and fewer personnel are required to operate and maintain the servers. Thus, server virtualization provides three benefits: (1) lower capital costs for hardware, (2) savings in energy costs to operate and cool the data center, and (3) savings in software licenses and personnel costs. FEEDBACK: a. With server virtualization, the server can run several server applications concurrently and operate at much higher level of total capacity—perhaps 80 percent or more. As a result, a data center with say 400 physical servers could be converted to a virtualized environment with perhaps as few as 24 virtualized servers. b. With server virtualization, the server can run several server applications concurrently and operate at much higher level of total capacity—perhaps 80 percent or more. As a result, a data center with say 400 physical servers could be converted to a virtualized environment with perhaps as few as 24 virtualized servers. c. With server virtualization, the server can run several server applications concurrently and operate at much higher level of total capacity—perhaps 80 percent or more. As a result, a data center with say 400 physical servers could be converted to a virtualized environment with perhaps as few as 24 virtualized servers. d. With server virtualization, the server can run several server applications concurrently and operate at much higher level of total capacity—perhaps 80 percent or more. As a result, a data center with say 400 physical servers could be converted to a virtualized environment with perhaps as few as 24 virtualized servers.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Current Operating Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.9 - State three cost savings benefits associated with server virtualization. KEYWORDS: Bloom's: Remember DATE CREATED: 2/2/2020 5:26 PM DATE MODIFIED: 2/2/2020 5:37 PM 97. In the data center for Mack's company, one server is dedicated to each application. In contrast, the data center for Copyright Cengage Learning. Powered by Cognero.

Page 63


Chapter 04 - Hardware and Software Jack's company uses virtualized servers. Which statement would you expect to be true? a. Jack's company employs more people to operate their data center b. Jack's company pays for fewer software licenses c. Mack's company spends less of their data center budget on hardware d. Mack's company's data center has lower energy costs ANSWER: b RATIONALE: With server virtualization, the server can run several server applications concurrently and operate at much higher level of total capacity—perhaps 80 percent or more. As a result, a data center with say 400 physical servers could be converted to a virtualized environment with perhaps as few as 24 virtualized servers. There would be a huge savings in capital costs for hardware and because there are fewer servers, there would be additional ongoing savings in energy costs to power the servers and cool the data center. Also, fewer software licenses are required for fewer physical machines and fewer personnel are required to operate and maintain the servers. Thus, server virtualization provides three benefits: (1) lower capital costs for hardware, (2) savings in energy costs to operate and cool the data center, and (3) savings in software licenses and personnel costs. FEEDBACK: a. Server virtualization provides three benefits: (1) lower capital costs for hardware, (2) savings in energy costs to operate and cool the data center, and (3) savings in software licenses and personnel costs. b. Server virtualization provides three benefits: (1) lower capital costs for hardware, (2) savings in energy costs to operate and cool the data center, and (3) savings in software licenses and personnel costs. c. Server virtualization provides three benefits: (1) lower capital costs for hardware, (2) savings in energy costs to operate and cool the data center, and (3) savings in software licenses and personnel costs. d. Server virtualization provides three benefits: (1) lower capital costs for hardware, (2) savings in energy costs to operate and cool the data center, and (3) savings in software licenses and personnel costs.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Current Operating Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.9 - State three cost savings benefits associated with server virtualization. KEYWORDS: Bloom's: Remember DATE CREATED: 2/3/2020 1:22 PM DATE MODIFIED: 2/3/2020 1:32 PM 98. IS professionals at PKO Bank Polski S.A. use an approach where they logically divide the resources of a physical server to reduce hardware-related costs, cut unscheduled downtime for applications, and reduce the time spent on problem solving. What strategy do they use? a. API optimization b. service-oriented architecture c. server virtualization d. embedded systems ANSWER: c RATIONALE: Server virtualization is an approach to improving hardware utilization by logically dividing the resources of a single physical server to create multiple logical servers called virtual Copyright Cengage Learning. Powered by Cognero.

Page 64


Chapter 04 - Hardware and Software machines. PKO Bank Polski S.A. is the largest commercial bank in Poland providing service to over 9 million customers. The bank’s information systems must operate 24 hours/day and 7 days/week with a goal of less than 1 hour of unscheduled downtime per year. Server virtualization is now a standard for critical applications at the bank and this strategy has reduced hardware related costs, cut unscheduled downtime for applications, and reduced the time spent on problem solving. FEEDBACK:

a. Server virtualization is now a standard for critical applications at PKO Bank Polski S.A. and this strategy has reduced hardware related costs, cut unscheduled downtime for applications, and reduced the time spent on problem solving. b. Server virtualization is now a standard for critical applications at PKO Bank Polski S.A. and this strategy has reduced hardware related costs, cut unscheduled downtime for applications, and reduced the time spent on problem solving. c. Server virtualization is now a standard for critical applications at PKO Bank Polski S.A. and this strategy has reduced hardware related costs, cut unscheduled downtime for applications, and reduced the time spent on problem solving. d. Server virtualization is now a standard for critical applications at PKO Bank Polski S.A. and this strategy has reduced hardware related costs, cut unscheduled downtime for applications, and reduced the time spent on problem solving.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Current Operating Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.9 - State three cost savings benefits associated with server virtualization. KEYWORDS: Bloom's: Remember DATE CREATED: 2/3/2020 1:33 PM DATE MODIFIED: 2/3/2020 1:43 PM 99. Which software design approach includes discrete modules that are built in such a way that each service a module provides can exchange information with any other service without human interaction or the need to change the underlying program? a. service-oriented architecture b. server virtualization c. grid computing d. quantum computing ANSWER: a RATIONALE: Service-oriented architecture (SOA) is a software design approach based on the use of discrete pieces of software (modules) to provide specific functions (such as displaying a customer’s bill statement) as services to other applications. Each module is built in such a way that ensures that the service it provides can exchange information with any other service without human interaction and without the need to make changes to the underlying program itself. FEEDBACK: a. With service-oriented architecture (SOA), each module is built in such a way that ensures that the service it provides can exchange information with any other service without human interaction and without the need to make changes to the underlying program itself. b. With service-oriented architecture (SOA), each module is built in such a way that ensures that the service it provides can exchange information with any other service without human interaction and without the need to make changes to the

Copyright Cengage Learning. Powered by Cognero.

Page 65


Chapter 04 - Hardware and Software underlying program itself.

c. With service-oriented architecture (SOA), each module is built in such a way that ensures that the service it provides can exchange information with any other service without human interaction and without the need to make changes to the underlying program itself. d. With service-oriented architecture (SOA), each module is built in such a way that ensures that the service it provides can exchange information with any other service without human interaction and without the need to make changes to the underlying program itself.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Current Operating Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.10 - Describe how the service-oriented architecture approach is used to build software and microservices. KEYWORDS: Bloom's: Remember DATE CREATED: 2/3/2020 1:44 PM DATE MODIFIED: 2/3/2020 1:49 PM 100. Kennedy's company is adopting a service-oriented architecture approach to software development. This means that _____. a. their software will be flexible enough to allow the addition of new services b. their software will consist of many program modules that do not share information c. they have decided not to build or adopt microservices in the future d. they can build software without creating application programming interfaces ANSWER: a RATIONALE: Service-oriented architecture (SOA) is a software design approach based on the use of discrete pieces of software (modules) to provide specific functions (such as displaying a customer’s bill statement) as services to other applications. Each module is built in such a way that ensures that the service it provides can exchange information with any other service without human interaction and without the need to make changes to the underlying program itself. Systems developed with SOA are highly flexible, as they allow for the addition of new modules that provide new services required to meet the needs of the business as they evolve and change over time. FEEDBACK: a. Systems developed with SOA are highly flexible, as they allow for the addition of new modules that provide new services required to meet the needs of the business as they evolve and change over time. b. Systems developed with SOA are highly flexible, as they allow for the addition of new modules that provide new services required to meet the needs of the business as they evolve and change over time. c. Systems developed with SOA are highly flexible, as they allow for the addition of new modules that provide new services required to meet the needs of the business as they evolve and change over time. d. Systems developed with SOA are highly flexible, as they allow for the addition of new modules that provide new services required to meet the needs of the business as they evolve and change over time.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 66


Chapter 04 - Hardware and Software REFERENCES: Current Operating Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.10 - Describe how the service-oriented architecture approach is used to build software and microservices. KEYWORDS: Bloom's: Remember DATE CREATED: 2/3/2020 1:50 PM DATE MODIFIED: 2/3/2020 2:01 PM 101. What is a microservice? a. a small application that performs tasks related to system maintenance b. a one-of-a-kind application designed for an individual company or person c. a small, specialized application that performs a single well-defined function d. a large, complex, multifunctional application ANSWER: c RATIONALE: Many organizations have taken the SOA approach to the extreme and built complex applications using a series of smaller specialized applications called microservices. Each microservice performs a single well-defined function. Microservices communicate to one another using agreed upon interfaces called application programming interfaces (API). FEEDBACK: a. Many organizations have taken the SOA approach to the extreme and built complex applications using a series of smaller specialized applications called microservices. Each microservice performs a single well-defined function. b. Many organizations have taken the SOA approach to the extreme and built complex applications using a series of smaller specialized applications called microservices. Each microservice performs a single well-defined function. c. Many organizations have taken the SOA approach to the extreme and built complex applications using a series of smaller specialized applications called microservices. Each microservice performs a single well-defined function. d. Many organizations have taken the SOA approach to the extreme and built complex applications using a series of smaller specialized applications called microservices. Each microservice performs a single well-defined function.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Current Operating Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.10 - Describe how the service-oriented architecture approach is used to build software and microservices. KEYWORDS: Bloom's: Remember DATE CREATED: 2/3/2020 2:01 PM DATE MODIFIED: 2/3/2020 2:08 PM 102. Expedia, Inc. is a travel company that has developed an online payment function with huge number of features. This payment function has been subdivided into a series of much smaller and more logical-like sets of microservices. Expedia, Inc. _____. a. must adhere to a monthly deployment cycle owing to the limitations of microservices architecture b. can quickly add new microservices to provide new services for their payment function as needed Copyright Cengage Learning. Powered by Cognero.

Page 67


Chapter 04 - Hardware and Software c. could increase the flexibility of their payment function by shifting to a service-oriented architecture d. has reduced their need for hardware and lowered their energy costs by adopting this architecture ANSWER: b RATIONALE: Expedia, Inc., the U.S. travel company, employs a software development strategy based on microservices. Its Checkout online payment function that supports billions of dollars in transactions and has a huge number of features has been subdivided into a series of much smaller and more logical-like sets of microservices. The benefit of smaller, segmented applications is that Expedia can update these microservices quicker or quickly add new microservices providing new services. Currently Expedia follows a weekly deployment cycle but will eventually shorten this to daily software releases allowing developers to try out new ideas and add new features quickly. FEEDBACK: a. The benefit of smaller, segmented applications is that Expedia can update these microservices quicker or quickly add new microservices providing new services. b. The benefit of smaller, segmented applications is that Expedia can update these microservices quicker or quickly add new microservices providing new services. c. The benefit of smaller, segmented applications is that Expedia can update these microservices quicker or quickly add new microservices providing new services. d. The benefit of smaller, segmented applications is that Expedia can update these microservices quicker or quickly add new microservices providing new services.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Current Operating Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.10 - Describe how the service-oriented architecture approach is used to build software and microservices. KEYWORDS: Bloom's: Remember DATE CREATED: 2/3/2020 2:09 PM DATE MODIFIED: 2/3/2020 2:22 PM 103. As part of a team that develops software using the SOA approach, Josie is helping to write an API set. Why is this an important task? a. It is not important because the SOA approach does not require development of API. b. It can help manage security, enforce corporate strategies, and control mobile content streaming. c. It performs many specific, well-defined functions for users of the application. d. It allows microservices written by other team members to communicate with one another. ANSWER: d RATIONALE: Many organizations have taken the SOA approach to the extreme and built complex applications using a series of smaller specialized applications called microservices. Each microservice performs a single well-defined function. Microservices communicate to one another using agreed upon interfaces called application programming interfaces (API). This enables many microservices to be linked together in Lego fashion to create a large, complex, multifunctional application. A major advantage of the SOA approach is that a microservice built for one application may be reused in another application to perform the same function. Reapplication of proven microservices greatly reduces software development time and improves software quality. FEEDBACK: a. Many organizations have taken the SOA approach to the extreme and built complex applications using a series of smaller specialized applications called

Copyright Cengage Learning. Powered by Cognero.

Page 68


Chapter 04 - Hardware and Software microservices. Microservices communicate to one another using agreed upon interfaces called application programming interfaces (API). b. Many organizations have taken the SOA approach to the extreme and built complex applications using a series of smaller specialized applications called microservices. Microservices communicate to one another using agreed upon interfaces called application programming interfaces (API). c. Many organizations have taken the SOA approach to the extreme and built complex applications using a series of smaller specialized applications called microservices. Microservices communicate to one another using agreed upon interfaces called application programming interfaces (API). d. Many organizations have taken the SOA approach to the extreme and built complex applications using a series of smaller specialized applications called microservices. Microservices communicate to one another using agreed upon interfaces called application programming interfaces (API).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Current Operating Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.10 - Describe how the service-oriented architecture approach is used to build software and microservices. KEYWORDS: Bloom's: Remember DATE CREATED: 2/3/2020 2:23 PM DATE MODIFIED: 2/3/2020 2:47 PM 104. Monte's employer provides SaaS applications for its staff to use for their daily job functions. This means that ____. a. Monte is responsible for downloading and installing software patches b. Monte and his coworkers are all using free, open-source software c. Monte does not have a user name or password to remember or secure d. Monte can sign in to use these applications from any computer or device ANSWER: d RATIONALE: Software as a service (SaaS) is a software distribution model under which a third-party provider hosts applications and makes them available to subscribers over the Internet. In most cases, subscribers pay a monthly service charge or a per-use fee. There are several advantages associated with the SaaS model, as follows: •

SaaS applications are available from any computer or any device—anytime, anywhere. Users simply logon to the SaaS vendor’s Web site and enter a logon and password to access the software and their data. Since the SaaS provider manages all upgrades and new releases, there are no software patches for customers to download or install. This frees up time for members of the IS organization and ensures users always have access to the latest most up-to-date version of the software. The costs associated with upgrades and new releases are lower than the traditional software licensing model that usually forces the user to buy an upgrade package and install it. The SaaS provider manages service levels and availability, so there’s no need for subscribers to add hardware, software, or communications capacity as the number of users increases.

Copyright Cengage Learning. Powered by Cognero.

Page 69


Chapter 04 - Hardware and Software FEEDBACK:

a. SaaS applications are available from any computer or any device—anytime,

anywhere. Users simply logon to the SaaS vendor’s Web site and enter a logon and password to access the software and their data. b. SaaS applications are available from any computer or any device—anytime, anywhere. Users simply logon to the SaaS vendor’s Web site and enter a logon and password to access the software and their data. c. SaaS applications are available from any computer or any device—anytime, anywhere. Users simply logon to the SaaS vendor’s Web site and enter a logon and password to access the software and their data. d. SaaS applications are available from any computer or any device—anytime, anywhere. Users simply logon to the SaaS vendor’s Web site and enter a logon and password to access the software and their data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Software as a Service (SaaS) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.12 - State four key advantages of the software-as-a-service model. KEYWORDS: Bloom's: Remember DATE CREATED: 2/3/2020 3:37 PM DATE MODIFIED: 2/3/2020 3:56 PM 105. Compared with the traditional licensing model in which users purchase and install software, SaaS _____. a. can be accessed from fewer devices per license b. provides more reliable access in areas with no Internet service c. offers less expensive upgrades and new releases d. requires more maintenance on the part of customers ANSWER: c RATIONALE: Software as a service (SaaS) is a software distribution model under which a third-party provider hosts applications and makes them available to subscribers over the Internet. In most cases, subscribers pay a monthly service charge or a per-use fee. There are several advantages associated with the SaaS model, as follows: •

FEEDBACK:

SaaS applications are available from any computer or any device—anytime, anywhere. Users simply logon to the SaaS vendor’s Web site and enter a logon and password to access the software and their data. Since the SaaS provider manages all upgrades and new releases, there are no software patches for customers to download or install. This frees up time for members of the IS organization and ensures users always have access to the latest most up-to-date version of the software. The costs associated with upgrades and new releases are lower than the traditional software licensing model that usually forces the user to buy an upgrade package and install it. The SaaS provider manages service levels and availability, so there’s no need for subscribers to add hardware, software, or communications capacity as the number of users increases.

a. Under the SaaS model, the costs associated with upgrades and new releases are lower than the traditional software licensing model that usually forces the user to buy an upgrade package and install it.

Copyright Cengage Learning. Powered by Cognero.

Page 70


Chapter 04 - Hardware and Software b. Under the SaaS model, the costs associated with upgrades and new releases are lower than the traditional software licensing model that usually forces the user to buy an upgrade package and install it. c. Under the SaaS model, the costs associated with upgrades and new releases are lower than the traditional software licensing model that usually forces the user to buy an upgrade package and install it. d. Under the SaaS model, the costs associated with upgrades and new releases are lower than the traditional software licensing model that usually forces the user to buy an upgrade package and install it.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Software as a Service (SaaS) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.12 - State four key advantages of the software-as-a-service model. KEYWORDS: Bloom's: Remember DATE CREATED: 2/3/2020 3:47 PM DATE MODIFIED: 2/3/2020 3:56 PM 106. A SaaS provider such as Oracle or SAP manages service levels and availability. This is advantageous because _____. a. it allows SaaS customers to increase the number of users without expanding their communications capacity b. it increases the security of financial transactions handled through SaaS applications c. it typically makes SaaS customers with many users eligible for volume discounts d. it allows SaaS customers to control if and when upgrades and new releases are installed ANSWER: a RATIONALE: Software as a service (SaaS) is a software distribution model under which a third-party provider hosts applications and makes them available to subscribers over the Internet. In most cases, subscribers pay a monthly service charge or a per-use fee. There are several advantages associated with the SaaS model, as follows: •

FEEDBACK:

SaaS applications are available from any computer or any device—anytime, anywhere. Users simply logon to the SaaS vendor’s Web site and enter a logon and password to access the software and their data. Since the SaaS provider manages all upgrades and new releases, there are no software patches for customers to download or install. This frees up time for members of the IS organization and ensures users always have access to the latest most up-to-date version of the software. The costs associated with upgrades and new releases are lower than the traditional software licensing model that usually forces the user to buy an upgrade package and install it. The SaaS provider manages service levels and availability, so there’s no need for subscribers to add hardware, software, or communications capacity as the number of users increases.

a. The SaaS provider manages service levels and availability, so there’s no need for subscribers to add hardware, software, or communications capacity as the number of users increases. b. The SaaS provider manages service levels and availability, so there’s no need for subscribers to add hardware, software, or communications capacity as the number of users increases.

Copyright Cengage Learning. Powered by Cognero.

Page 71


Chapter 04 - Hardware and Software c. The SaaS provider manages service levels and availability, so there’s no need for subscribers to add hardware, software, or communications capacity as the number of users increases. d. The SaaS provider manages service levels and availability, so there’s no need for subscribers to add hardware, software, or communications capacity as the number of users increases.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Software as a Service (SaaS) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.12 - State four key advantages of the software-as-a-service model. KEYWORDS: Bloom's: Remember DATE CREATED: 2/3/2020 3:56 PM DATE MODIFIED: 2/3/2020 4:05 PM 107. The set of instructions that signal the CPU to perform circuit-switching operations is known as _____. a. program syntax b. program code c. a variable d. a compiler ANSWER: b RATIONALE: Program code is the set of instructions that signal the CPU to perform circuit-switching operations. In the simplest coding schemes, a line of code typically contains a single instruction such as, “Retrieve the data in memory address X.” FEEDBACK: a. Program code is the set of instructions that signal the CPU to perform circuitswitching operations. b. Program code is the set of instructions that signal the CPU to perform circuitswitching operations. c. Program code is the set of instructions that signal the CPU to perform circuitswitching operations. d. Program code is the set of instructions that signal the CPU to perform circuitswitching operations.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Programming Languages QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.14 - Identify five tasks for which programming languages are commonly used. KEYWORDS: Bloom's: Remember DATE CREATED: 2/3/2020 4:07 PM DATE MODIFIED: 2/3/2020 4:11 PM 108. Tim is a software developer who codes using a higher-level language utilizing a compiler. Which is true of Tim's programs? a. The compiler carries out the operations called for by the source code. Copyright Cengage Learning. Powered by Cognero.

Page 72


Chapter 04 - Hardware and Software b. The compiler translates the programs into a machine language. c. The CPU executes the code Tim writes directly. d. After the code is compiled, it is passed to an interpreter. ANSWER: b RATIONALE: With higher-level programming languages, each statement in the language translates into several instructions in machine language. A special software program called a compiler translates the programmer’s source code into the machine-language instructions, which consist of binary digits. A compiler creates a two-stage process for program execution. First, the compiler translates the program into a machine language; second, the CPU executes that program. FEEDBACK: a. With higher-level programming languages, each statement in the language translates into several instructions in machine language. A special software program called a compiler translates the programmer’s source code into the machine-language instructions, which consist of binary digits. b. With higher-level programming languages, each statement in the language translates into several instructions in machine language. A special software program called a compiler translates the programmer’s source code into the machine-language instructions, which consist of binary digits. c. With higher-level programming languages, each statement in the language translates into several instructions in machine language. A special software program called a compiler translates the programmer’s source code into the machine-language instructions, which consist of binary digits. d. With higher-level programming languages, each statement in the language translates into several instructions in machine language. A special software program called a compiler translates the programmer’s source code into the machine-language instructions, which consist of binary digits.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Programming Languages QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.14 - Identify five tasks for which programming languages are commonly used. KEYWORDS: Bloom's: Remember DATE CREATED: 2/3/2020 4:13 PM DATE MODIFIED: 2/3/2020 4:47 PM 109. The Assembly and C programming languages are used to build software that controls a computer's hardware, known as _____. a. web applications b. embedded system software c. application software d. system software ANSWER: d RATIONALE: Table 4.12 lists some of the most commonly used programming languages and identifies how they are used. Assembly and C are used to build system software. FEEDBACK: a. Assembly and C are used to build system software. b. Assembly and C are used to build system software. c. Assembly and C are used to build system software. Copyright Cengage Learning. Powered by Cognero.

Page 73


Chapter 04 - Hardware and Software d. Assembly and C are used to build system software. POINTS: 1 DIFFICULTY: Easy REFERENCES: Programming Languages QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.14 - Identify five tasks for which programming languages are commonly used. KEYWORDS: Bloom's: Remember DATE CREATED: 2/3/2020 4:48 PM DATE MODIFIED: 2/3/2020 4:55 PM 110. Which general-purpose programming language is used to develop applications for Google's Android smartphone? a. Java b. Perl c. Python d. C ANSWER: a RATIONALE: Software developers for Google’s Android smartphone platform use the Java programming language along with the Android Studio with built-in Android Developer Tools to streamline their Android app development. FEEDBACK: a. Software developers for Google’s Android smartphone platform use the Java programming language along with the Android Studio with built-in Android Developer Tools to streamline their Android app development. b. Software developers for Google’s Android smartphone platform use the Java programming language along with the Android Studio with built-in Android Developer Tools to streamline their Android app development. c. Software developers for Google’s Android smartphone platform use the Java programming language along with the Android Studio with built-in Android Developer Tools to streamline their Android app development. d. Software developers for Google’s Android smartphone platform use the Java programming language along with the Android Studio with built-in Android Developer Tools to streamline their Android app development.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Programming Languages QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.14 - Identify five tasks for which programming languages are commonly used. KEYWORDS: Bloom's: Remember DATE CREATED: 2/3/2020 4:55 PM DATE MODIFIED: 2/3/2020 5:02 PM 111. When Peter purchases software, _____. a. he owns it outright b. he can choose to not accept the EULA but still use it c. he is acquiring a license to use it on his computer Copyright Cengage Learning. Powered by Cognero.

Page 74


Chapter 04 - Hardware and Software d. he gains the legal right to share it with others ANSWER: c RATIONALE: When people purchase software, they do not own the software, but rather they are licensed to use the software on a computer. The End User License Agreement (EULA) is the legal agreement between the software manufacturer and the user of the software that stipulates the terms of usage. The EULA is displayed with the installation dialog and requires the user to “Accept” the terms of the EULA to complete installation. The EULA is written to protect the software manufacturer and generally disclaims all liabilities for loss of data and errors in calculation when the software is running. Software users are also prohibited from copying the software or giving it to others. FEEDBACK: a. When people purchase software, they do not own the software, but rather they are licensed to use the software on a computer. b. When people purchase software, they do not own the software, but rather they are licensed to use the software on a computer. c. When people purchase software, they do not own the software, but rather they are licensed to use the software on a computer. d. When people purchase software, they do not own the software, but rather they are licensed to use the software on a computer.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Software Licenses QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.15 - Identify the three primary types of end user license agreements. KEYWORDS: Bloom's: Remember DATE CREATED: 2/3/2020 5:04 PM DATE MODIFIED: 2/3/2020 5:11 PM 112. Which statement is true regarding the End User License Agreement for a software application? a. It is an informal rather than a legal agreement. b. It declares that the manufacture is liable for loss of data resulting from running the software. c. It may explicitly accommodate multiple users of the software. d. It is displayed in a dialog box after the software has been in use for seven days. ANSWER: c RATIONALE: When people purchase software, they do not own the software, but rather they are licensed to use the software on a computer. The End User License Agreement (EULA) is the legal agreement between the software manufacturer and the user of the software that stipulates the terms of usage. The EULA is displayed with the installation dialog and requires the user to “Accept” the terms of the EULA to complete installation. The EULA is written to protect the software manufacturer and generally disclaims all liabilities for loss of data and errors in calculation when the software is running. Software users are also prohibited from copying the software or giving it to others. Licenses that accommodate multiple users are usually provided at a discounted price. FEEDBACK: a. Licenses that accommodate multiple users are usually provided at a discounted price.

b. Licenses that accommodate multiple users are usually provided at a discounted price. c. Licenses that accommodate multiple users are usually provided at a discounted Copyright Cengage Learning. Powered by Cognero.

Page 75


Chapter 04 - Hardware and Software price.

d. Licenses that accommodate multiple users are usually provided at a discounted price.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Software Licenses QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.15 - Identify the three primary types of end user license agreements. KEYWORDS: Bloom's: Remember DATE CREATED: 2/3/2020 5:12 PM DATE MODIFIED: 2/3/2020 5:22 PM 113. Which type of end user license allows the program to be installed and used and one CPU that is not accessed by other users over a network? a. general public b. network/multiuser c. individual/multiuser d. single-user ANSWER: d RATIONALE: There are three primary types of end user licenses: •

FEEDBACK:

A single-user license allows the program to be installed and used on one CPU that is not accessed by other users over a network. The software can be used only on a single computer, and other users cannot access or run the software while connected to your computer. Individual/multiuser licenses are volume licenses that allow the licensee to install the software on a certain number of computers. The licensee must satisfy a minimum purchase requirement to receive a reduced price. When purchasing the licenses, the licensee usually receives one copy of the media and documentation, with the option of purchasing more. Network/multiuser licenses require that you have a single copy of the software residing on a file server. With per server licensing, a specified number of client access licenses (CALs) are associated with a particular server. The number of devices that can legally access that server simultaneously is limited to the number of CALs purchased for that particular server.

a. A single-user license allows the program to be installed and used on one CPU that is not accessed by other users over a network.

b. A single-user license allows the program to be installed and used on one CPU that is not accessed by other users over a network. c. A single-user license allows the program to be installed and used on one CPU that is not accessed by other users over a network. d. A single-user license allows the program to be installed and used on one CPU that is not accessed by other users over a network.

POINTS: DIFFICULTY: REFERENCES:

1 Easy Software Licenses

Copyright Cengage Learning. Powered by Cognero.

Page 76


Chapter 04 - Hardware and Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.15 - Identify the three primary types of end user license agreements. KEYWORDS: Bloom's: Remember DATE CREATED: 2/3/2020 5:22 PM DATE MODIFIED: 2/3/2020 5:30 PM 114. Which type of end user license requires that a single copy of the software reside on a file server? a. general public b. network/multiuser c. individual/multiuser d. single-user ANSWER: b RATIONALE: There are three primary types of end user licenses: •

FEEDBACK:

A single-user license allows the program to be installed and used on one CPU that is not accessed by other users over a network. The software can be used only on a single computer, and other users cannot access or run the software while connected to your computer. Individual/multiuser licenses are volume licenses that allow the licensee to install the software on a certain number of computers. The licensee must satisfy a minimum purchase requirement to receive a reduced price. When purchasing the licenses, the licensee usually receives one copy of the media and documentation, with the option of purchasing more. Network/multiuser licenses require that you have a single copy of the software residing on a file server. With per server licensing, a specified number of client access licenses (CALs) are associated with a particular server. The number of devices that can legally access that server simultaneously is limited to the number of CALs purchased for that particular server.

a. Network/multiuser licenses require that you have a single copy of the software residing on a file server. b. Network/multiuser licenses require that you have a single copy of the software residing on a file server. c. Network/multiuser licenses require that you have a single copy of the software residing on a file server. d. Network/multiuser licenses require that you have a single copy of the software residing on a file server.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Software Licenses QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.15 - Identify the three primary types of end user license agreements. KEYWORDS: Bloom's: Remember DATE CREATED: 2/3/2020 5:31 PM DATE MODIFIED: 2/3/2020 5:35 PM Copyright Cengage Learning. Powered by Cognero.

Page 77


Chapter 04 - Hardware and Software 115. Which type of end user license is considered a volume license because it allows the licensee to install the software on a certain number of computers? a. general public b. network/multiuser c. individual/multiuser d. single-user ANSWER: c RATIONALE: There are three primary types of end user licenses: •

FEEDBACK:

A single-user license allows the program to be installed and used on one CPU that is not accessed by other users over a network. The software can be used only on a single computer, and other users cannot access or run the software while connected to your computer. Individual/multiuser licenses are volume licenses that allow the licensee to install the software on a certain number of computers. The licensee must satisfy a minimum purchase requirement to receive a reduced price. When purchasing the licenses, the licensee usually receives one copy of the media and documentation, with the option of purchasing more. Network/multiuser licenses require that you have a single copy of the software residing on a file server. With per server licensing, a specified number of client access licenses (CALs) are associated with a particular server. The number of devices that can legally access that server simultaneously is limited to the number of CALs purchased for that particular server.

a. Individual/multiuser licenses are volume licenses that allow the licensee to install the software on a certain number of computers. b. Individual/multiuser licenses are volume licenses that allow the licensee to install the software on a certain number of computers. c. Individual/multiuser licenses are volume licenses that allow the licensee to install the software on a certain number of computers. d. Individual/multiuser licenses are volume licenses that allow the licensee to install the software on a certain number of computers.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Software Licenses QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.15 - Identify the three primary types of end user license agreements. KEYWORDS: Bloom's: Remember DATE CREATED: 2/3/2020 5:35 PM DATE MODIFIED: 2/3/2020 5:37 PM 116. Polly is putting in a request that new software be purchased for the members of her department, and has to specify the number of client access licenses required, which is equal to the number of devices that will access the new software at one time. Which type of end user license is being purchased? a. general public b. network/multiuser c. individual/multiuser Copyright Cengage Learning. Powered by Cognero.

Page 78


Chapter 04 - Hardware and Software d. single-user ANSWER: RATIONALE:

b There are three primary types of end user licenses: •

FEEDBACK:

A single-user license allows the program to be installed and used on one CPU that is not accessed by other users over a network. The software can be used only on a single computer, and other users cannot access or run the software while connected to your computer. Individual/multiuser licenses are volume licenses that allow the licensee to install the software on a certain number of computers. The licensee must satisfy a minimum purchase requirement to receive a reduced price. When purchasing the licenses, the licensee usually receives one copy of the media and documentation, with the option of purchasing more. Network/multiuser licenses require that you have a single copy of the software residing on a file server. With per server licensing, a specified number of client access licenses (CALs) are associated with a particular server. The number of devices that can legally access that server simultaneously is limited to the number of CALs purchased for that particular server.

a. With network/multiuser licensing, a specified number of client access licenses

(CALs) are associated with a particular server. The number of devices that can legally access that server simultaneously is limited to the number of CALs purchased for that particular server. b. With network/multiuser licensing, a specified number of client access licenses (CALs) are associated with a particular server. The number of devices that can legally access that server simultaneously is limited to the number of CALs purchased for that particular server. c. With network/multiuser licensing, a specified number of client access licenses (CALs) are associated with a particular server. The number of devices that can legally access that server simultaneously is limited to the number of CALs purchased for that particular server. d. With network/multiuser licensing, a specified number of client access licenses (CALs) are associated with a particular server. The number of devices that can legally access that server simultaneously is limited to the number of CALs purchased for that particular server.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Software Licenses QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.15 - Identify the three primary types of end user license agreements. KEYWORDS: Bloom's: Remember DATE CREATED: 2/3/2020 5:39 PM DATE MODIFIED: 2/3/2020 5:45 PM 117. What type of software is distributed, typically for free, with the source code also available so that it can be studied, changed, and improved by its users? a. open-source b. EULA c. proprietary Copyright Cengage Learning. Powered by Cognero.

Page 79


Chapter 04 - Hardware and Software d. SOA ANSWER: RATIONALE: FEEDBACK:

a Open-source software is software that is distributed, typically for free, with the source code also available so that it can be studied, changed, and improved by its users. a. Open-source software is software that is distributed, typically for free, with the

source code also available so that it can be studied, changed, and improved by its users. b. Open-source software is software that is distributed, typically for free, with the source code also available so that it can be studied, changed, and improved by its users. c. Open-source software is software that is distributed, typically for free, with the source code also available so that it can be studied, changed, and improved by its users. d. Open-source software is software that is distributed, typically for free, with the source code also available so that it can be studied, changed, and improved by its users.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Open-Source Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.16 - Compare open-source software to licensed software in terms of how each is used and supported. KEYWORDS: Bloom's: Remember DATE CREATED: 2/3/2020 5:50 PM DATE MODIFIED: 2/3/2020 5:55 PM 118. Much of the popular open-source software available is protected by the GNU General Public License. Which of the following is NOT permitted by this type of license? a. selling a modified version of the program b. redistributing copies of the program for free c. adapting the program to your needs d. releasing an improved version to the public ANSWER: a RATIONALE: Open-source software is not completely devoid of restrictions. Much of the popular free software in use today is protected by the GNU General Public License (GPL). The GPL grants you the right to do the following: • • • • FEEDBACK:

Run the program for any purpose Study how the program works and adapt it to your needs Redistribute copies so you can help others Improve the program and release improvements to the public

a. The GPL grants you the right to run the program for any purpose, study how the program works and adapt it to your needs, redistribute copies so you can help others, and improve the program and release improvements to the public. b. The GPL grants you the right to run the program for any purpose, study how the program works and adapt it to your needs, redistribute copies so you can help others, and improve the program and release improvements to the public.

Copyright Cengage Learning. Powered by Cognero.

Page 80


Chapter 04 - Hardware and Software c. The GPL grants you the right to run the program for any purpose, study how the program works and adapt it to your needs, redistribute copies so you can help others, and improve the program and release improvements to the public. d. The GPL grants you the right to run the program for any purpose, study how the program works and adapt it to your needs, redistribute copies so you can help others, and improve the program and release improvements to the public.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Open-Source Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.16 - Compare open-source software to licensed software in terms of how each is used and supported. KEYWORDS: Bloom's: Remember DATE CREATED: 2/4/2020 7:24 AM DATE MODIFIED: 2/4/2020 7:39 AM 119. Julian has chosen to use open-source software to help run his small business. He believes it is often more reliable and secure than commercial software because _____. a. commercial software is poorly supported after purchase b. more indirect costs are associated with commercial software use c. open-source software requires much less debugging d. open-source software bugs are detected and fixed more quickly ANSWER: d RATIONALE: Why would an organization run its business using software that’s free? Can something that’s given away over the Internet be stable, reliable, or sufficiently supported to place at the core of a company’s day-to-day operations? The answer is surprising—many believe that opensource software is often more reliable and secure than commercial software. How can this be? First, because a program’s source code is readily available, users can fix any problems they discover. A fix is often available within hours of a problem’s discovery. Second, because the source code for a program is accessible to thousands of people, the chances of a bug being discovered and fixed before it does any damage are much greater than with traditional software packages. FEEDBACK: a. Many believe that open-source software is often more reliable and secure than commercial software. First, because a program’s source code is readily available, users can fix any problems they discover. A fix is often available within hours of a problem’s discovery. Second, because the source code for a program is accessible to thousands of people, the chances of a bug being discovered and fixed before it does any damage are much greater than with traditional software packages. b. Many believe that open-source software is often more reliable and secure than commercial software. First, because a program’s source code is readily available, users can fix any problems they discover. A fix is often available within hours of a problem’s discovery. Second, because the source code for a program is accessible to thousands of people, the chances of a bug being discovered and fixed before it does any damage are much greater than with traditional software packages. c. Many believe that open-source software is often more reliable and secure than commercial software. First, because a program’s source code is readily available, users can fix any problems they discover. A fix is often available within hours of a

Copyright Cengage Learning. Powered by Cognero.

Page 81


Chapter 04 - Hardware and Software problem’s discovery. Second, because the source code for a program is accessible to thousands of people, the chances of a bug being discovered and fixed before it does any damage are much greater than with traditional software packages. d. Many believe that open-source software is often more reliable and secure than commercial software. First, because a program’s source code is readily available, users can fix any problems they discover. A fix is often available within hours of a problem’s discovery. Second, because the source code for a program is accessible to thousands of people, the chances of a bug being discovered and fixed before it does any damage are much greater than with traditional software packages.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Open-Source Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.16 - Compare open-source software to licensed software in terms of how each is used and supported. KEYWORDS: Bloom's: Remember DATE CREATED: 2/4/2020 7:30 AM DATE MODIFIED: 2/4/2020 7:49 AM 120. Compared with commercially licensed software, open-source software _____. a. provides no reliable options to fulfill common business software needs b. is available for similar purposes such as CPU operation and database management c. has been proven to be equally expensive to use for business purposes over time d. provides less freedom and adaptability for business users ANSWER: b RATIONALE: Popular open-source software is available for many software categories: web server, productivity, Web publishing, Web browsing, photo editing, personal accounting, operating system, database, and project management. Some claim that open-source systems contain many hidden costs, particularly in terms for user support and debugging. Licensed software comes with guarantees and support services, whereas open-source software does not. Still, many businesses appreciate the additional freedom that open-source software provides. FEEDBACK: a. Popular open-source software is available for many software categories: web server, productivity, Web publishing, Web browsing, photo editing, personal accounting, operating system, database, and project management. b. Popular open-source software is available for many software categories: web server, productivity, Web publishing, Web browsing, photo editing, personal accounting, operating system, database, and project management. c. Popular open-source software is available for many software categories: web server, productivity, Web publishing, Web browsing, photo editing, personal accounting, operating system, database, and project management. d. Popular open-source software is available for many software categories: web server, productivity, Web publishing, Web browsing, photo editing, personal accounting, operating system, database, and project management.

POINTS: DIFFICULTY: REFERENCES:

1 Easy Open-Source Software

Copyright Cengage Learning. Powered by Cognero.

Page 82


Chapter 04 - Hardware and Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.16 - Compare open-source software to licensed software in terms of how each is used and supported. KEYWORDS: Bloom's: Remember DATE CREATED: 2/4/2020 7:30 AM DATE MODIFIED: 2/4/2020 8:02 AM 121. What is typically the greatest barrier to acceptance of open-source software in large commercial organizations? a. superiority of traditionally licensed software b. distrust of the open-source developer community c. concerns about software support d. concerns about software costs ANSWER: c RATIONALE: Licensed software comes with guarantees and support services, whereas open-source software does not. Still, many businesses appreciate the additional freedom that open-source software provides. The question of software support is typically the biggest stumbling block to the acceptance of open-source software at the corporate level. Getting support for traditional software packages is easy—you call a company’s toll-free support number or access its Web site. But how do you get help if an open-source package doesn’t work as expected? FEEDBACK: a. The question of software support is typically the biggest stumbling block to the acceptance of open-source software at the corporate level. b. The question of software support is typically the biggest stumbling block to the acceptance of open-source software at the corporate level. c. The question of software support is typically the biggest stumbling block to the acceptance of open-source software at the corporate level. d. The question of software support is typically the biggest stumbling block to the acceptance of open-source software at the corporate level.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Open-Source Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.16 - Compare open-source software to licensed software in terms of how each is used and supported. KEYWORDS: Bloom's: Remember DATE CREATED: 2/4/2020 7:30 AM DATE MODIFIED: 2/4/2020 8:13 AM 122. Letitia's open-source word processing application is not working properly. How can she get help troubleshooting the problem? a. call the software provider's toll-free support number b. visit the retail store where she purchased the software c. post her question to an Internet discussion area d. There is no way to obtain support for open-source software. Copyright Cengage Learning. Powered by Cognero.

Page 83


Chapter 04 - Hardware and Software ANSWER: RATIONALE:

FEEDBACK:

c How do you get help if an open-source package doesn’t work as expected? Because the opensource community lives on the Internet, you look there for help. Through the use of Internet discussion areas, you can communicate with others who use the same software, and you might even reach someone who helped develop it. Ideally, users of popular open-source packages can get correct answers to their technical questions within a few hours of asking for help on the appropriate Internet forum. Another approach is to contact one of the many companies emerging to support and service such software—for example, Red Hat for Linux and Sendmail, Inc., for Sendmail. These companies offer high-quality, for-pay technical assistance. a. Because the open-source community lives on the Internet, you look there for

help. Through the use of Internet discussion areas, you can communicate with others who use the same software, and you might even reach someone who helped develop it. b. Because the open-source community lives on the Internet, you look there for help. Through the use of Internet discussion areas, you can communicate with others who use the same software, and you might even reach someone who helped develop it. c. Because the open-source community lives on the Internet, you look there for help. Through the use of Internet discussion areas, you can communicate with others who use the same software, and you might even reach someone who helped develop it. d. Because the open-source community lives on the Internet, you look there for help. Through the use of Internet discussion areas, you can communicate with others who use the same software, and you might even reach someone who helped develop it.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Open-Source Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.4.16 - Compare open-source software to licensed software in terms of how each is used and supported. KEYWORDS: Bloom's: Remember DATE CREATED: 2/4/2020 7:30 AM DATE MODIFIED: 2/4/2020 8:20 AM Essay 123. Explain the primary difference between random access memory (RAM) and read-only memory (ROM). ANSWER: RAM chips are volatile storage devices, meaning they lose their contents if the current is turned off or disrupted (this can result from a power surge, a brownout, or electrical noise generated by lightning or nearby machines). ROM is nonvolatile, meaning that its contents are not lost if the power is turned off or interrupted. RATIONALE: RAM chips are volatile storage devices, meaning they lose their contents if the current is turned off or disrupted (this can result from a power surge, a brownout, or electrical noise generated by lightning or nearby machines). ROM is nonvolatile, meaning that its contents are not lost if the power is turned off or interrupted. POINTS: 1 Copyright Cengage Learning. Powered by Cognero.

Page 84


Chapter 04 - Hardware and Software RUBRIC: Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Describe volatility as the main difference between RAM and ROM

DIFFICULTY: Moderate REFERENCES: RAM and Cache QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/30/2020 5:59 PM 124. What is grid computing? How does it work? ANSWER: Grid computing is the use of a collection of computers, often owned by many people or organizations, to work in a coordinated manner to solve a common problem. Key to the success of grid computing is a central server that acts as a grid leader and traffic monitor. This controlling computer divides the computing task into subtasks and assigns the work to computers on the grid that have (at least temporarily) surplus processing power. The central server also monitors the processing, and if a member of the grid fails to complete a subtask, it will restart or reassign the task. When all the tasks are completed, the controlling server combines the results and advances to the next task until the whole job is completed. RATIONALE: Grid computing is the use of a collection of computers, often owned by many people or organizations, to work in a coordinated manner to solve a common problem. Key to the success of grid computing is a central server that acts as a grid leader and traffic monitor. This controlling computer divides the computing task into subtasks and assigns the work to computers on the grid that have (at least temporarily) surplus processing power. The central server also monitors the processing, and if a member of the grid fails to complete a subtask, it will restart or reassign the task. When all the tasks are completed, the controlling server combines the results and advances to the next task until the whole job is completed. POINTS: 1 RUBRIC: 0 1 2 3 4 Criteria

Failure

Below Expectations

Developing

Competent

Mastery

Define grid computing Explain how grid computing works

DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

Moderate Processor Essay False

Copyright Cengage Learning. Powered by Cognero.

Page 85


Chapter 04 - Hardware and Software STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.4.2 - Explain the difference between multiprocessing, parallel processing, and grid computing. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/30/2020 6:02 PM 125. Identify three advantages of the use of solid state secondary storage devices (SSDs) over magnetic or optical media. ANSWER: SSDs store data in memory chips rather than magnetic or optical media. The memory chips require less power and provide faster data access than magnetic data storage devices. In addition, SSDs have no moving parts, so they are less fragile than hard disk drives. RATIONALE: SSDs store data in memory chips rather than magnetic or optical media. The memory chips require less power and provide faster data access than magnetic data storage devices. In addition, SSDs have no moving parts, so they are less fragile than hard disk drives. POINTS: 1 RUBRIC: 0 1 2 3 4 Criteria

Failure

Below Expectations

Developing

Competent

Mastery

Lists three advantages of solid state storage devices

DIFFICULTY: Moderate REFERENCES: Secondary Storage QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.4.1 - Describe the functions of the four fundamental hardware components of every computer. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/31/2020 7:31 AM 126. Describe the Electronic Product Environmental Assessment Tool (EPEAT). ANSWER: Electronic Product Environmental Assessment Tool (EPEAT) is a system that enables purchasers to evaluate, compare, and select electronic products based on a total of 51 environmental criteria. Products are ranked in EPEAT according to three tiers of environmental performance: bronze, silver, and gold. These tiers relate to various required and optional criteria that are met. Individual purchasers as well as corporate purchasers of computers, printers, scanners, and multifunction devices can use the EPEAT Web site (www.epeat.net) to screen manufacturers and models based on environmental attributes. RATIONALE: Electronic Product Environmental Assessment Tool (EPEAT) is a system that enables purchasers to evaluate, compare, and select electronic products based on a total of 51 environmental criteria. Products are ranked in EPEAT according to three tiers of environmental performance: bronze, silver, and gold. These tiers relate to various required and optional criteria that are met. Individual purchasers as well as corporate purchasers of Copyright Cengage Learning. Powered by Cognero.

Page 86


Chapter 04 - Hardware and Software

POINTS: RUBRIC:

computers, printers, scanners, and multifunction devices can use the EPEAT Web site (www.epeat.net) to screen manufacturers and models based on environmental attributes. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Describes the EPEAT system tiers

DIFFICULTY: Moderate REFERENCES: Green Computing QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.4.6 - State the three primary goals of the “green computing” program. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:48 PM DATE MODIFIED: 1/31/2020 7:36 AM 127. Distinguish between systems software and applications software. ANSWER: Software can be divided into two types: systems software and application software. System software includes operating systems, utilities, and middleware that coordinate the activities and functions of the hardware and other programs throughout the computer system. Application software consists of programs that help users solve computing problems. Examples include a spreadsheet program or a program that captures and displays data that enables monitoring of a manufacturing process. RATIONALE: Software can be divided into two types: systems software and application software. System software includes operating systems, utilities, and middleware that coordinate the activities and functions of the hardware and other programs throughout the computer system. Application software consists of programs that help users solve computing problems. Examples include a spreadsheet program or a program that captures and displays data that enables monitoring of a manufacturing process. POINTS: 1 RUBRIC: 0 1 2 3 4 Criteria

Failure

Below Expectations

Developing

Competent

Mastery

Describes systems software Describes application software

DIFFICULTY: Moderate REFERENCES: System Software QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.4.7 - List the two basic kinds of software and their associated subclasses. Copyright Cengage Learning. Powered by Cognero.

Page 87


Chapter 04 - Hardware and Software NATIONAL STANDARDS: KEYWORDS: DATE CREATED: DATE MODIFIED:

United States - BUSPROG: Legal - Legal Bloom's: Remember 11/19/2019 5:52 PM 1/31/2020 7:43 AM

128. Distinguish between multitasking and multithreading. ANSWER: Multitasking allows more than one program to run concurrently on an operating system. Multithreading allows different threads of a single program to run concurrently. A thread is a set of instructions within an application that is independent of other threads. RATIONALE: Multitasking allows more than one program to run concurrently on an operating system. Multithreading allows different threads of a single program to run concurrently. A thread is a set of instructions within an application that is independent of other threads. POINTS: 1 RUBRIC: 0 1 2 3 4 Criteria

Failure

Below Expectations

Developing

Competent

Mastery

Defines OS multitasking Defines OS multithreading

DIFFICULTY: Moderate REFERENCES: Operating Systems QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.4.8 - Describe the role of the operating system. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/31/2020 7:48 AM 129. Discuss three advantages and three disadvantages of using proprietary software. ANSWER: Advantages: You can get exactly what you need in terms of features, reports, and so on. Being involved in the development offers more control over the results. You can more easily modify the software and add features. This can help you to counteract an initiative by competitors or to meet new supplier or customer demands.

RATIONALE:

Disadvantages: It can take a long time and significant resources to develop the required features. In-house system developers may become hard pressed to provide the required level of ongoing support and maintenance because of pressure to move on to other new projects. The features and performance of software that has yet to be developed presents potential risk. Advantages: You can get exactly what you need in terms of features, reports, and so on. Being involved in the development offers more control over the results. You can more easily modify the software and add features. This can help you to counteract an initiative by competitors or to meet new supplier or customer demands. Disadvantages: It can take a long time and significant resources to develop the required features. In-house system developers may become hard pressed to provide the required level of ongoing support and maintenance because of pressure to move on to other new projects.

Copyright Cengage Learning. Powered by Cognero.

Page 88


Chapter 04 - Hardware and Software POINTS: RUBRIC:

The features and performance of software that has yet to be developed presents potential risk. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Lists three advantages of proprietary application software Lists three disadvantages of proprietary application software

DIFFICULTY: Moderate REFERENCES: Overview of Application Software QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.4.11 - Identify three advantages of off-the-shelf versus proprietary software. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/31/2020 7:55 AM 130. Discuss the growth in mobile application software. ANSWER: The number of applications (apps) for smartphones and other mobile devices has exploded in recent years. Besides the proprietary apps that come with these devices, hundreds of thousands of mobile apps have been developed by third parties. As of April 2018, Apple’s App Store had over 2.1 million apps available for iOS device users. Android users could choose from over 2.8 million mobile apps on Google’s Play Store. The Windows store had 700,000 apps, and Amazon had 400,000 apps available. RATIONALE: The number of applications (apps) for smartphones and other mobile devices has exploded in recent years. Besides the proprietary apps that come with these devices, hundreds of thousands of mobile apps have been developed by third parties. As of April 2018, Apple’s App Store had over 2.1 million apps available for iOS device users. Android users could choose from over 2.8 million mobile apps on Google’s Play Store. The Windows store had 700,000 apps, and Amazon had 400,000 apps available. POINTS: 1 RUBRIC: 0 1 2 3 4 Criteria

Failure

Below Expectations

Developing

Competent

Mastery

Provides some statistics regarding the profusion of mobile apps

DIFFICULTY: REFERENCES: QUESTION TYPE:

Moderate Mobile Application Software Essay

Copyright Cengage Learning. Powered by Cognero.

Page 89


Chapter 04 - Hardware and Software HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.4.7 - List the two basic kinds of software and their associated subclasses. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 1/31/2020 7:57 AM

Copyright Cengage Learning. Powered by Cognero.

Page 90


Chapter 05 - Database Systems and Management True / False 1. A database, a database management system, and the application programs that create and access the databases make up a database environment. a. True b. False ANSWER: True RATIONALE: A DBMS provides a single point of management and control over data resources, which can be critical to maintaining the integrity and security of the data. An organization’s databases, its DBMS, and the application programs that create and access the databases make up a database environment. FEEDBACK: Correct An organization’s databases, its DBMS, and the application programs that create and access the databases make up a database environment. Incorrect An organization’s databases, its DBMS, and the application programs that create and access the databases make up a database environment.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Database Approach QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.4 - Define the term database management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/7/2020 2:43 PM 2. A collection of data fields that are all related to one object, activity, or individual is called a file. a. True b. False ANSWER: False RATIONALE: A collection of attributes (characteristics) about a specific entity is a record. An entity is a person, place, or thing (object) for which data is collected, stored, and maintained. Examples of entities include employees, products, and customers. Most organizations organize and store data as collections of entities or a file. FEEDBACK: Correct A collection of attributes (characteristics) about a specific entity is a record. Incorrect A collection of attributes (characteristics) about a specific entity is a record.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Data Hierarchy QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.3 - Define the components of the data hierarchy including attribute, entity, record, file, and database. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 05 - Database Systems and Management DATE MODIFIED:

2/7/2020 2:49 PM

3. An attribute is a general class of people, places, or things for which data is collected, stored, and maintained. a. True b. False ANSWER: False RATIONALE: An entity is a person, place, or thing (object) for which data is collected, stored, and maintained. Examples of entities include employees, products, and customers. An attribute is a characteristic of an entity. For example, employee number, last name, first name, hire date, and department number are attributes for an employee. FEEDBACK: Correct An attribute is a characteristic of an entity. Incorrect An attribute is a characteristic of an entity.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Data Hierarchy QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.3 - Define the components of the data hierarchy including attribute, entity, record, file, and database. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/7/2020 3:44 PM 4. If "color" is an attribute, then "green" is a data item. a. True b. False ANSWER: True RATIONALE: An attribute is a characteristic of an entity. For example, employee number, last name, first name, hire date, and department number are attributes for an employee. The specific value of an attribute, called a data item, can be found in the record describing an entity. FEEDBACK: Correct The specific value of an attribute, called a data item, can be found in the record describing an entity. Incorrect The specific value of an attribute, called a data item, can be found in the record describing an entity.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: The Data Hierarchy QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.3 - Define the components of the data hierarchy including attribute, entity, record, file, and database. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 05 - Database Systems and Management DATE MODIFIED:

2/7/2020 3:50 PM

5. Two collections of attributes can have a common primary key. a. True b. False ANSWER: False RATIONALE: A collection of attributes (characteristics) about a specific entity is a record. A primary key is an attribute or set of attributes that uniquely identifies the record. No other record can have the same primary key. FEEDBACK: Correct A primary key is an attribute or set of attributes that uniquely identifies the record. No other record can have the same primary key. Incorrect A primary key is an attribute or set of attributes that uniquely identifies the record. No other record can have the same primary key.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Data Hierarchy QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.3 - Define the components of the data hierarchy including attribute, entity, record, file, and database. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/7/2020 3:56 PM 6. Today, due to security concerns, most organizations avoid the database approach to data management, where multiple information systems share a pool of related data. a. True b. False ANSWER: False RATIONALE: Today most organizations employ the database approach to data management, where multiple information systems share a pool of related data. FEEDBACK: Correct Today most organizations employ the database approach to data management, where multiple information systems share a pool of related data. Incorrect Today most organizations employ the database approach to data management, where multiple information systems share a pool of related data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Database Approach QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.4 - Define the term database management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 05 - Database Systems and Management DATE MODIFIED:

2/7/2020 4:03 PM

7. DBMSs are used primarily for modeling data. a. True b. False ANSWER: False RATIONALE: A database management system (DBMS) consists of a group of programs provided by the DBMS supplier that are used to access and manage a database as well as provide an interface between the database and its users and other application programs. A DBMS provides a single point of management and control over data resources, which can be critical to maintaining the integrity and security of the data. FEEDBACK: Correct A DBMS provides a single point of management and control over data resources, which can be critical to maintaining the integrity and security of the data. Incorrect A DBMS provides a single point of management and control over data resources, which can be critical to maintaining the integrity and security of the data.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: The Database Approach QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.4 - Define the term database management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/7/2020 4:05 PM 8. A database must reflect the business processes of an organization. a. True b. False ANSWER: True RATIONALE: A database should be designed to store all data relevant to the business and to provide quick access and easy modification. Moreover, it must reflect the business processes of the organization. FEEDBACK: Correct A database should be designed to store all data relevant to the business and to provide quick access and easy modification. Moreover, it must reflect the business processes of the organization. Incorrect A database should be designed to store all data relevant to the business and to provide quick access and easy modification. Moreover, it must reflect the business processes of the organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Database Design QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.8 - Identify seven key questions that must be answered when designing a database. Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 05 - Database Systems and Management NATIONAL STANDARDS: KEYWORDS: DATE CREATED: DATE MODIFIED:

United States - BUSPROG: Technology Bloom's: Remember 11/19/2019 6:22 PM 2/7/2020 4:07 PM

9. It is possible to restrict access to data depending on the database user's privileges. a. True b. False ANSWER: True RATIONALE: The DBMS security management function helps ensure that data are protected against access by unauthorized users, physical damage, operating system failure, and simultaneous updating of the same data by multiple users. An especially powerful feature of the DBMS security function is the capability to define and enforce user access privileges that control who can access what data and what they can do with that data (e.g. read only, add/delete/change the data). FEEDBACK: Correct An especially powerful feature of the DBMS security function is the capability to define and enforce user access privileges that control who can access what data and what they can do with that data. Incorrect An especially powerful feature of the DBMS security function is the capability to define and enforce user access privileges that control who can access what data and what they can do with that data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Database Activities QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.5 - Identify six functions performed by a database management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/7/2020 4:16 PM 10. An enterprise data model is created only for documentation, but is otherwise inconsequential. a. True b. False ANSWER: False RATIONALE: The enterprise data model is a valuable resource with the following benefits: • • • •

Provides a roadmap of the organization’s current and future data that serves as an initial starting point for the development of new applications that will be able to integrate and exchange data. Avoids costly and inefficient data redundancy where the same data entities or data attributes are captured in more than one application or stored in more than one database. Identifies gaps in the data needed to support the organization so that plans can be made to capture or acquire the needed data. Provides a benchmark against which to evaluate the extent to which a vendor’s

Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 05 - Database Systems and Management software package meets the organization’s data needs. FEEDBACK:

Correct The enterprise data model is a valuable resource with several significant benefits. Incorrect The enterprise data model is a valuable resource with several significant benefits.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Database Design QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.8 - Identify seven key questions that must be answered when designing a database. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/7/2020 4:20 PM 11. The relational model describes data using a standard tabular format; all data elements are placed in three-dimensional tables called relations, which are the logical equivalent of files. a. True b. False ANSWER: False RATIONALE: The relational database model is a simple but highly useful way to organize data into collections of two-dimensional tables called relations. FEEDBACK: Correct The relational database model is a simple but highly useful way to organize data into collections of two-dimensional tables called relations. Incorrect The relational database model is a simple but highly useful way to organize data into collections of two-dimensional tables called relations.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Relational Databases QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.9 - Identify six fundamental characteristics of the relational database model. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/7/2020 4:23 PM 12. In the context of the relational database model, selecting involves combining two or more tables. a. True b. False ANSWER: False RATIONALE: Basic data manipulations include selecting, projecting, and joining. Selecting involves eliminating rows according to certain criteria. FEEDBACK: Correct Selecting involves eliminating rows according to certain criteria. Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 05 - Database Systems and Management Incorrect Selecting involves eliminating rows according to certain criteria.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Manipulating Data in a Relational Database QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.9 - Identify six fundamental characteristics of the relational database model. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/7/2020 4:27 PM 13. In the context of the relational database model, projecting involves eliminating columns in a table. a. True b. False ANSWER: True RATIONALE: Basic data manipulations include selecting, projecting, and joining. Projecting involves eliminating columns in a table. FEEDBACK: Correct Projecting involves eliminating columns in a table. Incorrect Projecting involves eliminating columns in a table.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Manipulating Data in a Relational Database QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.9 - Identify six fundamental characteristics of the relational database model. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/7/2020 4:28 PM 14. One of the primary advantages of a relational database is that it allows tables to be linked to reduce data redundancy and allow data to be organized more logically. a. True b. False ANSWER: True RATIONALE: One of the primary advantages of a relational database is that it allows tables to be linked. This linkage reduces data redundancy and allows data to be organized more logically. FEEDBACK: Correct One of the primary advantages of a relational database is that it allows tables to be linked. This linkage reduces data redundancy and allows data to be organized more logically. Incorrect One of the primary advantages of a relational database is that it allows tables to be linked. This linkage reduces data redundancy and allows data to be organized more logically.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 05 - Database Systems and Management DIFFICULTY: Easy REFERENCES: Manipulating Data in a Relational Database QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.9 - Identify six fundamental characteristics of the relational database model. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/7/2020 4:32 PM 15. A database management system (DBMS) serves as an interface between an application program and a database. a. True b. False ANSWER: True RATIONALE: A database management system (DBMS) consists of a group of programs provided by the DBMS supplier that are used to access and manage a database as well as provide an interface between the database and its users and other application programs. FEEDBACK: Correct A database management system (DBMS) consists of a group of programs provided by the DBMS supplier that are used to access and manage a database as well as provide an interface between the database and its users and other application programs. Incorrect A database management system (DBMS) consists of a group of programs provided by the DBMS supplier that are used to access and manage a database as well as provide an interface between the database and its users and other application programs.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Database Approach QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.5 - Identify six functions performed by a database management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/7/2020 4:40 PM 16. One of the final steps in installing and using a large database involves “telling” the database management system (DBMS) the logical and physical structure of the data and the relationships among the data for each user. a. True b. False ANSWER: False RATIONALE: Because the DBMS is responsible for providing access to a database, one of the first steps in installing and using a large relational database involves “telling” the DBMS the logical and physical structure of the data and the relationships among the data for each user. This description is called a schema (as in a schematic diagram). FEEDBACK: Correct Because the DBMS is responsible for providing access to a database, one of the Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 05 - Database Systems and Management first steps in installing and using a large relational database involves “telling” the DBMS the logical and physical structure of the data and the relationships among the data for each user. This description is called a schema (as in a schematic diagram). Incorrect Because the DBMS is responsible for providing access to a database, one of the first steps in installing and using a large relational database involves “telling” the DBMS the logical and physical structure of the data and the relationships among the data for each user. This description is called a schema (as in a schematic diagram).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Database Activities QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.6 - Define the roles of the database schema, data definition language, and data manipulation language. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/7/2020 4:45 PM 17. A database administrator (DBA) is an important nontechnical position responsible for defining and implementing consistent principles for a variety of data issues, including setting data standards and data definitions that apply across all the databases in an organization. a. True b. False ANSWER: False RATIONALE: A database administrator (DBA) is a skilled and trained IS professional who holds discussions with business users to define their data needs; applies database programming languages to craft a set of databases to meet those needs; tests and evaluates databases; monitors their performance and implements change to improve response time for user queries; and assures that data is secure from unauthorized access. FEEDBACK: Correct A database administrator (DBA) is a skilled and trained IS professional who holds discussions with business users to define their data needs; applies database programming languages to craft a set of databases to meet those needs; tests and evaluates databases; monitors their performance and implements change to improve response time for user queries; and assures that data is secure from unauthorized access. Incorrect A database administrator (DBA) is a skilled and trained IS professional who holds discussions with business users to define their data needs; applies database programming languages to craft a set of databases to meet those needs; tests and evaluates databases; monitors their performance and implements change to improve response time for user queries; and assures that data is secure from unauthorized access.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Easy Data Management True / False False

Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 05 - Database Systems and Management LEARNING OBJECTIVES: POIS.14e.5.16 - Define the role of a database administrator. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/7/2020 4:50 PM 18. A database administrator (DBA) must have a clear understanding of the fundamental business of an organization, be proficient in the use of selected database management systems, and stay abreast of emerging technologies and new design approaches. a. True b. False ANSWER: True RATIONALE: Database systems require a skilled database administrator (DBA), who must have a clear understanding of the fundamental business of the organization, be proficient in the use of selected database management systems, and stay abreast of emerging technologies and new design approaches. FEEDBACK: Correct Database systems require a skilled database administrator (DBA), who must have a clear understanding of the fundamental business of the organization, be proficient in the use of selected database management systems, and stay abreast of emerging technologies and new design approaches. Incorrect Database systems require a skilled database administrator (DBA), who must have a clear understanding of the fundamental business of the organization, be proficient in the use of selected database management systems, and stay abreast of emerging technologies and new design approaches.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Management QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.16 - Define the role of a database administrator. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/7/2020 4:56 PM 19. For each data item, a data dictionary usually contains information such as the name of the data item, the range of values that can be used, and the amount of storage needed for the item. a. True b. False ANSWER: True RATIONALE: An important step in creating a database is to establish a data dictionary, a detailed description of the data stored in the database. Among other details, the data dictionary contains the following information for each data item: • • •

Name of the data attribute Aliases or other names that may be used to describe the item Range of values that can be used (domain)

Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 05 - Database Systems and Management • • FEEDBACK:

Type of data (such as alphanumeric or numeric) Number of bytes of storage needed for the item

Correct

Among other details, the data dictionary contains the following information for each data item: name of the data attribute, aliases or other names that may be used to describe the item, range of values that can be used (domain), type of data (such as alphanumeric or numeric), and number of bytes of storage needed for the item. Incorrect Among other details, the data dictionary contains the following information for each data item: name of the data attribute, aliases or other names that may be used to describe the item, range of values that can be used (domain), type of data (such as alphanumeric or numeric), and number of bytes of storage needed for the item.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Database Activities QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.5 - Identify six functions performed by a database management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/7/2020 5:13 PM 20. Data modeling usually involves setting a specific business goal and then analyzing the data and information needed to reach that goal. a. True b. False ANSWER: False RATIONALE: Enterprise data modeling is an approach that starts by investigating the general data and information needs of the organization at the strategic level and then moves on to examine more specific data and information needs for the functional areas and departments within the organization. FEEDBACK: Correct Enterprise data modeling is an approach that starts by investigating the general data and information needs of the organization at the strategic level and then moves on to examine more specific data and information needs for the functional areas and departments within the organization. Incorrect Enterprise data modeling is an approach that starts by investigating the general data and information needs of the organization at the strategic level and then moves on to examine more specific data and information needs for the functional areas and departments within the organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Database Design QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.8 - Identify seven key questions that must be answered when designing a database. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 05 - Database Systems and Management DATE CREATED: DATE MODIFIED:

11/19/2019 6:22 PM 2/7/2020 5:16 PM

21. Carlos is working with an existing database, but he wants to eliminate some of the columns in the table to create a new, more streamlined database. He will use projection to create his new database. a. True b. False ANSWER: True RATIONALE: Basic data manipulations include selecting, projecting, and joining. Projecting involves eliminating columns in a table. FEEDBACK: Correct Projecting involves eliminating columns in a table. Incorrect Projecting involves eliminating columns in a table.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Manipulating Data in a Relational Database QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.9 - Identify six fundamental characteristics of the relational database model. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/7/2020 5:19 PM 22. Sometimes a database can contain "bad data," meaning incomplete, incorrect, inaccurate, or irrelevant records, which can be corrected or deleted through data cleansing. a. True b. False ANSWER: True RATIONALE: Data cleansing is the process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, or irrelevant records that reside in a database. The goal of data cleansing is to improve the quality of the data used in decision making. The “bad data” may have been caused by user data-entry errors or by data corruption during data transmission or storage. FEEDBACK: Correct Data cleansing is the process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, or irrelevant records that reside in a database. Incorrect Data cleansing is the process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, or irrelevant records that reside in a database.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Cleansing QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.7 - Define the term data cleansing. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 05 - Database Systems and Management DATE CREATED: DATE MODIFIED:

11/19/2019 6:22 PM 2/7/2020 5:22 PM

Multiple Choice 23. Which of the following statements is true of a database? a. It is accessed only by an organization’s database administrator and data administrator. b. It provides an essential foundation for an organization’s knowledge management and artificial intelligence systems. c. It is a collection of unstructured data. d. It helps companies analyze information to identify new market opportunities. ANSWER: d RATIONALE: A database is a well-designed, organized, and carefully managed collection of data. Like other components of an information system, a database should help an organization achieve its goals. A database can contribute to organizational success by providing managers and decision makers with timely, accurate, and relevant information built on data. Organizations routinely capture and store data about customers, orders, products, and employees in databases. These databases help companies analyze information to reduce costs, increase profits, add new customers, track past business activities, improve customer service, and identify new market opportunities. FEEDBACK: a. Databases help companies analyze information to reduce costs, increase profits, add new customers, track past business activities, improve customer service, and identify new market opportunities. b. Databases help companies analyze information to reduce costs, increase profits, add new customers, track past business activities, improve customer service, and identify new market opportunities. c. Databases help companies analyze information to reduce costs, increase profits, add new customers, track past business activities, improve customer service, and identify new market opportunities. d. Databases help companies analyze information to reduce costs, increase profits, add new customers, track past business activities, improve customer service, and identify new market opportunities.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Database Fundamentals QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.1 - Distinguish data from information and knowledge. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/7/2020 5:33 PM 24. Which component of the data hierarchy is ranked just below the database and represents a collection of similar entities? a. field b. attribute c. record d. file ANSWER: d Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 05 - Database Systems and Management RATIONALE:

Most organizations organize and store data as collections of entities or a file. The data hierarchy pyramid in Figure 5.1 shows that a database tops the hierarchy, followed by a file, entity, and attribute.

FEEDBACK:

a. Most organizations organize and store data as collections of entities or a file. The data hierarchy pyramid in Figure 5.1 shows that a database tops the hierarchy, followed by a file, entity, and attribute. b. Most organizations organize and store data as collections of entities or a file. The data hierarchy pyramid in Figure 5.1 shows that a database tops the hierarchy, followed by a file, entity, and attribute. c. Most organizations organize and store data as collections of entities or a file. The data hierarchy pyramid in Figure 5.1 shows that a database tops the hierarchy, followed by a file, entity, and attribute. d. Most organizations organize and store data as collections of entities or a file. The data hierarchy pyramid in Figure 5.1 shows that a database tops the hierarchy, followed by a file, entity, and attribute.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Data Hierarchy QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.3 - Define the components of the data hierarchy including attribute, entity, record, file, and database. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 6:55 AM 25. A collection of characteristics that belong to a single person, place, or thing for which data is maintained is a(n) _____. a. record b. file c. attribute d. character ANSWER: a RATIONALE: An entity is a person, place, or thing (object) for which data is collected, stored, and maintained. Examples of entities include employees, products, and customers. An attribute is a characteristic of an entity. A collection of attributes about a specific entity is a record. FEEDBACK: a. A collection of attributes (characteristics) about a specific entity is a record. b. A collection of attributes (characteristics) about a specific entity is a record. c. A collection of attributes (characteristics) about a specific entity is a record. d. A collection of attributes (characteristics) about a specific entity is a record. POINTS: 1 DIFFICULTY: Easy REFERENCES: The Data Hierarchy QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.3 - Define the components of the data hierarchy including attribute, entity, record, file, and database. NATIONAL STANDARDS: United States - BUSPROG: Technology Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 05 - Database Systems and Management KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 11/19/2019 6:22 PM 2/8/2020 7:05 AM

26. A(n) _____ is a characteristic or set of characteristics in a record that uniquely identifies the record. a. attribute b. entity c. primary key d. data item ANSWER: c RATIONALE: A primary key is an attribute or set of attributes that uniquely identifies the record. No other record can have the same primary key. FEEDBACK: a. A primary key is an attribute or set of attributes that uniquely identifies the record. b. A primary key is an attribute or set of attributes that uniquely identifies the record. c. A primary key is an attribute or set of attributes that uniquely identifies the record. d. A primary key is an attribute or set of attributes that uniquely identifies the record. POINTS: 1 DIFFICULTY: Easy REFERENCES: The Data Hierarchy QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.3 - Define the components of the data hierarchy including attribute, entity, record, file, and database. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 7:08 AM 27. _____ is an approach that starts by investigating the general data and information needs of an organization at the strategic level and then examines more specific data and information needs for the functional areas and departments within the organization. a. Data selecting b. Enterprise data modeling c. Data cleansing d. Social graph analysis ANSWER: b RATIONALE: Enterprise data modeling is an approach that starts by investigating the general data and information needs of the organization at the strategic level and then moves on to examine more specific data and information needs for the functional areas and departments within the organization. FEEDBACK: a. Enterprise data modeling is an approach that starts by investigating the general data and information needs of the organization at the strategic level and then moves on to examine more specific data and information needs for the functional areas and departments within the organization. b. Enterprise data modeling is an approach that starts by investigating the general data and information needs of the organization at the strategic level and then moves on to examine more specific data and information needs for the functional areas and departments within the organization. c. Enterprise data modeling is an approach that starts by investigating the general data and information needs of the organization at the strategic level and then moves on to examine more specific data and information needs for the functional

Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 05 - Database Systems and Management areas and departments within the organization.

d. Enterprise data modeling is an approach that starts by investigating the general

data and information needs of the organization at the strategic level and then moves on to examine more specific data and information needs for the functional areas and departments within the organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Database Design QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.8 - Identify seven key questions that must be answered when designing a database. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 7:11 AM 28. Each attribute in a relational database model can be constrained to a range of allowable values called a _____. a. bandwidth b. scope c. slot d. domain ANSWER: d RATIONALE: An attribute is a characteristic of an entity. For example, employee number, last name, first name, hire date, and department number are attributes for an employee. Each attribute can be constrained to a range of allowable values called its domain. For instance, the domain for an attribute such as type of employee could be limited to the three characters F (full-time), P (part-time), or C (contractor). If someone tried to enter a “1” in the type of employee field, the data would not be accepted. FEEDBACK: a. Each attribute can be constrained to a range of allowable values called its domain. b. Each attribute can be constrained to a range of allowable values called its domain. c. Each attribute can be constrained to a range of allowable values called its domain. d. Each attribute can be constrained to a range of allowable values called its domain.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Data Hierarchy QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.3 - Define the components of the data hierarchy including attribute, entity, record, file, and database. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 7:16 AM Copyright Cengage Learning. Powered by Cognero.

Page 16


Chapter 05 - Database Systems and Management 29. Mark creates a new relational database table that includes only five of the seven columns in the existing products table. This action is known as ____. a. selecting b. joining c. projecting d. linking ANSWER: c RATIONALE: Basic data manipulations include selecting, projecting, and joining. Projecting involves eliminating columns in a table. FEEDBACK: a. Projecting involves eliminating columns in a table. b. Projecting involves eliminating columns in a table. c. Projecting involves eliminating columns in a table. d. Projecting involves eliminating columns in a table. POINTS: 1 DIFFICULTY: Easy REFERENCES: Manipulating Data in a Relational Database QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.9 - Identify six fundamental characteristics of the relational database model. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 7:21 AM 30. For the ____ operation, it is required that the the two tables have a common data attribute. a. delete b. select c. project d. join ANSWER: d RATIONALE: As long as the tables share at least one common data attribute, the tables in a relational database can be linked to provide useful information and reports. Joining is the combining of two or more tables through common data attributes to form a new table with only the unique data attributes. FEEDBACK: a. Joining is the combining of two or more tables through common data attributes to form a new table with only the unique data attributes. b. Joining is the combining of two or more tables through common data attributes to form a new table with only the unique data attributes. c. Joining is the combining of two or more tables through common data attributes to form a new table with only the unique data attributes. d. Joining is the combining of two or more tables through common data attributes to form a new table with only the unique data attributes.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Manipulating Data in a Relational Database QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.9 - Identify six fundamental characteristics of the relational database model. NATIONAL STANDARDS: United States - BUSPROG: Technology Copyright Cengage Learning. Powered by Cognero.

Page 17


Chapter 05 - Database Systems and Management KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 11/19/2019 6:22 PM 2/8/2020 7:24 AM

31. _____ is a special-purpose programming language for accessing and manipulating data stored in a relational database. a. Query by Example (QBE) b. Access c. Structured Query Language (SQL) d. Java ANSWER: c RATIONALE: SQL is a special-purpose programming language for accessing and manipulating data stored in a relational database. FEEDBACK: a. SQL is a special-purpose programming language for accessing and manipulating data stored in a relational database. b. SQL is a special-purpose programming language for accessing and manipulating data stored in a relational database. c. SQL is a special-purpose programming language for accessing and manipulating data stored in a relational database. d. SQL is a special-purpose programming language for accessing and manipulating data stored in a relational database.

POINTS: 1 DIFFICULTY: Easy REFERENCES: SQL Databases QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.11 - Identify two key benefits of enforcing the ACID properties on SQL databases. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 7:30 AM 32. Suppose you wish to learn what tables are included in a database, what entity characteristics these tables contain, and how these tables are related. Which resource would provide this information? a. SQL commands b. attributes c. schema d. sample data ANSWER: c RATIONALE: Because the DBMS is responsible for providing access to a database, one of the first steps in installing and using a large relational database involves “telling” the DBMS the logical and physical structure of the data and the relationships among the data for each user. This description is called a schema (as in a schematic diagram). In a relational database, the schema defines the tables, the attributes in each table, and the relationships between attributes and tables. FEEDBACK: a. In a relational database, the schema defines the tables, the attributes in each table, and the relationships between attributes and tables.

b. In a relational database, the schema defines the tables, the attributes in each table, and the relationships between attributes and tables. c. In a relational database, the schema defines the tables, the attributes in each table, and the relationships between attributes and tables. Copyright Cengage Learning. Powered by Cognero.

Page 18


Chapter 05 - Database Systems and Management d. In a relational database, the schema defines the tables, the attributes in each table, and the relationships between attributes and tables.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Database Activities QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.6 - Define the roles of the database schema, data definition language, and data manipulation language. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 7:37 AM 33. A ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database. a. data dictionary b. schema c. data definition language d. data manipulation language ANSWER: c RATIONALE: The database schema can also be defined using a data definition language. A data definition language (DDL) is a collection of instructions and commands used to define and describe data and relationships in a specific database. FEEDBACK: a. A data definition language (DDL) is a collection of instructions and commands used to define and describe data and relationships in a specific database.

b. A data definition language (DDL) is a collection of instructions and commands used to define and describe data and relationships in a specific database. c. A data definition language (DDL) is a collection of instructions and commands used to define and describe data and relationships in a specific database. d. A data definition language (DDL) is a collection of instructions and commands used to define and describe data and relationships in a specific database.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Database Activities QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.6 - Define the roles of the database schema, data definition language, and data manipulation language. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 7:40 AM 34. Julie is a non-IS employee who is responsible for, among other tasks, creating and maintaining consistent reference data and master data definitions and for analyzing data for quality. Coworkers consult with Julie to find out what data to use to answer a business question. Julie is a _____. a. data analyst b. data steward Copyright Cengage Learning. Powered by Cognero.

Page 19


Chapter 05 - Database Systems and Management c. database administrator d. data owner ANSWER: b RATIONALE: The data steward is typically a non-IS employee who takes responsibility for the management of critical data entities or attributes. This includes identifying and acquiring new data sources to obtain the desired data entity or attribute; creating and maintaining consistent reference data and master data definitions; analyzing data for quality, and reconciling data issues. Data users consult with a data steward when they need to know what data to use to answer a business question, or to confirm the accuracy, completeness, or soundness of data within a business context. Data stewards advise and guide users and help them get the most value out of the enterprise data warehouse. FEEDBACK: a. The data steward is typically a non-IS employee who takes responsibility for the management of critical data entities or attributes. This includes identifying and acquiring new data sources to obtain the desired data entity or attribute; creating and maintaining consistent reference data and master data definitions; analyzing data for quality, and reconciling data issues. b. The data steward is typically a non-IS employee who takes responsibility for the management of critical data entities or attributes. This includes identifying and acquiring new data sources to obtain the desired data entity or attribute; creating and maintaining consistent reference data and master data definitions; analyzing data for quality, and reconciling data issues. c. The data steward is typically a non-IS employee who takes responsibility for the management of critical data entities or attributes. This includes identifying and acquiring new data sources to obtain the desired data entity or attribute; creating and maintaining consistent reference data and master data definitions; analyzing data for quality, and reconciling data issues. d. The data steward is typically a non-IS employee who takes responsibility for the management of critical data entities or attributes. This includes identifying and acquiring new data sources to obtain the desired data entity or attribute; creating and maintaining consistent reference data and master data definitions; analyzing data for quality, and reconciling data issues.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.16 - Define the role of a database administrator. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 7:49 AM 35. You would use Query by Example if _____. a. you wish to use a visual approach to query building b. you build a query from an example c. you prefer to use DML commands to create reports d. you wish to train colleagues to use SQL through examples ANSWER: a RATIONALE: Some databases use Query by Example (QBE), which is a visual approach to developing database queries or requests. With QBE, you can perform queries and other database tasks by Copyright Cengage Learning. Powered by Cognero.

Page 20


Chapter 05 - Database Systems and Management opening windows and clicking the data or features you want—similar to the way you work with Windows and other GUI (graphical user interface) operating systems and applications. FEEDBACK:

a. Some databases use Query by Example (QBE), which is a visual approach to developing database queries or requests.

b. Some databases use Query by Example (QBE), which is a visual approach to developing database queries or requests. c. Some databases use Query by Example (QBE), which is a visual approach to developing database queries or requests. d. Some databases use Query by Example (QBE), which is a visual approach to developing database queries or requests.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Database Activities QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.5 - Identify six functions performed by a database management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 7:58 AM 36. With _____, the database is stored on a service provider’s servers and accessed by the client over a network, typically the Internet. a. Internet access b. database as a service c. software as a service d. Oracle ANSWER: b RATIONALE: With database as a service (DaaS), the database is stored on a service provider’s servers and accessed by the service subscriber over the Internet, with the database administration handled by the service provider. FEEDBACK: a. With database as a service (DaaS), the database is stored on a service provider’s servers and accessed by the service subscriber over the Internet, with the database administration handled by the service provider. b. With database as a service (DaaS), the database is stored on a service provider’s servers and accessed by the service subscriber over the Internet, with the database administration handled by the service provider. c. With database as a service (DaaS), the database is stored on a service provider’s servers and accessed by the service subscriber over the Internet, with the database administration handled by the service provider. d. With database as a service (DaaS), the database is stored on a service provider’s servers and accessed by the service subscriber over the Internet, with the database administration handled by the service provider.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Popular Relational Database Management Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.12 - Identify two advantages associated with database as a service (DaaS). Copyright Cengage Learning. Powered by Cognero.

Page 21


Chapter 05 - Database Systems and Management NATIONAL STANDARDS: KEYWORDS: DATE CREATED: DATE MODIFIED:

United States - BUSPROG: Technology Bloom's: Remember 11/19/2019 6:22 PM 2/8/2020 8:02 AM

37. Suppose a new tech startup wants to use graphical symbols to define a data model that can be used to analyze and communicate data needs at the individual project level. What should they do? a. collect and cleanse the data b. define user access privileges c. create an entity-relationship diagram d. acquire a new database management system ANSWER: c RATIONALE: The entity-relationship (ER) diagram is a data model used to analyze and communicate data needs at the individual project or application level using graphical symbols to identify data entities and their associated data attributes as well as the relationships among the entities of interest. There are many notation styles that can be used in drawing an ER diagram. FEEDBACK: a. The entity-relationship (ER) diagram is a data model used to analyze and communicate data needs at the individual project or application level using graphical symbols to identify data entities and their associated data attributes as well as the relationships among the entities of interest. b. The entity-relationship (ER) diagram is a data model used to analyze and communicate data needs at the individual project or application level using graphical symbols to identify data entities and their associated data attributes as well as the relationships among the entities of interest. c. The entity-relationship (ER) diagram is a data model used to analyze and communicate data needs at the individual project or application level using graphical symbols to identify data entities and their associated data attributes as well as the relationships among the entities of interest. d. The entity-relationship (ER) diagram is a data model used to analyze and communicate data needs at the individual project or application level using graphical symbols to identify data entities and their associated data attributes as well as the relationships among the entities of interest.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Database Design QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.8 - Identify seven key questions that must be answered when designing a database. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 2:18 PM 38. After entering data into a relational database, users can make all of the following basic data manipulations except: a. projecting. b. organizing. c. selecting. d. joining. ANSWER: b Copyright Cengage Learning. Powered by Cognero.

Page 22


Chapter 05 - Database Systems and Management RATIONALE: FEEDBACK:

After entering data into a relational database, users can make inquiries and analyze the data. Basic data manipulations include selecting, projecting, and joining. a. After entering data into a relational database, users can make inquiries and

analyze the data. Basic data manipulations include selecting, projecting, and joining. b. After entering data into a relational database, users can make inquiries and analyze the data. Basic data manipulations include selecting, projecting, and joining. c. After entering data into a relational database, users can make inquiries and analyze the data. Basic data manipulations include selecting, projecting, and joining. d. After entering data into a relational database, users can make inquiries and analyze the data. Basic data manipulations include selecting, projecting, and joining.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Manipulating Data in a Relational Database QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.9 - Identify six fundamental characteristics of the relational database model. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 2:22 PM 39. To ensure reliability and integrity, SQL databases conform to four specific properties. Which of the following is NOT one of those four properties? a. atomicity b. durability c. isolation d. currency ANSWER: d RATIONALE: SQL databases conform to ACID properties (atomicity, consistency, isolation, durability), which were defined by Jim Gray soon after Codd’s work was published. These properties guarantee database transactions are processed reliably and ensure the integrity of data in the database. FEEDBACK: a. SQL databases conform to ACID properties (atomicity, consistency, isolation, durability). b. SQL databases conform to ACID properties (atomicity, consistency, isolation, durability). c. SQL databases conform to ACID properties (atomicity, consistency, isolation, durability). d. SQL databases conform to ACID properties (atomicity, consistency, isolation, durability).

POINTS: 1 DIFFICULTY: Easy REFERENCES: SQL Databases QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.11 - Identify two key benefits of enforcing the ACID properties on SQL Copyright Cengage Learning. Powered by Cognero.

Page 23


Chapter 05 - Database Systems and Management NATIONAL STANDARDS: KEYWORDS: DATE CREATED: DATE MODIFIED:

databases. United States - BUSPROG: Technology Bloom's: Remember 11/19/2019 6:22 PM 2/8/2020 2:27 PM

40. Kyle works for National Sporting Goods, where he manages critical data elements, such as identifying and acquiring new data sources, creating consistent reference data, and analyzing data for quality. Kyle is a _______. a. data steward b. data administrator c. database administrator d. data manager ANSWER: a RATIONALE: The data steward is typically a non-IS employee who takes responsibility for the management of critical data entities or attributes. This includes identifying and acquiring new data sources to obtain the desired data entity or attribute; creating and maintaining consistent reference data and master data definitions; analyzing data for quality, and reconciling data issues. FEEDBACK: a. The data steward is typically a non-IS employee who takes responsibility for the management of critical data entities or attributes. This includes identifying and acquiring new data sources to obtain the desired data entity or attribute; creating and maintaining consistent reference data and master data definitions; analyzing data for quality, and reconciling data issues. b. The data steward is typically a non-IS employee who takes responsibility for the management of critical data entities or attributes. This includes identifying and acquiring new data sources to obtain the desired data entity or attribute; creating and maintaining consistent reference data and master data definitions; analyzing data for quality, and reconciling data issues. c. The data steward is typically a non-IS employee who takes responsibility for the management of critical data entities or attributes. This includes identifying and acquiring new data sources to obtain the desired data entity or attribute; creating and maintaining consistent reference data and master data definitions; analyzing data for quality, and reconciling data issues. d. The data steward is typically a non-IS employee who takes responsibility for the management of critical data entities or attributes. This includes identifying and acquiring new data sources to obtain the desired data entity or attribute; creating and maintaining consistent reference data and master data definitions; analyzing data for quality, and reconciling data issues.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.16 - Define the role of a database administrator. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 2:52 PM 41. At Coast-to-Coast Moving and Van Lines, Ryan is responsible for managing the flow of the company's data, from initial acquisition of new data to deletion of old, outdated data. Ryan is involved in ___________. a. data normalization b. data lifecycle management Copyright Cengage Learning. Powered by Cognero.

Page 24


Chapter 05 - Database Systems and Management c. database projection d. DML operations ANSWER: b RATIONALE: Data lifecycle management (DLM) is a policy-based approach to managing the flow of an enterprise’s data, from its initial acquisition or creation and storage to the time when it becomes outdated and is deleted. FEEDBACK: a. Data lifecycle management (DLM) is a policy-based approach to managing the flow of an enterprise’s data, from its initial acquisition or creation and storage to the time when it becomes outdated and is deleted. b. Data lifecycle management (DLM) is a policy-based approach to managing the flow of an enterprise’s data, from its initial acquisition or creation and storage to the time when it becomes outdated and is deleted. c. Data lifecycle management (DLM) is a policy-based approach to managing the flow of an enterprise’s data, from its initial acquisition or creation and storage to the time when it becomes outdated and is deleted. d. Data lifecycle management (DLM) is a policy-based approach to managing the flow of an enterprise’s data, from its initial acquisition or creation and storage to the time when it becomes outdated and is deleted.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.15 - Identify four key responsibilities of the data governance team. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 2:57 PM 42. Raw facts such as a social security number or catalog item number for a shirt are known as _____. a. data b. knowledge c. information d. entities ANSWER: a RATIONALE: Data consists of raw facts, such as an employee number, total hours worked in a week, an inventory part number, or the number of units produced on a production line. Several types of data can represent these facts. FEEDBACK: a. Data consists of raw facts, such as an employee number, total hours worked in a week, an inventory part number, or the number of units produced on a production line. b. Data consists of raw facts, such as an employee number, total hours worked in a week, an inventory part number, or the number of units produced on a production line. c. Data consists of raw facts, such as an employee number, total hours worked in a week, an inventory part number, or the number of units produced on a production line. d. Data consists of raw facts, such as an employee number, total hours worked in a week, an inventory part number, or the number of units produced on a production

Copyright Cengage Learning. Powered by Cognero.

Page 25


Chapter 05 - Database Systems and Management line.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data, Information, and Knowledge QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.1 - Distinguish data from information and knowledge. KEYWORDS: Bloom's: Remember DATE CREATED: 2/8/2020 4:16 PM DATE MODIFIED: 2/8/2020 4:23 PM 43. When rules and relationships are set up to organize raw facts, creating value beyond that of those individual facts, this produces _____. a. data b. knowledge c. information d. entities ANSWER: c RATIONALE: Information is a collection of data organized and processed so that it has additional value beyond the value of the individual facts. For example, a sales manager may want individual sales data summarized so it shows the total sales for the month, sales by salesperson, or sales by product line. Rules and relationships can be set up to organize data so it becomes useful, valuable information. FEEDBACK: a. Information is a collection of data organized and processed so that it has additional value beyond the value of the individual facts. b. Information is a collection of data organized and processed so that it has additional value beyond the value of the individual facts. c. Information is a collection of data organized and processed so that it has additional value beyond the value of the individual facts. d. Information is a collection of data organized and processed so that it has additional value beyond the value of the individual facts.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data, Information, and Knowledge QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.1 - Distinguish data from information and knowledge. KEYWORDS: Bloom's: Remember DATE CREATED: 2/8/2020 4:20 PM DATE MODIFIED: 2/8/2020 4:27 PM 44. What is the term for the awareness and understanding that are required to define relationships among raw facts by organizing and processing them? a. data b. knowledge c. information Copyright Cengage Learning. Powered by Cognero.

Page 26


Chapter 05 - Database Systems and Management d. entities ANSWER: RATIONALE:

FEEDBACK:

b Information is a collection of data organized and processed so that it has additional value beyond the value of the individual facts. The process of defining relationships among data to create useful information requires knowledge, which is the awareness and understanding of a set of information and the ways in which that information can be made useful to support a specific task or reach a decision. In other words, information is essentially data made more useful through the application of knowledge. a. The process of defining relationships among data to create useful information

requires knowledge, which is the awareness and understanding of a set of information and the ways in which that information can be made useful to support a specific task or reach a decision. b. The process of defining relationships among data to create useful information requires knowledge, which is the awareness and understanding of a set of information and the ways in which that information can be made useful to support a specific task or reach a decision. c. The process of defining relationships among data to create useful information requires knowledge, which is the awareness and understanding of a set of information and the ways in which that information can be made useful to support a specific task or reach a decision. d. The process of defining relationships among data to create useful information requires knowledge, which is the awareness and understanding of a set of information and the ways in which that information can be made useful to support a specific task or reach a decision.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data, Information, and Knowledge QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.1 - Distinguish data from information and knowledge. KEYWORDS: Bloom's: Remember DATE CREATED: 2/8/2020 4:20 PM DATE MODIFIED: 2/8/2020 4:34 PM 45. Titus tells his supervisor that he believes their company's information is error free but that much of what they are reporting is not important to making business decisions. Titus is saying that their information is _____. a. verifiable but not timely b. accessible but not secure c. accurate but not relevant d. reliable but not complete ANSWER: c RATIONALE: Accurate information is error free. Relevant information is important to the decision maker. FEEDBACK: a. Accurate information is error free. Relevant information is important to the decision maker. b. Accurate information is error free. Relevant information is important to the decision maker. c. Accurate information is error free. Relevant information is important to the decision maker.

Copyright Cengage Learning. Powered by Cognero.

Page 27


Chapter 05 - Database Systems and Management d. Accurate information is error free. Relevant information is important to the decision maker.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Benefits Gained Through Use of High-Quality Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.2 - Identify six benefits gained through use of high-quality data. KEYWORDS: Bloom's: Remember DATE CREATED: 2/8/2020 4:35 PM DATE MODIFIED: 2/8/2020 4:47 PM 46. Billing errors, even small ones, can make customers quite upset. Therefore, maintaining high-quality data with regards to product pricing, discounts, and sales taxes benefits businesses most directly by _____. a. increasing sales b. increasing customer satisfaction c. improving decision making d. improving innovation ANSWER: b RATIONALE: High-quality data increases customer satisfaction. Customer satisfaction with your store, Web site, or product will certainly be lower if the data quality is poor. Every customer wants to pay a fair, correct price for the product they want without experiencing issues that bad data could cause. Customers become quite upset when there are billing errors in their statements even if the amount is relatively small. Customer ill will is created whether the billing errors were intentional or not. FEEDBACK: a. High-quality data increases customer satisfaction. Customer satisfaction with your store, Web site, or product will certainly be lower if the data quality is poor. Every customer wants to pay a fair, correct price for the product they want without experiencing issues that bad data could cause. b. High-quality data increases customer satisfaction. Customer satisfaction with your store, Web site, or product will certainly be lower if the data quality is poor. Every customer wants to pay a fair, correct price for the product they want without experiencing issues that bad data could cause. c. High-quality data increases customer satisfaction. Customer satisfaction with your store, Web site, or product will certainly be lower if the data quality is poor. Every customer wants to pay a fair, correct price for the product they want without experiencing issues that bad data could cause. d. High-quality data increases customer satisfaction. Customer satisfaction with your store, Web site, or product will certainly be lower if the data quality is poor. Every customer wants to pay a fair, correct price for the product they want without experiencing issues that bad data could cause.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Benefits Gained Through Use of High-Quality Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.2 - Identify six benefits gained through use of high-quality data. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 28


Chapter 05 - Database Systems and Management DATE CREATED: DATE MODIFIED:

2/8/2020 4:37 PM 2/9/2020 7:36 AM

47. High-quality data can increase sales by facilitating cross-selling, which involves _____. a. delivering a generalized shopping experience to customers b. ensuring customers pay a fair, correct price for each product they purchase c. encouraging customers to buy a comparable but higher-end product d. inviting customers to purchase an item related to what they are primarily interested in ANSWER: d RATIONALE: High-quality data can increase sales by enabling salespeople to make successful up-sell and cross-sell suggestions. Cross-selling involves inviting customers to purchase an item related to what they are primarily interested in. Up-selling involves encouraging customers to buy a comparable, but higher-end product. FEEDBACK: a. Cross-selling involves inviting customers to purchase an item related to what they are primarily interested in. b. Cross-selling involves inviting customers to purchase an item related to what they are primarily interested in. c. Cross-selling involves inviting customers to purchase an item related to what they are primarily interested in. d. Cross-selling involves inviting customers to purchase an item related to what they are primarily interested in.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Benefits Gained Through Use of High-Quality Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.2 - Identify six benefits gained through use of high-quality data. KEYWORDS: Bloom's: Remember DATE CREATED: 2/8/2020 4:37 PM DATE MODIFIED: 2/9/2020 7:41 AM 48. High-quality data on the operations of the business is the primary ingredient of any effort to improve _____. a. worker efficiency or service quality b. competitive advantage c. customer experiences or satisfaction d. IS security ANSWER: a RATIONALE: High-quality data on the operations of the business is the primary ingredient of any process improvement effort. Such efforts are often aimed at improving worker efficiency, product and/or service quality, or the customer experience. FEEDBACK: a. High-quality data on the operations of the business is the primary ingredient of any process improvement effort. Such efforts are often aimed at improving worker efficiency, product and/or service quality, or the customer experience. b. High-quality data on the operations of the business is the primary ingredient of any process improvement effort. Such efforts are often aimed at improving worker efficiency, product and/or service quality, or the customer experience. c. High-quality data on the operations of the business is the primary ingredient of

Copyright Cengage Learning. Powered by Cognero.

Page 29


Chapter 05 - Database Systems and Management any process improvement effort. Such efforts are often aimed at improving worker efficiency, product and/or service quality, or the customer experience. d. High-quality data on the operations of the business is the primary ingredient of any process improvement effort. Such efforts are often aimed at improving worker efficiency, product and/or service quality, or the customer experience.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Benefits Gained Through Use of High-Quality Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.2 - Identify six benefits gained through use of high-quality data. KEYWORDS: Bloom's: Remember DATE CREATED: 2/8/2020 4:37 PM DATE MODIFIED: 2/9/2020 7:48 AM 49. Allie has noticed that people at her company spend a lot of time researching the reasons for and correcting errors in the data they must use for their job functions. Usually when a mistake is discovered, it has already been propagated into multiple places, requiring a considerable clean-up effort. Allie realizes that improving the quality of the data at her firm would change this situation by _____. a. increasing sales b. improving decision making c. facilitating innovation d. raising productivity ANSWER: d RATIONALE: Good-quality data enables employees to be more productive. Instead of spending time researching the reasons for and correcting data errors, they can focus on their core mission. Should bad data slip through and update the information in a database, it may result in actions that require considerable effort to correct. FEEDBACK: a. Good-quality data enables employees to be more productive. Instead of spending time researching the reasons for and correcting data errors, they can focus on their core mission. b. Good-quality data enables employees to be more productive. Instead of spending time researching the reasons for and correcting data errors, they can focus on their core mission. c. Good-quality data enables employees to be more productive. Instead of spending time researching the reasons for and correcting data errors, they can focus on their core mission. d. Good-quality data enables employees to be more productive. Instead of spending time researching the reasons for and correcting data errors, they can focus on their core mission.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Benefits Gained Through Use of High-Quality Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.2 - Identify six benefits gained through use of high-quality data. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 30


Chapter 05 - Database Systems and Management DATE CREATED: DATE MODIFIED:

2/8/2020 4:37 PM 2/9/2020 7:53 AM

50. Why are data quality problems especially problematic for hospitals or physicians' practices? a. They may result in audits, investigations, and/or fraud charges. b. They decrease customer satisfaction more than for retailers. c. They slow down innovation through process improvements. d. They reduce cross-selling and up-selling opportunities. ANSWER: a RATIONALE: There are several governmental and industry regulations such as General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA), and Payment Card Industry-Data Security Standard (PCI-DSS). These regulations and many others place specific requirements on how certain types of data are managed, protected, and reported. If the data is not accurate, there can be severe consequences, including significant fines and more. In the case of a hospital or medical practice, medical coding and billing mistakes may trigger audits and investigations. Such mistakes may even lead to charges of fraud, forever damaging the reputation of the hospital or medical practice. FEEDBACK: a. In the case of a hospital or medical practice, medical coding and billing mistakes may trigger audits and investigations. Such mistakes may even lead to charges of fraud. b. In the case of a hospital or medical practice, medical coding and billing mistakes may trigger audits and investigations. Such mistakes may even lead to charges of fraud. c. In the case of a hospital or medical practice, medical coding and billing mistakes may trigger audits and investigations. Such mistakes may even lead to charges of fraud. d. In the case of a hospital or medical practice, medical coding and billing mistakes may trigger audits and investigations. Such mistakes may even lead to charges of fraud.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Benefits Gained Through Use of High-Quality Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.2 - Identify six benefits gained through use of high-quality data. KEYWORDS: Bloom's: Remember DATE CREATED: 2/8/2020 4:37 PM DATE MODIFIED: 2/10/2020 7:10 AM 51. A group of programs used to access and manage a database as well as provide an interface between the database and its users and other application programs is called a _____. a. database b. database management system c. data model d. data definition system ANSWER: b RATIONALE: To use the database approach to data management, additional software—a database Copyright Cengage Learning. Powered by Cognero.

Page 31


Chapter 05 - Database Systems and Management management system (DBMS)—is required. A database management system (DBMS) consists of a group of programs provided by the DBMS supplier that are used to access and manage a database as well as provide an interface between the database and its users and other application programs. FEEDBACK:

a. A database management system (DBMS) consists of a group of programs

provided by the DBMS supplier that are used to access and manage a database as well as provide an interface between the database and its users and other application programs. b. A database management system (DBMS) consists of a group of programs provided by the DBMS supplier that are used to access and manage a database as well as provide an interface between the database and its users and other application programs. c. A database management system (DBMS) consists of a group of programs provided by the DBMS supplier that are used to access and manage a database as well as provide an interface between the database and its users and other application programs. d. A database management system (DBMS) consists of a group of programs provided by the DBMS supplier that are used to access and manage a database as well as provide an interface between the database and its users and other application programs.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Database Approach QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.4 - Define the term database management system. KEYWORDS: Bloom's: Remember DATE CREATED: 2/10/2020 7:24 AM DATE MODIFIED: 2/10/2020 7:33 AM 52. In an information system based on the database approach to data management, the database management system _____. a. provides a single point of management and control over data resources b. defines the tables, the attributes in each table, and the relationships between attributes and tables c. shares a pool of related data with several other application programs d. defines and describes data and relationships in a specific database ANSWER: a RATIONALE: A database management system (DBMS) consists of a group of programs provided by the DBMS supplier that are used to access and manage a database as well as provide an interface between the database and its users and other application programs. A DBMS provides a single point of management and control over data resources, which can be critical to maintaining the integrity and security of the data. FEEDBACK: a. A DBMS provides a single point of management and control over data resources, which can be critical to maintaining the integrity and security of the data.

b. A DBMS provides a single point of management and control over data resources, which can be critical to maintaining the integrity and security of the data. c. A DBMS provides a single point of management and control over data resources, which can be critical to maintaining the integrity and security of the data. d. A DBMS provides a single point of management and control over data resources, Copyright Cengage Learning. Powered by Cognero.

Page 32


Chapter 05 - Database Systems and Management which can be critical to maintaining the integrity and security of the data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Database Approach QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.4 - Define the term database management system. KEYWORDS: Bloom's: Remember DATE CREATED: 2/10/2020 7:26 AM DATE MODIFIED: 2/10/2020 7:39 AM 53. Which process consists of one application program following a logical access path (LAP) and then a DBMS following a physical access path (PAP)? a. access privilege definition b. data manipulation c. concurrency control d. data retrieval ANSWER: d RATIONALE: When an end user, application program, or other software needs data from the database, it requests the data through the DBMS. Suppose an application program requests pricing data from the DBMS. In doing so, the application program follows a logical access path (LAP). Next, the DBMS, working with various system programs, accesses a storage device, such as a disk drive or solid-state storage device (SSD), where the data is stored. When the DBMS goes to this storage device to retrieve the data, it follows a path to the physical location— physical access path—where the price of this option is stored. FEEDBACK: a. During data retrieval, the application program follows a logical access path (LAP). Next, the DBMS, working with various system programs, accesses a storage device, such as a disk drive or solid-state storage device (SSD), where the data is stored. When the DBMS goes to this storage device to retrieve the data, it follows a path to the physical location—physical access path—where the data is stored. b. During data retrieval, the application program follows a logical access path (LAP). Next, the DBMS, working with various system programs, accesses a storage device, such as a disk drive or solid-state storage device (SSD), where the data is stored. When the DBMS goes to this storage device to retrieve the data, it follows a path to the physical location—physical access path—where the data is stored. c. During data retrieval, the application program follows a logical access path (LAP). Next, the DBMS, working with various system programs, accesses a storage device, such as a disk drive or solid-state storage device (SSD), where the data is stored. When the DBMS goes to this storage device to retrieve the data, it follows a path to the physical location—physical access path—where the data is stored. d. During data retrieval, the application program follows a logical access path (LAP). Next, the DBMS, working with various system programs, accesses a storage device, such as a disk drive or solid-state storage device (SSD), where the data is stored. When the DBMS goes to this storage device to retrieve the data, it follows a path to the physical location—physical access path—where the data is stored.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Database Activities Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 33


Chapter 05 - Database Systems and Management HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.5 - Identify six functions performed by a database management system. KEYWORDS: Bloom's: Remember DATE CREATED: 2/10/2020 7:42 AM DATE MODIFIED: 2/10/2020 7:54 AM 54. Mollie's company is having problems with their data integrity because multiple database users sometimes access and alter a record at the same time. A database management system could eliminate these problems by implementing _____. a. a logical access path b. data definition languages c. concurrency control d. a schema ANSWER: c RATIONALE: Two or more people or programs attempting to access the same record at the same time can cause a problem. For example, an inventory control program might attempt to reduce the inventory level for a product by 10 units because 10 units were just shipped to a customer. At the same time, a purchasing program might attempt to increase the inventory level for the same product by 200 units because inventory was just received. Without proper database control, one of the inventory updates might be incorrect, resulting in an inaccurate inventory level for the product. Concurrency control can be used to avoid this potential problem. One approach is to lock out all other application programs from access to a record if the record is being updated or used by another program. FEEDBACK: a. Two or more people or programs attempting to access the same record at the same time can cause a problem. Concurrency control can be used to avoid this potential problem. b. Two or more people or programs attempting to access the same record at the same time can cause a problem. Concurrency control can be used to avoid this potential problem. c. Two or more people or programs attempting to access the same record at the same time can cause a problem. Concurrency control can be used to avoid this potential problem. d. Two or more people or programs attempting to access the same record at the same time can cause a problem. Concurrency control can be used to avoid this potential problem.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Database Activities QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.5 - Identify six functions performed by a database management system. KEYWORDS: Bloom's: Remember DATE CREATED: 2/10/2020 7:43 AM DATE MODIFIED: 2/10/2020 8:02 AM 55. The following DBMS query is an example of what resource provided with a DBMS? SELECT * FROM EMPLOYEE WHERE JOB_CLASSIFICATION-"C2" a. data definition language b. data dictionary entry Copyright Cengage Learning. Powered by Cognero.

Page 34


Chapter 05 - Database Systems and Management c. data manipulation language d. Query by Example ANSWER: c RATIONALE: Here’s an example of a DBMS query: SELECT * FROM EMPLOYEE WHERE JOB_CLASSIFICATION=“C2.” The asterisk (*) tells the program to include all columns from the EMPLOYEE table. In general, the commands that are used to manipulate the database are part of the data manipulation language (DML). This specific language, provided with the DBMS, allows managers and other database users to access and modify the data, to make queries, and to generate reports. FEEDBACK:

a. In general, the commands that are used to manipulate the database are part of

the data manipulation language (DML). This specific language, provided with the DBMS, allows managers and other database users to access and modify the data, to make queries, and to generate reports. b. In general, the commands that are used to manipulate the database are part of the data manipulation language (DML). This specific language, provided with the DBMS, allows managers and other database users to access and modify the data, to make queries, and to generate reports. c. In general, the commands that are used to manipulate the database are part of the data manipulation language (DML). This specific language, provided with the DBMS, allows managers and other database users to access and modify the data, to make queries, and to generate reports. d. In general, the commands that are used to manipulate the database are part of the data manipulation language (DML). This specific language, provided with the DBMS, allows managers and other database users to access and modify the data, to make queries, and to generate reports.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Database Activities QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.6 - Define the roles of the database schema, data definition language, and data manipulation language. KEYWORDS: Bloom's: Remember DATE CREATED: 2/10/2020 8:03 AM DATE MODIFIED: 2/10/2020 8:21 AM 56. Which of the following DBMS elements can be represented in a visual diagram or defined using a DDL? a. DML b. permissions c. data dictionary d. schema ANSWER: d RATIONALE: A database schema can be represented in a visual diagram showing the database objects and their relationship with one another. The database schema can also be defined using a data definition language. A data definition language (DDL) is a collection of instructions and commands used to define and describe data and relationships in a specific database. Copyright Cengage Learning. Powered by Cognero.

Page 35


Chapter 05 - Database Systems and Management FEEDBACK:

a. A database schema can be represented in a visual diagram or defined using a data definition language.

b. A database schema can be represented in a visual diagram or defined using a data definition language. c. A database schema can be represented in a visual diagram or defined using a data definition language. d. A database schema can be represented in a visual diagram or defined using a data definition language.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Database Activities QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.6 - Define the roles of the database schema, data definition language, and data manipulation language. KEYWORDS: Bloom's: Remember DATE CREATED: 2/10/2020 8:04 AM DATE MODIFIED: 2/10/2020 8:27 AM 57. Haley needs to query her firm's database, Jeff needs to generate a report for his next project status meeting, and Karen needs to make some modifications to update the data in the database. Which of the following tools can they all use to complete their current task? a. data dictionary b. data manipulation language c. data definition language d. These tasks require different tools. ANSWER: b RATIONALE: In general, the commands that are used to manipulate the database are part of the data manipulation language (DML). This specific language, provided with the DBMS, allows managers and other database users to access and modify the data, to make queries, and to generate reports. FEEDBACK: a. The data manipulation language (DML), provided with the DBMS, allows managers and other database users to access and modify the data, to make queries, and to generate reports. b. The data manipulation language (DML), provided with the DBMS, allows managers and other database users to access and modify the data, to make queries, and to generate reports. c. The data manipulation language (DML), provided with the DBMS, allows managers and other database users to access and modify the data, to make queries, and to generate reports. d. The data manipulation language (DML), provided with the DBMS, allows managers and other database users to access and modify the data, to make queries, and to generate reports.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Easy Database Activities Multiple Choice False

Copyright Cengage Learning. Powered by Cognero.

Page 36


Chapter 05 - Database Systems and Management LEARNING OBJECTIVES: POIS.14e.5.6 - Define the roles of the database schema, data definition language, and data manipulation language. KEYWORDS: Bloom's: Remember DATE CREATED: 2/10/2020 8:05 AM DATE MODIFIED: 2/14/2020 1:36 PM 58. What process detects and then corrects or deletes “bad data”? a. data recovery b. data enhancement c. data cleansing d. data validation ANSWER: c RATIONALE: Data cleansing is the process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, or irrelevant records that reside in a database. Data cleansing is different from data validation, which involves the identification of “bad data” and its rejection at the time of data entry. FEEDBACK: a. Data cleansing is the process of detecting and then correcting or deleting

incomplete, incorrect, inaccurate, or irrelevant records that reside in a database. b. Data cleansing is the process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, or irrelevant records that reside in a database. c. Data cleansing is the process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, or irrelevant records that reside in a database. d. Data cleansing is the process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, or irrelevant records that reside in a database.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Cleansing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.7 - Define the term data cleansing. KEYWORDS: Bloom's: Remember DATE CREATED: 2/14/2020 1:39 PM DATE MODIFIED: 2/14/2020 1:43 PM 59. Why is cleansing data so that it is accurate, complete, and relevant important to an organization's success? a. Security breaches can be avoided through data validation. b. Power outages require careful recovery management. c. Data cleansing prevents user data-entry errors. d. Information derived from the data is used in decision making. ANSWER: d RATIONALE: Data used in decision making must be accurate, complete, economical, flexible, reliable, relevant, simple, timely, verifiable, accessible, and secure. The goal of data cleansing is to improve the quality of the data used in decision making. FEEDBACK: a. The goal of data cleansing is to improve the quality of the data used in decision making. b. The goal of data cleansing is to improve the quality of the data used in decision

Copyright Cengage Learning. Powered by Cognero.

Page 37


Chapter 05 - Database Systems and Management making.

c. The goal of data cleansing is to improve the quality of the data used in decision making. d. The goal of data cleansing is to improve the quality of the data used in decision making.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Cleansing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.7 - Define the term data cleansing. KEYWORDS: Bloom's: Remember DATE CREATED: 2/14/2020 1:41 PM DATE MODIFIED: 2/14/2020 1:53 PM 60. One method of data cleansing is to _____. a. cross-check data items against a validated data set b. adjust an attribute's domain to accept more possible values c. restrict data modification privileges to fewer users d. align entities more clearly in tables using the primary key ANSWER: a RATIONALE: One data cleansing solution is to identify and correct data by cross-checking it against a validated data set. For example, street number, street name, city, state, and zip code entries in an organization’s database may be cross-checked against the United States Postal Zip Code database. Data cleansing may also involve standardization of data, such as the conversion of various possible abbreviations (St., St, st., st) to one standard name (Street). FEEDBACK: a. One data cleansing solution is to identify and correct data by cross-checking it against a validated data set.

b. One data cleansing solution is to identify and correct data by cross-checking it against a validated data set. c. One data cleansing solution is to identify and correct data by cross-checking it against a validated data set. d. One data cleansing solution is to identify and correct data by cross-checking it against a validated data set.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Cleansing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.7 - Define the term data cleansing. KEYWORDS: Bloom's: Remember DATE CREATED: 2/14/2020 1:41 PM DATE MODIFIED: 2/14/2020 2:05 PM 61. Which statement about maintaining accurate and complete data is true? a. The only source of "bad data" is user data-entry errors. Copyright Cengage Learning. Powered by Cognero.

Page 38


Chapter 05 - Database Systems and Management b. Data cleansing may involve standardizing data. c. Eliminating all "bad data" is a reasonable goal, even on a limited budget. d. Data enhancement techniques can fully substitute for data cleansing. ANSWER: b RATIONALE: “Bad data” may have been caused by user data-entry errors or by data corruption during data transmission or storage. Data cleansing may involve standardization of data, such as the conversion of various possible abbreviations (St., St, st., st) to one standard name (Street). Data enhancement augments the data in a database by adding related information—such as using the zip code information for a given record to append the county code or census tract code. The cost of performing data cleansing can be quite high. It is prohibitively expensive to eliminate all “bad data” to achieve 100 percent database accuracy. FEEDBACK: a. Data cleansing may involve standardization of data, such as the conversion of various possible abbreviations (St., St, st., st) to one standard name (Street). b. Data cleansing may involve standardization of data, such as the conversion of various possible abbreviations (St., St, st., st) to one standard name (Street). c. Data cleansing may involve standardization of data, such as the conversion of various possible abbreviations (St., St, st., st) to one standard name (Street). d. Data cleansing may involve standardization of data, such as the conversion of various possible abbreviations (St., St, st., st) to one standard name (Street).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Cleansing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.7 - Define the term data cleansing. KEYWORDS: Bloom's: Remember DATE CREATED: 2/14/2020 1:41 PM DATE MODIFIED: 2/14/2020 2:15 PM 62. Jesse's team is organizing the data in their company's relational database so that all data is stored in only one place and only related data is stored in any given table. What is this process called? a. conforming to ACID properties b. data normalization c. projecting d. selecting and joining ANSWER: b RATIONALE: Data normalization is the process of organizing the data in a relational database to eliminate data redundancy (all data is stored in only one place) and ensure data dependencies make sense (only storing related data in a table). FEEDBACK: a. Data normalization is the process of organizing the data in a relational database to eliminate data redundancy (all data is stored in only one place) and ensure data dependencies make sense (only storing related data in a table). b. Data normalization is the process of organizing the data in a relational database to eliminate data redundancy (all data is stored in only one place) and ensure data dependencies make sense (only storing related data in a table). c. Data normalization is the process of organizing the data in a relational database to eliminate data redundancy (all data is stored in only one place) and ensure data dependencies make sense (only storing related data in a table).

Copyright Cengage Learning. Powered by Cognero.

Page 39


Chapter 05 - Database Systems and Management d. Data normalization is the process of organizing the data in a relational database to eliminate data redundancy (all data is stored in only one place) and ensure data dependencies make sense (only storing related data in a table).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Manipulating Data in a Relational Database QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.10 - State the purpose of data normalization. KEYWORDS: Bloom's: Remember DATE CREATED: 2/14/2020 2:17 PM DATE MODIFIED: 2/14/2020 2:26 PM 63. Data normalization _____. a. is an integral part of all database as a service products b. provides reliable concurrency control c. eliminates redundancy and ensures data dependencies are sensible d. promotes atomicity, consistency, isolation, and durability ANSWER: c RATIONALE: Data normalization is the process of organizing the data in a relational database to eliminate data redundancy (all data is stored in only one place) and ensure data dependencies make sense (only storing related data in a table). FEEDBACK: a. Data normalization is the process of organizing the data in a relational database to eliminate data redundancy (all data is stored in only one place) and ensure data dependencies make sense (only storing related data in a table). b. Data normalization is the process of organizing the data in a relational database to eliminate data redundancy (all data is stored in only one place) and ensure data dependencies make sense (only storing related data in a table). c. Data normalization is the process of organizing the data in a relational database to eliminate data redundancy (all data is stored in only one place) and ensure data dependencies make sense (only storing related data in a table). d. Data normalization is the process of organizing the data in a relational database to eliminate data redundancy (all data is stored in only one place) and ensure data dependencies make sense (only storing related data in a table).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Manipulating Data in a Relational Database QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.10 - State the purpose of data normalization. KEYWORDS: Bloom's: Remember DATE CREATED: 2/14/2020 2:19 PM DATE MODIFIED: 2/14/2020 2:31 PM 64. How does data normalization improve the performance of relational databases? a. by reducing their required storage space b. by reducing data isolation Copyright Cengage Learning. Powered by Cognero.

Page 40


Chapter 05 - Database Systems and Management c. by delaying propagation of changes d. by reorganizing the data repeatedly ANSWER: a RATIONALE: Data normalization is a rigorous multi-step process that ensures that relational databases take up minimal storage space, resulting in improved database performance. Data normalization also isolates data so that additions, deletions, and modifications of an attribute can be made in just one table and then propagated through the rest of the database via the defined relationships. FEEDBACK: a. Data normalization is a rigorous multi-step process that ensures that relational databases take up minimal storage space, resulting in improved database performance. b. Data normalization is a rigorous multi-step process that ensures that relational databases take up minimal storage space, resulting in improved database performance. c. Data normalization is a rigorous multi-step process that ensures that relational databases take up minimal storage space, resulting in improved database performance. d. Data normalization is a rigorous multi-step process that ensures that relational databases take up minimal storage space, resulting in improved database performance.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Manipulating Data in a Relational Database QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.10 - State the purpose of data normalization. KEYWORDS: Bloom's: Remember DATE CREATED: 2/14/2020 2:19 PM DATE MODIFIED: 2/14/2020 2:38 PM 65. Data normalization involves _____. a. detecting and then correcting or deleting incomplete, inaccurate, or irrelevant records b. developing a data model that can be used to analyze and communicate data needs c. defining processes for ensuring that data can be trusted and used by the entire organization d. dividing a relational database into two or more tables and defining relationships between them ANSWER: d RATIONALE: Data normalization is a rigorous multi-step process that ensures that relational databases take up minimal storage space, resulting in improved database performance. This involves dividing a relational database into two or more tables and defining relationships between the tables. FEEDBACK: a. Data normalization involves dividing a relational database into two or more tables and defining relationships between the tables.

b. Data normalization involves dividing a relational database into two or more tables and defining relationships between the tables. c. Data normalization involves dividing a relational database into two or more tables and defining relationships between the tables. d. Data normalization involves dividing a relational database into two or more tables and defining relationships between the tables. Copyright Cengage Learning. Powered by Cognero.

Page 41


Chapter 05 - Database Systems and Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Manipulating Data in a Relational Database QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.10 - State the purpose of data normalization. KEYWORDS: Bloom's: Remember DATE CREATED: 2/14/2020 2:19 PM DATE MODIFIED: 2/14/2020 4:14 PM 66. Walter mentions to his manager that it would simplify the maintenance of their firm's relational database if changes made to data attributes in a single table would automatically be made throughout the database. What would best achieve this? a. data normalization b. selecting c. data cleansing d. concurrency control ANSWER: a RATIONALE: Data normalization isolates data so that additions, deletions, and modifications of an attribute can be made in just one table and then propagated through the rest of the database via the defined relationships. This simplifies database maintenance as various attributes change. FEEDBACK: a. Data normalization isolates data so that additions, deletions, and modifications of an attribute can be made in just one table and then propagated through the rest of the database via the defined relationships. b. Data normalization isolates data so that additions, deletions, and modifications of an attribute can be made in just one table and then propagated through the rest of the database via the defined relationships. c. Data normalization isolates data so that additions, deletions, and modifications of an attribute can be made in just one table and then propagated through the rest of the database via the defined relationships. d. Data normalization isolates data so that additions, deletions, and modifications of an attribute can be made in just one table and then propagated through the rest of the database via the defined relationships.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Manipulating Data in a Relational Database QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.10 - State the purpose of data normalization. KEYWORDS: Bloom's: Remember DATE CREATED: 2/14/2020 2:19 PM DATE MODIFIED: 2/14/2020 4:23 PM 67. A key purpose of data normalization is to eliminate _____. a. data redundancy b. data dependencies c. data isolation Copyright Cengage Learning. Powered by Cognero.

Page 42


Chapter 05 - Database Systems and Management d. data attributes ANSWER: RATIONALE:

FEEDBACK:

a Data normalization is the process of organizing the data in a relational database to eliminate data redundancy (all data is stored in only one place) and ensure data dependencies make sense (only storing related data in a table). Data normalization isolates data so that additions, deletions, and modifications of an attribute can be made in just one table and then propagated through the rest of the database via the defined relationships. a. Data normalization is the process of organizing the data in a relational database to eliminate data redundancy (all data is stored in only one place) and ensure data dependencies make sense (only storing related data in a table). b. Data normalization is the process of organizing the data in a relational database to eliminate data redundancy (all data is stored in only one place) and ensure data dependencies make sense (only storing related data in a table). c. Data normalization is the process of organizing the data in a relational database to eliminate data redundancy (all data is stored in only one place) and ensure data dependencies make sense (only storing related data in a table). d. Data normalization is the process of organizing the data in a relational database to eliminate data redundancy (all data is stored in only one place) and ensure data dependencies make sense (only storing related data in a table).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Manipulating Data in a Relational Database QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.10 - State the purpose of data normalization. KEYWORDS: Bloom's: Remember DATE CREATED: 2/14/2020 2:20 PM DATE MODIFIED: 2/14/2020 4:29 PM 68. Which of the following tools is a special-purpose programming language for accessing and manipulating data stored in a relational database that many programmers can readily understand and use? a. ACID b. SQL c. DDL d. C++ ANSWER: b RATIONALE: SQL is a special-purpose programming language for accessing and manipulating data stored in a relational database. Because SQL uses standardized and simplified procedures for retrieving, storing, and manipulating data, many programmers find it easy to understand and use—hence, its popularity. FEEDBACK: a. SQL is a special-purpose programming language for accessing and manipulating data stored in a relational database. b. SQL is a special-purpose programming language for accessing and manipulating data stored in a relational database. c. SQL is a special-purpose programming language for accessing and manipulating data stored in a relational database. d. SQL is a special-purpose programming language for accessing and manipulating data stored in a relational database.

Copyright Cengage Learning. Powered by Cognero.

Page 43


Chapter 05 - Database Systems and Management POINTS: 1 DIFFICULTY: Easy REFERENCES: SQL Databases QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.11 - Identify two key benefits of enforcing the ACID properties on SQL databases. TOPICS: Bloom's: Remember DATE CREATED: 2/14/2020 4:30 PM DATE MODIFIED: 2/14/2020 4:54 PM 69. Because SQL databases conform to ACID properties, _____. a. concurrency control is unimportant for their operation b. ANSI rejected SQL as a standard query language c. they perform more quickly than other database types d. their database transactions are processed reliably ANSWER: d RATIONALE: SQL databases conform to ACID properties (atomicity, consistency, isolation, durability), which were defined by Jim Gray soon after Edgar F. Codd’s work was published. These properties guarantee database transactions are processed reliably and ensure the integrity of data in the database. FEEDBACK: a. ACID properties guarantee database transactions are processed reliably and ensure the integrity of data in the database. b. ACID properties guarantee database transactions are processed reliably and ensure the integrity of data in the database. c. ACID properties guarantee database transactions are processed reliably and ensure the integrity of data in the database. d. ACID properties guarantee database transactions are processed reliably and ensure the integrity of data in the database.

POINTS: 1 DIFFICULTY: Easy REFERENCES: SQL Databases QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.11 - Identify two key benefits of enforcing the ACID properties on SQL databases. TOPICS: Bloom's: Remember DATE CREATED: 2/14/2020 4:32 PM DATE MODIFIED: 2/14/2020 5:02 PM 70. Brenda uses a SQL database that conforms to ACID properties at her job. She is happy to know that this guarantees _____. a. data security b. fast database recovery c. data integrity d. fast database performance Copyright Cengage Learning. Powered by Cognero.

Page 44


Chapter 05 - Database Systems and Management ANSWER: RATIONALE:

c SQL databases conform to ACID properties (atomicity, consistency, isolation, durability), which were defined by Jim Gray soon after Edgar F. Codd’s work was published. These properties guarantee database transactions are processed reliably and ensure the integrity of data in the database.

FEEDBACK:

a. ACID properties guarantee database transactions are processed reliably and ensure the integrity of data in the database. b. ACID properties guarantee database transactions are processed reliably and ensure the integrity of data in the database. c. ACID properties guarantee database transactions are processed reliably and ensure the integrity of data in the database. d. ACID properties guarantee database transactions are processed reliably and ensure the integrity of data in the database.

POINTS: 1 DIFFICULTY: Easy REFERENCES: SQL Databases QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.11 - Identify two key benefits of enforcing the ACID properties on SQL databases. TOPICS: Bloom's: Remember DATE CREATED: 2/14/2020 4:32 PM DATE MODIFIED: 2/14/2020 5:11 PM 71. Within a SQL database, achieving the property of atomicity means that attributes _____. a. are not considered durable values b. can be altered by more than one user at a time c. can safely be inconsistent across the database d. are values that have no component parts ANSWER: d RATIONALE: Basically, ACID principles mean that data is broken down to atomic values—that is, values that have no component parts—such as employee_ID, last_name, first_name, address_line_1, address_line_2, and city. The data in these atomic values remains consistent across the database. The data is isolated from other transactions until the current transaction is finished, and it is durable in the sense that the data should never be lost. FEEDBACK: a. Basically, ACID principles mean that data is broken down to atomic values—that is, values that have no component parts—such as employee_ID, last_name, first_name, address_line_1, address_line_2, and city. b. Basically, ACID principles mean that data is broken down to atomic values—that is, values that have no component parts—such as employee_ID, last_name, first_name, address_line_1, address_line_2, and city. c. Basically, ACID principles mean that data is broken down to atomic values—that is, values that have no component parts—such as employee_ID, last_name, first_name, address_line_1, address_line_2, and city. d. Basically, ACID principles mean that data is broken down to atomic values—that is, values that have no component parts—such as employee_ID, last_name, first_name, address_line_1, address_line_2, and city.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 45


Chapter 05 - Database Systems and Management DIFFICULTY: Easy REFERENCES: SQL Databases QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.11 - Identify two key benefits of enforcing the ACID properties on SQL databases. TOPICS: Bloom's: Remember DATE CREATED: 2/14/2020 4:32 PM DATE MODIFIED: 2/14/2020 5:22 PM 72. When John uses his organization's SQL database, records are locked when he initiates a transaction to prevent other transactions from modifying them until his transaction either succeeds or fails. This maintains data _____. a. atomicity b. concurrency c. isolation d. definitions ANSWER: c RATIONALE: ACID principles mean that the data is isolated from other transactions until the current transaction is finished, and it is durable in the sense that the data should never be lost. SQL databases rely upon concurrency control by locking database records to ensure that other transactions do not modify the database until the first transaction succeeds or fails. FEEDBACK: a. ACID principles mean that the data is isolated from other transactions until the current transaction is finished, and it is durable in the sense that the data should never be lost. SQL databases rely upon concurrency control by locking database records to ensure that other transactions do not modify the database until the first transaction succeeds or fails. b. ACID principles mean that the data is isolated from other transactions until the current transaction is finished, and it is durable in the sense that the data should never be lost. SQL databases rely upon concurrency control by locking database records to ensure that other transactions do not modify the database until the first transaction succeeds or fails. c. ACID principles mean that the data is isolated from other transactions until the current transaction is finished, and it is durable in the sense that the data should never be lost. SQL databases rely upon concurrency control by locking database records to ensure that other transactions do not modify the database until the first transaction succeeds or fails. d. ACID principles mean that the data is isolated from other transactions until the current transaction is finished, and it is durable in the sense that the data should never be lost. SQL databases rely upon concurrency control by locking database records to ensure that other transactions do not modify the database until the first transaction succeeds or fails.

POINTS: 1 DIFFICULTY: Easy REFERENCES: SQL Databases QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.11 - Identify two key benefits of enforcing the ACID properties on SQL databases. TOPICS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 46


Chapter 05 - Database Systems and Management DATE CREATED: DATE MODIFIED:

2/14/2020 4:32 PM 2/14/2020 5:33 PM

73. Mike chooses a DaaS arrangement for his small business because it reduces costs. Why is DaaS less costly than the traditional alternative? a. no backup capabilities or security measures b. no in-house database installation, maintenance, or monitoring c. fixed database storage capacity d. promotional pricing intended to boost market presence ANSWER: b RATIONALE: With database as a service (DaaS), the database is stored on a service provider’s servers and accessed by the service subscriber over the Internet, with the database administration handled by the service provider. The big advantage of DaaS is that it eliminates the installation, maintenance, and monitoring of in-house databases thus reducing hardware, software, and staffing related costs. In addition, the service provider can allocate more or less database storage capacity based on an individual customer’s changing needs. FEEDBACK: a. The big advantage of DaaS is that it eliminates the installation, maintenance, and monitoring of in-house databases thus reducing hardware, software, and staffing related costs. b. The big advantage of DaaS is that it eliminates the installation, maintenance, and monitoring of in-house databases thus reducing hardware, software, and staffing related costs. c. The big advantage of DaaS is that it eliminates the installation, maintenance, and monitoring of in-house databases thus reducing hardware, software, and staffing related costs. d. The big advantage of DaaS is that it eliminates the installation, maintenance, and monitoring of in-house databases thus reducing hardware, software, and staffing related costs.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Popular Relational Database Management Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.12 - Identify two advantages associated with database as a service (DaaS). KEYWORDS: Bloom's: Remember DATE CREATED: 2/15/2020 2:02 PM DATE MODIFIED: 2/15/2020 2:14 PM 74. A DaaS arrangement can be especially cost effective for businesses that _____. a. host their own physical backup and recovery b. have fluctuating needs for database storage capacity c. require unusual data security processes be enforced d. prefer to build and maintain their own data centers ANSWER: b RATIONALE: With database as a service (DaaS), the database is stored on a service provider’s servers and accessed by the service subscriber over the Internet, with the database administration handled by the service provider. The big advantage of DaaS is that it eliminates the installation, Copyright Cengage Learning. Powered by Cognero.

Page 47


Chapter 05 - Database Systems and Management maintenance, and monitoring of in-house databases thus reducing hardware, software, and staffing related costs. In addition, the service provider can allocate more or less database storage capacity based on an individual customer’s changing needs. FEEDBACK:

a. An advantage of DaaS is that the service provider can allocate more or less

database storage capacity based on an individual customer’s changing needs. b. An advantage of DaaS is that the service provider can allocate more or less database storage capacity based on an individual customer’s changing needs. c. An advantage of DaaS is that the service provider can allocate more or less database storage capacity based on an individual customer’s changing needs. d. An advantage of DaaS is that the service provider can allocate more or less database storage capacity based on an individual customer’s changing needs.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Popular Relational Database Management Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.12 - Identify two advantages associated with database as a service (DaaS). KEYWORDS: Bloom's: Remember DATE CREATED: 2/15/2020 2:03 PM DATE MODIFIED: 2/15/2020 2:24 PM 75. Penelope decides to enroll in Amazon Relational Database Service (Amazon RDS), which allows her to set up and operate her choice of a MySQL, Microsoft SQL, Oracle, or PostgreSQL database in the cloud. What kind of service is Amazon RDS? a. data governance service b. database as a service c. DML d. DDL ANSWER: b RATIONALE: More than a dozen companies are now offering DaaS services including Amazon, Clustrix, Google, Heroku, IBM, Microsoft, MongoDB, and Oracle. Amazon Relational Database Service (Amazon RDS) is a DaaS that enables organizations to set up and operate their choice of a MySQL, Microsoft SQL, Oracle, or PostgreSQL relational database in the cloud. The service automatically backs up the database and stores those backups based on a userdefined retention period. FEEDBACK: a. Amazon Relational Database Service (Amazon RDS) is a DaaS that enables organizations to set up and operate their choice of a MySQL, Microsoft SQL, Oracle, or PostgreSQL relational database in the cloud. b. Amazon Relational Database Service (Amazon RDS) is a DaaS that enables organizations to set up and operate their choice of a MySQL, Microsoft SQL, Oracle, or PostgreSQL relational database in the cloud. c. Amazon Relational Database Service (Amazon RDS) is a DaaS that enables organizations to set up and operate their choice of a MySQL, Microsoft SQL, Oracle, or PostgreSQL relational database in the cloud. d. Amazon Relational Database Service (Amazon RDS) is a DaaS that enables organizations to set up and operate their choice of a MySQL, Microsoft SQL, Oracle, or PostgreSQL relational database in the cloud.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 48


Chapter 05 - Database Systems and Management DIFFICULTY: Easy REFERENCES: Popular Relational Database Management Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.12 - Identify two advantages associated with database as a service (DaaS). KEYWORDS: Bloom's: Remember DATE CREATED: 2/15/2020 2:04 PM DATE MODIFIED: 2/15/2020 2:38 PM 76. Because Airbnb needs to support a rapid growth in its number of users but prefers to hire a service to organize and configure its information systems infrastructure, it relies on a(n) _____. a. database as a service b. traditional database approach to data management c. data manipulation language provider d. entity-relationship diagram service ANSWER: a RATIONALE: Airbnb is an online marketplace that enables people to obtain short-term lodging including vacation rentals, apartment rentals, homestays, hostel beds, or hotel rooms in more than 65,000 cities and 191 countries. The company employs Amazon Web Services (AWS) to enable it to support the rapid growth in the number of its users without having to devote constant time and effort to organize and configure its information systems infrastructure. This includes the ability to process and analyze some 50 gigabytes of data daily and store over 10 terabytes of user pictures. FEEDBACK: a. Airbnb employs Amazon Web Services (AWS) as a DaaS to enable it to support the rapid growth in the number of its users without having to devote constant time and effort to organize and configure its information systems infrastructure. b. Airbnb employs Amazon Web Services (AWS) as a DaaS to enable it to support the rapid growth in the number of its users without having to devote constant time and effort to organize and configure its information systems infrastructure. c. Airbnb employs Amazon Web Services (AWS) as a DaaS to enable it to support the rapid growth in the number of its users without having to devote constant time and effort to organize and configure its information systems infrastructure. d. Airbnb employs Amazon Web Services (AWS) as a DaaS to enable it to support the rapid growth in the number of its users without having to devote constant time and effort to organize and configure its information systems infrastructure.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Popular Relational Database Management Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.12 - Identify two advantages associated with database as a service (DaaS). KEYWORDS: Bloom's: Remember DATE CREATED: 2/15/2020 2:04 PM DATE MODIFIED: 2/15/2020 3:11 PM 77. A DaaS arrangement _____. a. allows clients to install, maintain, and monitor database in-house Copyright Cengage Learning. Powered by Cognero.

Page 49


Chapter 05 - Database Systems and Management b. is much more expensive but also more secure than in-house databases c. reduces hardware, software, and staffing related costs for the client d. places the burden of protecting data from unauthorized access on the client ANSWER: c RATIONALE: With database as a service (DaaS), the database is stored on a service provider’s servers and accessed by the service subscriber over the Internet, with the database administration handled by the service provider. The big advantage of DaaS is that it eliminates the installation, maintenance, and monitoring of in-house databases thus reducing hardware, software, and staffing related costs. Customers must depend on the service provider to provide system backup capabilities and to protect customer data from unauthorized access. FEEDBACK: a. The big advantage of DaaS is that it eliminates the installation, maintenance, and monitoring of in-house databases thus reducing hardware, software, and staffing related costs. b. The big advantage of DaaS is that it eliminates the installation, maintenance, and monitoring of in-house databases thus reducing hardware, software, and staffing related costs. c. The big advantage of DaaS is that it eliminates the installation, maintenance, and monitoring of in-house databases thus reducing hardware, software, and staffing related costs. d. The big advantage of DaaS is that it eliminates the installation, maintenance, and monitoring of in-house databases thus reducing hardware, software, and staffing related costs.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Popular Relational Database Management Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.12 - Identify two advantages associated with database as a service (DaaS). KEYWORDS: Bloom's: Remember DATE CREATED: 2/15/2020 2:04 PM DATE MODIFIED: 2/15/2020 3:19 PM 78. What integrated set of functions defines the processes by which data is obtained, certified fit for use, stored, secured, and processed in such a way as to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users within an organization? a. data dictionary b. relational database model c. data management d. data governance ANSWER: c RATIONALE: Data management is an integrated set of functions that defines the processes by which data is obtained, certified fit for use, stored, secured, and processed in such a way as to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users within an organization. FEEDBACK: a. Data management is an integrated set of functions that defines the processes by which data is obtained, certified fit for use, stored, secured, and processed in such a way as to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users within an organization.

Copyright Cengage Learning. Powered by Cognero.

Page 50


Chapter 05 - Database Systems and Management b. Data management is an integrated set of functions that defines the processes by which data is obtained, certified fit for use, stored, secured, and processed in such a way as to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users within an organization. c. Data management is an integrated set of functions that defines the processes by which data is obtained, certified fit for use, stored, secured, and processed in such a way as to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users within an organization. d. Data management is an integrated set of functions that defines the processes by which data is obtained, certified fit for use, stored, secured, and processed in such a way as to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users within an organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.13 - Distinguish between data management and data governance. KEYWORDS: Bloom's: Remember DATE CREATED: 2/15/2020 3:20 PM DATE MODIFIED: 2/15/2020 3:28 PM 79. What core component of an integrated set of functions defining data processing defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization? a. data dictionary b. relational database model c. data management d. data governance ANSWER: d RATIONALE: Data governance is the core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization, with people identified and in place who are responsible for fixing and preventing issues with data. FEEDBACK: a. Data governance is the core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization, with people identified and in place who are responsible for fixing and preventing issues with data. b. Data governance is the core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization, with people identified and in place who are responsible for fixing and preventing issues with data. c. Data governance is the core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization, with people identified and in place who are responsible for fixing and preventing issues with data. d. Data governance is the core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization, with people identified and in place who are responsible for fixing and preventing issues with data.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 51


Chapter 05 - Database Systems and Management DIFFICULTY: Easy REFERENCES: Data Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.13 - Distinguish between data management and data governance. KEYWORDS: Bloom's: Remember DATE CREATED: 2/15/2020 3:22 PM DATE MODIFIED: 2/15/2020 3:34 PM 80. Rigorous management processes are needed to govern data in order to _____. a. evade external regulations that manage risk associated with financial data b. support haphazard or incomplete business processes c. inform key business decisions with high-quality data d. isolate data architecture management from security management ANSWER: c RATIONALE: The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data. Haphazard or incomplete business processes and controls simply will not meet these requirements. Rigorous management processes are needed to govern data. FEEDBACK: a. The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data. b. The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data. c. The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data. d. The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.14 - Identify three factors driving the need for data management. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 52


Chapter 05 - Database Systems and Management DATE CREATED: DATE MODIFIED:

2/15/2020 3:22 PM 2/15/2020 3:46 PM

81. Effective data governance _____. a. is best managed by a single department of the organization b. is best led by the information system organization rather than business managers c. requires that a single individual develop a complete view of the organization's data needs d. requires the active participation of a cross-functional, multilevel team ANSWER: d RATIONALE: Effective data governance requires business leadership and active participation and is an effort best led by business managers and not the information system organization. The data governance team should be a cross-functional and multilevel team, consisting of executives, project managers, line-of-business managers, and IS managers drawn from various areas of the business. The use of a cross-functional team is recommended because data and information systems are used by many different departments and no one individual has a complete view of the organization’s data needs. FEEDBACK: a. Effective data governance requires business leadership and active participation. The data governance team should be a cross-functional and multilevel team. b. Effective data governance requires business leadership and active participation. The data governance team should be a cross-functional and multilevel team. c. Effective data governance requires business leadership and active participation. The data governance team should be a cross-functional and multilevel team. d. Effective data governance requires business leadership and active participation. The data governance team should be a cross-functional and multilevel team.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.15 - Identify four key responsibilities of the data governance team. KEYWORDS: Bloom's: Remember DATE CREATED: 2/15/2020 3:23 PM DATE MODIFIED: 2/15/2020 3:57 PM 82. A data governance team puts in place a set of controls and audit procedures in order to _____. a. ensure ongoing compliance with organizational data policies and government regulations b. define who is authorized to update, access, and use the data c. establish how the data is to be stored, archived, backed up, and protected d. specify who is accountable for various portions or aspects of the data ANSWER: a RATIONALE: The data governance team develops a policy that specifies who is accountable for various portions or aspects of the data, including its accuracy, accessibility, consistency, completeness, updating, and archiving. The team defines processes for how the data is to be stored, archived, backed up, and protected from cyberattacks, inadvertent destruction or disclosure, or theft. It develops standards and procedures that define who is authorized to update, access, and use the data. The team also puts in place a set of controls and audit procedures to ensure ongoing compliance with organizational data policies and government Copyright Cengage Learning. Powered by Cognero.

Page 53


Chapter 05 - Database Systems and Management regulations. FEEDBACK:

a. The data governance team puts in place a set of controls and audit procedures to ensure ongoing compliance with organizational data policies and government regulations. b. The data governance team puts in place a set of controls and audit procedures to ensure ongoing compliance with organizational data policies and government regulations. c. The data governance team puts in place a set of controls and audit procedures to ensure ongoing compliance with organizational data policies and government regulations. d. The data governance team puts in place a set of controls and audit procedures to ensure ongoing compliance with organizational data policies and government regulations.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.15 - Identify four key responsibilities of the data governance team. KEYWORDS: Bloom's: Remember DATE CREATED: 2/15/2020 3:23 PM DATE MODIFIED: 2/15/2020 4:10 PM 83. Data quality management, data architecture management, and data development are three of the many functions of _____. a. data dictionaries b. data manipulation languages c. data management d. data governance ANSWER: c RATIONALE: The Data Management Association (DAMA) International is a nonprofit, vendorindependent, international association whose members promote the understanding, development, and practice of managing data as an essential enterprise asset. This organization has identified the major functions of data management as data architecture management, data development, database operations management, data security management, reference and master data management, data warehousing and business intelligence management, document and content management, meta data management, and data quality management. FEEDBACK: a. DAMA has identified the major functions of data management as data architecture management, data development, database operations management, data security management, reference and master data management, data warehousing and business intelligence management, document and content management, meta data management, and data quality management. b. DAMA has identified the major functions of data management as data architecture management, data development, database operations management, data security management, reference and master data management, data warehousing and business intelligence management, document and content management, meta data management, and data quality management. c. DAMA has identified the major functions of data management as data

Copyright Cengage Learning. Powered by Cognero.

Page 54


Chapter 05 - Database Systems and Management architecture management, data development, database operations management, data security management, reference and master data management, data warehousing and business intelligence management, document and content management, meta data management, and data quality management. d. DAMA has identified the major functions of data management as data architecture management, data development, database operations management, data security management, reference and master data management, data warehousing and business intelligence management, document and content management, meta data management, and data quality management.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.13 - Distinguish between data management and data governance. KEYWORDS: Bloom's: Remember DATE CREATED: 2/15/2020 4:15 PM DATE MODIFIED: 2/15/2020 4:24 PM 84. How is data governance different from data management? a. Data management is the core component of data governance. b. Data governance is the core component of data management. c. Data management involves defining processes, whereas data governance does not. d. Data governance involves defining processes, whereas data management does not. ANSWER: b RATIONALE: Data governance is the core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization, with people identified and in place who are responsible for fixing and preventing issues with data. FEEDBACK: a. Data governance is the core component of data management; it defines the roles,

responsibilities, and processes for ensuring that data can be trusted and used by the entire organization, with people identified and in place who are responsible for fixing and preventing issues with data. b. Data governance is the core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization, with people identified and in place who are responsible for fixing and preventing issues with data. c. Data governance is the core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization, with people identified and in place who are responsible for fixing and preventing issues with data. d. Data governance is the core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization, with people identified and in place who are responsible for fixing and preventing issues with data.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Data Management Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 55


Chapter 05 - Database Systems and Management HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.13 - Distinguish between data management and data governance. KEYWORDS: Bloom's: Remember DATE CREATED: 2/15/2020 4:26 PM DATE MODIFIED: 2/15/2020 4:31 PM 85. One thing that document and content management, data warehousing, business intelligence, and reference and master data management have in common is that they are functions of _____. a. data manipulation languages b. data dictionaries c. data governance d. data management ANSWER: d RATIONALE: The Data Management Association (DAMA) International is a nonprofit, vendorindependent, international association whose members promote the understanding, development, and practice of managing data as an essential enterprise asset. This organization has identified the major functions of data management as data architecture management, data development, database operations management, data security management, reference and master data management, data warehousing and business intelligence management, document and content management, meta data management, and data quality management. FEEDBACK: a. DAMA has identified the major functions of data management as data architecture management, data development, database operations management, data security management, reference and master data management, data warehousing and business intelligence management, document and content management, meta data management, and data quality management. b. DAMA has identified the major functions of data management as data architecture management, data development, database operations management, data security management, reference and master data management, data warehousing and business intelligence management, document and content management, meta data management, and data quality management. c. DAMA has identified the major functions of data management as data architecture management, data development, database operations management, data security management, reference and master data management, data warehousing and business intelligence management, document and content management, meta data management, and data quality management. d. DAMA has identified the major functions of data management as data architecture management, data development, database operations management, data security management, reference and master data management, data warehousing and business intelligence management, document and content management, meta data management, and data quality management.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.13 - Distinguish between data management and data governance. KEYWORDS: Bloom's: Remember DATE CREATED: 2/17/2020 12:14 PM Copyright Cengage Learning. Powered by Cognero.

Page 56


Chapter 05 - Database Systems and Management DATE MODIFIED:

2/17/2020 12:17 PM

86. One factor driving the need for data management is the need to meet external regulations designed to _____. a. mandate the release of sensitive financial data b. prevent haphazard or incomplete business processes c. manage risk associated with the misstatement of financial data d. ensure correct and prompt payment of federal taxes ANSWER: c RATIONALE: The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data. Haphazard or incomplete business processes and controls simply will not meet these requirements. Rigorous management processes are needed to govern data. FEEDBACK: a. The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data. b. The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data. c. The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data. d. The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.14 - Identify three factors driving the need for data management. KEYWORDS: Bloom's: Remember DATE CREATED: 2/17/2020 12:19 PM DATE MODIFIED: 2/17/2020 12:33 PM 87. Samuel's employer experiences a lot of bad publicity after sensitive customer data is accidentally released. Samuel recognizes that this is a sign of _____. a. primary key corruption b. quality information c. comprehensive data governance Copyright Cengage Learning. Powered by Cognero.

Page 57


Chapter 05 - Database Systems and Management d. poor data management ANSWER: d RATIONALE: The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data. Haphazard or incomplete business processes and controls simply will not meet these requirements. Rigorous management processes are needed to govern data. FEEDBACK: a. The need for data management is driven by a variety of factors, including the need to avoid the accidental release of sensitive data. b. The need for data management is driven by a variety of factors, including the need to avoid the accidental release of sensitive data. c. The need for data management is driven by a variety of factors, including the need to avoid the accidental release of sensitive data. d. The need for data management is driven by a variety of factors, including the need to avoid the accidental release of sensitive data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.14 - Identify three factors driving the need for data management. KEYWORDS: Bloom's: Remember DATE CREATED: 2/17/2020 12:20 PM DATE MODIFIED: 2/17/2020 12:40 PM 88. After Lindy's team improves their department's data management by implementing rigorous data management processes, _____. a. the quality of their data improves as well b. they realize that they still lack data governance c. measures to protect security are no longer required d. key business decisions must be delayed ANSWER: a RATIONALE: The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data. Haphazard or incomplete business processes and controls simply will not meet these requirements. Rigorous management processes are needed to govern data. FEEDBACK: a. The need for data management is driven by a variety of factors, including the need to ensure that key business decisions are made using high-quality data. b. The need for data management is driven by a variety of factors, including the need to ensure that key business decisions are made using high-quality data. c. The need for data management is driven by a variety of factors, including the need to ensure that key business decisions are made using high-quality data. d. The need for data management is driven by a variety of factors, including the need to ensure that key business decisions are made using high-quality data.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 58


Chapter 05 - Database Systems and Management DIFFICULTY: Easy REFERENCES: Data Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.14 - Identify three factors driving the need for data management. KEYWORDS: Bloom's: Remember DATE CREATED: 2/17/2020 12:21 PM DATE MODIFIED: 2/17/2020 12:51 PM 89. Ryleigh knows that it is crucial to ensure that key business decisions are made using high-quality data. She argues that this is one reason why her firm should invest in _____. a. a DDL b. increased data redundancy c. improved data management d. a DaaS ANSWER: c RATIONALE: The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data. Haphazard or incomplete business processes and controls simply will not meet these requirements. Rigorous management processes are needed to govern data. FEEDBACK: a. The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data. b. The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data. c. The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data. d. The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.14 - Identify three factors driving the need for data management. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 59


Chapter 05 - Database Systems and Management DATE CREATED: DATE MODIFIED:

2/17/2020 12:21 PM 2/17/2020 1:00 PM

90. A consultant hired to evaluate Blue Street Bank's business processes and controls judges that they are haphazard and incomplete. Bess, an executive at the bank, wisely says that _____. a. they must establish more rigorous management practices to govern their data b. this is not a significant cause for concern given the nature of their business c. no action is necessary since this does not violate external regulations d. while this is a problem, it cannot affect their ability to make good business decisions ANSWER: a RATIONALE: The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data. Haphazard or incomplete business processes and controls simply will not meet these requirements. Rigorous management processes are needed to govern data. FEEDBACK: a. The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data. b. The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data. c. The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data. d. The need for data management is driven by a variety of factors, including the need to meet external regulations designed to manage risk associated with the misstatement of financial data, the need to avoid the accidental release of sensitive data, and the need to ensure that key business decisions are made using high-quality data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.14 - Identify three factors driving the need for data management. KEYWORDS: Bloom's: Remember DATE CREATED: 2/17/2020 12:21 PM DATE MODIFIED: 2/17/2020 1:11 PM 91. An important responsibility of the data governance team is to _____. a. specify who is accountable for each portion or aspect of the data b. create updated entity-relationship diagrams on a regular basis Copyright Cengage Learning. Powered by Cognero.

Page 60


Chapter 05 - Database Systems and Management c. cross-check the data against a validated data set d. perform all data storage, backup, and archiving processes ANSWER: a RATIONALE: The data governance team develops a policy that specifies who is accountable for various portions or aspects of the data, including its accuracy, accessibility, consistency, completeness, updating, and archiving. FEEDBACK: a. The data governance team develops a policy that specifies who is accountable for various portions or aspects of the data, including its accuracy, accessibility, consistency, completeness, updating, and archiving. b. The data governance team develops a policy that specifies who is accountable for various portions or aspects of the data, including its accuracy, accessibility, consistency, completeness, updating, and archiving. c. The data governance team develops a policy that specifies who is accountable for various portions or aspects of the data, including its accuracy, accessibility, consistency, completeness, updating, and archiving. d. The data governance team develops a policy that specifies who is accountable for various portions or aspects of the data, including its accuracy, accessibility, consistency, completeness, updating, and archiving.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.15 - Identify four key responsibilities of the data governance team. KEYWORDS: Bloom's: Remember DATE CREATED: 2/17/2020 1:14 PM DATE MODIFIED: 2/17/2020 1:26 PM 92. Because of Felicity's job title, she has broader authorization to access, use, and update company data than Charity, a colleague with a different job title. Who developed the standards that define their authorization levels? a. data architecture management b. data governance team c. data steward d. Data Management Association ANSWER: b RATIONALE: The data governance team develops standards and procedures that define who is authorized to update, access, and use the data. FEEDBACK: a. The data governance team develops standards and procedures that define who is authorized to update, access, and use the data. b. The data governance team develops standards and procedures that define who is authorized to update, access, and use the data. c. The data governance team develops standards and procedures that define who is authorized to update, access, and use the data. d. The data governance team develops standards and procedures that define who is authorized to update, access, and use the data.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 61


Chapter 05 - Database Systems and Management REFERENCES: Data Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.15 - Identify four key responsibilities of the data governance team. KEYWORDS: Bloom's: Remember DATE CREATED: 2/17/2020 1:16 PM DATE MODIFIED: 2/17/2020 1:34 PM 93. Which statement accurately describes a data governance team? a. It develops policies for data security but not data accuracy, consistency, or completeness. b. It is most effective when it consists of a few senior members of the information system organization. c. It enforces policies, standards, and procedures developed by other teams. d. It defines processes for protecting data from cyberattacks, inadvertent destruction, or theft. ANSWER: d RATIONALE: The data governance team develops a policy that specifies who is accountable for various portions or aspects of the data, including its accuracy, accessibility, consistency, completeness, updating, and archiving. The team defines processes for how the data is to be stored, archived, backed up, and protected from cyberattacks, inadvertent destruction or disclosure, or theft. It develops standards and procedures that define who is authorized to update, access, and use the data. The team also puts in place a set of controls and audit procedures to ensure ongoing compliance with organizational data policies and government regulations. Two key members of the data governance team are the database administrator and data stewards. FEEDBACK: a. The data governance team defines processes for how the data is to be stored, archived, backed up, and protected from cyberattacks, inadvertent destruction or disclosure, or theft. b. The data governance team defines processes for how the data is to be stored, archived, backed up, and protected from cyberattacks, inadvertent destruction or disclosure, or theft. c. The data governance team defines processes for how the data is to be stored, archived, backed up, and protected from cyberattacks, inadvertent destruction or disclosure, or theft. d. The data governance team defines processes for how the data is to be stored, archived, backed up, and protected from cyberattacks, inadvertent destruction or disclosure, or theft.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.5.15 - Identify four key responsibilities of the data governance team. KEYWORDS: Bloom's: Remember DATE CREATED: 2/17/2020 1:16 PM DATE MODIFIED: 2/17/2020 1:47 PM Essay 94. Briefly describe the hierarchy of data. Copyright Cengage Learning. Powered by Cognero.

Page 62


Chapter 05 - Database Systems and Management ANSWER:

RATIONALE:

POINTS: RUBRIC:

The data hierarchy pyramid in Figure 5.1 shows that a database tops the data hierarchy, followed by a file, entity, and attribute. An entity is a person, place, or thing (object) for which data is collected, stored, and maintained. Examples of entities include employees, products, and customers. An attribute is a characteristic of an entity. For example, employee number, last name, first name, hire date, and department number are attributes for an employee. The specific value of an attribute, called a data item, can be found in the record describing an entity. A collection of attributes about a specific entity is a record. The data hierarchy pyramid in Figure 5.1 shows that a database tops the data hierarchy, followed by a file, entity, and attribute. An entity is a person, place, or thing (object) for which data is collected, stored, and maintained. Examples of entities include employees, products, and customers. An attribute is a characteristic of an entity. For example, employee number, last name, first name, hire date, and department number are attributes for an employee. The specific value of an attribute, called a data item, can be found in the record describing an entity. A collection of attributes about a specific entity is a record. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Names and defines the elements of the data hierarchy Describes how these elements relate within the hierarchy

DIFFICULTY: Moderate REFERENCES: The Data Hierarchy QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.5.3 - Define the components of the data hierarchy including attribute, entity, record, file, and database. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 3:02 PM 95. Outline the fundamental characteristics of a relational database. ANSWER: The relational database model is a simple but highly useful way to organize data into collections of two-dimensional tables called relations. A relational database has six fundamental characteristics: • • • • •

Data is organized into collections of two-dimensional tables called relations. Each row in the table represents an entity and each column represents an attribute of that entity. Each row in a table is uniquely identified by a primary key. The type of data a table column can contain can be specified as integer number, decimal number, date, text, etc. The data in a table column can be constrained to be of a certain type (integer,

Copyright Cengage Learning. Powered by Cognero.

Page 63


Chapter 05 - Database Systems and Management

• • RATIONALE:

The relational database model is a simple but highly useful way to organize data into collections of two-dimensional tables called relations. A relational database has six fundamental characteristics: • • • • • • •

POINTS: RUBRIC:

decimal number, data, character, etc.), a certain length, or to have a value between two limits. Primary and foreign keys enable relationships between the tables to be defined. User queries are used to perform operations on the database like adding, changing, or deleting data and selecting, projecting, and joining existing data in existing tables.

Data is organized into collections of two-dimensional tables called relations. Each row in the table represents an entity and each column represents an attribute of that entity. Each row in a table is uniquely identified by a primary key. The type of data a table column can contain can be specified as integer number, decimal number, date, text, etc. The data in a table column can be constrained to be of a certain type (integer, decimal number, data, character, etc.), a certain length, or to have a value between two limits. Primary and foreign keys enable relationships between the tables to be defined. User queries are used to perform operations on the database like adding, changing, or deleting data and selecting, projecting, and joining existing data in existing tables.

1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Lists six or seven fundamental characteristics of a relational database

DIFFICULTY: Moderate REFERENCES: Relational Databases QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.5.9 - Identify six fundamental characteristics of the relational database model. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 3:08 PM 96. Explain entity-relationship (ER) diagrams. ANSWER: The entity-relationship (ER) diagram is a data model used to analyze and communicate data needs at the individual project or application level using graphical symbols to identify data entities and their associated data attributes as well as the relationships among the entities of interest. There are many notation styles that can be used in drawing an ER diagram. ER diagrams help ensure that the relationships among the data entities in a database are Copyright Cengage Learning. Powered by Cognero.

Page 64


Chapter 05 - Database Systems and Management

RATIONALE:

POINTS: RUBRIC:

correctly structured so that any application programs developed are consistent with business operations and user needs. In addition, ER diagrams can serve as reference documents after a database is in use. If changes are made to the database, ER diagrams help design them. The entity-relationship (ER) diagram is a data model used to analyze and communicate data needs at the individual project or application level using graphical symbols to identify data entities and their associated data attributes as well as the relationships among the entities of interest. There are many notation styles that can be used in drawing an ER diagram. ER diagrams help ensure that the relationships among the data entities in a database are correctly structured so that any application programs developed are consistent with business operations and user needs. In addition, ER diagrams can serve as reference documents after a database is in use. If changes are made to the database, ER diagrams help design them. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Define the entityrelationship diagram Explain how ER diagrams are useful

DIFFICULTY: Moderate REFERENCES: Database Design QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.5.8 - Identify seven key questions that must be answered when designing a database. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 3:13 PM 97. What is a database administrator's role, and what skills are most essential for performing it? ANSWER: A database administrator (DBA) is a skilled and trained IS professional who holds discussions with business users to define their data needs; applies database programming languages to craft a set of databases to meet those needs; tests and evaluates databases; monitors their performance and implements change to improve response time for user queries; and assures that data is secure from unauthorized access. Database systems require a skilled database administrator (DBA), who must have a clear understanding of the fundamental business of the organization, be proficient in the use of selected database management systems, and stay abreast of emerging technologies and new design approaches. Typically, a DBA has a degree in computer science or management information systems and some on-the-job training with a particular database management system product or more extensive experience with a range of database products. RATIONALE: A database administrator (DBA) is a skilled and trained IS professional who holds discussions with business users to define their data needs; applies database programming languages to craft a set of databases to meet those needs; tests and evaluates databases; monitors their performance and implements change to improve response time for user Copyright Cengage Learning. Powered by Cognero.

Page 65


Chapter 05 - Database Systems and Management

POINTS: RUBRIC:

queries; and assures that data is secure from unauthorized access. Database systems require a skilled database administrator (DBA), who must have a clear understanding of the fundamental business of the organization, be proficient in the use of selected database management systems, and stay abreast of emerging technologies and new design approaches. Typically, a DBA has a degree in computer science or management information systems and some on-the-job training with a particular database management system product or more extensive experience with a range of database products. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Describe the role of a database administrator List the skills necessary for success as a database administrator

DIFFICULTY: Moderate REFERENCES: Data Management QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.5.16 - Define the role of a database administrator. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 3:18 PM 98. Define and distinguish between the terms data management and data governance. ANSWER: Data management is an integrated set of functions that defines the processes by which data is obtained, certified fit for use, stored, secured, and processed in such a way as to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users within an organization. Data governance is the core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization, with people identified and in place who are responsible for fixing and preventing issues with data. RATIONALE: Data management is an integrated set of functions that defines the processes by which data is obtained, certified fit for use, stored, secured, and processed in such a way as to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users within an organization. Data governance is the core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization, with people identified and in place who are responsible for fixing and preventing issues with data. POINTS: 1 RUBRIC: 0 1 2 3 4 Criteria

Failure

Below Expectations

Developing

Competent

Mastery

Defines data Copyright Cengage Learning. Powered by Cognero.

Page 66


Chapter 05 - Database Systems and Management management and data governance Differentiates these terms

DIFFICULTY: Moderate REFERENCES: Data Management QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.5.13 - Distinguish between data management and data governance. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 3:22 PM 99. What seven questions should an organization carefully consider when designing a database? ANSWER: When designing a database, an organization must carefully consider the following questions: • • • • • • • RATIONALE:

When designing a database, an organization must carefully consider the following questions: • • • • • • •

POINTS: RUBRIC:

Content. What data should be collected and at what cost? Access. What data should be provided to which users and when? Logical structure. How should data be arranged so that it makes sense to a given user? Physical organization. Where should data be physically located? Response time. How quickly must the data be updated and retrieved so it can be viewed by the users? Archiving. How long must this data be stored? Security. How can this data be protected from unauthorized access?

Content. What data should be collected and at what cost? Access. What data should be provided to which users and when? Logical structure. How should data be arranged so that it makes sense to a given user? Physical organization. Where should data be physically located? Response time. How quickly must the data be updated and retrieved so it can be viewed by the users? Archiving. How long must this data be stored? Security. How can this data be protected from unauthorized access?

1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Lists the seven questions an organization must answer to design a database

DIFFICULTY:

Easy

Copyright Cengage Learning. Powered by Cognero.

Page 67


Chapter 05 - Database Systems and Management REFERENCES: Database Design QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.5.8 - Identify seven key questions that must be answered when designing a database. KEYWORDS: Bloom's: Remember DATE CREATED: 2/8/2020 3:27 PM DATE MODIFIED: 2/8/2020 3:30 PM

Copyright Cengage Learning. Powered by Cognero.

Page 68


Chapter 06 - Business Intelligence: Big Data and Analytics True / False 1. Business analytics can be used only for forecasting future business results. a. True b. False ANSWER: False RATIONALE: Business analytics can be used to gain a better understanding of current business performance, reveal new business patterns and relationships, explain why certain results occurred, optimize current operations, and forecast future business results. FEEDBACK: Correct Business analytics can be used to gain a better understanding of current business performance, reveal new business patterns and relationships, explain why certain results occurred, optimize current operations, and forecast future business results. Incorrect Business analytics can be used to gain a better understanding of current business performance, reveal new business patterns and relationships, explain why certain results occurred, optimize current operations, and forecast future business results.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Analytics and Business Intelligence QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.8 - State the primary difference between business intelligence and analytics. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/22/2020 2:07 PM 2. The data for BI (business intelligence) comes from many sources. a. True b. False ANSWER: True RATIONALE: The data used in BI is often pulled from multiple sources and may come from sources internal or external to the organization. FEEDBACK: Correct The data used in BI is often pulled from multiple sources and may come from sources internal or external to the organization. Incorrect The data used in BI is often pulled from multiple sources and may come from sources internal or external to the organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Analytics and Business Intelligence QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.8 - State the primary difference between business intelligence and analytics. NATIONAL STANDARDS: United States - BUSPROG: Technology Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 06 - Business Intelligence: Big Data and Analytics KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 11/19/2019 6:23 PM 2/22/2020 2:09 PM

3. A marketing manager who does not have deep knowledge of information systems or data science will NOT be able to use BI and analytics tools. a. True b. False ANSWER: False RATIONALE: Self-service analytics includes training, techniques, and processes that empower end users to perform their own analyses using an endorsed set of tools. Self-service analytics encourages nontechnical end users to make decisions based on facts and analyses rather than intuition. Using a self-service analytics application, end users can gather insights, analyze trends, uncover opportunities and issues, and accelerate decision making by rapidly creating reports, charts, dashboards, and documents from any combination of information assets. FEEDBACK: Correct Self-service analytics encourages nontechnical end users to make decisions based on facts and analyses rather than intuition. Using a self-service analytics application, end users can gather insights, analyze trends, uncover opportunities and issues, and accelerate decision making by rapidly creating reports, charts, dashboards, and documents from any combination of information assets. Incorrect Self-service analytics encourages nontechnical end users to make decisions based on facts and analyses rather than intuition. Using a self-service analytics application, end users can gather insights, analyze trends, uncover opportunities and issues, and accelerate decision making by rapidly creating reports, charts, dashboards, and documents from any combination of information assets.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Self-Service Analytics QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.12 - Identify four potential issues that can arise with the use of selfservice analytics. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/22/2020 2:20 PM 4. Some insurance companies can detect fraudulent claims using BI and analytics software. a. True b. False ANSWER: True RATIONALE: BI and analytics are used to achieve a number of benefits, including detecting fraud. MetLife implemented analytical software to help its special investigations unit (SIU) identify medical provider, attorney, and repair shop fraud. FEEDBACK: Correct MetLife implemented analytical software to help its special investigations unit (SIU) identify medical provider, attorney, and repair shop fraud. Incorrect MetLife implemented analytical software to help its special investigations unit Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 06 - Business Intelligence: Big Data and Analytics (SIU) identify medical provider, attorney, and repair shop fraud.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Benefits Achieved from BI and Analytics QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.8 - State the primary difference between business intelligence and analytics. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/22/2020 2:24 PM 5. Data scientists do not need much business domain knowledge. a. True b. False ANSWER: False RATIONALE: A data scientist is an individual who combines strong business acumen, a deep understanding of analytics, and a healthy appreciation of the limitations of data, tools, and techniques to deliver real improvements in decision making. FEEDBACK: Correct A data scientist is an individual who combines strong business acumen, a deep understanding of analytics, and a healthy appreciation of the limitations of data, tools, and techniques to deliver real improvements in decision making. Incorrect A data scientist is an individual who combines strong business acumen, a deep understanding of analytics, and a healthy appreciation of the limitations of data, tools, and techniques to deliver real improvements in decision making.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Role of a Data Scientist QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.9 - Define the role of a data scientist. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/22/2020 2:32 PM 6. Suppose you are good in math and statistics. Adding programming to your skill-set will likely be necessary if you want to be a data scientist. a. True b. False ANSWER: True RATIONALE: Most data scientists have computer programming skills and are familiar with languages and tools used to process big data, such as Hadoop, Hive, SQL, Python, R, and Java. FEEDBACK: Correct Most data scientists have computer programming skills and are familiar with languages and tools used to process big data, such as Hadoop, Hive, SQL, Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 06 - Business Intelligence: Big Data and Analytics Python, R, and Java. Incorrect Most data scientists have computer programming skills and are familiar with languages and tools used to process big data, such as Hadoop, Hive, SQL, Python, R, and Java.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Role of a Data Scientist QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.9 - Define the role of a data scientist. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/22/2020 2:33 PM 7. For an organization to get real value from its BI and analytics efforts, it must have a solid data management program. a. True b. False ANSWER: RATIONALE:

FEEDBACK:

True Three key components must be in place for an organization to get real value from its BI and analytics efforts. First and foremost is the existence of a solid data management program, including data governance. Correct

Three key components must be in place for an organization to get real value from its BI and analytics efforts. First and foremost is the existence of a solid data management program, including data governance. Incorrect Three key components must be in place for an organization to get real value from its BI and analytics efforts. First and foremost is the existence of a solid data management program, including data governance.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Components Required for Effective BI and Analytics QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.10 - Identify three key organizational components that must be in place for an organization to get real value from its BI/analytics efforts. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/22/2020 2:37 PM 8. Creative data scientists--a key component of BI efforts in an organization--are people who are primarily focused on coming up with novel ways of analyzing data. a. True b. False ANSWER: False Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 06 - Business Intelligence: Big Data and Analytics RATIONALE:

Another key component that an organization needs is creative data scientists—people who understand the business as well as the business analytics technology, while also recognizing the limitations of their data, tools, and techniques.

FEEDBACK:

Correct

Another key component that an organization needs is creative data scientists— people who understand the business as well as the business analytics technology, while also recognizing the limitations of their data, tools, and techniques. Incorrect Another key component that an organization needs is creative data scientists— people who understand the business as well as the business analytics technology, while also recognizing the limitations of their data, tools, and techniques.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Components Required for Effective BI and Analytics QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.10 - Identify three key organizational components that must be in place for an organization to get real value from its BI/analytics efforts. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/22/2020 2:43 PM 9. Data governance involves identifying people who are responsible for fixing and preventing issues with data. a. True b. False ANSWER: True RATIONALE: Data governance is the core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization, with people identified and in place who are responsible for fixing and preventing issues with data. FEEDBACK: Correct Data governance is the core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization, with people identified and in place who are responsible for fixing and preventing issues with data. Incorrect Data governance is the core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization, with people identified and in place who are responsible for fixing and preventing issues with data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Components Required for Effective BI and Analytics QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.10 - Identify three key organizational components that must be in place for an organization to get real value from its BI/analytics efforts. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 06 - Business Intelligence: Big Data and Analytics DATE CREATED: DATE MODIFIED:

11/19/2019 6:23 PM 2/22/2020 2:45 PM

10. During drill-down, you go from high-level summary data to detailed levels of data. a. True b. False ANSWER: True RATIONALE: A data warehouse is a large database that holds business information from many sources in the enterprise, covering all aspects of the company’s processes, products, and customers. Data warehouses allow users to “drill down” to get greater detail or “roll up” to generate aggregate or summary reports. FEEDBACK: Correct Data warehouses allow users to “drill down” to get greater detail or “roll up” to generate aggregate or summary reports. Incorrect Data warehouses allow users to “drill down” to get greater detail or “roll up” to generate aggregate or summary reports.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Warehouses, Data Marts, and Data Lakes QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.3 - Distinguish between the terms data warehouse, data mart, and data lake. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/22/2020 2:50 PM 11. Regression analysis focuses on plotting a sequence of well-defined data points measured at uniform time intervals. a. True b. False ANSWER: False RATIONALE: Regression analysis involves determining the relationship between a dependent variable and one or more independent variables. Regression analysis produces a regression equation where the coefficients represent the relationship between each independent variable and the dependent variable. The regression equation can be used to make predictions. Time series data is a sequence of well-defined data points measured at uniform time intervals over a long period of time. FEEDBACK: Correct Regression analysis involves determining the relationship between a dependent variable and one or more independent variables. Incorrect Regression analysis involves determining the relationship between a dependent variable and one or more independent variables.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Easy Descriptive Analysis True / False False

Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 06 - Business Intelligence: Big Data and Analytics LEARNING OBJECTIVES: POIS.14e.6.11 - Identify five broad categories of business intelligence/analytics techniques including the specific techniques used in each. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/22/2020 3:13 PM 12. Data mining is used to explore large amounts of data, looking for hidden patterns that can be used to predict future trends and behaviors. a. True b. False ANSWER: True RATIONALE: Data mining is a BI analytics tool used to explore large amounts of data for hidden patterns to predict future trends and behaviors for use in decision making. FEEDBACK: Correct Data mining is a BI analytics tool used to explore large amounts of data for hidden patterns to predict future trends and behaviors for use in decision making. Incorrect Data mining is a BI analytics tool used to explore large amounts of data for hidden patterns to predict future trends and behaviors for use in decision making.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Predictive Analytics QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.11 - Identify five broad categories of business intelligence/analytics techniques including the specific techniques used in each. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/22/2020 3:16 PM 13. In the regression equation y = ax1 + bx2, the coefficients a and b represent the dependent variables. a. True b. False ANSWER: False RATIONALE: Regression analysis involves determining the relationship between a dependent variable (y) and one or more independent variables (x1, x2... xn). Regression analysis produces a regression equation where the coefficients represent the relationship between each independent variable and the dependent variable. FEEDBACK: Correct Regression analysis produces a regression equation where the coefficients represent the relationship between each independent variable and the dependent variable. Incorrect Regression analysis produces a regression equation where the coefficients represent the relationship between each independent variable and the dependent variable.

POINTS: DIFFICULTY:

1 Moderate

Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 06 - Business Intelligence: Big Data and Analytics REFERENCES: Descriptive Analysis QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.11 - Identify five broad categories of business intelligence/analytics techniques including the specific techniques used in each. NATIONAL STANDARDS: United States - BUSPROG: Analytics - Analytics KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/22/2020 3:26 PM 14. Regression analysis is useful when you wish to predict the value of a quantitative variable based on a another quantitative variable. a. True b. False ANSWER: True RATIONALE: Regression analysis involves determining the relationship between a dependent variable (y) and one or more independent variables (x1, x2... xn). Regression analysis produces a regression equation where the coefficients represent the relationship between each independent variable and the dependent variable. The regression equation can be used to make predictions. FEEDBACK: Correct Regression analysis produces a regression equation where the coefficients represent the relationship between each independent variable and the dependent variable. The regression equation can be used to make predictions. Incorrect Regression analysis produces a regression equation where the coefficients represent the relationship between each independent variable and the dependent variable. The regression equation can be used to make predictions.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Descriptive Analysis QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.11 - Identify five broad categories of business intelligence/analytics techniques including the specific techniques used in each. NATIONAL STANDARDS: United States - BUSPROG: Analytics - Analytics KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/22/2020 3:30 PM 15. Scenario analysis tools are the best choice for solving optimization-type problems. a. True b. False ANSWER: False RATIONALE: Optimization techniques, which include genetic algorithms and linear programming, are used every day in the organization, often to allocate scarce resources in such a manner as to minimize costs or maximize profits. Scenario analysis is a process for predicting future values based on certain potential events. Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 06 - Business Intelligence: Big Data and Analytics FEEDBACK:

Correct

Optimization techniques, which include genetic algorithms and linear programming, are used every day in the organization, often to allocate scarce resources in such a manner as to minimize costs or maximize profits. Incorrect Optimization techniques, which include genetic algorithms and linear programming, are used every day in the organization, often to allocate scarce resources in such a manner as to minimize costs or maximize profits.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Optimization QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.11 - Identify five broad categories of business intelligence/analytics techniques including the specific techniques used in each. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/22/2020 3:40 PM 16. To solve a linear programming problem in order to maximize profits for certain product, you can use Excel's Solver add-in. a. True b. False ANSWER: True RATIONALE: Linear programming is a technique for finding the optimum value (largest or smallest, depending on the problem) of a linear expression (called the objective function) that is calculated based on the value of a set of decision variables that are subject to a set of constraints. Solver is a Microsoft Excel add-in program for solving linear programming problems. FEEDBACK: Correct Solver is a Microsoft Excel add-in program for solving linear programming problems. Incorrect Solver is a Microsoft Excel add-in program for solving linear programming problems.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Optimization QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.11 - Identify five broad categories of business intelligence/analytics techniques including the specific techniques used in each. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/22/2020 3:48 PM 17. Users still need help from the IT function of the organization to create customer reports using modern reporting tools. a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 06 - Business Intelligence: Big Data and Analytics ANSWER: RATIONALE:

False Self-service analytics includes training, techniques, and processes that empower end users to perform their own analyses using an endorsed set of tools. Self-service analytics encourages nontechnical end users to make decisions based on facts and analyses rather than intuition. Using a self-service analytics application, end users can gather insights, analyze trends, uncover opportunities and issues, and accelerate decision making by rapidly creating reports, charts, dashboards, and documents from any combination of information assets.

FEEDBACK:

Correct

Using a self-service analytics application, nontechnical end users can gather insights, analyze trends, uncover opportunities and issues, and accelerate decision making by rapidly creating reports, charts, dashboards, and documents from any combination of information assets. Incorrect Using a self-service analytics application, nontechnical end users can gather insights, analyze trends, uncover opportunities and issues, and accelerate decision making by rapidly creating reports, charts, dashboards, and documents from any combination of information assets.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Self-Service Analytics QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.12 - Identify four potential issues that can arise with the use of selfservice analytics. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/22/2020 3:51 PM 18. A conversion funnel is a visual depiction of a set of words that have been grouped together because of the frequency of their occurrence. a. True b. False ANSWER: False RATIONALE: A word cloud is a visual depiction of a set of words that have been grouped together because of the frequency of their occurrence. A conversion funnel is a graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer. FEEDBACK: Correct A word cloud is a visual depiction of a set of words that have been grouped together because of the frequency of their occurrence. A conversion funnel is a graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer. Incorrect A word cloud is a visual depiction of a set of words that have been grouped together because of the frequency of their occurrence. A conversion funnel is a graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Descriptive Analysis True / False

Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 06 - Business Intelligence: Big Data and Analytics HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.11 - Identify five broad categories of business intelligence/analytics techniques including the specific techniques used in each. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/22/2020 3:53 PM 19. If you wish to study a visual depiction of the relative frequencies of words in a document, a word cloud would be an appropriate option. a. True b. False ANSWER: True RATIONALE: A word cloud is a visual depiction of a set of words that have been grouped together because of the frequency of their occurrence. FEEDBACK: Correct A word cloud is a visual depiction of a set of words that have been grouped together because of the frequency of their occurrence. Incorrect A word cloud is a visual depiction of a set of words that have been grouped together because of the frequency of their occurrence.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Descriptive Analysis QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.11 - Identify five broad categories of business intelligence/analytics techniques including the specific techniques used in each. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/22/2020 3:54 PM 20. Unstructured data comes from sources such as word-processing documents and surveillance video. a. True b. False ANSWER: True RATIONALE: Unstructured data comes from sources such as word-processing documents, social media, email, photos, surveillance video, and phone messages. FEEDBACK: Correct Unstructured data comes from sources such as word-processing documents, social media, email, photos, surveillance video, and phone messages. Incorrect Unstructured data comes from sources such as word-processing documents, social media, email, photos, surveillance video, and phone messages.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Easy Big Data True / False False

Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 06 - Business Intelligence: Big Data and Analytics LEARNING OBJECTIVES: POIS.14e.6.1 - Identify five key characteristics associated with big data. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/7/2020 5:03 PM 21. Suppose a manager wishes to analyze historical trends in sales. He would use the online transaction processing (OLTP) system. a. True b. False ANSWER: False RATIONALE: For decades, organizations have collected operational, sales, and financial data with their online transaction processing (OLTP) systems. These OLTP systems put data into databases very quickly, reliably, and efficiently, but they do not support the types of data analysis that today’s businesses and organizations require. With data warehouses and data marts, organizations are now able to access the data gathered via OLTP systems and other sources and use it more effectively to support decision making. FEEDBACK: Correct OLTP systems put data into databases very quickly, reliably, and efficiently, but they do not support the types of data analysis that today’s businesses and organizations require. Incorrect OLTP systems put data into databases very quickly, reliably, and efficiently, but they do not support the types of data analysis that today’s businesses and organizations require.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Data Warehouses, Data Marts, and Data Lakes QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.3 - Distinguish between the terms data warehouse, data mart, and data lake. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/7/2020 5:07 PM 22. Organizations can collect many types of data from a wide variety of sources, but typically they only collect structured data that fits neatly into traditional relational database management systems. a. True b. False ANSWER: False RATIONALE: Data today comes in a variety of formats. Some of the data is what computer scientists call structured data—its format is known in advance, and it fits nicely into traditional databases. For example, the data generated by the well-defined business transactions that are used to update many corporate databases containing customer, product, inventory, financial, and employee data is generally structured data. However, most of the data that an organization must deal with is unstructured data, meaning that it is not organized in any predefined manner. Unstructured data comes from sources such as word-processing documents, social media, email, photos, surveillance video, and phone messages. Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 06 - Business Intelligence: Big Data and Analytics FEEDBACK:

Correct

Most of the data that an organization must deal with is unstructured data, meaning that it is not organized in any predefined manner. Incorrect Most of the data that an organization must deal with is unstructured data, meaning that it is not organized in any predefined manner.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Big Data QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.1 - Identify five key characteristics associated with big data. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/7/2020 5:25 PM Multiple Choice 23. Which of the following is NOT considered a component of business intelligence? a. data extraction practices b. visualization of data c. data analysis applications d. data transaction processing ANSWER: d RATIONALE: Business intelligence (BI) includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, visualization, analysis, interpretation, and presentation of data to support improved decision making. FEEDBACK: a. Business intelligence (BI) includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, visualization, analysis, interpretation, and presentation of data to support improved decision making. b. Business intelligence (BI) includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, visualization, analysis, interpretation, and presentation of data to support improved decision making. c. Business intelligence (BI) includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, visualization, analysis, interpretation, and presentation of data to support improved decision making. d. Business intelligence (BI) includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, visualization, analysis, interpretation, and presentation of data to support improved decision making.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Analytics and Business Intelligence QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.8 - State the primary difference between business intelligence and Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 06 - Business Intelligence: Big Data and Analytics analytics. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/23/2020 4:06 PM 24. One of the goals of business intelligence is to _________. a. present the results of analysis in an easy-to-understand manner b. educate the end users about business-related statistics c. ensure that transaction data is properly stored d. use the most sophisticated techniques available ANSWER: a RATIONALE: The goal of business intelligence is to get the most value out of information and present the results of analysis in an easy to understand manner that the layman can understand. FEEDBACK: a. The goal of business intelligence is to get the most value out of information and present the results of analysis in an easy to understand manner that the layman can understand. b. The goal of business intelligence is to get the most value out of information and present the results of analysis in an easy to understand manner that the layman can understand. c. The goal of business intelligence is to get the most value out of information and present the results of analysis in an easy to understand manner that the layman can understand. d. The goal of business intelligence is to get the most value out of information and present the results of analysis in an easy to understand manner that the layman can understand.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Analytics and Business Intelligence QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.8 - State the primary difference between business intelligence and analytics. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/23/2020 4:10 PM 25. Which of the following is the LEAST essential characteristic for success as a data scientist? a. strong business acumen b. a deep understanding of analytics c. a healthy appreciation of the limitations of their data d. business leadership skills ANSWER: d RATIONALE: A data scientist is an individual who combines strong business acumen, a deep understanding of analytics, and a healthy appreciation of the limitations of data, tools, and techniques to deliver real improvements in decision making. Data scientists do not simply Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 06 - Business Intelligence: Big Data and Analytics collect and report on data; they view a situation from many angles, determine what data and tools can help further an understanding of the situation, and then apply the appropriate data and tools. FEEDBACK:

a. A data scientist is an individual who combines strong business acumen, a deep

understanding of analytics, and a healthy appreciation of the limitations of data, tools, and techniques to deliver real improvements in decision making. b. A data scientist is an individual who combines strong business acumen, a deep understanding of analytics, and a healthy appreciation of the limitations of data, tools, and techniques to deliver real improvements in decision making. c. A data scientist is an individual who combines strong business acumen, a deep understanding of analytics, and a healthy appreciation of the limitations of data, tools, and techniques to deliver real improvements in decision making. d. A data scientist is an individual who combines strong business acumen, a deep understanding of analytics, and a healthy appreciation of the limitations of data, tools, and techniques to deliver real improvements in decision making.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Role of a Data Scientist QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.9 - Define the role of a data scientist. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/23/2020 4:13 PM 26. According to the McKinsey Global Institute, _____. a. the supply of data scientists is expected to closely match the supply by 2024 b. the demand for data scientists could outpace supply by up to 250,000 jobs in 2024 c. the average salary for an entry-level data scientist is $175,000 per year d. the job outlook for data scientists is slightly below average for the IS industry ANSWER: b RATIONALE: The job outlook for data scientists is extremely bright. The McKinsey Global Institute (the business and economics research arm of the management consulting firm McKinsey & Co.) suggests that demand for data scientists could outpace supply by as many as 250,000 jobs in 2024. The average salary for a data scientist is $119,000. Highly talented, educated, and experienced data scientists can expect to earn in the neighborhood of $175,000. FEEDBACK: a. The McKinsey Global Institute suggests that demand for data scientists could outpace supply by as many as 250,000 jobs in 2024. b. The McKinsey Global Institute suggests that demand for data scientists could outpace supply by as many as 250,000 jobs in 2024. c. The McKinsey Global Institute suggests that demand for data scientists could outpace supply by as many as 250,000 jobs in 2024. d. The McKinsey Global Institute suggests that demand for data scientists could outpace supply by as many as 250,000 jobs in 2024.

POINTS: DIFFICULTY: REFERENCES:

1 Easy The Role of a Data Scientist

Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 06 - Business Intelligence: Big Data and Analytics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.9 - Define the role of a data scientist. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/23/2020 4:20 PM 27. Marina is a data scientist at a large financial corporation, and therefore she _____. a. relies only on her computer science and statistics skills to do her job well b. focuses exclusively on accurately collecting and reporting on data c. works on a separate team from the business managers and financial analysts d. aims to uncover insights that will influence organizational decisions ANSWER: d RATIONALE: Data scientists do not simply collect and report on data; they view a situation from many angles, determine what data and tools can help further an understanding of the situation, and then apply the appropriate data and tools. They often work in a team setting with business managers and specialists from the business area being studied, market research and financial analysts, data stewards, information system resources, and experts highly knowledgeable about the company’s competitors, markets, products, and services. The goal of the data scientist is to uncover valuable insights that will influence organizational decisions and help the organization to achieve competitive advantage. FEEDBACK: a. The goal of the data scientist is to uncover valuable insights that will influence organizational decisions and help the organization to achieve competitive advantage. b. The goal of the data scientist is to uncover valuable insights that will influence organizational decisions and help the organization to achieve competitive advantage. c. The goal of the data scientist is to uncover valuable insights that will influence organizational decisions and help the organization to achieve competitive advantage. d. The goal of the data scientist is to uncover valuable insights that will influence organizational decisions and help the organization to achieve competitive advantage.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Role of a Data Scientist QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.9 - Define the role of a data scientist. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/24/2020 7:49 AM 28. Suppose your employer has four manufacturing units, each with its own data operations. They are considering using BI and analytics tools. Which of the following is a valid recommendation regarding the BI and analytics initiative? Copyright Cengage Learning. Powered by Cognero.

Page 16


Chapter 06 - Business Intelligence: Big Data and Analytics a. Purchase automated BI and analytics tools; including data scientists on the team is optional. b. Implement BI and analytics tools in each factory separately. c. Ensure that an effective company-wide data management program, including data governance, is in place. d. Use BI and analytics tools to increase sales, but do not rely on them to optimize manufacturing operations. ANSWER: c RATIONALE: Three key components must be in place for an organization to get real value from its BI and analytics efforts. First and foremost is the existence of a solid data management program, including data governance. Another key component that an organization needs is creative data scientists. Finally, to ensure the success of a BI and analytics program, the management team within an organization must have a strong commitment to data-driven decision making. FEEDBACK: a. First and foremost of the key components required for an organization to get real value from its BI and analytics efforts is the existence of a solid data management program, including data governance. b. First and foremost of the key components required for an organization to get real value from its BI and analytics efforts is the existence of a solid data management program, including data governance. c. First and foremost of the key components required for an organization to get real value from its BI and analytics efforts is the existence of a solid data management program, including data governance. d. First and foremost of the key components required for an organization to get real value from its BI and analytics efforts is the existence of a solid data management program, including data governance.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Components Required for Effective BI and Analytics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.10 - Identify three key organizational components that must be in place for an organization to get real value from its BI/analytics efforts. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/24/2020 9:39 AM 29. Which of the following is NOT a component required for effective BI and analytics? a. process for obtaining data, certifying it is fit for use, and storing it securely b. adequately accessible, reliable, and timely data c. well-maintained NoSQL databases d. solid data governance ANSWER: c RATIONALE: Three key components must be in place for an organization to get real value from its BI and analytics efforts. First and foremost is the existence of a solid data management program, including data governance. Recall that data management is an integrated set of functions that defines the processes by which data is obtained, certified fit for use, stored, secured, and processed in such a way as to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users within an organization. Data governance is the core component of data management. Another key component that an Copyright Cengage Learning. Powered by Cognero.

Page 17


Chapter 06 - Business Intelligence: Big Data and Analytics organization needs is creative data scientists. Finally, to ensure the success of a BI and analytics program, the management team within an organization must have a strong commitment to data-driven decision making. FEEDBACK:

a. Among the key components required for effective BI and analytics efforts, first

and foremost is the existence of a solid data management program, including data governance. Recall that data management is an integrated set of functions that defines the processes by which data is obtained, certified fit for use, stored, secured, and processed in such a way as to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users within an organization. b. Among the key components required for effective BI and analytics efforts, first and foremost is the existence of a solid data management program, including data governance. Recall that data management is an integrated set of functions that defines the processes by which data is obtained, certified fit for use, stored, secured, and processed in such a way as to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users within an organization. c. Among the key components required for effective BI and analytics efforts, first and foremost is the existence of a solid data management program, including data governance. Recall that data management is an integrated set of functions that defines the processes by which data is obtained, certified fit for use, stored, secured, and processed in such a way as to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users within an organization. d. Among the key components required for effective BI and analytics efforts, first and foremost is the existence of a solid data management program, including data governance. Recall that data management is an integrated set of functions that defines the processes by which data is obtained, certified fit for use, stored, secured, and processed in such a way as to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users within an organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Components Required for Effective BI and Analytics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.10 - Identify three key organizational components that must be in place for an organization to get real value from its BI/analytics efforts. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/24/2020 9:56 AM 30. You are to advise XYZ Corporation so that their BI and analytics efforts are fruitful. Which among the following is the most crucial advice of all? a. There should be a greater emphasis on data management than data governance. b. Management must have a strong commitment to data-driven decision making. c. All data entry and issue identification and correction tasks must be automated. d. Data scientists should be brought in as consultants rather than full-time employees. ANSWER: b RATIONALE: Three key components must be in place for an organization to get real value from its BI Copyright Cengage Learning. Powered by Cognero.

Page 18


Chapter 06 - Business Intelligence: Big Data and Analytics and analytics efforts. First and foremost is the existence of a solid data management program, including data governance. Recall that data management is an integrated set of functions that defines the processes by which data is obtained, certified fit for use, stored, secured, and processed in such a way as to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users within an organization. Data governance is the core component of data management. Another key component that an organization needs is creative data scientists. Finally, to ensure the success of a BI and analytics program, the management team within an organization must have a strong commitment to data-driven decision making. FEEDBACK:

a. To ensure the success of a BI and analytics program, the management team

within an organization must have a strong commitment to data-driven decision making. b. To ensure the success of a BI and analytics program, the management team within an organization must have a strong commitment to data-driven decision making. c. To ensure the success of a BI and analytics program, the management team within an organization must have a strong commitment to data-driven decision making. d. To ensure the success of a BI and analytics program, the management team within an organization must have a strong commitment to data-driven decision making.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Components Required for Effective BI and Analytics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.10 - Identify three key organizational components that must be in place for an organization to get real value from its BI/analytics efforts. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/28/2020 4:18 PM 31. Which of these analysis methods describes neural computing? a. a specialized set of algorithms sorts through data and forms statistical rules about relationships among the items b. historical data is examined for patterns that are then used to make predictions c. historical if-then-else cases are used to recognize patterns d. a mathematical procedure predicts the value of a dependent variable based on a single independent variable ANSWER: b RATIONALE: Among the three most commonly used data mining techniques are association analysis (a specialized set of algorithms sorts through data and forms statistical rules about relationships among the items), neural computing (historical data is examined for patterns that are then used to make predictions), and case-based reasoning (historical if-then-else cases are used to recognize patterns). FEEDBACK: a. Among the three most commonly used data mining techniques are association analysis (a specialized set of algorithms sorts through data and forms statistical rules about relationships among the items), neural computing (historical data is examined for patterns that are then used to make predictions), and case-based

Copyright Cengage Learning. Powered by Cognero.

Page 19


Chapter 06 - Business Intelligence: Big Data and Analytics reasoning (historical if-then-else cases are used to recognize patterns). b. Among the three most commonly used data mining techniques are association analysis (a specialized set of algorithms sorts through data and forms statistical rules about relationships among the items), neural computing (historical data is examined for patterns that are then used to make predictions), and case-based reasoning (historical if-then-else cases are used to recognize patterns). c. Among the three most commonly used data mining techniques are association analysis (a specialized set of algorithms sorts through data and forms statistical rules about relationships among the items), neural computing (historical data is examined for patterns that are then used to make predictions), and case-based reasoning (historical if-then-else cases are used to recognize patterns). d. Among the three most commonly used data mining techniques are association analysis (a specialized set of algorithms sorts through data and forms statistical rules about relationships among the items), neural computing (historical data is examined for patterns that are then used to make predictions), and case-based reasoning (historical if-then-else cases are used to recognize patterns).

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Predictive Analytics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.11 - Identify five broad categories of business intelligence/analytics techniques including the specific techniques used in each. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/26/2020 10:23 AM 32. _____ is used to explore large amounts of data for hidden patterns to predict future trends. a. Data governance b. Data mining c. Regression analysis d. A genetic algorithm ANSWER: b RATIONALE: Data mining is a BI analytics tool used to explore large amounts of data for hidden patterns to predict future trends and behaviors for use in decision making. FEEDBACK: a. Data mining is a BI analytics tool used to explore large amounts of data for hidden patterns to predict future trends and behaviors for use in decision making. b. Data mining is a BI analytics tool used to explore large amounts of data for hidden patterns to predict future trends and behaviors for use in decision making. c. Data mining is a BI analytics tool used to explore large amounts of data for hidden patterns to predict future trends and behaviors for use in decision making. d. Data mining is a BI analytics tool used to explore large amounts of data for hidden patterns to predict future trends and behaviors for use in decision making.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 20


Chapter 06 - Business Intelligence: Big Data and Analytics DIFFICULTY: Easy REFERENCES: Predictive Analytics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.11 - Identify five broad categories of business intelligence/analytics techniques including the specific techniques used in each. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/26/2020 10:28 AM 33. During the modeling phase of the CRISP-DM method, the team conducting the data mining project ______. a. clarifies business goals for the data mining project b. selects a subset of data to be used and prepares it c. assesses whether the selected model achieves business goals d. applies selected modeling techniques ANSWER: d RATIONALE: The Cross-Industry Process for Data Mining (CRISP-DM) is a six-phase structured approach for the planning and execution of a data mining project. The phases are: business understanding, data understanding, data preparation, modeling, evaluation, and deployment. The goals for each step of the process are summarized in Table 6.7. The goal of the modeling phase is to apply selected modeling techniques. FEEDBACK: a. The goal of the modeling phase of the CRISP-DM is to apply selected modeling techniques. b. The goal of the modeling phase of the CRISP-DM is to apply selected modeling techniques. c. The goal of the modeling phase of the CRISP-DM is to apply selected modeling techniques. d. The goal of the modeling phase of the CRISP-DM is to apply selected modeling techniques.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Predictive Analytics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.11 - Identify five broad categories of business intelligence/analytics techniques including the specific techniques used in each. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/26/2020 10:34 AM 34. ____ is the last phase of the six-phase CRISP-DM method. a. Evaluation b. Modeling c. Business understanding Copyright Cengage Learning. Powered by Cognero.

Page 21


Chapter 06 - Business Intelligence: Big Data and Analytics d. Deployment ANSWER: RATIONALE:

FEEDBACK:

d The Cross-Industry Process for Data Mining (CRISP-DM) is a six-phase structured approach for the planning and execution of a data mining project. The phases are: business understanding, data understanding, data preparation, modeling, evaluation, and deployment. a. The Cross-Industry Process for Data Mining (CRISP-DM) is a six-phase

structured approach for the planning and execution of a data mining project. The phases are: business understanding, data understanding, data preparation, modeling, evaluation, and deployment. b. The Cross-Industry Process for Data Mining (CRISP-DM) is a six-phase structured approach for the planning and execution of a data mining project. The phases are: business understanding, data understanding, data preparation, modeling, evaluation, and deployment. c. The Cross-Industry Process for Data Mining (CRISP-DM) is a six-phase structured approach for the planning and execution of a data mining project. The phases are: business understanding, data understanding, data preparation, modeling, evaluation, and deployment. d. The Cross-Industry Process for Data Mining (CRISP-DM) is a six-phase structured approach for the planning and execution of a data mining project. The phases are: business understanding, data understanding, data preparation, modeling, evaluation, and deployment.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Predictive Analytics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.11 - Identify five broad categories of business intelligence/analytics techniques including the specific techniques used in each. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/26/2020 10:36 AM 35. Which of the following is NOT a recognized BI and analytics technique? a. genetic algorithm b. Monte Carlo simulation c. online transaction processing d. linear programming ANSWER: c RATIONALE: General categories and examples of BI/analytics techniques include descriptive analysis: visual analytics and regression analysis; predictive analytics: time series analysis and data mining; optimization: genetic algorithms and linear programming; simulation: scenario analysis and Monte Carlo simulation; and text and video analysis: text analysis and video analysis. FEEDBACK: a. General categories and examples of BI/analytics techniques include descriptive analysis: visual analytics and regression analysis; predictive analytics: time series analysis and data mining; optimization: genetic algorithms and linear programming; simulation: scenario analysis and Monte Carlo simulation; and

Copyright Cengage Learning. Powered by Cognero.

Page 22


Chapter 06 - Business Intelligence: Big Data and Analytics text and video analysis: text analysis and video analysis. b. General categories and examples of BI/analytics techniques include descriptive analysis: visual analytics and regression analysis; predictive analytics: time series analysis and data mining; optimization: genetic algorithms and linear programming; simulation: scenario analysis and Monte Carlo simulation; and text and video analysis: text analysis and video analysis. c. General categories and examples of BI/analytics techniques include descriptive analysis: visual analytics and regression analysis; predictive analytics: time series analysis and data mining; optimization: genetic algorithms and linear programming; simulation: scenario analysis and Monte Carlo simulation; and text and video analysis: text analysis and video analysis. d. General categories and examples of BI/analytics techniques include descriptive analysis: visual analytics and regression analysis; predictive analytics: time series analysis and data mining; optimization: genetic algorithms and linear programming; simulation: scenario analysis and Monte Carlo simulation; and text and video analysis: text analysis and video analysis.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Business Intelligence and Analytics Tools QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.11 - Identify five broad categories of business intelligence/analytics techniques including the specific techniques used in each. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/26/2020 10:44 AM 36. Suppose you have access to quantitative data on populations by ZIP code and crime rates. You wish to determine if there is a relationship between the two variables and display the results in a graph. Which BI tool will be most useful? a. data mining tool b. querying tool c. conversion funnel d. data visualization tool ANSWER: d RATIONALE: Visual analytics is the presentation of data in a pictorial or graphical format. The human brain works such that most people are better able to see significant trends, patterns, and relationships in data that is presented in a graphical format rather than in tabular reports and spreadsheets. A wide array of tools and techniques are available for creating visual representations that can immediately reveal otherwise difficult-to-perceive patterns or relationships in the underlying data. Dozens of data visualization software products are available for creating various charts, graphs, infographics, and data maps. A word cloud is a visual depiction of a set of words that have been grouped together because of the frequency of their occurrence. A conversion funnel is a graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer. FEEDBACK: a. Dozens of data visualization software products are available for creating various charts, graphs, infographics, and data maps.

b. Dozens of data visualization software products are available for creating Copyright Cengage Learning. Powered by Cognero.

Page 23


Chapter 06 - Business Intelligence: Big Data and Analytics various charts, graphs, infographics, and data maps. c. Dozens of data visualization software products are available for creating various charts, graphs, infographics, and data maps. d. Dozens of data visualization software products are available for creating various charts, graphs, infographics, and data maps.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Descriptive Analysis QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.11 - Identify five broad categories of business intelligence/analytics techniques including the specific techniques used in each. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/26/2020 10:50 AM 37. To identify and make predictions about various alternative scenarios, a manager would use _______. a. simulation techniques b. descriptive analytics c. optimization techniques d. visual analytics ANSWER: a RATIONALE: Computer simulation involves using a model expressed in the form of a computer program to emulate the dynamic responses of a real-world system to various inputs. Scenario analysis, one form of simulation, is a process for predicting future values based on certain potential events. The method causes decision makers to define several scenarios that generate different possible outcomes. FEEDBACK: a. Scenario analysis, one form of simulation, is a process for predicting future values based on certain potential events. b. Scenario analysis, one form of simulation, is a process for predicting future values based on certain potential events. c. Scenario analysis, one form of simulation, is a process for predicting future values based on certain potential events. d. Scenario analysis, one form of simulation, is a process for predicting future values based on certain potential events.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Simulation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.11 - Identify five broad categories of business intelligence/analytics techniques including the specific techniques used in each. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 6:23 PM Copyright Cengage Learning. Powered by Cognero.

Page 24


Chapter 06 - Business Intelligence: Big Data and Analytics DATE MODIFIED:

2/26/2020 11:02 AM

38. The graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer is called _____. a. a word cloud b. a conversion funnel c. a scatter diagram d. a pivot chart ANSWER: b RATIONALE: A conversion funnel is a graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer. FEEDBACK: a. A conversion funnel is a graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer. b. A conversion funnel is a graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer. c. A conversion funnel is a graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer. d. A conversion funnel is a graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Descriptive Analysis QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.11 - Identify five broad categories of business intelligence/analytics techniques including the specific techniques used in each. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/26/2020 11:04 AM 39. What determines the size of words in a word cloud? a. length of the word or phrase b. difficulty in pronouncing the word or phrase c. whether the word is a noun or verb d. frequency of occurrence of the word in source documents ANSWER: d RATIONALE: A word cloud is a visual depiction of a set of words that have been grouped together because of the frequency of their occurrence. Words or phrases that have been mentioned more often than other words or phrases are shown in a larger font size and/or a darker color. FEEDBACK: a. A word cloud is a visual depiction of a set of words that have been grouped together because of the frequency of their occurrence. Words or phrases that

Copyright Cengage Learning. Powered by Cognero.

Page 25


Chapter 06 - Business Intelligence: Big Data and Analytics have been mentioned more often than other words or phrases are shown in a larger font size and/or a darker color. b. A word cloud is a visual depiction of a set of words that have been grouped together because of the frequency of their occurrence. Words or phrases that have been mentioned more often than other words or phrases are shown in a larger font size and/or a darker color. c. A word cloud is a visual depiction of a set of words that have been grouped together because of the frequency of their occurrence. Words or phrases that have been mentioned more often than other words or phrases are shown in a larger font size and/or a darker color. d. A word cloud is a visual depiction of a set of words that have been grouped together because of the frequency of their occurrence. Words or phrases that have been mentioned more often than other words or phrases are shown in a larger font size and/or a darker color.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Descriptive Analysis QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.11 - Identify five broad categories of business intelligence/analytics techniques including the specific techniques used in each. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/26/2020 11:07 AM 40. Which of the following is IBM's BI product? a. Power BI b. Business Objects c. Cognos Business Intelligence d. Hyperion ANSWER: c RATIONALE: IBM’s product Cognos Business Intelligence turns data into past, present, and future views of an organization’s operations and performance so decision makers can identify opportunities and minimize risks; snapshots of business performance are provided in reports and independently assembled dashboards. FEEDBACK: a. IBM’s product Cognos Business Intelligence turns data into past, present, and future views of an organization’s operations and performance so decision makers can identify opportunities and minimize risks. b. IBM’s product Cognos Business Intelligence turns data into past, present, and future views of an organization’s operations and performance so decision makers can identify opportunities and minimize risks. c. IBM’s product Cognos Business Intelligence turns data into past, present, and future views of an organization’s operations and performance so decision makers can identify opportunities and minimize risks. d. IBM’s product Cognos Business Intelligence turns data into past, present, and future views of an organization’s operations and performance so decision makers can identify opportunities and minimize risks.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 26


Chapter 06 - Business Intelligence: Big Data and Analytics DIFFICULTY: Moderate REFERENCES: Popular BI/Analytics Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.11 - Identify five broad categories of business intelligence/analytics techniques including the specific techniques used in each. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/26/2020 11:10 AM 41. From which vendor is the BI product Business Objects available? a. IBM b. SAP c. Oracle d. Microsoft ANSWER: b RATIONALE: SAP’s product Business Objects offers a suite of applications that enable users to design and generate reports, create interactive dashboards that contain charts and graphs for visualizing data, and create ad hoc queries and analysis of data; it also allows users to search through BI data sources. FEEDBACK: a. SAP’s product Business Objects offers a suite of applications that enable users to design and generate reports, create interactive dashboards that contain charts and graphs for visualizing data, and create ad hoc queries and analysis of data. b. SAP’s product Business Objects offers a suite of applications that enable users to design and generate reports, create interactive dashboards that contain charts and graphs for visualizing data, and create ad hoc queries and analysis of data. c. SAP’s product Business Objects offers a suite of applications that enable users to design and generate reports, create interactive dashboards that contain charts and graphs for visualizing data, and create ad hoc queries and analysis of data. d. SAP’s product Business Objects offers a suite of applications that enable users to design and generate reports, create interactive dashboards that contain charts and graphs for visualizing data, and create ad hoc queries and analysis of data.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Popular BI/Analytics Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.11 - Identify five broad categories of business intelligence/analytics techniques including the specific techniques used in each. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/26/2020 11:13 AM Copyright Cengage Learning. Powered by Cognero.

Page 27


Chapter 06 - Business Intelligence: Big Data and Analytics 42. _________ encourages nontechnical end users to make decisions based on facts and analyses rather than intuition. a. Statistics training b. Self-service analytics c. Monte Carlo simulation d. Linear programming ANSWER: b RATIONALE: Self-service analytics encourages nontechnical end users to make decisions based on facts and analyses rather than intuition. FEEDBACK: a. Self-service analytics encourages nontechnical end users to make decisions based on facts and analyses rather than intuition. b. Self-service analytics encourages nontechnical end users to make decisions based on facts and analyses rather than intuition. c. Self-service analytics encourages nontechnical end users to make decisions based on facts and analyses rather than intuition. d. Self-service analytics encourages nontechnical end users to make decisions based on facts and analyses rather than intuition.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Self-Service Analytics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.12 - Identify four potential issues that can arise with the use of selfservice analytics. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/26/2020 11:15 AM 43. Which of the following is a potential disadvantage of self-service analytics? a. It can slow or become a barrier to decision making. b. It can lead to over-spending on unapproved data sources and business analytics tools. c. It encourages nontechnical end users to make decisions based on facts and analyses rather than intuition. d. It prevents the proliferation of "data islands," causing falsely consistent results. ANSWER: b RATIONALE: Self-service analytics encourages nontechnical end users to make decisions based on facts and analyses rather than intuition. It accelerates and improves decision making. However, it can also lead to over spending on unapproved data sources and business analytics tools. FEEDBACK: a. Self-service analytics accelerates and improves decision making. However, it can also lead to over spending on unapproved data sources and business analytics tools. b. Self-service analytics accelerates and improves decision making. However, it can also lead to over spending on unapproved data sources and business analytics tools. c. Self-service analytics accelerates and improves decision making. However, it can also lead to over spending on unapproved data sources and business analytics tools.

Copyright Cengage Learning. Powered by Cognero.

Page 28


Chapter 06 - Business Intelligence: Big Data and Analytics d. Self-service analytics accelerates and improves decision making. However, it can also lead to over spending on unapproved data sources and business analytics tools.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Self-Service Analytics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.12 - Identify four potential issues that can arise with the use of selfservice analytics. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/26/2020 11:22 AM 44. The purpose of business intelligence is to _____. a. provide access to novel tools to end users b. reduce the cost of data processing c. support improved decision making d. improve employee morale ANSWER: c RATIONALE: Business intelligence (BI) includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, visualization, analysis, interpretation, and presentation of data to support improved decision making. FEEDBACK: a. Business intelligence (BI) includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, visualization, analysis, interpretation, and presentation of data to support improved decision making. b. Business intelligence (BI) includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, visualization, analysis, interpretation, and presentation of data to support improved decision making. c. Business intelligence (BI) includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, visualization, analysis, interpretation, and presentation of data to support improved decision making. d. Business intelligence (BI) includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, visualization, analysis, interpretation, and presentation of data to support improved decision making.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Analytics and Business Intelligence QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.8 - State the primary difference between business intelligence and analytics. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal Copyright Cengage Learning. Powered by Cognero.

Page 29


Chapter 06 - Business Intelligence: Big Data and Analytics KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 11/19/2019 6:23 PM 2/26/2020 11:27 AM

45. _____ is the term used to describe enormous and complex data collections that traditional data management software, hardware, and analysis processes are incapable of handling. a. Data warehouse b. Data mart c. Big data d. Knowledge base ANSWER: c RATIONALE: Big data is the term used to describe data collections that are so enormous (terabytes or more) and complex (from sensor data to social media data) that traditional data management software, hardware, and analysis processes are incapable of dealing with them. FEEDBACK: a. Big data is the term used to describe data collections that are so enormous (terabytes or more) and complex (from sensor data to social media data) that traditional data management software, hardware, and analysis processes are incapable of dealing with them. b. Big data is the term used to describe data collections that are so enormous (terabytes or more) and complex (from sensor data to social media data) that traditional data management software, hardware, and analysis processes are incapable of dealing with them. c. Big data is the term used to describe data collections that are so enormous (terabytes or more) and complex (from sensor data to social media data) that traditional data management software, hardware, and analysis processes are incapable of dealing with them. d. Big data is the term used to describe data collections that are so enormous (terabytes or more) and complex (from sensor data to social media data) that traditional data management software, hardware, and analysis processes are incapable of dealing with them.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Big Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.1 - Identify five key characteristics associated with big data. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 2:01 PM 46. Jan is using her firm's data warehouse. If she is starting from monthly sales data, and wishes to get weekly sales data, she should use the ___ feature. a. roll up b. drill down c. slice and dice d. extract data ANSWER: b RATIONALE: A data warehouse is a large database that holds business information from many sources in the enterprise, covering all aspects of the company’s processes, products, and customers. The data can be analyzed in many ways. For example, data warehouses allow users to Copyright Cengage Learning. Powered by Cognero.

Page 30


Chapter 06 - Business Intelligence: Big Data and Analytics “drill down” to get greater detail or “roll up” to generate aggregate or summary reports. FEEDBACK:

a. Data warehouses allow users to “drill down” to get greater detail or “roll up” to generate aggregate or summary reports. b. Data warehouses allow users to “drill down” to get greater detail or “roll up” to generate aggregate or summary reports. c. Data warehouses allow users to “drill down” to get greater detail or “roll up” to generate aggregate or summary reports. d. Data warehouses allow users to “drill down” to get greater detail or “roll up” to generate aggregate or summary reports.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Data Warehouses, Data Marts, and Data Lakes QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.3 - Distinguish between the terms data warehouse, data mart, and data lake. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/26/2020 11:31 AM 47. A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making. a. data dictionary b. data model c. data mart d. data mine ANSWER: c RATIONALE: A data mart is a subset of a data warehouse. Data marts bring the data warehouse concept—lots of data from many sources—to small- and medium-sized businesses and to departments within larger companies. Rather than store all enterprise data in one monolithic database, data marts contain a subset of the data for a single aspect of a company’s business—for example, finance, inventory, or personnel. FEEDBACK: a. Data marts bring the data warehouse concept—lots of data from many sources—to small- and medium-sized businesses and to departments within larger companies. b. Data marts bring the data warehouse concept—lots of data from many sources—to small- and medium-sized businesses and to departments within larger companies. c. Data marts bring the data warehouse concept—lots of data from many sources—to small- and medium-sized businesses and to departments within larger companies. d. Data marts bring the data warehouse concept—lots of data from many sources—to small- and medium-sized businesses and to departments within larger companies.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Easy Data Warehouses, Data Marts, and Data Lakes Multiple Choice False

Copyright Cengage Learning. Powered by Cognero.

Page 31


Chapter 06 - Business Intelligence: Big Data and Analytics LEARNING OBJECTIVES: POIS.14e.6.3 - Distinguish between the terms data warehouse, data mart, and data lake. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 2:06 PM 48. Haley's employer has asked her to review a database containing thousands of social media posts about their company's products and extract the data the executive team needs to make decisions about these products and their marketing. In terms of the characteristics of big data, Haley is focusing on ________. a. volume b. value c. velocity d. veracity ANSWER: b RATIONALE: There are five key characteristics associated with big data: volume, velocity, value, variety, and veracity. Value in this context refers to the worth of the data in decision making. The acceleration in the volume of data makes it imperative to quickly “separate the wheat from the chaff” and identify the data truly needed for a particular decision-making scenario, process that data, and take action. FEEDBACK: a. Value in this context refers to the worth of the data in decision making. It is imperative to quickly identify the data truly needed for a particular decisionmaking scenario, process that data, and take action. b. Value in this context refers to the worth of the data in decision making. It is imperative to quickly identify the data truly needed for a particular decisionmaking scenario, process that data, and take action. c. Value in this context refers to the worth of the data in decision making. It is imperative to quickly identify the data truly needed for a particular decisionmaking scenario, process that data, and take action. d. Value in this context refers to the worth of the data in decision making. It is imperative to quickly identify the data truly needed for a particular decisionmaking scenario, process that data, and take action.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Big Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.1 - Identify five key characteristics associated with big data. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 6:22 PM DATE MODIFIED: 2/8/2020 2:47 PM 49. Between 2017 and 2025, _____. a. the volume of data in the digital universe is expected to grow to 16.1 zettabytes b. the volume of data in the digital universe is expected to grow tenfold c. almost all new data is expected to come from enterprise computer systems d. data collection from embedded systems will finally become possible ANSWER: b Copyright Cengage Learning. Powered by Cognero.

Page 32


Chapter 06 - Business Intelligence: Big Data and Analytics RATIONALE:

In 2017, it was estimated that the volume of data that exists in the digital universe was 16.1 zettabytes (one zettabyte equals one trillion gigabytes). The digital universe is expected to grow tenfold to an amazing 163 zettabytes by 2025. Most of this new data is expected to come from data gathered by embedded systems in such devices as smart meters, security cameras, RFID chips, autonomous automobiles, aircraft engines, medical devices, and home appliances.

FEEDBACK:

a. The digital universe is expected to grow tenfold to an amazing 163 zettabytes by 2025.

b. The digital universe is expected to grow tenfold to an amazing 163 zettabytes by 2025. c. The digital universe is expected to grow tenfold to an amazing 163 zettabytes by 2025. d. The digital universe is expected to grow tenfold to an amazing 163 zettabytes by 2025.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Big Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.1 - Identify five key characteristics associated with big data. KEYWORDS: Bloom's: Remember DATE CREATED: 2/26/2020 2:12 PM DATE MODIFIED: 2/26/2020 2:24 PM 50. One key characteristic of big data is that it is being generated at a rate of 2.5 quintillion bytes per day. This is known as big data's _____. a. variety b. volume c. veracity d. velocity ANSWER: d RATIONALE: Velocity refers to the rate at which new data is being generated—now estimated to be on the order of 2.5 quintillion bytes each day (that’s 2,500 followed by 15 zeros). This rate is accelerating rapidly, with 90 percent of the data in the world generated in just the past two years! FEEDBACK: a. Velocity refers to the rate at which new data is being generated—now estimated to be on the order of 2.5 quintillion bytes each day (that’s 2,500 followed by 15 zeros). b. Velocity refers to the rate at which new data is being generated—now estimated to be on the order of 2.5 quintillion bytes each day (that’s 2,500 followed by 15 zeros). c. Velocity refers to the rate at which new data is being generated—now estimated to be on the order of 2.5 quintillion bytes each day (that’s 2,500 followed by 15 zeros). d. Velocity refers to the rate at which new data is being generated—now estimated to be on the order of 2.5 quintillion bytes each day (that’s 2,500 followed by 15 zeros).

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 33


Chapter 06 - Business Intelligence: Big Data and Analytics DIFFICULTY: Easy REFERENCES: Big Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.1 - Identify five key characteristics associated with big data. KEYWORDS: Bloom's: Remember DATE CREATED: 2/26/2020 2:25 PM DATE MODIFIED: 2/26/2020 2:31 PM 51. Big data veracity is a measure of _____. a. the degree of organization or structure of the data b. the data's worth for decision making in a given scenario c. the accuracy, completeness, and currency of the data d. the rate at which data in an area is becoming available ANSWER: c RATIONALE: Veracity is a measure of the quality of the data. Is the data sufficiently accurate, complete, and current that it can be relied on and trusted to form the basis of good decision making? FEEDBACK: a. Veracity is a measure of the quality of the data. b. Veracity is a measure of the quality of the data. c. Veracity is a measure of the quality of the data. d. Veracity is a measure of the quality of the data. POINTS: 1 DIFFICULTY: Easy REFERENCES: Big Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.1 - Identify five key characteristics associated with big data. KEYWORDS: Bloom's: Remember DATE CREATED: 2/26/2020 2:26 PM DATE MODIFIED: 2/26/2020 2:39 PM 52. Guillarme, a data scientist, utilizes data from company documents, machine logs, Data.gov, and Facebook Graph in his work. What characteristic of big data does this best demonstrate? a. value b. veracity c. variety d. velocity ANSWER: c RATIONALE: Data today comes in a variety of formats. Some of the data is what computer scientists call structured data—its format is known in advance, and it fits nicely into traditional databases. However, most of the data that an organization must deal with is unstructured data, meaning that it is not organized in any predefined manner. Unstructured data comes from sources such as word-processing documents, social media, email, photos, surveillance video, and phone messages. Organizations collect and use data from a variety of sources, including business applications, social media, sensors and controllers that are part of the Copyright Cengage Learning. Powered by Cognero.

Page 34


Chapter 06 - Business Intelligence: Big Data and Analytics manufacturing process, systems that manage the physical environment in factories and offices, media sources (including audio and video broadcasts), machine logs that record events and customer call data, public sources (such as government Web sites), and archives of historical records of transactions and communications. Much of this collected data is unstructured and does not fit neatly into traditional relational database management systems. FEEDBACK:

a. Data today comes in a variety of formats. Organizations collect and use data

from a variety of sources, including business applications, social media, sensors and controllers that are part of the manufacturing process, systems that manage the physical environment in factories and offices, media sources, machine logs that record events and customer call data, public sources, and archives of historical records of transactions and communications. b. Data today comes in a variety of formats. Organizations collect and use data from a variety of sources, including business applications, social media, sensors and controllers that are part of the manufacturing process, systems that manage the physical environment in factories and offices, media sources, machine logs that record events and customer call data, public sources, and archives of historical records of transactions and communications. c. Data today comes in a variety of formats. Organizations collect and use data from a variety of sources, including business applications, social media, sensors and controllers that are part of the manufacturing process, systems that manage the physical environment in factories and offices, media sources, machine logs that record events and customer call data, public sources, and archives of historical records of transactions and communications. d. Data today comes in a variety of formats. Organizations collect and use data from a variety of sources, including business applications, social media, sensors and controllers that are part of the manufacturing process, systems that manage the physical environment in factories and offices, media sources, machine logs that record events and customer call data, public sources, and archives of historical records of transactions and communications.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Big Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.1 - Identify five key characteristics associated with big data. KEYWORDS: Bloom's: Understand DATE CREATED: 2/26/2020 2:26 PM DATE MODIFIED: 2/26/2020 2:46 PM 53. A hospital system that wants to utilize big data can use HIPAA regulations to help them _____. a. identify which data needs to be protected from unauthorized access b. find nuggets of data that are relevant to the decision making at hand c. choose a subset of data to store d. process unstructured data into a usable form ANSWER: a RATIONALE: The challenge of big data is manifold, with a variety of questions that must be answered, including how to choose what subset of data to store, where and how to store the data, how to find those nuggets of data that are relevant to the decision making at hand, how to derive value from the relevant data, and how to identify which data needs to be protected from Copyright Cengage Learning. Powered by Cognero.

Page 35


Chapter 06 - Business Intelligence: Big Data and Analytics unauthorized access. Trying to deal with all this data from so many different sources, much of it from outside the organization, can also increase the risk that the organization fails to comply with government regulations or internal controls. The Health Insurance Portability and Accountability Act (HIPAA) safeguards protect health information (PHI) and electronic PHI (ePHI) data gathered in the health care process and standardizes certain electronic transactions within the health care industry. FEEDBACK:

a. The Health Insurance Portability and Accountability Act (HIPAA) safeguards

protect health information (PHI) and electronic PHI (ePHI) data gathered in the health care process and standardizes certain electronic transactions within the health care industry. b. The Health Insurance Portability and Accountability Act (HIPAA) safeguards protect health information (PHI) and electronic PHI (ePHI) data gathered in the health care process and standardizes certain electronic transactions within the health care industry. c. The Health Insurance Portability and Accountability Act (HIPAA) safeguards protect health information (PHI) and electronic PHI (ePHI) data gathered in the health care process and standardizes certain electronic transactions within the health care industry. d. The Health Insurance Portability and Accountability Act (HIPAA) safeguards protect health information (PHI) and electronic PHI (ePHI) data gathered in the health care process and standardizes certain electronic transactions within the health care industry.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Challenges of Big Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.2 - Identify five key challenges associated with big data. KEYWORDS: Bloom's: Understand DATE CREATED: 2/26/2020 3:38 PM DATE MODIFIED: 2/26/2020 3:55 PM 54. One challenge presented by the volume of big data is that _____. a. it reduces the accuracy of analyses and the ability to improve matters through decisions b. corporations have reacted by taking too many precautions to protect customers' security c. there are few rules, regulations, or standards to guide U.S. IS organizations d. business users can have a hard time finding the information they need to make decisions ANSWER: d RATIONALE: With so much data available, business users can have a hard time finding the information they need to make decisions, and they may not trust the validity of the data they can access. FEEDBACK: a. With so much data available, business users can have a hard time finding the information they need to make decisions, and they may not trust the validity of the data they can access. b. With so much data available, business users can have a hard time finding the information they need to make decisions, and they may not trust the validity of the data they can access. c. With so much data available, business users can have a hard time finding the information they need to make decisions, and they may not trust the validity of the data they can access.

Copyright Cengage Learning. Powered by Cognero.

Page 36


Chapter 06 - Business Intelligence: Big Data and Analytics d. With so much data available, business users can have a hard time finding the

information they need to make decisions, and they may not trust the validity of the data they can access.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Challenges of Big Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.2 - Identify five key challenges associated with big data. KEYWORDS: Bloom's: Remember DATE CREATED: 2/26/2020 3:56 PM DATE MODIFIED: 2/26/2020 5:11 PM 55. Because they must deal with large quantities of data from so many different sources, IS employees at financial institutions may be at increased risk of failing to comply with government regulations designed to prevent money laundering, such as the _____. a. Sarbanes-Oxley Act b. Bank Secrecy Act c. HIPAA d. PCI Data Security Standard ANSWER: b RATIONALE: Trying to deal with all the data received from so many different sources, much of it from outside the organization, can also increase the risk that the organization fails to comply with government regulations or internal controls. The Bank Secrecy Act Detects and prevents money laundering by requiring financial institutions to report certain transactions to government agencies and to withhold from clients that such reports were filed about them. FEEDBACK: a. The Bank Secrecy Act Detects and prevents money laundering by requiring financial institutions to report certain transactions to government agencies and to withhold from clients that such reports were filed about them. b. The Bank Secrecy Act Detects and prevents money laundering by requiring financial institutions to report certain transactions to government agencies and to withhold from clients that such reports were filed about them. c. The Bank Secrecy Act Detects and prevents money laundering by requiring financial institutions to report certain transactions to government agencies and to withhold from clients that such reports were filed about them. d. The Bank Secrecy Act Detects and prevents money laundering by requiring financial institutions to report certain transactions to government agencies and to withhold from clients that such reports were filed about them.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Challenges of Big Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.2 - Identify five key challenges associated with big data. KEYWORDS: Bloom's: Remember DATE CREATED: 2/26/2020 5:00 PM Copyright Cengage Learning. Powered by Cognero.

Page 37


Chapter 06 - Business Intelligence: Big Data and Analytics DATE MODIFIED:

2/26/2020 5:23 PM

56. Marshall's company currently maintains their data on in-house servers, but his supervisor has asked him to research their options for having some or all of it hosted by a cloud service provider. Which challenge of big data is Marshall helping to address? a. where and how to store the data b. how to derive value from the relevant data c. how to choose what subset of data to store d. how to find the most relevant data nuggets ANSWER: a RATIONALE: The challenge of big data is manifold, with a variety of questions that must be answered, including how to choose what subset of data to store, where and how to store the data, how to find those nuggets of data that are relevant to the decision making at hand, how to derive value from the relevant data, and how to identify which data needs to be protected from unauthorized access. The question of whether to store the data on in-house servers or on the cloud relates most closely to the "where and how to store the data" issue. FEEDBACK: a. The question of whether to store the data on in-house servers or on the cloud relates most closely to the "where and how to store the data" issue. b. The question of whether to store the data on in-house servers or on the cloud relates most closely to the "where and how to store the data" issue. c. The question of whether to store the data on in-house servers or on the cloud relates most closely to the "where and how to store the data" issue. d. The question of whether to store the data on in-house servers or on the cloud relates most closely to the "where and how to store the data" issue.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Challenges of Big Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.2 - Identify five key challenges associated with big data. KEYWORDS: Bloom's: Remember DATE CREATED: 2/26/2020 5:00 PM DATE MODIFIED: 2/26/2020 5:32 PM 57. Some people are alarmed that big data applications allow organizations to develop extensive profiles of individuals without their knowledge or consent. This represents which type of concern related to big data? a. security b. privacy c. validity d. relevance ANSWER: b RATIONALE: Not everyone is happy with big data applications. Some people have privacy concerns about the fact that corporations are harvesting huge amounts of personal data that can be shared with other organizations. With all this data, organizations can develop extensive profiles of people without their knowledge or consent. FEEDBACK: a. Some people have privacy concerns about the fact that corporations are harvesting huge amounts of personal data that can be shared with other

Copyright Cengage Learning. Powered by Cognero.

Page 38


Chapter 06 - Business Intelligence: Big Data and Analytics organizations. With all this data, organizations can develop extensive profiles of people without their knowledge or consent. b. Some people have privacy concerns about the fact that corporations are harvesting huge amounts of personal data that can be shared with other organizations. With all this data, organizations can develop extensive profiles of people without their knowledge or consent. c. Some people have privacy concerns about the fact that corporations are harvesting huge amounts of personal data that can be shared with other organizations. With all this data, organizations can develop extensive profiles of people without their knowledge or consent. d. Some people have privacy concerns about the fact that corporations are harvesting huge amounts of personal data that can be shared with other organizations. With all this data, organizations can develop extensive profiles of people without their knowledge or consent.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Challenges of Big Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.2 - Identify five key challenges associated with big data. KEYWORDS: Bloom's: Remember DATE CREATED: 2/26/2020 5:00 PM DATE MODIFIED: 2/26/2020 5:38 PM 58. Jamie's corporation comes under scrutiny by the media when former employees allege that the IS department failed to correctly identify which data needed protection from unauthorized access. These accusers say that this organization is not ensuring its big data is _____. a. secure b. organized c. valid d. relevant ANSWER: a RATIONALE: The challenge of big data is manifold, with a variety of questions that must be answered, including how to choose what subset of data to store, where and how to store the data, how to find those nuggets of data that are relevant to the decision making at hand, how to derive value from the relevant data, and how to identify which data needs to be protected from unauthorized access. Big data introduces security concerns. Are organizations able to keep big data secure from competitors and malicious hackers? FEEDBACK: a. Big data introduces security concerns. Are organizations able to keep big data secure from competitors and malicious hackers? b. Big data introduces security concerns. Are organizations able to keep big data secure from competitors and malicious hackers? c. Big data introduces security concerns. Are organizations able to keep big data secure from competitors and malicious hackers? d. Big data introduces security concerns. Are organizations able to keep big data secure from competitors and malicious hackers?

POINTS: DIFFICULTY: REFERENCES:

1 Easy Challenges of Big Data

Copyright Cengage Learning. Powered by Cognero.

Page 39


Chapter 06 - Business Intelligence: Big Data and Analytics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.2 - Identify five key challenges associated with big data. KEYWORDS: Bloom's: Understand DATE CREATED: 2/26/2020 5:01 PM DATE MODIFIED: 2/26/2020 5:47 PM 59. The key challenges associated with big data include the difficulty of locating and deriving value from _____. a. regulations designed to prevent fraud b. security service providers c. relevant data to make decisions d. structured data to protect privacy ANSWER: c RATIONALE: The challenge of big data is manifold, with a variety of questions that must be answered, including how to choose what subset of data to store, where and how to store the data, how to find those nuggets of data that are relevant to the decision making at hand, how to derive value from the relevant data, and how to identify which data needs to be protected from unauthorized access. With so much data available, business users can have a hard time finding the information they need to make decisions, and they may not trust the validity of the data they can access. FEEDBACK: a. With so much data available, business users can have a hard time finding the information they need to make decisions, and they may not trust the validity of the data they can access. b. With so much data available, business users can have a hard time finding the information they need to make decisions, and they may not trust the validity of the data they can access. c. With so much data available, business users can have a hard time finding the information they need to make decisions, and they may not trust the validity of the data they can access. d. With so much data available, business users can have a hard time finding the information they need to make decisions, and they may not trust the validity of the data they can access.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Challenges of Big Data QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.2 - Identify five key challenges associated with big data. KEYWORDS: Bloom's: Remember DATE CREATED: 2/26/2020 5:01 PM DATE MODIFIED: 2/26/2020 6:03 PM 60. Melanie's company takes a "store everything" approach to big data, saving all of it in a raw, unaltered form. Only when she needs to analyze some of the data is it extracted from this _____. a. data mart b. data lake c. data warehouse Copyright Cengage Learning. Powered by Cognero.

Page 40


Chapter 06 - Business Intelligence: Big Data and Analytics d. in-memory database ANSWER: RATIONALE:

FEEDBACK:

b A data lake takes a “store everything” approach to big data, saving all the data in its raw and unaltered form. The raw data residing in a data lake is available when users decide just how they want to use the data to glean new insights. Only when the data is accessed for a specific analysis is it extracted from the data lake, classified, organized, edited, or transformed. a. A data lake takes a “store everything” approach to big data, saving all the data in its raw and unaltered form. Only when the data is accessed for a specific analysis is it extracted from the data lake, classified, organized, edited, or transformed. b. A data lake takes a “store everything” approach to big data, saving all the data in its raw and unaltered form. Only when the data is accessed for a specific analysis is it extracted from the data lake, classified, organized, edited, or transformed. c. A data lake takes a “store everything” approach to big data, saving all the data in its raw and unaltered form. Only when the data is accessed for a specific analysis is it extracted from the data lake, classified, organized, edited, or transformed. d. A data lake takes a “store everything” approach to big data, saving all the data in its raw and unaltered form. Only when the data is accessed for a specific analysis is it extracted from the data lake, classified, organized, edited, or transformed.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Warehouses, Data Marts, and Data Lakes QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.3 - Distinguish between the terms data warehouse, data mart, and data lake. KEYWORDS: Bloom's: Remember DATE CREATED: 2/27/2020 12:58 PM DATE MODIFIED: 2/27/2020 1:07 PM 61. Barry's job responsibilities include helping maintain a large database that holds business information from over a dozen source systems, covering all aspects of his company's processes, products, and customers. This database contains not only enterprise data but also data from other organizations. Barry works with a(n) _____. a. data mart b. data lake c. data warehouse d. in-memory database ANSWER: c RATIONALE: A data warehouse is a large database that holds business information from many sources in the enterprise, covering all aspects of the company’s processes, products, and customers. It is not unusual for a data warehouse to contain data from over a dozen source systems— both systems internal to the organization and potentially data obtained from sources outside the organization (e.g., data aggregators, social media Web sites, government databases, etc.). FEEDBACK: a. A data warehouse is a large database that holds business information from Copyright Cengage Learning. Powered by Cognero.

Page 41


Chapter 06 - Business Intelligence: Big Data and Analytics many sources in the enterprise, covering all aspects of the company’s processes, products, and customers. b. A data warehouse is a large database that holds business information from many sources in the enterprise, covering all aspects of the company’s processes, products, and customers. c. A data warehouse is a large database that holds business information from many sources in the enterprise, covering all aspects of the company’s processes, products, and customers. d. A data warehouse is a large database that holds business information from many sources in the enterprise, covering all aspects of the company’s processes, products, and customers.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Warehouses, Data Marts, and Data Lakes QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.3 - Distinguish between the terms data warehouse, data mart, and data lake. KEYWORDS: Bloom's: Remember DATE CREATED: 2/27/2020 1:06 PM DATE MODIFIED: 2/27/2020 1:14 PM 62. Why is an effective ETL process essential to data warehousing? a. "Dirty data" can result in incorrect or misleading statistics used for decision making. b. Small- to medium-sized businesses need a suitable data warehousing option. c. The ETL process removes the necessity for a predefined database schema. d. Horizontal scaling of a relational database enables multiple servers to operate on the data. ANSWER: a RATIONALE: Because data warehouses are used for decision making, maintaining a high quality of data is vital so that organizations avoid wrong conclusions. For instance, duplicated or missing information will produce incorrect or misleading statistics (“garbage in, garbage out”). Due to the wide range of possible data inconsistencies and the sheer data volume, data quality is considered one of the biggest issues in data warehousing. Data warehouses are continuously refreshed with huge amounts of data from a variety of sources so the probability that some of the sources contain “dirty data” is high. The Extract Transform Load (ETL) process takes data from a variety of sources, edits and transforms it into the format used in the data warehouse, and then loads this data into the warehouse. FEEDBACK: a. Data warehouses are continuously refreshed with huge amounts of data from a variety of sources so the probability that some of the sources contain “dirty data” is high. The Extract Transform Load (ETL) process takes data from a variety of sources, edits and transforms it into the format used in the data warehouse, and then loads this data into the warehouse. b. Data warehouses are continuously refreshed with huge amounts of data from a variety of sources so the probability that some of the sources contain “dirty data” is high. The Extract Transform Load (ETL) process takes data from a variety of sources, edits and transforms it into the format used in the data warehouse, and then loads this data into the warehouse. c. Data warehouses are continuously refreshed with huge amounts of data from a variety of sources so the probability that some of the sources contain “dirty data” is high. The Extract Transform Load (ETL) process takes data from a

Copyright Cengage Learning. Powered by Cognero.

Page 42


Chapter 06 - Business Intelligence: Big Data and Analytics variety of sources, edits and transforms it into the format used in the data warehouse, and then loads this data into the warehouse. d. Data warehouses are continuously refreshed with huge amounts of data from a variety of sources so the probability that some of the sources contain “dirty data” is high. The Extract Transform Load (ETL) process takes data from a variety of sources, edits and transforms it into the format used in the data warehouse, and then loads this data into the warehouse.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Warehouses, Data Marts, and Data Lakes QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.4 - Explain the purpose of each step in the extract, transform, load process. KEYWORDS: Bloom's: Remember DATE CREATED: 2/27/2020 1:17 PM DATE MODIFIED: 2/27/2020 2:28 PM 63. Which of the following is required to create a traditional data warehouse but NOT a data lake? a. Extract Transform Load process b. raw data c. data storage d. OLTP system and/or other data source(s) ANSWER: a RATIONALE: A traditional data warehouse is created by extracting (and discarding some data in the process), transforming (modifying), and loading incoming data for predetermined and specific analyses and applications. This process can be lengthy and computer intensive, taking days to complete. A data lake takes a “store everything” approach to big data, saving all the data in its raw and unaltered form. Only when the data is accessed for a specific analysis is it extracted from the data lake, classified, organized, edited, or transformed. FEEDBACK: a. Only when the data is accessed for a specific analysis is it extracted from the data lake, classified, organized, edited, or transformed.

b. Only when the data is accessed for a specific analysis is it extracted from the data lake, classified, organized, edited, or transformed. c. Only when the data is accessed for a specific analysis is it extracted from the data lake, classified, organized, edited, or transformed. d. Only when the data is accessed for a specific analysis is it extracted from the data lake, classified, organized, edited, or transformed.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Warehouses, Data Marts, and Data Lakes QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.4 - Explain the purpose of each step in the extract, transform, load process. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 43


Chapter 06 - Business Intelligence: Big Data and Analytics DATE CREATED: DATE MODIFIED:

2/27/2020 2:15 PM 2/27/2020 2:39 PM

64. Which step of the ETL process has the goal of collecting source data from all the desired sources and converting it into a single format suitable for processing? a. edit b. load c. transform d. extract ANSWER: d RATIONALE: Source data for the data warehouse comes from many sources and systems. The goal of the extract process is to extract the source data from all the various sources and convert it into a single format suitable for processing. During the extract step, data that fails to meet expected patterns or values may be rejected from further processing (e.g., blank or nonnumeric data in net sales field or a product code outside the defined range of valid codes). FEEDBACK: a. The goal of the extract process is to extract the source data from all the various sources and convert it into a single format suitable for processing.

b. The goal of the extract process is to extract the source data from all the various sources and convert it into a single format suitable for processing. c. The goal of the extract process is to extract the source data from all the various sources and convert it into a single format suitable for processing. d. The goal of the extract process is to extract the source data from all the various sources and convert it into a single format suitable for processing.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Warehouses, Data Marts, and Data Lakes QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.4 - Explain the purpose of each step in the extract, transform, load process. KEYWORDS: Bloom's: Remember DATE CREATED: 2/27/2020 2:16 PM DATE MODIFIED: 2/27/2020 2:46 PM 65. During which step of the ETL process can data that fails to meet expected patterns or values be rejected to help clean up "dirty data"? a. edit b. load c. transform d. extract ANSWER: d RATIONALE: Source data for the data warehouse comes from many sources and systems. The goal of the extract process is to extract the source data from all the various sources and convert it into a single format suitable for processing. During the extract step, data that fails to meet expected patterns or values may be rejected from further processing (e.g., blank or nonnumeric data in net sales field or a product code outside the defined range of valid Copyright Cengage Learning. Powered by Cognero.

Page 44


Chapter 06 - Business Intelligence: Big Data and Analytics codes). FEEDBACK:

a. During the extract step, data that fails to meet expected patterns or values may

be rejected from further processing (e.g., blank or nonnumeric data in net sales field or a product code outside the defined range of valid codes). b. During the extract step, data that fails to meet expected patterns or values may be rejected from further processing (e.g., blank or nonnumeric data in net sales field or a product code outside the defined range of valid codes). c. During the extract step, data that fails to meet expected patterns or values may be rejected from further processing (e.g., blank or nonnumeric data in net sales field or a product code outside the defined range of valid codes). d. During the extract step, data that fails to meet expected patterns or values may be rejected from further processing (e.g., blank or nonnumeric data in net sales field or a product code outside the defined range of valid codes).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Warehouses, Data Marts, and Data Lakes QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.4 - Explain the purpose of each step in the extract, transform, load process. KEYWORDS: Bloom's: Remember DATE CREATED: 2/27/2020 2:17 PM DATE MODIFIED: 2/27/2020 2:50 PM 66. Which of the following events is an example of a transformation that might occur during the second stage of the ETL process? a. a sales district is substituted for a customer's street address b. nonnumeric data that appears in a net sales field is rejected c. a new index is created d. Oracle Data Integrator or IBM InfoSphere Datastage is implemented ANSWER: a RATIONALE: During the transform stage of the ETL process, a series of rules or algorithms are applied to the extracted data to derive the data that will be stored in the data warehouse. A common type of transformation is to convert a customer’s street address, city, state, and zip code to an organization-assigned sales district or government census tract. Also, data is often aggregated to reduce the processing time required to create anticipated reports. For example, total sales may be accumulated by store or sales district. FEEDBACK: a. A common type of transformation is to convert a customer’s street address, city, state, and zip code to an organization-assigned sales district or government census tract. b. A common type of transformation is to convert a customer’s street address, city, state, and zip code to an organization-assigned sales district or government census tract. c. A common type of transformation is to convert a customer’s street address, city, state, and zip code to an organization-assigned sales district or government census tract. d. A common type of transformation is to convert a customer’s street address, city, state, and zip code to an organization-assigned sales district or government census tract.

Copyright Cengage Learning. Powered by Cognero.

Page 45


Chapter 06 - Business Intelligence: Big Data and Analytics POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Warehouses, Data Marts, and Data Lakes QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.4 - Explain the purpose of each step in the extract, transform, load process. KEYWORDS: Bloom's: Remember DATE CREATED: 2/27/2020 2:17 PM DATE MODIFIED: 2/27/2020 3:59 PM 67. During the load phase of the ETL process, _____. a. quality control measures are not necessary because of the previous two phases b. the data is often aggregated to reduce anticipated report processing time c. the data is checked against the constraints defined in the database schema d. progress in processing the data is more rapid than in the previous two phases ANSWER: c RATIONALE: During the load stage of the ETL process, the extracted and transformed data is loaded into the data warehouse. As the data is being loaded into the data warehouse, new indices are created and the data is checked against the constraints defined in the database schema to ensure its quality. As a result, the data load stage for a large data warehouse can take days. FEEDBACK: a. As the data is being loaded into the data warehouse, new indices are created and the data is checked against the constraints defined in the database schema to ensure its quality. b. As the data is being loaded into the data warehouse, new indices are created and the data is checked against the constraints defined in the database schema to ensure its quality. c. As the data is being loaded into the data warehouse, new indices are created and the data is checked against the constraints defined in the database schema to ensure its quality. d. As the data is being loaded into the data warehouse, new indices are created and the data is checked against the constraints defined in the database schema to ensure its quality.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Warehouses, Data Marts, and Data Lakes QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.4 - Explain the purpose of each step in the extract, transform, load process. KEYWORDS: Bloom's: Remember DATE CREATED: 2/27/2020 2:17 PM DATE MODIFIED: 2/27/2020 4:05 PM 68. A well-designed series of rules or algorithms is a key component of which stage of the ETL process? a. extract b. edit Copyright Cengage Learning. Powered by Cognero.

Page 46


Chapter 06 - Business Intelligence: Big Data and Analytics c. load d. transform ANSWER: RATIONALE: FEEDBACK:

d During the transform stage of the ETL process, a series of rules or algorithms are applied to the extracted data to derive the data that will be stored in the data warehouse. a. During the transform stage of the ETL process, a series of rules or algorithms are applied to the extracted data to derive the data that will be stored in the data warehouse. b. During the transform stage of the ETL process, a series of rules or algorithms are applied to the extracted data to derive the data that will be stored in the data warehouse. c. During the transform stage of the ETL process, a series of rules or algorithms are applied to the extracted data to derive the data that will be stored in the data warehouse. d. During the transform stage of the ETL process, a series of rules or algorithms are applied to the extracted data to derive the data that will be stored in the data warehouse.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Data Warehouses, Data Marts, and Data Lakes QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.4 - Explain the purpose of each step in the extract, transform, load process. KEYWORDS: Bloom's: Remember DATE CREATED: 2/27/2020 2:18 PM DATE MODIFIED: 2/27/2020 4:10 PM 69. One key difference between a relational database and a NoSQL database is _____. a. where data comes from b. the way data storage and retrieval are modeled c. which vendors provide applicable software tools d. the data backup and recovery procedure ANSWER: b RATIONALE: A NoSQL database differs from a relational database in that it provides a means to store and retrieve data that is modeled using some means other than the simple two-dimensional tabular relations used in relational databases. FEEDBACK: a. A NoSQL database differs from a relational database in that it provides a means to store and retrieve data that is modeled using some means other than the simple two-dimensional tabular relations used in relational databases. b. A NoSQL database differs from a relational database in that it provides a means to store and retrieve data that is modeled using some means other than the simple two-dimensional tabular relations used in relational databases. c. A NoSQL database differs from a relational database in that it provides a means to store and retrieve data that is modeled using some means other than the simple two-dimensional tabular relations used in relational databases. d. A NoSQL database differs from a relational database in that it provides a means to store and retrieve data that is modeled using some means other than the simple two-dimensional tabular relations used in relational databases.

Copyright Cengage Learning. Powered by Cognero.

Page 47


Chapter 06 - Business Intelligence: Big Data and Analytics POINTS: 1 DIFFICULTY: Easy REFERENCES: NoSQL Databases QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.5 - State four ways a NoSQL database is different from an SQL database. KEYWORDS: Bloom's: Remember DATE CREATED: 2/27/2020 4:21 PM DATE MODIFIED: 2/27/2020 4:33 PM 70. One difference between NoSQL and relational databases is that _____. a. NoSQL databases require large, powerful, and expensive proprietary servers b. relational databases consistently provide faster response times for queries c. NoSQL databases have a greater horizontal scaling capability d. relational databases can easily spread data over multiple servers ANSWER: c RATIONALE: A difference between NoSQL and relational databases is that NoSQL databases have the capability to spread data over multiple servers so that each server contains only a subset of the total data. This so-called horizontal scaling capability enables hundreds or even thousands of servers to operate on the data, providing faster response times for queries and updates. Most relational database management systems have problems with such horizontal scaling and instead require large, powerful, and expensive proprietary servers and large storage systems. FEEDBACK: a. A difference between NoSQL and relational databases is that NoSQL databases have the capability to spread data over multiple servers so that each server contains only a subset of the total data--so-called horizontal scaling capability. b. A difference between NoSQL and relational databases is that NoSQL databases have the capability to spread data over multiple servers so that each server contains only a subset of the total data--so-called horizontal scaling capability. c. A difference between NoSQL and relational databases is that NoSQL databases have the capability to spread data over multiple servers so that each server contains only a subset of the total data--so-called horizontal scaling capability. d. A difference between NoSQL and relational databases is that NoSQL databases have the capability to spread data over multiple servers so that each server contains only a subset of the total data--so-called horizontal scaling capability.

POINTS: 1 DIFFICULTY: Easy REFERENCES: NoSQL Databases QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.5 - State four ways a NoSQL database is different from an SQL database. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 48


Chapter 06 - Business Intelligence: Big Data and Analytics DATE CREATED: DATE MODIFIED:

2/27/2020 4:23 PM 2/27/2020 4:54 PM

71. A newly discovered entity or attribute can be added to a NoSQL database dynamically because _____. a. the database provides horizontal scaling capability b. data storage is modeled using simple two-dimensional relations c. NoSQL databases do not conform to ACID properties d. NoSQL databases do not require a predefined schema ANSWER: d RATIONALE: A difference between relational and NoSQL databases is that NOSQL database do not require a predefined schema; data entities can have attributes edited or assigned to them at any time. If a new entity or attribute is discovered, it can be added to the database dynamically, extending what is already modelled in the database. FEEDBACK: a. A difference between relational and NoSQL databases is that NOSQL database do not require a predefined schema; data entities can have attributes edited or assigned to them at any time. If a new entity or attribute is discovered, it can be added to the database dynamically, extending what is already modelled in the database. b. A difference between relational and NoSQL databases is that NOSQL database do not require a predefined schema; data entities can have attributes edited or assigned to them at any time. If a new entity or attribute is discovered, it can be added to the database dynamically, extending what is already modelled in the database. c. A difference between relational and NoSQL databases is that NOSQL database do not require a predefined schema; data entities can have attributes edited or assigned to them at any time. If a new entity or attribute is discovered, it can be added to the database dynamically, extending what is already modelled in the database. d. A difference between relational and NoSQL databases is that NOSQL database do not require a predefined schema; data entities can have attributes edited or assigned to them at any time. If a new entity or attribute is discovered, it can be added to the database dynamically, extending what is already modelled in the database.

POINTS: 1 DIFFICULTY: Easy REFERENCES: NoSQL Databases QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.5 - State four ways a NoSQL database is different from an SQL database. KEYWORDS: Bloom's: Remember DATE CREATED: 2/27/2020 4:23 PM DATE MODIFIED: 2/27/2020 5:01 PM 72. Sometimes Theodore's queries for data from his employer's NoSQL database do not return the most current data. Why is this? a. In a NoSQL database, changes are propagated to all nodes instantaneously. b. NoSQL databases provide for "eventual consistency" when processing transactions. c. Transaction processing in a NoSQL database conforms to true ACID properties. Copyright Cengage Learning. Powered by Cognero.

Page 49


Chapter 06 - Business Intelligence: Big Data and Analytics d. NoSQL data structures are less flexible than those in relational databases. ANSWER: b RATIONALE: A difference between NoSQL and relational databases is that NoSQL databases do not conform to true ACID properties when processing transactions. Instead they provide for “eventual consistency” in which database changes are propagated to all nodes eventually (typically within milliseconds), so it is possible that user queries for data might not return the most current data. FEEDBACK: a. NoSQL databases provide for “eventual consistency” in which database changes are propagated to all nodes eventually (typically within milliseconds), so it is possible that user queries for data might not return the most current data. b. NoSQL databases provide for “eventual consistency” in which database changes are propagated to all nodes eventually (typically within milliseconds), so it is possible that user queries for data might not return the most current data. c. NoSQL databases provide for “eventual consistency” in which database changes are propagated to all nodes eventually (typically within milliseconds), so it is possible that user queries for data might not return the most current data. d. NoSQL databases provide for “eventual consistency” in which database changes are propagated to all nodes eventually (typically within milliseconds), so it is possible that user queries for data might not return the most current data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: NoSQL Databases QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.5 - State four ways a NoSQL database is different from an SQL database. KEYWORDS: Bloom's: Remember DATE CREATED: 2/27/2020 4:24 PM DATE MODIFIED: 2/27/2020 5:09 PM 73. Graph NoSQL databases _____. a. are well-suited for analyzing interconnections b. have only two columns c. store, retrieve, and manage document-related information d. focus on only keys and values ANSWER: a RATIONALE: Graph NoSQL databases are used to understand the relationships among events, people, transactions, locations, and sensor readings and are well-suited for analyzing interconnections such as when extracting data from social media. FEEDBACK: a. Graph NoSQL databases are used to understand the relationships among events, people, transactions, locations, and sensor readings and are wellsuited for analyzing interconnections such as when extracting data from social media. b. Graph NoSQL databases are used to understand the relationships among events, people, transactions, locations, and sensor readings and are well-

Copyright Cengage Learning. Powered by Cognero.

Page 50


Chapter 06 - Business Intelligence: Big Data and Analytics suited for analyzing interconnections such as when extracting data from social media. c. Graph NoSQL databases are used to understand the relationships among events, people, transactions, locations, and sensor readings and are wellsuited for analyzing interconnections such as when extracting data from social media. d. Graph NoSQL databases are used to understand the relationships among events, people, transactions, locations, and sensor readings and are wellsuited for analyzing interconnections such as when extracting data from social media.

POINTS: 1 DIFFICULTY: Easy REFERENCES: NoSQL Databases QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.5 - State four ways a NoSQL database is different from an SQL database. KEYWORDS: Bloom's: Remember DATE CREATED: 2/27/2020 4:24 PM DATE MODIFIED: 2/27/2020 5:22 PM 74. The Amazon DynamoDB and Oracle NoSQL Database products both support which data storage and retrieval models? a. graph and column b. document and key-value c. two-dimensional and three-dimensional d. row and column ANSWER: b RATIONALE: Amazon DynamoDB is a NoSQL database that supports both document and key-value store models. Oracle NoSQL Database likewise supports both. FEEDBACK: a. Amazon DynamoDB is a NoSQL database that supports both document and key-value store models. Oracle NoSQL Database likewise supports both. b. Amazon DynamoDB is a NoSQL database that supports both document and key-value store models. Oracle NoSQL Database likewise supports both. c. Amazon DynamoDB is a NoSQL database that supports both document and key-value store models. Oracle NoSQL Database likewise supports both. d. Amazon DynamoDB is a NoSQL database that supports both document and key-value store models. Oracle NoSQL Database likewise supports both.

POINTS: 1 DIFFICULTY: Easy REFERENCES: NoSQL Databases QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.5 - State four ways a NoSQL database is different from an SQL database. KEYWORDS: Bloom's: Remember DATE CREATED: 2/27/2020 4:24 PM Copyright Cengage Learning. Powered by Cognero.

Page 51


Chapter 06 - Business Intelligence: Big Data and Analytics DATE MODIFIED:

2/27/2020 5:35 PM

75. Donna is a member of a team trying to select the best type of database for a business problem. If the database must handle a variety of data, she would like to store the data on a group of servers, and the data structures must be very flexible, what would you suggest? a. Either a NoSQL or a relational database would be a good fit. b. Neither a NoSQL nor a relational database would be a good fit. c. A relational database would likely be a better fit than a NoSQL database. d. A NoSQL database would likely be a better fit than a relational database. ANSWER: d RATIONALE: A NoSQL database differs from a relational database in that it provides a means to store and retrieve data that is modeled using some means other than the simple two-dimensional tabular relations used in relational databases. A second difference is that NoSQL databases have the capability to spread data over multiple servers so that each server contains only a subset of the total data. This so-called horizontal scaling capability enables hundreds or even thousands of servers to operate on the data, providing faster response times for queries and updates. Often, the data structures used by NoSQL databases are more flexible than relational database tables and, in many cases, they can provide improved access speed and redundancy. FEEDBACK: a. NoSQL databases have the capability to spread data over multiple servers so that each server contains only a subset of the total data. Often, the data structures used by NoSQL databases are more flexible than relational database tables and, in many cases, they can provide improved access speed and redundancy. b. NoSQL databases have the capability to spread data over multiple servers so that each server contains only a subset of the total data. Often, the data structures used by NoSQL databases are more flexible than relational database tables and, in many cases, they can provide improved access speed and redundancy. c. NoSQL databases have the capability to spread data over multiple servers so that each server contains only a subset of the total data. Often, the data structures used by NoSQL databases are more flexible than relational database tables and, in many cases, they can provide improved access speed and redundancy. d. NoSQL databases have the capability to spread data over multiple servers so that each server contains only a subset of the total data. Often, the data structures used by NoSQL databases are more flexible than relational database tables and, in many cases, they can provide improved access speed and redundancy.

POINTS: 1 DIFFICULTY: Easy REFERENCES: NoSQL Databases QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.5 - State four ways a NoSQL database is different from an SQL database. KEYWORDS: Bloom's: Remember DATE CREATED: 2/27/2020 4:24 PM DATE MODIFIED: 2/28/2020 6:59 AM Copyright Cengage Learning. Powered by Cognero.

Page 52


Chapter 06 - Business Intelligence: Big Data and Analytics 76. What open-source software framework includes several software modules that provide a means for storing and processing extremely large data sets, organized into two primary components? a. Apache Storm b. NoSQL Database c. Hadoop d. Allegro ANSWER: c RATIONALE: Hadoop is an open-source software framework that includes several software modules that provide a means for storing and processing extremely large data sets. Hadoop has two primary components: a data processing component (a Java-based system called MapReduce, which is discussed in the next section) and a distributed file system called the Hadoop Distributed File System (HDFS) for data storage. FEEDBACK: a. Hadoop is an open-source software framework that includes several software modules that provide a means for storing and processing extremely large data sets. Hadoop has two primary components. b. Hadoop is an open-source software framework that includes several software modules that provide a means for storing and processing extremely large data sets. Hadoop has two primary components. c. Hadoop is an open-source software framework that includes several software modules that provide a means for storing and processing extremely large data sets. Hadoop has two primary components. d. Hadoop is an open-source software framework that includes several software modules that provide a means for storing and processing extremely large data sets. Hadoop has two primary components.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Hadoop QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.6 - Identify the two primary components of the Hadoop computing environment. KEYWORDS: Bloom's: Remember DATE CREATED: 2/28/2020 7:12 AM DATE MODIFIED: 2/28/2020 7:19 AM 77. Hadoop's two major components are _____. a. a data processing component and a distributed file system b. a cluster and a group of servers c. a JobTracker and a group of TaskTrackers d. a real-time data processor and a framework for data analytics ANSWER: a RATIONALE: Hadoop has two primary components: a data processing component (a Java-based system called MapReduce, which is discussed in the next section) and a distributed file system called the Hadoop Distributed File System (HDFS) for data storage. FEEDBACK: a. Hadoop has two primary components: a data processing component (a Javabased system called MapReduce, which is discussed in the next section) and a distributed file system called the Hadoop Distributed File System (HDFS) for data storage.

Copyright Cengage Learning. Powered by Cognero.

Page 53


Chapter 06 - Business Intelligence: Big Data and Analytics b. Hadoop has two primary components: a data processing component (a Java-

based system called MapReduce, which is discussed in the next section) and a distributed file system called the Hadoop Distributed File System (HDFS) for data storage. c. Hadoop has two primary components: a data processing component (a Javabased system called MapReduce, which is discussed in the next section) and a distributed file system called the Hadoop Distributed File System (HDFS) for data storage. d. Hadoop has two primary components: a data processing component (a Javabased system called MapReduce, which is discussed in the next section) and a distributed file system called the Hadoop Distributed File System (HDFS) for data storage.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Hadoop QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.6 - Identify the two primary components of the Hadoop computing environment. KEYWORDS: Bloom's: Remember DATE CREATED: 2/28/2020 7:13 AM DATE MODIFIED: 2/28/2020 7:23 AM 78. Which statement about Hadoop is correct? a. Hadoop's major limitation is that is cannot perform batch processing. b. Each server in a Hadoop cluster houses the entire data set plus a processing system. c. Hadoop's HDFS divides data into subsets and distributes them onto different servers. d. Hadoop runs on top of an existing Apache Storm cluster and accesses its data store. ANSWER: c RATIONALE: Hadoop divides data into subsets and distributes the subsets onto different servers for processing. A Hadoop cluster may consist of thousands of servers. In a Hadoop cluster, a subset of the data within the HDFS and the MapReduce system are housed on every server in the cluster. This places the data processing software on the same servers where the data is stored, thus speeding up data retrieval. This approach creates a highly redundant computing environment that allows the application to keep running even if individual servers fail. FEEDBACK: a. Hadoop divides data into subsets and distributes the subsets onto different servers for processing.

b. Hadoop divides data into subsets and distributes the subsets onto different servers for processing. c. Hadoop divides data into subsets and distributes the subsets onto different servers for processing. d. Hadoop divides data into subsets and distributes the subsets onto different servers for processing.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Hadoop Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 54


Chapter 06 - Business Intelligence: Big Data and Analytics HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.6 - Identify the two primary components of the Hadoop computing environment. KEYWORDS: Bloom's: Remember DATE CREATED: 2/28/2020 7:14 AM DATE MODIFIED: 2/28/2020 7:49 AM 79. Hadoop processes data using a Java-based system called _____. a. Spark b. JobTracker c. HDFS d. MapReduce ANSWER: d RATIONALE: Hadoop has two primary components: a data processing component (a Java-based system called MapReduce, which is discussed in the next section) and a distributed file system called the Hadoop Distributed File System (HDFS) for data storage. FEEDBACK: a. Hadoop has two primary components: a data processing component (a Javabased system called MapReduce b. Hadoop has two primary components: a data processing component (a Javabased system called MapReduce c. Hadoop has two primary components: a data processing component (a Javabased system called MapReduce d. Hadoop has two primary components: a data processing component (a Javabased system called MapReduce

POINTS: 1 DIFFICULTY: Easy REFERENCES: Hadoop QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.6 - Identify the two primary components of the Hadoop computing environment. KEYWORDS: Bloom's: Remember DATE CREATED: 2/28/2020 7:13 AM DATE MODIFIED: 2/28/2020 7:37 AM 80. What does Hadoop's Map procedure from its MapReduce program do? a. summarizes b. filters and sorts c. visualizes and reports d. analyzes ANSWER: b RATIONALE: A MapReduce program is composed of a Map procedure that performs filtering and sorting (such as sorting customer orders by product ID into queues, with one queue for each product ID) and a Reduce method that performs a summary operation (such as counting the number of orders in each queue, thus determining product ID frequencies). FEEDBACK: a. A MapReduce program is composed of a Map procedure that performs filtering Copyright Cengage Learning. Powered by Cognero.

Page 55


Chapter 06 - Business Intelligence: Big Data and Analytics and sorting and a Reduce method that performs a summary operation. b. A MapReduce program is composed of a Map procedure that performs filtering and sorting and a Reduce method that performs a summary operation. c. A MapReduce program is composed of a Map procedure that performs filtering and sorting and a Reduce method that performs a summary operation. d. A MapReduce program is composed of a Map procedure that performs filtering and sorting and a Reduce method that performs a summary operation.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Hadoop QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.6 - Identify the two primary components of the Hadoop computing environment. KEYWORDS: Bloom's: Remember DATE CREATED: 2/28/2020 7:14 AM DATE MODIFIED: 2/28/2020 2:22 PM 81. Once customer orders are organized into queues based on product ID, the component of the Hadoop software that performs a summary operation, such as determining how frequently each product was ordered, is the _____. a. Reduce method b. HDFS c. Map procedure d. JobTracker ANSWER: a RATIONALE: A MapReduce program is composed of a Map procedure that performs filtering and sorting (such as sorting customer orders by product ID into queues, with one queue for each product ID) and a Reduce method that performs a summary operation (such as counting the number of orders in each queue, thus determining product ID frequencies). FEEDBACK: a. A MapReduce program is composed of a Map procedure that performs filtering and sorting (such as sorting customer orders by product ID into queues, with one queue for each product ID) and a Reduce method that performs a summary operation (such as counting the number of orders in each queue, thus determining product ID frequencies). b. A MapReduce program is composed of a Map procedure that performs filtering and sorting (such as sorting customer orders by product ID into queues, with one queue for each product ID) and a Reduce method that performs a summary operation (such as counting the number of orders in each queue, thus determining product ID frequencies). c. A MapReduce program is composed of a Map procedure that performs filtering and sorting (such as sorting customer orders by product ID into queues, with one queue for each product ID) and a Reduce method that performs a summary operation (such as counting the number of orders in each queue, thus determining product ID frequencies). d. A MapReduce program is composed of a Map procedure that performs filtering and sorting (such as sorting customer orders by product ID into queues, with one queue for each product ID) and a Reduce method that performs a summary operation (such as counting the number of orders in each queue, thus determining product ID frequencies).

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 56


Chapter 06 - Business Intelligence: Big Data and Analytics DIFFICULTY: Easy REFERENCES: Hadoop QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.6 - Identify the two primary components of the Hadoop computing environment. KEYWORDS: Bloom's: Remember DATE CREATED: 2/28/2020 7:14 AM DATE MODIFIED: 2/28/2020 2:23 PM 82. Which statement regarding processing task completion using Hadoop's MapReduce program is correct? a. MapReduce employs a JobTracker residing on the master server and TaskTrackers residing on other servers. b. The TaskTrackers divide computing jobs up into well-defined tasks and move those to the JobTracker. c. TaskTrackers ensure that only one server in the cluster operates on data at a time to maintain concurrency control. d. After processing, subsets of data are reduced back from the central node to other nodes in the cluster. ANSWER: a RATIONALE: MapReduce employs a JobTracker that resides on the Hadoop master server as well as TaskTrackers that sit on each server within the Hadoop cluster of servers. The JobTracker divides the computing job up into well-defined tasks and moves those tasks out to the individual TaskTrackers on the servers in the Hadoop cluster where the needed data resides. These servers operate in parallel to complete the necessary computing. Once their work is complete, the resulting subset of data is reduced back to the central node of the Hadoop cluster. FEEDBACK: a. MapReduce employs a JobTracker that resides on the Hadoop master server as well as TaskTrackers that sit on each server within the Hadoop cluster of servers. b. MapReduce employs a JobTracker that resides on the Hadoop master server as well as TaskTrackers that sit on each server within the Hadoop cluster of servers. c. MapReduce employs a JobTracker that resides on the Hadoop master server as well as TaskTrackers that sit on each server within the Hadoop cluster of servers. d. MapReduce employs a JobTracker that resides on the Hadoop master server as well as TaskTrackers that sit on each server within the Hadoop cluster of servers.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Hadoop QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.6 - Identify the two primary components of the Hadoop computing environment. KEYWORDS: Bloom's: Remember DATE CREATED: 2/28/2020 7:14 AM DATE MODIFIED: 2/28/2020 2:33 PM 83. A database system that stores the entire database in random access memory is known as a(n) _____. Copyright Cengage Learning. Powered by Cognero.

Page 57


Chapter 06 - Business Intelligence: Big Data and Analytics a. relational database b. HDFS database c. in-memory database d. NoSQL database ANSWER: RATIONALE: FEEDBACK:

c An in-memory database (IMDB) is a database management system that stores the entire database in random access memory (RAM). a. An in-memory database (IMDB) is a database management system that stores the entire database in random access memory (RAM).

b. An in-memory database (IMDB) is a database management system that stores the entire database in random access memory (RAM). c. An in-memory database (IMDB) is a database management system that stores the entire database in random access memory (RAM). d. An in-memory database (IMDB) is a database management system that stores the entire database in random access memory (RAM).

POINTS: 1 DIFFICULTY: Easy REFERENCES: In-Memory Databases QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.7 - Identify the primary advantage of in-memory database in processing big data. KEYWORDS: Bloom's: Remember DATE CREATED: 2/28/2020 2:41 PM DATE MODIFIED: 2/28/2020 2:47 PM 84. Jerome recommends that his company's IS team consider moving from a database on secondary storage to an inmemory database because the in-memory database would provide _____. a. advanced analytics tools b. a distributed file system c. big data sources d. faster access to data ANSWER: d RATIONALE: The IMDB approach provides access to data at rates much faster than storing data on some form of secondary storage (e.g., a hard drive or flash drive) as is done with traditional database management systems. FEEDBACK: a. The IMDB approach provides access to data at rates much faster than storing data on some form of secondary storage (e.g., a hard drive or flash drive) as is done with traditional database management systems. b. The IMDB approach provides access to data at rates much faster than storing data on some form of secondary storage (e.g., a hard drive or flash drive) as is done with traditional database management systems. c. The IMDB approach provides access to data at rates much faster than storing data on some form of secondary storage (e.g., a hard drive or flash drive) as is done with traditional database management systems. d. The IMDB approach provides access to data at rates much faster than storing data on some form of secondary storage (e.g., a hard drive or flash drive) as is done with traditional database management systems.

Copyright Cengage Learning. Powered by Cognero.

Page 58


Chapter 06 - Business Intelligence: Big Data and Analytics POINTS: 1 DIFFICULTY: Easy REFERENCES: In-Memory Databases QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.7 - Identify the primary advantage of in-memory database in processing big data. KEYWORDS: Bloom's: Remember DATE CREATED: 2/28/2020 2:42 PM DATE MODIFIED: 2/28/2020 2:55 PM 85. The use of in-memory databases for processing big data has become feasible in recent years, thanks to _____. a. the increase in RAM costs b. the increase in RAM capacities c. the advent of 2-bit processors d. the decrease in single-core CPU costs ANSWER: b RATIONALE: IMDBs enable the analysis of big data and other challenging data-processing applications, and they have become feasible because of the increase in RAM capacities and a corresponding decrease in RAM costs. FEEDBACK: a. IMDBs enable the analysis of big data and other challenging data-processing applications, and they have become feasible because of the increase in RAM capacities and a corresponding decrease in RAM costs. b. IMDBs enable the analysis of big data and other challenging data-processing applications, and they have become feasible because of the increase in RAM capacities and a corresponding decrease in RAM costs. c. IMDBs enable the analysis of big data and other challenging data-processing applications, and they have become feasible because of the increase in RAM capacities and a corresponding decrease in RAM costs. d. IMDBs enable the analysis of big data and other challenging data-processing applications, and they have become feasible because of the increase in RAM capacities and a corresponding decrease in RAM costs.

POINTS: 1 DIFFICULTY: Easy REFERENCES: In-Memory Databases QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.7 - Identify the primary advantage of in-memory database in processing big data. KEYWORDS: Bloom's: Remember DATE CREATED: 2/28/2020 2:43 PM DATE MODIFIED: 2/28/2020 3:38 PM 86. KDDI Corporation chose to consolidate their servers into a single Oracle SuperCluster running the Oracle Times Ten in-memory database in order to _____. a. change their model for data storage and retrieval b. increase data access rates and efficiency Copyright Cengage Learning. Powered by Cognero.

Page 59


Chapter 06 - Business Intelligence: Big Data and Analytics c. implement the Extract Transform Load process d. provide employees with more targeted data marts ANSWER: b RATIONALE: An in-memory database (IMDB) is a database management system that stores the entire database in random access memory (RAM). This approach provides access to data at rates much faster than storing data on some form of secondary storage. KDDI Corporation is a Japanese telecommunications company that provides mobile cellular services for some 40 million customers. The company consolidated 40 existing servers into a single Oracle SuperCluster running the Oracle Times Ten in-memory database to make its authentication system that manages subscriber and connectivity data run faster and more efficiently. FEEDBACK: a. KDDI Corporation consolidated 40 existing servers into a single Oracle SuperCluster running the Oracle Times Ten in-memory database to make its authentication system that manages subscriber and connectivity data run faster and more efficiently. b. KDDI Corporation consolidated 40 existing servers into a single Oracle SuperCluster running the Oracle Times Ten in-memory database to make its authentication system that manages subscriber and connectivity data run faster and more efficiently. c. KDDI Corporation consolidated 40 existing servers into a single Oracle SuperCluster running the Oracle Times Ten in-memory database to make its authentication system that manages subscriber and connectivity data run faster and more efficiently. d. KDDI Corporation consolidated 40 existing servers into a single Oracle SuperCluster running the Oracle Times Ten in-memory database to make its authentication system that manages subscriber and connectivity data run faster and more efficiently.

POINTS: 1 DIFFICULTY: Easy REFERENCES: In-Memory Databases QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.7 - Identify the primary advantage of in-memory database in processing big data. KEYWORDS: Bloom's: Remember DATE CREATED: 2/28/2020 2:43 PM DATE MODIFIED: 2/28/2020 3:45 PM 87. Roberta's IS team processes data using an in-memory database with a multiple-core CPU. This means that _____. a. they can process large amounts of data rapidly b. they can benefit from installing Hadoop with Apache Storm c. they can rely on the quality of their data d. they do not have to implement an ETL process for their data ANSWER: a RATIONALE: An in-memory database (IMDB) is a database management system that stores the entire database in random access memory (RAM). This approach provides access to data at rates much faster than storing data on some form of secondary storage (e.g., a hard drive or flash drive) as is done with traditional database management systems. IMDBs enable the analysis of big data and other challenging data-processing applications, and they have become feasible because of the increase in RAM capacities and a corresponding decrease Copyright Cengage Learning. Powered by Cognero.

Page 60


Chapter 06 - Business Intelligence: Big Data and Analytics in RAM costs. In-memory databases perform best on multiple multicore CPUs that can process parallel requests to the data, further speeding access to and processing of large amounts of data. FEEDBACK:

a. The IMDB approach provides access to data at rates much faster than storing

data on some form of secondary storage. In-memory databases perform best on multiple multicore CPUs that can process parallel requests to the data, further speeding access to and processing of large amounts of data. b. The IMDB approach provides access to data at rates much faster than storing data on some form of secondary storage. In-memory databases perform best on multiple multicore CPUs that can process parallel requests to the data, further speeding access to and processing of large amounts of data. c. The IMDB approach provides access to data at rates much faster than storing data on some form of secondary storage. In-memory databases perform best on multiple multicore CPUs that can process parallel requests to the data, further speeding access to and processing of large amounts of data. d. The IMDB approach provides access to data at rates much faster than storing data on some form of secondary storage. In-memory databases perform best on multiple multicore CPUs that can process parallel requests to the data, further speeding access to and processing of large amounts of data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: In-Memory Databases QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.7 - Identify the primary advantage of in-memory database in processing big data. KEYWORDS: Bloom's: Remember DATE CREATED: 2/28/2020 2:44 PM DATE MODIFIED: 2/28/2020 3:57 PM 88. An important role of the data scientist is to _____. a. supervise an organization's data governance activities b. replace market experts and business area specialists c. make decisions related to new business opportunities d. communicate his or her findings to organizational leaders ANSWER: d RATIONALE: A data scientist is an individual who combines strong business acumen, a deep understanding of analytics, and a healthy appreciation of the limitations of data, tools, and techniques to deliver real improvements in decision making. Data scientists do not simply collect and report on data; they view a situation from many angles, determine what data and tools can help further an understanding of the situation, and then apply the appropriate data and tools. Successful data scientists have an ability to communicate their findings to organizational leaders so convincingly that they are able to strongly influence how an organization approaches a business opportunity. FEEDBACK: a. Successful data scientists have an ability to communicate their findings to organizational leaders so convincingly that they are able to strongly influence how an organization approaches a business opportunity. b. Successful data scientists have an ability to communicate their findings to organizational leaders so convincingly that they are able to strongly influence how an organization approaches a business opportunity.

Copyright Cengage Learning. Powered by Cognero.

Page 61


Chapter 06 - Business Intelligence: Big Data and Analytics c. Successful data scientists have an ability to communicate their findings to

organizational leaders so convincingly that they are able to strongly influence how an organization approaches a business opportunity. d. Successful data scientists have an ability to communicate their findings to organizational leaders so convincingly that they are able to strongly influence how an organization approaches a business opportunity.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Role of a Data Scientist QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.9 - Define the role of a data scientist. KEYWORDS: Bloom's: Remember DATE CREATED: 2/28/2020 4:03 PM DATE MODIFIED: 2/28/2020 4:09 PM 89. Mollie has observed that her company's leadership lack a strong commitment to data-driven decision making. As a result, when she learns that her company will be initiating a business intelligence and analytics program, she anticipates that _____. a. her company will gain a strong competitive advantage as a result b. her colleagues who are data scientists will soon lose their jobs c. her company will miss out on the real value of their BI and analytics d. her company's data will become less accessible and reliable ANSWER: c RATIONALE: Three key components must be in place for an organization to get real value from its BI and analytics efforts. First and foremost is the existence of a solid data management program, including data governance. Recall that data management is an integrated set of functions that defines the processes by which data is obtained, certified fit for use, stored, secured, and processed in such a way as to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users within an organization. Data governance is the core component of data management. Another key component that an organization needs is creative data scientists. Finally, to ensure the success of a BI and analytics program, the management team within an organization must have a strong commitment to data-driven decision making. FEEDBACK: a. To ensure the success of a BI and analytics program, the management team within an organization must have a strong commitment to data-driven decision making. b. To ensure the success of a BI and analytics program, the management team within an organization must have a strong commitment to data-driven decision making. c. To ensure the success of a BI and analytics program, the management team within an organization must have a strong commitment to data-driven decision making. d. To ensure the success of a BI and analytics program, the management team within an organization must have a strong commitment to data-driven decision making.

POINTS: DIFFICULTY: REFERENCES:

1 Easy Components Required for Effective BI and Analytics

Copyright Cengage Learning. Powered by Cognero.

Page 62


Chapter 06 - Business Intelligence: Big Data and Analytics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.10 - Identify three key organizational components that must be in place for an organization to get real value from its BI/analytics efforts. KEYWORDS: Bloom's: Understand DATE CREATED: 2/28/2020 4:19 PM DATE MODIFIED: 2/28/2020 4:28 PM 90. Data scientists are a necessary component to ensure an organization's business intelligence and analytics efforts are effective because they _____. a. certify that data is fit for use and stored, secured, and processed correctly b. are responsible for making the decisions needed to gain a competitive advantage c. pull together knowledge of the business and data analytics tools and techniques d. supervise the individuals responsible for fixing and preventing issues with data ANSWER: c RATIONALE: One key component that an organization needs to get real value from its BI and analytics efforts is creative data scientists—people who understand the business as well as the business analytics technology, while also recognizing the limitations of their data, tools, and techniques. A data scientist puts all of this together to deliver real improvements in decision making with an organization. FEEDBACK: a. One key component that an organization needs to get real value from its BI and analytics efforts is creative data scientists—people who understand the business as well as the business analytics technology, while also recognizing the limitations of their data, tools, and techniques. A data scientist puts all of this together to deliver real improvements in decision making with an organization. b. One key component that an organization needs to get real value from its BI and analytics efforts is creative data scientists—people who understand the business as well as the business analytics technology, while also recognizing the limitations of their data, tools, and techniques. A data scientist puts all of this together to deliver real improvements in decision making with an organization. c. One key component that an organization needs to get real value from its BI and analytics efforts is creative data scientists—people who understand the business as well as the business analytics technology, while also recognizing the limitations of their data, tools, and techniques. A data scientist puts all of this together to deliver real improvements in decision making with an organization. d. One key component that an organization needs to get real value from its BI and analytics efforts is creative data scientists—people who understand the business as well as the business analytics technology, while also recognizing the limitations of their data, tools, and techniques. A data scientist puts all of this together to deliver real improvements in decision making with an organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Components Required for Effective BI and Analytics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.10 - Identify three key organizational components that must be in Copyright Cengage Learning. Powered by Cognero.

Page 63


Chapter 06 - Business Intelligence: Big Data and Analytics KEYWORDS: DATE CREATED: DATE MODIFIED:

place for an organization to get real value from its BI/analytics efforts. Bloom's: Remember 2/28/2020 4:29 PM 2/28/2020 4:39 PM

91. Why are data managers recommended to determine key metrics, an agreed-upon vocabulary, and how to define and implement security and privacy policies when setting up a self-service analytics program? a. to produce a data dictionary b. to avoid training workers c. to mitigate the associated risks d. to meet legal requirements ANSWER: c RATIONALE: An organization can take several actions to ensure an effective self-service analytics program. First, to mitigate the risks associated with self-service analytics, data managers should work with business units to determine key metrics, an agreed-upon vocabulary, processes for creating and publishing reports, the privileges required to access confidential data, and how to define and implement security and privacy policies. FEEDBACK: a. To mitigate the risks associated with self-service analytics, data managers should work with business units to determine key metrics, an agreed-upon vocabulary, processes for creating and publishing reports, the privileges required to access confidential data, and how to define and implement security and privacy policies. b. To mitigate the risks associated with self-service analytics, data managers should work with business units to determine key metrics, an agreed-upon vocabulary, processes for creating and publishing reports, the privileges required to access confidential data, and how to define and implement security and privacy policies. c. To mitigate the risks associated with self-service analytics, data managers should work with business units to determine key metrics, an agreed-upon vocabulary, processes for creating and publishing reports, the privileges required to access confidential data, and how to define and implement security and privacy policies. d. To mitigate the risks associated with self-service analytics, data managers should work with business units to determine key metrics, an agreed-upon vocabulary, processes for creating and publishing reports, the privileges required to access confidential data, and how to define and implement security and privacy policies.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Self-Service Analytics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.12 - Identify four potential issues that can arise with the use of selfservice analytics. KEYWORDS: Bloom's: Remember DATE CREATED: 2/28/2020 4:43 PM DATE MODIFIED: 2/28/2020 4:52 PM 92. Self-service BI and analytics can exacerbate problems by _____. Copyright Cengage Learning. Powered by Cognero.

Page 64


Chapter 06 - Business Intelligence: Big Data and Analytics a. removing checks and balances on data preparation and use b. eliminating investment in data sources and analytics tools c. excluding most nontechnical end users d. undermining the value of trained data scientists ANSWER: a RATIONALE: Self-service BI and analytics can exacerbate problems by removing the checks and balances on data preparation and use. Without strong data governance, organizations can end up with lots of silos of information, bad analysis, and extra costs. FEEDBACK: a. Self-service BI and analytics can exacerbate problems by removing the checks and balances on data preparation and use. b. Self-service BI and analytics can exacerbate problems by removing the checks and balances on data preparation and use. c. Self-service BI and analytics can exacerbate problems by removing the checks and balances on data preparation and use. d. Self-service BI and analytics can exacerbate problems by removing the checks and balances on data preparation and use.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Self-Service Analytics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.12 - Identify four potential issues that can arise with the use of selfservice analytics. KEYWORDS: Bloom's: Remember DATE CREATED: 2/28/2020 4:45 PM DATE MODIFIED: 2/28/2020 4:57 PM 93. If not well managed, self-service BI and analytics may lead to poor decisions based on _____. a. end users' intuitions b. "data islands" c. inconsistent conclusions d. erroneous analysis and reporting ANSWER: d RATIONALE: If not well managed, self-service BI and analytics can create the risk of erroneous analysis and reporting, leading to potentially damaging decisions within an organization. FEEDBACK: a. If not well managed, self-service BI and analytics can create the risk of erroneous analysis and reporting, leading to potentially damaging decisions within an organization. b. If not well managed, self-service BI and analytics can create the risk of erroneous analysis and reporting, leading to potentially damaging decisions within an organization. c. If not well managed, self-service BI and analytics can create the risk of erroneous analysis and reporting, leading to potentially damaging decisions within an organization. d. If not well managed, self-service BI and analytics can create the risk of erroneous analysis and reporting, leading to potentially damaging decisions within an organization.

Copyright Cengage Learning. Powered by Cognero.

Page 65


Chapter 06 - Business Intelligence: Big Data and Analytics POINTS: 1 DIFFICULTY: Easy REFERENCES: Self-Service Analytics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.12 - Identify four potential issues that can arise with the use of selfservice analytics. KEYWORDS: Bloom's: Remember DATE CREATED: 2/28/2020 4:45 PM DATE MODIFIED: 2/28/2020 5:10 PM 94. Which is a true statement regarding self-service BI and analytics? a. A well-managed program increases IS staff involvement in routine tasks. b. A well-managed program allows technology professionals to retain ultimate data governance. c. Providing a data dictionary is one approach to ensuring data security measures are implemented. d. A successful program typically utilizes complex tools with sophisticated interfaces. ANSWER: b RATIONALE: When implementing a self-service analytics program, the information systems organization should help users understand what data is available and recommended for business analytics. One approach to accomplishing this is to provide a data dictionary for use by end users. A well-managed self-service analytics program allows technology professionals to retain ultimate data control and governance while limiting information systems staff involvement in routine tasks. For self-service analytics tools to be effective, they must be intuitive and easy to use. Business users simply don’t have the time to learn how to work with complex tools or sophisticated interfaces. FEEDBACK: a. A well-managed self-service analytics program allows technology professionals to retain ultimate data control and governance while limiting information systems staff involvement in routine tasks. b. A well-managed self-service analytics program allows technology professionals to retain ultimate data control and governance while limiting information systems staff involvement in routine tasks. c. A well-managed self-service analytics program allows technology professionals to retain ultimate data control and governance while limiting information systems staff involvement in routine tasks. d. A well-managed self-service analytics program allows technology professionals to retain ultimate data control and governance while limiting information systems staff involvement in routine tasks.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Self-Service Analytics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.6.12 - Identify four potential issues that can arise with the use of selfservice analytics. KEYWORDS: Bloom's: Remember DATE CREATED: 2/28/2020 4:45 PM DATE MODIFIED: 2/28/2020 5:22 PM Copyright Cengage Learning. Powered by Cognero.

Page 66


Chapter 06 - Business Intelligence: Big Data and Analytics Essay 95. In what ways can a BI and analytics system be useful to a grocery store or pharmacy? ANSWER: BI and analytics are used to achieve a number of benefits, such as improved forecasting. A grocery store or pharmacy could better predict demand for the goods sold there to avoid losing sales when items are out of stock. RATIONALE: BI and analytics are used to achieve a number of benefits as illustrated in the following example of improved forecasting. Kroger serves customers in 2,422 supermarkets and 1,950 in-store pharmacies. The company found that by better predicting pharmacy customer demand, it could reduce the number of prescriptions that it was unable to fill because a drug is out of stock. To do so, Kroger developed a sophisticated inventory management system that could provide employees with a visualization of inventory levels, adapt to user feedback, and support “what-if” analysis. Out-of-stock prescriptions have been reduced by 1.5 million per year, with a resulting increase in sales of $80 million per year. In addition, by carrying the right drugs in the right quantities, Kroger was able to reduce its overall inventory costs by $120 million per year. POINTS: 1 RUBRIC: 0 1 2 3 4 Criteria

Failure

Below Expectations

Developing

Competent

Mastery

Describe the benefits achieved from BI and analytics for a grocery store or pharmacy

DIFFICULTY: Moderate REFERENCES: Benefits Achieved from BI and Analytics QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.6.8 - State the primary difference between business intelligence and analytics. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/26/2020 11:46 AM 96. You are to advise a business on how to ensure their BI and analytics initiatives succeed. What three key components must this business have in place in order to get real value from their BI and analytics efforts? ANSWER: Three key components must be in place for an organization to get real value from its BI and analytics efforts. First and foremost is the existence of a solid data management program, including data governance. Recall that data management is an integrated set of functions that defines the processes by which data is obtained, certified fit for use, stored, secured, and processed in such a way as to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users within an organization. Data governance is the core component of data management. Another key component that an organization needs is creative data scientists. Finally, to ensure the success of a BI and analytics program, the management team within an organization must have a strong commitment to data-driven decision making. Copyright Cengage Learning. Powered by Cognero.

Page 67


Chapter 06 - Business Intelligence: Big Data and Analytics RATIONALE:

POINTS: RUBRIC:

Three key components must be in place for an organization to get real value from its BI and analytics efforts. First and foremost is the existence of a solid data management program, including data governance. Recall that data management is an integrated set of functions that defines the processes by which data is obtained, certified fit for use, stored, secured, and processed in such a way as to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users within an organization. Data governance is the core component of data management. Another key component that an organization needs is creative data scientists. Finally, to ensure the success of a BI and analytics program, the management team within an organization must have a strong commitment to data-driven decision making. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

List and briefly describe the three key components

DIFFICULTY: Moderate REFERENCES: Components Required for Effective BI and Analytics QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.6.10 - Identify three key organizational components that must be in place for an organization to get real value from its BI/analytics efforts. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:23 PM DATE MODIFIED: 2/26/2020 11:51 AM 97. Briefly list and describe several challenges associated with dealing with today's "ever-growing data tsunami," also known as big data. ANSWER: The challenge of big data is manifold, with a variety of questions that must be answered, including how to choose what subset of data to store, where and how to store the data, how to find those nuggets of data that are relevant to the decision making at hand, how to derive value from the relevant data, and how to identify which data needs to be protected from unauthorized access. With so much data available, business users can have a hard time finding the information they need to make decisions, and they may not trust the validity of the data they can access. Trying to deal with all this data from so many different sources, much of it from outside the organization, can also increase the risk that the organization fails to comply with government regulations or internal controls.

RATIONALE:

Not everyone is happy with big data applications. Some people have privacy concerns about the fact that corporations are harvesting huge amounts of personal data that can be shared with other organizations. With all this data, organizations can develop extensive profiles of people without their knowledge or consent. Big data introduces security concerns. Are organizations able to keep big data secure from competitors and malicious hackers? Some experts believe companies that collect and store big data could be open to liability lawsuits from individuals and organizations. The challenge of big data is manifold, with a variety of questions that must be answered,

Copyright Cengage Learning. Powered by Cognero.

Page 68


Chapter 06 - Business Intelligence: Big Data and Analytics including how to choose what subset of data to store, where and how to store the data, how to find those nuggets of data that are relevant to the decision making at hand, how to derive value from the relevant data, and how to identify which data needs to be protected from unauthorized access. With so much data available, business users can have a hard time finding the information they need to make decisions, and they may not trust the validity of the data they can access. Trying to deal with all this data from so many different sources, much of it from outside the organization, can also increase the risk that the organization fails to comply with government regulations or internal controls.

POINTS: RUBRIC:

Not everyone is happy with big data applications. Some people have privacy concerns about the fact that corporations are harvesting huge amounts of personal data that can be shared with other organizations. With all this data, organizations can develop extensive profiles of people without their knowledge or consent. Big data introduces security concerns. Are organizations able to keep big data secure from competitors and malicious hackers? Some experts believe companies that collect and store big data could be open to liability lawsuits from individuals and organizations. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Lists and describes five challenges associated with big data

DIFFICULTY: Easy REFERENCES: Challenges of Big Data QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.6.2 - Identify five key challenges associated with big data. KEYWORDS: Bloom's: Understand DATE CREATED: 2/27/2020 12:49 PM DATE MODIFIED: 2/27/2020 12:54 PM 98. Outline the steps in the Extract Transform Load (ETL) process and explain the purpose of each step. ANSWER: The Extract Transform Load (ETL) process takes data from a variety of sources, edits and transforms it into the format used in the data warehouse, and then loads this data into the warehouse. The three stages are as follows: •

Extract: Source data for the data warehouse comes from many sources and systems. The goal of the extract process is to extract the source data from all the various sources and convert it into a single format suitable for processing. During the extract step, data that fails to meet expected patterns or values may be rejected from further processing (e.g., blank or nonnumeric data in net sales field or a product code outside the defined range of valid codes). Transform: During the transform stage of the ETL process, a series of rules or algorithms are applied to the extracted data to derive the data that will be stored in the data warehouse. A common type of transformation is to convert a customer’s street address, city, state, and zip code to an organization-assigned sales district or

Copyright Cengage Learning. Powered by Cognero.

Page 69


Chapter 06 - Business Intelligence: Big Data and Analytics

RATIONALE:

The Extract Transform Load (ETL) process takes data from a variety of sources, edits and transforms it into the format used in the data warehouse, and then loads this data into the warehouse. The three stages are as follows: •

POINTS: RUBRIC:

government census tract. Also, data is often aggregated to reduce the processing time required to create anticipated reports. For example, total sales may be accumulated by store or sales district. Load: During the load stage of the ETL process, the extracted and transformed data is loaded into the data warehouse. As the data is being loaded into the data warehouse, new indices are created and the data is checked against the constraints defined in the database schema to ensure its quality. As a result, the data load stage for a large data warehouse can take days.

Extract: Source data for the data warehouse comes from many sources and systems. The goal of the extract process is to extract the source data from all the various sources and convert it into a single format suitable for processing. During the extract step, data that fails to meet expected patterns or values may be rejected from further processing (e.g., blank or nonnumeric data in net sales field or a product code outside the defined range of valid codes). Transform: During the transform stage of the ETL process, a series of rules or algorithms are applied to the extracted data to derive the data that will be stored in the data warehouse. A common type of transformation is to convert a customer’s street address, city, state, and zip code to an organization-assigned sales district or government census tract. Also, data is often aggregated to reduce the processing time required to create anticipated reports. For example, total sales may be accumulated by store or sales district. Load: During the load stage of the ETL process, the extracted and transformed data is loaded into the data warehouse. As the data is being loaded into the data warehouse, new indices are created and the data is checked against the constraints defined in the database schema to ensure its quality. As a result, the data load stage for a large data warehouse can take days.

1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Describe the three steps in the Extract Transfer Load process State the purpose of each step in the ETL process

DIFFICULTY: Easy REFERENCES: Data Warehouses, Data Marts, and Data Lakes QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.6.4 - Explain the purpose of each step in the extract, transform, load Copyright Cengage Learning. Powered by Cognero.

Page 70


Chapter 06 - Business Intelligence: Big Data and Analytics KEYWORDS: DATE CREATED: DATE MODIFIED:

process. Bloom's: Understand 2/27/2020 4:11 PM 2/27/2020 4:20 PM

99. How is a NoSQL database different from a relational database? List and explain the key distinctions. ANSWER: A NoSQL database differs from a relational database in that it provides a means to store and retrieve data that is modeled using some means other than the simple two-dimensional tabular relations used in relational databases. A second difference is that NoSQL databases have the capability to spread data over multiple servers so that each server contains only a subset of the total data. This so-called horizontal scaling capability enables hundreds or even thousands of servers to operate on the data, providing faster response times for queries and updates. Most relational database management systems have problems with such horizontal scaling and instead require large, powerful, and expensive proprietary servers and large storage systems. A third difference between relational and NoSQL databases is that NOSQL database do not require a predefined schema; data entities can have attributes edited or assigned to them at any time. If a new entity or attribute is discovered, it can be added to the database dynamically, extending what is already modelled in the database.

RATIONALE:

A fourth difference is that NoSQL databases do not conform to true ACID properties when processing transactions. Instead they provide for “eventual consistency” in which database changes are propagated to all nodes eventually (typically within milliseconds), so it is possible that user queries for data might not return the most current data. A NoSQL database differs from a relational database in that it provides a means to store and retrieve data that is modeled using some means other than the simple two-dimensional tabular relations used in relational databases. A second difference is that NoSQL databases have the capability to spread data over multiple servers so that each server contains only a subset of the total data. This so-called horizontal scaling capability enables hundreds or even thousands of servers to operate on the data, providing faster response times for queries and updates. Most relational database management systems have problems with such horizontal scaling and instead require large, powerful, and expensive proprietary servers and large storage systems. A third difference between relational and NoSQL databases is that NOSQL database do not require a predefined schema; data entities can have attributes edited or assigned to them at any time. If a new entity or attribute is discovered, it can be added to the database dynamically, extending what is already modelled in the database.

POINTS: RUBRIC:

A fourth difference is that NoSQL databases do not conform to true ACID properties when processing transactions. Instead they provide for “eventual consistency” in which database changes are propagated to all nodes eventually (typically within milliseconds), so it is possible that user queries for data might not return the most current data. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Lists and Copyright Cengage Learning. Powered by Cognero.

Page 71


Chapter 06 - Business Intelligence: Big Data and Analytics describes four key differences between NoSQL and relational databases

DIFFICULTY: Easy REFERENCES: NoSQL Databases QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.6.5 - State four ways a NoSQL database is different from an SQL database. KEYWORDS: Bloom's: Remember DATE CREATED: 2/28/2020 7:00 AM DATE MODIFIED: 2/28/2020 7:06 AM 100. What is Hadoop, and what two primary components make up the Hadoop computing environment? Name and describe them. ANSWER: Hadoop is an open-source software framework that includes several software modules that provide a means for storing and processing extremely large data sets. Hadoop has two primary components: a data processing component (a Java-based system called MapReduce) and a distributed file system called the Hadoop Distributed File System (HDFS) for data storage. A MapReduce program is composed of a Map procedure that performs filtering and sorting (such as sorting customer orders by product ID into queues, with one queue for each product ID) and a Reduce method that performs a summary operation (such as counting the number of orders in each queue, thus determining product ID frequencies).

RATIONALE:

Hadoop divides data into subsets and distributes the subsets onto different servers for processing. A Hadoop cluster may consist of thousands of servers. In a Hadoop cluster, a subset of the data within the HDFS and the MapReduce system are housed on every server in the cluster. This places the data processing software on the same servers where the data is stored, thus speeding up data retrieval. This approach creates a highly redundant computing environment that allows the application to keep running even if individual servers fail. Hadoop is an open-source software framework that includes several software modules that provide a means for storing and processing extremely large data sets. Hadoop has two primary components: a data processing component (a Java-based system called MapReduce) and a distributed file system called the Hadoop Distributed File System (HDFS) for data storage. A MapReduce program is composed of a Map procedure that performs filtering and sorting (such as sorting customer orders by product ID into queues, with one queue for each product ID) and a Reduce method that performs a summary operation (such as counting the number of orders in each queue, thus determining product ID frequencies). Hadoop divides data into subsets and distributes the subsets onto different servers for processing. A Hadoop cluster may consist of thousands of servers. In a Hadoop cluster, a subset of the data within the HDFS and the MapReduce system are housed on every server in the cluster. This places the data processing software on the same servers where the data is stored, thus speeding up data retrieval. This approach creates a highly redundant computing environment that allows the application to keep running even if individual

Copyright Cengage Learning. Powered by Cognero.

Page 72


Chapter 06 - Business Intelligence: Big Data and Analytics POINTS: RUBRIC:

servers fail. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Define the Hadoop software framework Name and describe its two primary software components

DIFFICULTY: Easy REFERENCES: Hadoop QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.6.6 - Identify the two primary components of the Hadoop computing environment. KEYWORDS: Bloom's: Remember DATE CREATED: 2/28/2020 2:34 PM DATE MODIFIED: 2/28/2020 2:36 PM 101. Describe an in-memory database and the technological advances that have made its use feasible. What is the major advantage of this type of database? ANSWER: An in-memory database (IMDB) is a database management system that stores the entire database in random access memory (RAM). This approach provides access to data at rates much faster than storing data on some form of secondary storage (e.g., a hard drive or flash drive) as is done with traditional database management systems. IMDBs enable the analysis of big data and other challenging data-processing applications, and they have become feasible because of the increase in RAM capacities and a corresponding decrease in RAM costs. In-memory databases perform best on multiple multicore CPUs that can process parallel requests to the data, further speeding access to and processing of large amounts of data. Furthermore, the advent of 64-bit processors enabled the direct addressing of larger amounts of main memory. RATIONALE: An in-memory database (IMDB) is a database management system that stores the entire database in random access memory (RAM). This approach provides access to data at rates much faster than storing data on some form of secondary storage (e.g., a hard drive or flash drive) as is done with traditional database management systems. IMDBs enable the analysis of big data and other challenging data-processing applications, and they have become feasible because of the increase in RAM capacities and a corresponding decrease in RAM costs. In-memory databases perform best on multiple multicore CPUs that can process parallel requests to the data, further speeding access to and processing of large amounts of data. Furthermore, the advent of 64-bit processors enabled the direct addressing of larger amounts of main memory. POINTS: 1 RUBRIC: 0 1 2 3 4 Criteria Copyright Cengage Learning. Powered by Cognero.

Failure

Below Expectations

Developing

Competent

Mastery Page 73


Chapter 06 - Business Intelligence: Big Data and Analytics Describe an inmemory database Name the technological advances that made IMDBs feasible Explain the major advantage of IMDBs

DIFFICULTY: Easy REFERENCES: In-Memory Databases QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.6.7 - Identify the primary advantage of in-memory database in processing big data. KEYWORDS: Bloom's: Remember DATE CREATED: 2/28/2020 3:57 PM DATE MODIFIED: 2/28/2020 3:59 PM 102. The terms business intelligence and analytics are often used interchangeably, but there is in fact a difference between them. Explain this difference. ANSWER: The terms business intelligence (BI) and analytics are often used interchangeably, however, there is a difference. BI is used to analyze historical data to tell what happened or is happening right now in your business. BI helps the organization to learn from past mistakes, build on past successes. This knowledge can then be fed into the initiative planning process, imitating what works and altering what doesn’t. Analytics employs algorithms to determine relationships among data to develop predictions of what will happen in the future. This enables the organization to anticipate new developments and make changes now to improve future outcomes. RATIONALE: The terms business intelligence (BI) and analytics are often used interchangeably, however, there is a difference. BI is used to analyze historical data to tell what happened or is happening right now in your business. BI helps the organization to learn from past mistakes, build on past successes. This knowledge can then be fed into the initiative planning process, imitating what works and altering what doesn’t. Analytics employs algorithms to determine relationships among data to develop predictions of what will happen in the future. This enables the organization to anticipate new developments and make changes now to improve future outcomes. POINTS: 1 RUBRIC: 0 1 2 3 4 Criteria

Failure

Below Expectations

Developing

Competent

Mastery

Distinguish between business intelligence and analytics

DIFFICULTY: REFERENCES:

Easy Analytics and Business Intelligence

Copyright Cengage Learning. Powered by Cognero.

Page 74


Chapter 06 - Business Intelligence: Big Data and Analytics QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.6.8 - State the primary difference between business intelligence and analytics. KEYWORDS: Bloom's: Remember DATE CREATED: 2/28/2020 4:12 PM DATE MODIFIED: 2/28/2020 4:14 PM

Copyright Cengage Learning. Powered by Cognero.

Page 75


Chapter 07 - Networks: An Interconnected World True / False 1. The Internet is the infrastructure on which the Web exists. a. True b. False ANSWER: True RATIONALE: While the terms Internet and Web are often used interchangeably, technically, the two are different technologies. The Internet is the infrastructure on which the Web exists. FEEDBACK: Correct The Internet is the infrastructure on which the Web exists. Incorrect The Internet is the infrastructure on which the Web exists.

POINTS: 1 DIFFICULTY: Easy REFERENCES: How The World Wide Web Works QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.5 - Describe how the Web works, including the roles of the client/server architecture, Domain Name System, URL, hyperlinks, Web browser, HTML, XML, and CSS. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 3:44 PM 2. The Transmission Control Protocol (TCP) is responsible for managing IP addresses and Internet domain names. a. True b. False ANSWER: False RATIONALE: The Transmission Control Protocol/Internet Protocol (TCP/IP) is a collection of communication protocols used to interconnect network devices on a packet switching network such as the Internet. TCP defines how applications can create channels of communication across a network. The domain name system maps the name people use to locate a Web site to the IP address that a computer uses to locate a Web site. FEEDBACK: Correct TCP defines how applications can create channels of communication across a network. Incorrect TCP defines how applications can create channels of communication across a network.

POINTS: 1 DIFFICULTY: Easy REFERENCES: How the Internet Works QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.4 - Describe how the Internet works, including the roles of the Internet backbone, TCP/IP protocol, IP address, switches, and routers. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:49 PM Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 07 - Networks: An Interconnected World DATE MODIFIED:

3/3/2020 3:58 PM

3. Cascading Style Sheets (CSS) use special Hypertext Markup Language (HTML) tags to globally define font characteristics for a variety of page elements as well as how those elements are laid out on a Web page. a. True b. False ANSWER: True RATIONALE: A Cascading Style Sheet (CSS) is a file or portion of an HTML file that defines the visual appearance of content in a Web page. Using CSS is convenient because you only need to define the technical details of the page’s appearance once, rather than in each HTML tag. CSS uses special HTML tags to globally define characteristics for a variety of page elements as well as how those elements are laid out on the Web page. FEEDBACK: Correct CSS uses special HTML tags to globally define characteristics for a variety of page elements as well as how those elements are laid out on the Web page. Incorrect CSS uses special HTML tags to globally define characteristics for a variety of page elements as well as how those elements are laid out on the Web page.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Client/Server Architecture QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.7 - Identify three commonly used client-side programming languages and three commonly used server-side programming languages. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 4:01 PM 4. Twitter is a microblogging service. a. True b. False ANSWER: True RATIONALE: Microblogging sites such as Twitter allow people to post thoughts and ideas throughout the day for friends to read. FEEDBACK: Correct Microblogging sites such as Twitter allow people to post thoughts and ideas throughout the day for friends to read. Incorrect Microblogging sites such as Twitter allow people to post thoughts and ideas throughout the day for friends to read.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Internet and Web Applications QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.9 - Describe five common Internet and Web applications. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 07 - Networks: An Interconnected World DATE CREATED: DATE MODIFIED:

11/19/2019 5:49 PM 3/3/2020 4:06 PM

5. A podcast is a video broadcast over the Internet. a. True b. False ANSWER: False RATIONALE: A podcast is an audio broadcast you can listen to over the Internet. The name podcast originated from Apple’s iPod combined with the word broadcast. FEEDBACK: Correct A podcast is an audio broadcast you can listen to over the Internet. Incorrect A podcast is an audio broadcast you can listen to over the Internet.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Internet and Web Applications QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.9 - Describe five common Internet and Web applications. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 4:08 PM 6. Video content can be placed on the Internet using the same approach as a blog. a. True b. False ANSWER: True RATIONALE: Video content can also be placed on the Internet using the same approach as a blog. This is often called a video log or vlog. FEEDBACK: Correct Video content can also be placed on the Internet using the same approach as a blog. This is often called a video log or vlog. Incorrect Video content can also be placed on the Internet using the same approach as a blog. This is often called a video log or vlog.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Internet and Web Applications QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.9 - Describe five common Internet and Web applications. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 4:11 PM 7. Businesses and organizations that manage a local area network (LAN) connect to the Internet via a Web browser. a. True Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 07 - Networks: An Interconnected World b. False ANSWER: RATIONALE:

FEEDBACK:

False Users in organizations or at home access the Internet through an Internet service provider, an organization that provides Internet access to people. To connect to the Internet through an ISP, you must have an account with the service provider (for which you usually pay) along with software (such as a browser) and devices (such as a computer or smartphone) that support a connection via TCP/IP. Correct

Users in organizations or at home access the Internet through an Internet service provider, an organization that provides Internet access to people. To connect to the Internet through an ISP, you must have an account with the service provider (for which you usually pay) along with software (such as a browser) and devices (such as a computer or smartphone) that support a connection via TCP/IP. Incorrect Users in organizations or at home access the Internet through an Internet service provider, an organization that provides Internet access to people. To connect to the Internet through an ISP, you must have an account with the service provider (for which you usually pay) along with software (such as a browser) and devices (such as a computer or smartphone) that support a connection via TCP/IP.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Accessing the Internet QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.4 - Describe how the Internet works, including the roles of the Internet backbone, TCP/IP protocol, IP address, switches, and routers. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 4:19 PM 8. The Internet is a hyperlink-based system that uses a client/server model. a. True b. False ANSWER: False RATIONALE: While the terms Internet and Web are often used interchangeably, technically, the two are different technologies. The Internet is the infrastructure on which the Web exists. The Internet is made up of computers, network hardware such as switches, routers, communications media, software, and the TCP/IP protocols. The World Wide Web (Web), on the other hand, consists of server and client software, the hypertext transfer protocol (http), standards, and markup languages that combine to deliver information and services over the Internet. FEEDBACK: Correct The Internet is made up of computers, network hardware such as switches, routers, communications media, software, and the TCP/IP protocols. The World Wide Web (Web), on the other hand, consists of server and client software, the hypertext transfer protocol (http), standards, and markup languages that combine to deliver information and services over the Internet. Incorrect The Internet is made up of computers, network hardware such as switches, routers, communications media, software, and the TCP/IP protocols. The World Wide Web (Web), on the other hand, consists of server and client software, the hypertext transfer protocol (http), standards, and markup languages that combine Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 07 - Networks: An Interconnected World to deliver information and services over the Internet.

POINTS: 1 DIFFICULTY: Easy REFERENCES: How The World Wide Web Works QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.5 - Describe how the Web works, including the roles of the client/server architecture, Domain Name System, URL, hyperlinks, Web browser, HTML, XML, and CSS. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 4:22 PM 9. In a Hypertext Markup Language (HTML) file, the markers are the codes that tell the browser how to format the text or graphics that will be displayed. a. True b. False ANSWER: False RATIONALE: HTML tells the browser how to display font characteristics, paragraph formatting, page layout, image placement, hyperlinks, and the content of a Web page. HTML uses HTML tags, also called tags, which are codes that tell the browser how to format the text or graphics as a heading, list, or body text, for example. FEEDBACK: Correct HTML uses HTML tags, also called tags, which are codes that tell the browser how to format the text or graphics as a heading, list, or body text, for example. Incorrect HTML uses HTML tags, also called tags, which are codes that tell the browser how to format the text or graphics as a heading, list, or body text, for example.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Client/Server Architecture QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.7 - Identify three commonly used client-side programming languages and three commonly used server-side programming languages. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 4:24 PM 10. A telecommunications protocol is any material substance that carries an electronic signal to support communications between a sending and receiving device. a. True b. False ANSWER: False RATIONALE: Transmission media can be divided into two broad categories: guided (also called wired) transmission media, in which communications signals are guided along a solid medium, and Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 07 - Networks: An Interconnected World wireless, in which the communications signal is broadcast over airwaves as a form of electromagnetic radiation. There are many different guided transmission media types, including twisted-pair wire, coaxial cable, and fiber-optic cable. FEEDBACK:

Correct

One type of transmission media is guided (also called wired) transmission media, in which communications signals are guided along a solid medium. Incorrect One type of transmission media is guided (also called wired) transmission media, in which communications signals are guided along a solid medium.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Communications Media QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.1 - Describe three network topologies and four network types in common use today. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 4:32 PM 11. The Institute of Electrical and Electronics Engineers (IEEE) is a leading standards-setting organization whose IEEE network standards are the basis for many telecommunications devices and services. a. True b. False ANSWER: True RATIONALE: Wi-Fi is a wireless network brand owned by the Wi-Fi Alliance, which consists of about 300 technology companies, including AT&T, Dell, Microsoft, Nokia, and Qualcomm. The alliance exists to improve the interoperability of wireless local area network products based on the IEEE 802.11 series of communications standards. IEEE stands for the Institute of Electrical and Electronics Engineers, a nonprofit organization and one of the leading standards-setting organizations. FEEDBACK: Correct The Wi-Fi Alliance exists to improve the interoperability of wireless local area network products based on the IEEE 802.11 series of communications standards. IEEE stands for the Institute of Electrical and Electronics Engineers, a nonprofit organization and one of the leading standards-setting organizations. Incorrect The Wi-Fi Alliance exists to improve the interoperability of wireless local area network products based on the IEEE 802.11 series of communications standards. IEEE stands for the Institute of Electrical and Electronics Engineers, a nonprofit organization and one of the leading standards-setting organizations.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Communications Media QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.1 - Describe three network topologies and four network types in common use today. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 07 - Networks: An Interconnected World DATE CREATED: DATE MODIFIED:

11/19/2019 5:49 PM 3/3/2020 4:36 PM

12. 4G can deliver 3 to 20 times the speed of 3G networks for mobile devices. a. True b. False ANSWER: True RATIONALE: 4G can deliver 3 to 20 times the speed of 3G networks for mobile devices such as smartphones, tablets, and laptops. FEEDBACK: Correct 4G can deliver 3 to 20 times the speed of 3G networks for mobile devices such as smartphones, tablets, and laptops. Incorrect 4G can deliver 3 to 20 times the speed of 3G networks for mobile devices such as smartphones, tablets, and laptops.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Communications Media QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.2 - State three advantages that 5G wireless communications will provide over 4G communications. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 4:40 PM 13. A personal area network (PAN) is a wireless network that connects information networking devices within a small area, such as an office, home, or several floors of a building. a. True b. False ANSWER: False RATIONALE: A personal area network (PAN) is a wireless network that connects information technology devices close to one person. A network that connects computer systems and devices within a small area, such as an office, home, or several floors in a building is a local area network (LAN). FEEDBACK: Correct A personal area network (PAN) is a wireless network that connects information technology devices close to one person. Incorrect A personal area network (PAN) is a wireless network that connects information technology devices close to one person.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Types QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.1 - Describe three network topologies and four network types in common use today. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 07 - Networks: An Interconnected World KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 11/19/2019 5:49 PM 3/3/2020 4:42 PM

14. A wide area network (WAN) is a telecommunications network that connects users and their computers in a geographical area that spans a campus or business park, but not beyond the city limits. a. True b. False ANSWER: False RATIONALE: A metropolitan area network (MAN) is a network that connects users and their computers in a geographical area that spans a campus or city. A wide area network (WAN) is a network that connects large geographic regions. FEEDBACK: Correct A metropolitan area network (MAN) is a network that connects users and their computers in a geographical area that spans a campus or city. A wide area network (WAN) is a network that connects large geographic regions. Incorrect A metropolitan area network (MAN) is a network that connects users and their computers in a geographical area that spans a campus or city. A wide area network (WAN) is a network that connects large geographic regions.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Types QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.1 - Describe three network topologies and four network types in common use today. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 4:44 PM 15. A client is any computer on a network that sends messages requesting services from the servers on the network. a. True b. False ANSWER: True RATIONALE: Client/server architecture is a networking approach wherein many clients (end-user computing devices) request and receive services from servers (host computers) on the network. FEEDBACK: Correct Client/server architecture is a networking approach wherein many clients (end-user computing devices) request and receive services from servers (host computers) on the network. Incorrect Client/server architecture is a networking approach wherein many clients (end-user computing devices) request and receive services from servers (host computers) on the network.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Client/Server Architecture True / False

Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 07 - Networks: An Interconnected World HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.6 - State the purpose of client-side and server-side programming. NATIONAL STANDARDS: United States - BUSPROG: - Analytic KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 4:46 PM 16. Network-management software is systems software that controls the computer systems and devices on a network and allows them to communicate with each other. a. True b. False ANSWER: False RATIONALE: A network operating system (NOS) is systems software that controls the computer systems and devices on a network and allows them to communicate with each other. Software tools and utilities are available for managing networks. With network-management software , a manager on a networked personal computer can monitor the use of individual computers and shared hardware (such as printers), scan for viruses, and ensure compliance with software licenses. FEEDBACK: Correct A network operating system (NOS) is systems software that controls the computer systems and devices on a network and allows them to communicate with each other. Incorrect A network operating system (NOS) is systems software that controls the computer systems and devices on a network and allows them to communicate with each other.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Communications Software QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.3 - Identify three advantages associated with software-defined networking. NATIONAL STANDARDS: United States - BUSPROG: - Analytic KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 4:49 PM 17. A virtual private network (VPN) can support a secure connection between a company’s employees and remote users, usually through a third-party service provider. a. True b. False ANSWER: True RATIONALE: Secure intranet and extranet access applications usually require the use of a virtual private network (VPN), a secure connection between two points on the Internet. Most VPNs are built and run by ISPs. FEEDBACK: Correct Secure intranet and extranet access applications usually require the use of a virtual private network (VPN), a secure connection between two points on the Internet. Most VPNs are built and run by ISPs. Incorrect Secure intranet and extranet access applications usually require the use of a virtual Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 07 - Networks: An Interconnected World private network (VPN), a secure connection between two points on the Internet. Most VPNs are built and run by ISPs.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Intranets and Extranets QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.10 - Explain how intranets and extranets use Internet technologies. NATIONAL STANDARDS: United States - BUSPROG: - Analytic KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 4:55 PM 18. When you use your lab computer to access a printer, you are using the local area network (LAN). a. True b. False ANSWER: True RATIONALE: A network that connects computer systems and devices within a small area, such as an office, home, or several floors in a building is a local area network (LAN). Several computers on the network can share a single printer. FEEDBACK: Correct A network that connects computer systems and devices within a small area, such as an office, home, or several floors in a building is a local area network (LAN). Incorrect A network that connects computer systems and devices within a small area, such as an office, home, or several floors in a building is a local area network (LAN).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Types QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.1 - Describe three network topologies and four network types in common use today. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 4:58 PM Multiple Choice 19. The ancestor of the Internet was _____. a. TCP/IP b. the ARPANET c. Telnet d. Web 1.0 ANSWER: b RATIONALE: The ancestor of the Internet was the ARPANET, a project started by the U.S. Department of Defense (DoD) in 1969. The ARPANET was both an experiment in reliable networking and a means to link DoD and military research contractors, including many universities doing military-funded research. Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 07 - Networks: An Interconnected World FEEDBACK:

a. The ancestor of the Internet was the ARPANET, a project started by the U.S. Department of Defense (DoD) in 1969.

b. The ancestor of the Internet was the ARPANET, a project started by the U.S. Department of Defense (DoD) in 1969. c. The ancestor of the Internet was the ARPANET, a project started by the U.S. Department of Defense (DoD) in 1969. d. The ancestor of the Internet was the ARPANET, a project started by the U.S. Department of Defense (DoD) in 1969.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Internet and World Wide Web QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.4 - Describe how the Internet works, including the roles of the Internet backbone, TCP/IP protocol, IP address, switches, and routers. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 5:01 PM 20. _____ is a communication standard that enables computers to route communications traffic from one network to another as needed. a. The ARPANET b. A Uniform Resource Locator (URL) c. The Internet Protocol (IP) d. A Wi-Fi ANSWER: c RATIONALE: The two original Internet networks remained connected through use of the Internet protocol (IP) which enables traffic to be routed from one network to another as needed. All the networks connected to the Internet use IP, so they all can exchange messages. The Transmission Control Protocol/Internet Protocol (TCP/IP) is a collection of communication protocols used to interconnect network devices on a packet switching network such as the Internet. FEEDBACK: a. All the networks connected to the Internet use IP, so they all can exchange messages. The Transmission Control Protocol/Internet Protocol (TCP/IP) is a collection of communication protocols used to interconnect network devices on a packet switching network such as the Internet. b. All the networks connected to the Internet use IP, so they all can exchange messages. The Transmission Control Protocol/Internet Protocol (TCP/IP) is a collection of communication protocols used to interconnect network devices on a packet switching network such as the Internet. c. All the networks connected to the Internet use IP, so they all can exchange messages. The Transmission Control Protocol/Internet Protocol (TCP/IP) is a collection of communication protocols used to interconnect network devices on a packet switching network such as the Internet. d. All the networks connected to the Internet use IP, so they all can exchange messages. The Transmission Control Protocol/Internet Protocol (TCP/IP) is a collection of communication protocols used to interconnect network devices on a packet switching network such as the Internet.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 07 - Networks: An Interconnected World REFERENCES: How the Internet Works QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.4 - Describe how the Internet works, including the roles of the Internet backbone, TCP/IP protocol, IP address, switches, and routers. NATIONAL STANDARDS: United States - BUSPROG: - Analytic KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 5:05 PM 21. The high-speed communications links that span the globe over land and under sea make up the Internet _____. a. ultrastructure b. backbone c. layer d. protocol ANSWER: b RATIONALE: In the early days of the Internet, the major communications companies around the world agreed to connect their networks so that users on all the networks could share information over the Internet. The communications media, routers, switches, communication towers, and satellites that make up these networks are the hardware over which Internet traffic flows. The combined hardware of the network service providers form the high-speed communications links that span the globe over land and under sea and make up the Internet backbone. FEEDBACK: a. The combined hardware of the network service providers form the high-speed communications links that span the globe over land and under sea and make up the Internet backbone. b. The combined hardware of the network service providers form the high-speed communications links that span the globe over land and under sea and make up the Internet backbone. c. The combined hardware of the network service providers form the high-speed communications links that span the globe over land and under sea and make up the Internet backbone. d. The combined hardware of the network service providers form the high-speed communications links that span the globe over land and under sea and make up the Internet backbone.

POINTS: 1 DIFFICULTY: Easy REFERENCES: How the Internet Works QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.4 - Describe how the Internet works, including the roles of the Internet backbone, TCP/IP protocol, IP address, switches, and routers. NATIONAL STANDARDS: United States - BUSPROG: - Analytic KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 5:08 PM 22. The Internet is migrating to Internet Protocol version 6 (IPv6), which uses _____ addresses to provide for many more devices than earlier versions. a. 32-bit b. 64-bit Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 07 - Networks: An Interconnected World c. 128-bit ANSWER: RATIONALE: FEEDBACK:

d. 256-bit c The Internet is migrating to Internet Protocol version 6 (IPv6), which uses 128-bit addresses to provide for many more devices. a. The Internet is migrating to Internet Protocol version 6 (IPv6), which uses 128-bit addresses to provide for many more devices. b. The Internet is migrating to Internet Protocol version 6 (IPv6), which uses 128-bit addresses to provide for many more devices. c. The Internet is migrating to Internet Protocol version 6 (IPv6), which uses 128-bit addresses to provide for many more devices. d. The Internet is migrating to Internet Protocol version 6 (IPv6), which uses 128-bit addresses to provide for many more devices.

POINTS: 1 DIFFICULTY: Easy REFERENCES: How the Internet Works QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.4 - Describe how the Internet works, including the roles of the Internet backbone, TCP/IP protocol, IP address, switches, and routers. NATIONAL STANDARDS: United States - BUSPROG: - Analytic KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 5:11 PM 23. _____ consists of server and client software, the Hypertext Transfer Protocol (HTTP), standards, and markup languages that combine to deliver information and services over the Internet. a. The Web b. A tag c. A cache d. The Internet ANSWER: a RATIONALE: The Internet is made up of computers, network hardware such as switches, routers, communications media, software, and the TCP/IP protocols. The World Wide Web (Web), on the other hand, consists of server and client software, the hypertext transfer protocol (http), standards, and markup languages that combine to deliver information and services over the Internet. FEEDBACK: a. The World Wide Web (Web) consists of server and client software, the hypertext transfer protocol (http), standards, and markup languages that combine to deliver information and services over the Internet. b. The World Wide Web (Web) consists of server and client software, the hypertext transfer protocol (http), standards, and markup languages that combine to deliver information and services over the Internet. c. The World Wide Web (Web) consists of server and client software, the hypertext transfer protocol (http), standards, and markup languages that combine to deliver information and services over the Internet. d. The World Wide Web (Web) consists of server and client software, the hypertext transfer protocol (http), standards, and markup languages that combine to deliver information and services over the Internet.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 07 - Networks: An Interconnected World REFERENCES: How The World Wide Web Works QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.5 - Describe how the Web works, including the roles of the client/server architecture, Domain Name System, URL, hyperlinks, Web browser, HTML, XML, and CSS. NATIONAL STANDARDS: United States - BUSPROG: - Analytic KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 5:13 PM 24. Which of the following is a markup language for defining the visual design of a Web page or group of pages? a. JavaScript b. Cascading Style Sheets (CSS) c. Java d. Extensible Markup Language (XML) ANSWER: b RATIONALE: Cascading Style Sheet (CSS) is a markup language for defining the visual design of a Web page or group of pages. FEEDBACK: a. Cascading Style Sheet (CSS) is a markup language for defining the visual design of a Web page or group of pages. b. Cascading Style Sheet (CSS) is a markup language for defining the visual design of a Web page or group of pages. c. Cascading Style Sheet (CSS) is a markup language for defining the visual design of a Web page or group of pages. d. Cascading Style Sheet (CSS) is a markup language for defining the visual design of a Web page or group of pages.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Client/Server Architecture QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.7 - Identify three commonly used client-side programming languages and three commonly used server-side programming languages. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 5:15 PM 25. The Internet Corporation for Assigned Names and Numbers (ICANN) uses companies called _____ to handle the business of registering domain names. a. registry operators b. accredited domain name registrars c. network information centers d. independent domain name registries ANSWER: b RATIONALE: The Internet Corporation for Assigned Names and Numbers (ICANN) is responsible for managing IP addresses and Internet domain names. ICANN uses companies called accredited domain name registrars to handle the business of registering domain names. FEEDBACK: a. The Internet Corporation for Assigned Names and Numbers (ICANN) is Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 07 - Networks: An Interconnected World responsible for managing IP addresses and Internet domain names. ICANN uses companies called accredited domain name registrars to handle the business of registering domain names. b. The Internet Corporation for Assigned Names and Numbers (ICANN) is responsible for managing IP addresses and Internet domain names. ICANN uses companies called accredited domain name registrars to handle the business of registering domain names. c. The Internet Corporation for Assigned Names and Numbers (ICANN) is responsible for managing IP addresses and Internet domain names. ICANN uses companies called accredited domain name registrars to handle the business of registering domain names. d. The Internet Corporation for Assigned Names and Numbers (ICANN) is responsible for managing IP addresses and Internet domain names. ICANN uses companies called accredited domain name registrars to handle the business of registering domain names.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Client/Server Architecture QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.5 - Describe how the Web works, including the roles of the client/server architecture, Domain Name System, URL, hyperlinks, Web browser, HTML, XML, and CSS. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 5:19 PM 26. Domain names must always have at least _____ parts, with each part separated by a dot (period). a. two b. three c. four d. five ANSWER: a RATIONALE: Domain names must adhere to strict rules. They always have at least two parts, with each part separated by a dot (period). FEEDBACK: a. Domain names must adhere to strict rules. They always have at least two parts, with each part separated by a dot (period). b. Domain names must adhere to strict rules. They always have at least two parts, with each part separated by a dot (period). c. Domain names must adhere to strict rules. They always have at least two parts, with each part separated by a dot (period). d. Domain names must adhere to strict rules. They always have at least two parts, with each part separated by a dot (period).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Client/Server Architecture QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.5 - Describe how the Web works, including the roles of the client/server Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 07 - Networks: An Interconnected World architecture, Domain Name System, URL, hyperlinks, Web browser, HTML, XML, and CSS. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 5:21 PM 27. _____ is the standard page description language for Web pages. a. Extensible Markup Language (XML) b. JavaScript c. .NET d. Hypertext Markup Language (HTML) ANSWER: d RATIONALE: Hypertext Markup Language (HTML) is the standard page description language for Web pages. HTML is defined by the World Wide Web Consortium (referred to as “W3C”) and has developed through numerous revisions. It is currently in its fifth revision—HTML5. FEEDBACK: a. Hypertext Markup Language (HTML) is the standard page description language for Web pages.

b. Hypertext Markup Language (HTML) is the standard page description language for Web pages. c. Hypertext Markup Language (HTML) is the standard page description language for Web pages. d. Hypertext Markup Language (HTML) is the standard page description language for Web pages.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Client/Server Architecture QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.7 - Identify three commonly used client-side programming languages and three commonly used server-side programming languages. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 5:23 PM 28. _____ is a markup language designed to transport and store data on the Web. a. Standard Generalized Markup Language (SGML) b. Extensible Markup Language (XML) c. Hypertext Markup Language (HTML) d. Hypermedia/Time-based Structuring Language (HyTime) ANSWER: b RATIONALE: Extensible Markup Language (XML) is the markup language designed to transport and store data on the Web. FEEDBACK: a. Extensible Markup Language (XML) is the markup language designed to transport and store data on the Web. b. Extensible Markup Language (XML) is the markup language designed to transport and store data on the Web.

Copyright Cengage Learning. Powered by Cognero.

Page 16


Chapter 07 - Networks: An Interconnected World c. Extensible Markup Language (XML) is the markup language designed to transport and store data on the Web.

d. Extensible Markup Language (XML) is the markup language designed to transport and store data on the Web.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Client/Server Architecture QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.7 - Identify three commonly used client-side programming languages and three commonly used server-side programming languages. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 5:25 PM 29. A _____ is a valuable tool that enables a user to find information on the Web by specifying words or phrases known as keywords, which are related to a topic of interest. a. cookie b. server c. Web portal d. search engine ANSWER: d RATIONALE: A search engine is a valuable tool that enables you to find information on the Web by specifying words or phrases known as keywords, which are related to a topic of interest. FEEDBACK: a. A search engine is a valuable tool that enables you to find information on the Web by specifying words or phrases known as keywords, which are related to a topic of interest. b. A search engine is a valuable tool that enables you to find information on the Web by specifying words or phrases known as keywords, which are related to a topic of interest. c. A search engine is a valuable tool that enables you to find information on the Web by specifying words or phrases known as keywords, which are related to a topic of interest. d. A search engine is a valuable tool that enables you to find information on the Web by specifying words or phrases known as keywords, which are related to a topic of interest.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Internet and Web Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.9 - Describe five common Internet and Web applications. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 5:32 PM 30. Web client software, such as Chrome, Firefox, Internet Explorer, Safari, and Opera, that is used to view Web pages is Copyright Cengage Learning. Powered by Cognero.

Page 17


Chapter 07 - Networks: An Interconnected World known as _____. a. Web portals b. Web browsers c. Web analytics software d. search engines ANSWER: b RATIONALE: In short, the Web is a hyperlink-based system that uses the client/server model. It organizes Internet resources throughout the world into a series of linked files, called pages, which are accessed and viewed using Web client software called a Web browser or just browser. Google Chrome, Mozilla Firefox, Microsoft Edge, Internet Explorer, Apple Safari, and Opera are popular Web browsers. FEEDBACK: a. The Web organizes Internet resources throughout the world into a series of linked files, called pages, which are accessed and viewed using Web client software called a Web browser or just browser. b. The Web organizes Internet resources throughout the world into a series of linked files, called pages, which are accessed and viewed using Web client software called a Web browser or just browser. c. The Web organizes Internet resources throughout the world into a series of linked files, called pages, which are accessed and viewed using Web client software called a Web browser or just browser. d. The Web organizes Internet resources throughout the world into a series of linked files, called pages, which are accessed and viewed using Web client software called a Web browser or just browser.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Client/Server Architecture QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.6 - State the purpose of client-side and server-side programming. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/3/2020 5:36 PM 31. _____ is a process for driving traffic to a Web site by using techniques that improve the site’s ranking in search results. a. Web content streaming b. Search engine optimization c. Tunneling d. Internet censorship ANSWER: b RATIONALE: Savvy Web site operators know that the search engine results are tools that can draw visitors to certain Web sites. Many businesses invest in search engine optimization (SEO)—a process for driving traffic to a Web site by using techniques that improve the site’s ranking in search results. FEEDBACK: a. Many businesses invest in search engine optimization (SEO)—a process for driving traffic to a Web site by using techniques that improve the site’s ranking in search results. b. Many businesses invest in search engine optimization (SEO)—a process for driving traffic to a Web site by using techniques that improve the site’s ranking in search results. c. Many businesses invest in search engine optimization (SEO)—a process for

Copyright Cengage Learning. Powered by Cognero.

Page 18


Chapter 07 - Networks: An Interconnected World driving traffic to a Web site by using techniques that improve the site’s ranking in search results. d. Many businesses invest in search engine optimization (SEO)—a process for driving traffic to a Web site by using techniques that improve the site’s ranking in search results.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Internet and Web Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.9 - Describe five common Internet and Web applications. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/4/2020 7:12 AM 32. What very short-range wireless connectivity technology enables exchange of data over a few inches of space between two devices, such as a smartphone and point-of-sale terminal? a. microwave transmission b. wireless mesh c. near field communication (NFC) d. Wi-Fi ANSWER: c RATIONALE: Near field communication (NFC) is a very short-range wireless connectivity technology that enables two devices placed within a few inches of each other to exchange data. With NFC, consumers can swipe their credit cards—or even their smartphones—within a few inches of NFC point-of-sale terminals to pay for purchases. FEEDBACK: a. Near field communication (NFC) is a very short-range wireless connectivity technology that enables two devices placed within a few inches of each other to exchange data. b. Near field communication (NFC) is a very short-range wireless connectivity technology that enables two devices placed within a few inches of each other to exchange data. c. Near field communication (NFC) is a very short-range wireless connectivity technology that enables two devices placed within a few inches of each other to exchange data. d. Near field communication (NFC) is a very short-range wireless connectivity technology that enables two devices placed within a few inches of each other to exchange data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Communications Media QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.1 - Describe three network topologies and four network types in common use today. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:49 PM Copyright Cengage Learning. Powered by Cognero.

Page 19


Chapter 07 - Networks: An Interconnected World DATE MODIFIED:

3/4/2020 7:38 AM

33. In a _____, all network devices are connected to a common backbone that serves as a shared communications medium. a. star network b. bus network c. ring network d. mesh network ANSWER: b RATIONALE: In a bus network, all network devices are connected to a common backbone that serves as a shared communications medium. FEEDBACK: a. In a bus network, all network devices are connected to a common backbone that serves as a shared communications medium. b. In a bus network, all network devices are connected to a common backbone that serves as a shared communications medium. c. In a bus network, all network devices are connected to a common backbone that serves as a shared communications medium. d. In a bus network, all network devices are connected to a common backbone that serves as a shared communications medium.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Topology QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.1 - Describe three network topologies and four network types in common use today. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/4/2020 7:40 AM 34. The area covered by one or more interconnected wireless access points is commonly called a(n) _____. a. reception area b. hot spot c. coverage zone d. access area ANSWER: b RATIONALE: A wireless access point, which consists of a transmitter with an antenna, receives the signal and decodes it. The access point then sends the information to the Internet over a wired connection. The area covered by one or more interconnected wireless access points is called a “hot spot.” FEEDBACK: a. The area covered by one or more interconnected wireless access points is called a “hot spot.” b. The area covered by one or more interconnected wireless access points is called a “hot spot.” c. The area covered by one or more interconnected wireless access points is called a “hot spot.” d. The area covered by one or more interconnected wireless access points is called a “hot spot.”

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 20


Chapter 07 - Networks: An Interconnected World REFERENCES: Communications Media QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.1 - Describe three network topologies and four network types in common use today. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/4/2020 7:44 AM 35. A _____ network is one in which all network devices are connected to one another through a single central device called the hub node. a. mesh b. personal c. bus d. star ANSWER: d RATIONALE: In a star network, all network devices connect to one another through a single central device called the hub node. FEEDBACK: a. In a star network, all network devices connect to one another through a single central device called the hub node. b. In a star network, all network devices connect to one another through a single central device called the hub node. c. In a star network, all network devices connect to one another through a single central device called the hub node. d. In a star network, all network devices connect to one another through a single central device called the hub node.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Topology QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.1 - Describe three network topologies and four network types in common use today. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/4/2020 7:48 AM 36. A _____ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city. a. metropolitan area network (MAN) b. local area network (LAN) c. wide area network (WAN) d. personal area network (PAN) ANSWER: a RATIONALE: A metropolitan area network (MAN) is a network that connects users and their computers in a geographical area that spans a campus or city. FEEDBACK: a. A metropolitan area network (MAN) is a network that connects users and their computers in a geographical area that spans a campus or city.

Copyright Cengage Learning. Powered by Cognero.

Page 21


Chapter 07 - Networks: An Interconnected World b. A metropolitan area network (MAN) is a network that connects users and their computers in a geographical area that spans a campus or city.

c. A metropolitan area network (MAN) is a network that connects users and their computers in a geographical area that spans a campus or city. d. A metropolitan area network (MAN) is a network that connects users and their computers in a geographical area that spans a campus or city.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Types QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.1 - Describe three network topologies and four network types in common use today. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/4/2020 7:50 AM 37. Which of the following statements is true of network-management software? a. One disadvantage of network-management software is that it increases the time spent on routine tasks. b. With network-management software, a manager on a networked personal computer can scan for viruses. c. Network-management software allows software to be copied, modified, or downloaded legally or illegally. d. Network-management software complicates the process of updating files and programs on computers on the network. ANSWER: b RATIONALE: Software tools and utilities are available for managing networks. With network-management software, a manager on a networked personal computer can monitor the use of individual computers and shared hardware (such as printers), scan for viruses, and ensure compliance with software licenses. Network-management software also simplifies the process of updating files and programs on computers on the network—a manager can make changes through a communications server instead of having to visit each individual computer. In addition, network-management software protects software from being copied, modified, or downloaded illegally. Some of the many benefits of network-management software include fewer hours spent on routine tasks (such as installing new software), faster response to problems, and greater overall network control. FEEDBACK: a. With network-management software, a manager on a networked personal computer can monitor the use of individual computers and shared hardware (such as printers), scan for viruses, and ensure compliance with software licenses. b. With network-management software, a manager on a networked personal computer can monitor the use of individual computers and shared hardware (such as printers), scan for viruses, and ensure compliance with software licenses. c. With network-management software, a manager on a networked personal computer can monitor the use of individual computers and shared hardware (such as printers), scan for viruses, and ensure compliance with software licenses. d. With network-management software, a manager on a networked personal computer can monitor the use of individual computers and shared hardware (such as printers), scan for viruses, and ensure compliance with software licenses.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 22


Chapter 07 - Networks: An Interconnected World DIFFICULTY: Moderate REFERENCES: Communications Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.3 - Identify three advantages associated with software-defined networking. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/4/2020 7:54 AM 38. When you successfully connect your computer to a printer using _____, the two devices will be 10 to 30 feet apart and the computer will transmit to the printer at a rate of about 2 Mbps. a. Bluetooth b. Wi-Fi c. near field communication d. infrared ANSWER: a RATIONALE: Bluetooth is a wireless communications specification that describes how cell phones, computers, printers, and other electronic devices can be interconnected over distances of 10 to 30 feet at a transmission rate of about 2 Mbps. Using Bluetooth technology, users of multifunctional devices can synchronize data on their device with information stored in a desktop computer, send or receive faxes, and print. FEEDBACK: a. Bluetooth is a wireless communications specification that describes how cell phones, computers, printers, and other electronic devices can be interconnected over distances of 10 to 30 feet at a transmission rate of about 2 Mbps. b. Bluetooth is a wireless communications specification that describes how cell phones, computers, printers, and other electronic devices can be interconnected over distances of 10 to 30 feet at a transmission rate of about 2 Mbps. c. Bluetooth is a wireless communications specification that describes how cell phones, computers, printers, and other electronic devices can be interconnected over distances of 10 to 30 feet at a transmission rate of about 2 Mbps. d. Bluetooth is a wireless communications specification that describes how cell phones, computers, printers, and other electronic devices can be interconnected over distances of 10 to 30 feet at a transmission rate of about 2 Mbps.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Communications Media QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.1 - Describe three network topologies and four network types in common use today. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/4/2020 7:58 AM 39. When you are looking for a "hotspot," you are searching for _____. Copyright Cengage Learning. Powered by Cognero.

Page 23


Chapter 07 - Networks: An Interconnected World a. a wireless access point b. bluetooth signals c. free charging stations d. strong satellite signals ANSWER: a RATIONALE: A wireless access point, which consists of a transmitter with an antenna, receives the signal and decodes it. The area covered by one or more interconnected wireless access points is called a “hot spot.” FEEDBACK: a. The area covered by one or more interconnected wireless access points is called a “hot spot.” b. The area covered by one or more interconnected wireless access points is called a “hot spot.” c. The area covered by one or more interconnected wireless access points is called a “hot spot.” d. The area covered by one or more interconnected wireless access points is called a “hot spot.”

POINTS: 1 DIFFICULTY: Easy REFERENCES: Communications Media QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.1 - Describe three network topologies and four network types in common use today. NATIONAL STANDARDS: United States - BUSPROG; Technology - Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/4/2020 8:01 AM 40. Which of the following systems can help identify your current geolocation? a. geographic information systems b. extranets c. VPNs d. GPS ANSWER: d RATIONALE: Mapping and geolocation tools are among the most popular and successful Web applications. Using GPS technologies, these tools can detect your current location and provide directions from where you are. A geographic information system (GIS) provides geographic information layered over a map. FEEDBACK: a. Using GPS technologies, geolocation tools can detect your current location and provide directions to a goal destination from where you are. b. Using GPS technologies, geolocation tools can detect your current location and provide directions to a goal destination from where you are. c. Using GPS technologies, geolocation tools can detect your current location and provide directions to a goal destination from where you are. d. Using GPS technologies, geolocation tools can detect your current location and provide directions to a goal destination from where you are.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 24


Chapter 07 - Networks: An Interconnected World DIFFICULTY: Easy REFERENCES: Internet and Web Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.9 - Describe five common Internet and Web applications. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/4/2020 8:04 AM 41. Liesel is an entrepreneur, and she'd like to publish a Web site for her small business. Liesel _____. a. will need her own server and IT people to run the server b. can use hosting services c. will need to learn Java d. will need to lease a Web server and run it herself ANSWER: b RATIONALE: If you need to create a Web site, you have many options. You can hire someone to design and build it, or you can do it yourself. If you do it yourself, you can use an online service to create the Web pages, use a Web page creation software tool, or use a plain text editor to create the site. After you create Web pages, your next step is to place or publish the content on a Web server. Popular publishing options include using ISPs, free sites, and Web hosting services. Web hosting services provide space on their Web servers for people and businesses that don’t have the financial resources, time, or skills to host their own Web sites. FEEDBACK: a. Web hosting services provide space on their Web servers for people and businesses that don’t have the financial resources, time, or skills to host their own Web sites. b. Web hosting services provide space on their Web servers for people and businesses that don’t have the financial resources, time, or skills to host their own Web sites. c. Web hosting services provide space on their Web servers for people and businesses that don’t have the financial resources, time, or skills to host their own Web sites. d. Web hosting services provide space on their Web servers for people and businesses that don’t have the financial resources, time, or skills to host their own Web sites.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Developing Web Content and Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.8 - Outline the process and tools used in developing Web content and applications. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/4/2020 9:34 AM Copyright Cengage Learning. Powered by Cognero.

Page 25


Chapter 07 - Networks: An Interconnected World 42. Social journalism or citizen journalism _____. a. is accurate and trustworthy b. may not be as reliable as mainstream media sources c. is where everyone gets their news feeds d. is a good source for facts but not opinions ANSWER: b RATIONALE: In a trend some refer to as social journalism or citizen journalism, ordinary citizens are more involved in reporting the news than ever before. Although social journalism provides important news not available elsewhere, its sources may not be as reliable as mainstream media sources. It is also sometimes difficult to discern news from opinion. FEEDBACK: a. Although social journalism provides important news not available elsewhere, its sources may not be as reliable as mainstream media sources.

b. Although social journalism provides important news not available elsewhere, its sources may not be as reliable as mainstream media sources. c. Although social journalism provides important news not available elsewhere, its sources may not be as reliable as mainstream media sources. d. Although social journalism provides important news not available elsewhere, its sources may not be as reliable as mainstream media sources.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Internet and Web Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.9 - Describe five common Internet and Web applications. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/4/2020 9:37 AM 43. _____ is a social networking site designed to help its members develop a professional network. a. LinkedIn b. Facebook c. Google d. Twitter ANSWER: a RATIONALE: One social network, LinkedIn, is designed for professional use to assist its members with creating and maintaining valuable professional connections. FEEDBACK: a. One social network, LinkedIn, is designed for professional use to assist its members with creating and maintaining valuable professional connections.

b. One social network, LinkedIn, is designed for professional use to assist its

members with creating and maintaining valuable professional connections. c. One social network, LinkedIn, is designed for professional use to assist its members with creating and maintaining valuable professional connections. d. One social network, LinkedIn, is designed for professional use to assist its members with creating and maintaining valuable professional connections.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 26


Chapter 07 - Networks: An Interconnected World DIFFICULTY: Moderate REFERENCES: Internet and Web Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.9 - Describe five common Internet and Web applications. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/4/2020 9:41 AM 44. The World Wide Web uses the _____ Protocol for transmitting content. a. Hypertext Transfer b. Mail Transfer c. Uniform Resource Location d. Domain Name Server ANSWER: a RATIONALE: The World Wide Web (Web) consists of server and client software, the hypertext transfer protocol (http), standards, and markup languages that combine to deliver information and services over the Internet. The “http” in a URL specifies the access method and tells your software to access a file using the Hypertext Transport Protocol. This is the primary method for interacting with the Internet. FEEDBACK: a. The “http” in a URL specifies the access method and tells your software to access a file using the Hypertext Transport Protocol. This is the primary method for interacting with the Internet. b. The “http” in a URL specifies the access method and tells your software to access a file using the Hypertext Transport Protocol. This is the primary method for interacting with the Internet. c. The “http” in a URL specifies the access method and tells your software to access a file using the Hypertext Transport Protocol. This is the primary method for interacting with the Internet. d. The “http” in a URL specifies the access method and tells your software to access a file using the Hypertext Transport Protocol. This is the primary method for interacting with the Internet.

POINTS: DIFFICULTY: REFERENCES:

1 Moderate How The World Wide Web Works Client/Server Architecture QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.5 - Describe how the Web works, including the roles of the client/server architecture, Domain Name System, URL, hyperlinks, Web browser, HTML, XML, and CSS. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:49 PM DATE MODIFIED: 3/4/2020 9:45 AM Copyright Cengage Learning. Powered by Cognero.

Page 27


Chapter 07 - Networks: An Interconnected World 45. Which network topology uses multiple access points to link a series of devices that speak to each other to form a network connection across a large area? a. wide area b. star c. bus d. mesh ANSWER: d RATIONALE: Mesh networks use multiple access points to link a series of devices that speak to each other to form a network connection across a large area. FEEDBACK: a. Mesh networks use multiple access points to link a series of devices that speak to each other to form a network connection across a large area. b. Mesh networks use multiple access points to link a series of devices that speak to each other to form a network connection across a large area. c. Mesh networks use multiple access points to link a series of devices that speak to each other to form a network connection across a large area. d. Mesh networks use multiple access points to link a series of devices that speak to each other to form a network connection across a large area.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Topology QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.1 - Describe three network topologies and four network types in common use today. KEYWORDS: Bloom's: Remember DATE CREATED: 3/4/2020 10:18 AM DATE MODIFIED: 3/4/2020 10:20 AM 46. The four major U.S. wireless network operators have expanded their 4G networks using a standard for wireless communications for mobile phones based on packet switching. This standard is known as _____. a. Bluetooth b. Long Term Evolution c. Transmission Control Protocol d. Hypertext Transport Protocol ANSWER: b RATIONALE: Each of the four major U.S. wireless network operators (AT&T, Verizon, Sprint, and TMobile) is rapidly expanded its 4G networks based on the Long Term Evolution (LTE) standard. Long Term Evolution (LTE) is a standard for wireless communications for mobile phones based on packet switching, which is an entirely different approach from the circuitswitching approach employed in 3G communications networks. FEEDBACK: a. Long Term Evolution (LTE) is a standard for wireless communications for mobile phones based on packet switching. b. Long Term Evolution (LTE) is a standard for wireless communications for mobile phones based on packet switching. c. Long Term Evolution (LTE) is a standard for wireless communications for mobile phones based on packet switching. d. Long Term Evolution (LTE) is a standard for wireless communications for mobile

Copyright Cengage Learning. Powered by Cognero.

Page 28


Chapter 07 - Networks: An Interconnected World phones based on packet switching.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Communications Media QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.2 - State three advantages that 5G wireless communications will provide over 4G communications. KEYWORDS: Bloom's: Remember DATE CREATED: 3/4/2020 10:23 AM DATE MODIFIED: 3/4/2020 10:30 AM 47. Compared with 4G networks, 5G networks _____. a. enable fewer applications b. support fewer devices c. have higher latency d. transmit more data ANSWER: d RATIONALE: 5G networks will have three advantages over the current 4G networks. First, they will have the bandwidth to transmit more data (on the order of 20 Gbps). At this bandwidth, a two-hour movie can be streamed in less than 3 seconds. Second, they will have lower latency—less than 1 ms compared to 10 ms. This means that data will zip through the network much faster. Third, 5G networks will have the ability to support many more devices (thousands) at one time. FEEDBACK: a. 5G networks will have the bandwidth to transmit more data than 4G networks (on the order of 20 Gbps). b. 5G networks will have the bandwidth to transmit more data than 4G networks (on the order of 20 Gbps). c. 5G networks will have the bandwidth to transmit more data than 4G networks (on the order of 20 Gbps). d. 5G networks will have the bandwidth to transmit more data than 4G networks (on the order of 20 Gbps).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Communications Media QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.2 - State three advantages that 5G wireless communications will provide over 4G communications. KEYWORDS: Bloom's: Remember DATE CREATED: 3/4/2020 10:31 AM DATE MODIFIED: 3/4/2020 2:33 PM 48. Data will zip through a 5G network much faster than through a 4G network because of the 10-fold difference in _____. a. latency Copyright Cengage Learning. Powered by Cognero.

Page 29


Chapter 07 - Networks: An Interconnected World b. bandwidth c. device support d. Gbps ANSWER: RATIONALE:

FEEDBACK:

a 5G networks will have three advantages over the current 4G networks. First, they will have the bandwidth to transmit more data (on the order of 20 Gbps). At this bandwidth, a two-hour movie can be streamed in less than 3 seconds. Second, they will have lower latency—less than 1 ms compared to 10 ms. This means that data will zip through the network much faster. Third, 5G networks will have the ability to support many more devices (thousands) at one time. a. 5G networks will have lower latency than 4G—less than 1 ms compared to 10 ms. This means that data will zip through the network much faster. b. 5G networks will have lower latency than 4G—less than 1 ms compared to 10 ms. This means that data will zip through the network much faster. c. 5G networks will have lower latency than 4G—less than 1 ms compared to 10 ms. This means that data will zip through the network much faster. d. 5G networks will have lower latency than 4G—less than 1 ms compared to 10 ms. This means that data will zip through the network much faster.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Communications Media QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.2 - State three advantages that 5G wireless communications will provide over 4G communications. KEYWORDS: Bloom's: Remember DATE CREATED: 3/4/2020 10:32 AM DATE MODIFIED: 3/4/2020 2:39 PM 49. One reason AT&T and Verizon have plans to expand their 5G networks is that _____. a. they increase latency as compared with 4G networks, from 1 ms to 10 ms b. 5G cells broadcast farther than 4G cells, requiring fewer cell towers c. they can support many more devices at one time than 4G networks d. 5G equipment is less costly to deploy and maintain than 4G equipment ANSWER: c RATIONALE: 5G networks will have three advantages over the current 4G networks. First, they will have the bandwidth to transmit more data (on the order of 20 Gbps). At this bandwidth, a two-hour movie can be streamed in less than 3 seconds. Second, they will have lower latency—less than 1 ms compared to 10 ms. This means that data will zip through the network much faster. Third, 5G networks will have the ability to support many more devices (thousands) at one time. 5G networks will have some initial drawbacks that must be overcome. More cell towers will be required because 5G cells are not able to broadcast as great a distance as a 3G or 4G cell. Because more cells will need to be installed, 5G users can expect that their coverage may not be as widespread at first. At least initially, 5G devices must be designed to work on both the slower 4G networks and 5G networks. 5G equipment is costly, so deployment and maintenance will be expensive. Copyright Cengage Learning. Powered by Cognero.

Page 30


Chapter 07 - Networks: An Interconnected World FEEDBACK:

a. 5G networks will have the ability to support many more devices (thousands) at one time than 4G networks.

b. 5G networks will have the ability to support many more devices (thousands) at one time than 4G networks. c. 5G networks will have the ability to support many more devices (thousands) at one time than 4G networks. d. 5G networks will have the ability to support many more devices (thousands) at one time than 4G networks.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Communications Media QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.2 - State three advantages that 5G wireless communications will provide over 4G communications. KEYWORDS: Bloom's: Remember DATE CREATED: 3/4/2020 10:32 AM DATE MODIFIED: 3/4/2020 2:48 PM 50. Compared with 4G networks, 5G networks will greatly improve the user's experience with a technology that adds a virtual layer over the real world called _____. a. augmented reality b. MDM software c. CSS d. Web 2.0 ANSWER: a RATIONALE: Augmented reality (AR) adds a virtual layer over the real world opening the door to a wide range of potential applications. The bandwidth, latency, and lack of uniformity (the consistency of mobile connection) of 4G networks greatly limits what can be done with AR and VR. However, 5G networks with a latency of less than 1 ms will greatly improve the AR/VR experience. FEEDBACK: a. Augmented reality (AR) adds a virtual layer over the real world opening the door to a wide range of potential applications. 5G networks with a latency of less than 1 ms will greatly improve the AR/VR experience. b. Augmented reality (AR) adds a virtual layer over the real world opening the door to a wide range of potential applications. 5G networks with a latency of less than 1 ms will greatly improve the AR/VR experience. c. Augmented reality (AR) adds a virtual layer over the real world opening the door to a wide range of potential applications. 5G networks with a latency of less than 1 ms will greatly improve the AR/VR experience. d. Augmented reality (AR) adds a virtual layer over the real world opening the door to a wide range of potential applications. 5G networks with a latency of less than 1 ms will greatly improve the AR/VR experience.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Easy Communications Media Multiple Choice False

Copyright Cengage Learning. Powered by Cognero.

Page 31


Chapter 07 - Networks: An Interconnected World LEARNING OBJECTIVES: POIS.14e.7.2 - State three advantages that 5G wireless communications will provide over 4G communications. KEYWORDS: Bloom's: Remember DATE CREATED: 3/4/2020 10:32 AM DATE MODIFIED: 3/4/2020 5:07 PM 51. 5G networks can support the exchange of brief bursts of data between next-generation autonomous cars because they provide _____. a. unlimited device support b. large cell broadcast distances c. a bandwidth of about 20 Gbps d. sub-millisecond latency ANSWER: d RATIONALE: Next-generation autonomous cars will interact with other vehicles and “smart roads” exchanging information directly with other cars and/or smart devices strategically positioned along the highways. They will use this data to further improve driver safety and overall traffic flow. The sub-millisecond latency of 5G networks will be required to support these brief bursts of data. FEEDBACK: a. Next-generation autonomous cars will interact with other vehicles and “smart roads” exchanging information directly with other cars and/or smart devices strategically positioned along the highways. The sub-millisecond latency of 5G networks will be required to support these brief bursts of data. b. Next-generation autonomous cars will interact with other vehicles and “smart roads” exchanging information directly with other cars and/or smart devices strategically positioned along the highways. The sub-millisecond latency of 5G networks will be required to support these brief bursts of data. c. Next-generation autonomous cars will interact with other vehicles and “smart roads” exchanging information directly with other cars and/or smart devices strategically positioned along the highways. The sub-millisecond latency of 5G networks will be required to support these brief bursts of data. d. Next-generation autonomous cars will interact with other vehicles and “smart roads” exchanging information directly with other cars and/or smart devices strategically positioned along the highways. The sub-millisecond latency of 5G networks will be required to support these brief bursts of data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Communications Media QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.2 - State three advantages that 5G wireless communications will provide over 4G communications. KEYWORDS: Bloom's: Remember DATE CREATED: 3/4/2020 10:32 AM DATE MODIFIED: 3/4/2020 5:14 PM 52. Early 5G users should be aware that their coverage may be limited compared with 4G coverage, at least initially. Why will 5G networks likely be less widespread at first? a. major providers are not launching 5G coverage yet Copyright Cengage Learning. Powered by Cognero.

Page 32


Chapter 07 - Networks: An Interconnected World b. more cell towers will need to be installed c. devices must be compatible with both 4G and 5G d. 5G equipment is inexpensive but complicated to install ANSWER: b RATIONALE: 5G networks will have some initial drawbacks that must be overcome. More cell towers will be required because 5G cells are not able to broadcast as great a distance as a 3G or 4G cell. Because more cells will need to be installed, 5G users can expect that their coverage may not be as widespread at first. FEEDBACK: a. Because more cells will need to be installed, 5G users can expect that their coverage may not be as widespread at first.

b. Because more cells will need to be installed, 5G users can expect that their coverage may not be as widespread at first. c. Because more cells will need to be installed, 5G users can expect that their coverage may not be as widespread at first. d. Because more cells will need to be installed, 5G users can expect that their coverage may not be as widespread at first.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Communications Media QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.2 - State three advantages that 5G wireless communications will provide over 4G communications. KEYWORDS: Bloom's: Remember DATE CREATED: 3/4/2020 10:32 AM DATE MODIFIED: 3/4/2020 5:22 PM 53. Which statement about 4G wireless communications is correct? a. The bandwidth and latency of 4G networks enable rapid streaming of VR content. b. Major 4G networks use circuit-switching rather than packet-switching approaches. c. Eventually, 4G will make worldwide roaming as well as universal access possible. d. A two-hour movie can be streamed in less than 3 seconds over a 4G network. ANSWER: c RATIONALE: 4G broadband mobile wireless delivers more advanced versions of enhanced multimedia, smooth streaming video, universal access, and portability across all types of devices; eventually 4G will also make possible worldwide roaming. FEEDBACK: a. 4G broadband mobile wireless delivers more advanced versions of enhanced multimedia, smooth streaming video, universal access, and portability across all types of devices; eventually 4G will also make possible worldwide roaming. b. 4G broadband mobile wireless delivers more advanced versions of enhanced multimedia, smooth streaming video, universal access, and portability across all types of devices; eventually 4G will also make possible worldwide roaming. c. 4G broadband mobile wireless delivers more advanced versions of enhanced multimedia, smooth streaming video, universal access, and portability across all types of devices; eventually 4G will also make possible worldwide roaming. d. 4G broadband mobile wireless delivers more advanced versions of enhanced multimedia, smooth streaming video, universal access, and portability across all types of devices; eventually 4G will also make possible worldwide roaming.

Copyright Cengage Learning. Powered by Cognero.

Page 33


Chapter 07 - Networks: An Interconnected World POINTS: 1 DIFFICULTY: Easy REFERENCES: Communications Media QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.2 - State three advantages that 5G wireless communications will provide over 4G communications. KEYWORDS: Bloom's: Remember DATE CREATED: 3/4/2020 10:32 AM DATE MODIFIED: 3/4/2020 5:32 PM 54. Banks monitor their automated teller machines from a central location, which receives status messages over the machines' network, using a form of _____. a. router b. mobile device management software c. network-management software d. network operating system ANSWER: c RATIONALE: Banks use a special form of network-management software to monitor the performance of their automated teller machines (ATMs). Status messages can be sent over the network to a central monitoring location to inform support people about situations such as low cash or receipt paper levels, card reader problems, and printer paper jams. Once a status message is received, a service provider or branch location employee can be dispatched to fix the ATM problem. FEEDBACK: a. Banks use a special form of network-management software to monitor the performance of their automated teller machines (ATMs). Status messages can be sent over the network to a central monitoring location. b. Banks use a special form of network-management software to monitor the performance of their automated teller machines (ATMs). Status messages can be sent over the network to a central monitoring location. c. Banks use a special form of network-management software to monitor the performance of their automated teller machines (ATMs). Status messages can be sent over the network to a central monitoring location. d. Banks use a special form of network-management software to monitor the performance of their automated teller machines (ATMs). Status messages can be sent over the network to a central monitoring location.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Communications Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.3 - Identify three advantages associated with software-defined networking. KEYWORDS: Bloom's: Remember DATE CREATED: 3/5/2020 7:34 AM DATE MODIFIED: 3/5/2020 7:42 AM 55. Jocelyn uses a company-owned smartphone for her job, and has noticed that applications, data, and patches are Copyright Cengage Learning. Powered by Cognero.

Page 34


Chapter 07 - Networks: An Interconnected World installed on her smartphone for her by a central control group. She cannot change the system or security settings on the smartphone because the central control group handles those as well. Jocelyn's company can do this using _____. a. mobile device management software b. network-management software c. a wide-area network d. a mesh network ANSWER: a RATIONALE: Mobile device management (MDM) software manages and troubleshoots mobile devices remotely, pushing out applications, data, patches, and settings. With the software, a central control group can maintain group policies for security, control system settings, ensure malware protection is in place for mobile devices used across the network, and make it mandatory to use passwords to access the network. FEEDBACK: a. Mobile device management (MDM) software manages and troubleshoots mobile devices remotely, pushing out applications, data, patches, and settings. With the software, a central control group can maintain group policies for security, control system settings, ensure malware protection is in place for mobile devices used across the network, and make it mandatory to use passwords to access the network. b. Mobile device management (MDM) software manages and troubleshoots mobile devices remotely, pushing out applications, data, patches, and settings. With the software, a central control group can maintain group policies for security, control system settings, ensure malware protection is in place for mobile devices used across the network, and make it mandatory to use passwords to access the network. c. Mobile device management (MDM) software manages and troubleshoots mobile devices remotely, pushing out applications, data, patches, and settings. With the software, a central control group can maintain group policies for security, control system settings, ensure malware protection is in place for mobile devices used across the network, and make it mandatory to use passwords to access the network. d. Mobile device management (MDM) software manages and troubleshoots mobile devices remotely, pushing out applications, data, patches, and settings. With the software, a central control group can maintain group policies for security, control system settings, ensure malware protection is in place for mobile devices used across the network, and make it mandatory to use passwords to access the network.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Communications Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.3 - Identify three advantages associated with software-defined networking. KEYWORDS: Bloom's: Remember DATE CREATED: 3/5/2020 7:43 AM DATE MODIFIED: 3/5/2020 7:55 AM 56. In a typical network, routing and switching of data and enabling access to applications are performed by hundreds or thousands of _____. a. IS professionals b. network devices Copyright Cengage Learning. Powered by Cognero.

Page 35


Chapter 07 - Networks: An Interconnected World c. wires or cables d. Bluetooth devices ANSWER: RATIONALE:

FEEDBACK:

b A typical network is comprised of hundreds or thousands of network devices that perform such tasks as routing and switching of data through the network, providing network access and control, and enabling access to a variety of applications and services. a. A typical network is comprised of hundreds or thousands of network devices that perform such tasks as routing and switching of data through the network, providing network access and control, and enabling access to a variety of applications and services. b. A typical network is comprised of hundreds or thousands of network devices that perform such tasks as routing and switching of data through the network, providing network access and control, and enabling access to a variety of applications and services. c. A typical network is comprised of hundreds or thousands of network devices that perform such tasks as routing and switching of data through the network, providing network access and control, and enabling access to a variety of applications and services. d. A typical network is comprised of hundreds or thousands of network devices that perform such tasks as routing and switching of data through the network, providing network access and control, and enabling access to a variety of applications and services.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Communications Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.3 - Identify three advantages associated with software-defined networking. KEYWORDS: Bloom's: Remember DATE CREATED: 3/5/2020 7:46 AM DATE MODIFIED: 3/5/2020 8:01 AM 57. Why is managing a typical large network in today's current network environment a labor-intensive and error-prone effort? a. network devices cannot be configured through keyboard input b. network devices must each be configured individually c. network-management software must be accessed on each device d. network operating systems are difficult to implement and maintain ANSWER: b RATIONALE: In today’s current network environment, each network device must be configured individually, usually via manual keyboard input. For a network of any size, this becomes a labor-intensive and error-prone effort, making it difficult to change the network so it can meet the changing needs of the organization. FEEDBACK: a. In today’s current network environment, each network device must be configured individually, usually via manual keyboard input. For a network of any size, this becomes a labor-intensive and error-prone effort. b. In today’s current network environment, each network device must be configured individually, usually via manual keyboard input. For a network of any size, this becomes a labor-intensive and error-prone effort.

Copyright Cengage Learning. Powered by Cognero.

Page 36


Chapter 07 - Networks: An Interconnected World c. In today’s current network environment, each network device must be configured individually, usually via manual keyboard input. For a network of any size, this becomes a labor-intensive and error-prone effort. d. In today’s current network environment, each network device must be configured individually, usually via manual keyboard input. For a network of any size, this becomes a labor-intensive and error-prone effort.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Communications Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.3 - Identify three advantages associated with software-defined networking. KEYWORDS: Bloom's: Remember DATE CREATED: 3/5/2020 7:46 AM DATE MODIFIED: 3/6/2020 11:05 AM 58. What emerging approach allows administrators to manage a network via a controller that does not require physical access to all the network devices? a. WAN management b. network topology c. MDM software networking d. software-defined networking ANSWER: d RATIONALE: Software-defined networking (SDN) is an emerging approach to networking that allows network administrators to manage a network via a controller that does not require physical access to all the network devices. FEEDBACK: a. Software-defined networking (SDN) is an emerging approach to networking that allows network administrators to manage a network via a controller that does not require physical access to all the network devices. b. Software-defined networking (SDN) is an emerging approach to networking that allows network administrators to manage a network via a controller that does not require physical access to all the network devices. c. Software-defined networking (SDN) is an emerging approach to networking that allows network administrators to manage a network via a controller that does not require physical access to all the network devices. d. Software-defined networking (SDN) is an emerging approach to networking that allows network administrators to manage a network via a controller that does not require physical access to all the network devices.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Communications Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.3 - Identify three advantages associated with software-defined networking. KEYWORDS: Bloom's: Remember DATE CREATED: 3/5/2020 7:46 AM DATE MODIFIED: 3/6/2020 11:10 AM Copyright Cengage Learning. Powered by Cognero.

Page 37


Chapter 07 - Networks: An Interconnected World 59. How does software-defined networking reduce both the risk of human error and overall network support and operations costs? a. It ensures network resources such as printers are used correctly. b. It allows individualized configuration through manual input. c. It increases physical access to all network devices. d. It automates configuration, policy management, and other tasks. ANSWER: d RATIONALE: Software-defined networking (SDN) is an emerging approach to networking that allows network administrators to manage a network via a controller that does not require physical access to all the network devices. This approach automates tasks such as configuration and policy management and enables the network to dynamically respond to application requirements. As a result, new applications can be made available sooner, the risk of human error (a major contributor to network downtime) is reduced, and overall network support and operations costs are reduced. FEEDBACK: a. SDN automates tasks such as configuration and policy management and enables the network to dynamically respond to application requirements. As a result, new applications can be made available sooner, the risk of human error (a major contributor to network downtime) is reduced, and overall network support and operations costs are reduced. b. SDN automates tasks such as configuration and policy management and enables the network to dynamically respond to application requirements. As a result, new applications can be made available sooner, the risk of human error (a major contributor to network downtime) is reduced, and overall network support and operations costs are reduced. c. SDN automates tasks such as configuration and policy management and enables the network to dynamically respond to application requirements. As a result, new applications can be made available sooner, the risk of human error (a major contributor to network downtime) is reduced, and overall network support and operations costs are reduced. d. SDN automates tasks such as configuration and policy management and enables the network to dynamically respond to application requirements. As a result, new applications can be made available sooner, the risk of human error (a major contributor to network downtime) is reduced, and overall network support and operations costs are reduced.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Communications Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.3 - Identify three advantages associated with software-defined networking. KEYWORDS: Bloom's: Remember DATE CREATED: 3/5/2020 7:46 AM DATE MODIFIED: 3/6/2020 11:20 AM 60. When ProMedica's data centers, which consisted of some 3,500 servers and numerous hubs, switches, and routers, were networked together and managed as one, this health care organization needed to change their network architecture. To make these network and data center changes faster, easier, and less risky, ProMedica avoided having to physically change all their network devices by implementing _____. a. wireless communication Copyright Cengage Learning. Powered by Cognero.

Page 38


Chapter 07 - Networks: An Interconnected World b. a star network c. software-defined networking d. a network operating system ANSWER: c RATIONALE: Both of ProMedica’s data centers, roughly 20 miles apart, were networked together and managed as one to create a fully redundant computing environment. This required a major overhaul of its data center network environment consisting of some 3,500 servers and numerous hubs, switches, and routers. The only practical solution was to convert to an SDN network architecture. Network and data center changes are faster, easier, and less risky with SDN. There is no longer a concern that when one thing is upgraded that something else may be negatively affected. No need to physically go to a network device to make a change thus greatly reducing change management and repair efforts. FEEDBACK: a. Network and data center changes are faster, easier, and less risky with SDN. There is no need to physically go to a network device to make a change, and thus change management and repair efforts are greatly reduced. b. Network and data center changes are faster, easier, and less risky with SDN. There is no need to physically go to a network device to make a change, and thus change management and repair efforts are greatly reduced. c. Network and data center changes are faster, easier, and less risky with SDN. There is no need to physically go to a network device to make a change, and thus change management and repair efforts are greatly reduced. d. Network and data center changes are faster, easier, and less risky with SDN. There is no need to physically go to a network device to make a change, and thus change management and repair efforts are greatly reduced.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Communications Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.3 - Identify three advantages associated with software-defined networking. KEYWORDS: Bloom's: Remember DATE CREATED: 3/5/2020 7:46 AM DATE MODIFIED: 3/6/2020 11:33 AM 61. Which piece of network hardware keeps a record of the MAC address of all devices connected to it and uses this information to direct data packets to the appropriate port? a. switch b. router c. server d. bus ANSWER: a RATIONALE: The switch is a network device that keeps a record of the Media Access Control (MAC) address of all the devices connected to it. It uses this information to determine to which port a packet of data should be directed. When a switch receives a packet, it knows exactly which port to send it to, with no significant increase in network response times. FEEDBACK: a. The switch is a network device that keeps a record of the Media Access Control (MAC) address of all the devices connected to it. It uses this information to determine to which port a packet of data should be directed.

Copyright Cengage Learning. Powered by Cognero.

Page 39


Chapter 07 - Networks: An Interconnected World b. The switch is a network device that keeps a record of the Media Access Control (MAC) address of all the devices connected to it. It uses this information to determine to which port a packet of data should be directed. c. The switch is a network device that keeps a record of the Media Access Control (MAC) address of all the devices connected to it. It uses this information to determine to which port a packet of data should be directed. d. The switch is a network device that keeps a record of the Media Access Control (MAC) address of all the devices connected to it. It uses this information to determine to which port a packet of data should be directed.

POINTS: 1 DIFFICULTY: Easy REFERENCES: How the Internet Works QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.4 - Describe how the Internet works, including the roles of the Internet backbone, TCP/IP protocol, IP address, switches, and routers. KEYWORDS: Bloom's: Remember DATE CREATED: 3/6/2020 11:37 AM DATE MODIFIED: 3/6/2020 11:42 AM 62. Which type of network device directs data packets to other networks until each packet reaches its destination, and thus forms the Internet backbone? a. switch b. router c. server d. bus ANSWER: b RATIONALE: The router is a network device that directs data packets to other networks until each packet reaches its destination. The information needed to get data packets to their destinations is stored in routing tables maintained by each router connected to the Internet. A router usually connects two different networks and routes data packets between them. The largest and most powerful network routers form the Internet backbone. FEEDBACK: a. The router is a network device that directs data packets to other networks until each packet reaches its destination. The largest and most powerful network routers form the Internet backbone. b. The router is a network device that directs data packets to other networks until each packet reaches its destination. The largest and most powerful network routers form the Internet backbone. c. The router is a network device that directs data packets to other networks until each packet reaches its destination. The largest and most powerful network routers form the Internet backbone. d. The router is a network device that directs data packets to other networks until each packet reaches its destination. The largest and most powerful network routers form the Internet backbone.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy How the Internet Works Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 40


Chapter 07 - Networks: An Interconnected World HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.4 - Describe how the Internet works, including the roles of the Internet backbone, TCP/IP protocol, IP address, switches, and routers. KEYWORDS: Bloom's: Remember DATE CREATED: 3/6/2020 11:43 AM DATE MODIFIED: 3/6/2020 11:51 AM 63. What do organizations or individuals who provide information over the Internet use to designate where resources such as servers and documents are located? a. MAC address b. TCP c. URL d. CSS ANSWER: c RATIONALE: A Uniform Resource Locator (URL) is a Web address that specifies the exact location of a Web page using letters and words that map to an IP address and a location on the host. The URL gives those who provide information over the Internet a standard way to designate where Internet resources such as servers and documents are located. FEEDBACK: a. The URL gives those who provide information over the Internet a standard way to designate where Internet resources such as servers and documents are located. b. The URL gives those who provide information over the Internet a standard way to designate where Internet resources such as servers and documents are located. c. The URL gives those who provide information over the Internet a standard way to designate where Internet resources such as servers and documents are located. d. The URL gives those who provide information over the Internet a standard way to designate where Internet resources such as servers and documents are located.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Client/Server Architecture QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.5 - Describe how the Web works, including the roles of the client/server architecture, Domain Name System, URL, hyperlinks, Web browser, HTML, XML, and CSS. KEYWORDS: Bloom's: Remember DATE CREATED: 3/6/2020 4:45 PM DATE MODIFIED: 3/6/2020 4:55 PM 64. Web pages are connected to each other using specially denoted text or graphics on each page that, when clicked, open a new Web page containing related content. These are called _____. a. hyperlinks b. protocols c. domain names d. URLs ANSWER: a RATIONALE: Web pages are connected to each other using hyperlinks, specially denoted text or graphics Copyright Cengage Learning. Powered by Cognero.

Page 41


Chapter 07 - Networks: An Interconnected World on a Web page, that, when clicked, open a new Web page containing related content. FEEDBACK:

a. Web pages are connected to each other using hyperlinks, specially denoted text

or graphics on a Web page, that, when clicked, open a new Web page containing related content. b. Web pages are connected to each other using hyperlinks, specially denoted text or graphics on a Web page, that, when clicked, open a new Web page containing related content. c. Web pages are connected to each other using hyperlinks, specially denoted text or graphics on a Web page, that, when clicked, open a new Web page containing related content. d. Web pages are connected to each other using hyperlinks, specially denoted text or graphics on a Web page, that, when clicked, open a new Web page containing related content.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Client/Server Architecture QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.5 - Describe how the Web works, including the roles of the client/server architecture, Domain Name System, URL, hyperlinks, Web browser, HTML, XML, and CSS. KEYWORDS: Bloom's: Remember DATE CREATED: 3/6/2020 4:56 PM DATE MODIFIED: 3/6/2020 5:02 PM 65. The World Wide Web uses a networking approach wherein many end-user computing devices request and receive services from host computers on the network, which is known as _____. a. Long Term Evolution b. software-defined networking c. Transmission Control Protocol d. client/server architecture ANSWER: d RATIONALE: Client/server architecture is a networking approach wherein many clients (end-user computing devices) request and receive services from servers (host computers) on the network. FEEDBACK: a. Client/server architecture is a networking approach wherein many clients (enduser computing devices) request and receive services from servers (host computers) on the network. b. Client/server architecture is a networking approach wherein many clients (enduser computing devices) request and receive services from servers (host computers) on the network. c. Client/server architecture is a networking approach wherein many clients (enduser computing devices) request and receive services from servers (host computers) on the network. d. Client/server architecture is a networking approach wherein many clients (enduser computing devices) request and receive services from servers (host computers) on the network.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 42


Chapter 07 - Networks: An Interconnected World REFERENCES: Client/Server Architecture QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.6 - State the purpose of client-side and server-side programming. KEYWORDS: Bloom's: Remember DATE CREATED: 3/6/2020 5:04 PM DATE MODIFIED: 3/6/2020 5:14 PM 66. Web servers must be programmed to _____. a. provide an end-user interface b. display the results of user requests c. receive and process user requests d. transmit end-user requests ANSWER: c RATIONALE: Servers receive client user requests, process them, and obtain the requested data. This may require queries to a database and encoding the data into the HTML format. The client computers provide an interface to allow the client computer user to request services of the server computers. The client computers also display the results (Web pages) that the servers return. FEEDBACK: a. Servers receive client user requests, process them, and obtain the requested data. b. Servers receive client user requests, process them, and obtain the requested data. c. Servers receive client user requests, process them, and obtain the requested data. d. Servers receive client user requests, process them, and obtain the requested data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Client/Server Architecture QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.6 - State the purpose of client-side and server-side programming. KEYWORDS: Bloom's: Remember DATE CREATED: 3/6/2020 5:05 PM DATE MODIFIED: 3/6/2020 5:20 PM 67. The software on a client computer accessing the Web must be able to _____. a. run scripts in any computer language b. receive and process end-user requests c. query databases and encode the data as HTML d. display the results returned by Web servers ANSWER: d RATIONALE: Servers receive client user requests, process them, and obtain the requested data. This may require queries to a database and encoding the data into the HTML format. The client computers provide an interface to allow the client computer user to request services of the Copyright Cengage Learning. Powered by Cognero.

Page 43


Chapter 07 - Networks: An Interconnected World server computers. The client computers also display the results (Web pages) that the servers return. FEEDBACK:

a. The client computers display the results (Web pages) that the servers return. b. The client computers display the results (Web pages) that the servers return. c. The client computers display the results (Web pages) that the servers return. d. The client computers display the results (Web pages) that the servers return.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Client/Server Architecture QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.6 - State the purpose of client-side and server-side programming. KEYWORDS: Bloom's: Remember DATE CREATED: 3/6/2020 5:05 PM DATE MODIFIED: 3/6/2020 5:25 PM 68. Which of the following is used to create a program that runs on a Web server and deals with generation of the content of a Web page to satisfy an end-user's request? a. client-side programming b. server-side programming c. TCP/IP d. HTML ANSWER: b RATIONALE: Server-side programming creates a program that runs on the server and deals with generation of the content of a Web page to satisfy the client’s request. FEEDBACK: a. Server-side programming creates a program that runs on the server and deals with generation of the content of a Web page to satisfy the client’s request. b. Server-side programming creates a program that runs on the server and deals with generation of the content of a Web page to satisfy the client’s request. c. Server-side programming creates a program that runs on the server and deals with generation of the content of a Web page to satisfy the client’s request. d. Server-side programming creates a program that runs on the server and deals with generation of the content of a Web page to satisfy the client’s request.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Client/Server Architecture QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.6 - State the purpose of client-side and server-side programming. KEYWORDS: Bloom's: Remember DATE CREATED: 3/6/2020 5:06 PM DATE MODIFIED: 3/6/2020 5:29 PM 69. Marcus is a developer hired to write code that dynamically pulls data from a database stored on a host computer in order to customize Web site content for individual users. He is engaged in _____. Copyright Cengage Learning. Powered by Cognero.

Page 44


Chapter 07 - Networks: An Interconnected World a. server-side programming b. client-side programming c. software-defined networking d. database administration ANSWER: a RATIONALE: The Web site uses server-side programming to dynamically display different data as needed. The data is pulled from a database stored on the server and sent to the client to be displayed by client-side code. Server-side programming enables Web site designers to customize Web site content for individual users. FEEDBACK: a. The Web site uses server-side programming to dynamically display different data as needed. The data is pulled from a database stored on the server and sent to the client to be displayed by client-side code. Server-side programming enables Web site designers to customize Web site content for individual users. b. The Web site uses server-side programming to dynamically display different data as needed. The data is pulled from a database stored on the server and sent to the client to be displayed by client-side code. Server-side programming enables Web site designers to customize Web site content for individual users. c. The Web site uses server-side programming to dynamically display different data as needed. The data is pulled from a database stored on the server and sent to the client to be displayed by client-side code. Server-side programming enables Web site designers to customize Web site content for individual users. d. The Web site uses server-side programming to dynamically display different data as needed. The data is pulled from a database stored on the server and sent to the client to be displayed by client-side code. Server-side programming enables Web site designers to customize Web site content for individual users.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Client/Server Architecture QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.6 - State the purpose of client-side and server-side programming. KEYWORDS: Bloom's: Remember DATE CREATED: 3/6/2020 5:06 PM DATE MODIFIED: 3/6/2020 5:34 PM 70. Stacey is developing code that will enable users of her software to display the customized text and images sent by Web servers as Web pages. She is engaged in _____. a. server-side programming b. client-side programming c. software-defined networking d. database administration ANSWER: b RATIONALE: The Web site uses server-side programming to dynamically display different data as needed. The data is pulled from a database stored on the server and sent to the client to be displayed by client-side code. The client computers display the results (Web pages) that the servers return. FEEDBACK: a. The Web site uses server-side programming to dynamically display different data as needed. The data is pulled from a database stored on the server and sent to

Copyright Cengage Learning. Powered by Cognero.

Page 45


Chapter 07 - Networks: An Interconnected World the client to be displayed by client-side code. The client computers display the results (Web pages) that the servers return. b. The Web site uses server-side programming to dynamically display different data as needed. The data is pulled from a database stored on the server and sent to the client to be displayed by client-side code. The client computers display the results (Web pages) that the servers return. c. The Web site uses server-side programming to dynamically display different data as needed. The data is pulled from a database stored on the server and sent to the client to be displayed by client-side code. The client computers display the results (Web pages) that the servers return. d. The Web site uses server-side programming to dynamically display different data as needed. The data is pulled from a database stored on the server and sent to the client to be displayed by client-side code. The client computers display the results (Web pages) that the servers return.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Client/Server Architecture QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.6 - State the purpose of client-side and server-side programming. KEYWORDS: Bloom's: Remember DATE CREATED: 3/6/2020 5:06 PM DATE MODIFIED: 3/6/2020 5:40 PM 71. Which of the following is a widely-used client-side programming language? a. JavaScript b. Java c. Ruby on Rails d. Python ANSWER: a RATIONALE: JavaScript, VBA Script, HTML, CSS, and Ajax are among other widely used client-side programming languages. PHP, C++, Java, Python, and Ruby on Rails are among the most widely used server-side programming languages. FEEDBACK: a. JavaScript, VBA Script, HTML, CSS, and Ajax are among other widely used client-side programming languages. b. JavaScript, VBA Script, HTML, CSS, and Ajax are among other widely used client-side programming languages. c. JavaScript, VBA Script, HTML, CSS, and Ajax are among other widely used client-side programming languages. d. JavaScript, VBA Script, HTML, CSS, and Ajax are among other widely used client-side programming languages.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Client/Server Architecture QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.7 - Identify three commonly used client-side programming languages and three commonly used server-side programming languages. Copyright Cengage Learning. Powered by Cognero.

Page 46


Chapter 07 - Networks: An Interconnected World KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 3/6/2020 5:45 PM 3/6/2020 5:48 PM

72. Which of the following is a widely-used server-side programming language? a. HTML b. Ajax c. PHP d. VBA Script ANSWER: c RATIONALE: JavaScript, VBA Script, HTML, CSS, and Ajax are among other widely used client-side programming languages. PHP, C++, Java, Python, and Ruby on Rails are among the most widely used server-side programming languages. FEEDBACK: a. PHP, C++, Java, Python, and Ruby on Rails are among the most widely used server-side programming languages. b. PHP, C++, Java, Python, and Ruby on Rails are among the most widely used server-side programming languages. c. PHP, C++, Java, Python, and Ruby on Rails are among the most widely used server-side programming languages. d. PHP, C++, Java, Python, and Ruby on Rails are among the most widely used server-side programming languages.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Client/Server Architecture QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.7 - Identify three commonly used client-side programming languages and three commonly used server-side programming languages. KEYWORDS: Bloom's: Remember DATE CREATED: 3/6/2020 5:49 PM DATE MODIFIED: 3/6/2020 5:51 PM 73. When Web site developers choose to use a modular approach to Web design, which of the following languages do they use to define the design and layout of Web pages? a. XML b. JavaScript c. HTML d. CSS ANSWER: d RATIONALE: XML is extremely useful for organizing Web content and making data easy to find. Many Web sites use CSS to define the design and layout of Web pages, XML to define the content, and HTML to join the design (CSS) with the content (XML). This modular approach to Web design allows Web site developers to change the visual design without affecting the content and to change the content without affecting the visual design. FEEDBACK: a. Many Web sites use CSS to define the design and layout of Web pages, XML to define the content, and HTML to join the design (CSS) with the content (XML).

Copyright Cengage Learning. Powered by Cognero.

Page 47


Chapter 07 - Networks: An Interconnected World b. Many Web sites use CSS to define the design and layout of Web pages, XML to define the content, and HTML to join the design (CSS) with the content (XML).

c. Many Web sites use CSS to define the design and layout of Web pages, XML to define the content, and HTML to join the design (CSS) with the content (XML). d. Many Web sites use CSS to define the design and layout of Web pages, XML to define the content, and HTML to join the design (CSS) with the content (XML).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Client/Server Architecture QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.7 - Identify three commonly used client-side programming languages and three commonly used server-side programming languages. KEYWORDS: Bloom's: Remember DATE CREATED: 3/6/2020 5:51 PM DATE MODIFIED: 3/7/2020 7:33 AM 74. Pauline is coding a Web page using HTML. What can she use to place a photo, graphic, audio file, or movie on a Web page? a. server-side programming b. a CSS file c. a hyperlink d. a tag enclosed in angle brackets ANSWER: d RATIONALE: HTML provides tags to import objects stored in files—such as photos, graphics, audio, and movies—into a Web page. All HTML tags are enclosed in a set of angle brackets (< and >), such as <h2>. The closing tag has a forward slash in it, such as </b> for closing bold. FEEDBACK: a. HTML provides tags to import objects stored in files—such as photos, graphics, audio, and movies—into a Web page. All HTML tags are enclosed in a set of angle brackets. b. HTML provides tags to import objects stored in files—such as photos, graphics, audio, and movies—into a Web page. All HTML tags are enclosed in a set of angle brackets. c. HTML provides tags to import objects stored in files—such as photos, graphics, audio, and movies—into a Web page. All HTML tags are enclosed in a set of angle brackets. d. HTML provides tags to import objects stored in files—such as photos, graphics, audio, and movies—into a Web page. All HTML tags are enclosed in a set of angle brackets.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Client/Server Architecture QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.7 - Identify three commonly used client-side programming languages and three commonly used server-side programming languages. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 48


Chapter 07 - Networks: An Interconnected World DATE CREATED: DATE MODIFIED:

3/6/2020 5:53 PM 3/7/2020 1:32 PM

75. Preston wants to build some HTML and image files promoting his business and place them on a Web server. He wants to _____. a. create a Web site b. interconnect Web services c. design a Web browser d. develop a Web 2.0 application ANSWER: a RATIONALE: If you need to create a Web site, you have many options. You can hire someone to design and build it, or you can do it yourself. After you create Web pages, your next step is to place or publish the content on a Web server. FEEDBACK: a. If you need to create a Web site, you have many options. You can hire someone to design and build it, or you can do it yourself. After you create Web pages, your next step is to place or publish the content on a Web server. b. If you need to create a Web site, you have many options. You can hire someone to design and build it, or you can do it yourself. After you create Web pages, your next step is to place or publish the content on a Web server. c. If you need to create a Web site, you have many options. You can hire someone to design and build it, or you can do it yourself. After you create Web pages, your next step is to place or publish the content on a Web server. d. If you need to create a Web site, you have many options. You can hire someone to design and build it, or you can do it yourself. After you create Web pages, your next step is to place or publish the content on a Web server.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Developing Web Content and Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.8 - Outline the process and tools used in developing Web content and applications. KEYWORDS: Bloom's: Remember DATE CREATED: 3/7/2020 1:35 PM DATE MODIFIED: 3/7/2020 1:50 PM 76. Hannah needs to create a Web site to advertise her catering services. Which of the following statements is FALSE? a. Hannah can hire someone to design and build her Web site for her. b. If Hannah knows how, she can code her site using a plain text editor. c. Hannah must set up a server computer before publishing her Web site. d. Hannah can purchase and use specialized software to create her site. ANSWER: c RATIONALE: If you need to create a Web site, you have many options. You can hire someone to design and build it, or you can do it yourself. If you do it yourself, you can use an online service to create the Web pages, use a Web page creation software tool, or use a plain text editor to create the site. FEEDBACK: a. You can hire someone to design and build a Web site, or you can do it yourself. If Copyright Cengage Learning. Powered by Cognero.

Page 49


Chapter 07 - Networks: An Interconnected World you do it yourself, you can use an online service to create the Web pages, use a Web page creation software tool, or use a plain text editor to create the site. b. You can hire someone to design and build a Web site, or you can do it yourself. If you do it yourself, you can use an online service to create the Web pages, use a Web page creation software tool, or use a plain text editor to create the site. c. You can hire someone to design and build a Web site, or you can do it yourself. If you do it yourself, you can use an online service to create the Web pages, use a Web page creation software tool, or use a plain text editor to create the site. d. You can hire someone to design and build a Web site, or you can do it yourself. If you do it yourself, you can use an online service to create the Web pages, use a Web page creation software tool, or use a plain text editor to create the site.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Developing Web Content and Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.8 - Outline the process and tools used in developing Web content and applications. KEYWORDS: Bloom's: Remember DATE CREATED: 3/7/2020 1:40 PM DATE MODIFIED: 3/7/2020 2:00 PM 77. Which of the following is a popular tool for creating Web pages and managing Web sites? a. ASP.NET b. Nvu c. ColdFusion d. JavaServer Pages ANSWER: b RATIONALE: Popular tools for creating Web pages and managing Web sites include Adobe Dreamweaver, RapidWeaver (for Mac developers), and Nvu (pronounced n-view). FEEDBACK: a. Popular tools for creating Web pages and managing Web sites include Adobe Dreamweaver, RapidWeaver (for Mac developers), and Nvu (pronounced nview). b. Popular tools for creating Web pages and managing Web sites include Adobe Dreamweaver, RapidWeaver (for Mac developers), and Nvu (pronounced nview). c. Popular tools for creating Web pages and managing Web sites include Adobe Dreamweaver, RapidWeaver (for Mac developers), and Nvu (pronounced nview). d. Popular tools for creating Web pages and managing Web sites include Adobe Dreamweaver, RapidWeaver (for Mac developers), and Nvu (pronounced nview).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Developing Web Content and Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.8 - Outline the process and tools used in developing Web content and Copyright Cengage Learning. Powered by Cognero.

Page 50


Chapter 07 - Networks: An Interconnected World KEYWORDS: DATE CREATED: DATE MODIFIED:

applications. Bloom's: Remember 3/7/2020 1:40 PM 3/7/2020 2:03 PM

78. Popular tools for creating Web pages and managing Web sites _____. a. resemble relational database applications b. do not allow users to work directly in HTML c. can auto-generate code for Web pages d. require users to manually manage hyperlinks ANSWER: c RATIONALE: Today’s Web development applications allow developers to create Web sites using software that resembles a word processor. The software includes features that allow the developer to work directly with the HTML code or to use auto-generated code. Web development software also helps the designer keep track of all files in a Web site and the hyperlinks that connect them. FEEDBACK: a. Today's Web development software includes features that allow the developer to work directly with the HTML code or to use auto-generated code. b. Today's Web development software includes features that allow the developer to work directly with the HTML code or to use auto-generated code. c. Today's Web development software includes features that allow the developer to work directly with the HTML code or to use auto-generated code. d. Today's Web development software includes features that allow the developer to work directly with the HTML code or to use auto-generated code.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Developing Web Content and Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.8 - Outline the process and tools used in developing Web content and applications. KEYWORDS: Bloom's: Remember DATE CREATED: 3/7/2020 1:40 PM DATE MODIFIED: 3/7/2020 2:08 PM 79. Matthew is a developer who uses a combination of programming languages to create and run programs for the Web. He has access to a rich library of code for building XML Web applications, which he often finds helpful. Matthew develops Web services using _____. a. Adobe Dreamweaver b. the NOS platform c. the .NET platform d. RapidWeaver ANSWER: c RATIONALE: Many products make it easy to develop Web content and interconnect Web services, as discussed in the next section. Microsoft, for example, provides a development and Web services platform called .NET, which allows developers to use various programming languages to create and run programs, including those for the Web. The .NET platform also Copyright Cengage Learning. Powered by Cognero.

Page 51


Chapter 07 - Networks: An Interconnected World includes a rich library of programming code to help build XML Web applications. FEEDBACK:

a. Microsoft provides a development and Web services platform called .NET, which allows developers to use various programming languages to create and run programs, including those for the Web. The .NET platform also includes a rich library of programming code to help build XML Web applications. b. Microsoft provides a development and Web services platform called .NET, which allows developers to use various programming languages to create and run programs, including those for the Web. The .NET platform also includes a rich library of programming code to help build XML Web applications. c. Microsoft provides a development and Web services platform called .NET, which allows developers to use various programming languages to create and run programs, including those for the Web. The .NET platform also includes a rich library of programming code to help build XML Web applications. d. Microsoft provides a development and Web services platform called .NET, which allows developers to use various programming languages to create and run programs, including those for the Web. The .NET platform also includes a rich library of programming code to help build XML Web applications.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Developing Web Content and Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.8 - Outline the process and tools used in developing Web content and applications. KEYWORDS: Bloom's: Remember DATE CREATED: 3/7/2020 1:40 PM DATE MODIFIED: 3/7/2020 2:15 PM 80. What are the popular avenues for publishing a Web site once it has been built? a. Nvu, Adobe ColdFusion, and RapidWeaver b. ASP.NET, Dreamweaver, and JavaServer Pages c. online services, software tools, and plain text editors d. ISPs, free sites, and Web hosting services ANSWER: d RATIONALE: After you create Web pages, your next step is to place or publish the content on a Web server. Popular publishing options include using ISPs, free sites, and Web hosting services. FEEDBACK: a. Popular publishing options include using ISPs, free sites, and Web hosting services.

b. Popular publishing options include using ISPs, free sites, and Web hosting services. c. Popular publishing options include using ISPs, free sites, and Web hosting services. d. Popular publishing options include using ISPs, free sites, and Web hosting services.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Developing Web Content and Applications Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 52


Chapter 07 - Networks: An Interconnected World HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.8 - Outline the process and tools used in developing Web content and applications. KEYWORDS: Bloom's: Remember DATE CREATED: 3/7/2020 1:40 PM DATE MODIFIED: 3/7/2020 2:21 PM 81. Phil is preparing to publish a Web site he just created and researches his options. He learns that _____. a. Web hosts typically charge $5 or less per month b. some Web hosts offer domain name registration services c. storage space is available from Web hosts but not ISPs d. free Web sites never require users to view advertising ANSWER: b RATIONALE: Web hosting services provide space on their Web servers for people and businesses that don’t have the financial resources, time, or skills to host their own Web sites. A Web host can charge $15 or more per month, depending on services. Some Web hosting sites include domain name registration, Web authoring software, activity reporting, and Web site monitoring. Some ISPs also provide limited storage space, typically 1 to 6 megabytes, as part of their monthly fee. If more disk space is needed, additional fees are charged. Free sites offer limited space for a Web site. In return, free sites often require the user to view advertising or agree to other terms and conditions. FEEDBACK: a. Some Web hosting sites include domain name registration, Web authoring software, activity reporting, and Web site monitoring. b. Some Web hosting sites include domain name registration, Web authoring software, activity reporting, and Web site monitoring. c. Some Web hosting sites include domain name registration, Web authoring software, activity reporting, and Web site monitoring. d. Some Web hosting sites include domain name registration, Web authoring software, activity reporting, and Web site monitoring.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Developing Web Content and Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.8 - Outline the process and tools used in developing Web content and applications. KEYWORDS: Bloom's: Remember DATE CREATED: 3/7/2020 1:40 PM DATE MODIFIED: 3/7/2020 2:42 PM 82. When a Web developer combines two or more Web applications into a new service, such as displaying the origin location of a Twitter post using Google Maps or overlaying Flickr photos of geographic locations within Google Maps, this is known as _____. a. a mashup b. social media c. SEO d. a switch Copyright Cengage Learning. Powered by Cognero.

Page 53


Chapter 07 - Networks: An Interconnected World ANSWER: RATIONALE:

a Some Web developers are creating programs and procedures to combine two or more Web applications into a new service, called a mashup—named after the process of mixing two or more hip-hop songs into one song. Map applications such as Google Maps provide tool kits that allow them to be combined with other Web applications. For example, Google Maps can be used with Twitter to display the location where various tweets were posted. Likewise, Google Maps combined with Flickr can overlay photos of specific geographic locations.

FEEDBACK:

a. Some Web developers are creating programs and procedures to combine two or

more Web applications into a new service, called a mashup. Google Maps can be used with Twitter to display the location where various tweets were posted. Likewise, Google Maps combined with Flickr can overlay photos of specific geographic locations. b. Some Web developers are creating programs and procedures to combine two or more Web applications into a new service, called a mashup. Google Maps can be used with Twitter to display the location where various tweets were posted. Likewise, Google Maps combined with Flickr can overlay photos of specific geographic locations. c. Some Web developers are creating programs and procedures to combine two or more Web applications into a new service, called a mashup. Google Maps can be used with Twitter to display the location where various tweets were posted. Likewise, Google Maps combined with Flickr can overlay photos of specific geographic locations. d. Some Web developers are creating programs and procedures to combine two or more Web applications into a new service, called a mashup. Google Maps can be used with Twitter to display the location where various tweets were posted. Likewise, Google Maps combined with Flickr can overlay photos of specific geographic locations.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Developing Web Content and Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.8 - Outline the process and tools used in developing Web content and applications. KEYWORDS: Bloom's: Remember DATE CREATED: 3/7/2020 2:42 PM DATE MODIFIED: 3/7/2020 2:49 PM 83. WebEx and GoToMeeting are Internet applications designed to support _____. a. instant messaging and microblogging b. real-time conferencing and presentations c. online education and training d. job seeking and employee recruiting ANSWER: b RATIONALE: Some Internet technologies support real-time online conferencing. Participants dial into a common phone number to share a multiparty phone conversation and, in many cases, live video of the participants. The Internet has made it possible for those involved in teleconferences to share computer desktops. Using services such as WebEx or GoToMeeting, conference participants log on to common software that allows them to broadcast their computer display to the group. This ability is quite useful for presenting with PowerPoint, Copyright Cengage Learning. Powered by Cognero.

Page 54


Chapter 07 - Networks: An Interconnected World demonstrating software, training, or collaborating on documents. Participants verbally communicate by phone or PC microphone. FEEDBACK:

a. Using services such as WebEx or GoToMeeting, conference participants log on to common software that allows them to broadcast their computer display to the group. This ability is quite useful for presenting with PowerPoint, demonstrating software, training, or collaborating on documents. b. Using services such as WebEx or GoToMeeting, conference participants log on to common software that allows them to broadcast their computer display to the group. This ability is quite useful for presenting with PowerPoint, demonstrating software, training, or collaborating on documents. c. Using services such as WebEx or GoToMeeting, conference participants log on to common software that allows them to broadcast their computer display to the group. This ability is quite useful for presenting with PowerPoint, demonstrating software, training, or collaborating on documents. d. Using services such as WebEx or GoToMeeting, conference participants log on to common software that allows them to broadcast their computer display to the group. This ability is quite useful for presenting with PowerPoint, demonstrating software, training, or collaborating on documents.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Internet and Web Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.9 - Describe five common Internet and Web applications. KEYWORDS: Bloom's: Remember DATE CREATED: 3/7/2020 2:51 PM DATE MODIFIED: 3/7/2020 3:03 PM 84. An internal corporate network built using Internet and World Wide Web standards and products is known as a(n) _____. a. mesh network b. local area network c. extranet d. intranet ANSWER: d RATIONALE: An intranet is an internal corporate network built using Internet and World Wide Web standards and products. Employees of an organization can use an intranet to gain access to corporate information. FEEDBACK: a. An intranet is an internal corporate network built using Internet and World Wide Web standards and products. b. An intranet is an internal corporate network built using Internet and World Wide Web standards and products. c. An intranet is an internal corporate network built using Internet and World Wide Web standards and products. d. An intranet is an internal corporate network built using Internet and World Wide Web standards and products.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 55


Chapter 07 - Networks: An Interconnected World REFERENCES: Intranets and Extranets QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.10 - Explain how intranets and extranets use Internet technologies. KEYWORDS: Bloom's: Remember DATE CREATED: 3/7/2020 3:06 PM DATE MODIFIED: 3/8/2020 7:58 AM 85. Joan's organization has just set up a corporate intranet. In order to use the intranet effectively, most likely Joan _____. a. can rely on her familiarity with Internet technology b. will need to attend a series of training sessions c. should become familiar with client/server architecture d. will access her organization's social media profiles ANSWER: a RATIONALE: An intranet is an internal corporate network built using Internet and World Wide Web standards and products. These private networks use the infrastructure and standards of the Internet and the World Wide Web. Using an intranet offers one considerable advantage: many people are already familiar with Internet technology, so they need little training to make effective use of their corporate intranet. FEEDBACK: a. Using an intranet offers one considerable advantage: many people are already familiar with Internet technology, so they need little training to make effective use of their corporate intranet. b. Using an intranet offers one considerable advantage: many people are already familiar with Internet technology, so they need little training to make effective use of their corporate intranet. c. Using an intranet offers one considerable advantage: many people are already familiar with Internet technology, so they need little training to make effective use of their corporate intranet. d. Using an intranet offers one considerable advantage: many people are already familiar with Internet technology, so they need little training to make effective use of their corporate intranet.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Intranets and Extranets QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.10 - Explain how intranets and extranets use Internet technologies. KEYWORDS: Bloom's: Remember DATE CREATED: 3/7/2020 3:07 PM DATE MODIFIED: 3/8/2020 8:10 AM 86. Corporate intranets _____. a. allow all sorts of documents to be converted to electronic form for employee access b. are more expensive to implement than other forms of internal communication c. tend to increase the need for paper and associated costs within an organization d. are incompatible with most mobile devices because they utilize Web browsers ANSWER: a Copyright Cengage Learning. Powered by Cognero.

Page 56


Chapter 07 - Networks: An Interconnected World RATIONALE:

FEEDBACK:

An intranet is an inexpensive yet powerful alternative to other forms of internal communication, including conventional computer setups. One of intranet’s most obvious virtues is its ability to reduce the need for paper. Because Web browsers run on all types of computers, the same electronic information can be viewed by any employee. That means that all sorts of documents (such as internal phone books, procedure manuals, training manuals, and requisition forms) can be inexpensively converted to electronic form, posted online, and easily updated. An intranet provides employees with an easy and intuitive approach to accessing information that was previously difficult to obtain. For example, it is an ideal solution to providing information to a mobile salesforce that needs access to rapidly changing information. a. Because Web browsers run on all types of computers, the same electronic

information can be viewed by any employee. That means that all sorts of documents (such as internal phone books, procedure manuals, training manuals, and requisition forms) can be inexpensively converted to electronic form, posted online, and easily updated. b. Because Web browsers run on all types of computers, the same electronic information can be viewed by any employee. That means that all sorts of documents (such as internal phone books, procedure manuals, training manuals, and requisition forms) can be inexpensively converted to electronic form, posted online, and easily updated. c. Because Web browsers run on all types of computers, the same electronic information can be viewed by any employee. That means that all sorts of documents (such as internal phone books, procedure manuals, training manuals, and requisition forms) can be inexpensively converted to electronic form, posted online, and easily updated. d. Because Web browsers run on all types of computers, the same electronic information can be viewed by any employee. That means that all sorts of documents (such as internal phone books, procedure manuals, training manuals, and requisition forms) can be inexpensively converted to electronic form, posted online, and easily updated.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Intranets and Extranets QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.10 - Explain how intranets and extranets use Internet technologies. KEYWORDS: Bloom's: Remember DATE CREATED: 3/7/2020 3:08 PM DATE MODIFIED: 3/8/2020 8:16 AM 87. A network built using Web technologies that links selected resources of a company's internal corporate network with its suppliers, customers, or other business partners is called a(n) _____. a. intranet b. extranet c. local area network d. wide area network ANSWER: b RATIONALE: A growing number of companies offer limited network access to selected customers and suppliers. Such networks are referred to as extranets, which connect people who are external to the company. An extranet is a network built using Web technologies that links selected Copyright Cengage Learning. Powered by Cognero.

Page 57


Chapter 07 - Networks: An Interconnected World resources of the intranet of a company with its customers, suppliers, or other business partners. FEEDBACK:

a. An extranet is a network built using Web technologies that links selected

resources of the intranet of a company with its customers, suppliers, or other business partners. b. An extranet is a network built using Web technologies that links selected resources of the intranet of a company with its customers, suppliers, or other business partners. c. An extranet is a network built using Web technologies that links selected resources of the intranet of a company with its customers, suppliers, or other business partners. d. An extranet is a network built using Web technologies that links selected resources of the intranet of a company with its customers, suppliers, or other business partners.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Intranets and Extranets QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.10 - Explain how intranets and extranets use Internet technologies. KEYWORDS: Bloom's: Remember DATE CREATED: 3/7/2020 3:08 PM DATE MODIFIED: 3/8/2020 8:20 AM 88. George is in charge of ordering supplies for his employer, and he usually buys these supplies from the same vendors. One of the vendors, Business Office Supplies, has given George limited access to their inventory system. Now George can check whether this vendor has items in stock without contacting a salesperson by using _____. a. content streaming b. an intranet c. an extranet d. SEO ANSWER: c RATIONALE: A growing number of companies offer limited network access to selected customers and suppliers. Such networks are referred to as extranets, which connect people who are external to the company. An extranet is a network built using Web technologies that links selected resources of the intranet of a company with its customers, suppliers, or other business partners. FEEDBACK: a. A growing number of companies offer limited network access to selected customers and suppliers. Such networks are referred to as extranets, which connect people who are external to the company. b. A growing number of companies offer limited network access to selected customers and suppliers. Such networks are referred to as extranets, which connect people who are external to the company. c. A growing number of companies offer limited network access to selected customers and suppliers. Such networks are referred to as extranets, which connect people who are external to the company. d. A growing number of companies offer limited network access to selected customers and suppliers. Such networks are referred to as extranets, which connect people who are external to the company.

Copyright Cengage Learning. Powered by Cognero.

Page 58


Chapter 07 - Networks: An Interconnected World POINTS: 1 DIFFICULTY: Easy REFERENCES: Intranets and Extranets QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.10 - Explain how intranets and extranets use Internet technologies. KEYWORDS: Bloom's: Remember DATE CREATED: 3/7/2020 3:08 PM DATE MODIFIED: 3/8/2020 8:25 AM 89. Which of the following factors is the same for an organization's intranet and extranet? a. users b. security concerns c. performance needs d. infrastructure ANSWER: d RATIONALE: A growing number of companies offer limited network access to selected customers and suppliers. Such networks are referred to as extranets, which connect people who are external to the company. An extranet is a network built using Web technologies that links selected resources of the intranet of a company with its customers, suppliers, or other business partners. The intranet, in turn, uses the infrastructure and standards of the Internet and the World Wide Web. Security and performance concerns are different for an extranet than for a Web site or network-based intranet. User authentication and privacy are critical on an extranet so that information is protected. Obviously, the network must also be reliable and provide quick response to customers and suppliers. FEEDBACK: a. An extranet is a network built using Web technologies that links selected resources of the intranet of a company with its customers, suppliers, or other business partners. The intranet, in turn, uses the infrastructure and standards of the Internet and the World Wide Web. b. An extranet is a network built using Web technologies that links selected resources of the intranet of a company with its customers, suppliers, or other business partners. The intranet, in turn, uses the infrastructure and standards of the Internet and the World Wide Web. c. An extranet is a network built using Web technologies that links selected resources of the intranet of a company with its customers, suppliers, or other business partners. The intranet, in turn, uses the infrastructure and standards of the Internet and the World Wide Web. d. An extranet is a network built using Web technologies that links selected resources of the intranet of a company with its customers, suppliers, or other business partners. The intranet, in turn, uses the infrastructure and standards of the Internet and the World Wide Web.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Intranets and Extranets QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.10 - Explain how intranets and extranets use Internet technologies. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 59


Chapter 07 - Networks: An Interconnected World DATE CREATED: DATE MODIFIED:

3/7/2020 3:08 PM 3/9/2020 4:00 PM

90. As Frida is using a company database application, her computer transfers information securely by encapsulating traffic in IP packets and sending them over the Internet. Frida _____. a. is using a public network built with Web technologies b. is likely logged in to her company's intranet c. probably does not require VPN access for this task d. probably can only view, not modify, database information ANSWER: b RATIONALE: Secure intranet and extranet access applications usually require the use of a virtual private network (VPN), a secure connection between two points on the Internet. VPNs transfer information by encapsulating traffic in IP packets and sending the packets over the Internet, a practice called tunneling. Most VPNs are built and run by ISPs. Companies that use a VPN from an ISP have essentially outsourced their networks to save money on wide area network equipment and personnel. To limit access to the VPN to just individuals authorized to use it, authorized users may be issued a logon ID and a security token assigned to that logon ID. FEEDBACK: a. Secure intranet and extranet access applications usually require the use of a virtual private network (VPN), a secure connection between two points on the Internet. VPNs transfer information by encapsulating traffic in IP packets and sending the packets over the Internet, a practice called tunneling. b. Secure intranet and extranet access applications usually require the use of a virtual private network (VPN), a secure connection between two points on the Internet. VPNs transfer information by encapsulating traffic in IP packets and sending the packets over the Internet, a practice called tunneling. c. Secure intranet and extranet access applications usually require the use of a virtual private network (VPN), a secure connection between two points on the Internet. VPNs transfer information by encapsulating traffic in IP packets and sending the packets over the Internet, a practice called tunneling. d. Secure intranet and extranet access applications usually require the use of a virtual private network (VPN), a secure connection between two points on the Internet. VPNs transfer information by encapsulating traffic in IP packets and sending the packets over the Internet, a practice called tunneling.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Intranets and Extranets QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.7.10 - Explain how intranets and extranets use Internet technologies. KEYWORDS: Bloom's: Remember DATE CREATED: 3/7/2020 3:08 PM DATE MODIFIED: 3/9/2020 4:17 PM Essay 91. Briefly explain the passing of packets over the Internet. ANSWER: The Internet works by breaking messages into packets of data that are routed through the network until they reach their desired destination. The Transmission Control Protocol/Internet Protocol (TCP/IP) is a collection of communication protocols used to Copyright Cengage Learning. Powered by Cognero.

Page 60


Chapter 07 - Networks: An Interconnected World

RATIONALE:

POINTS: RUBRIC:

interconnect network devices on a packet switching network such as the Internet. TCP defines how applications can create channels of communication across a network. TCP also manages how a message is assembled into smaller packets before they are then transmitted over the Internet and reassembled in the proper sequence at the destination address. IP specifies how to address and route each packet to make sure it reaches the desired destination. A network following these standards can link to the Internet’s backbone and become part of the worldwide Internet community. The Internet works by breaking messages into packets of data that are routed through the network until they reach their desired destination. The Transmission Control Protocol/Internet Protocol (TCP/IP) is a collection of communication protocols used to interconnect network devices on a packet switching network such as the Internet. TCP defines how applications can create channels of communication across a network. TCP also manages how a message is assembled into smaller packets before they are then transmitted over the Internet and reassembled in the proper sequence at the destination address. IP specifies how to address and route each packet to make sure it reaches the desired destination. A network following these standards can link to the Internet’s backbone and become part of the worldwide Internet community. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Describes how packets are handled following TCP/IP

DIFFICULTY: Moderate REFERENCES: How the Internet Works QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.7.4 - Describe how the Internet works, including the roles of the Internet backbone, TCP/IP protocol, IP address, switches, and routers. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:50 PM DATE MODIFIED: 3/4/2020 9:51 AM 92. Describe the mandatory and common optional parts of a domain name. ANSWER: Domain names always have at least two parts, with each part separated by a dot (period). For some Internet addresses, the far-right part of the domain name is the country code, such as au for Australia, ca for Canada, dk for Denmark, fr for France, de (Deutschland) for Germany, and jp for Japan.. Many Internet addresses have a code denoting affiliation categories, such as com for business sites and edu for education sites. The far-left part of the domain name identifies the host network or host provider, which might be the name of a university or business. RATIONALE: Domain names always have at least two parts, with each part separated by a dot (period). For some Internet addresses, the far-right part of the domain name is the country code, such as au for Australia, ca for Canada, dk for Denmark, fr for France, de (Deutschland) for Germany, and jp for Japan.. Many Internet addresses have a code denoting affiliation categories, such as com for business sites and edu for education sites. The far-left part of the domain name Copyright Cengage Learning. Powered by Cognero.

Page 61


Chapter 07 - Networks: An Interconnected World

POINTS: RUBRIC:

identifies the host network or host provider, which might be the name of a university or business. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Describes the parts of a domain name

DIFFICULTY: Moderate REFERENCES: Client/Server Architecture QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.7.5 - Describe how the Web works, including the roles of the client/server architecture, Domain Name System, URL, hyperlinks, Web browser, HTML, XML, and CSS. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:50 PM DATE MODIFIED: 3/4/2020 9:59 AM 93. Briefly describe how a Wi-Fi network operates. ANSWER: In a Wi-Fi wireless network, the user’s computer, smartphone, or other mobile device has a wireless adapter that translates data into a radio signal and transmits it using an antenna. A wireless access point, which consists of a transmitter with an antenna, receives the signal and decodes it. The access point then sends the information to the Internet over a wired connection. When receiving data, the wireless access point takes the information from the Internet, translates it into a radio signal, and sends it to the device’s wireless adapter. RATIONALE: In a Wi-Fi wireless network, the user’s computer, smartphone, or other mobile device has a wireless adapter that translates data into a radio signal and transmits it using an antenna. A wireless access point, which consists of a transmitter with an antenna, receives the signal and decodes it. The access point then sends the information to the Internet over a wired connection. When receiving data, the wireless access point takes the information from the Internet, translates it into a radio signal, and sends it to the device’s wireless adapter. POINTS: 1 RUBRIC: 0 1 2 3 4 Criteria

Failure

Below Expectations

Developing

Competent

Mastery

Describes how a Wi-Fi network operates

DIFFICULTY: Moderate REFERENCES: Communications Media QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.7.1 - Describe three network topologies and four network types in common use Copyright Cengage Learning. Powered by Cognero.

Page 62


Chapter 07 - Networks: An Interconnected World NATIONAL STANDARDS: KEYWORDS: DATE CREATED: DATE MODIFIED:

today. United States - BUSPROG: Legal - Legal Bloom's: Understand 11/19/2019 5:50 PM 3/4/2020 10:02 AM

94. Explain the purposes of server-side and client-side programming in the context of client/server architecture. ANSWER: Client/server architecture is a networking approach wherein many clients (end-user computing devices) request and receive services from servers (host computers) on the network. Servers receive client user requests, process them, and obtain the requested data. This may require queries to a database and encoding the data into the HTML format. The client computers provide an interface to allow the client computer user to request services of the server computers. The client computers also display the results (Web pages) that the servers return.

RATIONALE:

POINTS: RUBRIC:

Server-side programming creates a program that runs on the server and deals with generation of the content of a Web page to satisfy the client’s request. The Web site uses server-side programming to dynamically display different data as needed. The data is pulled from a database stored on the server and sent to the client to be displayed by client-side code. Server-side programming enables Web site designers to customize Web site content for individual users. Client/server architecture is a networking approach wherein many clients (end-user computing devices) request and receive services from servers (host computers) on the network. Servers receive client user requests, process them, and obtain the requested data. This may require queries to a database and encoding the data into the HTML format. The client computers provide an interface to allow the client computer user to request services of the server computers. The client computers also display the results (Web pages) that the servers return. Server-side programming creates a program that runs on the server and deals with generation of the content of a Web page to satisfy the client’s request. The Web site uses server-side programming to dynamically display different data as needed. The data is pulled from a database stored on the server and sent to the client to be displayed by client-side code. Server-side programming enables Web site designers to customize Web site content for individual users. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Explains the purpose of serverside programming Explains the purpose of clientside programming

DIFFICULTY: Easy REFERENCES: Client/Server Architecture QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic Copyright Cengage Learning. Powered by Cognero.

Page 63


Chapter 07 - Networks: An Interconnected World LEARNING OBJECTIVES: POIS.14e.7.6 - State the purpose of client-side and server-side programming. KEYWORDS: Bloom's: Remember DATE CREATED: 3/6/2020 5:40 PM DATE MODIFIED: 3/6/2020 5:42 PM 95. Describe an intranet, including how it is built. How does it compare with an extranet? ANSWER: An intranet is an internal corporate network built using Internet and World Wide Web standards and products. Employees of an organization can use an intranet to gain access to corporate information.These private networks use the infrastructure and standards of the Internet and the World Wide Web. An intranet is an inexpensive yet powerful alternative to other forms of internal communication, including conventional computer setups.

RATIONALE:

POINTS: RUBRIC:

A growing number of companies offer limited network access to selected customers and suppliers. Such networks are referred to as extranets, which connect people who are external to the company. An extranet is a network built using Web technologies that links selected resources of the intranet of a company with its customers, suppliers, or other business partners. Security and performance concerns are different for an extranet than for a Web site or network-based intranet. User authentication and privacy are critical on an extranet so that information is protected. Obviously, the network must also be reliable and provide quick response to customers and suppliers. An intranet is an internal corporate network built using Internet and World Wide Web standards and products. Employees of an organization can use an intranet to gain access to corporate information. These private networks use the infrastructure and standards of the Internet and the World Wide Web. An intranet is an inexpensive yet powerful alternative to other forms of internal communication, including conventional computer setups. A growing number of companies offer limited network access to selected customers and suppliers. Such networks are referred to as extranets, which connect people who are external to the company. An extranet is a network built using Web technologies that links selected resources of the intranet of a company with its customers, suppliers, or other business partners. Security and performance concerns are different for an extranet than for a Web site or network-based intranet. User authentication and privacy are critical on an extranet so that information is protected. Obviously, the network must also be reliable and provide quick response to customers and suppliers. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Briefly describes intranets and extranets Compares intranets with extranets

DIFFICULTY: Easy REFERENCES: Intranets and Extranets QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.7.10 - Explain how intranets and extranets use Internet technologies. Copyright Cengage Learning. Powered by Cognero.

Page 64


Chapter 07 - Networks: An Interconnected World KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Understand 3/9/2020 4:19 PM 3/9/2020 4:25 PM

Copyright Cengage Learning. Powered by Cognero.

Page 65


Chapter 08 - Cloud Computing and the Internet of Things True / False 1. Sensors that can monitor and report data about traffic and parking conditions via the Internet are part of a network of physical objects known as the Internet of Technology. a. True b. False ANSWER: False RATIONALE: The Internet of Things (IoT) is a network of physical objects or “things” embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer of the device, device operators, and other connected devices. FEEDBACK: Correct The Internet of Things (IoT) is a network of physical objects or “things” embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer of the device, device operators, and other connected devices. Incorrect The Internet of Things (IoT) is a network of physical objects or “things” embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer of the device, device operators, and other connected devices.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Internet of Things (IoT) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.5 - Define what is meant by the Internet of Things (IoT). NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:00 PM DATE MODIFIED: 6/26/2020 4:51 PM 2. Organizations that are concerned about the security of their data must investigate the cloud provider's processes and applications related to security fully before using public cloud computing. a. True b. False ANSWER: True RATIONALE: Data security is another key concern when using a public cloud computing service because you are relying on someone else to safeguard your data, which may even reside on the same storage device as data from another organization (perhaps even a competitor). All these potential issues must be investigated fully before entering into a public cloud computing arrangement. FEEDBACK: Correct Data security is another key concern when using a public cloud computing service because you are relying on someone else to safeguard your data, which may even reside on the same storage device as data from another organization (perhaps even a competitor). All these potential issues must be investigated fully before entering into a public cloud computing arrangement. Incorrect Data security is another key concern when using a public cloud computing service because you are relying on someone else to safeguard your data, which may even reside on the same storage device as data from another organization (perhaps even a competitor). All these potential issues must be investigated fully before Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 08 - Cloud Computing and the Internet of Things entering into a public cloud computing arrangement.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Public Cloud Computing QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.4 - Discuss the pros and cons of public, private, and hybrid cloud computing. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:00 PM DATE MODIFIED: 6/26/2020 5:01 PM 3. A manufacturing firm cannot benefit from implementing an IoT because the risk of hacking is far too high. a. True b. False ANSWER: False RATIONALE: Manufacturers can use IoT devices to monitor production equipment and minimize downtime by predicting failures and scheduling necessary preventative maintenance. IoT-enabled sensors on equipment, such as a conveyor line, can alert plant floor personnel to problems in real time. The data can also be analyzed to uncover patterns that allow technicians to predict potential failures or redeploy resources in a more optimal fashion. Organizations can also reduce energy costs by using IoT and smart building systems to monitor and control unnecessary usage of electrical systems. IoT devices can help manufacturers' sectors accurately assess demand and efficiently manage various stages of production through realtime tracking of parts and raw materials. FEEDBACK: Correct There is a significant hacking risk, but benefits as well. Manufacturers can use IoT devices to monitor production equipment and minimize downtime by predicting failures and scheduling necessary preventative maintenance. IoT devices can help manufacturers’ sectors accurately assess demand and efficiently manage various stages of production through real-time tracking of parts and raw materials. Incorrect There is a significant hacking risk, but benefits as well. Manufacturers can use IoT devices to monitor production equipment and minimize downtime by predicting failures and scheduling necessary preventative maintenance. IoT devices can help manufacturers’ sectors accurately assess demand and efficiently manage various stages of production through real-time tracking of parts and raw materials.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Business Benefits of IoT QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.6 - Discuss four applications of IoT and associated connected devices. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Understand DATE CREATED: 11/19/2019 6:00 PM DATE MODIFIED: 6/26/2020 5:18 PM 4. All forms of cloud computing begin with a deployment in which a cloud serve provider offers its cloud-based services Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 08 - Cloud Computing and the Internet of Things to the public. a. True b. False ANSWER: RATIONALE:

FEEDBACK:

False Cloud computing can be deployed in several different ways, including public cloud computing, private cloud computing, and hybrid cloud computing. Public cloud computing refers to a deployment in which a cloud service provider offers its cloud-based services to the public. In a private cloud deployment, cloud technology is used within the confines of a private network. Hybrid cloud computing combines elements of both public and private cloud computing, accessed through a private network. Correct

Cloud computing can be deployed in several different ways, including public cloud computing, private cloud computing, and hybrid cloud computing. Public cloud computing refers to a deployment in which a cloud service provider offers its cloudbased services to the public. Incorrect Cloud computing can be deployed in several different ways, including public cloud computing, private cloud computing, and hybrid cloud computing. Public cloud computing refers to a deployment in which a cloud service provider offers its cloudbased services to the public.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Cloud Computing QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.1 - Identify three commonly used approaches to cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 10:18 AM DATE MODIFIED: 6/27/2020 10:22 AM 5. An estimated 84 percent of enterprises now use cloud computing solutions involving multiple clouds, whereas less than 10 percent of large organizations employ just a single public cloud. a. True b. False ANSWER: True RATIONALE: According to Flexera’s 2019 State of the Cloud Report, an estimated 84 percent of enterprises now use multicloud solutions, and enterprises with a hybrid strategy combining public and private clouds grew to 58 percent in 2019. An estimated 91 percent use public cloud, 72 percent use hosted private cloud, and 69 percent using at least one public and one private cloud. Fewer than 10 percent of large organizations employ just a single public cloud, and only about 4 percent employ a single private cloud. FEEDBACK: Correct According to Flexera’s 2019 State of the Cloud Report, an estimated 84 percent of enterprises now use multicloud solutions. Fewer than 10 percent of large organizations employ just a single public cloud, and only about 4 percent employ a single private cloud. Incorrect According to Flexera’s 2019 State of the Cloud Report, an estimated 84 percent of enterprises now use multicloud solutions. Fewer than 10 percent of large organizations employ just a single public cloud, and only about 4 percent employ a single private cloud.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 08 - Cloud Computing and the Internet of Things REFERENCES: Hybrid Cloud Computing QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.1 - Identify three commonly used approaches to cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 10:23 AM DATE MODIFIED: 6/27/2020 10:31 AM 6. Like many other firms, Zulily, an online retailer, experienced both improved performance and increased costs after migrating several core business processes to a public cloud service platform. a. True b. False ANSWER: False RATIONALE: Seattle-based Zulily is an online retailer that sells clothing, toys, and home products. In 2018, the retailer moved several of its core business processes to Amazon’s public cloud service platform to enhance the online shopping experience of its more than six million active customers. By moving several of its production databases to the cloud, Zulily gained higher fault tolerance and improved performance—both of which are critical to the company’s ongoing success. The company is also saving thousands of dollars per month through cloud computing. FEEDBACK: Correct By moving several of its production databases to the cloud, Zulily gained higher fault tolerance and improved performance—both of which are critical to the company’s ongoing success. The company is also saving thousands of dollars per month through cloud computing. Incorrect By moving several of its production databases to the cloud, Zulily gained higher fault tolerance and improved performance—both of which are critical to the company’s ongoing success. The company is also saving thousands of dollars per month through cloud computing.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Public Cloud Computing QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.2 - Identify three key benefits associated with cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 10:33 AM DATE MODIFIED: 6/27/2020 10:38 AM 7. Because of the danger of vendor lock-in, organizations must choose a cloud provider wisely. a. True b. False ANSWER: True RATIONALE: A major start-up issue that organizations should also consider is the amount of effort involved in moving to the cloud in the first place. This introduces the issue of vendor lockin—meaning once an organization has gone through the effort required to transition its infrastructure and/or data to a public cloud provider, it will likely be very reluctant to go through the time-consuming migration process a second time, even if concerns arise with the Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 08 - Cloud Computing and the Internet of Things vendor they are working with. Because of this, organizations must choose their cloud provider wisely, as it is a business relationship that the organization will likely need to live with for the foreseeable future. FEEDBACK:

Correct

The amount of effort involved in moving to the cloud in the first place introduces the issue of vendor lock-in—meaning once an organization has gone through the effort required to transition its infrastructure and/or data to a public cloud provider, it will likely be very reluctant to go through the time-consuming migration process a second time. Because of this, organizations must choose their cloud provider wisely. Incorrect The amount of effort involved in moving to the cloud in the first place introduces the issue of vendor lock-in—meaning once an organization has gone through the effort required to transition its infrastructure and/or data to a public cloud provider, it will likely be very reluctant to go through the time-consuming migration process a second time. Because of this, organizations must choose their cloud provider wisely.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Public Cloud Computing QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.3 - Summarize four common issues organizations encounter when moving to public cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 10:42 AM DATE MODIFIED: 6/27/2020 10:45 AM 8. 4G technology, introduced in 2011, provides data transfer speeds of 1-10 Gbps and thus permits fast data transfer, minimal latency, and the ability to connect many IoT devices. a. True b. False ANSWER: False RATIONALE: 5G (not 4G) technology, introduced in 2020 (not 2011), provides data transfer speeds of 1-10 Gbps and thus permits fast data transfer, minimal latency, and the ability to connect many IoT devices. FEEDBACK: Correct 5G (not 4G) technology, introduced in 2020 (not 2011), provides data transfer speeds of 1-10 Gbps and thus permits fast data transfer, minimal latency, and the ability to connect many IoT devices. Incorrect 5G (not 4G) technology, introduced in 2020 (not 2011), provides data transfer speeds of 1-10 Gbps and thus permits fast data transfer, minimal latency, and the ability to connect many IoT devices.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Enabling Connectivity with 5G QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.7 - Describe how 5G networks will transform developments with IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 10:50 AM Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 08 - Cloud Computing and the Internet of Things DATE MODIFIED:

6/27/2020 10:52 AM

9. In the utilities industry, IoT sensors are used extensively to capture operational data and help the utility provider achieve 24/7 uptime. a. True b. False ANSWER: True RATIONALE: IoT applications can be used to improve customer service and experience. For example, IoT sensors are used extensively in the utilities industry to capture operational data to achieve 24/7 uptime. FEEDBACK: Correct IoT sensors are used extensively in the utilities industry to capture operational data to achieve 24/7 uptime. Incorrect IoT sensors are used extensively in the utilities industry to capture operational data to achieve 24/7 uptime.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Business Benefits of IoT QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.8 - Identify four benefits associated with the IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 10:54 AM DATE MODIFIED: 6/27/2020 10:58 AM 10. IoT applications can be classified into four groups based on two key qualities: their degree of sensing and degree of action. a. True b. False ANSWER: True RATIONALE: IoT applications can be classified into one of four types—connect and monitor; control and react; predict and adapt; and transform and explore—as shown in Table 8.2. Table 8.2 simply describes the degree of sensing and degree of action for each of the four categories. FEEDBACK: Correct IoT applications can be classified into one of four types—connect and monitor; control and react; predict and adapt; and transform and explore—based on their degree of sensing and degree of action. Incorrect IoT applications can be classified into one of four types—connect and monitor; control and react; predict and adapt; and transform and explore—based on their degree of sensing and degree of action.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Types of IoT Applications QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.9 - State the degree of sensing and the degree of action associated with four types of IoT applications. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 08 - Cloud Computing and the Internet of Things DATE CREATED: DATE MODIFIED:

6/27/2020 11:00 AM 6/27/2020 11:04 AM

11. Security is not a significant concern for developers of IoT applications because of the limited scope of the private data these applications handle. a. True b. False ANSWER: False RATIONALE: Security is a very major issue with IoT applications. Thus, one of the first things developers of IoT application should focus on is building in security from the start. FEEDBACK: Correct Security is a very major issue with IoT applications. Thus, one of the first things developers of IoT application should focus on is building in security from the start. Incorrect Security is a very major issue with IoT applications. Thus, one of the first things developers of IoT application should focus on is building in security from the start.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Potential Issues with IoT Applications QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.10 - Identify two potential issues associated with the expansion of the IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 11:05 AM DATE MODIFIED: 6/27/2020 11:09 AM 12. Hackers who succeed in accessing an organization's IoT may be able to cause physical damage to that organization's equipment. a. True b. False ANSWER: False RATIONALE: Hackers who gain access to an organization’s IoT can wreck physical havoc by tampering with critical infrastructure such as air traffic control systems, health care devices, power grids, and supervisory control and data acquisition (SCADA) systems. FEEDBACK: Correct Hackers who gain access to an organization’s IoT can wreck physical havoc by tampering with critical infrastructure such as air traffic control systems, health care devices, power grids, and supervisory control and data acquisition (SCADA) systems. Incorrect Hackers who gain access to an organization’s IoT can wreck physical havoc by tampering with critical infrastructure such as air traffic control systems, health care devices, power grids, and supervisory control and data acquisition (SCADA) systems.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Potential Issues with IoT Applications QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.10 - Identify two potential issues associated with the expansion of the IoT. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 08 - Cloud Computing and the Internet of Things DATE CREATED: DATE MODIFIED:

6/27/2020 11:12 AM 6/27/2020 11:16 AM

13. Redundancy in data center hardware and file storage locations is a common problem for businesses who decide to implement cloud computing. a. True b. False ANSWER: False RATIONALE: Public cloud computing offers three key benefits to organizations—reduced costs, flexible computing capacity, and increased redundancy in the event of disaster. Public cloud service providers operate multiple data centers distributed geographically. They also save multiple copies of tenants’ data on different machines. This redundancy ensures that the tenants’ information and the service provider’s processing power remain available with minimal interruption. FEEDBACK: Correct Public cloud service providers operate multiple data centers distributed geographically. They also save multiple copies of tenants’ data on different machines. This redundancy ensures that the tenants’ information and the service provider’s processing power remain available with minimal interruption. Incorrect Public cloud service providers operate multiple data centers distributed geographically. They also save multiple copies of tenants’ data on different machines. This redundancy ensures that the tenants’ information and the service provider’s processing power remain available with minimal interruption.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Public Cloud Computing QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.2 - Identify three key benefits associated with cloud computing. KEYWORDS: Bloom's: Understand DATE CREATED: 6/27/2020 11:19 AM DATE MODIFIED: 6/27/2020 11:23 AM 14. Because cloud computing arrangements have become so common, they are typically simple and straightforward from both the legal and pricing standpoints. a. True b. False ANSWER: False RATIONALE: Common problems with public cloud computing include complex pricing arrangements, wide variations in performance over time, inadequate data security, and vendor lock-in. Cloud computing arrangements can be lengthy and complex, and they are often subject to more than one interpretation. Organizations are advised to use experienced legal, purchasing, and IS resources to review and modify, where necessary, a cloud service provider’s standard contract. FEEDBACK: Correct Cloud computing arrangements can be lengthy and complex, and they are often subject to more than one interpretation. Organizations are advised to use experienced legal, purchasing, and IS resources to review and modify, where necessary, a cloud service provider’s standard contract. Incorrect Cloud computing arrangements can be lengthy and complex, and they are often Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 08 - Cloud Computing and the Internet of Things subject to more than one interpretation. Organizations are advised to use experienced legal, purchasing, and IS resources to review and modify, where necessary, a cloud service provider’s standard contract.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Public Cloud Computing QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.3 - Summarize four common issues organizations encounter when moving to public cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 11:26 AM DATE MODIFIED: 6/27/2020 11:29 AM 15. Devices that belong to the IoT network contain sensors that can detect something about the device's surroundings, such as pressure, temperature, or motion. a. True b. False ANSWER: True RATIONALE: The Internet of Things (IoT) is a network of physical objects or “things” embedded with sensors, processors, software, and network connectivity capability. A sensor is a device that is capable of sensing something about its surroundings, such as pressure, temperature, humidity, pH level, motion, vibration, or level of light. FEEDBACK: Correct The Internet of Things (IoT) is a network of physical objects or “things” embedded with sensors, processors, software, and network connectivity capability. A sensor is a device that is capable of sensing something about its surroundings, such as pressure, temperature, humidity, pH level, motion, vibration, or level of light. Incorrect The Internet of Things (IoT) is a network of physical objects or “things” embedded with sensors, processors, software, and network connectivity capability. A sensor is a device that is capable of sensing something about its surroundings, such as pressure, temperature, humidity, pH level, motion, vibration, or level of light.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Internet of Things (IoT) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.5 - Define what is meant by the Internet of Things (IoT). KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 11:39 AM DATE MODIFIED: 6/27/2020 11:42 AM Multiple Choice 16. _____ refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser. a. Grid computing b. Distributed computing c. Utility computing d. Cloud computing Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 08 - Cloud Computing and the Internet of Things ANSWER: RATIONALE:

d Cloud computing refers to a computing environment in which software and storage are provided as an Internet service and accessed by users with their Web browser.

FEEDBACK:

a. Cloud computing refers to a computing environment in which software and

storage are provided as an Internet service and accessed by users with their Web browser. b. Cloud computing refers to a computing environment in which software and storage are provided as an Internet service and accessed by users with their Web browser. c. Cloud computing refers to a computing environment in which software and storage are provided as an Internet service and accessed by users with their Web browser. d. Cloud computing refers to a computing environment in which software and storage are provided as an Internet service and accessed by users with their Web browser.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.1 - Identify three commonly used approaches to cloud computing. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:00 PM DATE MODIFIED: 6/27/2020 7:41 AM 17. If your home air conditioner has an IP address, it is part of the ____. a. satellite communication network b. virtual private network c. Internet of Things d. manufacturer's private cloud ANSWER: c RATIONALE: The Internet of Things (IoT) is a network of physical objects or “things” embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer of the device, device operators, and other connected devices. To be truly part of the IoT, these networked devices need IP addresses and a connection to the public Internet, which allows the data to be transmitted to an operational historical database containing data from many sensors. FEEDBACK: a. Networked devices that are truly part of the IoT need IP addresses and a connection to the public Internet, which allows the data they collect to be transmitted to an operational historical database containing data from many sensors. b. Networked devices that are truly part of the IoT need IP addresses and a connection to the public Internet, which allows the data they collect to be transmitted to an operational historical database containing data from many sensors. c. Networked devices that are truly part of the IoT need IP addresses and a connection to the public Internet, which allows the data they collect to be transmitted to an operational historical database containing data from many

Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 08 - Cloud Computing and the Internet of Things sensors.

d. Networked devices that are truly part of the IoT need IP addresses and a

connection to the public Internet, which allows the data they collect to be transmitted to an operational historical database containing data from many sensors.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: The Internet of Things (IoT) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.5 - Define what is meant by the Internet of Things (IoT). NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 6:00 PM DATE MODIFIED: 6/27/2020 9:40 AM 18. Suppose a business wishes to have access to servers and storage devices, but does not want to buy them. The business prefers to have their own employees install and maintain the computing platform and application software. What is their best choice? a. Internet of Things b. cloud computing: infrastructure as a service c. cloud computing: software as a service d. cloud computing: platform as a service ANSWER: b RATIONALE: Infrastructure as a service (IaaS) is an information systems model in which an organization outsources the equipment used to support its data processing operations, including servers, storage devices, and networking components. The service provider owns the equipment and is responsible for housing, running, and maintaining it. FEEDBACK: a. Infrastructure as a service (IaaS) is an information systems model in which an organization outsources the equipment used to support its data processing operations, including servers, storage devices, and networking components. The service provider owns the equipment and is responsible for housing, running, and maintaining it. b. Infrastructure as a service (IaaS) is an information systems model in which an organization outsources the equipment used to support its data processing operations, including servers, storage devices, and networking components. The service provider owns the equipment and is responsible for housing, running, and maintaining it. c. Infrastructure as a service (IaaS) is an information systems model in which an organization outsources the equipment used to support its data processing operations, including servers, storage devices, and networking components. The service provider owns the equipment and is responsible for housing, running, and maintaining it. d. Infrastructure as a service (IaaS) is an information systems model in which an organization outsources the equipment used to support its data processing operations, including servers, storage devices, and networking components. The service provider owns the equipment and is responsible for housing, running, and maintaining it.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 08 - Cloud Computing and the Internet of Things DIFFICULTY: Moderate REFERENCES: Public Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.4 - Discuss the pros and cons of public, private, and hybrid cloud computing. NATIONAL STANDARDS: United States - BUSPROG; Technology - Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 6:00 PM DATE MODIFIED: 6/27/2020 9:50 AM 19. In which common approach to cloud computing does a service provider organization own and manage the infrastructure for client organizations that access slices of shared resources? a. private cloud b. public cloud c. autonomic d. hybrid cloud ANSWER: b RATIONALE: In a public cloud computing environment, a service provider organization owns and manages the infrastructure (including computing, networking, storage devices, and support personnel) with cloud user organizations (called tenants) accessing slices of shared resources via the Internet. FEEDBACK: a. In a public cloud computing environment, a service provider organization owns and manages the infrastructure (including computing, networking, storage devices, and support personnel) with cloud user organizations (called tenants) accessing slices of shared resources via the Internet. b. In a public cloud computing environment, a service provider organization owns and manages the infrastructure (including computing, networking, storage devices, and support personnel) with cloud user organizations (called tenants) accessing slices of shared resources via the Internet. c. In a public cloud computing environment, a service provider organization owns and manages the infrastructure (including computing, networking, storage devices, and support personnel) with cloud user organizations (called tenants) accessing slices of shared resources via the Internet. d. In a public cloud computing environment, a service provider organization owns and manages the infrastructure (including computing, networking, storage devices, and support personnel) with cloud user organizations (called tenants) accessing slices of shared resources via the Internet.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Public Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.1 - Identify three commonly used approaches to cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 1:28 PM DATE MODIFIED: 6/27/2020 1:36 PM 20. Purple Pie Man's Bakery has entered an agreement with Amazon whereby the bakery's database system resides on Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 08 - Cloud Computing and the Internet of Things Amazon's hardware and employees access it through the Internet. In this scenario, Purple Pie Man's Bakery is _____. a. using a hybrid cloud b. deploying to a private cloud c. a service provider d. a tenant of Amazon ANSWER: d RATIONALE: In a public cloud computing environment, a service provider organization owns and manages the infrastructure (including computing, networking, storage devices, and support personnel) with cloud user organizations (called tenants) accessing slices of shared resources via the Internet. FEEDBACK: a. In a public cloud computing environment, a service provider organization owns and manages the infrastructure (including computing, networking, storage devices, and support personnel) with cloud user organizations (called tenants) accessing slices of shared resources via the Internet. b. In a public cloud computing environment, a service provider organization owns and manages the infrastructure (including computing, networking, storage devices, and support personnel) with cloud user organizations (called tenants) accessing slices of shared resources via the Internet. c. In a public cloud computing environment, a service provider organization owns and manages the infrastructure (including computing, networking, storage devices, and support personnel) with cloud user organizations (called tenants) accessing slices of shared resources via the Internet. d. In a public cloud computing environment, a service provider organization owns and manages the infrastructure (including computing, networking, storage devices, and support personnel) with cloud user organizations (called tenants) accessing slices of shared resources via the Internet.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Public Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.1 - Identify three commonly used approaches to cloud computing. KEYWORDS: Bloom's: Understand DATE CREATED: 6/27/2020 1:30 PM DATE MODIFIED: 6/27/2020 1:51 PM 21. A single-tenant cloud computing environment is also known as a(n) _____. a. private cloud b. public cloud c. autonomic cloud d. hybrid cloud ANSWER: a RATIONALE: A private cloud computing environment is a single-tenant cloud. FEEDBACK: a. A private cloud computing environment is a single-tenant cloud. b. A private cloud computing environment is a single-tenant cloud. c. A private cloud computing environment is a single-tenant cloud. d. A private cloud computing environment is a single-tenant cloud. Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 08 - Cloud Computing and the Internet of Things POINTS: 1 DIFFICULTY: Easy REFERENCES: Private Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.1 - Identify three commonly used approaches to cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 1:37 PM DATE MODIFIED: 6/27/2020 1:40 PM 22. Don's company has contracted with a service provider to receive a computing platform for all employees, complete with an operating system, database services, and a Web server. Don develops applications using tools delivered by the service provider. What type of service has Don's company signed up for? a. hybrid cloud b. IaaS c. PaaS d. SaaS ANSWER: c RATIONALE: Platform as a service (PaaS) is an information systems model in which users are provided with a computing platform, typically including operating system, programming language execution environment, database services, and a Web server. The user can create an application or service using tools and/or libraries from the provider. FEEDBACK: a. Platform as a service (PaaS) is an information systems model in which users are provided with a computing platform, typically including operating system, programming language execution environment, database services, and a Web server. The user can create an application or service using tools and/or libraries from the provider. b. Platform as a service (PaaS) is an information systems model in which users are provided with a computing platform, typically including operating system, programming language execution environment, database services, and a Web server. The user can create an application or service using tools and/or libraries from the provider. c. Platform as a service (PaaS) is an information systems model in which users are provided with a computing platform, typically including operating system, programming language execution environment, database services, and a Web server. The user can create an application or service using tools and/or libraries from the provider. d. Platform as a service (PaaS) is an information systems model in which users are provided with a computing platform, typically including operating system, programming language execution environment, database services, and a Web server. The user can create an application or service using tools and/or libraries from the provider.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Public Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.1 - Identify three commonly used approaches to cloud computing. Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 08 - Cloud Computing and the Internet of Things KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 6/27/2020 1:41 PM 6/27/2020 2:01 PM

23. Private cloud computing _____. a. can rely on on-premises or virtual clouds b. includes three main types of services: IaaS, PaaS, and SaaS c. involves accessing slices of resources shared among several tenants d. is always single-cloud, not multicloud, computing ANSWER: a RATIONALE: A private cloud computing environment is a single-tenant cloud. An organization might establish several private clouds with one for finance, another one for product development, and a third for sales, for example. Each private cloud has a defined set of available resources and users, with predefined quotas that limit how much capacity users of that cloud can consume. Private clouds can be divided into two distinct types. Some organizations build their own on-premise private cloud, and others elect to have a service provider build and manage their private cloud (sometimes called a virtual private cloud). FEEDBACK: a. Private clouds can be divided into two distinct types. Some organizations build their own on-premise private cloud, and others elect to have a service provider build and manage their private cloud (sometimes called a virtual private cloud). b. Private clouds can be divided into two distinct types. Some organizations build their own on-premise private cloud, and others elect to have a service provider build and manage their private cloud (sometimes called a virtual private cloud). c. Private clouds can be divided into two distinct types. Some organizations build their own on-premise private cloud, and others elect to have a service provider build and manage their private cloud (sometimes called a virtual private cloud). d. Private clouds can be divided into two distinct types. Some organizations build their own on-premise private cloud, and others elect to have a service provider build and manage their private cloud (sometimes called a virtual private cloud).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Private Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.1 - Identify three commonly used approaches to cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 1:53 PM DATE MODIFIED: 6/27/2020 2:14 PM 24. Which type of cloud computing environment is most suitable for an organization that wants to run applications with stringent compliance requirements on-premises while running applications with fluctuating capacity needs on a service provider's cloud? a. autonomic b. public c. private d. hybrid ANSWER: d Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 08 - Cloud Computing and the Internet of Things RATIONALE:

FEEDBACK:

A hybrid cloud computing environment is composed of both public and private clouds, integrated through a private network. Organizations typically use the public cloud to run applications with less sensitive security requirements and highly fluctuating capacity needs, but run more critical applications, such as those with significant compliance requirements, on the private portion of their hybrid cloud. a. A hybrid cloud computing environment is composed of both public and private

clouds, integrated through a private network. Organizations typically use the public cloud to run applications with less sensitive security requirements and highly fluctuating capacity needs, but run more critical applications, such as those with significant compliance requirements, on the private portion of their hybrid cloud. b. A hybrid cloud computing environment is composed of both public and private clouds, integrated through a private network. Organizations typically use the public cloud to run applications with less sensitive security requirements and highly fluctuating capacity needs, but run more critical applications, such as those with significant compliance requirements, on the private portion of their hybrid cloud. c. A hybrid cloud computing environment is composed of both public and private clouds, integrated through a private network. Organizations typically use the public cloud to run applications with less sensitive security requirements and highly fluctuating capacity needs, but run more critical applications, such as those with significant compliance requirements, on the private portion of their hybrid cloud. d. A hybrid cloud computing environment is composed of both public and private clouds, integrated through a private network. Organizations typically use the public cloud to run applications with less sensitive security requirements and highly fluctuating capacity needs, but run more critical applications, such as those with significant compliance requirements, on the private portion of their hybrid cloud.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Hybrid Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.1 - Identify three commonly used approaches to cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 2:02 PM DATE MODIFIED: 6/27/2020 2:22 PM 25. Reagan's firm has not had to make large investments in computer or networking hardware or in personnel to maintain the hardware because they use public cloud computing. Reagan recognizes that this demonstrates which key benefit of public cloud computing? a. flexible capacity b. decreased redundancy c. reduced costs d. increased redundancy ANSWER: c RATIONALE: Public cloud computing offers three key benefits to organizations—reduced costs, flexible computing capacity, and increased redundancy in the event of disaster. With public cloud computing, organizations avoid large, up-front investments in hardware. Public cloud Copyright Cengage Learning. Powered by Cognero.

Page 16


Chapter 08 - Cloud Computing and the Internet of Things computing can also lower the ongoing investment in the people and other resources required to manage that hardware. Organizations can request just the right type and capacity of information system resources from their cloud computing provider, pay for it on an ongoing basis, and let the service provider handle the system support and maintenance. FEEDBACK:

a. Public cloud computing offers three key benefits to organizations—reduced costs, flexible computing capacity, and increased redundancy in the event of disaster. With public cloud computing, organizations avoid large, up-front investments in hardware. Public cloud computing can also lower the ongoing investment in the people and other resources required to manage that hardware. b. Public cloud computing offers three key benefits to organizations—reduced costs, flexible computing capacity, and increased redundancy in the event of disaster. With public cloud computing, organizations avoid large, up-front investments in hardware. Public cloud computing can also lower the ongoing investment in the people and other resources required to manage that hardware. c. Public cloud computing offers three key benefits to organizations—reduced costs, flexible computing capacity, and increased redundancy in the event of disaster. With public cloud computing, organizations avoid large, up-front investments in hardware. Public cloud computing can also lower the ongoing investment in the people and other resources required to manage that hardware. d. Public cloud computing offers three key benefits to organizations—reduced costs, flexible computing capacity, and increased redundancy in the event of disaster. With public cloud computing, organizations avoid large, up-front investments in hardware. Public cloud computing can also lower the ongoing investment in the people and other resources required to manage that hardware.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Public Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.2 - Identify three key benefits associated with cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 2:23 PM DATE MODIFIED: 6/27/2020 2:35 PM 26. Thomas owns a small Web services company and currently owns and maintains all his own computing hardware. He plans to develop and test a new service offering that will require his computing capacity to double or triple quickly if it proves successful. How might transitioning to the public cloud help Thomas with this situation? a. assistance with purchase of additional hardware b. redundancy through multiple data centers c. unlimited computing capacity for a low monthly fee d. flexible computing capacity that can be adjusted continually ANSWER: d RATIONALE: Should an organization’s computing needs change, it can request its cloud computing service provider to deliver more or less capacity, with a corresponding increase or decrease in monthly charges. This avoids lengthy delays (possibly months) that can occur when an organization tries to acquire its own resources. Such flexibility can increase the speed and reduce the costs of new product and service launches. An organization can quickly acquire the increased computing capacity required to test a new product or service offering literally overnight. If the test proves successful, even more computing capacity can be requested to support the rollout of the new product or service. On the other hand, should the test prove Copyright Cengage Learning. Powered by Cognero.

Page 17


Chapter 08 - Cloud Computing and the Internet of Things unsuccessful, the organization can simply request the cloud computing service provider to turn off the additional capacity. FEEDBACK:

a. With public cloud computing, an organization can quickly acquire the increased computing capacity required to test a new product or service offering literally overnight. If the test proves successful, even more computing capacity can be requested to support the rollout of the new product or service. b. With public cloud computing, an organization can quickly acquire the increased computing capacity required to test a new product or service offering literally overnight. If the test proves successful, even more computing capacity can be requested to support the rollout of the new product or service. c. With public cloud computing, an organization can quickly acquire the increased computing capacity required to test a new product or service offering literally overnight. If the test proves successful, even more computing capacity can be requested to support the rollout of the new product or service. d. With public cloud computing, an organization can quickly acquire the increased computing capacity required to test a new product or service offering literally overnight. If the test proves successful, even more computing capacity can be requested to support the rollout of the new product or service.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Public Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.2 - Identify three key benefits associated with cloud computing. KEYWORDS: Bloom's: Understand DATE CREATED: 6/27/2020 2:24 PM DATE MODIFIED: 6/27/2020 2:50 PM 27. Which benefit of public cloud computing results when service providers operate multiple data centers distributed geographically and save multiple copies of data on different machines? a. increased redundancy b. decreased redundancy c. flexible capacity d. reduced costs ANSWER: a RATIONALE: Public cloud computing offers three key benefits to organizations—reduced costs, flexible computing capacity, and increased redundancy in the event of disaster. Public cloud service providers operate multiple data centers distributed geographically. They also save multiple copies of tenants’ data on different machines. This redundancy ensures that the tenants’ information and the service provider’s processing power remain available with minimal interruption. FEEDBACK: a. Public cloud service providers operate multiple data centers distributed geographically. They also save multiple copies of tenants’ data on different machines. This redundancy ensures that the tenants’ information and the service provider’s processing power remain available with minimal interruption. b. Public cloud service providers operate multiple data centers distributed geographically. They also save multiple copies of tenants’ data on different machines. This redundancy ensures that the tenants’ information and the service provider’s processing power remain available with minimal interruption.

Copyright Cengage Learning. Powered by Cognero.

Page 18


Chapter 08 - Cloud Computing and the Internet of Things c. Public cloud service providers operate multiple data centers distributed

geographically. They also save multiple copies of tenants’ data on different machines. This redundancy ensures that the tenants’ information and the service provider’s processing power remain available with minimal interruption. d. Public cloud service providers operate multiple data centers distributed geographically. They also save multiple copies of tenants’ data on different machines. This redundancy ensures that the tenants’ information and the service provider’s processing power remain available with minimal interruption.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Public Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.2 - Identify three key benefits associated with cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 2:35 PM DATE MODIFIED: 6/27/2020 2:55 PM 28. One benefit of the cloud computing option known as software as a service is _____. a. uninterrupted access to applications when Internet service is down b. lower costs compared with licensing needed applications c. greater user control of all software maintenance and upgrades d. a single, one-time fee for applications rather than a monthly fee ANSWER: b RATIONALE: Software as a service (SaaS) is a software delivery approach that provides users with access to software remotely as a Web-based service. SaaS pricing is based on a monthly fee per user and typically results in lower costs than a licensed application. Another advantage of SaaS is that because the software is hosted remotely, users do not need to purchase and install additional hardware to provide increased capacity. Furthermore, the service provider handles necessary software maintenance and upgrades. FEEDBACK: a. SaaS pricing is based on a monthly fee per user and typically results in lower costs than a licensed application.

b. SaaS pricing is based on a monthly fee per user and typically results in lower costs than a licensed application. c. SaaS pricing is based on a monthly fee per user and typically results in lower costs than a licensed application. d. SaaS pricing is based on a monthly fee per user and typically results in lower costs than a licensed application.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Public Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.2 - Identify three key benefits associated with cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 2:45 PM DATE MODIFIED: 6/27/2020 3:03 PM Copyright Cengage Learning. Powered by Cognero.

Page 19


Chapter 08 - Cloud Computing and the Internet of Things 29. Rosie, an office manager, recommends that her company transition to the public cloud because the office building is located in a tornado-prone area and has experienced property damage several times in the past as a result. She reasons that this move will _____. a. reduce the costs of replacing computer and network hardware after a tornado strikes b. guarantee continuity of operations even if the office is damaged by a tornado c. minimize the need to adjust computing capacity over time d. ensure that the business remains profitable enough to recover if a tornado strikes ANSWER: b RATIONALE: Public cloud service providers operate multiple data centers distributed geographically. They also save multiple copies of tenants’ data on different machines. This redundancy ensures that the tenants’ information and the service provider’s processing power remain available with minimal interruption. Continuity of operations can be guaranteed even in the event a natural disaster strikes a certain region (e.g., a hurricane), a local hardware or software failure occurs at one of the data centers, or a software or hardware component needs to be updated or replaced. FEEDBACK: a. Public cloud service providers operate multiple data centers distributed geographically. This redundancy ensures that the tenants’ information and the service provider’s processing power remain available with minimal interruption. Continuity of operations can be guaranteed even in the event a natural disaster strikes a certain region. b. Public cloud service providers operate multiple data centers distributed geographically. This redundancy ensures that the tenants’ information and the service provider’s processing power remain available with minimal interruption. Continuity of operations can be guaranteed even in the event a natural disaster strikes a certain region. c. Public cloud service providers operate multiple data centers distributed geographically. This redundancy ensures that the tenants’ information and the service provider’s processing power remain available with minimal interruption. Continuity of operations can be guaranteed even in the event a natural disaster strikes a certain region. d. Public cloud service providers operate multiple data centers distributed geographically. This redundancy ensures that the tenants’ information and the service provider’s processing power remain available with minimal interruption. Continuity of operations can be guaranteed even in the event a natural disaster strikes a certain region.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Public Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.2 - Identify three key benefits associated with cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 2:55 PM DATE MODIFIED: 6/27/2020 3:13 PM 30. After Rosie's company enters into a contract with a public cloud service provider and transitions to the cloud, they discover that they need greater computing capacity than they expected. To address this, they must _____. a. renegotiate their contract with the service provider to acquire greater capacity b. contract with a second service provider to gain additional capacity Copyright Cengage Learning. Powered by Cognero.

Page 20


Chapter 08 - Cloud Computing and the Internet of Things c. request that the service provider increase their capacity, incurring a higher monthly fee d. transition immediately to a hybrid cloud approach ANSWER: c RATIONALE: Public cloud computing offers three key benefits to organizations—reduced costs, flexible computing capacity, and increased redundancy in the event of disaster. Should an organization’s computing needs change, it can request its cloud computing service provider to deliver more or less capacity, with a corresponding increase or decrease in monthly charges. FEEDBACK: a. Should an organization’s computing needs change, it can request its cloud computing service provider to deliver more or less capacity, with a corresponding increase or decrease in monthly charges. b. Should an organization’s computing needs change, it can request its cloud computing service provider to deliver more or less capacity, with a corresponding increase or decrease in monthly charges. c. Should an organization’s computing needs change, it can request its cloud computing service provider to deliver more or less capacity, with a corresponding increase or decrease in monthly charges. d. Should an organization’s computing needs change, it can request its cloud computing service provider to deliver more or less capacity, with a corresponding increase or decrease in monthly charges.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Public Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.2 - Identify three key benefits associated with cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 3:03 PM DATE MODIFIED: 6/27/2020 3:19 PM 31. Why do cloud computing service arrangements often pose challenges for organizations that are transitioning to the cloud? a. Cloud computing arrangements can be lengthy and complex. b. Cloud computing arrangements are rigid and inflexible. c. Cloud service providers do not offer standard contracts. d. Client organizations are never allowed to review or modify contracts. ANSWER: a RATIONALE: Cloud computing arrangements can be lengthy and complex, and they are often subject to more than one interpretation. Organizations are advised to use experienced legal, purchasing, and IS resources to review and modify, where necessary, a cloud service provider’s standard contract. FEEDBACK: a. Cloud computing arrangements can be lengthy and complex, and they are often subject to more than one interpretation. Organizations are advised to use experienced legal, purchasing, and IS resources to review and modify, where necessary, a cloud service provider’s standard contract. b. Cloud computing arrangements can be lengthy and complex, and they are often subject to more than one interpretation. Organizations are advised to use experienced legal, purchasing, and IS resources to review and modify, where

Copyright Cengage Learning. Powered by Cognero.

Page 21


Chapter 08 - Cloud Computing and the Internet of Things necessary, a cloud service provider’s standard contract.

c. Cloud computing arrangements can be lengthy and complex, and they are often subject to more than one interpretation. Organizations are advised to use experienced legal, purchasing, and IS resources to review and modify, where necessary, a cloud service provider’s standard contract. d. Cloud computing arrangements can be lengthy and complex, and they are often subject to more than one interpretation. Organizations are advised to use experienced legal, purchasing, and IS resources to review and modify, where necessary, a cloud service provider’s standard contract.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Public Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.3 - Summarize four common issues organizations encounter when moving to public cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 3:21 PM DATE MODIFIED: 6/27/2020 3:33 PM 32. Owen's firm runs their critical applications in a public cloud. Recently, their launch of a new product resulted in a surge of customer orders, but they were unable to ramp up their computing capacity fast enough, and some customer's experienced problems. This demonstrates which common issue with public cloud computing? a. inadequate data security b. inconsistent pricing arrangements c. vendor lock-in d. wide variations in performance over time ANSWER: d RATIONALE: Cloud service provider performance issues can result in wide variations in performance over time and greater than expected downtime for tenants. Tenants rely on the service provider to provide the valuable capability of quickly ramping up or down the amount of computing capacity made available to them. Failure to respond quickly to a capacity change request can greatly reduce the value of cloud computing. In addition, the service provider’s disaster recovery capabilities must be adequate to meet each tenant’s needs. A loss of capability for anything longer than a few minutes may be disastrous to tenants who are running missioncritical applications in the cloud, and it may quickly impact their revenue-generation and customer service capabilities. FEEDBACK: a. Cloud service provider performance issues can result in wide variations in performance over time and greater than expected downtime for tenants. Tenants rely on the service provider to provide the valuable capability of quickly ramping up or down the amount of computing capacity made available to them. Failure to respond quickly to a capacity change request can greatly reduce the value of cloud computing. b. Cloud service provider performance issues can result in wide variations in performance over time and greater than expected downtime for tenants. Tenants rely on the service provider to provide the valuable capability of quickly ramping up or down the amount of computing capacity made available to them. Failure to respond quickly to a capacity change request can greatly reduce the value of cloud computing.

Copyright Cengage Learning. Powered by Cognero.

Page 22


Chapter 08 - Cloud Computing and the Internet of Things c. Cloud service provider performance issues can result in wide variations in

performance over time and greater than expected downtime for tenants. Tenants rely on the service provider to provide the valuable capability of quickly ramping up or down the amount of computing capacity made available to them. Failure to respond quickly to a capacity change request can greatly reduce the value of cloud computing. d. Cloud service provider performance issues can result in wide variations in performance over time and greater than expected downtime for tenants. Tenants rely on the service provider to provide the valuable capability of quickly ramping up or down the amount of computing capacity made available to them. Failure to respond quickly to a capacity change request can greatly reduce the value of cloud computing.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Public Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.3 - Summarize four common issues organizations encounter when moving to public cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 3:22 PM DATE MODIFIED: 6/27/2020 3:43 PM 33. An organization using a public cloud allows the service provider to store their data in a remote location, possibly on the same storage device as other organizations' data. This results in which key concern with the public cloud? a. vendor lock-in b. complex pricing arrangements c. frequent software updates d. inadequate data security ANSWER: d RATIONALE: Data security is another key concern when using a public cloud computing service because you are relying on someone else to safeguard your data, which may even reside on the same storage device as data from another organization (perhaps even a competitor). FEEDBACK: a. Data security is another key concern when using a public cloud computing service because you are relying on someone else to safeguard your data, which may even reside on the same storage device as data from another organization (perhaps even a competitor). b. Data security is another key concern when using a public cloud computing service because you are relying on someone else to safeguard your data, which may even reside on the same storage device as data from another organization (perhaps even a competitor). c. Data security is another key concern when using a public cloud computing service because you are relying on someone else to safeguard your data, which may even reside on the same storage device as data from another organization (perhaps even a competitor). d. Data security is another key concern when using a public cloud computing service because you are relying on someone else to safeguard your data, which may even reside on the same storage device as data from another organization (perhaps even a competitor).

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 23


Chapter 08 - Cloud Computing and the Internet of Things DIFFICULTY: Easy REFERENCES: Public Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.3 - Summarize four common issues organizations encounter when moving to public cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 3:33 PM DATE MODIFIED: 6/27/2020 3:51 PM 34. Mavis's company migrated its infrastructure and data to a public cloud last year, and have endured several periods of decreased or interrupted performance since then. Mavis is frustrated because the company's leadership is unwilling to change cloud providers. Mavis's company has most likely fallen prey to _____. a. complex pricing arrangements b. rapid disaster recovery c. vendor lock-in d. inadequate data security ANSWER: c RATIONALE: A major start-up issue that organizations should also consider is the amount of effort involved in moving to the cloud in the first place. This introduces the issue of vendor lockin—meaning once an organization has gone through the effort required to transition its infrastructure and/or data to a public cloud provider, it will likely be very reluctant to go through the time-consuming migration process a second time, even if concerns arise with the vendor they are working with. FEEDBACK: a. Vendor lock-in means that once an organization has gone through the effort required to transition its infrastructure and/or data to a public cloud provider, it will likely be very reluctant to go through the time-consuming migration process a second time, even if concerns arise with the vendor they are working with. b. Vendor lock-in means that once an organization has gone through the effort required to transition its infrastructure and/or data to a public cloud provider, it will likely be very reluctant to go through the time-consuming migration process a second time, even if concerns arise with the vendor they are working with. c. Vendor lock-in means that once an organization has gone through the effort required to transition its infrastructure and/or data to a public cloud provider, it will likely be very reluctant to go through the time-consuming migration process a second time, even if concerns arise with the vendor they are working with. d. Vendor lock-in means that once an organization has gone through the effort required to transition its infrastructure and/or data to a public cloud provider, it will likely be very reluctant to go through the time-consuming migration process a second time, even if concerns arise with the vendor they are working with.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Public Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.3 - Summarize four common issues organizations encounter when moving to public cloud computing. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 24


Chapter 08 - Cloud Computing and the Internet of Things DATE CREATED: DATE MODIFIED:

6/27/2020 3:44 PM 6/27/2020 3:58 PM

35. Which statement about data security in the public cloud is true? a. Data security is not a major concern when using a public cloud computing service. b. Clients of public cloud computing services must rely on service providers to safeguard their data. c. Cloud providers, not their tenants, are held responsible for noncompliance with industry regulations. d. Vendor lock-in is a data security protocol used by many public cloud service providers. ANSWER: b POINTS: 1 DIFFICULTY: Easy REFERENCES: Public Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.3 - Summarize four common issues organizations encounter when moving to public cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 3:51 PM DATE MODIFIED: 6/27/2020 4:05 PM 36. James entered into a public cloud computing arrangement without reviewing the standard contract carefully. What problem is he most likely to face as a result? a. unexpected cloud service costs b. consistent, poor performance c. excessive data security restrictions d. a time-consuming migration process ANSWER: a RATIONALE: Cloud computing arrangements can be lengthy and complex, and they are often subject to more than one interpretation. Organizations are advised to use experienced legal, purchasing, and IS resources to review and modify, where necessary, a cloud service provider’s standard contract. Failure to do so may result in unexpected costs that reduce the expected cost savings. FEEDBACK: a. Organizations are advised to use experienced legal, purchasing, and IS resources to review and modify, where necessary, a cloud service provider’s standard contract. Failure to do so may result in unexpected costs that reduce the expected cost savings. b. Organizations are advised to use experienced legal, purchasing, and IS resources to review and modify, where necessary, a cloud service provider’s standard contract. Failure to do so may result in unexpected costs that reduce the expected cost savings. c. Organizations are advised to use experienced legal, purchasing, and IS resources to review and modify, where necessary, a cloud service provider’s standard contract. Failure to do so may result in unexpected costs that reduce the expected cost savings. d. Organizations are advised to use experienced legal, purchasing, and IS resources to review and modify, where necessary, a cloud service provider’s standard contract. Failure to do so may result in unexpected costs that reduce the expected cost savings.

Copyright Cengage Learning. Powered by Cognero.

Page 25


Chapter 08 - Cloud Computing and the Internet of Things POINTS: 1 DIFFICULTY: Easy REFERENCES: Public Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.3 - Summarize four common issues organizations encounter when moving to public cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 3:59 PM DATE MODIFIED: 6/27/2020 4:11 PM 37. A common reason an organization chooses a private rather than a public cloud environment is _____. a. budgeting concerns b. concerns about data security c. lack of adequate hardware d. IT staff reductions ANSWER: b RATIONALE: Organizations that implement a private cloud often do so because they are concerned that their data will not be secure in a public cloud. FEEDBACK: a. Organizations that implement a private cloud often do so because they are concerned that their data will not be secure in a public cloud. b. Organizations that implement a private cloud often do so because they are concerned that their data will not be secure in a public cloud. c. Organizations that implement a private cloud often do so because they are concerned that their data will not be secure in a public cloud. d. Organizations that implement a private cloud often do so because they are concerned that their data will not be secure in a public cloud.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Private Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.4 - Discuss the pros and cons of public, private, and hybrid cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 4:23 PM DATE MODIFIED: 6/27/2020 4:29 PM 38. Emily researches private clouds while working on a proposal to move her organization to the cloud. She learns that _____. a. there are two types, virtual private clouds and shared-tenancy private clouds b. organizations cannot establish more than one private cloud at a time c. a private cloud is often comparable in cost to or less expensive than an on-premises environment d. private clouds are less complicated for businesses to set up and manage than public clouds ANSWER: c RATIONALE: An organization might establish several private clouds with one for finance, another one for Copyright Cengage Learning. Powered by Cognero.

Page 26


Chapter 08 - Cloud Computing and the Internet of Things product development, and a third for sales, for example. Each private cloud has a defined set of available resources and users, with predefined quotas that limit how much capacity users of that cloud can consume. Private clouds can be divided into two distinct types. Some organizations build their own on-premise private cloud, and others elect to have a service provider build and manage their private cloud (sometimes called a virtual private cloud). When considering the total cost of ownership, which includes the IT platform, applications, and services, many organizations have found that a private cloud is comparable or less than the total cost of an on-premises environment, while also providing benefits, such as being able to work anywhere and on any device. However, many complications must be overcome—and deep technical skills and sophisticated software are needed—to successfully build and manage a private cloud. FEEDBACK:

a. When considering the total cost of ownership, which includes the IT platform,

applications, and services, many organizations have found that a private cloud is comparable or less than the total cost of an on-premises environment, while also providing benefits, such as being able to work anywhere and on any device. b. When considering the total cost of ownership, which includes the IT platform, applications, and services, many organizations have found that a private cloud is comparable or less than the total cost of an on-premises environment, while also providing benefits, such as being able to work anywhere and on any device. c. When considering the total cost of ownership, which includes the IT platform, applications, and services, many organizations have found that a private cloud is comparable or less than the total cost of an on-premises environment, while also providing benefits, such as being able to work anywhere and on any device. d. When considering the total cost of ownership, which includes the IT platform, applications, and services, many organizations have found that a private cloud is comparable or less than the total cost of an on-premises environment, while also providing benefits, such as being able to work anywhere and on any device.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Private Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.4 - Discuss the pros and cons of public, private, and hybrid cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 4:24 PM DATE MODIFIED: 6/27/2020 4:38 PM 39. A positive development for public, private, and hybrid cloud computing environments is the emerging ability of IT systems to manage themselves and adapt to changes in the computing environment, business policies, and operating objectives. This ability is known as _____. a. multicloud computing b. cloud virtualization c. autonomic computing d. 5G networking ANSWER: c RATIONALE: An enabling technology for cloud computing is autonomic computing, or the ability of IT systems to manage themselves and adapt to changes in the computing environment, business policies, and operating objectives. FEEDBACK: a. An enabling technology for cloud computing is autonomic computing, or the ability Copyright Cengage Learning. Powered by Cognero.

Page 27


Chapter 08 - Cloud Computing and the Internet of Things of IT systems to manage themselves and adapt to changes in the computing environment, business policies, and operating objectives. b. An enabling technology for cloud computing is autonomic computing, or the ability of IT systems to manage themselves and adapt to changes in the computing environment, business policies, and operating objectives. c. An enabling technology for cloud computing is autonomic computing, or the ability of IT systems to manage themselves and adapt to changes in the computing environment, business policies, and operating objectives. d. An enabling technology for cloud computing is autonomic computing, or the ability of IT systems to manage themselves and adapt to changes in the computing environment, business policies, and operating objectives.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Autonomic Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.4 - Discuss the pros and cons of public, private, and hybrid cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 4:29 PM DATE MODIFIED: 6/27/2020 4:45 PM 40. Many IT industry observers believe that many organizations will adopt a hybrid cloud approach because _____. a. it offers both agility and security b. it is more secure than a private cloud approach c. it is less expensive than a public cloud approach d. it offers both flexibility and decreased redundancy ANSWER: a RATIONALE: Many IT industry observers believe that the desire for both agility and security will eventually lead many organizations to adopt a hybrid cloud approach. FEEDBACK: a. Many IT industry observers believe that the desire for both agility and security will eventually lead many organizations to adopt a hybrid cloud approach. b. Many IT industry observers believe that the desire for both agility and security will eventually lead many organizations to adopt a hybrid cloud approach. c. Many IT industry observers believe that the desire for both agility and security will eventually lead many organizations to adopt a hybrid cloud approach. d. Many IT industry observers believe that the desire for both agility and security will eventually lead many organizations to adopt a hybrid cloud approach.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Hybrid Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.4 - Discuss the pros and cons of public, private, and hybrid cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 4:38 PM DATE MODIFIED: 6/27/2020 4:49 PM Copyright Cengage Learning. Powered by Cognero.

Page 28


Chapter 08 - Cloud Computing and the Internet of Things 41. An important consideration for businesses considering a hybrid cloud computing approach is that a secure, reliable, low-latency connection must be provided by their _____. a. individual users b. virtual private cloud c. private network d. public cloud service provider ANSWER: c RATIONALE: The network used with a hybrid cloud must provide a secure, reliable, low latency private connection between the user’s private and public cloud environments and any business location. FEEDBACK: a. The network used with a hybrid cloud must provide a secure, reliable, low latency private connection between the user’s private and public cloud environments and any business location. b. The network used with a hybrid cloud must provide a secure, reliable, low latency private connection between the user’s private and public cloud environments and any business location. c. The network used with a hybrid cloud must provide a secure, reliable, low latency private connection between the user’s private and public cloud environments and any business location. d. The network used with a hybrid cloud must provide a secure, reliable, low latency private connection between the user’s private and public cloud environments and any business location.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Hybrid Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.4 - Discuss the pros and cons of public, private, and hybrid cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 4:45 PM DATE MODIFIED: 6/27/2020 4:58 PM 42. Which statement about the pros and cons of various cloud computing approaches is accurate? a. Hybrid cloud computing provides flexibility, scalability, and cost efficiency with low security risks. b. Deep technical skills and sophisticated software are needed to begin using public cloud computing services. c. Virtual private clouds can provide SaaS but not IaaS service types more efficiently than public clouds. d. Public and private clouds are very dissimilar in their operation and benefits. ANSWER: a RATIONALE: Hybrid cloud computing provides flexibility, scalability, and cost efficiency with low security risks. Many complications must be overcome—and deep technical skills and sophisticated software are needed—to successfully build and manage a private cloud. Public cloud computing can be divided into three main types of services, IaaS, PaaS, and SaaS. The various cloud approaches offer some of the same benefits. FEEDBACK: a. Hybrid cloud computing provides flexibility, scalability, and cost efficiency with low security risks.

b. Hybrid cloud computing provides flexibility, scalability, and cost efficiency with low security risks.

Copyright Cengage Learning. Powered by Cognero.

Page 29


Chapter 08 - Cloud Computing and the Internet of Things c. Hybrid cloud computing provides flexibility, scalability, and cost efficiency with low security risks.

d. Hybrid cloud computing provides flexibility, scalability, and cost efficiency with low security risks.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Hybrid Cloud Computing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.4 - Discuss the pros and cons of public, private, and hybrid cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 4:49 PM DATE MODIFIED: 6/27/2020 5:42 PM 43. What is the Internet of Things? a. a set of tools that allow users to access their desktop operating system hosted in the cloud on a centralized server b. a network of physical objects embedded with sensors, processors, software, and network connectivity capability c. a computing environment in which a service provider owns and manages the infrastructure d. an information systems model in which an organization outsources the equipment used to support its data processing ANSWER: b RATIONALE: The Internet of Things (IoT) is a network of physical objects or “things” embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer of the device, device operators, and other connected devices. FEEDBACK: a. The Internet of Things (IoT) is a network of physical objects or “things” embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer of the device, device operators, and other connected devices. b. The Internet of Things (IoT) is a network of physical objects or “things” embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer of the device, device operators, and other connected devices. c. The Internet of Things (IoT) is a network of physical objects or “things” embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer of the device, device operators, and other connected devices. d. The Internet of Things (IoT) is a network of physical objects or “things” embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer of the device, device operators, and other connected devices.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Easy The Internet of Things (IoT) Multiple Choice False

Copyright Cengage Learning. Powered by Cognero.

Page 30


Chapter 08 - Cloud Computing and the Internet of Things LEARNING OBJECTIVES: POIS.14e.8.5 - Define what is meant by the Internet of Things (IoT). KEYWORDS: Bloom's: Remember DATE CREATED: 6/28/2020 5:55 AM DATE MODIFIED: 6/28/2020 6:02 AM 44. What happens to the data gathered by IoT sensors? a. It is analyzed and aggregated by the IoT device itself. b. It is simply displayed on the IoT device. c. It is cleaned and standardized before transmittal. d. It passes over the network and is gathered and stored. ANSWER: d RATIONALE: IoT exchange data using this process: (1) Sensors gather data. (2) Data passes over the network. (3) Data from across the IoT is gathered and stored, often in the cloud. (4) Data is combined with other data from other systems. (5) Data is analyzed to gain insights into the operation of devices on the IoT. (6) Alerts are sent to people, enterprise systems, or IoT devices based on these insights. FEEDBACK: a. IoT exchange data using this process: (1) Sensors gather data. (2) Data passes over the network. (3) Data from across the IoT is gathered and stored, often in the cloud. (4) Data is combined with other data from other systems. (5) Data is analyzed to gain insights into the operation of devices on the IoT. (6) Alerts are sent to people, enterprise systems, or IoT devices based on these insights. b. IoT exchange data using this process: (1) Sensors gather data. (2) Data passes over the network. (3) Data from across the IoT is gathered and stored, often in the cloud. (4) Data is combined with other data from other systems. (5) Data is analyzed to gain insights into the operation of devices on the IoT. (6) Alerts are sent to people, enterprise systems, or IoT devices based on these insights. c. IoT exchange data using this process: (1) Sensors gather data. (2) Data passes over the network. (3) Data from across the IoT is gathered and stored, often in the cloud. (4) Data is combined with other data from other systems. (5) Data is analyzed to gain insights into the operation of devices on the IoT. (6) Alerts are sent to people, enterprise systems, or IoT devices based on these insights. d. IoT exchange data using this process: (1) Sensors gather data. (2) Data passes over the network. (3) Data from across the IoT is gathered and stored, often in the cloud. (4) Data is combined with other data from other systems. (5) Data is analyzed to gain insights into the operation of devices on the IoT. (6) Alerts are sent to people, enterprise systems, or IoT devices based on these insights.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Internet of Things (IoT) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.5 - Define what is meant by the Internet of Things (IoT). KEYWORDS: Bloom's: Remember DATE CREATED: 6/28/2020 5:57 AM DATE MODIFIED: 6/28/2020 6:13 AM 45. What must a networked device possess to truly belong to the IoT? a. an IP address b. a MAC address Copyright Cengage Learning. Powered by Cognero.

Page 31


Chapter 08 - Cloud Computing and the Internet of Things c. a motion sensor d. a machine learning algorithm ANSWER: a RATIONALE: To be truly part of the IoT, networked devices need IP addresses and a connection to the public Internet, which allows the data to be transmitted to an operational historical database containing data from many sensors. FEEDBACK: a. To be truly part of the IoT, networked devices need IP addresses and a connection to the public Internet, which allows the data to be transmitted to an operational historical database containing data from many sensors. b. To be truly part of the IoT, networked devices need IP addresses and a connection to the public Internet, which allows the data to be transmitted to an operational historical database containing data from many sensors. c. To be truly part of the IoT, networked devices need IP addresses and a connection to the public Internet, which allows the data to be transmitted to an operational historical database containing data from many sensors. d. To be truly part of the IoT, networked devices need IP addresses and a connection to the public Internet, which allows the data to be transmitted to an operational historical database containing data from many sensors.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Internet of Things (IoT) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.5 - Define what is meant by the Internet of Things (IoT). KEYWORDS: Bloom's: Remember DATE CREATED: 6/28/2020 6:02 AM DATE MODIFIED: 6/28/2020 2:33 PM 46. J.T.'s new refrigerator is part of the IoT. In the user manual, he reads that his fridge collects data on temperatures and compressor operation. Assuming J.T. sets up his fridge's Internet connection, where does the data from J.T.'s refrigerator end up? a. nowhere; it is held for only 24 hours at a time, then deleted b. on all mobile devices sharing the same Internet connection c. one of several IoT central database platforms d. the manufacturer's operational historical database ANSWER: d RATIONALE: To be truly part of the IoT, networked devices need IP addresses and a connection to the public Internet, which allows the data to be transmitted to an operational historical database containing data from many sensors. FEEDBACK: a. To be truly part of the IoT, networked devices need IP addresses and a connection to the public Internet, which allows the data to be transmitted to an operational historical database containing data from many sensors. b. To be truly part of the IoT, networked devices need IP addresses and a connection to the public Internet, which allows the data to be transmitted to an operational historical database containing data from many sensors. c. To be truly part of the IoT, networked devices need IP addresses and a connection to the public Internet, which allows the data to be transmitted to an operational historical database containing data from many sensors.

Copyright Cengage Learning. Powered by Cognero.

Page 32


Chapter 08 - Cloud Computing and the Internet of Things d. To be truly part of the IoT, networked devices need IP addresses and a

connection to the public Internet, which allows the data to be transmitted to an operational historical database containing data from many sensors.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Internet of Things (IoT) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.5 - Define what is meant by the Internet of Things (IoT). KEYWORDS: Bloom's: Remember DATE CREATED: 6/28/2020 6:13 AM DATE MODIFIED: 6/28/2020 2:48 PM 47. As a result of the analysis of aggregated sensor data, an IoT device may receive _____. a. self-configuring and self-healing instructions b. a download of data from other systems c. updates, alerts, or even automatic adjustments d. a series of new IP addresses ANSWER: c RATIONALE: To be truly part of the IoT, networked devices need IP addresses and a connection to the public Internet, which allows the data to be transmitted to an operational historical database containing data from many sensors. The operational data can be accessed via the Internet and analyzed by users with personal computers or mobile devices. Updates, alerts, or even automatic adjustments may be sent to the devices on the IoT based on this analysis. FEEDBACK: a. Updates, alerts, or even automatic adjustments may be sent to the devices on the IoT based on the analysis of data collected from IoT sensors. b. Updates, alerts, or even automatic adjustments may be sent to the devices on the IoT based on the analysis of data collected from IoT sensors. c. Updates, alerts, or even automatic adjustments may be sent to the devices on the IoT based on the analysis of data collected from IoT sensors. d. Updates, alerts, or even automatic adjustments may be sent to the devices on the IoT based on the analysis of data collected from IoT sensors.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Internet of Things (IoT) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.5 - Define what is meant by the Internet of Things (IoT). KEYWORDS: Bloom's: Remember DATE CREATED: 6/28/2020 2:34 PM DATE MODIFIED: 6/28/2020 3:01 PM 48. Which of the following takes automation to a deep, broad level--one where interconnectivity between various devices exists in a way it never did before? a. Transmission Control Protocol/Internet Protocol b. Internet of Things Copyright Cengage Learning. Powered by Cognero.

Page 33


Chapter 08 - Cloud Computing and the Internet of Things c. autonomic computing d. 5G networking ANSWER: b RATIONALE: The IoT takes automation to a deep, broad level—one where interconnectivity between various devices exists in a way it never did before. FEEDBACK: a. The IoT takes automation to a deep, broad level—one where interconnectivity between various devices exists in a way it never did before. b. The IoT takes automation to a deep, broad level—one where interconnectivity between various devices exists in a way it never did before. c. The IoT takes automation to a deep, broad level—one where interconnectivity between various devices exists in a way it never did before. d. The IoT takes automation to a deep, broad level—one where interconnectivity between various devices exists in a way it never did before.

POINTS: 1 DIFFICULTY: Easy REFERENCES: The Internet of Things (IoT) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.5 - Define what is meant by the Internet of Things (IoT). KEYWORDS: Bloom's: Remember DATE CREATED: 6/28/2020 2:49 PM DATE MODIFIED: 6/28/2020 3:09 PM 49. Clara has a device that responds to her voice commands by reviewing her calendar appointments, performing search queries, and playing streaming music. This is an example of a(n) _____. a. fitness tracker b. smart speaker c. infrastructure enhancement d. Tesla device ANSWER: b RATIONALE: Smart speakers, such as Google Home and Amazon Alexa, connect to the Internet and respond to your voice commands to perform functions such as reviewing calendar appointments, performing search queries, streaming music, and turning on or off lights connected to smart outlets. FEEDBACK: a. Smart speakers, such as Google Home and Amazon Alexa, connect to the Internet and respond to your voice commands to perform functions such as reviewing calendar appointments, performing search queries, streaming music, and turning on or off lights connected to smart outlets. b. Smart speakers, such as Google Home and Amazon Alexa, connect to the Internet and respond to your voice commands to perform functions such as reviewing calendar appointments, performing search queries, streaming music, and turning on or off lights connected to smart outlets. c. Smart speakers, such as Google Home and Amazon Alexa, connect to the Internet and respond to your voice commands to perform functions such as reviewing calendar appointments, performing search queries, streaming music, and turning on or off lights connected to smart outlets. d. Smart speakers, such as Google Home and Amazon Alexa, connect to the Internet and respond to your voice commands to perform functions such as

Copyright Cengage Learning. Powered by Cognero.

Page 34


Chapter 08 - Cloud Computing and the Internet of Things reviewing calendar appointments, performing search queries, streaming music, and turning on or off lights connected to smart outlets.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Examples of IoT QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.6 - Discuss four applications of IoT and associated connected devices. KEYWORDS: Bloom's: Remember DATE CREATED: 6/28/2020 3:10 PM DATE MODIFIED: 6/28/2020 3:19 PM 50. IoT technology can be used to control thermostats, home security systems, appliances, and motorized blinds via a smartphone app. This is known as _____. a. autonomous housekeeping b. smart city operation c. autonomic computing d. home automation ANSWER: d RATIONALE: Networked home automation enables users to adjust the thermostat, monitor a home security system, turn on or off a television or other appliances, and adjust windows or blinds using apps on their smartphones. FEEDBACK: a. Networked home automation enables users to adjust the thermostat, monitor a home security system, turn on or off a television or other appliances, and adjust windows or blinds using apps on their smartphones. b. Networked home automation enables users to adjust the thermostat, monitor a home security system, turn on or off a television or other appliances, and adjust windows or blinds using apps on their smartphones. c. Networked home automation enables users to adjust the thermostat, monitor a home security system, turn on or off a television or other appliances, and adjust windows or blinds using apps on their smartphones. d. Networked home automation enables users to adjust the thermostat, monitor a home security system, turn on or off a television or other appliances, and adjust windows or blinds using apps on their smartphones.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Examples of IoT QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.6 - Discuss four applications of IoT and associated connected devices. KEYWORDS: Bloom's: Remember DATE CREATED: 6/28/2020 3:12 PM DATE MODIFIED: 6/28/2020 3:26 PM 51. Sensors inside IoT wearable devices typically collect information such as _____. a. pH and air pressure Copyright Cengage Learning. Powered by Cognero.

Page 35


Chapter 08 - Cloud Computing and the Internet of Things b. volume and light levels c. location and heart rate d. temperature and humidity ANSWER: c RATIONALE: Wearable devices include sensors that can collect information such as your location and vital signs. Fitness trackers, such as Fitbit, can track your heart rate and communicate that data to your mobile device for biofeedback therapy and exercise monitoring. FEEDBACK: a. Wearable devices include sensors that can collect information such as your location and vital signs, such as heart rate. b. Wearable devices include sensors that can collect information such as your location and vital signs, such as heart rate. c. Wearable devices include sensors that can collect information such as your location and vital signs, such as heart rate. d. Wearable devices include sensors that can collect information such as your location and vital signs, such as heart rate.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Examples of IoT QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.6 - Discuss four applications of IoT and associated connected devices. KEYWORDS: Bloom's: Remember DATE CREATED: 6/28/2020 3:19 PM DATE MODIFIED: 6/28/2020 3:32 PM 52. Why are accuracy and privacy important considerations for users of wearable devices belonging to the IoT? a. Medical services providers often have access to data collected by these devices. b. These devices are more susceptible to attack my hackers than other IoT devices. c. Data collected by these devices is often used to inform public works planning. d. Home security systems and appliances are usually controlled using these devices. ANSWER: a RATIONALE: Medical services providers, including hospitals, insurance companies, and medical device companies, often have access to data from wearable devices such as Fitbit, making accuracy and privacy important considerations for users of wearable devices. FEEDBACK: a. Medical services providers, including hospitals, insurance companies, and medical device companies, often have access to data from wearable devices such as Fitbit, making accuracy and privacy important considerations for users of wearable devices. b. Medical services providers, including hospitals, insurance companies, and medical device companies, often have access to data from wearable devices such as Fitbit, making accuracy and privacy important considerations for users of wearable devices. c. Medical services providers, including hospitals, insurance companies, and medical device companies, often have access to data from wearable devices such as Fitbit, making accuracy and privacy important considerations for users of wearable devices. d. Medical services providers, including hospitals, insurance companies, and medical device companies, often have access to data from wearable devices

Copyright Cengage Learning. Powered by Cognero.

Page 36


Chapter 08 - Cloud Computing and the Internet of Things such as Fitbit, making accuracy and privacy important considerations for users of wearable devices.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Examples of IoT QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.6 - Discuss four applications of IoT and associated connected devices. KEYWORDS: Bloom's: Remember DATE CREATED: 6/28/2020 3:26 PM DATE MODIFIED: 6/28/2020 3:40 PM 53. Harold's city government uses data from sensors combined with artificial intelligence to improve the local infrastructure and efficiently manage traffic lights, water supplies, and energy usage. Harold _____. a. lives in a smart city b. must wear an IoT device c. has inadequate data security d. lives in a 5G community ANSWER: a RATIONALE: The IoT is also influencing city planning. A smart city uses data from sensors combined with artificial intelligence to improve its infrastructure and efficiently manage traffic lights, power plants, water supplies, networks, energy usage, and other resources. FEEDBACK: a. A smart city uses data from sensors combined with artificial intelligence to improve its infrastructure and efficiently manage traffic lights, power plants, water supplies, networks, energy usage, and other resources. b. A smart city uses data from sensors combined with artificial intelligence to improve its infrastructure and efficiently manage traffic lights, power plants, water supplies, networks, energy usage, and other resources. c. A smart city uses data from sensors combined with artificial intelligence to improve its infrastructure and efficiently manage traffic lights, power plants, water supplies, networks, energy usage, and other resources. d. A smart city uses data from sensors combined with artificial intelligence to improve its infrastructure and efficiently manage traffic lights, power plants, water supplies, networks, energy usage, and other resources.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Examples of IoT QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.6 - Discuss four applications of IoT and associated connected devices. KEYWORDS: Bloom's: Remember DATE CREATED: 6/28/2020 3:32 PM DATE MODIFIED: 6/28/2020 3:50 PM 54. Which statement about the influence of the IoT on cities or city planning is FALSE? a. Smart transportation systems monitor traffic patterns and provide up-to-the-minute information to drivers. Copyright Cengage Learning. Powered by Cognero.

Page 37


Chapter 08 - Cloud Computing and the Internet of Things b. Athens, Greece was named the first "Smart City" in Europe because of its efficient public transportation system. c. Automation systems monitor and improve lighting and air conditioning in office buildings. d. Smart garbage dumpsters are equipped with sensors that notify the public works department when they are full. ANSWER: b RATIONALE: Automation systems monitor and improve lighting and air conditioning in office buildings, and these enhancements can increase workplace productivity. Smart transportation systems monitor traffic patterns and provide up-to-the-minute information to drivers, making it easier to navigate the city. Smart garbage dumpsters placed on city streets are equipped with sensors that send a notification to the city’s public works department when they are full, streamlining operations and saving labor and vehicle wear, as bins need only be emptied when they are full. Barcelona, Spain, was named the first “Smart City” in Europe because of its efficient public transportation, use of data to monitor traffic and parking patterns, and innovative use of solar energy. FEEDBACK: a. Barcelona, Spain, was named the first “Smart City” in Europe because of its efficient public transportation, use of data to monitor traffic and parking patterns, and innovative use of solar energy. b. Barcelona, Spain, was named the first “Smart City” in Europe because of its efficient public transportation, use of data to monitor traffic and parking patterns, and innovative use of solar energy. c. Barcelona, Spain, was named the first “Smart City” in Europe because of its efficient public transportation, use of data to monitor traffic and parking patterns, and innovative use of solar energy. d. Barcelona, Spain, was named the first “Smart City” in Europe because of its efficient public transportation, use of data to monitor traffic and parking patterns, and innovative use of solar energy.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Examples of IoT QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.6 - Discuss four applications of IoT and associated connected devices. KEYWORDS: Bloom's: Remember DATE CREATED: 6/28/2020 3:40 PM DATE MODIFIED: 6/28/2020 4:00 PM 55. Smart cars _____. a. rely on maps, traffic information, and weather data stored in the cloud b. report the data they collect, such as gas mileage, to the manufacturer but not the owner c. speed up, slow down, change lanes, and turn without human intervention while traveling d. have sensors that monitor objects in the car's blind spots and at the front and rear of the car ANSWER: d RATIONALE: Smart cars have sensors that capture data such as vehicle location and gas mileage, and report this information back to their owner’s mobile device or a service provider. Other sensors monitor objects in the car’s blind spots and at the front and rear of the car to aid in driving or parking. FEEDBACK: a. Smart cars have sensors that capture data such as vehicle location and gas Copyright Cengage Learning. Powered by Cognero.

Page 38


Chapter 08 - Cloud Computing and the Internet of Things mileage, and report this information back to their owner’s mobile device or a service provider. Other sensors monitor objects in the car’s blind spots and at the front and rear of the car to aid in driving or parking. b. Smart cars have sensors that capture data such as vehicle location and gas mileage, and report this information back to their owner’s mobile device or a service provider. Other sensors monitor objects in the car’s blind spots and at the front and rear of the car to aid in driving or parking. c. Smart cars have sensors that capture data such as vehicle location and gas mileage, and report this information back to their owner’s mobile device or a service provider. Other sensors monitor objects in the car’s blind spots and at the front and rear of the car to aid in driving or parking. d. Smart cars have sensors that capture data such as vehicle location and gas mileage, and report this information back to their owner’s mobile device or a service provider. Other sensors monitor objects in the car’s blind spots and at the front and rear of the car to aid in driving or parking.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Examples of IoT QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.6 - Discuss four applications of IoT and associated connected devices. KEYWORDS: Bloom's: Remember DATE CREATED: 6/28/2020 3:50 PM DATE MODIFIED: 6/28/2020 4:06 PM 56. Tesla and Google have been pioneers in developing IoT devices that analyze data from the cloud and from on-board cameras and sensors to determine when to speed up, slow down, change lanes, or turn while moving. What are these devices called? a. wearable devices b. smart cities c. autonomous vehicles d. autonomic controllers ANSWER: c RATIONALE: Self-driving, or autonomous, vehicles rely on maps, traffic information, and weather data stored in the cloud along with cameras and sensors that collect data that the vehicle’s systems can quickly analyze to determine when it should speed up, slow down, change lanes, or turn. Tesla and Google have been pioneers in developing autonomous vehicles. FEEDBACK: a. Self-driving, or autonomous, vehicles rely on maps, traffic information, and weather data stored in the cloud along with cameras and sensors that collect data that the vehicle’s systems can quickly analyze to determine when it should speed up, slow down, change lanes, or turn. b. Self-driving, or autonomous, vehicles rely on maps, traffic information, and weather data stored in the cloud along with cameras and sensors that collect data that the vehicle’s systems can quickly analyze to determine when it should speed up, slow down, change lanes, or turn. c. Self-driving, or autonomous, vehicles rely on maps, traffic information, and weather data stored in the cloud along with cameras and sensors that collect data that the vehicle’s systems can quickly analyze to determine when it should speed up, slow down, change lanes, or turn. d. Self-driving, or autonomous, vehicles rely on maps, traffic information, and

Copyright Cengage Learning. Powered by Cognero.

Page 39


Chapter 08 - Cloud Computing and the Internet of Things weather data stored in the cloud along with cameras and sensors that collect data that the vehicle’s systems can quickly analyze to determine when it should speed up, slow down, change lanes, or turn.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Examples of IoT QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.6 - Discuss four applications of IoT and associated connected devices. KEYWORDS: Bloom's: Remember DATE CREATED: 6/28/2020 4:00 PM DATE MODIFIED: 6/28/2020 4:12 PM 57. The way consumers and large enterprises use the IoT is evolving because of advances in _____. a. low-frequency wireless bands b. packet switching c. mobile communications d. autonomic computing ANSWER: c RATIONALE: Advances in 5G technology are changing the way consumers and large enterprises use the IoT. 5G (5th generation) is the latest generation of mobile communications, featuring high data transfer speeds over high frequencies with minimal latency (delays in response time) and requiring low energy. 5G uses millimeter wave, a higher frequency band of the wireless spectrum, which allows data to be transferred at faster rates than the lower frequency bands used by 4G networks. FEEDBACK: a. Advances in 5G technology are changing the way consumers and large enterprises use the IoT. 5G (5th generation) is the latest generation of mobile communications. b. Advances in 5G technology are changing the way consumers and large enterprises use the IoT. 5G (5th generation) is the latest generation of mobile communications. c. Advances in 5G technology are changing the way consumers and large enterprises use the IoT. 5G (5th generation) is the latest generation of mobile communications. d. Advances in 5G technology are changing the way consumers and large enterprises use the IoT. 5G (5th generation) is the latest generation of mobile communications.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Enabling Connectivity with 5G QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.7 - Describe how 5G networks will transform developments with IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 12:00 PM DATE MODIFIED: 6/29/2020 12:09 PM Copyright Cengage Learning. Powered by Cognero.

Page 40


Chapter 08 - Cloud Computing and the Internet of Things 58. How does 5G technology compare with 4G technology? a. 5G uses millimeter wave. b. 4G uses a higher frequency band of the wireless spectrum. c. 5G signals travel farther. d. 4G requires more antennas in a given area. ANSWER: a RATIONALE: 5G uses millimeter wave, a higher frequency band of the wireless spectrum, which allows data to be transferred at faster rates than the lower frequency bands used by 4G networks. However, because millimeter wave signals do not travel as far as 4G signals, carriers must place 5G antennas closer together than was required for prior generations of wireless networks. FEEDBACK: a. 5G uses millimeter wave, a higher frequency band of the wireless spectrum, which allows data to be transferred at faster rates than the lower frequency bands used by 4G networks. b. 5G uses millimeter wave, a higher frequency band of the wireless spectrum, which allows data to be transferred at faster rates than the lower frequency bands used by 4G networks. c. 5G uses millimeter wave, a higher frequency band of the wireless spectrum, which allows data to be transferred at faster rates than the lower frequency bands used by 4G networks. d. 5G uses millimeter wave, a higher frequency band of the wireless spectrum, which allows data to be transferred at faster rates than the lower frequency bands used by 4G networks.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Enabling Connectivity with 5G QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.7 - Describe how 5G networks will transform developments with IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 12:03 PM DATE MODIFIED: 6/29/2020 12:18 PM 59. Josie is excited to learn that a 5G network is being installed in her area. She recognizes that _____. a. this will increase mobile network latency b. this will increase mobile data transfer speeds c. the 5G network will use more energy than the existing 4G network d. the same antennas already in place for 4G can be reused without modification ANSWER: b RATIONALE: Advances in 5G technology are changing the way consumers and large enterprises use the IoT. 5G (5th generation) is the latest generation of mobile communications, featuring high data transfer speeds over high frequencies with minimal latency (delays in response time) and requiring low energy. 5G uses millimeter wave, a higher frequency band of the wireless spectrum, which allows data to be transferred at faster rates than the lower frequency bands used by 4G networks. However, because millimeter wave signals do not travel as far as 4G signals, carriers must place 5G antennas closer together than was required for prior generations of wireless networks. Copyright Cengage Learning. Powered by Cognero.

Page 41


Chapter 08 - Cloud Computing and the Internet of Things FEEDBACK:

a. 5G (5th generation) is the latest generation of mobile communications, featuring high data transfer speeds over high frequencies with minimal latency (delays in response time) and requiring low energy. b. 5G (5th generation) is the latest generation of mobile communications, featuring high data transfer speeds over high frequencies with minimal latency (delays in response time) and requiring low energy. c. 5G (5th generation) is the latest generation of mobile communications, featuring high data transfer speeds over high frequencies with minimal latency (delays in response time) and requiring low energy. d. 5G (5th generation) is the latest generation of mobile communications, featuring high data transfer speeds over high frequencies with minimal latency (delays in response time) and requiring low energy.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Enabling Connectivity with 5G QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.7 - Describe how 5G networks will transform developments with IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 12:09 PM DATE MODIFIED: 6/29/2020 12:44 PM 60. Marion is an IoT developer working for a large organization. Why does his supervisor want him to stay informed about the network upgrades that major mobile carriers are currently making? a. 5G is required for private and hybrid cloud computing environments. b. The IoT cannot operate using current 4G networks. c. 4G is currently unavailable in many metropolitan areas in the United States. d. 5G availability is expected to quickly increase as these upgrades proceed. ANSWER: d RATIONALE: Advances in 5G technology are changing the way consumers and large enterprises use the IoT. 5G enables many devices to transmit data quickly to the cloud where it can be stored or analyzed, and the technology will make possible new services that can transform industries such as performing remote surgery, streaming high definition movies, operating drones to deliver medical supplies, and conducting security and surveillance operations. Major mobile carriers in the United States are investing billions of dollars to upgrade their networks to be able to support 5G connectivity. Controlled rollouts began in major cities in 2019, and availability is expected to quickly increase in subsequent years. FEEDBACK: a. 5G enables many devices to transmit data quickly to the cloud where it can be stored or analyzed, and the technology will make possible new services that can transform industries such as performing remote surgery, streaming high definition movies, operating drones to deliver medical supplies, and conducting security and surveillance operations. Major mobile carriers in the United States are investing billions of dollars to upgrade their networks to be able to support 5G connectivity. b. 5G enables many devices to transmit data quickly to the cloud where it can be stored or analyzed, and the technology will make possible new services that can transform industries such as performing remote surgery, streaming high definition movies, operating drones to deliver medical supplies, and conducting security and surveillance operations. Major mobile carriers in the United States are investing billions of dollars to upgrade their networks to be able to support 5G

Copyright Cengage Learning. Powered by Cognero.

Page 42


Chapter 08 - Cloud Computing and the Internet of Things connectivity.

c. 5G enables many devices to transmit data quickly to the cloud where it can be

stored or analyzed, and the technology will make possible new services that can transform industries such as performing remote surgery, streaming high definition movies, operating drones to deliver medical supplies, and conducting security and surveillance operations. Major mobile carriers in the United States are investing billions of dollars to upgrade their networks to be able to support 5G connectivity. d. 5G enables many devices to transmit data quickly to the cloud where it can be stored or analyzed, and the technology will make possible new services that can transform industries such as performing remote surgery, streaming high definition movies, operating drones to deliver medical supplies, and conducting security and surveillance operations. Major mobile carriers in the United States are investing billions of dollars to upgrade their networks to be able to support 5G connectivity.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Enabling Connectivity with 5G QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.7 - Describe how 5G networks will transform developments with IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 12:18 PM DATE MODIFIED: 6/29/2020 12:57 PM 61. Why are advances in 5G technology expected to influence the IoT? a. 5G reduces the security risks associated with the IoT. b. 5G allows organizations to reduce their hardware-related costs. c. 5G enables many devices to transmit data quickly to the cloud. d. 5G enables IT systems to manage themselves and adapt to changes. ANSWER: c RATIONALE: 5G enables many devices to transmit data quickly to the cloud where it can be stored or analyzed, and the technology will make possible new services that can transform industries such as performing remote surgery, streaming high definition movies, operating drones to deliver medical supplies, and conducting security and surveillance operations. FEEDBACK: a. 5G enables many devices to transmit data quickly to the cloud where it can be stored or analyzed, and the technology will make possible new services that can transform industries such as performing remote surgery, streaming high definition movies, operating drones to deliver medical supplies, and conducting security and surveillance operations. b. 5G enables many devices to transmit data quickly to the cloud where it can be stored or analyzed, and the technology will make possible new services that can transform industries such as performing remote surgery, streaming high definition movies, operating drones to deliver medical supplies, and conducting security and surveillance operations. c. 5G enables many devices to transmit data quickly to the cloud where it can be stored or analyzed, and the technology will make possible new services that can transform industries such as performing remote surgery, streaming high definition movies, operating drones to deliver medical supplies, and conducting security and surveillance operations.

Copyright Cengage Learning. Powered by Cognero.

Page 43


Chapter 08 - Cloud Computing and the Internet of Things d. 5G enables many devices to transmit data quickly to the cloud where it can be

stored or analyzed, and the technology will make possible new services that can transform industries such as performing remote surgery, streaming high definition movies, operating drones to deliver medical supplies, and conducting security and surveillance operations.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Enabling Connectivity with 5G QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.7 - Describe how 5G networks will transform developments with IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 12:44 PM DATE MODIFIED: 6/29/2020 1:02 PM 62. New, industry-transforming services that will be made possible by 5G technology include _____. a. sensing light, pressure, and temperature b. reading e-mail using WiFi c. streaming audio to smartphones d. performing remote surgery ANSWER: d RATIONALE: 5G enables many devices to transmit data quickly to the cloud where it can be stored or analyzed, and the technology will make possible new services that can transform industries such as performing remote surgery, streaming high definition movies, operating drones to deliver medical supplies, and conducting security and surveillance operations. FEEDBACK: a. 5G enables many devices to transmit data quickly to the cloud where it can be stored or analyzed, and the technology will make possible new services that can transform industries such as performing remote surgery, streaming high definition movies, operating drones to deliver medical supplies, and conducting security and surveillance operations. b. 5G enables many devices to transmit data quickly to the cloud where it can be stored or analyzed, and the technology will make possible new services that can transform industries such as performing remote surgery, streaming high definition movies, operating drones to deliver medical supplies, and conducting security and surveillance operations. c. 5G enables many devices to transmit data quickly to the cloud where it can be stored or analyzed, and the technology will make possible new services that can transform industries such as performing remote surgery, streaming high definition movies, operating drones to deliver medical supplies, and conducting security and surveillance operations. d. 5G enables many devices to transmit data quickly to the cloud where it can be stored or analyzed, and the technology will make possible new services that can transform industries such as performing remote surgery, streaming high definition movies, operating drones to deliver medical supplies, and conducting security and surveillance operations.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Enabling Connectivity with 5G Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 44


Chapter 08 - Cloud Computing and the Internet of Things HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.7 - Describe how 5G networks will transform developments with IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 12:57 PM DATE MODIFIED: 6/29/2020 1:07 PM 63. Autonomous vehicles will rely on 5G for their _____. a. sensors b. gas mileage c. brake function d. human interaction ANSWER: a RATIONALE: Self-driving cars will rely on 5G for their sensors, which interact with other cars on the road and process traffic and mapping information in real time. FEEDBACK: a. Self-driving cars will rely on 5G for their sensors, which interact with other cars on the road and process traffic and mapping information in real time. b. Self-driving cars will rely on 5G for their sensors, which interact with other cars on the road and process traffic and mapping information in real time. c. Self-driving cars will rely on 5G for their sensors, which interact with other cars on the road and process traffic and mapping information in real time. d. Self-driving cars will rely on 5G for their sensors, which interact with other cars on the road and process traffic and mapping information in real time.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Enabling Connectivity with 5G QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.7 - Describe how 5G networks will transform developments with IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 1:02 PM DATE MODIFIED: 6/29/2020 1:13 PM 64. Mavis asks her mobile carrier's representative how the upcoming rollout of 5G technology will affect smartphones that can use it. The representative explains that smartphones that operate on 5G networks will _____. a. not support analog voice calls or text messaging b. support enhanced augmented and virtual reality experiences c. be eligible for much cheaper service plans immediately d. require more battery power because 5G is energy intensive ANSWER: b RATIONALE: Smartphones operating on 5G networks will support enhanced immersive experiences with augmented and virtual reality. FEEDBACK: a. Smartphones operating on 5G networks will support enhanced immersive experiences with augmented and virtual reality. b. Smartphones operating on 5G networks will support enhanced immersive experiences with augmented and virtual reality. c. Smartphones operating on 5G networks will support enhanced immersive

Copyright Cengage Learning. Powered by Cognero.

Page 45


Chapter 08 - Cloud Computing and the Internet of Things experiences with augmented and virtual reality.

d. Smartphones operating on 5G networks will support enhanced immersive experiences with augmented and virtual reality.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Enabling Connectivity with 5G QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.7 - Describe how 5G networks will transform developments with IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 1:08 PM DATE MODIFIED: 6/29/2020 1:22 PM 65. How can IoT devices minimize downtime in a manufacturing plant? a. by lowering unnecessary usage of electrical systems b. by eliminating the need for human technicians c. by predicting equipment failures and scheduling preventative maintenance d. by enhancing surveillance of plant hourly employees and their supervisors ANSWER: c RATIONALE: Manufacturers can use IoT devices to monitor production equipment and minimize downtime by predicting failures and scheduling necessary preventative maintenance. Organizations can also reduce energy costs by using IoT and smart building systems to monitor and control unnecessary usage of electrical systems. FEEDBACK: a. Manufacturers can use IoT devices to monitor production equipment and minimize downtime by predicting failures and scheduling necessary preventative maintenance. b. Manufacturers can use IoT devices to monitor production equipment and minimize downtime by predicting failures and scheduling necessary preventative maintenance. c. Manufacturers can use IoT devices to monitor production equipment and minimize downtime by predicting failures and scheduling necessary preventative maintenance. d. Manufacturers can use IoT devices to monitor production equipment and minimize downtime by predicting failures and scheduling necessary preventative maintenance.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Business Benefits of IoT QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.8 - Identify four benefits associated with the IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 1:23 PM DATE MODIFIED: 6/29/2020 1:41 PM 66. Dodge works for a manufacturing firm where IoT and smart building systems monitor and control the usage of electrical systems. This benefits the firm primarily through _____. Copyright Cengage Learning. Powered by Cognero.

Page 46


Chapter 08 - Cloud Computing and the Internet of Things a. improved safety b. customer profiling c. improved customer service d. reduced costs ANSWER: d RATIONALE: Organizations can reduce energy costs by using IoT and smart building systems to monitor and control unnecessary usage of electrical systems. FEEDBACK: a. Organizations can reduce energy costs by using IoT and smart building systems to monitor and control unnecessary usage of electrical systems. b. Organizations can reduce energy costs by using IoT and smart building systems to monitor and control unnecessary usage of electrical systems. c. Organizations can reduce energy costs by using IoT and smart building systems to monitor and control unnecessary usage of electrical systems. d. Organizations can reduce energy costs by using IoT and smart building systems to monitor and control unnecessary usage of electrical systems.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Business Benefits of IoT QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.8 - Identify four benefits associated with the IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 1:28 PM DATE MODIFIED: 6/29/2020 1:45 PM 67. IoT devices help organizations deepen their understanding of consumer preferences and behaviors using data from _____. a. video surveillance, social media, mobile, and Internet usage b. surveillance cameras, smart locks, and embedded wristbands c. equipment sensors and smart building systems d. mobile card readers and smart tracking systems ANSWER: a RATIONALE: Application of the IoT can deepen an organization’s understanding of consumer preferences and behaviors. The key to the success of any business, especially in the consumer goods and retail sector, is understanding customer preferences and behavior. IoT devices can collect, monitor, and analyze data from video surveillance, social media, mobile, and Internet usage. With this data, marketing analysts can predict preferences and forecast trends so that the business can design products and offer personalized value-added services for better customer engagement, with the goal of retaining target consumers and fostering brand loyalty. FEEDBACK: a. IoT devices can collect, monitor, and analyze data from video surveillance, social media, mobile, and Internet usage. With this data, marketing analysts can predict preferences and forecast trends so that the business can design products and offer personalized value-added services for better customer engagement. b. IoT devices can collect, monitor, and analyze data from video surveillance, social media, mobile, and Internet usage. With this data, marketing analysts can predict preferences and forecast trends so that the business can design products and offer personalized value-added services for better customer engagement.

Copyright Cengage Learning. Powered by Cognero.

Page 47


Chapter 08 - Cloud Computing and the Internet of Things c. IoT devices can collect, monitor, and analyze data from video surveillance, social

media, mobile, and Internet usage. With this data, marketing analysts can predict preferences and forecast trends so that the business can design products and offer personalized value-added services for better customer engagement. d. IoT devices can collect, monitor, and analyze data from video surveillance, social media, mobile, and Internet usage. With this data, marketing analysts can predict preferences and forecast trends so that the business can design products and offer personalized value-added services for better customer engagement.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Business Benefits of IoT QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.8 - Identify four benefits associated with the IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 1:41 PM DATE MODIFIED: 6/29/2020 1:52 PM 68. Why is Jan, a marketing analyst, advocating for her company's collection of more data from IoT devices? a. Jan values reduced costs more than customer engagement and retention. b. Jan hopes to use the data to predict consumer preferences and forecast trends. c. Jan would like her company to withdraw from their public cloud service arrangement. d. Jan's department has experienced several security breaches recently. ANSWER: b RATIONALE: IoT devices can collect, monitor, and analyze data from video surveillance, social media, mobile, and Internet usage. With this data, marketing analysts can predict preferences and forecast trends so that the business can design products and offer personalized value-added services for better customer engagement, with the goal of retaining target consumers and fostering brand loyalty. FEEDBACK: a. IoT devices can collect, monitor, and analyze data from video surveillance, social media, mobile, and Internet usage. With this data, marketing analysts can predict preferences and forecast trends so that the business can design products and offer personalized value-added services for better customer engagement, with the goal of retaining target consumers and fostering brand loyalty. b. IoT devices can collect, monitor, and analyze data from video surveillance, social media, mobile, and Internet usage. With this data, marketing analysts can predict preferences and forecast trends so that the business can design products and offer personalized value-added services for better customer engagement, with the goal of retaining target consumers and fostering brand loyalty. c. IoT devices can collect, monitor, and analyze data from video surveillance, social media, mobile, and Internet usage. With this data, marketing analysts can predict preferences and forecast trends so that the business can design products and offer personalized value-added services for better customer engagement, with the goal of retaining target consumers and fostering brand loyalty. d. IoT devices can collect, monitor, and analyze data from video surveillance, social media, mobile, and Internet usage. With this data, marketing analysts can predict preferences and forecast trends so that the business can design products and offer personalized value-added services for better customer engagement, with the goal of retaining target consumers and fostering brand loyalty.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 48


Chapter 08 - Cloud Computing and the Internet of Things DIFFICULTY: Easy REFERENCES: Business Benefits of IoT QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.8 - Identify four benefits associated with the IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 1:45 PM DATE MODIFIED: 6/29/2020 2:03 PM 69. Examples of the application of the IoT to improve customer service and experience include _____. a. mobile card readers and smart trackers b. sensors embedded in helmets and wristbands c. sensors attached to conveyor lines d. video and social media surveillance ANSWER: a RATIONALE: Mobile card readers that can connect to smartphones to process transactions and smart trackers that enable consumers to keep track of their shipped products can improve customer experience and overall satisfaction. FEEDBACK: a. Mobile card readers that can connect to smartphones to process transactions and smart trackers that enable consumers to keep track of their shipped products can improve customer experience and overall satisfaction. b. Mobile card readers that can connect to smartphones to process transactions and smart trackers that enable consumers to keep track of their shipped products can improve customer experience and overall satisfaction. c. Mobile card readers that can connect to smartphones to process transactions and smart trackers that enable consumers to keep track of their shipped products can improve customer experience and overall satisfaction. d. Mobile card readers that can connect to smartphones to process transactions and smart trackers that enable consumers to keep track of their shipped products can improve customer experience and overall satisfaction.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Business Benefits of IoT QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.8 - Identify four benefits associated with the IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 1:52 PM DATE MODIFIED: 6/29/2020 2:08 PM 70. Ryan's power goes out while he is watching his favorite sport, but comes back on within 10 minutes. This is because his electrical utilities provider used sensor data to predict when a local power line was about to fail and took quick corrective action. This is an example of which benefit of the application of IoT to an organization? a. reduced costs to achieve a competitive advantage b. deeper understanding of consumer preferences and behaviors c. improved workplace safety d. improved customer service and experience Copyright Cengage Learning. Powered by Cognero.

Page 49


Chapter 08 - Cloud Computing and the Internet of Things ANSWER: RATIONALE:

d Superior customer service is a key factor in ensuring the success of any service. For example, IoT sensors are used extensively in the utilities industry to capture operational data to achieve 24/7 uptime. Sensor data is carefully analyzed to predict when critical pieces of equipment or power lines are about to fail so that quick, anticipatory corrective action can take place before any failure.

FEEDBACK:

a. Superior customer service is a key factor in ensuring the success of any service. For example, IoT sensors are used extensively in the utilities industry to capture operational data to achieve 24/7 uptime. Sensor data is carefully analyzed to predict when critical pieces of equipment or power lines are about to fail so that quick, anticipatory corrective action can take place before any failure. b. Superior customer service is a key factor in ensuring the success of any service. For example, IoT sensors are used extensively in the utilities industry to capture operational data to achieve 24/7 uptime. Sensor data is carefully analyzed to predict when critical pieces of equipment or power lines are about to fail so that quick, anticipatory corrective action can take place before any failure. c. Superior customer service is a key factor in ensuring the success of any service. For example, IoT sensors are used extensively in the utilities industry to capture operational data to achieve 24/7 uptime. Sensor data is carefully analyzed to predict when critical pieces of equipment or power lines are about to fail so that quick, anticipatory corrective action can take place before any failure. d. Superior customer service is a key factor in ensuring the success of any service. For example, IoT sensors are used extensively in the utilities industry to capture operational data to achieve 24/7 uptime. Sensor data is carefully analyzed to predict when critical pieces of equipment or power lines are about to fail so that quick, anticipatory corrective action can take place before any failure.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Business Benefits of IoT QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.8 - Identify four benefits associated with the IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 2:03 PM DATE MODIFIED: 6/29/2020 2:13 PM 71. Which IoT devices can be used to improve workplace safety in mining, heavy industries, and construction? a. smart building systems b. social media, mobile, and Internet usage surveillance c. safety helmets and wristbands embedded with sensors d. video surveillance cameras and smart locks ANSWER: c RATIONALE: IoT devices can help employers ensure worker safety and enhance overall workplace security. With sensors embedded in safety helmets and wristbands, workers in high-risk environments such as mining, heavy industries, and construction can be continuously monitored to guard against potential injuries and exhaustion. FEEDBACK: a. With sensors embedded in safety helmets and wristbands, workers in high-risk environments such as mining, heavy industries, and construction can be continuously monitored to guard against potential injuries and exhaustion.

Copyright Cengage Learning. Powered by Cognero.

Page 50


Chapter 08 - Cloud Computing and the Internet of Things b. With sensors embedded in safety helmets and wristbands, workers in high-risk environments such as mining, heavy industries, and construction can be continuously monitored to guard against potential injuries and exhaustion. c. With sensors embedded in safety helmets and wristbands, workers in high-risk environments such as mining, heavy industries, and construction can be continuously monitored to guard against potential injuries and exhaustion. d. With sensors embedded in safety helmets and wristbands, workers in high-risk environments such as mining, heavy industries, and construction can be continuously monitored to guard against potential injuries and exhaustion.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Business Benefits of IoT QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.8 - Identify four benefits associated with the IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 2:08 PM DATE MODIFIED: 6/29/2020 2:18 PM 72. Annie, who works for a banking organization, recommends that her employers utilize the IoT in the form of video surveillance cameras and smart locks. Which business benefit of the IoT does Annie probably think they will gain from this change? a. increased customer retention and brand loyalty b. reduced downtime and energy costs c. safety of the premises and their physical and digital assets d. greater customer satisfaction and better online reviews ANSWER: c RATIONALE: IoT devices can help employers ensure worker safety and enhance overall workplace security. Organizations can employ video surveillance cameras and smart locks to monitor office premises and ensure the protection of important assets. FEEDBACK: a. Organizations can employ video surveillance cameras and smart locks to monitor office premises and ensure the protection of important assets. b. Organizations can employ video surveillance cameras and smart locks to monitor office premises and ensure the protection of important assets. c. Organizations can employ video surveillance cameras and smart locks to monitor office premises and ensure the protection of important assets. d. Organizations can employ video surveillance cameras and smart locks to monitor office premises and ensure the protection of important assets.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Business Benefits of IoT QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.8 - Identify four benefits associated with the IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 2:14 PM DATE MODIFIED: 6/29/2020 2:26 PM Copyright Cengage Learning. Powered by Cognero.

Page 51


Chapter 08 - Cloud Computing and the Internet of Things 73. Which type of IoT application performs predictive analysis and initiates preemptive action using sensor data augmented with external data? a. connect and monitor b. control and react c. predict and adapt d. transform and explore ANSWER: c RATIONALE: IoT applications can be classified into one of four types based on their degree of sensing and degree of action. With predict and adapt applications, external data is used to augment sensor data, and the data is used to perform predictive analysis and initiate preemptive action. FEEDBACK: a. With predict and adapt applications, external data is used to augment sensor data, and the data is used to perform predictive analysis and initiate preemptive action. b. With predict and adapt applications, external data is used to augment sensor data, and the data is used to perform predictive analysis and initiate preemptive action. c. With predict and adapt applications, external data is used to augment sensor data, and the data is used to perform predictive analysis and initiate preemptive action. d. With predict and adapt applications, external data is used to augment sensor data, and the data is used to perform predictive analysis and initiate preemptive action.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Types of IoT Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.9 - State the degree of sensing and the degree of action associated with four types of IoT applications. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 2:44 PM DATE MODIFIED: 6/29/2020 3:05 PM 74. Which type of IoT application relies on individual devices that each gather a small amount of data and enables manual monitoring using simple threshold-based exception alerting? a. connect and monitor b. control and react c. predict and adapt d. transform and explore ANSWER: a RATIONALE: IoT applications can be classified into one of four types based on their degree of sensing and degree of action. With connect and monitor applications, individual devices each gather a small amount of data; this enables manual monitoring using simple threshold-based exception alerting. FEEDBACK: a. With connect and monitor applications, individual devices each gather a small amount of data; this enables manual monitoring using simple threshold-based exception alerting.

Copyright Cengage Learning. Powered by Cognero.

Page 52


Chapter 08 - Cloud Computing and the Internet of Things b. With connect and monitor applications, individual devices each gather a small

amount of data; this enables manual monitoring using simple threshold-based exception alerting. c. With connect and monitor applications, individual devices each gather a small amount of data; this enables manual monitoring using simple threshold-based exception alerting. d. With connect and monitor applications, individual devices each gather a small amount of data; this enables manual monitoring using simple threshold-based exception alerting.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Types of IoT Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.9 - State the degree of sensing and the degree of action associated with four types of IoT applications. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 2:57 PM DATE MODIFIED: 6/29/2020 3:08 PM 75. Which type of IoT application assists with the creation of new business models, products, and services through the combination of sensor data and external data to provide new insights? a. connect and monitor b. control and react c. predict and adapt d. transform and explore ANSWER: d RATIONALE: IoT applications can be classified into one of four types based on their degree of sensing and degree of action. With transform and explore applications, sensor data combined with external data is used to provide new insights; new business models, products, and services are created. FEEDBACK: a. With transform and explore applications, sensor data combined with external data is used to provide new insights; new business models, products, and services are created. b. With transform and explore applications, sensor data combined with external data is used to provide new insights; new business models, products, and services are created. c. With transform and explore applications, sensor data combined with external data is used to provide new insights; new business models, products, and services are created. d. With transform and explore applications, sensor data combined with external data is used to provide new insights; new business models, products, and services are created.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Easy Types of IoT Applications Multiple Choice False

Copyright Cengage Learning. Powered by Cognero.

Page 53


Chapter 08 - Cloud Computing and the Internet of Things LEARNING OBJECTIVES: POIS.14e.8.9 - State the degree of sensing and the degree of action associated with four types of IoT applications. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 3:05 PM DATE MODIFIED: 6/29/2020 3:11 PM 76. Which type of IoT application enables automatic monitoring combined with remote control, trend analysis, and reporting by using individual devices that each gather a small amount of data? a. connect and monitor b. control and react c. predict and adapt d. transform and explore ANSWER: b RATIONALE: IoT applications can be classified into one of four types based on their degree of sensing and degree of action. With control and react applications, individual devices each gather a small amount of data, and automatic monitoring is combined with remote control with trend analysis and reporting. FEEDBACK: a. With control and react applications, individual devices each gather a small amount of data, and automatic monitoring is combined with remote control with trend analysis and reporting. b. With control and react applications, individual devices each gather a small amount of data, and automatic monitoring is combined with remote control with trend analysis and reporting. c. With control and react applications, individual devices each gather a small amount of data, and automatic monitoring is combined with remote control with trend analysis and reporting. d. With control and react applications, individual devices each gather a small amount of data, and automatic monitoring is combined with remote control with trend analysis and reporting.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Types of IoT Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.9 - State the degree of sensing and the degree of action associated with four types of IoT applications. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 3:09 PM DATE MODIFIED: 6/29/2020 3:14 PM 77. Compology's dumpster-monitoring software uses data from garbage container sensors plus external data to determine when dumpsters need service and alert sanitation workers so they can take preemptive action. Which type of IoT application is this? a. connect and monitor b. control and react c. predict and adapt d. transform and explore Copyright Cengage Learning. Powered by Cognero.

Page 54


Chapter 08 - Cloud Computing and the Internet of Things ANSWER: RATIONALE:

FEEDBACK:

c With predict and adapt applications, external data is used to augment sensor data, and the data is used to perform predictive analysis and initiate preemptive action. Compology is a company that provides dumpster-monitoring software for waste haulers to streamline their operations and improve customer service. The software is powered by camera-based sensors and GPS devices that track garbage container fullness, location, and motion. Drivers are equipped with tablets with customized apps that provide real-time data on trash containers in need of service, as well as the fastest routes to do it. a. With predict and adapt applications, external data is used to augment sensor

data, and the data is used to perform predictive analysis and initiate preemptive action. Compology is a company that provides dumpster-monitoring software for waste haulers to streamline their operations and improve customer service. The software is powered by camera-based sensors and GPS devices that track garbage container fullness, location, and motion. Drivers are equipped with tablets with customized apps that provide real-time data on trash containers in need of service, as well as the fastest routes to do it. b. With predict and adapt applications, external data is used to augment sensor data, and the data is used to perform predictive analysis and initiate preemptive action. Compology is a company that provides dumpster-monitoring software for waste haulers to streamline their operations and improve customer service. The software is powered by camera-based sensors and GPS devices that track garbage container fullness, location, and motion. Drivers are equipped with tablets with customized apps that provide real-time data on trash containers in need of service, as well as the fastest routes to do it. c. With predict and adapt applications, external data is used to augment sensor data, and the data is used to perform predictive analysis and initiate preemptive action. Compology is a company that provides dumpster-monitoring software for waste haulers to streamline their operations and improve customer service. The software is powered by camera-based sensors and GPS devices that track garbage container fullness, location, and motion. Drivers are equipped with tablets with customized apps that provide real-time data on trash containers in need of service, as well as the fastest routes to do it. d. With predict and adapt applications, external data is used to augment sensor data, and the data is used to perform predictive analysis and initiate preemptive action. Compology is a company that provides dumpster-monitoring software for waste haulers to streamline their operations and improve customer service. The software is powered by camera-based sensors and GPS devices that track garbage container fullness, location, and motion. Drivers are equipped with tablets with customized apps that provide real-time data on trash containers in need of service, as well as the fastest routes to do it.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Types of IoT Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.9 - State the degree of sensing and the degree of action associated with four types of IoT applications. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 3:11 PM DATE MODIFIED: 6/29/2020 3:23 PM 78. Pharmaceutical companies can use battery-powered sensors and either 4G or 5G connectivity to monitor their products Copyright Cengage Learning. Powered by Cognero.

Page 55


Chapter 08 - Cloud Computing and the Internet of Things for damaging temperature changes during shipment. What type of IoT application is this? a. connect and monitor b. control and react c. predict and adapt d. transform and explore ANSWER: a RATIONALE: With connect and monitor applications, individual devices each gather a small amount of data; this enables manual monitoring using simple threshold-based exception alerting. Food and drug manufacturers can monitor shipping containers for changes in temperatures that could affect product quality and safety using inexpensive battery-powered sensors and 4G LTE or 5G connectivity. FEEDBACK: a. With connect and monitor applications, individual devices each gather a small amount of data; this enables manual monitoring using simple threshold-based exception alerting. Food and drug manufacturers can monitor shipping containers for changes in temperatures that could affect product quality and safety using inexpensive battery-powered sensors and 4G LTE or 5G connectivity. b. With connect and monitor applications, individual devices each gather a small amount of data; this enables manual monitoring using simple threshold-based exception alerting. Food and drug manufacturers can monitor shipping containers for changes in temperatures that could affect product quality and safety using inexpensive battery-powered sensors and 4G LTE or 5G connectivity. c. With connect and monitor applications, individual devices each gather a small amount of data; this enables manual monitoring using simple threshold-based exception alerting. Food and drug manufacturers can monitor shipping containers for changes in temperatures that could affect product quality and safety using inexpensive battery-powered sensors and 4G LTE or 5G connectivity. d. With connect and monitor applications, individual devices each gather a small amount of data; this enables manual monitoring using simple threshold-based exception alerting. Food and drug manufacturers can monitor shipping containers for changes in temperatures that could affect product quality and safety using inexpensive battery-powered sensors and 4G LTE or 5G connectivity.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Types of IoT Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.9 - State the degree of sensing and the degree of action associated with four types of IoT applications. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 3:16 PM DATE MODIFIED: 6/29/2020 3:28 PM 79. Retailers can automatically monitor customers while they are shopping, analyze trends, and send them customized offers by using streaming data from sensors that detect the customers' behavior. What type of IoT application is this? a. connect and monitor b. control and react c. predict and adapt d. transform and explore ANSWER: b Copyright Cengage Learning. Powered by Cognero.

Page 56


Chapter 08 - Cloud Computing and the Internet of Things RATIONALE:

FEEDBACK:

With control and react applications, individual devices each gather a small amount of data, and automatic monitoring is combined with remote control with trend analysis and reporting. Retailers use sensors to detect the in-store behavior of customers, allowing them to optimize the shopping experience to increase revenue and market share. Streaming data from sensors is analyzed along with other information, including inventory data, social media chatter, and online-shop user profiles, to send customized offers to shoppers while they are in the process of making a purchase decision. a. With control and react applications, individual devices each gather a small

amount of data, and automatic monitoring is combined with remote control with trend analysis and reporting. Retailers use sensors to detect the in-store behavior of customers. Streaming data from sensors is analyzed along with other information, including inventory data, social media chatter, and online-shop user profiles, to send customized offers to shoppers while they are in the process of making a purchase decision. b. With control and react applications, individual devices each gather a small amount of data, and automatic monitoring is combined with remote control with trend analysis and reporting. Retailers use sensors to detect the in-store behavior of customers. Streaming data from sensors is analyzed along with other information, including inventory data, social media chatter, and online-shop user profiles, to send customized offers to shoppers while they are in the process of making a purchase decision. c. With control and react applications, individual devices each gather a small amount of data, and automatic monitoring is combined with remote control with trend analysis and reporting. Retailers use sensors to detect the in-store behavior of customers. Streaming data from sensors is analyzed along with other information, including inventory data, social media chatter, and online-shop user profiles, to send customized offers to shoppers while they are in the process of making a purchase decision. d. With control and react applications, individual devices each gather a small amount of data, and automatic monitoring is combined with remote control with trend analysis and reporting. Retailers use sensors to detect the in-store behavior of customers. Streaming data from sensors is analyzed along with other information, including inventory data, social media chatter, and online-shop user profiles, to send customized offers to shoppers while they are in the process of making a purchase decision.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Types of IoT Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.9 - State the degree of sensing and the degree of action associated with four types of IoT applications. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 3:23 PM DATE MODIFIED: 6/29/2020 3:34 PM 80. One drawback with relying on IoT applications to maintain the safety of critical systems is that _____. a. they only detect patterns or problems as they occur b. they may analyze data immediately as it streams into the cloud c. it is impossible to detect faulty sensor data automatically d. a poor or absent network connection can result in missing data Copyright Cengage Learning. Powered by Cognero.

Page 57


Chapter 08 - Cloud Computing and the Internet of Things ANSWER: RATIONALE:

FEEDBACK:

d Unfortunately, there can be many issues with the receipt and usability of sensor data. Sometimes a faulty sensor or bad network connection results in missing data or sensor data that lacks a time stamp indicating when the reading occurred. a. There can be many issues with the receipt and usability of sensor data.

Sometimes a faulty sensor or bad network connection results in missing data or sensor data that lacks a time stamp indicating when the reading occurred. b. There can be many issues with the receipt and usability of sensor data. Sometimes a faulty sensor or bad network connection results in missing data or sensor data that lacks a time stamp indicating when the reading occurred. c. There can be many issues with the receipt and usability of sensor data. Sometimes a faulty sensor or bad network connection results in missing data or sensor data that lacks a time stamp indicating when the reading occurred. d. There can be many issues with the receipt and usability of sensor data. Sometimes a faulty sensor or bad network connection results in missing data or sensor data that lacks a time stamp indicating when the reading occurred.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Potential Issues with IoT Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.10 - Identify two potential issues associated with the expansion of the IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 3:40 PM DATE MODIFIED: 6/29/2020 3:55 PM 81. Eleanor realizes that the data coming from two of her firm's IoT devices is incomplete and includes inconsistent values. What is the most likely cause of this problem? a. faulty sensors b. long-term network outage c. DoS attack d. vendor lock-in ANSWER: a RATIONALE: Unfortunately, there can be many issues with the receipt and usability of sensor data. Sometimes a faulty sensor or bad network connection results in missing data or sensor data that lacks a time stamp indicating when the reading occurred. As a result, sensor data can be incomplete or contain inconsistent values, indicating a potential sensor failure or a drop in a network. FEEDBACK: a. Sometimes a faulty sensor or bad network connection results in missing data or sensor data that lacks a time stamp indicating when the reading occurred. As a result, sensor data can be incomplete or contain inconsistent values, indicating a potential sensor failure or a drop in a network. b. Sometimes a faulty sensor or bad network connection results in missing data or sensor data that lacks a time stamp indicating when the reading occurred. As a result, sensor data can be incomplete or contain inconsistent values, indicating a potential sensor failure or a drop in a network. c. Sometimes a faulty sensor or bad network connection results in missing data or sensor data that lacks a time stamp indicating when the reading occurred. As a result, sensor data can be incomplete or contain inconsistent values, indicating a

Copyright Cengage Learning. Powered by Cognero.

Page 58


Chapter 08 - Cloud Computing and the Internet of Things potential sensor failure or a drop in a network.

d. Sometimes a faulty sensor or bad network connection results in missing data or

sensor data that lacks a time stamp indicating when the reading occurred. As a result, sensor data can be incomplete or contain inconsistent values, indicating a potential sensor failure or a drop in a network.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Potential Issues with IoT Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.10 - Identify two potential issues associated with the expansion of the IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 3:42 PM DATE MODIFIED: 6/29/2020 4:04 PM 82. Security is a serious issue with IoT applications because _____. a. hackers find cutting-edge technologies especially attractive targets b. they can expose internal systems to hacking, viruses, and malware c. sensor data can be incomplete or contain inconsistent values d. connect and monitor devices only produce simple threshold-based alerts ANSWER: b RATIONALE: Security is a very major issue with IoT applications. In today’s manufacturing environment, the factory network is a closed environment designed to communicate with plant sensors and devices but not typically with the outside world. So, there is a key decision that organizations must make when considering implementation of an IoT: Are the benefits of doing so sufficient to overcome the risk of making detailed company information accessible through the Internet and exposing internal systems to hacking, viruses, and destructive malware? FEEDBACK: a. Security is a very major issue with IoT applications. There is a key decision that organizations must make when considering implementation of an IoT: Are the benefits of doing so sufficient to overcome the risk of making detailed company information accessible through the Internet and exposing internal systems to hacking, viruses, and destructive malware? b. Security is a very major issue with IoT applications. There is a key decision that organizations must make when considering implementation of an IoT: Are the benefits of doing so sufficient to overcome the risk of making detailed company information accessible through the Internet and exposing internal systems to hacking, viruses, and destructive malware? c. Security is a very major issue with IoT applications. There is a key decision that organizations must make when considering implementation of an IoT: Are the benefits of doing so sufficient to overcome the risk of making detailed company information accessible through the Internet and exposing internal systems to hacking, viruses, and destructive malware? d. Security is a very major issue with IoT applications. There is a key decision that organizations must make when considering implementation of an IoT: Are the benefits of doing so sufficient to overcome the risk of making detailed company information accessible through the Internet and exposing internal systems to hacking, viruses, and destructive malware?

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 59


Chapter 08 - Cloud Computing and the Internet of Things REFERENCES: Potential Issues with IoT Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.10 - Identify two potential issues associated with the expansion of the IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 3:57 PM DATE MODIFIED: 6/29/2020 4:11 PM 83. Can hackers who gain access to an organization's IoT cause physical damage? a. no, because IoT devices only send, not receive, data b. no, because physical devices are controlled manually c. yes, by tampering with critical infrastructure d. yes, by infiltrating the public cloud ANSWER: c RATIONALE: Hackers who gain access to an organization’s IoT can steal data, transfer money out of accounts, and shut down Web sites. They can also wreck physical havoc by tampering with critical infrastructure such as air traffic control systems, health care devices, power grids, and supervisory control and data acquisition (SCADA) systems. FEEDBACK: a. Hackers can wreck physical havoc by tampering with critical infrastructure such as air traffic control systems, health care devices, power grids, and supervisory control and data acquisition (SCADA) systems. b. Hackers can wreck physical havoc by tampering with critical infrastructure such as air traffic control systems, health care devices, power grids, and supervisory control and data acquisition (SCADA) systems. c. Hackers can wreck physical havoc by tampering with critical infrastructure such as air traffic control systems, health care devices, power grids, and supervisory control and data acquisition (SCADA) systems. d. Hackers can wreck physical havoc by tampering with critical infrastructure such as air traffic control systems, health care devices, power grids, and supervisory control and data acquisition (SCADA) systems.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Potential Issues with IoT Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.10 - Identify two potential issues associated with the expansion of the IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 3:57 PM DATE MODIFIED: 6/29/2020 4:18 PM 84. One of the first things developers of IoT applications should focus on is _____. a. reducing sensor costs b. creation of new business models c. maximizing 5G network use d. building in security from the start ANSWER: d Copyright Cengage Learning. Powered by Cognero.

Page 60


Chapter 08 - Cloud Computing and the Internet of Things RATIONALE:

One of the first things developers of IoT applications should focus on is building in security from the start. This needs to include ways of updating the system in a secure manner.

FEEDBACK:

a. One of the first things developers of IoT applications should focus on is building in security from the start. This needs to include ways of updating the system in a secure manner. b. One of the first things developers of IoT applications should focus on is building in security from the start. This needs to include ways of updating the system in a secure manner. c. One of the first things developers of IoT applications should focus on is building in security from the start. This needs to include ways of updating the system in a secure manner. d. One of the first things developers of IoT applications should focus on is building in security from the start. This needs to include ways of updating the system in a secure manner.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Potential Issues with IoT Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.10 - Identify two potential issues associated with the expansion of the IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 3:57 PM DATE MODIFIED: 6/29/2020 4:37 PM 85. Claudette is shocked to discover that her company's data has been stolen, and their Web site shut down, by a malicious ex-employee. She had thought their security was airtight! Two recent changes they made were migrating their database to a private, on-premises cloud and installing IoT devices that communicate with the database continually. What most likely occurred? a. The ex-employee hacked into their private cloud through another tenant's account. b. The ex-employee gained access through their IaaS provider. c. The ex-employee hacked Claudette's company's IoT to gain access. d. The ex-employee broke into their office without leaving a physical trace. ANSWER: c RATIONALE: There is a key decision that organizations must make when considering implementation of an IoT: Are the benefits of doing so sufficient to overcome the risk of making detailed company information accessible through the Internet and exposing internal systems to hacking, viruses, and destructive malware? Hackers who gain access to an organization’s IoT can steal data, transfer money out of accounts, and shut down Web sites. FEEDBACK: a. There is a key decision that organizations must make when considering implementation of an IoT: Are the benefits of doing so sufficient to overcome the risk of making detailed company information accessible through the Internet and exposing internal systems to hacking, viruses, and destructive malware? Hackers who gain access to an organization’s IoT can steal data, transfer money out of accounts, and shut down Web sites. b. There is a key decision that organizations must make when considering implementation of an IoT: Are the benefits of doing so sufficient to overcome the risk of making detailed company information accessible through the Internet and exposing internal systems to hacking, viruses, and destructive malware? Hackers who gain access to an organization’s IoT can steal data, transfer money out of accounts, and shut down Web sites.

Copyright Cengage Learning. Powered by Cognero.

Page 61


Chapter 08 - Cloud Computing and the Internet of Things c. There is a key decision that organizations must make when considering

implementation of an IoT: Are the benefits of doing so sufficient to overcome the risk of making detailed company information accessible through the Internet and exposing internal systems to hacking, viruses, and destructive malware? Hackers who gain access to an organization’s IoT can steal data, transfer money out of accounts, and shut down Web sites. d. There is a key decision that organizations must make when considering implementation of an IoT: Are the benefits of doing so sufficient to overcome the risk of making detailed company information accessible through the Internet and exposing internal systems to hacking, viruses, and destructive malware? Hackers who gain access to an organization’s IoT can steal data, transfer money out of accounts, and shut down Web sites.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Potential Issues with IoT Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.8.10 - Identify two potential issues associated with the expansion of the IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 3:57 PM DATE MODIFIED: 6/29/2020 4:33 PM Essay 86. Define cloud computing and identify the business benefits of public cloud computing. ANSWER: Cloud computing refers to a computing environment where software and storage are provided as an Internet service and accessed by users with a Web browser. Public cloud computing offers three key benefits to organizations—reduced costs, flexible computing capacity, and increased redundancy in the event of disaster. With public cloud computing, organizations avoid large, up-front investments in hardware. Public cloud computing can also lower the ongoing investment in the people and other resources required to manage that hardware. Organizations can request just the right type and capacity of information system resources from their cloud computing provider, pay for it on an ongoing basis, and let the service provider handle the system support and maintenance.

RATIONALE:

Public cloud service providers operate multiple data centers distributed geographically. They also save multiple copies of tenants’ data on different machines. This redundancy ensures that the tenants’ information and the service provider’s processing power remain available with minimal interruption. Cloud computing refers to a computing environment where software and storage are provided as an Internet service and accessed by users with a Web browser. Public cloud computing offers three key benefits to organizations—reduced costs, flexible computing capacity, and increased redundancy in the event of disaster. With public cloud computing, organizations avoid large, up-front investments in hardware. Public cloud computing can also lower the ongoing investment in the people and other resources required to manage that hardware. Organizations can request just the right type and capacity of information system resources from their cloud computing provider, pay for it on an ongoing basis, and let the service provider handle the system support and maintenance. Public cloud service providers operate multiple data centers distributed geographically. They also save multiple copies of tenants’ data on different machines. This redundancy ensures

Copyright Cengage Learning. Powered by Cognero.

Page 62


Chapter 08 - Cloud Computing and the Internet of Things

POINTS: RUBRIC:

that the tenants’ information and the service provider’s processing power remain available with minimal interruption. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Defines the term "cloud computing" Lists three major benefits of public cloud computing for businesses

DIFFICULTY: Moderate REFERENCES: Cloud Computing QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.8.2 - Identify three key benefits associated with cloud computing. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Understand DATE CREATED: 11/19/2019 6:00 PM DATE MODIFIED: 6/27/2020 10:04 AM 87. What are four common problems encountered by organizations as they make the transition to public cloud computing? List and briefly describe them. ANSWER: Complex pricing arrangements. Cloud computing arrangements can be lengthy and complex, and they are often subject to more than one interpretation. Wide variations in performance over time. Cloud service provider performance issues can result in wide variations in performance over time and greater than expected downtime for tenants. Tenants rely on the service provider to provide the valuable capability of quickly ramping up or down the amount of computing capacity made available to them. Failure to respond quickly to a capacity change request can greatly reduce the value of cloud computing. In addition, the service provider’s disaster recovery capabilities must be adequate to meet each tenant’s needs. Inadequate data security. Data security is another key concern when using a public cloud computing service because you are relying on someone else to safeguard your data, which may even reside on the same storage device as data from another organization (perhaps even a competitor). Organizations subject to complex regulatory requirements (e.g., financial, health care, and public utility organizations) must ensure that their own processes and applications—as well as those of the cloud provider—are compliant with those regulations. Vendor lock-in. A major start-up issue that organizations should also consider is the amount of effort involved in moving to the cloud in the first place. This introduces the issue of vendor lock-in—meaning once an organization has gone through the effort required to transition its infrastructure and/or data to a public cloud provider, it will likely be very reluctant to go through the time-consuming migration process a second time, even if concerns arise with the vendor they are working with. Copyright Cengage Learning. Powered by Cognero.

Page 63


Chapter 08 - Cloud Computing and the Internet of Things RATIONALE:

Companies contemplating moving to the cloud are advised to proceed carefully, as organizations frequently encounter major challenges during the transition. Common problems include complex pricing arrangements, wide variations in performance over time, inadequate data security, and vendor lock-in. Complex pricing arrangements. Cloud computing arrangements can be lengthy and complex, and they are often subject to more than one interpretation. Organizations are advised to use experienced legal, purchasing, and IS resources to review and modify, where necessary, a cloud service provider’s standard contract. Failure to do so may result in unexpected costs that reduce the expected cost savings. Wide variations in performance over time. Cloud service provider performance issues can result in wide variations in performance over time and greater than expected downtime for tenants. Tenants rely on the service provider to provide the valuable capability of quickly ramping up or down the amount of computing capacity made available to them. Failure to respond quickly to a capacity change request can greatly reduce the value of cloud computing. In addition, the service provider’s disaster recovery capabilities must be adequate to meet each tenant’s needs. A loss of capability for anything longer than a few minutes may be disastrous to tenants who are running mission-critical applications in the cloud, and it may quickly impact their revenue-generation and customer service capabilities. Inadequate data security. Data security is another key concern when using a public cloud computing service because you are relying on someone else to safeguard your data, which may even reside on the same storage device as data from another organization (perhaps even a competitor). All these potential issues must be investigated fully before entering into a public cloud computing arrangement. Organizations subject to complex regulatory requirements (e.g., financial, health care, and public utility organizations) must ensure that their own processes and applications—as well as those of the cloud provider—are compliant with those regulations.

POINTS: RUBRIC:

Vendor lock-in. A major start-up issue that organizations should also consider is the amount of effort involved in moving to the cloud in the first place. This introduces the issue of vendor lock-in—meaning once an organization has gone through the effort required to transition its infrastructure and/or data to a public cloud provider, it will likely be very reluctant to go through the time-consuming migration process a second time, even if concerns arise with the vendor they are working with. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Names four common issues with public cloud computing Briefly describes each of the four issues

DIFFICULTY: Moderate REFERENCES: Public Cloud Computing QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic Copyright Cengage Learning. Powered by Cognero.

Page 64


Chapter 08 - Cloud Computing and the Internet of Things LEARNING OBJECTIVES: POIS.14e.8.3 - Summarize four common issues organizations encounter when moving to public cloud computing. KEYWORDS: Bloom's: Remember DATE CREATED: 6/27/2020 4:11 PM DATE MODIFIED: 6/27/2020 4:18 PM 88. What is a hybrid cloud environment, and what advantages does this form of cloud computer provide? ANSWER: A hybrid cloud computing environment is composed of both public and private clouds, integrated through a private network. Organizations typically use the public cloud to run applications with less sensitive security requirements and highly fluctuating capacity needs, but run more critical applications, such as those with significant compliance requirements, on the private portion of their hybrid cloud.

RATIONALE:

POINTS: RUBRIC:

Hybrid cloud computing provides flexibility, scalability, and cost efficiency with low security risks. As computing and processing demands rise and fall, a hybrid environment allows businesses to scale their in-house computing infrastructure to the public cloud to handle any additional demand for resources. Data and applications can be shared between the two clouds, as organizations use the public cloud for basic tasks while keeping sensitive data and applications on premises behind a firewall. Companies pay only for the additional resources they use during peak times rather than having to purchase, configure, and maintain additional servers needed to handle temporary computing demands. A hybrid cloud computing environment is composed of both public and private clouds, integrated through a private network. Organizations typically use the public cloud to run applications with less sensitive security requirements and highly fluctuating capacity needs, but run more critical applications, such as those with significant compliance requirements, on the private portion of their hybrid cloud. Hybrid cloud computing provides flexibility, scalability, and cost efficiency with low security risks. As computing and processing demands rise and fall, a hybrid environment allows businesses to scale their in-house computing infrastructure to the public cloud to handle any additional demand for resources. Data and applications can be shared between the two clouds, as organizations use the public cloud for basic tasks while keeping sensitive data and applications on premises behind a firewall. Companies pay only for the additional resources they use during peak times rather than having to purchase, configure, and maintain additional servers needed to handle temporary computing demands. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Defines the term "hybrid cloud computing environment" Describes the advantages of this cloud computing approach

DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

Moderate Hybrid Cloud Computing Essay False

Copyright Cengage Learning. Powered by Cognero.

Page 65


Chapter 08 - Cloud Computing and the Internet of Things STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.8.4 - Discuss the pros and cons of public, private, and hybrid cloud computing. KEYWORDS: Bloom's: Understand DATE CREATED: 6/28/2020 5:44 AM DATE MODIFIED: 6/28/2020 5:51 AM 89. What are the four major classifications of IoT applications, and what are the two major criteria used to distinguish them? Briefly describe each type. ANSWER: IoT applications can be classified into one of four types based on their degree of sensing and degree of action. With connect and monitor applications, individual devices each gather a small amount of data; this enables manual monitoring using simple threshold-based exception alerting. With control and react applications, individual devices each gather a small amount of data, and automatic monitoring is combined with remote control with trend analysis and reporting. With predict and adapt applications, external data is used to augment sensor data, and the data is used to perform predictive analysis and initiate preemptive action. With transform and explore applications, sensor data combined with external data is used to provide new insights; new business models, products, and services are created. RATIONALE: IoT applications can be classified into one of four types based on their degree of sensing and degree of action. With connect and monitor applications, individual devices each gather a small amount of data; this enables manual monitoring using simple threshold-based exception alerting. With control and react applications, individual devices each gather a small amount of data, and automatic monitoring is combined with remote control with trend analysis and reporting. With predict and adapt applications, external data is used to augment sensor data, and the data is used to perform predictive analysis and initiate preemptive action. With transform and explore applications, sensor data combined with external data is used to provide new insights; new business models, products, and services are created. POINTS: 1 RUBRIC: 0 1 2 3 4 Criteria

Failure

Below Expectations

Developing

Competent

Mastery

Lists four types of Internet of Things applications Names two criteria used to classify Internet of Things applications Briefly describes each of the four types of Internet of Things applications

DIFFICULTY: Moderate REFERENCES: Types of IoT Applications QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.8.9 - State the degree of sensing and the degree of action associated with four types of IoT applications. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 66


Chapter 08 - Cloud Computing and the Internet of Things DATE CREATED: DATE MODIFIED:

6/29/2020 3:35 PM 6/29/2020 3:39 PM

90. Briefly discuss two significant potential issues associated with the expansion of the IoT. ANSWER: Unfortunately, there can be many issues with the receipt and usability of sensor data. Sometimes a faulty sensor or bad network connection results in missing data or sensor data that lacks a time stamp indicating when the reading occurred. As a result, sensor data can be incomplete or contain inconsistent values, indicating a potential sensor failure or a drop in a network. Developers of IoT systems must be prepared for and be able to detect faulty sensor data.

RATIONALE:

POINTS: RUBRIC:

Security is a very major issue with IoT applications. In today’s manufacturing environment, the factory network is a closed environment designed to communicate with plant sensors and devices but not typically with the outside world. So, there is a key decision that organizations must make when considering implementation of an IoT: Are the benefits of doing so sufficient to overcome the risk of making detailed company information accessible through the Internet and exposing internal systems to hacking, viruses, and destructive malware? Hackers who gain access to an organization’s IoT can steal data, transfer money out of accounts, and shut down Web sites. They can also wreck physical havoc by tampering with critical infrastructure such as air traffic control systems, health care devices, power grids, and supervisory control and data acquisition (SCADA) systems. One of the first things developers of IoT applications should focus on is building in security from the start. This needs to include ways of updating the system in a secure manner. Unfortunately, there can be many issues with the receipt and usability of sensor data. Sometimes a faulty sensor or bad network connection results in missing data or sensor data that lacks a time stamp indicating when the reading occurred. As a result, sensor data can be incomplete or contain inconsistent values, indicating a potential sensor failure or a drop in a network. Developers of IoT systems must be prepared for and be able to detect faulty sensor data. Security is a very major issue with IoT applications. In today’s manufacturing environment, the factory network is a closed environment designed to communicate with plant sensors and devices but not typically with the outside world. So, there is a key decision that organizations must make when considering implementation of an IoT: Are the benefits of doing so sufficient to overcome the risk of making detailed company information accessible through the Internet and exposing internal systems to hacking, viruses, and destructive malware? Hackers who gain access to an organization’s IoT can steal data, transfer money out of accounts, and shut down Web sites. They can also wreck physical havoc by tampering with critical infrastructure such as air traffic control systems, health care devices, power grids, and supervisory control and data acquisition (SCADA) systems. One of the first things developers of IoT applications should focus on is building in security from the start. This needs to include ways of updating the system in a secure manner. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Describes two potential issues with IoT applications

DIFFICULTY: REFERENCES:

Moderate Potential Issues with IoT Applications

Copyright Cengage Learning. Powered by Cognero.

Page 67


Chapter 08 - Cloud Computing and the Internet of Things QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.8.10 - Identify two potential issues associated with the expansion of the IoT. KEYWORDS: Bloom's: Remember DATE CREATED: 6/29/2020 4:37 PM DATE MODIFIED: 6/29/2020 4:39 PM

Copyright Cengage Learning. Powered by Cognero.

Page 68


Chapter 09 - E-Commerce True / False 1. A business-to-business (B2B) market is considerably larger than a business-to-consumer (B2C) market. a. True b. False ANSWER: True RATIONALE: Although the business-to-consumer market grabs more of the news headlines, the B2B market is considerably larger and is growing more rapidly. FEEDBACK: Correct Although the business-to-consumer market grabs more of the news headlines, the B2B market is considerably larger and is growing more rapidly. Incorrect Although the business-to-consumer market grabs more of the news headlines, the B2B market is considerably larger and is growing more rapidly.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Business-to-Business (B2B) E-Commerce QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 1:35 PM 2. The sales process for a typical business-to-business (B2B) e-commerce transaction is shorter than that for a typical consumer-to-consumer (C2C) e-commerce transaction. a. True b. False ANSWER: False RATIONALE: The length of the sales process is days to months for B2B e-commerce, days to weeks for B2C e-commerce, and hours to days for C2C e-commerce. FEEDBACK: Correct The length of the sales process is days to months for B2B e-commerce, days to weeks for B2C e-commerce, and hours to days for C2C e-commerce. Incorrect The length of the sales process is days to months for B2B e-commerce, days to weeks for B2C e-commerce, and hours to days for C2C e-commerce.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Consumer-to-Consumer (C2C) E-Commerce QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 1:53 PM 3. An organization may use buy-side e-commerce to purchase goods and services from its suppliers. Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 09 - E-Commerce a. True b. False ANSWER: RATIONALE: FEEDBACK:

True Many organizations use both buy-side e-commerce to purchase goods and services from their suppliers and sell-side e-commerce to sell products to their customers. Correct

Many organizations use both buy-side e-commerce to purchase goods and services from their suppliers and sell-side e-commerce to sell products to their customers. Incorrect Many organizations use both buy-side e-commerce to purchase goods and services from their suppliers and sell-side e-commerce to sell products to their customers.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Business-to-Business (B2B) E-Commerce QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 1:56 PM 4. In 1992, the Supreme Court ruled that online retailers must collect sales taxes even in states where they lack a physical presence. a. True b. False ANSWER: False RATIONALE: As a result of a 1992 Supreme Court ruling, online retailers did not have to collect sales taxes in states where they lacked a physical presence. FEEDBACK: Correct As a result of a 1992 Supreme Court ruling, online retailers did not have to collect sales taxes in states where they lacked a physical presence. Incorrect As a result of a 1992 Supreme Court ruling, online retailers did not have to collect sales taxes in states where they lacked a physical presence.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Business-to-Consumer (B2C) E-Commerce QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 1:58 PM 5. The market for m-commerce in has matured much more quickly in North America than in Western Europe and Japan. a. True Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 09 - E-Commerce b. False ANSWER: RATIONALE: FEEDBACK:

False The market for m-commerce in North America is maturing much later than in other countries, such as Japan, South Korea, and the United Kingdom. Correct

The market for m-commerce in North America is maturing much later than in other countries, such as Japan, South Korea, and the United Kingdom. Incorrect The market for m-commerce in North America is maturing much later than in other countries, such as Japan, South Korea, and the United Kingdom.

POINTS: 1 DIFFICULTY: Easy REFERENCES: M-Commerce in Perspective QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 2:14 PM 6. Conversion to an e-commerce or m-commerce system enables organizations to increase the accuracy of order processing and order fulfillment. a. True b. False ANSWER: True RATIONALE: Conversion to an e-commerce or m-commerce system enables organizations to reach new customers, reduce the cost of doing business, speed the flow of goods and information, increase the accuracy of order-processing and order fulfillment, and improve the level of customer service. FEEDBACK: Correct Conversion to an e-commerce or m-commerce system enables organizations to reach new customers, reduce the cost of doing business, speed the flow of goods and information, increase the accuracy of order-processing and order fulfillment, and improve the level of customer service. Incorrect Conversion to an e-commerce or m-commerce system enables organizations to reach new customers, reduce the cost of doing business, speed the flow of goods and information, increase the accuracy of order-processing and order fulfillment, and improve the level of customer service.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Advantages of E-Commerce QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.3 - Outline the key components of a successful e-commerce business strategy. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 2:16 PM Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 09 - E-Commerce 7. Lack of trust in online sellers is one of the most frequently cited reasons that some consumers are not willing to purchase online. a. True b. False ANSWER: True RATIONALE: Lack of trust in online sellers is one of the most frequently cited reasons that some consumers give to explain why they are unwilling to purchase online. FEEDBACK: Correct Lack of trust in online sellers is one of the most frequently cited reasons that some consumers give to explain why they are unwilling to purchase online. Incorrect Lack of trust in online sellers is one of the most frequently cited reasons that some consumers give to explain why they are unwilling to purchase online.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Overcoming Consumers’ Lack of Trust QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.3 - Outline the key components of a successful e-commerce business strategy. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 2:20 PM 8. An electronic exchange is an electronic forum where manufacturers, suppliers, and competitors buy and sell goods, trade market information, and run back-office operations. a. True b. False ANSWER: True RATIONALE: One approach taken by many manufacturers to raise profitability and improve customer service is to move their supply chain operations onto the Internet. Here, they can form an electronic exchange, an electronic forum where manufacturers, suppliers, and competitors buy and sell goods, trade market information, and run back-office operations, such as inventory control. FEEDBACK: Correct On the Internet, manufacturers can form an electronic exchange, an electronic forum where manufacturers, suppliers, and competitors buy and sell goods, trade market information, and run back-office operations, such as inventory control. Incorrect On the Internet, manufacturers can form an electronic exchange, an electronic forum where manufacturers, suppliers, and competitors buy and sell goods, trade market information, and run back-office operations, such as inventory control.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Manufacturing QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.4 - Discuss common types of e-commerce applications. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 09 - E-Commerce DATE CREATED: DATE MODIFIED:

11/19/2019 5:51 PM 6/30/2020 2:24 PM

9. In the past, market segmentation was easy for B2B marketers because firmographic data was readily available, but recently, access to this data has been reduced to protect privacy. a. True b. False ANSWER: False RATIONALE: In the past, market segmentation has been difficult for B2B marketers because firmographic data (addresses, financials, number of employees, and industry classification code) was difficult to obtain. FEEDBACK: Correct In the past, market segmentation has been difficult for B2B marketers because firmographic data (addresses, financials, number of employees, and industry classification code) was difficult to obtain. Incorrect In the past, market segmentation has been difficult for B2B marketers because firmographic data (addresses, financials, number of employees, and industry classification code) was difficult to obtain.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Marketing QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.4 - Discuss common types of e-commerce applications. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 2:31 PM 10. Consortium-operated exchanges are open to any set of buyers and sellers within a given market. a. True b. False ANSWER: False RATIONALE: Consortium-operated exchanges are run by a group of traditionally competing companies with common procurement needs. Independent exchanges are open to any set of buyers and sellers within a given market. FEEDBACK: Correct Consortium-operated exchanges are run by a group of traditionally competing companies with common procurement needs. Independent exchanges are open to any set of buyers and sellers within a given market. Incorrect Consortium-operated exchanges are run by a group of traditionally competing companies with common procurement needs. Independent exchanges are open to any set of buyers and sellers within a given market.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Manufacturing QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.4 - Discuss common types of e-commerce applications. Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 09 - E-Commerce NATIONAL STANDARDS: KEYWORDS: DATE CREATED: DATE MODIFIED:

United States - BUSPROG: Technology Bloom's: Remember 11/19/2019 5:51 PM 6/30/2020 2:35 PM

11. In spite of recent economic downturns, Web site operators have shunned the idea of bartering for goods and services. a. True b. False ANSWER: False RATIONALE: During the economic downturn between 2007 and 2009, many people and businesses turned to bartering as a means of gaining goods and services. Even as the economy slowly recovered, bartering and a “gig economy” helped many people through difficult economic times. A number of Web sites have been created to support this activity. FEEDBACK: Correct During the economic downturn between 2007 and 2009, many people and businesses turned to bartering as a means of gaining goods and services. EA number of Web sites have been created to support this activity. Incorrect During the economic downturn between 2007 and 2009, many people and businesses turned to bartering as a means of gaining goods and services. EA number of Web sites have been created to support this activity.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Bartering QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.4 - Discuss common types of e-commerce applications. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 2:39 PM 12. Consumers who have enrolled in mobile banking and downloaded their bank's mobile application to their cell phones can check their credit card balances before making major purchases. a. True b. False ANSWER: True RATIONALE: Consumers who have enrolled in mobile banking and downloaded the mobile application to their cell phones can check credit card balances before making major purchases to avoid credit rejections. They can also transfer funds from savings to checking accounts to avoid an overdraft. FEEDBACK: Correct Consumers who have enrolled in mobile banking and downloaded the mobile application to their cell phones can check credit card balances before making major purchases to avoid credit rejections. Incorrect Consumers who have enrolled in mobile banking and downloaded the mobile application to their cell phones can check credit card balances before making major purchases to avoid credit rejections.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 09 - E-Commerce REFERENCES: Banking QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.4 - Discuss common types of e-commerce applications. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 2:50 PM 13. Bartering is a technique used by advertisers to recapture shoppers who abandoned a Web site without making a purchase. a. True b. False ANSWER: False RATIONALE: Cart abandonment is an ongoing challenge for e-commerce companies. Close to 73 percent of shopping carts accessed via desktop computers are abandoned before purchase, while that rate rises to 86 percent for carts created on smartphones. “Retargeting” is a technique used by advertisers to recapture these shoppers by using targeted and personalized ads to direct shoppers back to a retailer’s site. FEEDBACK: Correct Cart abandonment is an ongoing challenge for e-commerce companies. “Retargeting” is a technique used by advertisers to recapture these shoppers by using targeted and personalized ads to direct shoppers back to a retailer’s site. Incorrect Cart abandonment is an ongoing challenge for e-commerce companies. “Retargeting” is a technique used by advertisers to recapture these shoppers by using targeted and personalized ads to direct shoppers back to a retailer’s site.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Bartering QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.4 - Discuss common types of e-commerce applications. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 2:53 PM 14. Implicit personalization techniques capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online. a. True b. False ANSWER: False RATIONALE: Businesses use two types of personalization techniques to capture data and build customer profiles. Implicit personalization techniques capture data from actual customer Web sessions—primarily based on which pages were viewed and which weren’t. Explicit personalization techniques capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online. Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 09 - E-Commerce FEEDBACK:

Correct

Explicit personalization techniques capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online. Incorrect Explicit personalization techniques capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Maintaining and Improving Your Web Site QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.3 - Outline the key components of a successful e-commerce business strategy. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 2:57 PM 15. The three basic components of the most successful e-commerce models are content, commerce, and community. a. True b. False ANSWER: True RATIONALE: Although companies can select from a number of approaches, the most successful ecommerce models include three basic components: community, content, and commerce. FEEDBACK: Correct Although companies can select from a number of approaches, the most successful e-commerce models include three basic components: community, content, and commerce. Incorrect Although companies can select from a number of approaches, the most successful e-commerce models include three basic components: community, content, and commerce.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Defining an Effective E-Commerce Model and Strategy QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.3 - Outline the key components of a successful e-commerce business strategy. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 3:00 PM 16. Smart card use is restricted to data associated with financial transactions. a. True b. False ANSWER: False RATIONALE: The smart card is a credit card-sized device with an embedded microchip to provide electronic memory and processing capability. Smart cards can be used for a variety of Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 09 - E-Commerce purposes, including storing a user’s financial facts, health insurance data, credit card numbers, and network identification codes and passwords. They can also store monetary values for spending. FEEDBACK:

Correct

Smart cards can be used for a variety of purposes, including storing a user’s financial facts, health insurance data, credit card numbers, and network identification codes and passwords. Incorrect Smart cards can be used for a variety of purposes, including storing a user’s financial facts, health insurance data, credit card numbers, and network identification codes and passwords.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Electronic Payment Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.5 - Discuss key features of electronic payment systems needed to support ecommerce. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 3:03 PM 17. PayPal enables any person or business with an e-mail address to securely, easily, and quickly send and receive payments online. a. True b. False ANSWER: True RATIONALE: PayPal and Venmo enable any person or business with an email address to securely, easily, and quickly send and receive payments online. FEEDBACK: Correct PayPal and Venmo enable any person or business with an email address to securely, easily, and quickly send and receive payments online. Incorrect PayPal and Venmo enable any person or business with an email address to securely, easily, and quickly send and receive payments online.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Electronic Payment Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.5 - Discuss key features of electronic payment systems needed to support ecommerce. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 3:06 PM 18. Smart cards are less protected from misuse that conventional credit, charge, and debit cards because the smart card information is not encrypted. Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 09 - E-Commerce a. True b. False ANSWER: RATIONALE: FEEDBACK:

False Smart cards are better protected from misuse than conventional credit, charge, and debit cards because the smart-card information is encrypted. Correct

Smart cards are better protected from misuse than conventional credit, charge, and debit cards because the smart-card information is encrypted. Incorrect Smart cards are better protected from misuse than conventional credit, charge, and debit cards because the smart-card information is encrypted.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Electronic Payment Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.5 - Discuss key features of electronic payment systems needed to support ecommerce. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 3:07 PM 19. A procurement card is an attachment to an e-mail message or data embedded in a Web site that verifies the identity of a sender or a Web site. a. True b. False ANSWER: False RATIONALE: A digital certificate is an attachment to an email message or data embedded in a Web site that verifies the identity of a sender or Web site. FEEDBACK: Correct A digital certificate is an attachment to an email message or data embedded in a Web site that verifies the identity of a sender or Web site. Incorrect A digital certificate is an attachment to an email message or data embedded in a Web site that verifies the identity of a sender or Web site.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Electronic Payment Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.5 - Discuss key features of electronic payment systems needed to support ecommerce. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 3:10 PM 20. Smart cards can be used for a variety of purposes, including storing a user’s financial facts, health insurance data, credit card numbers, and network identification codes and passwords. They can also store monetary values for spending. Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 09 - E-Commerce a. True b. False ANSWER: RATIONALE:

FEEDBACK:

True The smart card is a credit card-sized device with an embedded microchip to provide electronic memory and processing capability. Smart cards can be used for a variety of purposes, including storing a user’s financial facts, health insurance data, credit card numbers, and network identification codes and passwords. They can also store monetary values for spending. Correct

Smart cards can be used for a variety of purposes, including storing a user’s financial facts, health insurance data, credit card numbers, and network identification codes and passwords. They can also store monetary values for spending. Incorrect Smart cards can be used for a variety of purposes, including storing a user’s financial facts, health insurance data, credit card numbers, and network identification codes and passwords. They can also store monetary values for spending.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Electronic Payment Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.5 - Discuss key features of electronic payment systems needed to support ecommerce. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 3:12 PM 21. It is safe to assume that personal information will be secure with businesses, because security breaches of information systems are not common. a. True b. False ANSWER: False RATIONALE: Examples of recent security beaches in which personal data was compromised include the Facebook, Starwood Hotels, and Under Armour (MyFitnessPal app) customer data breaches that occurred in 2018. In some cases, the compromise of personal data can lead to identity theft. FEEDBACK: Correct Examples of recent security beaches in which personal data was compromised include the Facebook, Starwood Hotels, and Under Armour (MyFitnessPal app) customer data breaches that occurred in 2018. In some cases, the compromise of personal data can lead to identity theft. Incorrect Examples of recent security beaches in which personal data was compromised include the Facebook, Starwood Hotels, and Under Armour (MyFitnessPal app) customer data breaches that occurred in 2018. In some cases, the compromise of personal data can lead to identity theft.

POINTS: DIFFICULTY: REFERENCES:

1 Moderate Dealing with Consumer Privacy Concerns

Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 09 - E-Commerce QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.3 - Outline the key components of a successful e-commerce business strategy. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 3:18 PM 22. A mobile advertiser can find how many people clicked on his ad and how many people bought his product or service. a. True b. False ANSWER: True RATIONALE: Mobile ad impressions are generally bought at a cost per thousand (CPM), cost per click (CPC), or cost per action (CPA), in which the advertiser pays only if the customer clicks through and then buys the product or service. The main measures of success are the number of users reached, click through rate (CTR), and the number of actions users take, such as the number of downloads prompted by the ad. Advertisers are keenly interested in this data to measure the effectiveness of their advertising spending, and many organizations are willing to pay extra to purchase the data from a mobile ad network or a third party. FEEDBACK: Correct The main measures of mobile ad success are the number of users reached, click through rate (CTR), and the number of actions users take, such as the number of downloads prompted by the ad. Advertisers are keenly interested in this data to measure the effectiveness of their advertising spending, and many organizations are willing to pay extra to purchase the data from a mobile ad network or a third party. Incorrect The main measures of mobile ad success are the number of users reached, click through rate (CTR), and the number of actions users take, such as the number of downloads prompted by the ad. Advertisers are keenly interested in this data to measure the effectiveness of their advertising spending, and many organizations are willing to pay extra to purchase the data from a mobile ad network or a third party.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Advertising QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.4 - Discuss common types of e-commerce applications. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 3:24 PM 23. If you abandon an online shopping cart, the seller does not care what you were shopping for. a. True b. False ANSWER: False RATIONALE: Cart abandonment is an ongoing challenge for e-commerce companies. Close to 73 percent of Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 09 - E-Commerce shopping carts accessed via desktop computers are abandoned before purchase, while that rate rises to 86 percent for carts created on smartphones. “Retargeting” is a technique used by advertisers to recapture these shoppers by using targeted and personalized ads to direct shoppers back to a retailer’s site. FEEDBACK:

Correct

Cart abandonment is an ongoing challenge for e-commerce companies. “Retargeting” is a technique used by advertisers to recapture these shoppers by using targeted and personalized ads to direct shoppers back to a retailer’s site. Incorrect Cart abandonment is an ongoing challenge for e-commerce companies. “Retargeting” is a technique used by advertisers to recapture these shoppers by using targeted and personalized ads to direct shoppers back to a retailer’s site.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Bartering QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.4 - Discuss common types of e-commerce applications. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 3:26 PM 24. In Kenya and Tanzania, it is not uncommon for citizens to carry out common financial transactions using mobile phones. a. True b. False ANSWER: True RATIONALE: M-Pesa (M for mobile, Pesa for money in Swahili) with some 30 million users worldwide is considered by many to be the most developed mobile payment system in the world. The service is operated by Safaricom and Vodacom, the largest mobile network operators in Kenya and Tanzania. M-Pesa enables users with a national ID card or passport to deposit, withdraw, and transfer money easily with a mobile device. Its services have expanded from a basic mobile money transfer scheme to include loans and savings products, bill pay, and salary disbursements. FEEDBACK: Correct M-Pesa, operated by the largest mobile network operators in Kenya and Tanzania, enables users with a national ID card or passport to deposit, withdraw, and transfer money easily with a mobile device. Its services have expanded from a basic mobile money transfer scheme to include loans and savings products, bill pay, and salary disbursements. Incorrect M-Pesa, operated by the largest mobile network operators in Kenya and Tanzania, enables users with a national ID card or passport to deposit, withdraw, and transfer money easily with a mobile device. Its services have expanded from a basic mobile money transfer scheme to include loans and savings products, bill pay, and salary disbursements.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Moderate Banking True / False False

Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 09 - E-Commerce LEARNING OBJECTIVES: POIS.14e.9.4 - Discuss common types of e-commerce applications. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 3:30 PM Multiple Choice 25. In which of the following forms of e-commerce is the seller most likely to offer a customized product offering to a potential buyer? a. business-to-government (B2G) e-commerce b. business-to-business (B2B) e-commerce c. consumer-to-consumer (C2C) e-commerce d. business-to-consumer (B2C) e-commerce ANSWER: d RATIONALE: B2B e-commerce typically involves a uniform product offering, whereas B2C e-commerce involves more customized product offerings and C2C e-commerce often involves a single, one-of-a-kind product offering. FEEDBACK: a. B2B e-commerce typically involves a uniform product offering, whereas B2C ecommerce involves more customized product offerings and C2C e-commerce often involves a single, one-of-a-kind product offering. b. B2B e-commerce typically involves a uniform product offering, whereas B2C ecommerce involves more customized product offerings and C2C e-commerce often involves a single, one-of-a-kind product offering. c. B2B e-commerce typically involves a uniform product offering, whereas B2C ecommerce involves more customized product offerings and C2C e-commerce often involves a single, one-of-a-kind product offering. d. B2B e-commerce typically involves a uniform product offering, whereas B2C ecommerce involves more customized product offerings and C2C e-commerce often involves a single, one-of-a-kind product offering.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Consumer-to-Consumer (C2C) E-Commerce QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 3:36 PM 26. The elimination of organizations that operate between the producer and the consumer is called _____. a. market segmentation b. downsizing c. disintermediation d. personalization ANSWER: c RATIONALE: By using B2C e-commerce to sell directly to consumers, producers and providers of consumer products can eliminate the middlemen, or intermediaries, between them and the consumer. In many cases, this squeezes costs and inefficiencies out of the supply chain and can lead to higher profits for businesses and lower prices for consumers. The elimination of Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 09 - E-Commerce intermediate organizations between the producer and the consumer is called disintermediation. FEEDBACK:

a. The elimination of intermediate organizations between the producer and the consumer is called disintermediation.

b. The elimination of intermediate organizations between the producer and the consumer is called disintermediation. c. The elimination of intermediate organizations between the producer and the consumer is called disintermediation. d. The elimination of intermediate organizations between the producer and the consumer is called disintermediation.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Business-to-Consumer (B2C) E-Commerce QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 3:38 PM 27. _____ is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process. a. Business-to-business (B2B) e-commerce b. Business-to-consumer (B2C) e-commerce c. Consumer-to-business (C2B) e-commerce d. Consumer-to-consumer (C2C) e-commerce ANSWER: d RATIONALE: Consumer-to-consumer (C2C) e-commerce is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process. FEEDBACK: a. Consumer-to-consumer (C2C) e-commerce is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process. b. Consumer-to-consumer (C2C) e-commerce is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process. c. Consumer-to-consumer (C2C) e-commerce is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process. d. Consumer-to-consumer (C2C) e-commerce is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Consumer-to-Consumer (C2C) E-Commerce QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Technology Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 09 - E-Commerce KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 11/19/2019 5:51 PM 6/30/2020 3:40 PM

28. Based on a 1992 Supreme Court ruling, an Internet-based merchant needed to collect sales taxes only when _____. a. the sale price exceeded $100.00 b. buyers lived in a state where the merchant had a physical presence c. buyers purchased certain enumerated items d. items were purchased through a consumer-to-consumer (C2C) Web site ANSWER: b RATIONALE: As a result of a 1992 Supreme Court ruling, online retailers did not have to collect sales taxes in states where they lacked a physical presence. FEEDBACK: a. As a result of a 1992 Supreme Court ruling, online retailers did not have to collect sales taxes in states where they lacked a physical presence. b. As a result of a 1992 Supreme Court ruling, online retailers did not have to collect sales taxes in states where they lacked a physical presence. c. As a result of a 1992 Supreme Court ruling, online retailers did not have to collect sales taxes in states where they lacked a physical presence. d. As a result of a 1992 Supreme Court ruling, online retailers did not have to collect sales taxes in states where they lacked a physical presence.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Business-to-Consumer (B2C) E-Commerce QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 3:43 PM 29. One reason for the growth in business-to-consumer (B2C) e-commerce is that online B2C shoppers have the ability to design a _____ product. a. standardized b. universal c. generic d. personalized ANSWER: d RATIONALE: One reason for the growth in B2C e-commerce is that online B2C shoppers have the ability to design a personalized product. FEEDBACK: a. One reason for the growth in B2C e-commerce is that online B2C shoppers have the ability to design a personalized product.

b. One reason for the growth in B2C e-commerce is that online B2C shoppers have the ability to design a personalized product. c. One reason for the growth in B2C e-commerce is that online B2C shoppers have the ability to design a personalized product. d. One reason for the growth in B2C e-commerce is that online B2C shoppers have the ability to design a personalized product. Copyright Cengage Learning. Powered by Cognero.

Page 16


Chapter 09 - E-Commerce POINTS: 1 DIFFICULTY: Easy REFERENCES: Business-to-Consumer (B2C) E-Commerce QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 3:45 PM 30. _____ divides the pool of potential customers into subgroups that are usually defined in terms of demographic characteristics. a. Disintermediation b. Social networking c. Market segmentation d. Market augmentation ANSWER: c RATIONALE: Internet advertisers use the data gathered through Web sites to identify specific markets and target them with tailored advertising messages. This practice, called market segmentation, divides the pool of potential customers into subgroups usually defined in terms of demographic characteristics, such as age, gender, marital status, income level, and geographic location. FEEDBACK: a. The practice called market segmentation divides the pool of potential customers into subgroups usually defined in terms of demographic characteristics, such as age, gender, marital status, income level, and geographic location. b. The practice called market segmentation divides the pool of potential customers into subgroups usually defined in terms of demographic characteristics, such as age, gender, marital status, income level, and geographic location. c. The practice called market segmentation divides the pool of potential customers into subgroups usually defined in terms of demographic characteristics, such as age, gender, marital status, income level, and geographic location. d. The practice called market segmentation divides the pool of potential customers into subgroups usually defined in terms of demographic characteristics, such as age, gender, marital status, income level, and geographic location.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Marketing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.4 - Discuss common types of e-commerce applications. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 3:48 PM 31. Which of the following forms of e-commerce has created an opportunity for many people to make a living out of selling items on auction Web sites? a. Business-to-business (B2B) e-commerce b. Consumer-to-consumer (C2C) e-commerce Copyright Cengage Learning. Powered by Cognero.

Page 17


Chapter 09 - E-Commerce c. Consumer-to-business (C2B) e-commerce d. Business-to-consumer (B2C) e-commerce ANSWER: b RATIONALE: C2C has created an opportunity for many people to make a living out of selling items on auction sites. According to eBay, the gross merchandise volume for items sold on its site was expected to exceed $88 billion in 2019. FEEDBACK: a. C2C has created an opportunity for many people to make a living out of selling items on auction sites.

b. C2C has created an opportunity for many people to make a living out of selling items on auction sites. c. C2C has created an opportunity for many people to make a living out of selling items on auction sites. d. C2C has created an opportunity for many people to make a living out of selling items on auction sites.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Consumer-to-Consumer (C2C) E-Commerce QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 3:51 PM 32. Which of the following statements is true of retargeting? a. It is targeted at approximately 50% of Web site visitors who shop using smartphone applications. b. It employs personalized ads to direct shoppers back to a retailer’s Web site that they previously abandoned. c. It attempts to change the buying habits of Web shoppers by inducing them to consider products they have never considered purchasing before. d. It attempts to change the buying habits of Web shoppers by directing them to Web sites they have not visited before. ANSWER: b RATIONALE: Close to 73 percent of shopping carts accessed via desktop computers are abandoned before purchase, while that rate rises to 86 percent for carts created on smartphones. “Retargeting” is a technique used by advertisers to recapture these shoppers by using targeted and personalized ads to direct shoppers back to a retailer’s site. The retargeting could be further enhanced to include comments and recommendations from other consumers who purchased the same items. Retargeting ensures that potential consumers see relevant, targeted ads for products they’ve already expressed interest in. FEEDBACK: a. “Retargeting” is a technique used by advertisers to recapture shoppers who have abandoned their carts by using targeted and personalized ads to direct shoppers back to a retailer’s site. b. “Retargeting” is a technique used by advertisers to recapture shoppers who have abandoned their carts by using targeted and personalized ads to direct shoppers back to a retailer’s site. c. “Retargeting” is a technique used by advertisers to recapture shoppers who have abandoned their carts by using targeted and personalized ads to direct shoppers back to a retailer’s site.

Copyright Cengage Learning. Powered by Cognero.

Page 18


Chapter 09 - E-Commerce d. “Retargeting” is a technique used by advertisers to recapture shoppers who have abandoned their carts by using targeted and personalized ads to direct shoppers back to a retailer’s site.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Bartering QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.4 - Discuss common types of e-commerce applications. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 3:56 PM 33. The number of mobile Web sites worldwide has grown rapidly, in part because of _____. a. the availability of more costly handsets b. typically uniform product offerings c. advances in artificial intelligence technologies d. the development of new and useful applications ANSWER: d RATIONALE: The number of mobile Web sites worldwide has grown rapidly because of advances in wireless broadband technologies, the development of new and useful applications, and the availability of less costly but more powerful smartphones. FEEDBACK: a. The number of mobile Web sites worldwide has grown rapidly because of advances in wireless broadband technologies, the development of new and useful applications, and the availability of less costly but more powerful smartphones. b. The number of mobile Web sites worldwide has grown rapidly because of advances in wireless broadband technologies, the development of new and useful applications, and the availability of less costly but more powerful smartphones. c. The number of mobile Web sites worldwide has grown rapidly because of advances in wireless broadband technologies, the development of new and useful applications, and the availability of less costly but more powerful smartphones. d. The number of mobile Web sites worldwide has grown rapidly because of advances in wireless broadband technologies, the development of new and useful applications, and the availability of less costly but more powerful smartphones.

POINTS: 1 DIFFICULTY: Easy REFERENCES: M-Commerce in Perspective QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 19


Chapter 09 - E-Commerce DATE CREATED: DATE MODIFIED:

11/19/2019 5:51 PM 6/30/2020 4:00 PM

34. Which of the following is NOT one of the three basic components of most successful e-commerce models? a. content b. capital c. community d. commerce ANSWER: b RATIONALE: Although companies can select from a number of approaches, the most successful ecommerce models include three basic components: community, content, and commerce. FEEDBACK: a. Although companies can select from a number of approaches, the most successful e-commerce models include three basic components: community, content, and commerce. b. Although companies can select from a number of approaches, the most successful e-commerce models include three basic components: community, content, and commerce. c. Although companies can select from a number of approaches, the most successful e-commerce models include three basic components: community, content, and commerce. d. Although companies can select from a number of approaches, the most successful e-commerce models include three basic components: community, content, and commerce.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Defining an Effective E-Commerce Model and Strategy QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.3 - Outline the key components of a successful e-commerce business strategy. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 4:03 PM 35. An approach to building customer profiles that captures user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online, relies on _____. a. search engine optimization b. implicit personalization techniques c. explicit personalization techniques d. phishing ANSWER: c RATIONALE: Businesses use two types of personalization techniques to capture data and build customer profiles. Implicit personalization techniques capture data from actual customer Web sessions—primarily based on which pages were viewed and which weren’t. Explicit personalization techniques capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online. FEEDBACK: a. Explicit personalization techniques capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online. b. Explicit personalization techniques capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online.

Copyright Cengage Learning. Powered by Cognero.

Page 20


Chapter 09 - E-Commerce c. Explicit personalization techniques capture user-provided information, such as

information from warranties, surveys, user registrations, and contest-entry forms completed online. d. Explicit personalization techniques capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Maintaining and Improving Your Web Site QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.3 - Outline the key components of a successful e-commerce business strategy. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 4:11 PM 36. The ______ technique is a security technique associated with the use of credit cards at the time of purchase that checks additional digits printed on the back or front of the credit cards. a. Address Verification System b. Advanced Authorization c. Payment Card Industry security standard d. Card Verification Number ANSWER: d RATIONALE: Various measures are being implemented to increase the security associated with the use of credit cards at the time of purchase. The Card Verification Number technique is a check of the additional digits typically printed on the back of the card (or on the front, in the case of American Express cards). FEEDBACK: a. Various measures are being implemented to increase the security associated with the use of credit cards at the time of purchase. The Card Verification Number technique is a check of the additional digits typically printed on the back of the card (or on the front, in the case of American Express cards). b. Various measures are being implemented to increase the security associated with the use of credit cards at the time of purchase. The Card Verification Number technique is a check of the additional digits typically printed on the back of the card (or on the front, in the case of American Express cards). c. Various measures are being implemented to increase the security associated with the use of credit cards at the time of purchase. The Card Verification Number technique is a check of the additional digits typically printed on the back of the card (or on the front, in the case of American Express cards). d. Various measures are being implemented to increase the security associated with the use of credit cards at the time of purchase. The Card Verification Number technique is a check of the additional digits typically printed on the back of the card (or on the front, in the case of American Express cards).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Electronic Payment Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.5 - Discuss key features of electronic payment systems needed to support eCopyright Cengage Learning. Powered by Cognero.

Page 21


Chapter 09 - E-Commerce NATIONAL STANDARDS: KEYWORDS: DATE CREATED: DATE MODIFIED:

commerce. United States - BUSPROG: Technology Bloom's: Remember 11/19/2019 5:51 PM 6/30/2020 4:25 PM

37. The _____ standard spells out measures and security procedures to safeguard the card issuer, the cardholder, and the merchant. a. Secure Sockets Layer (SSL) b. Card Verification Number c. virtual private network (VPN) d. Payment Card Industry (PCI) security ANSWER: d RATIONALE: Many organizations that accept credit cards to pay for items purchased via e-commerce have adopted the Payment Card Industry (PCI) security standard. This standard spells out measures and security procedures to safeguard the card issuer, the cardholder, and the merchant. FEEDBACK: a. Many organizations that accept credit cards to pay for items purchased via ecommerce have adopted the Payment Card Industry (PCI) security standard. This standard spells out measures and security procedures to safeguard the card issuer, the cardholder, and the merchant. b. Many organizations that accept credit cards to pay for items purchased via ecommerce have adopted the Payment Card Industry (PCI) security standard. This standard spells out measures and security procedures to safeguard the card issuer, the cardholder, and the merchant. c. Many organizations that accept credit cards to pay for items purchased via ecommerce have adopted the Payment Card Industry (PCI) security standard. This standard spells out measures and security procedures to safeguard the card issuer, the cardholder, and the merchant. d. Many organizations that accept credit cards to pay for items purchased via ecommerce have adopted the Payment Card Industry (PCI) security standard. This standard spells out measures and security procedures to safeguard the card issuer, the cardholder, and the merchant.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Electronic Payment Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.5 - Discuss key features of electronic payment systems needed to support ecommerce. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 4:30 PM 38. What must Web site operators constantly monitor to provide a good experience to their Internet shoppers? a. search engine optimization b. traffic and response times experienced by visitors Copyright Cengage Learning. Powered by Cognero.

Page 22


Chapter 09 - E-Commerce c. new trends and developments d. implicit and explicit personalization techniques ANSWER: b RATIONALE: Web site operators must constantly monitor the traffic to their sites and the response times experienced by visitors. Nothing will drive potential customers away faster than experiencing unreasonable delays while trying to view or order products or services. FEEDBACK: a. Web site operators must constantly monitor the traffic to their sites and the response times experienced by visitors. Nothing will drive potential customers away faster than experiencing unreasonable delays while trying to view or order products or services. b. Web site operators must constantly monitor the traffic to their sites and the response times experienced by visitors. Nothing will drive potential customers away faster than experiencing unreasonable delays while trying to view or order products or services. c. Web site operators must constantly monitor the traffic to their sites and the response times experienced by visitors. Nothing will drive potential customers away faster than experiencing unreasonable delays while trying to view or order products or services. d. Web site operators must constantly monitor the traffic to their sites and the response times experienced by visitors. Nothing will drive potential customers away faster than experiencing unreasonable delays while trying to view or order products or services.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Maintaining and Improving Your Web Site QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.3 - Outline the key components of a successful e-commerce business strategy. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 4:55 PM 39. Authentication technologies are used by many organizations to _____. a. verify the accuracy of their product descriptions and prices b. secure sensitive data during e-commerce transactions c. confirm the uniform resource locator (URL) of their suppliers' Web sites d. confirm the identity of a user requesting access to information or assets ANSWER: d RATIONALE: Authentication technologies are used by many organizations to confirm the identity of a user requesting access to information or assets. FEEDBACK: a. Authentication technologies are used by many organizations to confirm the identity of a user requesting access to information or assets. b. Authentication technologies are used by many organizations to confirm the identity of a user requesting access to information or assets. c. Authentication technologies are used by many organizations to confirm the identity of a user requesting access to information or assets. d. Authentication technologies are used by many organizations to confirm the

Copyright Cengage Learning. Powered by Cognero.

Page 23


Chapter 09 - E-Commerce identity of a user requesting access to information or assets.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Electronic Payment Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.5 - Discuss key features of electronic payment systems needed to support ecommerce. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 6/30/2020 5:00 PM 40. Conversion to an e-commerce or m-commerce system enables organizations to _____. a. improve their level of customer service b. implement an enterprise resource planning (ERP) system c. increase the cost of doing business d. promote consumer-to-consumer (C2C) e-commerce ANSWER: a RATIONALE: Conversion to an e-commerce or m-commerce system enables organizations to reach new customers, reduce the cost of doing business, speed the flow of goods and information, increase the accuracy of order-processing and order fulfillment, and improve the level of customer service. FEEDBACK: a. Conversion to an e-commerce or m-commerce system enables organizations to reach new customers, reduce the cost of doing business, speed the flow of goods and information, increase the accuracy of order-processing and order fulfillment, and improve the level of customer service. b. Conversion to an e-commerce or m-commerce system enables organizations to reach new customers, reduce the cost of doing business, speed the flow of goods and information, increase the accuracy of order-processing and order fulfillment, and improve the level of customer service. c. Conversion to an e-commerce or m-commerce system enables organizations to reach new customers, reduce the cost of doing business, speed the flow of goods and information, increase the accuracy of order-processing and order fulfillment, and improve the level of customer service. d. Conversion to an e-commerce or m-commerce system enables organizations to reach new customers, reduce the cost of doing business, speed the flow of goods and information, increase the accuracy of order-processing and order fulfillment, and improve the level of customer service.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Advantages of E-Commerce QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 24


Chapter 09 - E-Commerce DATE CREATED: DATE MODIFIED:

11/19/2019 5:51 PM 7/1/2020 6:42 AM

41. If you shop for goods for personal use on Amazon.com, _____. a. you pay tax only on certain categories of items b. you never have to pay sales tax c. depending on which state you are in, you may or may not pay tax d. you pay tax on all items, no matter which state you are in ANSWER: c RATIONALE: As a result of a 1992 Supreme Court ruling, online retailers did not have to collect sales taxes in states where they lacked a physical presence. The court’s failure to act put pressure on Congress to devise a national solution, as both online and traditional retailers complain about a patchwork of state laws and conflicting lower-court decisions. Many states devised ways to sidestep the Supreme Court’s rulings or initiate new challenges in the courts. In the meantime, several other states are simply moving forward with efforts to collect tax from online purchases, and many merchants are already complying. FEEDBACK: a. As a result of a 1992 Supreme Court ruling, online retailers did not have to collect sales taxes in states where they lacked a physical presence. Many states devised ways to sidestep the Supreme Court’s rulings or initiate new challenges in the courts. In the meantime, several other states are simply moving forward with efforts to collect tax from online purchases, and many merchants are already complying. b. As a result of a 1992 Supreme Court ruling, online retailers did not have to collect sales taxes in states where they lacked a physical presence. Many states devised ways to sidestep the Supreme Court’s rulings or initiate new challenges in the courts. In the meantime, several other states are simply moving forward with efforts to collect tax from online purchases, and many merchants are already complying. c. As a result of a 1992 Supreme Court ruling, online retailers did not have to collect sales taxes in states where they lacked a physical presence. Many states devised ways to sidestep the Supreme Court’s rulings or initiate new challenges in the courts. In the meantime, several other states are simply moving forward with efforts to collect tax from online purchases, and many merchants are already complying. d. As a result of a 1992 Supreme Court ruling, online retailers did not have to collect sales taxes in states where they lacked a physical presence. Many states devised ways to sidestep the Supreme Court’s rulings or initiate new challenges in the courts. In the meantime, several other states are simply moving forward with efforts to collect tax from online purchases, and many merchants are already complying.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Business-to-Consumer (B2C) E-Commerce QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/1/2020 6:48 AM Copyright Cengage Learning. Powered by Cognero.

Page 25


Chapter 09 - E-Commerce 42. Through e-government, _____. a. only government agencies can interact with one another b. only businesses can interact with the government c. only individual citizens can interact with the government d. any government unit, business, or individual can interact with the government ANSWER: d RATIONALE: E-government is the use of information and communications technology to simplify the sharing of information, speed formerly paper-based processes, and improve the relationship between citizens and government. Government-to-citizen (G2C), government-to-business (G2B), and government-to-government (G2G) are all forms of e-government, each with different applications. FEEDBACK: a. E-government is the use of information and communications technology to simplify the sharing of information, speed formerly paper-based processes, and improve the relationship between citizens and government. Government-to-citizen (G2C), government-to-business (G2B), and government-to-government (G2G) are all forms of e-government, each with different applications. b. E-government is the use of information and communications technology to simplify the sharing of information, speed formerly paper-based processes, and improve the relationship between citizens and government. Government-to-citizen (G2C), government-to-business (G2B), and government-to-government (G2G) are all forms of e-government, each with different applications. c. E-government is the use of information and communications technology to simplify the sharing of information, speed formerly paper-based processes, and improve the relationship between citizens and government. Government-to-citizen (G2C), government-to-business (G2B), and government-to-government (G2G) are all forms of e-government, each with different applications. d. E-government is the use of information and communications technology to simplify the sharing of information, speed formerly paper-based processes, and improve the relationship between citizens and government. Government-to-citizen (G2C), government-to-business (G2B), and government-to-government (G2G) are all forms of e-government, each with different applications.

POINTS: 1 DIFFICULTY: Easy REFERENCES: E-Government QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/1/2020 6:50 AM 43. Why was it necessary for companies to reengineer their e-commerce Web sites for m-commerce? a. Smartphones and tablets use highly advanced browsers. b. Mobile devices provide small user interfaces. c. Consumers prefer accessing e-commerce using laptops. d. Today's wireless technologies have poor data transfer speeds. ANSWER: b Copyright Cengage Learning. Powered by Cognero.

Page 26


Chapter 09 - E-Commerce RATIONALE:

As technology became more powerful and less expensive, users began accessing e-commerce via tablets and smartphones. The concepts and strategies stayed the same, but the tactics of ecommerce had to change. Why? Because the size of the users’ interface was so much smaller. Companies needed to reengineer their e-commerce Web sites to ensure that users could still effectively interact with their sites.

FEEDBACK:

a. The concepts and strategies stayed the same, but the tactics of e-commerce had to change. Why? Because the size of the users’ interface was so much smaller. b. The concepts and strategies stayed the same, but the tactics of e-commerce had to change. Why? Because the size of the users’ interface was so much smaller. c. The concepts and strategies stayed the same, but the tactics of e-commerce had to change. Why? Because the size of the users’ interface was so much smaller. d. The concepts and strategies stayed the same, but the tactics of e-commerce had to change. Why? Because the size of the users’ interface was so much smaller.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Introduction to M-Commerce QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/1/2020 7:03 AM 44. Compared to traditional commerce transactions, e-commerce transactions _____. a. increase the costs of sales b. negatively affect customer service c. are less accurate, on average d. reduce the costs of sales ANSWER: d RATIONALE: Conversion to an e-commerce system reduces the cost of doing business. By eliminating or reducing time-consuming and labor-intensive steps throughout the order and delivery process, more sales can be completed in the same period and with increased accuracy. With increased speed and accuracy of customer order information, companies can reduce the need for inventory—from raw materials to safety stocks and finished goods—at all the intermediate manufacturing, storage, and transportation points. FEEDBACK: a. Conversion to an e-commerce system reduces the cost of doing business. By eliminating or reducing time-consuming and labor-intensive steps throughout the order and delivery process, more sales can be completed in the same period and with increased accuracy. b. Conversion to an e-commerce system reduces the cost of doing business. By eliminating or reducing time-consuming and labor-intensive steps throughout the order and delivery process, more sales can be completed in the same period and with increased accuracy. c. Conversion to an e-commerce system reduces the cost of doing business. By eliminating or reducing time-consuming and labor-intensive steps throughout the order and delivery process, more sales can be completed in the same period and with increased accuracy.

Copyright Cengage Learning. Powered by Cognero.

Page 27


Chapter 09 - E-Commerce d. Conversion to an e-commerce system reduces the cost of doing business. By

eliminating or reducing time-consuming and labor-intensive steps throughout the order and delivery process, more sales can be completed in the same period and with increased accuracy.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Reduce Costs QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/1/2020 7:09 AM 45. If customer data is stolen from a business's computers, _____. a. the customers have no recourse b. the customers' risk of identity theft is seldom a serious concern c. the government provides customer credit monitoring to victims d. the customers can file a class action law suit agains the business ANSWER: d RATIONALE: Companies must be prepared to make a substantial investment to safeguard their customers’ privacy or run the risk of losing customers and generating potential class action lawsuits should the data be compromised. It is not uncommon for customers to initiate a class action lawsuit for millions of dollars in damages for emotional distress and loss of privacy. FEEDBACK: a. Companies must be prepared to make a substantial investment to safeguard their customers’ privacy or run the risk of losing customers and generating potential class action lawsuits should the data be compromised. It is not uncommon for customers to initiate a class action lawsuit for millions of dollars in damages for emotional distress and loss of privacy. b. Companies must be prepared to make a substantial investment to safeguard their customers’ privacy or run the risk of losing customers and generating potential class action lawsuits should the data be compromised. It is not uncommon for customers to initiate a class action lawsuit for millions of dollars in damages for emotional distress and loss of privacy. c. Companies must be prepared to make a substantial investment to safeguard their customers’ privacy or run the risk of losing customers and generating potential class action lawsuits should the data be compromised. It is not uncommon for customers to initiate a class action lawsuit for millions of dollars in damages for emotional distress and loss of privacy. d. Companies must be prepared to make a substantial investment to safeguard their customers’ privacy or run the risk of losing customers and generating potential class action lawsuits should the data be compromised. It is not uncommon for customers to initiate a class action lawsuit for millions of dollars in damages for emotional distress and loss of privacy.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Moderate Dealing with Consumer Privacy Concerns Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 28


Chapter 09 - E-Commerce HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.3 - Outline the key components of a successful e-commerce business strategy. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/1/2020 7:24 AM 46. Suppose a retailer who has no technology expertise wishes to set up an online presence for his business. Which option will likely be the fastest and least expensive route? a. purchasing the necessary hardware and software b. taking a Web development course c. hiring a full-time Web developer d. outsourcing his Web development ANSWER: d RATIONALE: Many firms, especially those with few or no experienced Web developers, outsource the building of their Web sites in order to get their sites up and running faster and cheaper—and to develop a more professional Web site—than they could by doing the job themselves. FEEDBACK: a. Many firms, especially those with few or no experienced Web developers, outsource the building of their Web sites in order to get their sites up and running faster and cheaper—and to develop a more professional Web site—than they could by doing the job themselves. b. Many firms, especially those with few or no experienced Web developers, outsource the building of their Web sites in order to get their sites up and running faster and cheaper—and to develop a more professional Web site—than they could by doing the job themselves. c. Many firms, especially those with few or no experienced Web developers, outsource the building of their Web sites in order to get their sites up and running faster and cheaper—and to develop a more professional Web site—than they could by doing the job themselves. d. Many firms, especially those with few or no experienced Web developers, outsource the building of their Web sites in order to get their sites up and running faster and cheaper—and to develop a more professional Web site—than they could by doing the job themselves.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Establishing a Web Site QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.3 - Outline the key components of a successful e-commerce business strategy. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/1/2020 7:32 AM 47. How can a business best increase traffic to its e-commerce site? a. fill a single Web page on the site with search engine keywords b. avoid obtaining "sponsored" ad status with search engines Copyright Cengage Learning. Powered by Cognero.

Page 29


Chapter 09 - E-Commerce c. acquire links to its site on popular, related sites d. advertise in local newspapers ANSWER: c RATIONALE: After obtaining a domain name, the next step to attracting customers is to make your site search-engine friendly by improving its rankings. Ideas on how to accomplish this goal include the following. Provide quality, keyword-rich content. Be careful not to use too many keywords, as search engines often ban sites that do this. Consider paying the search engine companies to include you as a “sponsored” ad. Acquire links to your site from other reputable Web sites that are popular and related to your site. FEEDBACK: a. After obtaining a domain name, the next step to attracting customers is to make your site search-engine friendly by improving its rankings. Ideas on how to accomplish this goal include acquiring links to your site from other reputable Web sites that are popular and related to your site. b. After obtaining a domain name, the next step to attracting customers is to make your site search-engine friendly by improving its rankings. Ideas on how to accomplish this goal include acquiring links to your site from other reputable Web sites that are popular and related to your site. c. After obtaining a domain name, the next step to attracting customers is to make your site search-engine friendly by improving its rankings. Ideas on how to accomplish this goal include acquiring links to your site from other reputable Web sites that are popular and related to your site. d. After obtaining a domain name, the next step to attracting customers is to make your site search-engine friendly by improving its rankings. Ideas on how to accomplish this goal include acquiring links to your site from other reputable Web sites that are popular and related to your site.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Building Traffic to Your Web Site QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.3 - Outline the key components of a successful e-commerce business strategy. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/1/2020 11:47 AM 48. Using a customer's name in an email campaign or a greeting that appears when they visit a Web page is considered the most basic form of _____. a. retargeting b. search engine optimization c. segmentation d. personalization ANSWER: d RATIONALE: Personalization is the process of tailoring Web pages to specifically target individual consumers. The most basic form of personalization involves using the consumer’s name in an email campaign or in a greeting on the Web page. FEEDBACK: a. The most basic form of personalization involves using the consumer’s name in an email campaign or in a greeting on the Web page.

Copyright Cengage Learning. Powered by Cognero.

Page 30


Chapter 09 - E-Commerce b. The most basic form of personalization involves using the consumer’s name in an email campaign or in a greeting on the Web page.

c. The most basic form of personalization involves using the consumer’s name in an email campaign or in a greeting on the Web page. d. The most basic form of personalization involves using the consumer’s name in an email campaign or in a greeting on the Web page.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Maintaining and Improving Your Web Site QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.3 - Outline the key components of a successful e-commerce business strategy. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/1/2020 11:56 AM 49. Because of ____ e-commerce sites, anyone can become a merchant online. a. B2B b. B2C c. C2C d. G2B ANSWER: c RATIONALE: Consumer-to-consumer (C2C) e-commerce is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process. FEEDBACK: a. Consumer-to-consumer (C2C) e-commerce is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process. b. Consumer-to-consumer (C2C) e-commerce is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process. c. Consumer-to-consumer (C2C) e-commerce is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process. d. Consumer-to-consumer (C2C) e-commerce is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Consumer-to-Consumer (C2C) E-Commerce QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:51 PM Copyright Cengage Learning. Powered by Cognero.

Page 31


Chapter 09 - E-Commerce DATE MODIFIED:

7/1/2020 11:59 AM

50. Chain restaurants such as Domino's can use e-commerce sites to eliminate supplier-side data entry errors by _____. a. having their employees enter order information electronically b. enabling buyers to directly enter their own order information c. using smart computers, smartphones, and smart tablet devices d. applying artificial intelligence algorithms to anticipate needs ANSWER: b RATIONALE: By enabling buyers to enter their own product specifications and order information directly, human data-entry error on the part of the supplier is eliminated. More than half of Domino’s sales now comes through its e-commerce site. Using the site’s Easy Order feature, customers can enter their orders and address information directly—improving order and delivery accuracy. FEEDBACK: a. By enabling buyers to enter their own product specifications and order information directly, human data-entry error on the part of the supplier is eliminated. b. By enabling buyers to enter their own product specifications and order information directly, human data-entry error on the part of the supplier is eliminated. c. By enabling buyers to enter their own product specifications and order information directly, human data-entry error on the part of the supplier is eliminated. d. By enabling buyers to enter their own product specifications and order information directly, human data-entry error on the part of the supplier is eliminated.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Increase Accuracy QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/1/2020 12:08 PM 51. Tom's Art Supplies used to sell art supplies through mail order catalogs, but the company's data entry specialists often had difficulty deciphering their customers' handwriting on the order forms. Since switching to an e-commerce site, Tom's has enjoyed which advantage of e-commerce? a. reaching new customers b. reduced costs c. increased order accuracy d. increased sales quantities ANSWER: c RATIONALE: By enabling buyers to enter their own product specifications and order information directly, human data-entry error on the part of the supplier is eliminated. Domino’s, the largest pizza chain in the world, was one of the first chain restaurants to offer an e-commerce site where customers could enter and pay for their orders. More than half of Domino’s sales now comes through its e-commerce site. Using the site’s Easy Order feature, customers can enter their orders and address information directly—improving order and delivery accuracy. FEEDBACK: a. By enabling buyers to enter their own product specifications and order information directly, human data-entry error on the part of the supplier is eliminated. b. By enabling buyers to enter their own product specifications and order information

Copyright Cengage Learning. Powered by Cognero.

Page 32


Chapter 09 - E-Commerce directly, human data-entry error on the part of the supplier is eliminated.

c. By enabling buyers to enter their own product specifications and order information directly, human data-entry error on the part of the supplier is eliminated. d. By enabling buyers to enter their own product specifications and order information directly, human data-entry error on the part of the supplier is eliminated.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Increase Accuracy QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/1/2020 12:12 PM 52. A successful e-commerce system must address the stages experienced by customers as they approach and complete a purchasing transaction, known as the _____. a. sales life cycle b. electronic exchange c. omnichannel model d. market segmentation ANSWER: a RATIONALE: A successful e-commerce system must address the many stages that consumers experience in the sales life cycle. At the heart of any e-commerce system is the user’s ability to search for and identify items for sale; select those items and negotiate prices, terms of payment, and delivery date; send an order to the vendor to purchase the items; pay for the product or service; obtain product delivery; and receive after-sales support. FEEDBACK: a. A successful e-commerce system must address the many stages that consumers experience in the sales life cycle. b. A successful e-commerce system must address the many stages that consumers experience in the sales life cycle. c. A successful e-commerce system must address the many stages that consumers experience in the sales life cycle. d. A successful e-commerce system must address the many stages that consumers experience in the sales life cycle.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Multistage Model for E-Commerce QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.2 - Outline a multistage purchasing model that describes how e-commerce works. KEYWORDS: Bloom's: Remember DATE CREATED: 7/1/2020 12:50 PM DATE MODIFIED: 7/1/2020 1:07 PM Copyright Cengage Learning. Powered by Cognero.

Page 33


Chapter 09 - E-Commerce 53. What is the first stage of the multistage model for B2B and B2C e-commerce? a. selection and negotiation b. purchasing c. search and identification d. purchase anticipation ANSWER: c RATIONALE: A successful e-commerce system must address the many stages that consumers experience in the sales life cycle: (1) search and identification, (2) selection and negotiation, (3) purchasing, (4) product and service delivery, and (5) after-sales service. FEEDBACK: a. A successful e-commerce system must address the many stages that consumers experience in the sales life cycle: (1) search and identification, (2) selection and negotiation, (3) purchasing, (4) product and service delivery, and (5) after-sales service. b. A successful e-commerce system must address the many stages that consumers experience in the sales life cycle: (1) search and identification, (2) selection and negotiation, (3) purchasing, (4) product and service delivery, and (5) after-sales service. c. A successful e-commerce system must address the many stages that consumers experience in the sales life cycle: (1) search and identification, (2) selection and negotiation, (3) purchasing, (4) product and service delivery, and (5) after-sales service. d. A successful e-commerce system must address the many stages that consumers experience in the sales life cycle: (1) search and identification, (2) selection and negotiation, (3) purchasing, (4) product and service delivery, and (5) after-sales service.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Multistage Model for E-Commerce QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.2 - Outline a multistage purchasing model that describes how e-commerce works. KEYWORDS: Bloom's: Remember DATE CREATED: 7/1/2020 12:54 PM DATE MODIFIED: 7/1/2020 1:13 PM 54. During which stage of the multistage e-commerce model would a corporate buyer browse a supplier's online catalog, drag needed items into a shopping cart, and receive a quote for these items? a. selection and negotiation b. before-sales service c. purchasing d. search and identification ANSWER: d RATIONALE: During the search and identification stage, a corporate buyer can access a product catalog from the supplier’s home page and browse until he or she finds the items that meet the specifications. The employee fills out a request-for-quotation form by entering the item codes and quantities needed or by simply dragging them to a shopping cart. When the employee completes the quotation form, the supplier’s Web application calculates the total charge of the order with the most current prices and shows the additional cost for various forms of Copyright Cengage Learning. Powered by Cognero.

Page 34


Chapter 09 - E-Commerce delivery—overnight, within two working days, or the next week. FEEDBACK:

a. During the search and identification stage, a corporate buyer can access a

product catalog from the supplier’s home page and browse until he or she finds the items that meet the specifications. The employee fills out a request-forquotation form by entering the item codes and quantities needed or by simply dragging them to a shopping cart. When the employee completes the quotation form, the supplier’s Web application calculates the total charge of the order with the most current prices and shows the additional cost for various forms of delivery—overnight, within two working days, or the next week. b. During the search and identification stage, a corporate buyer can access a product catalog from the supplier’s home page and browse until he or she finds the items that meet the specifications. The employee fills out a request-forquotation form by entering the item codes and quantities needed or by simply dragging them to a shopping cart. When the employee completes the quotation form, the supplier’s Web application calculates the total charge of the order with the most current prices and shows the additional cost for various forms of delivery—overnight, within two working days, or the next week. c. During the search and identification stage, a corporate buyer can access a product catalog from the supplier’s home page and browse until he or she finds the items that meet the specifications. The employee fills out a request-forquotation form by entering the item codes and quantities needed or by simply dragging them to a shopping cart. When the employee completes the quotation form, the supplier’s Web application calculates the total charge of the order with the most current prices and shows the additional cost for various forms of delivery—overnight, within two working days, or the next week. d. During the search and identification stage, a corporate buyer can access a product catalog from the supplier’s home page and browse until he or she finds the items that meet the specifications. The employee fills out a request-forquotation form by entering the item codes and quantities needed or by simply dragging them to a shopping cart. When the employee completes the quotation form, the supplier’s Web application calculates the total charge of the order with the most current prices and shows the additional cost for various forms of delivery—overnight, within two working days, or the next week.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Search and Identification QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.2 - Outline a multistage purchasing model that describes how e-commerce works. KEYWORDS: Bloom's: Remember DATE CREATED: 7/1/2020 12:54 PM DATE MODIFIED: 7/1/2020 1:30 PM 55. Thomas asks his firm's Web site developers to try to make the site intuitive from their customers' point of view, and to incorporate a chat feature that allows customer service to follow the customer and provide assistance with a purchase. Thomas wants their organization to become the customers' _____. a. omnichannel resource b. buy-side consortium c. preferred supplier d. m-commerce specialist ANSWER: c Copyright Cengage Learning. Powered by Cognero.

Page 35


Chapter 09 - E-Commerce RATIONALE:

Typically, for each item carried in the storeroom, a corporate buyer has already identified a preferred supplier based on the vendor’s price competitiveness, level of service, quality of products, and speed of delivery. How does your organization become a preferred supplier? First, design the organization’s Web page to be intuitive from the user’s point of view. That view may be quite different from the way someone within your organization would navigate the site. Second, multichannel to enhance the user’s experience. Provide a chat or a phone feature that allows someone in your organization to follow the user as they navigate through the site, providing help and suggestions as the customer shops.

FEEDBACK:

a. First, design the organization’s Web page to be intuitive from the user’s point of

view. Second, multichannel to enhance the user’s experience. Provide a chat or a phone feature that allows someone in your organization to follow the user as they navigate through the site, providing help and suggestions as the customer shops. b. First, design the organization’s Web page to be intuitive from the user’s point of view. Second, multichannel to enhance the user’s experience. Provide a chat or a phone feature that allows someone in your organization to follow the user as they navigate through the site, providing help and suggestions as the customer shops. c. First, design the organization’s Web page to be intuitive from the user’s point of view. Second, multichannel to enhance the user’s experience. Provide a chat or a phone feature that allows someone in your organization to follow the user as they navigate through the site, providing help and suggestions as the customer shops. d. First, design the organization’s Web page to be intuitive from the user’s point of view. Second, multichannel to enhance the user’s experience. Provide a chat or a phone feature that allows someone in your organization to follow the user as they navigate through the site, providing help and suggestions as the customer shops.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Search and Identification QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.2 - Outline a multistage purchasing model that describes how e-commerce works. KEYWORDS: Bloom's: Remember DATE CREATED: 7/1/2020 12:54 PM DATE MODIFIED: 7/1/2020 1:40 PM 56. Mavis, a corporate buyer, is busy reviewing price quotations on several suppliers' Web sites. She clicks items on one supplier's quotation form and enters the desired delivery date to find out whether they can deliver them on time. Which stage of the model for e-commerce is Mavis in? a. selection and negotiation b. search and identification c. purchasing d. product delivery preparation ANSWER: a RATIONALE: The select and negotiate phase occurs after price quotations have been received from each supplier. The corporate buyer examines them and indicates by clicking the request-forquotation form which items to order from a given supplier. The employee also specifies the desired delivery date. In addition to price, an item’s quality and the supplier’s service and speed of delivery can be important in the selection and negotiation process. FEEDBACK: a. The select and negotiate phase occurs after price quotations have been received from each supplier. The corporate buyer examines them and indicates by clicking

Copyright Cengage Learning. Powered by Cognero.

Page 36


Chapter 09 - E-Commerce the request-for-quotation form which items to order from a given supplier. The employee also specifies the desired delivery date. b. The select and negotiate phase occurs after price quotations have been received from each supplier. The corporate buyer examines them and indicates by clicking the request-for-quotation form which items to order from a given supplier. The employee also specifies the desired delivery date. c. The select and negotiate phase occurs after price quotations have been received from each supplier. The corporate buyer examines them and indicates by clicking the request-for-quotation form which items to order from a given supplier. The employee also specifies the desired delivery date. d. The select and negotiate phase occurs after price quotations have been received from each supplier. The corporate buyer examines them and indicates by clicking the request-for-quotation form which items to order from a given supplier. The employee also specifies the desired delivery date.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Select and Negotiate QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.2 - Outline a multistage purchasing model that describes how e-commerce works. KEYWORDS: Bloom's: Remember DATE CREATED: 7/1/2020 12:55 PM DATE MODIFIED: 7/1/2020 2:02 PM 57. One important difference between B2B and B2C e-commerce systems that primarily affects the second stage of the multistage model for e-commerce is that _____. a. invoicing buyers after shipping products is much less common with B2B systems b. support for price and delivery negotiation is usually not essential with B2C systems c. retaining customer information for later reference is less important with B2B systems d. buyers typically begin their research at preferred suppliers' Web sites with B2C systems ANSWER: b RATIONALE: B2B e-commerce systems need to support negotiation between a buyer and the selected seller over the final price, delivery date, delivery costs, and any extra charges. However, these features are not fundamental requirements of most B2C systems, which typically offer their products for sale on a “take-it-or-leave-it” basis. FEEDBACK: a. B2B e-commerce systems need to support negotiation between a buyer and the selected seller over the final price, delivery date, delivery costs, and any extra charges. However, these features are not fundamental requirements of most B2C systems, which typically offer their products for sale on a “take-it-or-leave-it” basis. b. B2B e-commerce systems need to support negotiation between a buyer and the selected seller over the final price, delivery date, delivery costs, and any extra charges. However, these features are not fundamental requirements of most B2C systems, which typically offer their products for sale on a “take-it-or-leave-it” basis. c. B2B e-commerce systems need to support negotiation between a buyer and the selected seller over the final price, delivery date, delivery costs, and any extra charges. However, these features are not fundamental requirements of most B2C systems, which typically offer their products for sale on a “take-it-or-leave-it” basis.

Copyright Cengage Learning. Powered by Cognero.

Page 37


Chapter 09 - E-Commerce d. B2B e-commerce systems need to support negotiation between a buyer and the

selected seller over the final price, delivery date, delivery costs, and any extra charges. However, these features are not fundamental requirements of most B2C systems, which typically offer their products for sale on a “take-it-or-leave-it” basis.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Select and Negotiate QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.2 - Outline a multistage purchasing model that describes how e-commerce works. KEYWORDS: Bloom's: Remember DATE CREATED: 7/1/2020 12:55 PM DATE MODIFIED: 7/1/2020 3:49 PM 58. What happens during the purchasing stage of the multistage e-commerce model when the buyer is a corporate buyer placing a monthly order with a long-term supplier? a. the goods required to fulfill the order are packaged for shipment b. negotiations regarding prices and delivery dates are carried out c. the buyer provides a personal credit card number with the order d. a completed purchase order is sent electronically to the supplier ANSWER: d RATIONALE: The employee completes the purchase order specifying the final agreed-upon terms and prices by sending a completed electronic form to the supplier. Typically, a corporate buyer who makes several purchases from a supplier each year has established credit with the supplier in advance, and all purchases are billed to a corporate account. But when individual consumers make their first, and perhaps only, purchase from the supplier, additional safeguards and measures are required. Part of the purchase transaction can involve the customer providing a credit card number. FEEDBACK: a. The corporate buyer completes the purchase order specifying the final agreedupon terms and prices by sending a completed electronic form to the supplier.

b. The corporate buyer completes the purchase order specifying the final agreedupon terms and prices by sending a completed electronic form to the supplier. c. The corporate buyer completes the purchase order specifying the final agreedupon terms and prices by sending a completed electronic form to the supplier. d. The corporate buyer completes the purchase order specifying the final agreedupon terms and prices by sending a completed electronic form to the supplier.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Purchase Products and Services Electronically QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.2 - Outline a multistage purchasing model that describes how e-commerce works. KEYWORDS: Bloom's: Remember DATE CREATED: 7/1/2020 12:55 PM DATE MODIFIED: 7/1/2020 3:59 PM Copyright Cengage Learning. Powered by Cognero.

Page 38


Chapter 09 - E-Commerce 59. During the purchasing stage of e-commerce, accepted payment methods typically vary because _____. a. complications in paying for requested products seldom arise b. corporate buyers rarely establish credit with their B2B suppliers c. corporate buyers' financial data is handled more securely by suppliers than individuals' data d. additional safeguards and measures are required for first-time buyers in B2C e-commerce ANSWER: d RATIONALE: Complications can arise in paying for the products. Typically, a corporate buyer who makes several purchases from a supplier each year has established credit with the supplier in advance, and all purchases are billed to a corporate account. But when individual consumers make their first, and perhaps only, purchase from the supplier, additional safeguards and measures are required. Part of the purchase transaction can involve the customer providing a credit card number. FEEDBACK: a. When individual consumers make their first, and perhaps only, purchase from the supplier, additional safeguards and measures are required. b. When individual consumers make their first, and perhaps only, purchase from the supplier, additional safeguards and measures are required. c. When individual consumers make their first, and perhaps only, purchase from the supplier, additional safeguards and measures are required. d. When individual consumers make their first, and perhaps only, purchase from the supplier, additional safeguards and measures are required.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Purchase Products and Services Electronically QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.2 - Outline a multistage purchasing model that describes how e-commerce works. KEYWORDS: Bloom's: Remember DATE CREATED: 7/1/2020 12:55 PM DATE MODIFIED: 7/1/2020 4:06 PM 60. Which statement about the product and service delivery stage of the multistage model for e-commerce is FALSE? a. All manufacturers and retailers manage their own physical logistics for order delivery. b. Digital distribution can be used to deliver many products, such as music, software, and videos. c. Non-digital products are delivered in many ways, such as by mail, truck, or rail. d. Sometimes, e-commerce customers travel to the supplier to pick up their merchandise. ANSWER: a RATIONALE: Digital distribution can be used to deliver software, music, pictures, videos, and written material through the Internet faster and less expensively than shipping the items via a package delivery service. Most non-digital products cannot be delivered over the Internet, so they are delivered in a variety of other ways: overnight carrier, regular mail service, truck, or rail. In some cases, the customer might elect to drive to the supplier and pick up the product. Many manufacturers and retailers have outsourced the physical logistics of delivering merchandise to other companies that take care of the storing, packing, shipping, and tracking of products. FEEDBACK:

a. Many manufacturers and retailers have outsourced the physical logistics of

delivering merchandise to other companies that take care of the storing, packing,

Copyright Cengage Learning. Powered by Cognero.

Page 39


Chapter 09 - E-Commerce shipping, and tracking of products.

b. Many manufacturers and retailers have outsourced the physical logistics of

delivering merchandise to other companies that take care of the storing, packing, shipping, and tracking of products. c. Many manufacturers and retailers have outsourced the physical logistics of delivering merchandise to other companies that take care of the storing, packing, shipping, and tracking of products. d. Many manufacturers and retailers have outsourced the physical logistics of delivering merchandise to other companies that take care of the storing, packing, shipping, and tracking of products.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Deliver Products and Services QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.2 - Outline a multistage purchasing model that describes how e-commerce works. KEYWORDS: Bloom's: Remember DATE CREATED: 7/1/2020 12:55 PM DATE MODIFIED: 7/1/2020 4:20 PM 61. Many organizations outsource the primary activities of which stage of the multistage e-commerce model to firms such as Federal Express and United Parcel Service? a. selection and negotiation b. purchasing c. product and service delivery d. search and identification ANSWER: c RATIONALE: Many manufacturers and retailers have outsourced the physical logistics of delivering merchandise to other companies that take care of the storing, packing, shipping, and tracking of products. To provide this service, DHL, Federal Express, United Parcel Service, the U.S. Postal Service, and other delivery firms have developed software tools and interfaces that directly link customer ordering, manufacturing, and inventory systems with their own systems of highly automated warehouses, call centers, and worldwide shipping networks. FEEDBACK: a. Many manufacturers and retailers have outsourced the physical logistics of delivering merchandise to other companies that take care of the storing, packing, shipping, and tracking of products. To provide this service, DHL, Federal Express, United Parcel Service, the U.S. Postal Service, and other delivery firms have developed software tools and interfaces that directly link customer ordering, manufacturing, and inventory systems with their own systems of highly automated warehouses, call centers, and worldwide shipping networks. b. Many manufacturers and retailers have outsourced the physical logistics of delivering merchandise to other companies that take care of the storing, packing, shipping, and tracking of products. To provide this service, DHL, Federal Express, United Parcel Service, the U.S. Postal Service, and other delivery firms have developed software tools and interfaces that directly link customer ordering, manufacturing, and inventory systems with their own systems of highly automated warehouses, call centers, and worldwide shipping networks. c. Many manufacturers and retailers have outsourced the physical logistics of delivering merchandise to other companies that take care of the storing, packing, shipping, and tracking of products. To provide this service, DHL, Federal Express,

Copyright Cengage Learning. Powered by Cognero.

Page 40


Chapter 09 - E-Commerce United Parcel Service, the U.S. Postal Service, and other delivery firms have developed software tools and interfaces that directly link customer ordering, manufacturing, and inventory systems with their own systems of highly automated warehouses, call centers, and worldwide shipping networks. d. Many manufacturers and retailers have outsourced the physical logistics of delivering merchandise to other companies that take care of the storing, packing, shipping, and tracking of products. To provide this service, DHL, Federal Express, United Parcel Service, the U.S. Postal Service, and other delivery firms have developed software tools and interfaces that directly link customer ordering, manufacturing, and inventory systems with their own systems of highly automated warehouses, call centers, and worldwide shipping networks.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Deliver Products and Services QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.2 - Outline a multistage purchasing model that describes how e-commerce works. KEYWORDS: Bloom's: Remember DATE CREATED: 7/1/2020 12:55 PM DATE MODIFIED: 7/1/2020 4:27 PM 62. Francis purchases a new tablet device through an e-commerce Web site. In this scenario, the last stage of the multistage model for e-commerce takes place when _____. a. Francis enters his credit card information and authorizes payment for the device b. the merchant's technical support team helps Francis configure his device c. a shipping company delivers the device to Francis d. Francis researches several models before choosing a tablet to purchase ANSWER: b RATIONALE: A successful e-commerce system must address the many stages that consumers experience in the sales life cycle: (1) search and identification, (2) selection and negotiation, (3) purchasing, (4) product and service delivery, and (5) after-sales service. FEEDBACK: a. A successful e-commerce system must address the many stages that consumers experience in the sales life cycle: (1) search and identification, (2) selection and negotiation, (3) purchasing, (4) product and service delivery, and (5) after-sales service. b. A successful e-commerce system must address the many stages that consumers experience in the sales life cycle: (1) search and identification, (2) selection and negotiation, (3) purchasing, (4) product and service delivery, and (5) after-sales service. c. A successful e-commerce system must address the many stages that consumers experience in the sales life cycle: (1) search and identification, (2) selection and negotiation, (3) purchasing, (4) product and service delivery, and (5) after-sales service. d. A successful e-commerce system must address the many stages that consumers experience in the sales life cycle: (1) search and identification, (2) selection and negotiation, (3) purchasing, (4) product and service delivery, and (5) after-sales service.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 41


Chapter 09 - E-Commerce REFERENCES: Multistage Model for E-Commerce QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.2 - Outline a multistage purchasing model that describes how e-commerce works. KEYWORDS: Bloom's: Understand DATE CREATED: 7/1/2020 1:13 PM DATE MODIFIED: 7/1/2020 1:21 PM 63. Hewlett-Packard has an arrangement whereby FedEx stores, packs, ships, and tracks their products. This means that when Rosie places an order for a printer through Hewlett-Packard's Web site, _____. a. Hewlett-Packard processes and packs the order for FedEx to pick up b. FedEx, not Hewlett-Packard, receives and ships the order c. Hewlett-Packard is not notified of the transaction d. the risk of a delayed or lost shipment is greater ANSWER: b RATIONALE: When a customer orders a printer on the Hewlett-Packard (HP) Web site, that order actually goes to FedEx, which stocks the products that HP sells online to U.S. buyers at a dedicated edistribution facility in Memphis, Tennessee, a major FedEx shipping hub. FedEx ships the order, which triggers an email notification to the customer that the printer is on its way and an inventory notice is sent to HP that the FedEx warehouse now has one less printer in stock. FEEDBACK: a. When a customer orders a printer on the Hewlett-Packard (HP) Web site, that order actually goes to FedEx, which stocks the products that HP sells online to U.S. buyers at a dedicated e-distribution facility in Memphis, Tennessee, a major FedEx shipping hub. b. When a customer orders a printer on the Hewlett-Packard (HP) Web site, that order actually goes to FedEx, which stocks the products that HP sells online to U.S. buyers at a dedicated e-distribution facility in Memphis, Tennessee, a major FedEx shipping hub. c. When a customer orders a printer on the Hewlett-Packard (HP) Web site, that order actually goes to FedEx, which stocks the products that HP sells online to U.S. buyers at a dedicated e-distribution facility in Memphis, Tennessee, a major FedEx shipping hub. d. When a customer orders a printer on the Hewlett-Packard (HP) Web site, that order actually goes to FedEx, which stocks the products that HP sells online to U.S. buyers at a dedicated e-distribution facility in Memphis, Tennessee, a major FedEx shipping hub.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Deliver Products and Services QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.2 - Outline a multistage purchasing model that describes how e-commerce works. KEYWORDS: Bloom's: Remember DATE CREATED: 7/1/2020 4:21 PM DATE MODIFIED: 7/1/2020 4:39 PM 64. Large shipping organizations have sped up and simplified the transfer of inventory and information to consumers through the development of _____. Copyright Cengage Learning. Powered by Cognero.

Page 42


Chapter 09 - E-Commerce a. autonomous vehicles b. electronic exchanges c. software tools and interfaces d. non-SQL information systems ANSWER: c RATIONALE: Many manufacturers and retailers have outsourced the physical logistics of delivering merchandise to other companies that take care of the storing, packing, shipping, and tracking of products. To provide this service, DHL, Federal Express, United Parcel Service, the U.S. Postal Service, and other delivery firms have developed software tools and interfaces that directly link customer ordering, manufacturing, and inventory systems with their own systems of highly automated warehouses, call centers, and worldwide shipping networks. The goal is to make the transfer of all information and inventory, from the manufacturer to the delivery firm to the consumer, fast and simple. FEEDBACK: a. DHL, Federal Express, United Parcel Service, the U.S. Postal Service, and other delivery firms have developed software tools and interfaces that directly link customer ordering, manufacturing, and inventory systems with their own systems of highly automated warehouses, call centers, and worldwide shipping networks. The goal is to make the transfer of all information and inventory, from the manufacturer to the delivery firm to the consumer, fast and simple. b. DHL, Federal Express, United Parcel Service, the U.S. Postal Service, and other delivery firms have developed software tools and interfaces that directly link customer ordering, manufacturing, and inventory systems with their own systems of highly automated warehouses, call centers, and worldwide shipping networks. The goal is to make the transfer of all information and inventory, from the manufacturer to the delivery firm to the consumer, fast and simple. c. DHL, Federal Express, United Parcel Service, the U.S. Postal Service, and other delivery firms have developed software tools and interfaces that directly link customer ordering, manufacturing, and inventory systems with their own systems of highly automated warehouses, call centers, and worldwide shipping networks. The goal is to make the transfer of all information and inventory, from the manufacturer to the delivery firm to the consumer, fast and simple. d. DHL, Federal Express, United Parcel Service, the U.S. Postal Service, and other delivery firms have developed software tools and interfaces that directly link customer ordering, manufacturing, and inventory systems with their own systems of highly automated warehouses, call centers, and worldwide shipping networks. The goal is to make the transfer of all information and inventory, from the manufacturer to the delivery firm to the consumer, fast and simple.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Deliver Products and Services QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.2 - Outline a multistage purchasing model that describes how e-commerce works. KEYWORDS: Bloom's: Remember DATE CREATED: 7/1/2020 4:21 PM DATE MODIFIED: 7/1/2020 4:49 PM 65. Why, during the final stage of the multistage model for e-commerce, is comprehensive customer information captured in the supplier's database? a. This prevents identity theft in the event of a data breach. Copyright Cengage Learning. Powered by Cognero.

Page 43


Chapter 09 - E-Commerce b. This facilitates customer service after order delivery. c. This eliminates the need to provide after-sale information on Web sites. d. This assists with marketing segmentation and retargeting efforts. ANSWER: b RATIONALE: In addition to the information required to complete an order, comprehensive customer information is also captured from each order and stored in the supplier’s customer database. This information can include the customer name, address, telephone numbers, contact person, credit history, and other details. For example, if a customer later contacts the supplier to complain that not all items were received or that some arrived damaged, any customer service representative will be able to retrieve the order information from the database. FEEDBACK: a. In addition to the information required to complete an order, comprehensive customer information is also captured from each order and stored in the supplier’s customer database. If a customer later contacts the supplier to complain that not all items were received or that some arrived damaged, any customer service representative will be able to retrieve the order information from the database. b. In addition to the information required to complete an order, comprehensive customer information is also captured from each order and stored in the supplier’s customer database. If a customer later contacts the supplier to complain that not all items were received or that some arrived damaged, any customer service representative will be able to retrieve the order information from the database. c. In addition to the information required to complete an order, comprehensive customer information is also captured from each order and stored in the supplier’s customer database. If a customer later contacts the supplier to complain that not all items were received or that some arrived damaged, any customer service representative will be able to retrieve the order information from the database. d. In addition to the information required to complete an order, comprehensive customer information is also captured from each order and stored in the supplier’s customer database. If a customer later contacts the supplier to complain that not all items were received or that some arrived damaged, any customer service representative will be able to retrieve the order information from the database.

POINTS: 1 DIFFICULTY: Easy REFERENCES: After-Sales Service QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.2 - Outline a multistage purchasing model that describes how e-commerce works. KEYWORDS: Bloom's: Remember DATE CREATED: 7/1/2020 4:21 PM DATE MODIFIED: 7/1/2020 4:56 PM 66. Which of the following is NOT an example of after-sale information that an organization might provide on their Web site as part of the after-sales service stage of e-commerce? a. equipment maintenance instructions b. effective product use guidelines c. directions for under-warranty repairs d. payment submission instructions ANSWER: d RATIONALE: Many companies provide extensive after-sale information on their Web sites, such as how to maintain a piece of equipment, how to effectively use a product, and how to receive repairs Copyright Cengage Learning. Powered by Cognero.

Page 44


Chapter 09 - E-Commerce under warranty. FEEDBACK:

a. Many companies provide extensive after-sale information on their Web sites,

such as how to maintain a piece of equipment, how to effectively use a product, and how to receive repairs under warranty. b. Many companies provide extensive after-sale information on their Web sites, such as how to maintain a piece of equipment, how to effectively use a product, and how to receive repairs under warranty. c. Many companies provide extensive after-sale information on their Web sites, such as how to maintain a piece of equipment, how to effectively use a product, and how to receive repairs under warranty. d. Many companies provide extensive after-sale information on their Web sites, such as how to maintain a piece of equipment, how to effectively use a product, and how to receive repairs under warranty.

POINTS: 1 DIFFICULTY: Easy REFERENCES: After-Sales Service QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.2 - Outline a multistage purchasing model that describes how e-commerce works. KEYWORDS: Bloom's: Remember DATE CREATED: 7/1/2020 4:21 PM DATE MODIFIED: 7/2/2020 9:54 AM 67. Which basic element of a successful e-commerce model can be established through discussion forums and other social shopping tools? a. community b. commerce c. cooperation d. content ANSWER: a RATIONALE: Although companies can select from a number of approaches, the most successful ecommerce models include three basic components: community, content, and commerce. Discussion forums and other social shopping tools can build a loyal community of people who are interested in and enthusiastic about the company and its products and services. Providing useful, accurate, and timely content, such as industry and economic news and stock quotes, is a sound approach to encourage people to return to your Web site time and again. Commerce involves consumers and businesses paying to purchase physical goods, information, or services that are posted or advertised online. FEEDBACK: a. Although companies can select from a number of approaches, the most successful e-commerce models include three basic components: community, content, and commerce. Discussion forums and other social shopping tools can build a loyal community of people who are interested in and enthusiastic about the company and its products and services. b. Although companies can select from a number of approaches, the most successful e-commerce models include three basic components: community, content, and commerce. Discussion forums and other social shopping tools can build a loyal community of people who are interested in and enthusiastic about the company and its products and services. c. Although companies can select from a number of approaches, the most

Copyright Cengage Learning. Powered by Cognero.

Page 45


Chapter 09 - E-Commerce successful e-commerce models include three basic components: community, content, and commerce. Discussion forums and other social shopping tools can build a loyal community of people who are interested in and enthusiastic about the company and its products and services. d. Although companies can select from a number of approaches, the most successful e-commerce models include three basic components: community, content, and commerce. Discussion forums and other social shopping tools can build a loyal community of people who are interested in and enthusiastic about the company and its products and services.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Defining an Effective E-Commerce Model and Strategy QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.3 - Outline the key components of a successful e-commerce business strategy. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 10:02 AM DATE MODIFIED: 7/2/2020 10:06 AM 68. Which statement regarding how businesses can implement a successful e-commerce strategy is true? a. When building a Web site, the business should first plan and develop the site, and then decide which tasks the site must accomplish. b. The business should wait until their e-commerce site is handling a large volume of credit card purchases to establish a merchant account with a bank. c. A business can choose to utilize an intermediary, called a storefront broker, to connect it with merchants and handle transaction details. d. Businesses that build an e-commerce Web site from scratch enjoy greater success than businesses that use a customizable e-commerce Web site template. ANSWER: c RATIONALE: When building a Web site, you should first decide which tasks the site must accomplish. After a company determines which objectives its site should accomplish, it can move on planning and developing the site, keeping in mind that the priorities and objectives of customers may change over time. To allow visitors to pay for merchandise with credit cards, a company needs a merchant account with a bank. If your company doesn’t already have one, it must establish one. Another model for setting up a Web site is the use of a storefront broker, a business that serves as an intermediary between your Web site and online merchants who have the actual products and retail expertise. The storefront broker deals with the details of the transactions, including who gets paid for what, and is responsible for bringing together merchants and reseller sites. Shopify is a Canadian firm that helps retailers create their own online store without all the technical work involved in developing their own Web site or the huge expense of contracting someone else to build it. Clients can select a stylish e-commerce Web site template, customize it to meet their unique needs, upload product information, and then start taking orders and accepting payments. Thousands of online retailers, including General Electric, CrossFit, Tesla Motors, Red Bull, Foo Fighters, and GitHub built their Web sites using the Shopify platform. Copyright Cengage Learning. Powered by Cognero.

Page 46


Chapter 09 - E-Commerce FEEDBACK:

a. One model for setting up a Web site is the use of a storefront broker, a business

that serves as an intermediary between your Web site and online merchants who have the actual products and retail expertise. The storefront broker deals with the details of the transactions, including who gets paid for what, and is responsible for bringing together merchants and reseller sites. b. One model for setting up a Web site is the use of a storefront broker, a business that serves as an intermediary between your Web site and online merchants who have the actual products and retail expertise. The storefront broker deals with the details of the transactions, including who gets paid for what, and is responsible for bringing together merchants and reseller sites. c. One model for setting up a Web site is the use of a storefront broker, a business that serves as an intermediary between your Web site and online merchants who have the actual products and retail expertise. The storefront broker deals with the details of the transactions, including who gets paid for what, and is responsible for bringing together merchants and reseller sites. d. One model for setting up a Web site is the use of a storefront broker, a business that serves as an intermediary between your Web site and online merchants who have the actual products and retail expertise. The storefront broker deals with the details of the transactions, including who gets paid for what, and is responsible for bringing together merchants and reseller sites.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Establishing a Web Site QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.3 - Outline the key components of a successful e-commerce business strategy. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 10:03 AM DATE MODIFIED: 7/2/2020 10:31 AM 69. Wholesale e-commerce applications often focus on improving a plant manager's efficiency in researching prices and availability from suppliers for _____. a. perishable and nonperishable goods b. overnight and two-day delivery of goods and services c. manufacturing, repair, and operations goods and services d. secure electronic funds transactions ANSWER: c RATIONALE: A key sector of wholesale e-commerce is spending on manufacturing, repair, and operations (MRO) goods and services—from simple office supplies to mission-critical equipment, such as the motors, pumps, compressors, and instruments that keep manufacturing facilities running smoothly. E-commerce software for plant operations provides powerful comparative searching capabilities to enable managers to identify functionally equivalent items, helping them spot opportunities to combine purchases for cost savings. FEEDBACK: a. A key sector of wholesale e-commerce is spending on manufacturing, repair, and operations (MRO) goods and services—from simple office supplies to missioncritical equipment, such as the motors, pumps, compressors, and instruments that keep manufacturing facilities running smoothly. E-commerce software for plant operations provides powerful comparative searching capabilities to enable managers to identify functionally equivalent items, helping them spot opportunities to combine purchases for cost savings.

Copyright Cengage Learning. Powered by Cognero.

Page 47


Chapter 09 - E-Commerce b. A key sector of wholesale e-commerce is spending on manufacturing, repair, and operations (MRO) goods and services—from simple office supplies to missioncritical equipment, such as the motors, pumps, compressors, and instruments that keep manufacturing facilities running smoothly. E-commerce software for plant operations provides powerful comparative searching capabilities to enable managers to identify functionally equivalent items, helping them spot opportunities to combine purchases for cost savings. c. A key sector of wholesale e-commerce is spending on manufacturing, repair, and operations (MRO) goods and services—from simple office supplies to missioncritical equipment, such as the motors, pumps, compressors, and instruments that keep manufacturing facilities running smoothly. E-commerce software for plant operations provides powerful comparative searching capabilities to enable managers to identify functionally equivalent items, helping them spot opportunities to combine purchases for cost savings. d. A key sector of wholesale e-commerce is spending on manufacturing, repair, and operations (MRO) goods and services—from simple office supplies to missioncritical equipment, such as the motors, pumps, compressors, and instruments that keep manufacturing facilities running smoothly. E-commerce software for plant operations provides powerful comparative searching capabilities to enable managers to identify functionally equivalent items, helping them spot opportunities to combine purchases for cost savings.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Wholesale E-Commerce QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.4 - Discuss common types of e-commerce applications. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 10:58 AM DATE MODIFIED: 7/2/2020 11:11 AM 70. James is considering joining an electronic exchange so that his business can purchase needed supplies easily and possibly at better prices. James would prefer to join an exchange that is open to anyone in his firm's market space. Which type of electronic exchange is James considering? a. public b. consortium c. private d. independent ANSWER: d RATIONALE: Companies can join one of three types of exchanges based on who operates the exchange. Private exchanges are owned and operated by a single company. The owner uses the exchange to trade exclusively with established business partners. Consortium-operated exchanges are run by a group of traditionally competing companies with common procurement needs. Independent exchanges are open to any set of buyers and sellers within a given market. FEEDBACK: a. Companies can join one of three types of exchanges based on who operates the exchange. Independent exchanges are open to any set of buyers and sellers within a given market. b. Companies can join one of three types of exchanges based on who operates the exchange. Independent exchanges are open to any set of buyers and sellers

Copyright Cengage Learning. Powered by Cognero.

Page 48


Chapter 09 - E-Commerce within a given market.

c. Companies can join one of three types of exchanges based on who operates the exchange. Independent exchanges are open to any set of buyers and sellers within a given market. d. Companies can join one of three types of exchanges based on who operates the exchange. Independent exchanges are open to any set of buyers and sellers within a given market.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Manufacturing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.4 - Discuss common types of e-commerce applications. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 11:00 AM DATE MODIFIED: 7/2/2020 11:21 AM 71. One issue associated with the use of electronic exchanges is _____. a. a concern among buyers that the online marketplace will drive up prices b. the fear of losing trade secrets when working with competing organizations c. the scarcity of new exchanges available for major industries such as oil and printing d. government disinterest in the joint activities of exchange members ANSWER: b RATIONALE: Several strategic and competitive issues are associated with the use of exchanges. Many companies distrust their corporate rivals and fear they might lose trade secrets through participation in such exchanges. Suppliers worry that online marketplaces will drive down the prices of goods and favor buyers. Suppliers also can spend a great deal of money configuring their systems and work processes to participate in multiple exchanges. For example, more than a dozen new exchanges have appeared in the oil industry, and the printing industry has more than 20 online marketplaces. Yet another issue is potential government scrutiny of exchange participants: When competitors get together to share information, it raises questions of collusion or antitrust behavior. FEEDBACK: a. Several strategic and competitive issues are associated with the use of exchanges. Many companies distrust their corporate rivals and fear they might lose trade secrets through participation in such exchanges. b. Several strategic and competitive issues are associated with the use of exchanges. Many companies distrust their corporate rivals and fear they might lose trade secrets through participation in such exchanges. c. Several strategic and competitive issues are associated with the use of exchanges. Many companies distrust their corporate rivals and fear they might lose trade secrets through participation in such exchanges. d. Several strategic and competitive issues are associated with the use of exchanges. Many companies distrust their corporate rivals and fear they might lose trade secrets through participation in such exchanges.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Manufacturing Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 49


Chapter 09 - E-Commerce HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.4 - Discuss common types of e-commerce applications. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 11:00 AM DATE MODIFIED: 7/2/2020 11:33 AM 72. Emily would like advertisements that link to her company's Web site to appear on other sites that potential customers are likely to visit. Emily should _____. a. consider having her ads distributed by a blind or premium blind mobile network b. purchase mobile impressions at a CPM, not CPC or CPA, to control expenses c. approach the owners of target Web sites about joining an electronic exchange with her d. rely on print media to drive customers to her Web site instead ANSWER: a RATIONALE: Mobile ad networks distribute mobile ads to publishers such as mobile Web sites, application developers, and mobile operators. Mobile ad impressions are generally bought at a cost per thousand (CPM), cost per click (CPC), or cost per action (CPA), in which the advertiser pays only if the customer clicks through and then buys the product or service. Generally, there are three types of mobile ad networks—blind, premium blind, and premium networks—though no clear lines separate them. With blind networks, an advertiser can specify country and content channel (e.g., news, sports, or entertainment) on which the ad will run but not a specific Web site. With premium blind networks, most advertising is blind, but for an additional charge, the advertiser can buy a specific spot on a Web site of its choice. FEEDBACK: a. Mobile ad networks distribute mobile ads to publishers such as mobile Web sites, application developers, and mobile operators. With blind networks, an advertiser can specify country and content channel (e.g., news, sports, or entertainment) on which the ad will run but not a specific Web site. With premium blind networks, most advertising is blind, but for an additional charge, the advertiser can buy a specific spot on a Web site of its choice. b. Mobile ad networks distribute mobile ads to publishers such as mobile Web sites, application developers, and mobile operators. With blind networks, an advertiser can specify country and content channel (e.g., news, sports, or entertainment) on which the ad will run but not a specific Web site. With premium blind networks, most advertising is blind, but for an additional charge, the advertiser can buy a specific spot on a Web site of its choice. c. Mobile ad networks distribute mobile ads to publishers such as mobile Web sites, application developers, and mobile operators. With blind networks, an advertiser can specify country and content channel (e.g., news, sports, or entertainment) on which the ad will run but not a specific Web site. With premium blind networks, most advertising is blind, but for an additional charge, the advertiser can buy a specific spot on a Web site of its choice. d. Mobile ad networks distribute mobile ads to publishers such as mobile Web sites, application developers, and mobile operators. With blind networks, an advertiser can specify country and content channel (e.g., news, sports, or entertainment) on which the ad will run but not a specific Web site. With premium blind networks, most advertising is blind, but for an additional charge, the advertiser can buy a specific spot on a Web site of its choice.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Advertising Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 50


Chapter 09 - E-Commerce HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.4 - Discuss common types of e-commerce applications. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 11:00 AM DATE MODIFIED: 7/2/2020 11:51 AM 73. A trusted third-party organization that issues attachments to emails or embedded Web site data to verify the identity of a sender or Web site is known as a(n) _____. a. certificate authority b. certifying association c. PCI vendor d. advanced authenticator ANSWER: a RATIONALE: A certificate authority (CA) is a trusted third-party organization or company that issues digital certificates. A digital certificate is an attachment to an email message or data embedded in a Web site that verifies the identity of a sender or Web site. FEEDBACK: a. A certificate authority (CA) is a trusted third-party organization or company that issues digital certificates. A digital certificate is an attachment to an email message or data embedded in a Web site that verifies the identity of a sender or Web site. b. A certificate authority (CA) is a trusted third-party organization or company that issues digital certificates. A digital certificate is an attachment to an email message or data embedded in a Web site that verifies the identity of a sender or Web site. c. A certificate authority (CA) is a trusted third-party organization or company that issues digital certificates. A digital certificate is an attachment to an email message or data embedded in a Web site that verifies the identity of a sender or Web site. d. A certificate authority (CA) is a trusted third-party organization or company that issues digital certificates. A digital certificate is an attachment to an email message or data embedded in a Web site that verifies the identity of a sender or Web site.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Electronic Payment Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.5 - Discuss key features of electronic payment systems needed to support ecommerce. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 11:53 AM DATE MODIFIED: 7/2/2020 11:58 AM 74. The communications protocol that is currently used to prevent identity theft because it ensures privacy between communicating applications and their users on the Internet is called _____. a. the PCI security standard b. Advanced Authorization Protocol c. Transport Layer Security Copyright Cengage Learning. Powered by Cognero.

Page 51


Chapter 09 - E-Commerce d. Secure Sockets Layer ANSWER: c RATIONALE: To help prevent this type of identity theft, the Transport Layer Security communications protocol is used to secure sensitive data. Transport Layer Security (TLS) is a communications protocol or system of rules that ensures privacy between communicating applications and their users on the Internet. TLS is the successor to the Secure Sockets Layer (SSL). FEEDBACK: a. To help prevent this type of identity theft, the Transport Layer Security communications protocol is used to secure sensitive data. b. To help prevent this type of identity theft, the Transport Layer Security communications protocol is used to secure sensitive data. c. To help prevent this type of identity theft, the Transport Layer Security communications protocol is used to secure sensitive data. d. To help prevent this type of identity theft, the Transport Layer Security communications protocol is used to secure sensitive data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Electronic Payment Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.5 - Discuss key features of electronic payment systems needed to support ecommerce. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 11:54 AM DATE MODIFIED: 7/2/2020 12:17 PM 75. What is one of the important differences between two of the most popular electronic cash applications, PayPal and Venmo? a. PayPal is geared to transactions from a mobile device, whereas Venmo is designed for PCs and tablets. b. PayPal was designed for secure transactions between people who may be strangers, whereas Venmo was designed for people who know and trust each other. c. PayPal is a subsidiary of Venmo. d. PayPal includes a popular feature that allows you to share the cost of a purchase among other PayPal users, but Venmo lacks this feature. ANSWER: b RATIONALE: Venmo is a subsidiary of PayPal. PayPal is geared to transactions from a PC or tablet, not from a mobile device, which is the platform of Venmo. PayPal was designed for secure transactions between people that may not know each other while Venmo was designed for people who know and trust each other. Another popular feature of Venmo allows you to share the cost of a purchase among other Venmo users. FEEDBACK: a. PayPal was designed for secure transactions between people that may not know each other while Venmo was designed for people who know and trust each other. b. PayPal was designed for secure transactions between people that may not know each other while Venmo was designed for people who know and trust each other. c. PayPal was designed for secure transactions between people that may not know each other while Venmo was designed for people who know and trust each other. d. PayPal was designed for secure transactions between people that may not know each other while Venmo was designed for people who know and trust each other.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 52


Chapter 09 - E-Commerce DIFFICULTY: Easy REFERENCES: Electronic Payment Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.5 - Discuss key features of electronic payment systems needed to support ecommerce. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 12:10 PM DATE MODIFIED: 7/2/2020 12:31 PM 76. E-commerce purchases are often made with various types of cards. Which of these card types does not carry a preset spending limit but must be paid off by the cardholder at the end of each billing period? a. bank card b. debit card c. credit card d. charge card ANSWER: d RATIONALE: A credit card, such as Visa or Mastercard, has a preset spending limit based on the user’s credit history, and each month the user can pay all or part of the amount owed. Interest is charged on the unpaid amount. A charge card, such as American Express, carries no preset spending limit, and the entire amount charged to the card is due at the end of the billing period. Debit cards look like credit cards, but they operate like cash or a personal check. The debit card is linked directly to your savings or checking account. FEEDBACK: a. A charge card, such as American Express, carries no preset spending limit, and the entire amount charged to the card is due at the end of the billing period. b. A charge card, such as American Express, carries no preset spending limit, and the entire amount charged to the card is due at the end of the billing period. c. A charge card, such as American Express, carries no preset spending limit, and the entire amount charged to the card is due at the end of the billing period. d. A charge card, such as American Express, carries no preset spending limit, and the entire amount charged to the card is due at the end of the billing period.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Electronic Payment Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.5 - Discuss key features of electronic payment systems needed to support ecommerce. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 12:17 PM DATE MODIFIED: 7/2/2020 12:41 PM 77. What is EMV? a. a communications protocol that ensures privacy between communicating applications and their users b. an amount of money that is computerized, stored, and used as cash for e-commerce transactions c. a trusted third-party organization that issues digital certificates Copyright Cengage Learning. Powered by Cognero.

Page 53


Chapter 09 - E-Commerce d. a type of credit card with a chip that creates unique codes for each transaction ANSWER: d RATIONALE: Here in the United States, credit cards with only magnetic stripes are being replaced by cards with chips that employ the EMV (Europay, Mastercard, and Visa) global standard for working with point-of-sale systems. Each time the EMV card is used for inserted into a pointof-sale device for payment, it creates a unique transaction code that can never be reused. Transport Layer Security (TLS) is a communications protocol or system of rules that ensures privacy between communicating applications and their users on the Internet. Electronic cash is an amount of money that is computerized, stored, and used as cash for e-commerce transactions. A certificate authority (CA) is a trusted third-party organization or company that issues digital certificates. FEEDBACK: a. Here in the United States, credit cards with only magnetic stripes are being replaced by cards with chips that employ the EMV (Europay, Mastercard, and Visa) global standard for working with point-of-sale systems. Each time the EMV card is used for inserted into a point-of-sale device for payment, it creates a unique transaction code that can never be reused. b. Here in the United States, credit cards with only magnetic stripes are being replaced by cards with chips that employ the EMV (Europay, Mastercard, and Visa) global standard for working with point-of-sale systems. Each time the EMV card is used for inserted into a point-of-sale device for payment, it creates a unique transaction code that can never be reused. c. Here in the United States, credit cards with only magnetic stripes are being replaced by cards with chips that employ the EMV (Europay, Mastercard, and Visa) global standard for working with point-of-sale systems. Each time the EMV card is used for inserted into a point-of-sale device for payment, it creates a unique transaction code that can never be reused. d. Here in the United States, credit cards with only magnetic stripes are being replaced by cards with chips that employ the EMV (Europay, Mastercard, and Visa) global standard for working with point-of-sale systems. Each time the EMV card is used for inserted into a point-of-sale device for payment, it creates a unique transaction code that can never be reused.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Electronic Payment Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.5 - Discuss key features of electronic payment systems needed to support ecommerce. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 12:33 PM DATE MODIFIED: 7/2/2020 12:49 PM 78. How does TLS help make e-commerce transactions more secure? a. Web browsers and Web servers perform an automated "handshake" at the end of each conversation. b. TLS allows Web browsers to initiate temporary, private conversations with Web servers. c. TLS assigns digital certificates to Web sites to provide positive server identification. d. A photo of an individual's face or fingerprint is used to verify purchases. ANSWER: b RATIONALE: Transport Layer Security (TLS) is a communications protocol or system of rules that ensures Copyright Cengage Learning. Powered by Cognero.

Page 54


Chapter 09 - E-Commerce privacy between communicating applications and their users on the Internet. TLS enables a client (such as a Web browser) to initiate a temporary, private conversation with a server (such as a shopping site on the Web or an online bank). Before the client and server start communicating, they perform an automated process called a “handshake” where they exchange information about who they are, and which secret codes and algorithms they’ll use to encode their messages to each other. FEEDBACK:

a. TLS enables a client (such as a Web browser) to initiate a temporary, private conversation with a server (such as a shopping site on the Web or an online bank). b. TLS enables a client (such as a Web browser) to initiate a temporary, private conversation with a server (such as a shopping site on the Web or an online bank). c. TLS enables a client (such as a Web browser) to initiate a temporary, private conversation with a server (such as a shopping site on the Web or an online bank). d. TLS enables a client (such as a Web browser) to initiate a temporary, private conversation with a server (such as a shopping site on the Web or an online bank).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Electronic Payment Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.5 - Discuss key features of electronic payment systems needed to support ecommerce. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 12:33 PM DATE MODIFIED: 7/2/2020 1:02 PM 79. Successful implementation of e-commerce requires _____. a. a substantial investment in IS technology b. stable, predictable existing business processes c. replacing relational databases with other systems d. the hiring of additional marketing staff ANSWER: a RATIONALE: Successful implementation of e-commerce requires significant changes to existing business processes and substantial investment in IS technology. FEEDBACK: a. Successful implementation of e-commerce requires significant changes to existing business processes and substantial investment in IS technology. b. Successful implementation of e-commerce requires significant changes to existing business processes and substantial investment in IS technology. c. Successful implementation of e-commerce requires significant changes to existing business processes and substantial investment in IS technology. d. Successful implementation of e-commerce requires significant changes to existing business processes and substantial investment in IS technology.

POINTS: DIFFICULTY: REFERENCES:

1 Easy Technology Infrastructure Required to Support E-Commerce and M-Commerce

Copyright Cengage Learning. Powered by Cognero.

Page 55


Chapter 09 - E-Commerce QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.6 - Identify the key components of technology infrastructure that must be in place for e-commerce to work. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 1:03 PM DATE MODIFIED: 7/2/2020 3:04 PM 80. Gordon is helping his company prepare for the launch of their e-commerce site. He knows that they must choose their technology components carefully and integrate them with the goal of _____. a. modifying existing business processes b. driving new customers to the site c. supporting a large volume of transactions d. migrating the site to a public cloud ANSWER: c RATIONALE: Successful implementation of e-commerce requires significant changes to existing business processes and substantial investment in IS technology. These technology components must be chosen carefully and integrated to support a large volume of transactions with customers, suppliers, and other business partners worldwide. FEEDBACK: a. The technology components for an e-commerce implementation must be chosen carefully and integrated to support a large volume of transactions with customers, suppliers, and other business partners worldwide. b. The technology components for an e-commerce implementation must be chosen carefully and integrated to support a large volume of transactions with customers, suppliers, and other business partners worldwide. c. The technology components for an e-commerce implementation must be chosen carefully and integrated to support a large volume of transactions with customers, suppliers, and other business partners worldwide. d. The technology components for an e-commerce implementation must be chosen carefully and integrated to support a large volume of transactions with customers, suppliers, and other business partners worldwide.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Technology Infrastructure Required to Support E-Commerce and M-Commerce QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.6 - Identify the key components of technology infrastructure that must be in place for e-commerce to work. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 2:50 PM DATE MODIFIED: 7/2/2020 3:14 PM 81. A likely result of launching an e-commerce Web site with inadequate technology infrastructure is _____. a. the loss of sales to other Web sites b. an improvement in customer support c. an increase in response times d. unexpected software expenses Copyright Cengage Learning. Powered by Cognero.

Page 56


Chapter 09 - E-Commerce ANSWER: RATIONALE:

a Successful implementation of e-commerce requires significant changes to existing business processes and substantial investment in IS technology. These technology components must be chosen carefully and integrated to support a large volume of transactions with customers, suppliers, and other business partners worldwide. In surveys, online consumers frequently note that poor Web site performance (e.g., slow response time, inadequate customer support, and lost orders) drives them to abandon some ecommerce sites in favor of those with better, more reliable performance.

FEEDBACK:

a. The technology components of an e-commerce implementation must be chosen

carefully and integrated to support a large volume of transactions with customers, suppliers, and other business partners worldwide. In surveys, online consumers frequently note that poor Web site performance (e.g., slow response time, inadequate customer support, and lost orders) drives them to abandon some ecommerce sites in favor of those with better, more reliable performance. b. The technology components of an e-commerce implementation must be chosen carefully and integrated to support a large volume of transactions with customers, suppliers, and other business partners worldwide. In surveys, online consumers frequently note that poor Web site performance (e.g., slow response time, inadequate customer support, and lost orders) drives them to abandon some ecommerce sites in favor of those with better, more reliable performance. c. The technology components of an e-commerce implementation must be chosen carefully and integrated to support a large volume of transactions with customers, suppliers, and other business partners worldwide. In surveys, online consumers frequently note that poor Web site performance (e.g., slow response time, inadequate customer support, and lost orders) drives them to abandon some ecommerce sites in favor of those with better, more reliable performance. d. The technology components of an e-commerce implementation must be chosen carefully and integrated to support a large volume of transactions with customers, suppliers, and other business partners worldwide. In surveys, online consumers frequently note that poor Web site performance (e.g., slow response time, inadequate customer support, and lost orders) drives them to abandon some ecommerce sites in favor of those with better, more reliable performance.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Technology Infrastructure Required to Support E-Commerce and M-Commerce QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.6 - Identify the key components of technology infrastructure that must be in place for e-commerce to work. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 3:04 PM DATE MODIFIED: 7/2/2020 3:21 PM 82. A key ingredient to e-commerce infrastructure is _____. a. a virtual private cloud b. establishing a loyal community c. a Web server platform d. the certificate authority ANSWER: c Copyright Cengage Learning. Powered by Cognero.

Page 57


Chapter 09 - E-Commerce RATIONALE: FEEDBACK:

A Web server platform complete with the appropriate hardware and software is a key ingredient to e-commerce infrastructure. a. A Web server platform complete with the appropriate hardware and software is a key ingredient to e-commerce infrastructure.

b. A Web server platform complete with the appropriate hardware and software is a key ingredient to e-commerce infrastructure. c. A Web server platform complete with the appropriate hardware and software is a key ingredient to e-commerce infrastructure. d. A Web server platform complete with the appropriate hardware and software is a key ingredient to e-commerce infrastructure.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Hardware QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.6 - Identify the key components of technology infrastructure that must be in place for e-commerce to work. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 3:15 PM DATE MODIFIED: 7/2/2020 3:29 PM 83. Henry is trying to calculate the storage capacity and computing power required for his company's e-commerce Web server. What are the two primary factors Henry must take into account? a. form and speed of the Internet connection b. number of products and number of customers c. server software and volume of transactions d. authentication method and server hardware ANSWER: c RATIONALE: A Web server platform complete with the appropriate hardware and software is a key ingredient to e-commerce infrastructure. The amount of storage capacity and computing power required of the Web server depends primarily on two things: the software that must run on the server and the volume of e-commerce transactions that must be processed. FEEDBACK: a. The amount of storage capacity and computing power required of the Web server depends primarily on two things: the software that must run on the server and the volume of e-commerce transactions that must be processed. b. The amount of storage capacity and computing power required of the Web server depends primarily on two things: the software that must run on the server and the volume of e-commerce transactions that must be processed. c. The amount of storage capacity and computing power required of the Web server depends primarily on two things: the software that must run on the server and the volume of e-commerce transactions that must be processed. d. The amount of storage capacity and computing power required of the Web server depends primarily on two things: the software that must run on the server and the volume of e-commerce transactions that must be processed.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Hardware Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 58


Chapter 09 - E-Commerce HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.6 - Identify the key components of technology infrastructure that must be in place for e-commerce to work. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 3:22 PM DATE MODIFIED: 7/2/2020 3:37 PM 84. The most successful e-commerce solutions can be upgraded to meet unexpected user traffic because of their _____. a. low costs b. scalability c. configurability d. reliability ANSWER: b RATIONALE: The most successful e-commerce solutions are designed to be highly scalable so that they can be upgraded to meet unexpected user traffic. FEEDBACK: a. The most successful e-commerce solutions are designed to be highly scalable so that they can be upgraded to meet unexpected user traffic. b. The most successful e-commerce solutions are designed to be highly scalable so that they can be upgraded to meet unexpected user traffic. c. The most successful e-commerce solutions are designed to be highly scalable so that they can be upgraded to meet unexpected user traffic. d. The most successful e-commerce solutions are designed to be highly scalable so that they can be upgraded to meet unexpected user traffic.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Hardware QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.6 - Identify the key components of technology infrastructure that must be in place for e-commerce to work. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 3:30 PM DATE MODIFIED: 7/2/2020 3:43 PM 85. Clarabel, who is helping design her firm's e-commerce infrastructure, tells a colleague, "It is encouraging to remember that computer hardware continues to become more powerful without becoming more expensive thanks to _____." a. value-added networks b. m-commerce c. the TLS Rule d. Moore's Law ANSWER: d RATIONALE: Computing hardware is getting more powerful even while the prices of hardware fall. When you consider the cost of hardware for e-commerce you must take this into account. It is important to understand the role of Moore’s Law when you consider the hardware used to support e-commerce. Researchers have modified Gordon Moore’s observation to a general prediction about the power of computers: Computer power doubles about every 18 months— Copyright Cengage Learning. Powered by Cognero.

Page 59


Chapter 09 - E-Commerce for the same price. FEEDBACK:

a. It is important to understand the role of Moore’s Law when you consider the

hardware used to support e-commerce. Researchers have modified Gordon Moore’s observation to a general prediction about the power of computers: Computer power doubles about every 18 months—for the same price. b. It is important to understand the role of Moore’s Law when you consider the hardware used to support e-commerce. Researchers have modified Gordon Moore’s observation to a general prediction about the power of computers: Computer power doubles about every 18 months—for the same price. c. It is important to understand the role of Moore’s Law when you consider the hardware used to support e-commerce. Researchers have modified Gordon Moore’s observation to a general prediction about the power of computers: Computer power doubles about every 18 months—for the same price. d. It is important to understand the role of Moore’s Law when you consider the hardware used to support e-commerce. Researchers have modified Gordon Moore’s observation to a general prediction about the power of computers: Computer power doubles about every 18 months—for the same price.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Hardware QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.6 - Identify the key components of technology infrastructure that must be in place for e-commerce to work. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 3:37 PM DATE MODIFIED: 7/2/2020 3:50 PM 86. Businesses with appropriate e-commerce infrastructure in place may still experience Web site outages due to _____. a. excessive use of encryption b. low network latency c. server configuration changes d. third-party Web hosting ANSWER: c RATIONALE: Even when you have the right hardware in place you can have a Web site outage if visitors cannot access the Web page. There were several high-profile Web site outages in 2019 that impacted millions of uses, including Facebook and Google Cloud Platform outages caused by server configuration changes. FEEDBACK: a. Even when you have the right hardware in place you can have a Web site outage if visitors cannot access the Web page. There were several high-profile Web site outages in 2019 that impacted millions of uses, including Facebook and Google Cloud Platform outages caused by server configuration changes. b. Even when you have the right hardware in place you can have a Web site outage if visitors cannot access the Web page. There were several high-profile Web site outages in 2019 that impacted millions of uses, including Facebook and Google Cloud Platform outages caused by server configuration changes. c. Even when you have the right hardware in place you can have a Web site outage if visitors cannot access the Web page. There were several high-profile Web site outages in 2019 that impacted millions of uses, including Facebook and Google Cloud Platform outages caused by server configuration changes.

Copyright Cengage Learning. Powered by Cognero.

Page 60


Chapter 09 - E-Commerce d. Even when you have the right hardware in place you can have a Web site outage if visitors cannot access the Web page. There were several high-profile Web site outages in 2019 that impacted millions of uses, including Facebook and Google Cloud Platform outages caused by server configuration changes.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Hardware QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.6 - Identify the key components of technology infrastructure that must be in place for e-commerce to work. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 3:43 PM DATE MODIFIED: 7/2/2020 4:04 PM 87. JoAnn's company is preparing to launch an e-commerce Web site. After researching the process and realizing that they don't have any of the necessary technology infrastructure in place, JoAnn advises that they minimize their initial out-ofpocket costs and speed up the launch of the site by _____. a. only purchasing e-commerce software b. joining a consortium electronic exchange c. hosting the Web site themselves d. using a third-party Web service provider ANSWER: d RATIONALE: A key decision facing a new e-commerce company is whether to host its own Web site or to let someone else do it. Many companies decide that using a third-party Web service provider is the best way to meet initial e-commerce needs. The third-party company rents space on its computer system and provides a high-speed connection to the Internet, thus minimizing the initial out-of-pocket costs for e-commerce start-up. The third party can also provide personnel trained to operate, troubleshoot, and manage the Web server. FEEDBACK: a. Many companies decide that using a third-party Web service provider is the best way to meet initial e-commerce needs. The third-party company rents space on its computer system and provides a high-speed connection to the Internet, thus minimizing the initial out-of-pocket costs for e-commerce start-up. b. Many companies decide that using a third-party Web service provider is the best way to meet initial e-commerce needs. The third-party company rents space on its computer system and provides a high-speed connection to the Internet, thus minimizing the initial out-of-pocket costs for e-commerce start-up. c. Many companies decide that using a third-party Web service provider is the best way to meet initial e-commerce needs. The third-party company rents space on its computer system and provides a high-speed connection to the Internet, thus minimizing the initial out-of-pocket costs for e-commerce start-up. d. Many companies decide that using a third-party Web service provider is the best way to meet initial e-commerce needs. The third-party company rents space on its computer system and provides a high-speed connection to the Internet, thus minimizing the initial out-of-pocket costs for e-commerce start-up.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Hardware Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 61


Chapter 09 - E-Commerce HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.6 - Identify the key components of technology infrastructure that must be in place for e-commerce to work. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 3:51 PM DATE MODIFIED: 7/2/2020 4:12 PM 88. Which component of an e-commerce technology infrastructure performs several fundamental services including security and identification, retrieval and sending of Web pages, Web site tracking, and Web site development? a. Web server software b. e-commerce software c. Web server server operating system d. virtual private network ANSWER: a RATIONALE: In addition to the Web server operating system, each e-commerce site must have Web server software to perform fundamental services, including security and identification, retrieval and sending of Web pages, Web site tracking, and Web site development. FEEDBACK: a. In addition to the Web server operating system, each e-commerce site must have Web server software to perform fundamental services, including security and identification, retrieval and sending of Web pages, Web site tracking, and Web site development. b. In addition to the Web server operating system, each e-commerce site must have Web server software to perform fundamental services, including security and identification, retrieval and sending of Web pages, Web site tracking, and Web site development. c. In addition to the Web server operating system, each e-commerce site must have Web server software to perform fundamental services, including security and identification, retrieval and sending of Web pages, Web site tracking, and Web site development. d. In addition to the Web server operating system, each e-commerce site must have Web server software to perform fundamental services, including security and identification, retrieval and sending of Web pages, Web site tracking, and Web site development.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Web Server Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.6 - Identify the key components of technology infrastructure that must be in place for e-commerce to work. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 4:05 PM DATE MODIFIED: 7/2/2020 4:16 PM 89. Apache HTTP Server and Microsoft's Internet Information Services are the two most widely used _____ packages. a. Web server operating system software b. Web server software c. e-commerce software Copyright Cengage Learning. Powered by Cognero.

Page 62


Chapter 09 - E-Commerce d. e-commerce networking software ANSWER: b RATIONALE: The two most widely used Web server software packages are Apache HTTP Server and Microsoft’s Internet Information Services. FEEDBACK: a. The two most widely used Web server software packages are Apache HTTP Server and Microsoft’s Internet Information Services. b. The two most widely used Web server software packages are Apache HTTP Server and Microsoft’s Internet Information Services. c. The two most widely used Web server software packages are Apache HTTP Server and Microsoft’s Internet Information Services. d. The two most widely used Web server software packages are Apache HTTP Server and Microsoft’s Internet Information Services.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Web Server Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.6 - Identify the key components of technology infrastructure that must be in place for e-commerce to work. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 4:12 PM DATE MODIFIED: 7/2/2020 4:21 PM 90. Which component of an e-commerce technology infrastructure most directly supports the following core tasks: catalog management, product configuration, shopping cart facilities, transaction processing, and Web traffic data analysis? a. Web server operating system software b. Web server software c. e-commerce software d. m-commerce hardware ANSWER: c RATIONALE: After you have located or built a host server, including the hardware, operating system, and Web server software, you can begin to investigate and install e-commerce software to support five core tasks: catalog management to create and update the product catalog, product configuration to help customers select the necessary components and options, shopping cart facilities to track the items selected for purchase, e-commerce transaction processing, and Web traffic data analysis to provide details to adjust the operations of the Web site. FEEDBACK: a. After you have located or built a host server, you can begin to investigate and install e-commerce software to support five core tasks: catalog management to create and update the product catalog, product configuration to help customers select the necessary components and options, shopping cart facilities to track the items selected for purchase, e-commerce transaction processing, and Web traffic data analysis to provide details to adjust the operations of the Web site. b. After you have located or built a host server, you can begin to investigate and install e-commerce software to support five core tasks: catalog management to create and update the product catalog, product configuration to help customers select the necessary components and options, shopping cart facilities to track the items selected for purchase, e-commerce transaction processing, and Web traffic data analysis to provide details to adjust the operations of the Web site.

Copyright Cengage Learning. Powered by Cognero.

Page 63


Chapter 09 - E-Commerce c. After you have located or built a host server, you can begin to investigate and

install e-commerce software to support five core tasks: catalog management to create and update the product catalog, product configuration to help customers select the necessary components and options, shopping cart facilities to track the items selected for purchase, e-commerce transaction processing, and Web traffic data analysis to provide details to adjust the operations of the Web site. d. After you have located or built a host server, you can begin to investigate and install e-commerce software to support five core tasks: catalog management to create and update the product catalog, product configuration to help customers select the necessary components and options, shopping cart facilities to track the items selected for purchase, e-commerce transaction processing, and Web traffic data analysis to provide details to adjust the operations of the Web site.

POINTS: 1 DIFFICULTY: Easy REFERENCES: E-Commerce Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.6 - Identify the key components of technology infrastructure that must be in place for e-commerce to work. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 4:16 PM DATE MODIFIED: 7/2/2020 4:26 PM 91. Security is a major concern with m-commerce. How can m-commerce software ensure the security of transmissions and that the transaction is being made with the intended party? a. increased network speeds b. encryption and digital certificates c. scalable deployments d. catalog management and product configuration ANSWER: b RATIONALE: Security is also a major concern with m-commerce, particularly in two areas: the security of the transmission itself and the trust that the transaction is being made with the intended party. Encryption can provide secure transmission. Digital certificates can ensure that transactions are made between the intended parties. FEEDBACK: a. Encryption can provide secure transmission. Digital certificates can ensure that transactions are made between the intended parties. b. Encryption can provide secure transmission. Digital certificates can ensure that transactions are made between the intended parties. c. Encryption can provide secure transmission. Digital certificates can ensure that transactions are made between the intended parties. d. Encryption can provide secure transmission. Digital certificates can ensure that transactions are made between the intended parties.

POINTS: 1 DIFFICULTY: Easy REFERENCES: M-Commerce Hardware and Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.6 - Identify the key components of technology infrastructure that must be in place Copyright Cengage Learning. Powered by Cognero.

Page 64


Chapter 09 - E-Commerce KEYWORDS: DATE CREATED: DATE MODIFIED:

for e-commerce to work. Bloom's: Remember 7/2/2020 4:21 PM 7/2/2020 4:34 PM

92. Which of the following factors is NOT one of the main reasons Web developers must often rewrite existing Web applications for mobile devices? a. small screens b. tediousness of entering data c. degree of processing power d. PIC security standard requirements ANSWER: d RATIONALE: Mobile devices used for m-commerce have several limitations that complicate their use. Their screens are small, perhaps no more than several square inches, and might be able to display only small portions of a Web site. In addition, entering data on a mobile device can be tedious and error prone. Mobile devices also have less processing power and less bandwidth than desktop or laptop computers, which are usually connected to a high-speed network. They also operate on limited-life batteries. For these reasons, Web developers must often rewrite Web applications so that users with mobile devices can access them more efficiently. FEEDBACK: a. Mobile devices used for m-commerce have several limitations: their screens are small, and might be able to display only small portions of a Web site; entering data can be tedious and error prone; they have less processing power and less bandwidth than desktop or laptop computers; and they also operate on limited-life batteries. For these reasons, Web developers must often rewrite Web applications so that users with mobile devices can access them more efficiently. b. Mobile devices used for m-commerce have several limitations: their screens are small, and might be able to display only small portions of a Web site; entering data can be tedious and error prone; they have less processing power and less bandwidth than desktop or laptop computers; and they also operate on limited-life batteries. For these reasons, Web developers must often rewrite Web applications so that users with mobile devices can access them more efficiently. c. Mobile devices used for m-commerce have several limitations: their screens are small, and might be able to display only small portions of a Web site; entering data can be tedious and error prone; they have less processing power and less bandwidth than desktop or laptop computers; and they also operate on limited-life batteries. For these reasons, Web developers must often rewrite Web applications so that users with mobile devices can access them more efficiently. d. Mobile devices used for m-commerce have several limitations: their screens are small, and might be able to display only small portions of a Web site; entering data can be tedious and error prone; they have less processing power and less bandwidth than desktop or laptop computers; and they also operate on limited-life batteries. For these reasons, Web developers must often rewrite Web applications so that users with mobile devices can access them more efficiently.

POINTS: 1 DIFFICULTY: Easy REFERENCES: M-Commerce Hardware and Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.6 - Identify the key components of technology infrastructure that must be in place Copyright Cengage Learning. Powered by Cognero.

Page 65


Chapter 09 - E-Commerce KEYWORDS: DATE CREATED: DATE MODIFIED:

for e-commerce to work. Bloom's: Remember 7/2/2020 4:27 PM 7/2/2020 4:45 PM

93. One core task of e-commerce software is product configuration, which _____. a. helps customers select the necessary components and options b. tracks the items selected for purchase c. allows creation and revision of the product catalog d. provides details to adjust the operations of the Web site ANSWER: a RATIONALE: After you have located or built a host server, including the hardware, operating system, and Web server software, you can begin to investigate and install e-commerce software to support five core tasks: catalog management to create and update the product catalog, product configuration to help customers select the necessary components and options, shopping cart facilities to track the items selected for purchase, e-commerce transaction processing, and Web traffic data analysis to provide details to adjust the operations of the Web site. FEEDBACK: a. E-commerce software supports five core tasks: catalog management to create and update the product catalog, product configuration to help customers select the necessary components and options, shopping cart facilities to track the items selected for purchase, e-commerce transaction processing, and Web traffic data analysis to provide details to adjust the operations of the Web site. b. E-commerce software supports five core tasks: catalog management to create and update the product catalog, product configuration to help customers select the necessary components and options, shopping cart facilities to track the items selected for purchase, e-commerce transaction processing, and Web traffic data analysis to provide details to adjust the operations of the Web site. c. E-commerce software supports five core tasks: catalog management to create and update the product catalog, product configuration to help customers select the necessary components and options, shopping cart facilities to track the items selected for purchase, e-commerce transaction processing, and Web traffic data analysis to provide details to adjust the operations of the Web site. d. E-commerce software supports five core tasks: catalog management to create and update the product catalog, product configuration to help customers select the necessary components and options, shopping cart facilities to track the items selected for purchase, e-commerce transaction processing, and Web traffic data analysis to provide details to adjust the operations of the Web site.

POINTS: 1 DIFFICULTY: Easy REFERENCES: E-Commerce Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.9.6 - Identify the key components of technology infrastructure that must be in place for e-commerce to work. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 4:34 PM DATE MODIFIED: 7/2/2020 4:49 PM Essay Copyright Cengage Learning. Powered by Cognero.

Page 66


Chapter 09 - E-Commerce 94. Define electronic commerce and identify its various subsets. ANSWER: Electronic commerce (e-commerce) is the conducting of business activities (e.g., distribution, buying, selling, marketing, and servicing of products or services) electronically over computer networks. It includes any business transaction executed electronically between companies (business-to-business), companies and consumers (business-to-consumer), consumers and other consumers (consumer-to-consumer), public sector and business (government-to-business), the public sector to citizens (government-to-citizen), and public sector to public sector (government-to-government). Business activities that are strong candidates for conversion to e-commerce are ones that are paper based, time consuming, and inconvenient for customers. RATIONALE: E-commerce involves conducting business activities (e.g., distribution, buying, selling, marketing, and servicing of products or services) electronically over computer networks. Some people think of the network as roads that connect the Web sites together, while the Web sites are collections of content located along that network of roads. E-commerce includes any business transaction executed electronically between companies (business-tobusiness), companies and consumers (business-to-consumer), consumers and other consumers (consumer-to-consumer), public sector and business (government-to-business), the public sector to citizens (government-to-citizen), and public sector to public sector (government-to-government).

POINTS: RUBRIC:

Business activities that have proven to be strong candidates for conversion to e-commerce include ones that were paper based, time consuming, and inconvenient for customers. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Defines ecommerce Lists the forms of e-commerce

DIFFICULTY: Moderate REFERENCES: An Introduction to E-Commerce QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/1/2020 12:20 PM 95. Why is mobile commerce (m-commerce) maturing much later in North America than in other countries? ANSWER: The market for m-commerce in North America is maturing much later than in other countries, such as Japan, South Korea, and the United Kingdom, for several reasons. In North America, responsibility for network infrastructure is fragmented among many providers, and consumer payments are usually made by credit card. In most Western European countries, consumers are much more willing to use m-commerce. Japanese consumers are generally enthusiastic about new technology and therefore have been much more likely to use mobile Copyright Cengage Learning. Powered by Cognero.

Page 67


Chapter 09 - E-Commerce RATIONALE:

POINTS: RUBRIC:

technologies to make purchases. The market for m-commerce in North America is maturing much later than in other countries, such as Japan, South Korea, and the United Kingdom, for several reasons. In North America, responsibility for network infrastructure is fragmented among many providers, and consumer payments are usually made by credit card. In most Western European countries, consumers are much more willing to use m-commerce. Japanese consumers are generally enthusiastic about new technology and therefore have been much more likely to use mobile technologies to make purchases. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Briefly describes the reasons for slower mcommerce adoption in North America

DIFFICULTY: Moderate REFERENCES: M-Commerce in Perspective QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.9.1 - Describe the underlying concepts of e-commerce. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/1/2020 12:24 PM 96. Identify and briefly discuss three key challenges a company must overcome to transition from traditional forms of commerce to e-commerce. ANSWER: The following are three key challenges to e-commerce: •

RATIONALE:

Dealing with consumer privacy concerns. About one-third of all adult Internet users will not buy anything online primarily because they have privacy concerns or lack trust in online merchants. In some cases, the compromise of personal data can lead to identity theft. Companies must be prepared to make a substantial investment to safeguard their customers’ privacy or run the risk of losing customers and generating potential class action lawsuits should the data be compromised. Overcoming consumers’ lack of trust. Lack of trust in online sellers is one of the most frequently cited reasons that some consumers give to explain why they are unwilling to purchase online. Online marketers must create specific trust-building strategies for their Web sites by analyzing their customers, products, and services. Overcoming global issues. Selling to a global market comes with numerous obstacles and issues associated with all global systems: cultural challenges, language challenges, time and distance challenges, infrastructure challenges, currency challenges, and state, regional, and national law challenges.

The following are three key challenges to e-commerce:

Copyright Cengage Learning. Powered by Cognero.

Page 68


Chapter 09 - E-Commerce •

POINTS: RUBRIC:

Dealing with consumer privacy concerns. About one-third of all adult Internet users will not buy anything online primarily because they have privacy concerns or lack trust in online merchants. In some cases, the compromise of personal data can lead to identity theft. Companies must be prepared to make a substantial investment to safeguard their customers’ privacy or run the risk of losing customers and generating potential class action lawsuits should the data be compromised. Overcoming consumers’ lack of trust. Lack of trust in online sellers is one of the most frequently cited reasons that some consumers give to explain why they are unwilling to purchase online. Online marketers must create specific trust-building strategies for their Web sites by analyzing their customers, products, and services. Overcoming global issues. Selling to a global market comes with numerous obstacles and issues associated with all global systems: cultural challenges, language challenges, time and distance challenges, infrastructure challenges, currency challenges, and state, regional, and national law challenges.

1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Names and describes three major challenges faced by organizations engaged in ecommerce

DIFFICULTY: Moderate REFERENCES: E-Commerce Challenges QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.9.3 - Outline the key components of a successful e-commerce business strategy. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/1/2020 12:33 PM 97. A small business owner is sceptical about online transactions. She is worried that information may be stolen in transmission or that the party on the other end may be a bogus one. Also, she is worried about the security of financial transactions online. What can she do to avoid these dangers? ANSWER: Current e-commerce technology relies on user identification and encryption to safeguard business transactions. Authentication technologies are used by many organizations to confirm the identity of a user requesting access to information or assets. A digital certificate is an attachment to an email message or data embedded in a Web site that verifies the identity of a sender or Web site. A certificate authority (CA) is a trusted third-party organization or company that issues digital certificates. The CA is responsible for guaranteeing that the people or organizations granted these unique certificates are in fact who they claim to be. Digital certificates thus create a trust chain throughout the transaction, verifying both purchaser and supplier identities. Copyright Cengage Learning. Powered by Cognero.

Page 69


Chapter 09 - E-Commerce

RATIONALE:

Many organizations that accept credit cards to pay for items purchased via e-commerce have adopted the Payment Card Industry (PCI) security standard (www.pcisecuritystandards.org ). This standard spells out measures and security procedures to safeguard the card issuer, the cardholder, and the merchant. Some of the measures include installing and maintaining a firewall configuration to control access to computers and data, never using software or hardware vendor-supplier defaults for system passwords, and requiring merchants to protect stored data, encrypt transmission of cardholder information across public networks, use and regularly update antivirus software, and restrict access to sensitive data on a need-to-know basis. Current e-commerce technology relies on user identification and encryption to safeguard business transactions. Authentication technologies are used by many organizations to confirm the identity of a user requesting access to information or assets. A digital certificate is an attachment to an email message or data embedded in a Web site that verifies the identity of a sender or Web site. A certificate authority (CA) is a trusted third-party organization or company that issues digital certificates. The CA is responsible for guaranteeing that the people or organizations granted these unique certificates are in fact who they claim to be. Digital certificates thus create a trust chain throughout the transaction, verifying both purchaser and supplier identities.

POINTS: RUBRIC:

Many organizations that accept credit cards to pay for items purchased via e-commerce have adopted the Payment Card Industry (PCI) security standard (www.pcisecuritystandards.org ). This standard spells out measures and security procedures to safeguard the card issuer, the cardholder, and the merchant. Some of the measures include installing and maintaining a firewall configuration to control access to computers and data, never using software or hardware vendor-supplier defaults for system passwords, and requiring merchants to protect stored data, encrypt transmission of cardholder information across public networks, use and regularly update antivirus software, and restrict access to sensitive data on a need-to-know basis. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Describe standard practices for increasing the security of ecommerce transactions

DIFFICULTY: Moderate REFERENCES: Electronic Payment Systems QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.9.5 - Discuss key features of electronic payment systems needed to support ecommerce. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/1/2020 12:43 PM Copyright Cengage Learning. Powered by Cognero.

Page 70


Chapter 09 - E-Commerce 98. When one is building a Web site that will be used for e-commerce, what initial steps should be taken? List some of the typical needs of potential visitors that a business should take into account. ANSWER: When building a Web site, you should first decide which tasks the site must accomplish. Most people agree that an effective Web site is one that creates an attractive presence and that meets the needs of its visitors, which might include the following:

• • • • • • • • • • • •

RATIONALE:

After a company determines which objectives its site should accomplish, it can move on planning and developing the site, keeping in mind that the priorities and objectives of customers may change over time. When building a Web site, you should first decide which tasks the site must accomplish. Most people agree that an effective Web site is one that creates an attractive presence and that meets the needs of its visitors, which might include the following:

• • • • • • • • • • • •

POINTS: RUBRIC:

Obtaining general information about the organization Obtaining financial information for making an investment decision in the organization Learning the organization’s position on social issues Learning about the products or services that the organization sells Buying the products or services that the company offers Checking the status of an order Getting advice or help on effective use of the products Registering a complaint about the organization’s products Registering a complaint concerning the organization’s position on social issues Providing a product testimonial or an idea for product improvement or a new product Obtaining information about warranties or service and repair policies for products Obtaining contact information for a person or department in the organization

Obtaining general information about the organization Obtaining financial information for making an investment decision in the organization Learning the organization’s position on social issues Learning about the products or services that the organization sells Buying the products or services that the company offers Checking the status of an order Getting advice or help on effective use of the products Registering a complaint about the organization’s products Registering a complaint concerning the organization’s position on social issues Providing a product testimonial or an idea for product improvement or a new product Obtaining information about warranties or service and repair policies for products Obtaining contact information for a person or department in the organization

After a company determines which objectives its site should accomplish, it can move on planning and developing the site, keeping in mind that the priorities and objectives of customers may change over time. 1 Criteria

Copyright Cengage Learning. Powered by Cognero.

0

1

2

3

4 Page 71


Chapter 09 - E-Commerce Failure

Below Expectations

Developing

Competent

Mastery

Describes the initial steps in building an ecommerce Web site Lists typical Web site visitor needs

DIFFICULTY: Moderate REFERENCES: Defining the Functions of a Web Site QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.9.3 - Outline the key components of a successful e-commerce business strategy. KEYWORDS: Bloom's: Remember DATE CREATED: 7/2/2020 4:53 PM DATE MODIFIED: 7/2/2020 4:59 PM

Copyright Cengage Learning. Powered by Cognero.

Page 72


Chapter 10 - Enterprise Systems True / False 1. Transaction processing systems (TPSs) provide valuable input to management information systems, decision support systems, and knowledge management systems. a. True b. False ANSWER: True RATIONALE: A TPS provides valuable input to management information systems, decision support systems, and knowledge management systems. FEEDBACK: Correct A TPS provides valuable input to management information systems, decision support systems, and knowledge management systems. Incorrect A TPS provides valuable input to management information systems, decision support systems, and knowledge management systems.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Transaction Processing Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.1 - Identify the basic activities and business objectives common to all transaction processing systems. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 12:31 PM 2. With an online transaction processing (OLTP) system, multiple transactions are accumulated over a period of time and prepared for processing in a large batch of similar transactions. a. True b. False ANSWER: False RATIONALE: With batch processing systems, business transactions are accumulated over a period of time and prepared for processing as a single unit or batch. With online transaction processing (OLTP) each transaction is processed immediately without the delay of accumulating transactions into a batch. FEEDBACK: Correct With online transaction processing (OLTP) each transaction is processed immediately without the delay of accumulating transactions into a batch. Incorrect With online transaction processing (OLTP) each transaction is processed immediately without the delay of accumulating transactions into a batch.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Traditional Transaction Processing Methods and Objectives QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.1 - Identify the basic activities and business objectives common to all transaction processing systems. NATIONAL STANDARDS: United States - BUSPROG: Technology Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 10 - Enterprise Systems KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 11/19/2019 5:51 PM 7/3/2020 12:34 PM

3. When there is a delay between an event and the eventual processing of the data, the type of system in use is called batch processing. a. True b. False ANSWER: True RATIONALE: With batch processing systems, business transactions are accumulated over a period of time and prepared for processing as a single unit or batch. The essential characteristic of a batch processing system is the delay between an event and the eventual processing of the related transaction to update the organization’s records. FEEDBACK: Correct The essential characteristic of a batch processing system is the delay between an event and the eventual processing of the related transaction to update the organization’s records. Incorrect The essential characteristic of a batch processing system is the delay between an event and the eventual processing of the related transaction to update the organization’s records.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Traditional Transaction Processing Methods and Objectives QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.1 - Identify the basic activities and business objectives common to all transaction processing systems. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 12:37 PM 4. The main difference between batch processing and online transaction processing is the currency of system data--that is, how up to date it is. a. True b. False ANSWER: True RATIONALE: With batch processing systems, business transactions are accumulated over a period of time and prepared for processing as a single unit or batch. The essential characteristic of a batch processing system is the delay between an event and the eventual processing of the related transaction to update the organization’s records. With online transaction processing (OLTP) each transaction is processed immediately without the delay of accumulating transactions into a batch. Consequently, at any time, the data in an online system reflects the current status. This type of processing is essential for businesses that require access to current data such as airlines, ticket agencies, and stock investment firms. FEEDBACK: Correct The essential characteristic of a batch processing system is the delay between an event and the eventual processing of the related transaction to update the organization’s records. With online transaction processing (OLTP) each transaction is processed immediately without the delay of accumulating transactions into a Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 10 - Enterprise Systems batch. Consequently, at any time, the data in an online system reflects the current status. Incorrect The essential characteristic of a batch processing system is the delay between an event and the eventual processing of the related transaction to update the organization’s records. With online transaction processing (OLTP) each transaction is processed immediately without the delay of accumulating transactions into a batch. Consequently, at any time, the data in an online system reflects the current status.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Traditional Transaction Processing Methods and Objectives QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.1 - Identify the basic activities and business objectives common to all transaction processing systems. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 12:43 PM 5. It is acceptable to for transaction processing systems to capture inaccurate data. a. True b. False ANSWER: False RATIONALE: Data collection begins with a transaction (e.g., taking a customer order) and results in data that serves as input to the TPS. Data should be captured at its source and recorded accurately in a timely fashion, with minimal manual effort and in an electronic or digital form that can be directly entered into the computer. FEEDBACK: Correct Data collection begins with a transaction (e.g., taking a customer order) and results in data that serves as input to the TPS. Data should be captured at its source and recorded accurately in a timely fashion, with minimal manual effort and in an electronic or digital form that can be directly entered into the computer. Incorrect Data collection begins with a transaction (e.g., taking a customer order) and results in data that serves as input to the TPS. Data should be captured at its source and recorded accurately in a timely fashion, with minimal manual effort and in an electronic or digital form that can be directly entered into the computer.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Transaction Processing Activities QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.1 - Identify the basic activities and business objectives common to all transaction processing systems. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 12:50 PM Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 10 - Enterprise Systems 6. Entering textual data in place of numeric data will result in rejection of the transaction. a. True b. False ANSWER: True RATIONALE: An important step in processing transaction data is to check data for validity and completeness to detect any problems, a task called data editing. For example, quantity and cost data must be numeric, and names must be alphabetic; otherwise, the data is not valid. FEEDBACK: Correct An important step in processing transaction data is to check data for validity and completeness to detect any problems, a task called data editing. For example, quantity and cost data must be numeric, and names must be alphabetic; otherwise, the data is not valid. Incorrect An important step in processing transaction data is to check data for validity and completeness to detect any problems, a task called data editing. For example, quantity and cost data must be numeric, and names must be alphabetic; otherwise, the data is not valid.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Transaction Processing Activities QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.1 - Identify the basic activities and business objectives common to all transaction processing systems. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 12:53 PM 7. Small- and medium-sized organizations do not employ enterprise systems. a. True b. False ANSWER: False RATIONALE: An enterprise system is central to individuals and organizations of all sizes and ensures that information can be shared with authorized users across all business functions and at all levels of management to support the running and managing of a business. Smaller organizations moved to ERP systems about 10 years after larger organizations did. FEEDBACK: Correct An enterprise system is central to individuals and organizations of all sizes and ensures that information can be shared with authorized users across all business functions and at all levels of management to support the running and managing of a business. Incorrect An enterprise system is central to individuals and organizations of all sizes and ensures that information can be shared with authorized users across all business functions and at all levels of management to support the running and managing of a business.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Easy Enterprise Systems True / False False

Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 10 - Enterprise Systems LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 1:03 PM 8. An enterprise system ensures that information can be shared with all authorized users, regardless of business function or level of management. a. True b. False ANSWER: True RATIONALE: An enterprise system is central to individuals and organizations of all sizes and ensures that information can be shared with authorized users across all business functions and at all levels of management to support the running and managing of a business. FEEDBACK: Correct An enterprise system is central to individuals and organizations of all sizes and ensures that information can be shared with authorized users across all business functions and at all levels of management to support the running and managing of a business. Incorrect An enterprise system is central to individuals and organizations of all sizes and ensures that information can be shared with authorized users across all business functions and at all levels of management to support the running and managing of a business.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Enterprise Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 1:06 PM 9. If an organization is using several separate systems, they can be replaced with a single integrated set of applications for the entire enterprise. a. True b. False ANSWER: True RATIONALE: In the past, organizations knitted together a hodgepodge of systems to accomplish their transaction processing activities. The approach taken today by many organizations is to implement an integrated set of transaction processing systems—from a single or limited number of software vendors—that handle most, or all, of their transaction processing activities. Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 10 - Enterprise Systems FEEDBACK:

Correct

The approach taken today by many organizations is to implement an integrated set of transaction processing systems—from a single or limited number of software vendors—that handle most, or all, of their transaction processing activities. Incorrect The approach taken today by many organizations is to implement an integrated set of transaction processing systems—from a single or limited number of software vendors—that handle most, or all, of their transaction processing activities.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Traditional Transaction Processing Methods and Objectives QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.1 - Identify the basic activities and business objectives common to all transaction processing systems. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 1:09 PM 10. Large organizations were the first to take on the challenge of implementing enterprise resource planning (ERP). a. True b. False ANSWER: True RATIONALE: Large organizations were the leaders in adopting ERP systems as only they could afford the associated large hardware and software costs and dedicate sufficient people resources to the implementation and support of these systems. FEEDBACK: Correct Large organizations were the leaders in adopting ERP systems as only they could afford the associated large hardware and software costs and dedicate sufficient people resources to the implementation and support of these systems. Incorrect Large organizations were the leaders in adopting ERP systems as only they could afford the associated large hardware and software costs and dedicate sufficient people resources to the implementation and support of these systems.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Leading ERP Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 1:11 PM 11. An integrated database for the entire organization makes it easier to share data among different business units. a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 10 - Enterprise Systems ANSWER: RATIONALE:

True Enterprise systems employ a database of key operational and planning data that can be shared by all, eliminating the problems of missing information and inconsistent information caused by multiple transaction processing systems that each support only one business function or one department in an organization.

FEEDBACK:

Correct

Enterprise systems employ a database of key operational and planning data that can be shared by all, eliminating the problems of missing information and inconsistent information caused by multiple transaction processing systems that each support only one business function or one department in an organization. Incorrect Enterprise systems employ a database of key operational and planning data that can be shared by all, eliminating the problems of missing information and inconsistent information caused by multiple transaction processing systems that each support only one business function or one department in an organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Enterprise Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 1:14 PM 12. Enterprise systems use multiple databases aimed at different business units. a. True b. False ANSWER: False RATIONALE: An enterprise system is central to individuals and organizations of all sizes and ensures that information can be shared with authorized users across all business functions and at all levels of management to support the running and managing of a business. Enterprise systems employ a database of key operational and planning data that can be shared by all, eliminating the problems of missing information and inconsistent information caused by multiple transaction processing systems that each support only one business function or one department in an organization. FEEDBACK: Correct Enterprise systems employ a database of key operational and planning data that can be shared by all, eliminating the problems of missing information and inconsistent information caused by multiple transaction processing systems that each support only one business function or one department in an organization. Incorrect Enterprise systems employ a database of key operational and planning data that can be shared by all, eliminating the problems of missing information and inconsistent information caused by multiple transaction processing systems that each support only one business function or one department in an organization.

POINTS: DIFFICULTY: REFERENCES:

1 Easy Enterprise Systems

Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 10 - Enterprise Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 1:17 PM 13. Implementation of an enterprise resource planning (ERP) system provides an organization with an opportunity to also upgrade the information technology that it uses. a. True b. False ANSWER: True RATIONALE: When implementing an ERP system, an organization has an opportunity to upgrade the information technology (such as hardware, operating systems, and databases) that it uses. FEEDBACK: Correct When implementing an ERP system, an organization has an opportunity to upgrade the information technology (such as hardware, operating systems, and databases) that it uses. Incorrect When implementing an ERP system, an organization has an opportunity to upgrade the information technology (such as hardware, operating systems, and databases) that it uses.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Advantages of ERP QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 1:23 PM 14. In an organization, a transaction processing system (TPS) supports routine operations associated with its business processes. a. True b. False ANSWER: True RATIONALE: Many organizations employ transaction processing systems (TPSs), which capture and process the detailed data necessary to update records about the fundamental business operations of the organization. FEEDBACK: Correct Many organizations employ transaction processing systems (TPSs), which capture and process the detailed data necessary to update records about the fundamental business operations of the organization. Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 10 - Enterprise Systems Incorrect Many organizations employ transaction processing systems (TPSs), which capture and process the detailed data necessary to update records about the fundamental business operations of the organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Transaction Processing Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.1 - Identify the basic activities and business objectives common to all transaction processing systems. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 1:24 PM 15. The bill of materials (BOM) serves as a recipe of ingredients needed to make each item an organization manufactures. a. True b. False ANSWER: True RATIONALE: For a manufacturing organization, materials requirement planning (MRP) determines the amount and timing for placing raw material orders with suppliers. The types and amounts of raw materials required to support the planned production schedule are determined by the existing raw material inventory and the bill of materials (BOM), which serves as a recipe of ingredients needed to make each item. FEEDBACK: Correct The types and amounts of raw materials required to support the planned production schedule are determined by the existing raw material inventory and the bill of materials (BOM), which serves as a recipe of ingredients needed to make each item. Incorrect The types and amounts of raw materials required to support the planned production schedule are determined by the existing raw material inventory and the bill of materials (BOM), which serves as a recipe of ingredients needed to make each item.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Supply Chain Management (SCM) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 1:27 PM 16. A customer relationship management (CRM) system helps a company to plan, execute, and control all the activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and the Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 10 - Enterprise Systems warehousing and delivery of finished product to customers. a. True b. False ANSWER: False RATIONALE: An organization can use an ERP system within a manufacturing organization to support what is known as supply chain management (SCM), which includes planning, executing, and controlling all activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and the warehousing and delivery of finished product to customers. A customer relationship management (CRM) system helps a company manage all aspects of customer encounters, including marketing, sales, distribution, accounting, and customer service. FEEDBACK: Correct A customer relationship management (CRM) system helps a company manage all aspects of customer encounters, including marketing, sales, distribution, accounting, and customer service. Incorrect A customer relationship management (CRM) system helps a company manage all aspects of customer encounters, including marketing, sales, distribution, accounting, and customer service.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Customer Relationship Management QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 1:30 PM 17. A designer would use computer aided manufacturing (CAM) to create, analyze, and modify the design of a component. a. True b. False ANSWER: False RATIONALE: Computer-aided design (CAD) is the use of software to assist in the creation, analysis, and modification of the design of a component or product. Computer-aided manufacturing (CAM) is the use of software to control machine tools and related machinery in the manufacture of components and products. FEEDBACK: Correct Computer-aided manufacturing (CAM) is the use of software to control machine tools and related machinery in the manufacture of components and products. Incorrect Computer-aided manufacturing (CAM) is the use of software to control machine tools and related machinery in the manufacture of components and products.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Product Lifecycle Management (PLM) True / False

Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 10 - Enterprise Systems HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 1:36 PM 18. Product lifecycle management (PLM) typically includes customer relationship management (CRM) software. a. True b. False ANSWER: False RATIONALE: Product lifecycle management (PLM) software provides a means for managing the data and processes associated with the various phases of the product lifecycle, including sales and marketing, research and development, concept development, product design, prototyping and testing, manufacturing process design, production and assembly, delivery and product installation, service and support, and product retirement and replacement. A customer relationship management (CRM) system helps a company manage all aspects of customer encounters, including marketing, sales, distribution, accounting, and customer service. FEEDBACK: Correct Product lifecycle management (PLM) software provides a means for managing the data and processes associated with the various phases of the product lifecycle, including sales and marketing, research and development, concept development, product design, prototyping and testing, manufacturing process design, production and assembly, delivery and product installation, service and support, and product retirement and replacement. Incorrect Product lifecycle management (PLM) software provides a means for managing the data and processes associated with the various phases of the product lifecycle, including sales and marketing, research and development, concept development, product design, prototyping and testing, manufacturing process design, production and assembly, delivery and product installation, service and support, and product retirement and replacement.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Product Lifecycle Management (PLM) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 1:38 PM 19. Customer support, sales management, and contact management are key features of a customer relationship management (CRM) system. a. True Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 10 - Enterprise Systems b. False ANSWER: RATIONALE:

FEEDBACK:

True The key features of a CRM system include contact management, sales management, customer support, marketing automation, analysis, social networking, access by mobile devices, and importing of contact data. Correct

The key features of a CRM system include contact management, sales management, customer support, marketing automation, analysis, social networking, access by mobile devices, and importing of contact data. Incorrect The key features of a CRM system include contact management, sales management, customer support, marketing automation, analysis, social networking, access by mobile devices, and importing of contact data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Customer Relationship Management QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 1:41 PM 20. External users of product lifecycle management (PLM) software include design partners and raw material suppliers. a. True b. False ANSWER: True RATIONALE: PLM software and its data are used by both internal and external users. Internal users include engineering, operations and manufacturing, procurement and sourcing, manufacturing, marketing, quality assurance, customer service, regulatory, and others. External users include the manufacturer’s design partners, packaging suppliers, raw material suppliers, and contract manufacturers. FEEDBACK: Correct External users of PLM software include the manufacturer’s design partners, packaging suppliers, raw material suppliers, and contract manufacturers. Incorrect External users of PLM software include the manufacturer’s design partners, packaging suppliers, raw material suppliers, and contract manufacturers.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Product Lifecycle Management (PLM) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 10 - Enterprise Systems DATE CREATED: DATE MODIFIED:

11/19/2019 5:51 PM 7/3/2020 1:44 PM

21. Organizations frequently need to customize a vendor's enterprise resource planning (ERP) software to integrate other business systems. a. True b. False ANSWER: True RATIONALE: The base enterprise system may need to be modified to meet mandatory business requirements. System customizations can become extremely expensive and further delay implementation. FEEDBACK: Correct The base enterprise system may need to be modified to meet mandatory business requirements. Incorrect The base enterprise system may need to be modified to meet mandatory business requirements.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.5 - Identify the challenges that organizations face in planning, building, and operating their enterprise systems. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 1:49 PM 22. To successfully implement a supply chain management system, an organization must be able to integrate its systems with its suppliers. a. True b. False ANSWER: True RATIONALE: One way to think about SCM is that it involves managing materials, information, and finances as they move from supplier to manufacturer to wholesaler to retailer to consumer. The materials flow includes the inbound movement of raw materials from supplier to manufacturer as well as the outbound movement of finished product from manufacturer to wholesaler, retailer, and customer. The information flow involves capturing and transmitting orders and invoices among suppliers, manufacturers, wholesalers, retailers, and customers. The financial flow consists of payment transactions among suppliers, manufacturers, wholesalers, retailers, customers, and their financial institutions. FEEDBACK: Correct The information flow in supply chain management involves capturing and transmitting orders and invoices among suppliers, manufacturers, wholesalers, retailers, and customers. Incorrect The information flow in supply chain management involves capturing and transmitting orders and invoices among suppliers, manufacturers, wholesalers, retailers, and customers.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 10 - Enterprise Systems DIFFICULTY: Moderate REFERENCES: Supply Chain Management (SCM) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 1:54 PM 23. The ability to capture and analyze all customer interactions, generate appropriate responses, and gather data to create and build effective and efficient marketing campaigns is known as contact management. a. True b. False ANSWER: False RATIONALE: Marketing automation is the ability to capture and analyze all customer interactions, generate appropriate responses, and gather data to create and build effective and efficient marketing campaigns. Contact management is the ability to track data on individual customers and sales leads and then access that data from any part of the organization. FEEDBACK: Correct Marketing automation is the ability to capture and analyze all customer interactions, generate appropriate responses, and gather data to create and build effective and efficient marketing campaigns. Incorrect Marketing automation is the ability to capture and analyze all customer interactions, generate appropriate responses, and gather data to create and build effective and efficient marketing campaigns.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Customer Relationship Management QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.8 - Identify tools that can be used to analyze this data, and demonstrate an ability to find valuable relationships between data. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 1:57 PM 24. Using the hosted software model implies that a small business firm needs to employ a full-time IT person to maintain key business applications. a. True b. False ANSWER: False RATIONALE: Using the hosted software model means the business firm does not need to employ a full-time IT person to maintain key business applications. Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 10 - Enterprise Systems FEEDBACK:

Correct

Using the hosted software model means the business firm does not need to employ a full-time IT person to maintain key business applications. Incorrect Using the hosted software model means the business firm does not need to employ a full-time IT person to maintain key business applications.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Hosted Software Model for Enterprise Software QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.4 - Describe the hosted software model for enterprise systems and explain why this approach is so appealing to SMEs. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:51 PM DATE MODIFIED: 7/3/2020 2:00 PM 25. XYZ Inc. assigned a part-time mid-level manager to supervise the implementation of an enterprise resource planning (ERP) system. The project has a high risk of failure. a. True b. False ANSWER: True RATIONALE: One tip for avoiding the common causes for failed enterprise system implementations is to assign a full-time executive to manage the project. FEEDBACK: Correct One tip for avoiding the common causes for failed enterprise system implementations is to assign a full-time executive to manage the project. Incorrect One tip for avoiding the common causes for failed enterprise system implementations is to assign a full-time executive to manage the project.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.6 - Identify tips for avoiding many of the common causes for failed enterprise system implementations. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 2:03 PM 26. Enterprise resource planning (ERP) systems work directly with manufacturing machines on the production floor. a. True b. False ANSWER: False RATIONALE: ERP systems do not work directly with manufacturing machines on the production floor, so they need a way to capture information about what was produced. Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 10 - Enterprise Systems FEEDBACK:

Correct

ERP systems do not work directly with manufacturing machines on the production floor, so they need a way to capture information about what was produced. Incorrect ERP systems do not work directly with manufacturing machines on the production floor, so they need a way to capture information about what was produced.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Supply Chain Management (SCM) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 2:06 PM 27. Smaller lot sizes from vendors will help reduce the purchasing complexities for the consumer. a. True b. False ANSWER: True RATIONALE: Lot size refers to the discrete quantities that the supplier will ship, which can result in purchasing complexities if those amounts don’t line up with quantities that are economical for the manufacturer to receive or store. FEEDBACK: Correct Lot size refers to the discrete quantities that the supplier will ship, which can result in purchasing complexities if those amounts don’t line up with quantities that are economical for the manufacturer to receive or store. Incorrect Lot size refers to the discrete quantities that the supplier will ship, which can result in purchasing complexities if those amounts don’t line up with quantities that are economical for the manufacturer to receive or store.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Supply Chain Management (SCM) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 2:17 PM Multiple Choice 28. A(n) _____ is central to individuals and organizations of all sizes and ensures that information can be shared across all business functions and all levels of management to support the running and managing of a business. Copyright Cengage Learning. Powered by Cognero.

Page 16


Chapter 10 - Enterprise Systems a. transaction processing system b. enterprise system c. procurement system d. batch processing system ANSWER: b RATIONALE: An enterprise system is central to individuals and organizations of all sizes and ensures that information can be shared with authorized users across all business functions and at all levels of management to support the running and managing of a business. FEEDBACK: a. An enterprise system is central to individuals and organizations of all sizes and ensures that information can be shared with authorized users across all business functions and at all levels of management to support the running and managing of a business. b. An enterprise system is central to individuals and organizations of all sizes and ensures that information can be shared with authorized users across all business functions and at all levels of management to support the running and managing of a business. c. An enterprise system is central to individuals and organizations of all sizes and ensures that information can be shared with authorized users across all business functions and at all levels of management to support the running and managing of a business. d. An enterprise system is central to individuals and organizations of all sizes and ensures that information can be shared with authorized users across all business functions and at all levels of management to support the running and managing of a business.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 2:12 PM 29. Which of the following includes a system that generates customer invoices? a. supply chain management b. product lifecycle management c. transaction processing system d. value chain system ANSWER: c RATIONALE: A TPS typically includes order processing systems, which generate customer invoices. FEEDBACK: a. A TPS typically includes order processing systems, which generate customer invoices. b. A TPS typically includes order processing systems, which generate customer invoices. c. A TPS typically includes order processing systems, which generate customer invoices. d. A TPS typically includes order processing systems, which generate customer invoices.

Copyright Cengage Learning. Powered by Cognero.

Page 17


Chapter 10 - Enterprise Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Traditional Transaction Processing Methods and Objectives QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.2 - Describe the transaction processing systems associated with the order processing, purchasing, and accounting business functions. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 2:22 PM 30. With _____, business transactions are accumulated over a period of time for processing as a single unit. a. online transaction processing systems b. real-time transaction processing systems c. on-demand processing systems d. batch processing systems ANSWER: d RATIONALE: With batch processing systems, business transactions are accumulated over a period of time and prepared for processing as a single unit or batch. FEEDBACK: a. With batch processing systems, business transactions are accumulated over a period of time and prepared for processing as a single unit or batch. b. With batch processing systems, business transactions are accumulated over a period of time and prepared for processing as a single unit or batch. c. With batch processing systems, business transactions are accumulated over a period of time and prepared for processing as a single unit or batch. d. With batch processing systems, business transactions are accumulated over a period of time and prepared for processing as a single unit or batch.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Traditional Transaction Processing Methods and Objectives QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.1 - Identify the basic activities and business objectives common to all transaction processing systems. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 2:24 PM 31. In batch processing systems, data processing is completed _______ data capture. a. immediately after b. some time after c. immediately before d. some time before ANSWER: b RATIONALE: With batch processing systems, business transactions are accumulated over a period of time Copyright Cengage Learning. Powered by Cognero.

Page 18


Chapter 10 - Enterprise Systems and prepared for processing as a single unit or batch. The essential characteristic of a batch processing system is the delay between an event and the eventual processing of the related transaction to update the organization’s records. FEEDBACK:

a. The essential characteristic of a batch processing system is the delay between an event and the eventual processing of the related transaction to update the organization’s records. b. The essential characteristic of a batch processing system is the delay between an event and the eventual processing of the related transaction to update the organization’s records. c. The essential characteristic of a batch processing system is the delay between an event and the eventual processing of the related transaction to update the organization’s records. d. The essential characteristic of a batch processing system is the delay between an event and the eventual processing of the related transaction to update the organization’s records.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Traditional Transaction Processing Methods and Objectives QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.1 - Identify the basic activities and business objectives common to all transaction processing systems. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 2:29 PM 32. Which of the following transactions requires online transaction processing and is not a candidate for the batch processing approach? a. payroll b. vendor payments c. customer billing d. stock investments ANSWER: d RATIONALE: With online transaction processing (OLTP) each transaction is processed immediately without the delay of accumulating transactions into a batch. Consequently, at any time, the data in an online system reflects the current status. This type of processing is essential for businesses that require access to current data such as airlines, ticket agencies, and stock investment firms. FEEDBACK: a. Online transaction processing is essential for businesses that require access to current data such as airlines, ticket agencies, and stock investment firms. b. Online transaction processing is essential for businesses that require access to current data such as airlines, ticket agencies, and stock investment firms. c. Online transaction processing is essential for businesses that require access to current data such as airlines, ticket agencies, and stock investment firms. d. Online transaction processing is essential for businesses that require access to current data such as airlines, ticket agencies, and stock investment firms.

POINTS: DIFFICULTY: REFERENCES:

1 Easy Traditional Transaction Processing Methods and Objectives

Copyright Cengage Learning. Powered by Cognero.

Page 19


Chapter 10 - Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.1 - Identify the basic activities and business objectives common to all transaction processing systems. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 2:31 PM 33. Which of the following types of processing is essential for businesses that require access to current data such as airlines, ticket agencies, and stock investment firms? a. batch processing b. multiple unit processing c. business intelligence processing d. online transaction processing ANSWER: d RATIONALE: With online transaction processing (OLTP) each transaction is processed immediately without the delay of accumulating transactions into a batch. Consequently, at any time, the data in an online system reflects the current status. This type of processing is essential for businesses that require access to current data such as airlines, ticket agencies, and stock investment firms. FEEDBACK: a. Online transaction processing is essential for businesses that require access to current data such as airlines, ticket agencies, and stock investment firms. b. Online transaction processing is essential for businesses that require access to current data such as airlines, ticket agencies, and stock investment firms. c. Online transaction processing is essential for businesses that require access to current data such as airlines, ticket agencies, and stock investment firms. d. Online transaction processing is essential for businesses that require access to current data such as airlines, ticket agencies, and stock investment firms.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Traditional Transaction Processing Methods and Objectives QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.1 - Identify the basic activities and business objectives common to all transaction processing systems. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 2:32 PM 34. In the context of purchasing systems, when a(n) _____ arrives from a supplier, it is matched to the original order and the receiving report, and a check is generated if all data is complete and consistent. a. order b. pick list c. invoice d. request for quotation ANSWER: c RATIONALE: When the invoice arrives from the supplier, it is matched to the original order and the receiving report, and a check is generated if all data is complete and consistent. Copyright Cengage Learning. Powered by Cognero.

Page 20


Chapter 10 - Enterprise Systems FEEDBACK:

a. When the invoice arrives from the supplier, it is matched to the original order and the receiving report, and a check is generated if all data is complete and consistent. b. When the invoice arrives from the supplier, it is matched to the original order and the receiving report, and a check is generated if all data is complete and consistent. c. When the invoice arrives from the supplier, it is matched to the original order and the receiving report, and a check is generated if all data is complete and consistent. d. When the invoice arrives from the supplier, it is matched to the original order and the receiving report, and a check is generated if all data is complete and consistent.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Traditional Transaction Processing Methods and Objectives QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.2 - Describe the transaction processing systems associated with the order processing, purchasing, and accounting business functions. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 2:35 PM 35. As an organization’s purchasing systems generate purchase orders and the items ordered are received, information is sent to the _____ system to manage the amounts owed by the organization. a. accounts receivable b. accounts payable c. invoicing d. inventory control ANSWER: b RATIONALE: As the purchasing systems generate purchase orders and those items are received, information is sent to the accounts payable system to manage the amounts owed by the company. FEEDBACK: a. As the purchasing systems generate purchase orders and those items are received, information is sent to the accounts payable system to manage the amounts owed by the company. b. As the purchasing systems generate purchase orders and those items are received, information is sent to the accounts payable system to manage the amounts owed by the company. c. As the purchasing systems generate purchase orders and those items are received, information is sent to the accounts payable system to manage the amounts owed by the company. d. As the purchasing systems generate purchase orders and those items are received, information is sent to the accounts payable system to manage the amounts owed by the company.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Traditional Transaction Processing Methods and Objectives Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 21


Chapter 10 - Enterprise Systems HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.2 - Describe the transaction processing systems associated with the order processing, purchasing, and accounting business functions. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 2:38 PM 36. Small- and medium-sized enterprises (SMEs) are legally independent enterprises with _____ employees. a. up to 500 b. more than 500 but less than 1,000 c. more than 1,000 d. up to 700 ANSWER: a RATIONALE: Many software packages provide integrated transaction processing system solutions for small- and medium-sized enterprises (SMEs), wherein SME is a legally independent enterprise with no more than 500 employees. FEEDBACK: a. Many software packages provide integrated transaction processing system solutions for small- and medium-sized enterprises (SMEs), wherein SME is a legally independent enterprise with no more than 500 employees. b. Many software packages provide integrated transaction processing system solutions for small- and medium-sized enterprises (SMEs), wherein SME is a legally independent enterprise with no more than 500 employees. c. Many software packages provide integrated transaction processing system solutions for small- and medium-sized enterprises (SMEs), wherein SME is a legally independent enterprise with no more than 500 employees. d. Many software packages provide integrated transaction processing system solutions for small- and medium-sized enterprises (SMEs), wherein SME is a legally independent enterprise with no more than 500 employees.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Transaction Processing Systems for Entrepreneurs and Small and Medium-Sized Enterprises QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.4 - Describe the hosted software model for enterprise systems and explain why this approach is so appealing to SMEs. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 2:40 PM 37. A small business is currently using a paper-based system for billing, which is slow and error-prone. Which system upgrade will make their billing process faster and reduce the number of errors? a. manual entry of data into a spreadsheet system b. source data automation c. scanning hand-written bills d. enterprise resource planning system ANSWER: b RATIONALE: Data should be captured at its source and recorded accurately in a timely fashion, with Copyright Cengage Learning. Powered by Cognero.

Page 22


Chapter 10 - Enterprise Systems minimal manual effort and in an electronic or digital form that can be directly entered into the computer. This approach is called source data automation. For example, a point-of-sale TPS can use the price data from a UPC code scanner to determine the customer’s total. FEEDBACK:

a. Data should be captured at its source and recorded accurately in a timely fashion, with minimal manual effort and in an electronic or digital form that can be directly entered into the computer. This approach is called source data automation. For example, a point-of-sale TPS can use the price data from a UPC code scanner to determine the customer’s total. b. Data should be captured at its source and recorded accurately in a timely fashion, with minimal manual effort and in an electronic or digital form that can be directly entered into the computer. This approach is called source data automation. For example, a point-of-sale TPS can use the price data from a UPC code scanner to determine the customer’s total. c. Data should be captured at its source and recorded accurately in a timely fashion, with minimal manual effort and in an electronic or digital form that can be directly entered into the computer. This approach is called source data automation. For example, a point-of-sale TPS can use the price data from a UPC code scanner to determine the customer’s total. d. Data should be captured at its source and recorded accurately in a timely fashion, with minimal manual effort and in an electronic or digital form that can be directly entered into the computer. This approach is called source data automation. For example, a point-of-sale TPS can use the price data from a UPC code scanner to determine the customer’s total.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Transaction Processing Activities QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.2 - Describe the transaction processing systems associated with the order processing, purchasing, and accounting business functions. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 2:45 PM 38. _____ involves reentering data that was not typed or scanned correctly. a. Data editing b. Data correction c. Data manipulation d. Data encryption ANSWER: b RATIONALE: A data correction involves reentering data that was not typed or scanned properly. FEEDBACK: a. A data correction involves reentering data that was not typed or scanned properly. b. A data correction involves reentering data that was not typed or scanned properly. c. A data correction involves reentering data that was not typed or scanned properly. d. A data correction involves reentering data that was not typed or scanned properly.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 23


Chapter 10 - Enterprise Systems DIFFICULTY: Easy REFERENCES: Transaction Processing Activities QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.1 - Identify the basic activities and business objectives common to all transaction processing systems. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 2:47 PM 39. In the context of enterprise resource planning (ERP) systems, the most efficient and effective ways to complete a business process are called _____. a. current approaches b. streamlined processes c. best practices d. process improvements ANSWER: c RATIONALE: The individual application modules included in the ERP system are designed to support these best practices, the most efficient and effective ways to complete a business process. FEEDBACK: a. The individual application modules included in the ERP system are designed to support these best practices, the most efficient and effective ways to complete a business process. b. The individual application modules included in the ERP system are designed to support these best practices, the most efficient and effective ways to complete a business process. c. The individual application modules included in the ERP system are designed to support these best practices, the most efficient and effective ways to complete a business process. d. The individual application modules included in the ERP system are designed to support these best practices, the most efficient and effective ways to complete a business process.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Advantages of ERP QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 2:49 PM 40. Payroll transactions and billing are typically done via _____. a. grid processing b. online transaction processing c. online analytical processing d. batch processing ANSWER: d Copyright Cengage Learning. Powered by Cognero.

Page 24


Chapter 10 - Enterprise Systems RATIONALE: FEEDBACK:

Payroll transactions and billing are typically done via batch processing. a. Payroll transactions and billing are typically done via batch processing. b. Payroll transactions and billing are typically done via batch processing. c. Payroll transactions and billing are typically done via batch processing. d. Payroll transactions and billing are typically done via batch processing.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Traditional Transaction Processing Methods and Objectives QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.2 - Describe the transaction processing systems associated with the order processing, purchasing, and accounting business functions. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 2:51 PM 41. A key feature of an enterprise system is that _____. a. it helps a business function isolate its information from other functions b. it is exclusive to small- and medium-sized enterprises (SMEs) c. it employs a database of key operational and planning data that can be shared by all d. it is only used by large organizations ANSWER: c RATIONALE: An enterprise system is central to individuals and organizations of all sizes and ensures that information can be shared with authorized users across all business functions and at all levels of management to support the running and managing of a business. Enterprise systems employ a database of key operational and planning data that can be shared by all, eliminating the problems of missing information and inconsistent information caused by multiple transaction processing systems that each support only one business function or one department in an organization. FEEDBACK: a. Enterprise systems employ a database of key operational and planning data that can be shared by all, eliminating the problems of missing information and inconsistent information caused by multiple transaction processing systems that each support only one business function or one department in an organization. b. Enterprise systems employ a database of key operational and planning data that can be shared by all, eliminating the problems of missing information and inconsistent information caused by multiple transaction processing systems that each support only one business function or one department in an organization. c. Enterprise systems employ a database of key operational and planning data that can be shared by all, eliminating the problems of missing information and inconsistent information caused by multiple transaction processing systems that each support only one business function or one department in an organization. d. Enterprise systems employ a database of key operational and planning data that can be shared by all, eliminating the problems of missing information and inconsistent information caused by multiple transaction processing systems that each support only one business function or one department in an organization.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 25


Chapter 10 - Enterprise Systems REFERENCES: Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 2:55 PM 42. _____ includes the planning, executing, and controlling of all activities involved in raw material sourcing and procurement, converting raw materials to finished products, and the warehousing and delivery of finished product to customers. a. Maintenance, repair, and operations (MRO) b. Materials requirement planning (MRP) c. Customer relationship management (CRM) d. Supply chain management (SCM) ANSWER: d RATIONALE: An organization can use an ERP system within a manufacturing organization to support what is known as supply chain management (SCM), which includes planning, executing, and controlling all activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and the warehousing and delivery of finished product to customers. FEEDBACK: a. An organization can use an ERP system within a manufacturing organization to support what is known as supply chain management (SCM), which includes planning, executing, and controlling all activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and the warehousing and delivery of finished product to customers. b. An organization can use an ERP system within a manufacturing organization to support what is known as supply chain management (SCM), which includes planning, executing, and controlling all activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and the warehousing and delivery of finished product to customers. c. An organization can use an ERP system within a manufacturing organization to support what is known as supply chain management (SCM), which includes planning, executing, and controlling all activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and the warehousing and delivery of finished product to customers. d. An organization can use an ERP system within a manufacturing organization to support what is known as supply chain management (SCM), which includes planning, executing, and controlling all activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and the warehousing and delivery of finished product to customers.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Easy Supply Chain Management (SCM) Multiple Choice False

Copyright Cengage Learning. Powered by Cognero.

Page 26


Chapter 10 - Enterprise Systems LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 2:58 PM 43. Manufacturing enterprise resource planning (ERP) systems follow a systemic process for developing a production plan that starts with _____ to develop an estimate of future customer demand. a. cash flow forecasting b. demand planning c. inventory control d. sales forecasting ANSWER: d RATIONALE: Manufacturing ERP systems follow a systematic process for developing a production plan that draws on the information available in the ERP system database. The process starts with sales forecasting to develop an estimate of future customer demand. FEEDBACK: a. Manufacturing ERP systems follow a systematic process for developing a production plan that draws on the information available in the ERP system database. The process starts with sales forecasting to develop an estimate of future customer demand. b. Manufacturing ERP systems follow a systematic process for developing a production plan that draws on the information available in the ERP system database. The process starts with sales forecasting to develop an estimate of future customer demand. c. Manufacturing ERP systems follow a systematic process for developing a production plan that draws on the information available in the ERP system database. The process starts with sales forecasting to develop an estimate of future customer demand. d. Manufacturing ERP systems follow a systematic process for developing a production plan that draws on the information available in the ERP system database. The process starts with sales forecasting to develop an estimate of future customer demand.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Supply Chain Management (SCM) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 2:59 PM 44. In a manufacturing enterprise resource planning (ERP) system, demand management _____. a. creates sales forecasts based on historical data b. determines a detailed production schedule Copyright Cengage Learning. Powered by Cognero.

Page 27


Chapter 10 - Enterprise Systems c. determines the quantities and timing for raw material orders placed with suppliers d. refines a production plan by determining the amount of weekly or daily production needed to meet the demand for individual products ANSWER: d RATIONALE: Demand management refines the production plan by determining the amount of weekly or daily production needed to meet the demand for individual products. FEEDBACK: a. Demand management refines the production plan by determining the amount of weekly or daily production needed to meet the demand for individual products. b. Demand management refines the production plan by determining the amount of weekly or daily production needed to meet the demand for individual products. c. Demand management refines the production plan by determining the amount of weekly or daily production needed to meet the demand for individual products. d. Demand management refines the production plan by determining the amount of weekly or daily production needed to meet the demand for individual products.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Supply Chain Management (SCM) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.7 - Develop an understanding of how data from one function of the organization can be used to make critical decisions in another. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 3:02 PM 45. Purchasing uses information from the _____ to place purchase orders for raw materials with qualified suppliers. a. sales and operations plan b. materials requirement plan c. detailed scheduling plan d. sales ordering plan ANSWER: b RATIONALE: Materials requirement planning (MRP) determines the amount and timing for placing raw material orders with suppliers. FEEDBACK: a. Materials requirement planning (MRP) determines the amount and timing for placing raw material orders with suppliers. b. Materials requirement planning (MRP) determines the amount and timing for placing raw material orders with suppliers. c. Materials requirement planning (MRP) determines the amount and timing for placing raw material orders with suppliers. d. Materials requirement planning (MRP) determines the amount and timing for placing raw material orders with suppliers.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Supply Chain Management (SCM) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.7 - Develop an understanding of how data from one function of the organization Copyright Cengage Learning. Powered by Cognero.

Page 28


Chapter 10 - Enterprise Systems NATIONAL STANDARDS: KEYWORDS: DATE CREATED: DATE MODIFIED:

can be used to make critical decisions in another. United States - BUSPROG: Technology Bloom's: Remember 11/19/2019 5:52 PM 7/3/2020 3:05 PM

46. A customer relationship management (CRM) system helps a company in managing _____. a. materials sourcing and procurement b. product development and manufacturing c. distribution and accounting d. human resources and finance ANSWER: c RATIONALE: CRM is used primarily by people in the sales, marketing, distribution, accounting, and service organizations to capture and view data about customers and to improve communications. FEEDBACK: a. CRM is used primarily by people in the sales, marketing, distribution, accounting, and service organizations to capture and view data about customers and to improve communications. b. CRM is used primarily by people in the sales, marketing, distribution, accounting, and service organizations to capture and view data about customers and to improve communications. c. CRM is used primarily by people in the sales, marketing, distribution, accounting, and service organizations to capture and view data about customers and to improve communications. d. CRM is used primarily by people in the sales, marketing, distribution, accounting, and service organizations to capture and view data about customers and to improve communications.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Customer Relationship Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.7 - Develop an understanding of how data from one function of the organization can be used to make critical decisions in another. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 3:07 PM 47. Which of the following statements is true of product lifecycle management (PLM) software? a. It distributes data only to the employees of an organization. b. It provides documents required for FDA and environmental compliance. c. It secures data so that changes cannot be made early in the product design process. d. It is never employed by non-manufacturing organizations. ANSWER: b RATIONALE: As products advance through the stages of the product lifecycle, product data is generated and distributed to various groups both within and outside the manufacturing firm. This data includes design and process documents, bill of material definitions, product attributes, product formulations, and documents needed for FDA and environmental compliance. Much Copyright Cengage Learning. Powered by Cognero.

Page 29


Chapter 10 - Enterprise Systems of the PLM software discussed in this chapter is used extensively in the manufacturing industry; however, software companies also make use of PLM software to streamline their product planning and development efforts. FEEDBACK:

a. As products advance through the stages of the product lifecycle, product data is generated and distributed to various groups both within and outside the manufacturing firm. This data includes design and process documents, bill of material definitions, product attributes, product formulations, and documents needed for FDA and environmental compliance. b. As products advance through the stages of the product lifecycle, product data is generated and distributed to various groups both within and outside the manufacturing firm. This data includes design and process documents, bill of material definitions, product attributes, product formulations, and documents needed for FDA and environmental compliance. c. As products advance through the stages of the product lifecycle, product data is generated and distributed to various groups both within and outside the manufacturing firm. This data includes design and process documents, bill of material definitions, product attributes, product formulations, and documents needed for FDA and environmental compliance. d. As products advance through the stages of the product lifecycle, product data is generated and distributed to various groups both within and outside the manufacturing firm. This data includes design and process documents, bill of material definitions, product attributes, product formulations, and documents needed for FDA and environmental compliance.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Product Lifecycle Management (PLM) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 3:12 PM 48. _____ is the use of software to assist in the creation, analysis, and modification of the design of a component or product. a. Computer-aided design b. Software-aided engineering c. Computer-aided engineering d. Computer-aided manufacturing ANSWER: a RATIONALE: Computer-aided design (CAD) is the use of software to assist in the creation, analysis, and modification of the design of a component or product. FEEDBACK: a. Computer-aided design (CAD) is the use of software to assist in the creation, analysis, and modification of the design of a component or product. b. Computer-aided design (CAD) is the use of software to assist in the creation, analysis, and modification of the design of a component or product. c. Computer-aided design (CAD) is the use of software to assist in the creation, analysis, and modification of the design of a component or product.

Copyright Cengage Learning. Powered by Cognero.

Page 30


Chapter 10 - Enterprise Systems d. Computer-aided design (CAD) is the use of software to assist in the creation, analysis, and modification of the design of a component or product.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Product Lifecycle Management (PLM) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 3:14 PM 49. Which of these is an advantage of the hosted software model? a. consistent reliability b. data security c. faster system start-up d. increased total cost of ownership ANSWER: c RATIONALE: Advantages of the hosted software model include decreased total cost of ownership, faster system start-up, lower implementation risk, and the outsourcing of systems management to experts. FEEDBACK: a. Advantages of the hosted software model include decreased total cost of ownership, faster system start-up, lower implementation risk, and the outsourcing of systems management to experts. b. Advantages of the hosted software model include decreased total cost of ownership, faster system start-up, lower implementation risk, and the outsourcing of systems management to experts. c. Advantages of the hosted software model include decreased total cost of ownership, faster system start-up, lower implementation risk, and the outsourcing of systems management to experts. d. Advantages of the hosted software model include decreased total cost of ownership, faster system start-up, lower implementation risk, and the outsourcing of systems management to experts.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Hosted Software Model for Enterprise Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.4 - Describe the hosted software model for enterprise systems and explain why this approach is so appealing to SMEs. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:52 PM Copyright Cengage Learning. Powered by Cognero.

Page 31


Chapter 10 - Enterprise Systems DATE MODIFIED:

7/3/2020 3:25 PM

50. One benefit for a small business using the hosted software model for its enterprise software is that it can succeed without _____. a. promoting and selling its products and services b. managing the hiring process for its personnel c. employing full-time IT professionals d. designing its own products and services ANSWER: c RATIONALE: Using the hosted software model means the business firm does not need to employ a full-time IT person to maintain key business applications. FEEDBACK: a. Using the hosted software model means the business firm does not need to employ a full-time IT person to maintain key business applications.

b. Using the hosted software model means the business firm does not need to employ a full-time IT person to maintain key business applications. c. Using the hosted software model means the business firm does not need to employ a full-time IT person to maintain key business applications. d. Using the hosted software model means the business firm does not need to employ a full-time IT person to maintain key business applications.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Hosted Software Model for Enterprise Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.4 - Describe the hosted software model for enterprise systems and explain why this approach is so appealing to SMEs. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 3:33 PM 51. The order processing system is sometimes referred to as the lifeblood of the organization because _____. a. the processing flow concludes with the receipt of a customer order b. efficiency and reliability of this system are so critical c. it is independent of other systems, such as the inventory system d. it tracks the flow of data related to multiple cash flows ANSWER: b RATIONALE: Running these systems efficiently and reliably is so critical that the order processing system is sometimes referred to as the lifeblood of the organization. The processing flow begins with the receipt of a customer order. The finished product inventory is checked to see if sufficient inventory is on hand to fill the order. The accounting systems must track the flow of data related to all the cash flows that affect the organization. FEEDBACK:

a. Running these systems efficiently and reliably is so critical that the order

processing system is sometimes referred to as the lifeblood of the organization. b. Running these systems efficiently and reliably is so critical that the order Copyright Cengage Learning. Powered by Cognero.

Page 32


Chapter 10 - Enterprise Systems processing system is sometimes referred to as the lifeblood of the organization.

c. Running these systems efficiently and reliably is so critical that the order

processing system is sometimes referred to as the lifeblood of the organization. d. Running these systems efficiently and reliably is so critical that the order processing system is sometimes referred to as the lifeblood of the organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Traditional Transaction Processing Methods and Objectives QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.2 - Describe the transaction processing systems associated with the order processing, purchasing, and accounting business functions. KEYWORDS: Bloom's: Remember DATE CREATED: 7/3/2020 4:06 PM DATE MODIFIED: 7/3/2020 4:15 PM 52. What initiates the processing flow for an order processing system? a. a customer requests a product or service b. product inventory falls outside a specified range c. a product pick list is printed at the warehouse d. customers are invoiced via batch processing ANSWER: a RATIONALE: The processing flow for an order processing system begins with the receipt of a customer order. FEEDBACK: a. The processing flow for an order processing system begins with the receipt of a customer order. b. The processing flow for an order processing system begins with the receipt of a customer order. c. The processing flow for an order processing system begins with the receipt of a customer order. d. The processing flow for an order processing system begins with the receipt of a customer order.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Traditional Transaction Processing Methods and Objectives QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.2 - Describe the transaction processing systems associated with the order processing, purchasing, and accounting business functions. KEYWORDS: Bloom's: Remember DATE CREATED: 7/3/2020 4:08 PM DATE MODIFIED: 7/3/2020 4:20 PM 53. Accounting systems track the flow of data related to all the organization's _____. a. orders b. inventory Copyright Cengage Learning. Powered by Cognero.

Page 33


Chapter 10 - Enterprise Systems c. cash flows d. customers ANSWER: RATIONALE: FEEDBACK:

c The accounting systems must track the flow of data related to all the cash flows that affect the organization. a. The accounting systems must track the flow of data related to all the cash flows that affect the organization. b. The accounting systems must track the flow of data related to all the cash flows that affect the organization. c. The accounting systems must track the flow of data related to all the cash flows that affect the organization. d. The accounting systems must track the flow of data related to all the cash flows that affect the organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Traditional Transaction Processing Methods and Objectives QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.2 - Describe the transaction processing systems associated with the order processing, purchasing, and accounting business functions. KEYWORDS: Bloom's: Remember DATE CREATED: 7/3/2020 4:08 PM DATE MODIFIED: 7/3/2020 4:23 PM 54. A business's accounting systems include a(n) _____ system, which tracks the amounts of money owed and paid by customers to the company and from the company to vendors and others. a. invoicing b. accounts receivable c. accounts payable d. general ledger ANSWER: d RATIONALE: Data about amounts owed and paid by customers to the company and from the company to vendors and others are sent to the general ledger system, which records and reports all financial transactions for the company. FEEDBACK: a. Data about amounts owed and paid by customers to the company and from the company to vendors and others are sent to the general ledger system, which records and reports all financial transactions for the company. b. Data about amounts owed and paid by customers to the company and from the company to vendors and others are sent to the general ledger system, which records and reports all financial transactions for the company. c. Data about amounts owed and paid by customers to the company and from the company to vendors and others are sent to the general ledger system, which records and reports all financial transactions for the company. d. Data about amounts owed and paid by customers to the company and from the company to vendors and others are sent to the general ledger system, which records and reports all financial transactions for the company.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 34


Chapter 10 - Enterprise Systems REFERENCES: Traditional Transaction Processing Methods and Objectives QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.2 - Describe the transaction processing systems associated with the order processing, purchasing, and accounting business functions. KEYWORDS: Bloom's: Remember DATE CREATED: 7/3/2020 4:08 PM DATE MODIFIED: 7/3/2020 4:26 PM 55. The traditional receiving, inventory control, and accounts payable TPSs support which business function? a. shipping b. order processing c. accounting d. purchasing ANSWER: d RATIONALE: The traditional transaction processing systems that support the purchasing business function include inventory control, purchase order processing, receiving, and accounts payable. FEEDBACK: a. The traditional transaction processing systems that support the purchasing business function include inventory control, purchase order processing, receiving, and accounts payable. b. The traditional transaction processing systems that support the purchasing business function include inventory control, purchase order processing, receiving, and accounts payable. c. The traditional transaction processing systems that support the purchasing business function include inventory control, purchase order processing, receiving, and accounts payable. d. The traditional transaction processing systems that support the purchasing business function include inventory control, purchase order processing, receiving, and accounts payable.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Traditional Transaction Processing Methods and Objectives QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.2 - Describe the transaction processing systems associated with the order processing, purchasing, and accounting business functions. KEYWORDS: Bloom's: Remember DATE CREATED: 7/3/2020 4:09 PM DATE MODIFIED: 7/3/2020 4:29 PM 56. Who uses the product pick list generated by an order processing system? a. warehouse workers who fill orders b. accountants who calculate taxes due c. purchasers who monitor inventory d. shipping dock workers who receive products ANSWER: a Copyright Cengage Learning. Powered by Cognero.

Page 35


Chapter 10 - Enterprise Systems RATIONALE:

A product pick list is printed at the warehouse from which the order is to be filled on the day the order is to be shipped. At the warehouse, workers gather the items needed to fill the order and enter the item identifier and quantity for each item to update the finished product inventory.

FEEDBACK:

a. A product pick list is printed at the warehouse from which the order is to be filled

on the day the order is to be shipped. At the warehouse, workers gather the items needed to fill the order and enter the item identifier and quantity for each item to update the finished product inventory. b. A product pick list is printed at the warehouse from which the order is to be filled on the day the order is to be shipped. At the warehouse, workers gather the items needed to fill the order and enter the item identifier and quantity for each item to update the finished product inventory. c. A product pick list is printed at the warehouse from which the order is to be filled on the day the order is to be shipped. At the warehouse, workers gather the items needed to fill the order and enter the item identifier and quantity for each item to update the finished product inventory. d. A product pick list is printed at the warehouse from which the order is to be filled on the day the order is to be shipped. At the warehouse, workers gather the items needed to fill the order and enter the item identifier and quantity for each item to update the finished product inventory.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Traditional Transaction Processing Methods and Objectives QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.2 - Describe the transaction processing systems associated with the order processing, purchasing, and accounting business functions. KEYWORDS: Bloom's: Remember DATE CREATED: 7/3/2020 4:09 PM DATE MODIFIED: 7/3/2020 4:33 PM 57. Business application software vendors migrate to a hosted software model with the goal of helping customers _____. a. upgrade to more complex software b. reduce new software start-up costs c. streamline their supply chains d. enlarge their database infrastructure ANSWER: b RATIONALE: Many business application software vendors have migrated much of their offerings to a hosted software model. The goal is to help customers acquire, use, and benefit from new technology while avoiding much of the associated complexity and high start-up costs. FEEDBACK: a. Many business application software vendors have migrated much of their offerings to a hosted software model. The goal is to help customers acquire, use, and benefit from new technology while avoiding much of the associated complexity and high start-up costs. b. Many business application software vendors have migrated much of their offerings to a hosted software model. The goal is to help customers acquire, use, and benefit from new technology while avoiding much of the associated complexity and high start-up costs. c. Many business application software vendors have migrated much of their

Copyright Cengage Learning. Powered by Cognero.

Page 36


Chapter 10 - Enterprise Systems offerings to a hosted software model. The goal is to help customers acquire, use, and benefit from new technology while avoiding much of the associated complexity and high start-up costs. d. Many business application software vendors have migrated much of their offerings to a hosted software model. The goal is to help customers acquire, use, and benefit from new technology while avoiding much of the associated complexity and high start-up costs.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Hosted Software Model for Enterprise Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.4 - Describe the hosted software model for enterprise systems and explain why this approach is so appealing to SMEs. KEYWORDS: Bloom's: Remember DATE CREATED: 7/3/2020 4:37 PM DATE MODIFIED: 7/3/2020 4:44 PM 58. What are three types of hosted enterprise software? a. on premises, cloud-based, and hybrid b. public, private, and hybrid c. order processing, accounting, and purchasing d. CRM, PLM, and SCM ANSWER: a RATIONALE: There are three types of hosted software: on premises, cloud-based, and hybrid, which combines on-premises and cloud-based applications. FEEDBACK: a. There are three types of hosted software: on premises, cloud-based, and hybrid, which combines on-premises and cloud-based applications. b. There are three types of hosted software: on premises, cloud-based, and hybrid, which combines on-premises and cloud-based applications. c. There are three types of hosted software: on premises, cloud-based, and hybrid, which combines on-premises and cloud-based applications. d. There are three types of hosted software: on premises, cloud-based, and hybrid, which combines on-premises and cloud-based applications.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Hosted Software Model for Enterprise Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.4 - Describe the hosted software model for enterprise systems and explain why this approach is so appealing to SMEs. KEYWORDS: Bloom's: Remember DATE CREATED: 7/3/2020 4:39 PM DATE MODIFIED: 7/3/2020 4:48 PM 59. Percy is attracted by the advantages of enterprise software but his small business cannot afford to make a major upfront investment in new applications at this time. Percy _____. Copyright Cengage Learning. Powered by Cognero.

Page 37


Chapter 10 - Enterprise Systems a. can expect to pay $300 to $500 per user per month for hosted ERP or CRM software b. may not realize that using enterprise software is not best practice for small businesses c. could try hosted enterprise software, which offers a pay-as-you-go approach d. should stick to traditional transaction processing systems for now ANSWER: c RATIONALE: Applicor, Intacct, NetSuite, SAP, and Workday are among the software vendors who offer hosted versions of their ERP or CRM software at a cost of $50 to $200 per month per user. This pay-as-you-go approach is appealing because organizations can experiment with powerful software capabilities without making a major financial investment. FEEDBACK: a. Applicor, Intacct, NetSuite, SAP, and Workday are among the software vendors who offer hosted versions of their ERP or CRM software at a cost of $50 to $200 per month per user. This pay-as-you-go approach is appealing because organizations can experiment with powerful software capabilities without making a major financial investment. b. Applicor, Intacct, NetSuite, SAP, and Workday are among the software vendors who offer hosted versions of their ERP or CRM software at a cost of $50 to $200 per month per user. This pay-as-you-go approach is appealing because organizations can experiment with powerful software capabilities without making a major financial investment. c. Applicor, Intacct, NetSuite, SAP, and Workday are among the software vendors who offer hosted versions of their ERP or CRM software at a cost of $50 to $200 per month per user. This pay-as-you-go approach is appealing because organizations can experiment with powerful software capabilities without making a major financial investment. d. Applicor, Intacct, NetSuite, SAP, and Workday are among the software vendors who offer hosted versions of their ERP or CRM software at a cost of $50 to $200 per month per user. This pay-as-you-go approach is appealing because organizations can experiment with powerful software capabilities without making a major financial investment.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Hosted Software Model for Enterprise Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.4 - Describe the hosted software model for enterprise systems and explain why this approach is so appealing to SMEs. KEYWORDS: Bloom's: Remember DATE CREATED: 7/3/2020 4:39 PM DATE MODIFIED: 7/3/2020 4:55 PM 60. Mavis is considering signing up for a hosted enterprise software solution for her small business. She recognizes that an advantage of this software option is _____. a. guaranteed availability and reliability b. risk-free data security c. low financial investment and risk d. no long-term or recurring expenses ANSWER: c RATIONALE: Applicor, Intacct, NetSuite, SAP, and Workday are among the software vendors who offer hosted versions of their ERP or CRM software at a cost of $50 to $200 per month per user. Copyright Cengage Learning. Powered by Cognero.

Page 38


Chapter 10 - Enterprise Systems This pay-as-you-go approach is appealing because organizations can experiment with powerful software capabilities without making a major financial investment. Organizations can then dispose of the software without large investments if the software fails to provide value or otherwise misses expectations. Disadvantages include potential issues with availability, reliability, and data security. FEEDBACK:

a. The hosted software pay-as-you-go approach is appealing because organizations

can experiment with powerful software capabilities without making a major financial investment. Organizations can then dispose of the software without large investments if the software fails to provide value or otherwise misses expectations. b. The hosted software pay-as-you-go approach is appealing because organizations can experiment with powerful software capabilities without making a major financial investment. Organizations can then dispose of the software without large investments if the software fails to provide value or otherwise misses expectations. c. The hosted software pay-as-you-go approach is appealing because organizations can experiment with powerful software capabilities without making a major financial investment. Organizations can then dispose of the software without large investments if the software fails to provide value or otherwise misses expectations. d. The hosted software pay-as-you-go approach is appealing because organizations can experiment with powerful software capabilities without making a major financial investment. Organizations can then dispose of the software without large investments if the software fails to provide value or otherwise misses expectations.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Hosted Software Model for Enterprise Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.4 - Describe the hosted software model for enterprise systems and explain why this approach is so appealing to SMEs. KEYWORDS: Bloom's: Remember DATE CREATED: 7/3/2020 4:39 PM DATE MODIFIED: 7/3/2020 5:04 PM 61. How might a start-up company that has been using a paper-based document control approach benefit from switching to a cloud-based PLM system? a. less employee time spent on product development b. more efficient development processes c. more time searching and managing documentation d. less accessible centralized database ANSWER: b RATIONALE: In its early years as a start-up company, LoneStar relied on a paper-based approach to document control that resulted in researchers spending extensive time searching and managing product documentation—taking them away from their critical design and development work. To gain efficiencies in its development processes and free up time for its research and development team, LoneStar eventually decided to implement a cloud-based PLM that would support employees in the company’s facilities as well as those who work remotely. The PLM system from Omnify Software offered LoneStar a secure, yet easily Copyright Cengage Learning. Powered by Cognero.

Page 39


Chapter 10 - Enterprise Systems accessible centralized product information database and the tools it required to maintain compliant with the extensive set of FDA regulations governing its work. FEEDBACK:

a. To gain efficiencies in its development processes and free up time for its research and development team, LoneStar eventually decided to implement a cloud-based PLM that would support employees in the company’s facilities as well as those who work remotely. The PLM system from Omnify Software offered LoneStar a secure, yet easily accessible centralized product information database. b. To gain efficiencies in its development processes and free up time for its research and development team, LoneStar eventually decided to implement a cloud-based PLM that would support employees in the company’s facilities as well as those who work remotely. The PLM system from Omnify Software offered LoneStar a secure, yet easily accessible centralized product information database. c. To gain efficiencies in its development processes and free up time for its research and development team, LoneStar eventually decided to implement a cloud-based PLM that would support employees in the company’s facilities as well as those who work remotely. The PLM system from Omnify Software offered LoneStar a secure, yet easily accessible centralized product information database. d. To gain efficiencies in its development processes and free up time for its research and development team, LoneStar eventually decided to implement a cloud-based PLM that would support employees in the company’s facilities as well as those who work remotely. The PLM system from Omnify Software offered LoneStar a secure, yet easily accessible centralized product information database.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Hosted Software Model for Enterprise Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.4 - Describe the hosted software model for enterprise systems and explain why this approach is so appealing to SMEs. KEYWORDS: Bloom's: Remember DATE CREATED: 7/3/2020 4:39 PM DATE MODIFIED: 7/4/2020 6:52 AM 62. How does transitioning to a hosted enterprise software model typically affect a company's expenses related to transaction processing? a. reduced vendor management costs b. increased total costs c. increased utilities costs d. reduced hardware costs ANSWER: d RATIONALE: Applicor, Intacct, NetSuite, SAP, and Workday are among the software vendors who offer hosted versions of their ERP or CRM software at a cost of $50 to $200 per month per user. This pay-as-you-go approach is appealing because organizations can experiment with powerful software capabilities without making a major financial investment. The business firm can expect additional savings from reduced hardware costs and costs associated with maintaining an appropriate computer environment (such as air conditioning, power, and an uninterruptible power supply). The total cost of ownership is decreased. However, savings anticipated from outsourcing may be offset by the increased effort required to manage the vendor(s). Copyright Cengage Learning. Powered by Cognero.

Page 40


Chapter 10 - Enterprise Systems FEEDBACK:

a. The business firm can expect additional savings from reduced hardware costs

and costs associated with maintaining an appropriate computer environment (such as air conditioning, power, and an uninterruptible power supply). The total cost of ownership is decreased. However, savings anticipated from outsourcing may be offset by the increased effort required to manage the vendor(s). b. The business firm can expect additional savings from reduced hardware costs and costs associated with maintaining an appropriate computer environment (such as air conditioning, power, and an uninterruptible power supply). The total cost of ownership is decreased. However, savings anticipated from outsourcing may be offset by the increased effort required to manage the vendor(s). c. The business firm can expect additional savings from reduced hardware costs and costs associated with maintaining an appropriate computer environment (such as air conditioning, power, and an uninterruptible power supply). The total cost of ownership is decreased. However, savings anticipated from outsourcing may be offset by the increased effort required to manage the vendor(s). d. The business firm can expect additional savings from reduced hardware costs and costs associated with maintaining an appropriate computer environment (such as air conditioning, power, and an uninterruptible power supply). The total cost of ownership is decreased. However, savings anticipated from outsourcing may be offset by the increased effort required to manage the vendor(s).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Hosted Software Model for Enterprise Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.4 - Describe the hosted software model for enterprise systems and explain why this approach is so appealing to SMEs. KEYWORDS: Bloom's: Remember DATE CREATED: 7/3/2020 4:39 PM DATE MODIFIED: 7/4/2020 7:00 AM 63. Implementing an enterprise system for a large organization is most accurately described as _____. a. a low-risk, gradual change b. somewhat difficult c. a huge demand on resources d. doomed to failure ANSWER: c RATIONALE: Implementing an enterprise system, particularly for a large organization, is extremely challenging and requires tremendous amounts of resources, the best IS and businesspeople, and plenty of management support. FEEDBACK: a. Implementing an enterprise system, particularly for a large organization, is extremely challenging and requires tremendous amounts of resources, the best IS and businesspeople, and plenty of management support. b. Implementing an enterprise system, particularly for a large organization, is extremely challenging and requires tremendous amounts of resources, the best IS and businesspeople, and plenty of management support. c. Implementing an enterprise system, particularly for a large organization, is extremely challenging and requires tremendous amounts of resources, the best IS and businesspeople, and plenty of management support. d. Implementing an enterprise system, particularly for a large organization, is

Copyright Cengage Learning. Powered by Cognero.

Page 41


Chapter 10 - Enterprise Systems extremely challenging and requires tremendous amounts of resources, the best IS and businesspeople, and plenty of management support.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.5 - Identify the challenges that organizations face in planning, building, and operating their enterprise systems. KEYWORDS: Bloom's: Remember DATE CREATED: 7/4/2020 7:01 AM DATE MODIFIED: 7/4/2020 7:09 AM 64. When Edward finds out that his organization, which is struggling financially, is contemplating the implementation of a new enterprise system, it worries him. Does Edward have any valid reason to be concerned? a. no, because enterprise systems yield immediate cost savings b. no, because very few enterprise system implementations fail c. yes, because the risks of enterprise system implementations clearly outweigh the benefits d. yes, because problems with an enterprise system implementation can be expensive to fix ANSWER: d RATIONALE: Implementing an enterprise system, particularly for a large organization, is extremely challenging and requires tremendous amounts of resources, the best IS and businesspeople, and plenty of management support. In spite of all this, many enterprise system implementations fail, and problems with an enterprise system implementation can require expensive solutions. FEEDBACK: a. Many enterprise system implementations fail, and problems with an enterprise system implementation can require expensive solutions. b. Many enterprise system implementations fail, and problems with an enterprise system implementation can require expensive solutions. c. Many enterprise system implementations fail, and problems with an enterprise system implementation can require expensive solutions. d. Many enterprise system implementations fail, and problems with an enterprise system implementation can require expensive solutions.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.5 - Identify the challenges that organizations face in planning, building, and operating their enterprise systems. KEYWORDS: Bloom's: Remember DATE CREATED: 7/4/2020 7:03 AM DATE MODIFIED: 7/4/2020 7:17 AM 65. How was Hershey impacted by a failed technology implementation by SAPs R/3 ERP software? a. Hershey stock fell by 8 percent Copyright Cengage Learning. Powered by Cognero.

Page 42


Chapter 10 - Enterprise Systems b. Hershey suffered a data breach c. customer service quality declined d. too many Hershey's Kisses were produced ANSWER: a RATIONALE: Failed technology implementation by SAPs R/3 ERP software caused major problems for Hershey. The supply chain process caused Hershey to miss delivering $100 million worth of Kisses for Halloween, causing the stock to dip 8 percent. FEEDBACK: a. Failed technology implementation by SAPs R/3 ERP software caused major problems for Hershey. The supply chain process caused Hershey to miss delivering $100 million worth of Kisses for Halloween, causing the stock to dip 8 percent. b. Failed technology implementation by SAPs R/3 ERP software caused major problems for Hershey. The supply chain process caused Hershey to miss delivering $100 million worth of Kisses for Halloween, causing the stock to dip 8 percent. c. Failed technology implementation by SAPs R/3 ERP software caused major problems for Hershey. The supply chain process caused Hershey to miss delivering $100 million worth of Kisses for Halloween, causing the stock to dip 8 percent. d. Failed technology implementation by SAPs R/3 ERP software caused major problems for Hershey. The supply chain process caused Hershey to miss delivering $100 million worth of Kisses for Halloween, causing the stock to dip 8 percent.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.5 - Identify the challenges that organizations face in planning, building, and operating their enterprise systems. KEYWORDS: Bloom's: Remember DATE CREATED: 7/4/2020 7:03 AM DATE MODIFIED: 7/4/2020 7:22 AM 66. What happened within three years after MillerCoors hired an IT services firm to help them replace seven different instances of their SAP ERP systems with one consolidating instance? a. bankruptcy of MillerCoors b. lawsuits between MillerCoors and the IT services firm c. disruptions in beverage production and distribution d. improved efficiency and cost savings for MillerCoors ANSWER: b RATIONALE: MillerCoors, a global beverage company, decided to replace the seven different instances of their SAP ERP systems with one consolidating instance in 2014, after years of industry consolidation. They hired an IT services firm to roll out the new system. The implementation did not go smoothly. The first phase resulted in 8 “critical” defects and 47 high-severity ones. By early 2017, MillerCoors was suing the consulting company for $100 million. The consulting company counter-sued saying that MillerCoors was to blame for the delay and problem with the project. Copyright Cengage Learning. Powered by Cognero.

Page 43


Chapter 10 - Enterprise Systems FEEDBACK:

a. MillerCoors decided to replace the seven different instances of their SAP ERP

systems with one consolidating instance in 2014. They hired an IT services firm to roll out the new system. By early 2017, MillerCoors was suing the consulting company for $100 million. The consulting company counter-sued saying that MillerCoors was to blame for the delay and problem with the project. b. MillerCoors decided to replace the seven different instances of their SAP ERP systems with one consolidating instance in 2014. They hired an IT services firm to roll out the new system. By early 2017, MillerCoors was suing the consulting company for $100 million. The consulting company counter-sued saying that MillerCoors was to blame for the delay and problem with the project. c. MillerCoors decided to replace the seven different instances of their SAP ERP systems with one consolidating instance in 2014. They hired an IT services firm to roll out the new system. By early 2017, MillerCoors was suing the consulting company for $100 million. The consulting company counter-sued saying that MillerCoors was to blame for the delay and problem with the project. d. MillerCoors decided to replace the seven different instances of their SAP ERP systems with one consolidating instance in 2014. They hired an IT services firm to roll out the new system. By early 2017, MillerCoors was suing the consulting company for $100 million. The consulting company counter-sued saying that MillerCoors was to blame for the delay and problem with the project.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.5 - Identify the challenges that organizations face in planning, building, and operating their enterprise systems. KEYWORDS: Bloom's: Remember DATE CREATED: 7/4/2020 7:04 AM DATE MODIFIED: 7/4/2020 7:29 AM 67. Which statement about Revlon's rollout of an enterprise-wide system is accurate? a. Though disastrous, this implementation did not affect stock value. b. Revlon was sued by its own stockholders as a result. c. Their decision to change systems had no justification. d. The vendors involved included Panorama and Adobe. ANSWER: b RATIONALE: Revlon, the famous cosmetics manufacturer, was in need of an enterprise-wide system after the acquisition of Elizabeth Arden, Inc. They decided on the SAP HANA option at the end of 2016. The disastrous rollout cost Revlon millions of dollars in lost sales, which they blamed on the lack of effective implementation controls. The situation eventually led to a steep decline in stock value and a suit brought on by Revlon’s own stockholders. FEEDBACK: a. Revlon, the famous cosmetics manufacturer, was in need of an enterprise-wide system after the acquisition of Elizabeth Arden, Inc. They decided on the SAP HANA. The disastrous rollout cost Revlon millions of dollars in lost sales. The situation eventually led to a steep decline in stock value and a suit brought on by Revlon’s own stockholders. b. Revlon, the famous cosmetics manufacturer, was in need of an enterprise-wide system after the acquisition of Elizabeth Arden, Inc. They decided on the SAP HANA. The disastrous rollout cost Revlon millions of dollars in lost sales. The

Copyright Cengage Learning. Powered by Cognero.

Page 44


Chapter 10 - Enterprise Systems situation eventually led to a steep decline in stock value and a suit brought on by Revlon’s own stockholders. c. Revlon, the famous cosmetics manufacturer, was in need of an enterprise-wide system after the acquisition of Elizabeth Arden, Inc. They decided on the SAP HANA. The disastrous rollout cost Revlon millions of dollars in lost sales. The situation eventually led to a steep decline in stock value and a suit brought on by Revlon’s own stockholders. d. Revlon, the famous cosmetics manufacturer, was in need of an enterprise-wide system after the acquisition of Elizabeth Arden, Inc. They decided on the SAP HANA. The disastrous rollout cost Revlon millions of dollars in lost sales. The situation eventually led to a steep decline in stock value and a suit brought on by Revlon’s own stockholders.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.5 - Identify the challenges that organizations face in planning, building, and operating their enterprise systems. KEYWORDS: Bloom's: Remember DATE CREATED: 7/4/2020 7:04 AM DATE MODIFIED: 7/4/2020 7:36 AM 68. One challenge to successful ERP implementation is the cost and disruption associated with upgrades when _____. a. system users do not require extensive training b. the enterprise system must conform to current company operations c. multiple other systems must be integrated with the enterprise system d. the enterprise system must operate independently of other systems ANSWER: c RATIONALE: Most companies have other systems that must be integrated with the enterprise system, such as financial analysis programs, e-commerce operations, and other applications that communicate with suppliers, customers, distributors, and other business partners. Integration of multiple systems adds time and complexity to an ERP implementation, resulting in a high cost and disruption associated with upgrades. FEEDBACK: a. Most companies have other systems that must be integrated with the enterprise system, such as financial analysis programs, e-commerce operations, and other applications that communicate with suppliers, customers, distributors, and other business partners. Integration of multiple systems adds time and complexity to an ERP implementation, resulting in a high cost and disruption associated with upgrades. b. Most companies have other systems that must be integrated with the enterprise system, such as financial analysis programs, e-commerce operations, and other applications that communicate with suppliers, customers, distributors, and other business partners. Integration of multiple systems adds time and complexity to an ERP implementation, resulting in a high cost and disruption associated with upgrades. c. Most companies have other systems that must be integrated with the enterprise system, such as financial analysis programs, e-commerce operations, and other applications that communicate with suppliers, customers, distributors, and other business partners. Integration of multiple systems adds time and complexity to an

Copyright Cengage Learning. Powered by Cognero.

Page 45


Chapter 10 - Enterprise Systems ERP implementation, resulting in a high cost and disruption associated with upgrades. d. Most companies have other systems that must be integrated with the enterprise system, such as financial analysis programs, e-commerce operations, and other applications that communicate with suppliers, customers, distributors, and other business partners. Integration of multiple systems adds time and complexity to an ERP implementation, resulting in a high cost and disruption associated with upgrades.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.5 - Identify the challenges that organizations face in planning, building, and operating their enterprise systems. KEYWORDS: Bloom's: Remember DATE CREATED: 7/4/2020 7:04 AM DATE MODIFIED: 7/4/2020 7:43 AM 69. The average ERP implementation _____. a. costs in the millions and lasts over a year b. costs in the thousands and lasts six months c. uses a template and cannot be customized d. replaces all of the organization's existing systems ANSWER: a RATIONALE: The average ERP implementation costs in the millions with an average project duration of over a year. FEEDBACK: a. The average ERP implementation costs in the millions with an average project duration of over a year. b. The average ERP implementation costs in the millions with an average project duration of over a year. c. The average ERP implementation costs in the millions with an average project duration of over a year. d. The average ERP implementation costs in the millions with an average project duration of over a year.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.5 - Identify the challenges that organizations face in planning, building, and operating their enterprise systems. KEYWORDS: Bloom's: Remember DATE CREATED: 7/4/2020 7:04 AM DATE MODIFIED: 7/4/2020 7:59 AM 70. Why is change management a significant challenge for many organizations during enterprise system implementation? Copyright Cengage Learning. Powered by Cognero.

Page 46


Chapter 10 - Enterprise Systems a. Users often refuse opportunities for training in how to effectively use the system. b. Most companies have other systems that must be integrated with the enterprise system. c. The base enterprise system may need to be modified to meet mandatory business requirements. d. Companies often must radically change how they operate to conform to the enterprise work processes. ANSWER: d RATIONALE: Managing change can pose difficulties because companies often must radically change how they operate to conform to the enterprise work processes. These changes can be so drastic to longtime employees that they depart rather than adapt to the change, leaving the firm short of experienced workers. FEEDBACK: a. Managing change can pose difficulties because companies often must radically change how they operate to conform to the enterprise work processes. These changes can be so drastic to longtime employees that they depart rather than adapt to the change, leaving the firm short of experienced workers. b. Managing change can pose difficulties because companies often must radically change how they operate to conform to the enterprise work processes. These changes can be so drastic to longtime employees that they depart rather than adapt to the change, leaving the firm short of experienced workers. c. Managing change can pose difficulties because companies often must radically change how they operate to conform to the enterprise work processes. These changes can be so drastic to longtime employees that they depart rather than adapt to the change, leaving the firm short of experienced workers. d. Managing change can pose difficulties because companies often must radically change how they operate to conform to the enterprise work processes. These changes can be so drastic to longtime employees that they depart rather than adapt to the change, leaving the firm short of experienced workers.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.5 - Identify the challenges that organizations face in planning, building, and operating their enterprise systems. KEYWORDS: Bloom's: Remember DATE CREATED: 7/4/2020 7:04 AM DATE MODIFIED: 7/4/2020 8:04 AM 71. Millie's company is implementing an ERP, and her direct reports are complaining loudly of their frustrations with the new system. What should Millie request from upper management to alleviate this? a. an extensive training program for system users b. a series of system customizations c. a return to previous work processes d. better integration with non-ERP systems ANSWER: a RATIONALE: User frustration with the new system is a major challenge because effective use of an enterprise system requires changes in work processes and in the details of how work gets done. Many users initially balk at these changes and require extensive training and encouragement. FEEDBACK: a. User frustration with the new system is a major challenge because effective use Copyright Cengage Learning. Powered by Cognero.

Page 47


Chapter 10 - Enterprise Systems of an enterprise system requires changes in work processes and in the details of how work gets done. Many users initially balk at these changes and require extensive training and encouragement. b. User frustration with the new system is a major challenge because effective use of an enterprise system requires changes in work processes and in the details of how work gets done. Many users initially balk at these changes and require extensive training and encouragement. c. User frustration with the new system is a major challenge because effective use of an enterprise system requires changes in work processes and in the details of how work gets done. Many users initially balk at these changes and require extensive training and encouragement. d. User frustration with the new system is a major challenge because effective use of an enterprise system requires changes in work processes and in the details of how work gets done. Many users initially balk at these changes and require extensive training and encouragement.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.5 - Identify the challenges that organizations face in planning, building, and operating their enterprise systems. KEYWORDS: Bloom's: Remember DATE CREATED: 7/4/2020 7:04 AM DATE MODIFIED: 7/4/2020 8:10 AM 72. Rheneas wants to ensure his management team is aware of the common causes for failed enterprise system implementations before they begin their own. He points out to the team that _____. a. only top organizations like Hershey and Revlon are immune to failure b. it will be helpful to lay off experienced staff prior to the implementation c. the failure rate for ERP implementations worldwide is 21 percent d. cost and duration are not among the major causes of failure ANSWER: c RATIONALE: Twenty-one percent of ERP implementations worldwide evaluated by Panorama, an ERP consulting firm, were judged to be failures. A sample of major enterprise system implementation project failures includes those experienced by Hershey, MillerCoors, and Revlon. Major challenges to implementation include the departure of experienced workers who are unwilling to adapt to change and the high cost and long lead time involved. FEEDBACK: a. Twenty-one percent of ERP implementations worldwide evaluated by Panorama, an ERP consulting firm, were judged to be failures. b. Twenty-one percent of ERP implementations worldwide evaluated by Panorama, an ERP consulting firm, were judged to be failures. c. Twenty-one percent of ERP implementations worldwide evaluated by Panorama, an ERP consulting firm, were judged to be failures. d. Twenty-one percent of ERP implementations worldwide evaluated by Panorama, an ERP consulting firm, were judged to be failures.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 48


Chapter 10 - Enterprise Systems REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.6 - Identify tips for avoiding many of the common causes for failed enterprise system implementations. KEYWORDS: Bloom's: Remember DATE CREATED: 7/4/2020 8:11 AM DATE MODIFIED: 7/4/2020 8:25 AM 73. One tip for success with an ERP implementation is to have the project _____. a. managed by an independent contractor b. managed by a full-time executive c. rolled out as rapidly as possible d. rolled out before staff are informed ANSWER: b RATIONALE: One tip for avoiding some of the many common causes for failed enterprise system implementations is: Assign a full-time executive to manage the project. Others include: Appoint an experienced, independent resource to provide project oversight and to verify and validate system performance. Allow sufficient time to transition from the old way of doing things to the new system and new processes. FEEDBACK: a. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Assign a full-time executive to manage the project.

b. One tip for avoiding some of the many common causes for failed enterprise

system implementations is: Assign a full-time executive to manage the project. c. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Assign a full-time executive to manage the project. d. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Assign a full-time executive to manage the project.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.6 - Identify tips for avoiding many of the common causes for failed enterprise system implementations. KEYWORDS: Bloom's: Remember DATE CREATED: 7/4/2020 8:12 AM DATE MODIFIED: 7/4/2020 8:33 AM 74. Innitrobe is ramping up to begin an ERP implementation. To promote its success, Innitrobe seeks project oversight and verification and validation of system performance from _____. a. the software vendor b. a focus group of system users c. a full-time executive d. an experienced, independent resource ANSWER: d Copyright Cengage Learning. Powered by Cognero.

Page 49


Chapter 10 - Enterprise Systems RATIONALE:

One tip for avoiding some of the many common causes for failed enterprise system implementations is: Appoint an experienced, independent resource to provide project oversight and to verify and validate system performance.

FEEDBACK:

a. One tip for avoiding some of the many common causes for failed enterprise

system implementations is: Appoint an experienced, independent resource to provide project oversight and to verify and validate system performance. b. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Appoint an experienced, independent resource to provide project oversight and to verify and validate system performance. c. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Appoint an experienced, independent resource to provide project oversight and to verify and validate system performance. d. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Appoint an experienced, independent resource to provide project oversight and to verify and validate system performance.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.6 - Identify tips for avoiding many of the common causes for failed enterprise system implementations. KEYWORDS: Bloom's: Remember DATE CREATED: 7/4/2020 8:13 AM DATE MODIFIED: 7/4/2020 8:38 AM 75. Transitioning successfully from old procedures to a new ERP system and the associated new processes typically requires _____. a. a competitive advantage b. new employees c. sufficient time d. little effort ANSWER: c RATIONALE: One tip for avoiding some of the many common causes for failed enterprise system implementations is: Allow sufficient time to transition from the old way of doing things to the new system and new processes. FEEDBACK: a. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Allow sufficient time to transition from the old way of doing things to the new system and new processes. b. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Allow sufficient time to transition from the old way of doing things to the new system and new processes. c. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Allow sufficient time to transition from the old way of doing things to the new system and new processes. d. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Allow sufficient time to transition from the old way of doing things to the new system and new processes.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 50


Chapter 10 - Enterprise Systems DIFFICULTY: Easy REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.6 - Identify tips for avoiding many of the common causes for failed enterprise system implementations. KEYWORDS: Bloom's: Remember DATE CREATED: 7/4/2020 8:13 AM DATE MODIFIED: 7/5/2020 7:24 AM 76. How much time do many project managers recommend be allocated for training staff to facilitate a successful enterprise system implementation? a. 30-60 minutes per employee b. 30-60 days per employee c. 2 hours per component of the system d. 1 day per component of the system ANSWER: b RATIONALE: One tip for avoiding some of the many common causes for failed enterprise system implementations is: Allocate sufficient time and money for training staff; many project managers recommend budgeting 30–60 days per employee for training. FEEDBACK: a. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Allocate sufficient time and money for training staff; many project managers recommend budgeting 30–60 days per employee for training. b. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Allocate sufficient time and money for training staff; many project managers recommend budgeting 30–60 days per employee for training. c. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Allocate sufficient time and money for training staff; many project managers recommend budgeting 30–60 days per employee for training. d. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Allocate sufficient time and money for training staff; many project managers recommend budgeting 30–60 days per employee for training.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.6 - Identify tips for avoiding many of the common causes for failed enterprise system implementations. KEYWORDS: Bloom's: Remember DATE CREATED: 7/4/2020 8:13 AM DATE MODIFIED: 7/5/2020 7:29 AM 77. Gordon is assisting with planning his employer's enterprise system implementation. He knows that continually Copyright Cengage Learning. Powered by Cognero.

Page 51


Chapter 10 - Enterprise Systems assessing the progress of the project and identifying project-related risks will be key to its success. How can Gordon best address this particular aspect of the implementation? a. define metrics b. modify the software c. train users d. replace workflows ANSWER: a RATIONALE: One tip for avoiding some of the many common causes for failed enterprise system implementations is: Define metrics to assess project progress and to identify project-related risks. Others include: Be wary of modifying the enterprise system software to conform to your firm’s business practices. Keep in mind that the best systems require little change to existing workflow as it relates to user input/effort while eliminating the biggest pain points. Training users is essential, but does not address the need to assess project progress and identify risks. FEEDBACK:

a. One tip for avoiding some of the many common causes for failed enterprise

system implementations is: Define metrics to assess project progress and to identify project-related risks. b. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Define metrics to assess project progress and to identify project-related risks. c. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Define metrics to assess project progress and to identify project-related risks. d. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Define metrics to assess project progress and to identify project-related risks.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.6 - Identify tips for avoiding many of the common causes for failed enterprise system implementations. KEYWORDS: Bloom's: Remember DATE CREATED: 7/4/2020 8:13 AM DATE MODIFIED: 7/6/2020 7:38 AM 78. The scope of an enterprise system implementation project should be _____. a. flexible enough to expand as the project continues b. determined on the fly as the project unfolds c. contained to essential business processes d. as broad as possible for the most positive impact ANSWER: c RATIONALE: One tip for avoiding some of the many common causes for failed enterprise system implementations is: Keep the scope of the project well defined and contained to essential Copyright Cengage Learning. Powered by Cognero.

Page 52


Chapter 10 - Enterprise Systems business processes. FEEDBACK:

a. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Keep the scope of the project well defined and contained to essential business processes. b. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Keep the scope of the project well defined and contained to essential business processes. c. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Keep the scope of the project well defined and contained to essential business processes. d. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Keep the scope of the project well defined and contained to essential business processes.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.6 - Identify tips for avoiding many of the common causes for failed enterprise system implementations. KEYWORDS: Bloom's: Remember DATE CREATED: 7/4/2020 8:13 AM DATE MODIFIED: 7/6/2020 7:41 AM 79. Experts recommend that firms trying to implement an enterprise system be wary of _____. a. allowing too much time to transition to the new business processes b. appointing an independent resource to provide project oversight c. defining metrics to assess project progress and identify risks d. modifying the system software to conform to their business practices ANSWER: d RATIONALE: One tip for avoiding some of the many common causes for failed enterprise system implementations is: Be wary of modifying the enterprise system software to conform to your firm’s business practices. Others include: Allow sufficient time to transition from the old way of doing things to the new system and new processes. Appoint an experienced, independent resource to provide project oversight and to verify and validate system performance. Define metrics to assess project progress and to identify project-related risks. FEEDBACK:

a. One tip for avoiding some of the many common causes for failed enterprise

system implementations is: Be wary of modifying the enterprise system software to conform to your firm’s business practices. b. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Be wary of modifying the enterprise system software to conform to your firm’s business practices. c. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Be wary of modifying the enterprise system software to conform to your firm’s business practices. d. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Be wary of modifying the enterprise system software Copyright Cengage Learning. Powered by Cognero.

Page 53


Chapter 10 - Enterprise Systems to conform to your firm’s business practices.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.6 - Identify tips for avoiding many of the common causes for failed enterprise system implementations. KEYWORDS: Bloom's: Remember DATE CREATED: 7/4/2020 8:14 AM DATE MODIFIED: 7/6/2020 7:47 AM 80. Why is it important to document existing workflows and work directly with key stakeholders prior to beginning implementation of an enterprise system? a. Stakeholders will ultimately make the decision regarding whether to implement the system. b. Stakeholders must understand and buy into the changes that will be made. c. Early engagement of stakeholders reduces or eliminates the need for training later in the process. d. Early engagement of stakeholders will ensure the success of the implementation. ANSWER: b RATIONALE: One tip for avoiding some of the many common causes for failed enterprise system implementations is: Focus on documenting existing workflows before implementing and working directly with key stakeholders, so they understand and buy into the changes that will ultimately be implemented. Though important, this step alone is not enough to ensure implementation success, as there are many factors involved. FEEDBACK: a. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Focus on documenting existing workflows before implementing and working directly with key stakeholders, so they understand and buy into the changes that will ultimately be implemented. b. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Focus on documenting existing workflows before implementing and working directly with key stakeholders, so they understand and buy into the changes that will ultimately be implemented. c. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Focus on documenting existing workflows before implementing and working directly with key stakeholders, so they understand and buy into the changes that will ultimately be implemented. d. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Focus on documenting existing workflows before implementing and working directly with key stakeholders, so they understand and buy into the changes that will ultimately be implemented.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.6 - Identify tips for avoiding many of the common causes for failed enterprise system implementations. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 54


Chapter 10 - Enterprise Systems DATE CREATED: DATE MODIFIED:

7/4/2020 8:14 AM 7/6/2020 7:54 AM

81. Which of the following is a characteristic of the best enterprise systems, according to experts? a. require drastic changes to user input and output b. eliminate the biggest pain points c. completely redesign user workflows d. customized, one-of-a-kind software ANSWER: b RATIONALE: One tip for avoiding some of the many common causes for failed enterprise system implementations is: Keep in mind that the best systems require little change to existing workflow as it relates to user input/effort while eliminating the biggest pain points. Others include: Be wary of modifying the enterprise system software to conform to your firm’s business practices. FEEDBACK:

a. One tip for avoiding some of the many common causes for failed enterprise

system implementations is: Keep in mind that the best systems require little change to existing workflow as it relates to user input/effort while eliminating the biggest pain points. b. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Keep in mind that the best systems require little change to existing workflow as it relates to user input/effort while eliminating the biggest pain points. c. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Keep in mind that the best systems require little change to existing workflow as it relates to user input/effort while eliminating the biggest pain points. d. One tip for avoiding some of the many common causes for failed enterprise system implementations is: Keep in mind that the best systems require little change to existing workflow as it relates to user input/effort while eliminating the biggest pain points.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.6 - Identify tips for avoiding many of the common causes for failed enterprise system implementations. KEYWORDS: Bloom's: Remember DATE CREATED: 7/4/2020 8:14 AM DATE MODIFIED: 7/6/2020 7:59 AM 82. For an organization with an enterprise system, processing transactions _____. a. becomes less relevant to day-to-day activities b. consumes huge amounts of the organization's resources c. creates a storehouse of data invaluable to decision making d. becomes a greater focus than improving service ANSWER: c Copyright Cengage Learning. Powered by Cognero.

Page 55


Chapter 10 - Enterprise Systems RATIONALE:

Businesses rely on enterprise systems to perform many of their daily activities in areas such as product supply, distribution, sales, marketing, human resources, manufacturing, accounting, and taxation so that work can be performed quickly without waste or mistakes. Without such systems, recording and processing business transactions would consume huge amounts of an organization’s resources. This collection of processed transactions also forms a storehouse of data invaluable to decision making. The ultimate goal of such systems is to satisfy customers and provide significant benefits by reducing costs and improving service.

FEEDBACK:

a. The collection of processed transactions forms a storehouse of data invaluable to decision making. b. The collection of processed transactions forms a storehouse of data invaluable to decision making. c. The collection of processed transactions forms a storehouse of data invaluable to decision making. d. The collection of processed transactions forms a storehouse of data invaluable to decision making.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Enterprise Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.7 - Develop an understanding of how data from one function of the organization can be used to make critical decisions in another. KEYWORDS: Bloom's: Remember DATE CREATED: 7/6/2020 8:01 AM DATE MODIFIED: 7/6/2020 8:22 AM 83. What component at the core of the ERP system allows all business functions to access current and consistent data for operational decision making? a. database b. reports c. POS device d. general ledger ANSWER: a RATIONALE: At the core of the ERP system is a database that is shared by all users so that all business functions have access to current and consistent data for operational decision making and planning. FEEDBACK: a. At the core of the ERP system is a database that is shared by all users so that all business functions have access to current and consistent data for operational decision making and planning. b. At the core of the ERP system is a database that is shared by all users so that all business functions have access to current and consistent data for operational decision making and planning. c. At the core of the ERP system is a database that is shared by all users so that all business functions have access to current and consistent data for operational decision making and planning. d. At the core of the ERP system is a database that is shared by all users so that all business functions have access to current and consistent data for operational decision making and planning.

Copyright Cengage Learning. Powered by Cognero.

Page 56


Chapter 10 - Enterprise Systems POINTS: 1 DIFFICULTY: Easy REFERENCES: Enterprise Resource Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.7 - Develop an understanding of how data from one function of the organization can be used to make critical decisions in another. KEYWORDS: Bloom's: Remember DATE CREATED: 7/6/2020 8:02 AM DATE MODIFIED: 7/6/2020 10:34 AM 84. An ERP system helps facilitate decisions affecting the entire organization or business units because it _____. a. reduces costs b. cleans legacy data c. standardizes infrastructure d. integrates data ANSWER: d RATIONALE: With an ERP system, data is integrated from the start, eliminating the need to gather data from multiple business functions and/or reconcile data from more than one application. The result is an organization that looks seamless, not only to the outside world but also to the decision makers who are deploying resources within the organization. Data is integrated to facilitate operational decision making and allows companies to provide better customer service and support, strengthen customer and supplier relationships, and generate new business opportunities. To ensure that an ERP system contributes to improved decision making, the data used in an ERP system must be of high quality. FEEDBACK: a. With an ERP system, data is integrated from the start, eliminating the need to gather data from multiple business functions and/or reconcile data from more than one application. Data is integrated to facilitate operational decision making and allows companies to provide better customer service and support, strengthen customer and supplier relationships, and generate new business opportunities. b. With an ERP system, data is integrated from the start, eliminating the need to gather data from multiple business functions and/or reconcile data from more than one application. Data is integrated to facilitate operational decision making and allows companies to provide better customer service and support, strengthen customer and supplier relationships, and generate new business opportunities. c. With an ERP system, data is integrated from the start, eliminating the need to gather data from multiple business functions and/or reconcile data from more than one application. Data is integrated to facilitate operational decision making and allows companies to provide better customer service and support, strengthen customer and supplier relationships, and generate new business opportunities. d. With an ERP system, data is integrated from the start, eliminating the need to gather data from multiple business functions and/or reconcile data from more than one application. Data is integrated to facilitate operational decision making and allows companies to provide better customer service and support, strengthen customer and supplier relationships, and generate new business opportunities.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Advantages of ERP Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 57


Chapter 10 - Enterprise Systems HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.7 - Develop an understanding of how data from one function of the organization can be used to make critical decisions in another. KEYWORDS: Bloom's: Remember DATE CREATED: 7/6/2020 8:02 AM DATE MODIFIED: 7/6/2020 10:46 AM 85. As a result of implementing an ERP system, Women's World Banking _____. a. can make data-based decisions regarding its new investments b. can devote more employee hours to grant reporting and accounts payable c. has reduced data entry by over 80 hours per month d. has eliminated transparency into its balances by entity, donor, and grant ANSWER: a RATIONALE: Women’s World Banking needs access to detailed transaction information so it can maintain complete transparency into its balances by entity, donor, and grant—even down to the project level. To streamline its operations, Women’s World Banking implemented an ERP system that provides it with access to the data it needs to apply for new funding grants, quickly and accurately report on existing grants, and make decisions regarding investments in new business development opportunities. Since its ERP roll-out, the organization has cut hundreds of hours of accounts payable and grant-reporting time annually, reduced data entry by almost 15 hours per month, and gained greater visibility into its spending across multiple entities, grants, donors, and projects. FEEDBACK: a. To streamline its operations, Women’s World Banking implemented an ERP system that provides it with access to the data it needs to apply for new funding grants, quickly and accurately report on existing grants, and make decisions regarding investments in new business development opportunities. b. To streamline its operations, Women’s World Banking implemented an ERP system that provides it with access to the data it needs to apply for new funding grants, quickly and accurately report on existing grants, and make decisions regarding investments in new business development opportunities. c. To streamline its operations, Women’s World Banking implemented an ERP system that provides it with access to the data it needs to apply for new funding grants, quickly and accurately report on existing grants, and make decisions regarding investments in new business development opportunities. d. To streamline its operations, Women’s World Banking implemented an ERP system that provides it with access to the data it needs to apply for new funding grants, quickly and accurately report on existing grants, and make decisions regarding investments in new business development opportunities.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Advantages of ERP QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.7 - Develop an understanding of how data from one function of the organization can be used to make critical decisions in another. KEYWORDS: Bloom's: Remember DATE CREATED: 7/6/2020 8:03 AM DATE MODIFIED: 7/6/2020 10:56 AM Copyright Cengage Learning. Powered by Cognero.

Page 58


Chapter 10 - Enterprise Systems 86. Supply chain management involves many situations where data from one function of an organization is used to make critical decisions in another area. What is one example? a. Sales and operations planning uses the production plan to develop a detailed production schedule. b. Purchasing uses the high-level production schedule to plan the details of running and staffing the operation. c. ERP systems communicate directly with manufacturing machines on the production floor to keep the inventory up to date. d. Sales ordering includes confirming the availability of desired items in the inventory and the customer's available credit. ANSWER: d RATIONALE: Sales ordering is the set of activities that must be performed to capture a customer sales order. If the item(s) the customer wants to order are out of stock, the sales order process should communicate this fact and suggest other items to substitute for the customer’s initial choice. After the total cost of the order is determined, a company must check the customer’s available credit to see if this order is within the credit limit. The sales and operations plan (S&OP ) takes demand and current inventory levels into account and determines the specific product items that need to be produced as well as when to meet the forecast future demand. Purchasing uses the information from MRP to place purchase orders for raw materials with qualified suppliers. ERP systems do not work directly with manufacturing machines on the production floor, so they need a way to capture information about what was produced. This data must be passed to the ERP accounting modules to keep an accurate count of finished product inventory. FEEDBACK:

a. Sales ordering is the set of activities that must be performed to capture a

customer sales order. If the item(s) the customer wants to order are out of stock, the sales order process should communicate this fact and suggest other items to substitute for the customer’s initial choice. After the total cost of the order is determined, a company must check the customer’s available credit to see if this order is within the credit limit. b. Sales ordering is the set of activities that must be performed to capture a customer sales order. If the item(s) the customer wants to order are out of stock, the sales order process should communicate this fact and suggest other items to substitute for the customer’s initial choice. After the total cost of the order is determined, a company must check the customer’s available credit to see if this order is within the credit limit. c. Sales ordering is the set of activities that must be performed to capture a customer sales order. If the item(s) the customer wants to order are out of stock, the sales order process should communicate this fact and suggest other items to substitute for the customer’s initial choice. After the total cost of the order is determined, a company must check the customer’s available credit to see if this order is within the credit limit. d. Sales ordering is the set of activities that must be performed to capture a customer sales order. If the item(s) the customer wants to order are out of stock, the sales order process should communicate this fact and suggest other items to substitute for the customer’s initial choice. After the total cost of the order is determined, a company must check the customer’s available credit to see if this order is within the credit limit.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Easy Supply Chain Management (SCM) Multiple Choice False

Copyright Cengage Learning. Powered by Cognero.

Page 59


Chapter 10 - Enterprise Systems LEARNING OBJECTIVES: POIS.14e.10.7 - Develop an understanding of how data from one function of the organization can be used to make critical decisions in another. KEYWORDS: Bloom's: Remember DATE CREATED: 7/6/2020 8:03 AM DATE MODIFIED: 7/7/2020 7:53 AM 87. CRM software allows employees from one business function to use data from other functions to help them make decisions because _____. a. it tracks data and trends on groups of customers rather than on individual customers b. it stores data about every contact a company has with a customer through every channel so that the company can truly understand customer actions c. it allows them to set up company profiles on social networking sites such as Facebook and Instagram, where they can make contacts with potential customers d. it cannot be accessed by mobile devices, which increases data security ANSWER: b RATIONALE: CRM software automates and integrates the functions of sales, marketing, and service in an organization. The objective is to capture data about every contact a company has with a customer through every channel and to store it in the CRM system so that the company can truly understand customer actions. FEEDBACK: a. CRM software automates and integrates the functions of sales, marketing, and service in an organization. The objective is to capture data about every contact a company has with a customer through every channel and to store it in the CRM system so that the company can truly understand customer actions. b. CRM software automates and integrates the functions of sales, marketing, and service in an organization. The objective is to capture data about every contact a company has with a customer through every channel and to store it in the CRM system so that the company can truly understand customer actions. c. CRM software automates and integrates the functions of sales, marketing, and service in an organization. The objective is to capture data about every contact a company has with a customer through every channel and to store it in the CRM system so that the company can truly understand customer actions. d. CRM software automates and integrates the functions of sales, marketing, and service in an organization. The objective is to capture data about every contact a company has with a customer through every channel and to store it in the CRM system so that the company can truly understand customer actions.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Customer Relationship Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.7 - Develop an understanding of how data from one function of the organization can be used to make critical decisions in another. KEYWORDS: Bloom's: Remember DATE CREATED: 7/6/2020 8:03 AM DATE MODIFIED: 7/7/2020 8:04 AM 88. PLM software facilitates decision making by _____. a. producing distinct items that can be decomposed into their basic components Copyright Cengage Learning. Powered by Cognero.

Page 60


Chapter 10 - Enterprise Systems b. coordinating a chemical process to produce new substances c. generating and distributing product and process data to those who need it d. eliminating the need for tracking and audit trails or document controls ANSWER: c RATIONALE: Product lifecycle management (PLM) is an enterprise business strategy that creates a common repository of product information and processes to support the collaborative creation, management, dissemination, and use of product and packaging definition information. As products advance through the lifecycle stages, product data is generated and distributed to various groups both within and outside the manufacturing firm. PLM powers innovation and improves productivity by connecting people across global product development and manufacturing organizations with the product and process knowledge they need to succeed. FEEDBACK: a. Product lifecycle management (PLM) is an enterprise business strategy that creates a common repository of product information and processes to support the collaborative creation, management, dissemination, and use of product and packaging definition information. As products advance through the lifecycle stages, product data is generated and distributed to various groups both within and outside the manufacturing firm. b. Product lifecycle management (PLM) is an enterprise business strategy that creates a common repository of product information and processes to support the collaborative creation, management, dissemination, and use of product and packaging definition information. As products advance through the lifecycle stages, product data is generated and distributed to various groups both within and outside the manufacturing firm. c. Product lifecycle management (PLM) is an enterprise business strategy that creates a common repository of product information and processes to support the collaborative creation, management, dissemination, and use of product and packaging definition information. As products advance through the lifecycle stages, product data is generated and distributed to various groups both within and outside the manufacturing firm. d. Product lifecycle management (PLM) is an enterprise business strategy that creates a common repository of product information and processes to support the collaborative creation, management, dissemination, and use of product and packaging definition information. As products advance through the lifecycle stages, product data is generated and distributed to various groups both within and outside the manufacturing firm.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Product Lifecycle Management (PLM) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.7 - Develop an understanding of how data from one function of the organization can be used to make critical decisions in another. KEYWORDS: Bloom's: Remember DATE CREATED: 7/6/2020 8:03 AM DATE MODIFIED: 7/7/2020 9:48 AM 89. Claudette is a developer working for a software company that uses JIRA, a PLM product. Claudette knows that using JIRA benefits her organization because _____. a. it is designed specifically to support the waterfall development methodology they use Copyright Cengage Learning. Powered by Cognero.

Page 61


Chapter 10 - Enterprise Systems b. all PLM products are designed for the software, not the manufacturing, industry c. upper management can it to monitor project progress in order to make informed decisions d. it automates and integrates the functions of sales, marketing, and service in her organization ANSWER: c RATIONALE: Much of the PLM software discussed in this chapter is used extensively in the manufacturing industry; however, software companies also make use of PLM software to streamline their product planning and development efforts. For instance, enterprise solutions such as JIRA, Asana, and Aha! are three such tools used by engineering and product teams to document and manage the tasks necessary for building and delivering their products to market. They are used to support both agile and waterfall software development methodologies. The greatest value being that systems like JIRA and Asana provide a robust way for engineers, product managers, and the executive team to monitor the product roadmap and manage associated development tasks. FEEDBACK: a. PLM tools are used to support both agile and waterfall software development methodologies. The greatest value being that systems like JIRA and Asana provide a robust way for engineers, product managers, and the executive team to monitor the product roadmap and manage associated development tasks. b. PLM tools are used to support both agile and waterfall software development methodologies. The greatest value being that systems like JIRA and Asana provide a robust way for engineers, product managers, and the executive team to monitor the product roadmap and manage associated development tasks. c. PLM tools are used to support both agile and waterfall software development methodologies. The greatest value being that systems like JIRA and Asana provide a robust way for engineers, product managers, and the executive team to monitor the product roadmap and manage associated development tasks. d. PLM tools are used to support both agile and waterfall software development methodologies. The greatest value being that systems like JIRA and Asana provide a robust way for engineers, product managers, and the executive team to monitor the product roadmap and manage associated development tasks.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Software Product Planning and Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.7 - Develop an understanding of how data from one function of the organization can be used to make critical decisions in another. KEYWORDS: Bloom's: Remember DATE CREATED: 7/6/2020 8:03 AM DATE MODIFIED: 7/7/2020 10:03 AM 90. Although having greater access to operational data is beneficial to an organization, it can be challenging to _____. a. analyze it in order to derive insights b. find data visualization tools to purchase c. justify providing this access to decision makers d. identify ERP systems with integrated databases ANSWER: a RATIONALE: Although having greater access to operational data is beneficial to an organization, being able to analyze it in unique and interesting ways to derive insights can often be a challenge— particularly if the data exists in two separate enterprise systems. Copyright Cengage Learning. Powered by Cognero.

Page 62


Chapter 10 - Enterprise Systems FEEDBACK:

a. Although having greater access to operational data is beneficial to an

organization, being able to analyze it in unique and interesting ways to derive insights can often be a challenge—particularly if the data exists in two separate enterprise systems. b. Although having greater access to operational data is beneficial to an organization, being able to analyze it in unique and interesting ways to derive insights can often be a challenge—particularly if the data exists in two separate enterprise systems. c. Although having greater access to operational data is beneficial to an organization, being able to analyze it in unique and interesting ways to derive insights can often be a challenge—particularly if the data exists in two separate enterprise systems. d. Although having greater access to operational data is beneficial to an organization, being able to analyze it in unique and interesting ways to derive insights can often be a challenge—particularly if the data exists in two separate enterprise systems.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Advantages of ERP QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.8 - Identify tools that can be used to analyze this data, and demonstrate an ability to find valuable relationships between data. KEYWORDS: Bloom's: Remember DATE CREATED: 7/7/2020 10:04 AM DATE MODIFIED: 7/7/2020 10:37 AM 91. Which type of tool combines data from multiple enterprise systems to create dashboard experiences? a. customer relationship management b. data visualization and business intelligence c. product lifecycle management d. artificial intelligence ANSWER: b RATIONALE: Organizations are solving the problem of disconnected enterprise systems by using data visualization and (business intelligence) BI tools like Birst, Domo, and Tableau to create dashboard experiences that integrate data from multiple enterprise systems. FEEDBACK: a. Organizations are solving the problem of disconnected enterprise systems by using data visualization and (business intelligence) BI tools like Birst, Domo, and Tableau to create dashboard experiences that integrate data from multiple enterprise systems. b. Organizations are solving the problem of disconnected enterprise systems by using data visualization and (business intelligence) BI tools like Birst, Domo, and Tableau to create dashboard experiences that integrate data from multiple enterprise systems. c. Organizations are solving the problem of disconnected enterprise systems by using data visualization and (business intelligence) BI tools like Birst, Domo, and Tableau to create dashboard experiences that integrate data from multiple enterprise systems. d. Organizations are solving the problem of disconnected enterprise systems by using data visualization and (business intelligence) BI tools like Birst, Domo, and

Copyright Cengage Learning. Powered by Cognero.

Page 63


Chapter 10 - Enterprise Systems Tableau to create dashboard experiences that integrate data from multiple enterprise systems.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Advantages of ERP QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.8 - Identify tools that can be used to analyze this data, and demonstrate an ability to find valuable relationships between data. KEYWORDS: Bloom's: Remember DATE CREATED: 7/7/2020 10:09 AM DATE MODIFIED: 7/7/2020 10:48 AM 92. Peter Sam's product development team studies a dashboard that shows the top product requests from customers in parallel with the product roadmap for the year in an effort to identify any gaps in their product offerings. What type of tool are they using? a. artificial intelligence and machine learning b. transaction processing c. general ledger d. data visualization and business intelligence ANSWER: d RATIONALE: Organizations are solving the problem of disconnected enterprise systems by using data visualization and (business intelligence) BI tools like Birst, Domo, and Tableau to create dashboard experiences that integrate data from multiple enterprise systems. Such a dashboard might show the top product requests from employees and customers in parallel with the product roadmap for the year to highlight any gaps that the product development team should be focusing on. FEEDBACK: a. Organizations are solving the problem of disconnected enterprise systems by using data visualization and (business intelligence) BI tools like Birst, Domo, and Tableau to create dashboard experiences that integrate data from multiple enterprise systems. b. Organizations are solving the problem of disconnected enterprise systems by using data visualization and (business intelligence) BI tools like Birst, Domo, and Tableau to create dashboard experiences that integrate data from multiple enterprise systems. c. Organizations are solving the problem of disconnected enterprise systems by using data visualization and (business intelligence) BI tools like Birst, Domo, and Tableau to create dashboard experiences that integrate data from multiple enterprise systems. d. Organizations are solving the problem of disconnected enterprise systems by using data visualization and (business intelligence) BI tools like Birst, Domo, and Tableau to create dashboard experiences that integrate data from multiple enterprise systems.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Easy Advantages of ERP Multiple Choice False

Copyright Cengage Learning. Powered by Cognero.

Page 64


Chapter 10 - Enterprise Systems LEARNING OBJECTIVES: POIS.14e.10.8 - Identify tools that can be used to analyze this data, and demonstrate an ability to find valuable relationships between data. KEYWORDS: Bloom's: Remember DATE CREATED: 7/7/2020 10:09 AM DATE MODIFIED: 7/7/2020 10:48 AM 93. Which data analysis tool benefits organizations through the identification unique patterns, correlations, and anomalies within a vast amount of diverse data? a. artificial intelligence b. business intelligence c. product lifecycle management software d. computer-aided engineering ANSWER: a RATIONALE: One of the benefits of artificial intelligence (AI) and machine learning is the ability to identify unique patterns, correlations, and anomalies within a vast amount of diverse data. FEEDBACK: a. One of the benefits of artificial intelligence (AI) and machine learning is the ability to identify unique patterns, correlations, and anomalies within a vast amount of diverse data. b. One of the benefits of artificial intelligence (AI) and machine learning is the ability to identify unique patterns, correlations, and anomalies within a vast amount of diverse data. c. One of the benefits of artificial intelligence (AI) and machine learning is the ability to identify unique patterns, correlations, and anomalies within a vast amount of diverse data. d. One of the benefits of artificial intelligence (AI) and machine learning is the ability to identify unique patterns, correlations, and anomalies within a vast amount of diverse data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Advantages of ERP QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.8 - Identify tools that can be used to analyze this data, and demonstrate an ability to find valuable relationships between data. KEYWORDS: Bloom's: Remember DATE CREATED: 7/7/2020 10:09 AM DATE MODIFIED: 7/7/2020 1:12 PM 94. Artificial intelligence _____. a. technologies have not yet been applied to the analysis of customer feedback b. is the use of software to control machine tools and related machinery c. lacks outside context on the importance of unique patterns revealed by data d. can independently determine how an organization should act on its data ANSWER: c RATIONALE: One of the benefits of artificial intelligence (AI) and machine learning is the ability to identify unique patterns, correlations, and anomalies within a vast amount of diverse data. However, AI still lacks outside context on the importance of those patterns, including an Copyright Cengage Learning. Powered by Cognero.

Page 65


Chapter 10 - Enterprise Systems understanding of how an organization should act on that data. Google uses analytics techniques that automatically reveal insights from online consumer conversations (social media, blogs, forums, etc.) using machine learning to identify patterns in those conversations. FEEDBACK:

a. One of the benefits of artificial intelligence (AI) and machine learning is the ability to identify unique patterns, correlations, and anomalies within a vast amount of diverse data. However, AI still lacks outside context on the importance of those patterns, including an understanding of how an organization should act on that data. b. One of the benefits of artificial intelligence (AI) and machine learning is the ability to identify unique patterns, correlations, and anomalies within a vast amount of diverse data. However, AI still lacks outside context on the importance of those patterns, including an understanding of how an organization should act on that data. c. One of the benefits of artificial intelligence (AI) and machine learning is the ability to identify unique patterns, correlations, and anomalies within a vast amount of diverse data. However, AI still lacks outside context on the importance of those patterns, including an understanding of how an organization should act on that data. d. One of the benefits of artificial intelligence (AI) and machine learning is the ability to identify unique patterns, correlations, and anomalies within a vast amount of diverse data. However, AI still lacks outside context on the importance of those patterns, including an understanding of how an organization should act on that data.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Advantages of ERP QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.8 - Identify tools that can be used to analyze this data, and demonstrate an ability to find valuable relationships between data. KEYWORDS: Bloom's: Remember DATE CREATED: 7/7/2020 10:09 AM DATE MODIFIED: 7/7/2020 1:24 PM 95. What does an organization require in order to use AI to identify patterns that are useful for decision making? a. PLM software with CAD, CAE, and CAM b. both legacy and enterprise systems c. several transaction processing systems d. an ERP and a centralized database ANSWER: d RATIONALE: Organizations with an ERP and a centralized database have an opportunity to leverage AI to identify patterns, allowing decision makers to act on significant data trends that might have otherwise gone unnoticed. FEEDBACK: a. Organizations with an ERP and a centralized database have an opportunity to leverage AI to identify patterns, allowing decision makers to act on significant data trends that might have otherwise gone unnoticed. b. Organizations with an ERP and a centralized database have an opportunity to leverage AI to identify patterns, allowing decision makers to act on significant

Copyright Cengage Learning. Powered by Cognero.

Page 66


Chapter 10 - Enterprise Systems data trends that might have otherwise gone unnoticed.

c. Organizations with an ERP and a centralized database have an opportunity to leverage AI to identify patterns, allowing decision makers to act on significant data trends that might have otherwise gone unnoticed. d. Organizations with an ERP and a centralized database have an opportunity to leverage AI to identify patterns, allowing decision makers to act on significant data trends that might have otherwise gone unnoticed.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Advantages of ERP QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.8 - Identify tools that can be used to analyze this data, and demonstrate an ability to find valuable relationships between data. KEYWORDS: Bloom's: Remember DATE CREATED: 7/7/2020 10:10 AM DATE MODIFIED: 7/7/2020 1:35 PM 96. Using machine learning in conjunction with enterprise software _____. a. requires decision makers to manually collect and prepare data b. allows decision makers to find interesting insights quickly c. yields specific instructions for acting on a set of data d. is more time consuming for decision makers than using business intelligence ANSWER: b RATIONALE: One of the benefits of artificial intelligence (AI) and machine learning is the ability to identify unique patterns, correlations, and anomalies within a vast amount of diverse data. However, AI still lacks outside context on the importance of those patterns, including an understanding of how an organization should act on that data. Organizations that make effective use of machine learning in conjunction with enterprise software ensure that decision makers no longer need to spend the time to manually collect and prepare the data and developing an analysis to find interesting insights. FEEDBACK: a. Organizations that make effective use of machine learning in conjunction with enterprise software ensure that decision makers no longer need to spend the time to manually collect and prepare the data and developing an analysis to find interesting insights. b. Organizations that make effective use of machine learning in conjunction with enterprise software ensure that decision makers no longer need to spend the time to manually collect and prepare the data and developing an analysis to find interesting insights. c. Organizations that make effective use of machine learning in conjunction with enterprise software ensure that decision makers no longer need to spend the time to manually collect and prepare the data and developing an analysis to find interesting insights. d. Organizations that make effective use of machine learning in conjunction with enterprise software ensure that decision makers no longer need to spend the time to manually collect and prepare the data and developing an analysis to find interesting insights.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 67


Chapter 10 - Enterprise Systems REFERENCES: Advantages of ERP QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.8 - Identify tools that can be used to analyze this data, and demonstrate an ability to find valuable relationships between data. KEYWORDS: Bloom's: Remember DATE CREATED: 7/7/2020 10:10 AM DATE MODIFIED: 7/7/2020 1:43 PM 97. Because Google's standard practice is to monitor what customers are saying about its products and services, this organization identifies patterns in online consumer conversations about their products using _____. a. data visualization tools b. machine learning analytics techniques c. customer relationship management tools d. product lifecycle management techniques ANSWER: b RATIONALE: Google as standard practice is always trying to learn more about what customers are saying about its products and services, including its popular Google Maps application. Google uses analytics techniques that automatically reveal insights from online consumer conversations (social media, blogs, forums, etc.) using machine learning to identify patterns in those conversations. FEEDBACK: a. Google uses analytics techniques that automatically reveal insights from online consumer conversations (social media, blogs, forums, etc.) using machine learning to identify patterns in those conversations. b. Google uses analytics techniques that automatically reveal insights from online consumer conversations (social media, blogs, forums, etc.) using machine learning to identify patterns in those conversations. c. Google uses analytics techniques that automatically reveal insights from online consumer conversations (social media, blogs, forums, etc.) using machine learning to identify patterns in those conversations. d. Google uses analytics techniques that automatically reveal insights from online consumer conversations (social media, blogs, forums, etc.) using machine learning to identify patterns in those conversations.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Advantages of ERP QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.8 - Identify tools that can be used to analyze this data, and demonstrate an ability to find valuable relationships between data. KEYWORDS: Bloom's: Remember DATE CREATED: 7/7/2020 10:10 AM DATE MODIFIED: 7/7/2020 1:50 PM 98. What tool would likely be the best choice for a heavy machinery manufacturer seeking to improve the accuracy of its product demand forecasting? a. an algorithm that analyzes key variables to identify the primary drivers for production and demand Copyright Cengage Learning. Powered by Cognero.

Page 68


Chapter 10 - Enterprise Systems b. a customer relationship management system that analyzes all aspect of customer encounters c. an online transaction processing system for supply chain management d. a computer-aided design software program ANSWER: a RATIONALE: One heavy machinery manufacturer, however, recently found that its product demand forecasting had an accuracy variance of plus or minus 20 percent—well outside the acceptable control limits set by the company. Evalueserve, a provider of research, analytics, and data management services, worked with the manufacturing company to develop algorithms that analyzed key sales and macroeconomic variables to identify the primary drivers for production and demand for the company’s products. The variables evaluated included current and historical sales, GDP per capita, housing starts, construction indices, warranty claims, and dealer density—among others. Using this new data model, the manufacturer was able to bring the forecasting variance down to plus or minus four percent, resulting in a more efficient supply chain with fewer lost sales opportunities along with lower overall inventory levels. FEEDBACK: a. One heavy machinery manufacturer, however, recently found that its product demand forecasting had an accuracy variance of plus or minus 20 percent—well outside the acceptable control limits set by the company. Using algorithms that analyzed key sales and macroeconomic variables to identify the primary drivers for production and demand for the company’s products, the manufacturer was able to bring the forecasting variance down to plus or minus four percent. b. One heavy machinery manufacturer, however, recently found that its product demand forecasting had an accuracy variance of plus or minus 20 percent—well outside the acceptable control limits set by the company. Using algorithms that analyzed key sales and macroeconomic variables to identify the primary drivers for production and demand for the company’s products, the manufacturer was able to bring the forecasting variance down to plus or minus four percent. c. One heavy machinery manufacturer, however, recently found that its product demand forecasting had an accuracy variance of plus or minus 20 percent—well outside the acceptable control limits set by the company. Using algorithms that analyzed key sales and macroeconomic variables to identify the primary drivers for production and demand for the company’s products, the manufacturer was able to bring the forecasting variance down to plus or minus four percent. d. One heavy machinery manufacturer, however, recently found that its product demand forecasting had an accuracy variance of plus or minus 20 percent—well outside the acceptable control limits set by the company. Using algorithms that analyzed key sales and macroeconomic variables to identify the primary drivers for production and demand for the company’s products, the manufacturer was able to bring the forecasting variance down to plus or minus four percent.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Supply Chain Management (SCM) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.8 - Identify tools that can be used to analyze this data, and demonstrate an ability to find valuable relationships between data. KEYWORDS: Bloom's: Remember DATE CREATED: 7/7/2020 10:10 AM DATE MODIFIED: 7/7/2020 2:03 PM 99. Which of the following allows users to analyze customer data to identify ways to increase revenue, ways to decrease Copyright Cengage Learning. Powered by Cognero.

Page 69


Chapter 10 - Enterprise Systems costs, and the company's "best customers" and how to locate more of them? a. TPS suite b. PLM system c. SCM system d. CRM system ANSWER: d RATIONALE: The key features of a CRM system include the ability to analyze customer data to identify ways to increase revenue and decrease costs, identify the firm’s “best customers,” and determine how to retain and find more of them. FEEDBACK: a. The key features of a CRM system include the ability to analyze customer data to identify ways to increase revenue and decrease costs, identify the firm’s “best customers,” and determine how to retain and find more of them. b. The key features of a CRM system include the ability to analyze customer data to identify ways to increase revenue and decrease costs, identify the firm’s “best customers,” and determine how to retain and find more of them. c. The key features of a CRM system include the ability to analyze customer data to identify ways to increase revenue and decrease costs, identify the firm’s “best customers,” and determine how to retain and find more of them. d. The key features of a CRM system include the ability to analyze customer data to identify ways to increase revenue and decrease costs, identify the firm’s “best customers,” and determine how to retain and find more of them.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Customer Relationship Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.10.8 - Identify tools that can be used to analyze this data, and demonstrate an ability to find valuable relationships between data. KEYWORDS: Bloom's: Remember DATE CREATED: 7/7/2020 10:10 AM DATE MODIFIED: 7/7/2020 2:10 PM Essay 100. Briefly describe the transaction processing cycle. ANSWER: Business data goes through a transaction processing cycle that includes data collection, data editing, data correction, data processing, data storage, and document production. Capturing and gathering all data necessary to complete the processing of transactions is called data collection. Data editing involves checking data for validity and completeness to detect any problems. A data correction involves reentering data that was not typed or scanned properly. Data processing refers to performing calculations and other data transformations related to business transactions. Data storage involves updating one or more databases with new transactions. Document production involves generating output records, documents, and reports. RATIONALE: Business data goes through a transaction processing cycle that includes data collection, data editing, data correction, data processing, data storage, and document production. Capturing and gathering all data necessary to complete the processing of transactions is called data collection. Data editing involves checking data for validity and completeness to detect any problems. A data correction involves reentering data that was not typed or scanned Copyright Cengage Learning. Powered by Cognero.

Page 70


Chapter 10 - Enterprise Systems

POINTS: RUBRIC:

properly. Data processing refers to performing calculations and other data transformations related to business transactions. Data storage involves updating one or more databases with new transactions. Document production involves generating output records, documents, and reports. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Describes the steps in the transaction processing cycle

DIFFICULTY: Moderate REFERENCES: Transaction Processing Activities QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.10.1 - Identify the basic activities and business objectives common to all transaction processing systems. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 3:42 PM 101. What is the goal of a customer relationship management (CRM) system? Discuss the benefits of CRM software. ANSWER: The goal of CRM is to understand and anticipate the needs of current and potential customers to increase customer retention and loyalty while optimizing the way that products and services are sold. CRM is used primarily by people in the sales, marketing, distribution, accounting, and service organizations to capture and view data about customers and to improve communications. Businesses implementing CRM systems report benefits such as improved customer satisfaction, increased customer retention, reduced operating costs, and the ability to meet customer demand.

RATIONALE:

CRM software automates and integrates the functions of sales, marketing, and service in an organization. The objective is to capture data about every contact a company has with a customer through every channel and to store it in the CRM system so that the company can truly understand customer actions. CRM software helps an organization build a database about its customers that describes relationships in sufficient detail so that management, salespeople, customer service providers, and even customers can access information to match customer needs with product plans and offerings, remind them of service requirements, and report on the other products the customers have purchased. The goal of CRM is to understand and anticipate the needs of current and potential customers to increase customer retention and loyalty while optimizing the way that products and services are sold. CRM is used primarily by people in the sales, marketing, distribution, accounting, and service organizations to capture and view data about customers and to improve communications. Businesses implementing CRM systems report benefits such as improved customer satisfaction, increased customer retention, reduced operating costs, and the ability to meet customer demand. CRM software automates and integrates the functions of sales, marketing, and service in an

Copyright Cengage Learning. Powered by Cognero.

Page 71


Chapter 10 - Enterprise Systems

POINTS: RUBRIC:

organization. The objective is to capture data about every contact a company has with a customer through every channel and to store it in the CRM system so that the company can truly understand customer actions. CRM software helps an organization build a database about its customers that describes relationships in sufficient detail so that management, salespeople, customer service providers, and even customers can access information to match customer needs with product plans and offerings, remind them of service requirements, and report on the other products the customers have purchased. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

States the goal of CRM software Discusses several benefits of CRM software

DIFFICULTY: Moderate REFERENCES: Customer Relationship Management QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 3:45 PM 102. Describe product lifecycle management (PLM) software and identify the type of data stored in such a system. ANSWER: Product lifecycle management (PLM) software provides a means for managing the data and processes associated with the various phases of the lifecycle of a product, including sales and marketing, research and development, concept development, product design, prototyping and testing, manufacturing process design, production and assembly, delivery and product installation, service and support, and product retirement and replacement. As products advance through these stages, product data is generated and distributed to various groups both within and outside the manufacturing firm. This data includes design and process documents, bill of material definitions, product attributes, product formulations, and documents needed for FDA and environmental compliance. PLM software provides support for the key functions of configuration management, document management, engineering change management, release management, and collaboration with suppliers and original equipment manufacturers (OEMs). RATIONALE: Product lifecycle management (PLM) software provides a means for managing the data and processes associated with the various phases of the lifecycle of a product, including sales and marketing, research and development, concept development, product design, prototyping and testing, manufacturing process design, production and assembly, delivery and product installation, service and support, and product retirement and replacement. As products advance through these stages, product data is generated and distributed to various groups both within and outside the manufacturing firm. This data includes design and process documents, bill of material definitions, product attributes, product formulations, and Copyright Cengage Learning. Powered by Cognero.

Page 72


Chapter 10 - Enterprise Systems

POINTS: RUBRIC:

documents needed for FDA and environmental compliance. PLM software provides support for the key functions of configuration management, document management, engineering change management, release management, and collaboration with suppliers and original equipment manufacturers (OEMs). 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Describes PLM software Describes the data used by PLM software

DIFFICULTY: Moderate REFERENCES: Product Lifecycle Management (PLM) QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.10.3 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, and product lifecycle management system. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 3:48 PM 103. Discuss the advantages and disadvantages of the hosted software model. ANSWER: Hosted software offers a decreased total cost of ownership and a faster system start-up. Hosted software also offers a lower implementation risk. The management of systems is outsourced to experts. However, hosted software has its share of problems as well. There are potential issues regarding availability and reliability. There are also data security issues. In addition, there are potential problems integrating the hosted products of different vendors. And while the management of systems is outsourced to experts, the savings anticipated from outsourcing may be offset by the increased effort to manage the software vendor. RATIONALE: Hosted software offers a decreased total cost of ownership and a faster system start-up. Hosted software also offers a lower implementation risk. The management of systems is outsourced to experts. However, hosted software has its share of problems as well. There are potential issues regarding availability and reliability. There are also data security issues. In addition, there are potential problems integrating the hosted products of different vendors. And while the management of systems is outsourced to experts, the savings anticipated from outsourcing may be offset by the increased effort to manage the software vendor. POINTS: 1 RUBRIC: 0 1 2 3 4 Criteria

Failure

Below Expectations

Developing

Competent

Mastery

Lists advantages of the hosted software model Lists disadvantages of Copyright Cengage Learning. Powered by Cognero.

Page 73


Chapter 10 - Enterprise Systems the hosted software model

DIFFICULTY: Moderate REFERENCES: Hosted Software Model for Enterprise Software QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.10.4 - Describe the hosted software model for enterprise systems and explain why this approach is so appealing to SMEs. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 3:51 PM 104. Suppose you are tasked with determining the risk that an ERP implementation project will fail. What organizational characteristics will you focus on? ANSWER: First, I would look at the number of business applications that will be integrated with the new ERP system. Next, I would see how open and welcoming its employees are to the new ERP system. Next, I would assess how much modification or customization is sought in the new ERP system. Finally, I would look at effectiveness of the training provided to employees as they begin using the new ERP system. RATIONALE: POINTS: RUBRIC:

The answer is based on the list of challenges to successful ERP implementation as shown in Table 10.6. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Describes criteria used to assess the challenges an organization will face when implementing an enterprise system

DIFFICULTY: Moderate REFERENCES: Overcoming Challenges in Implementing Enterprise Systems QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.10.5 - Identify the challenges that organizations face in planning, building, and operating their enterprise systems. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:52 PM DATE MODIFIED: 7/3/2020 3:56 PM

Copyright Cengage Learning. Powered by Cognero.

Page 74


Chapter 11 - Artificial Intelligence and Automation True / False 1. Artificial intelligence involves the development of machines and computer systems that can simulate human intelligence processes. a. True b. False ANSWER: True RATIONALE: Artificial intelligence (AI) systems include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes, including learning (the acquisition of information and rules for using the information), reasoning (using rules to reach conclusions), and self-correction (using the outcome from one scenario to improve its performance on future scenarios). FEEDBACK: Correct Artificial intelligence (AI) systems include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes, including learning (the acquisition of information and rules for using the information), reasoning (using rules to reach conclusions), and self-correction (using the outcome from one scenario to improve its performance on future scenarios). Incorrect Artificial intelligence (AI) systems include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes, including learning (the acquisition of information and rules for using the information), reasoning (using rules to reach conclusions), and self-correction (using the outcome from one scenario to improve its performance on future scenarios).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Artificial Intelligence in Perspective QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.1 - Briefly explain the nature of artificial intelligence. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/8/2020 5:20 PM 2. A perceptive system allows a machine to approximate the way a person sees, hears, and feels objects. a. True b. False ANSWER: True RATIONALE: A perceptive system is a system that approximates the way a person sees, hears, and feels objects. FEEDBACK: Correct A perceptive system is a system that approximates the way a person sees, hears, and feels objects. Incorrect A perceptive system is a system that approximates the way a person sees, hears, and feels objects.

POINTS: DIFFICULTY: REFERENCES:

1 Easy Nature of Intelligence

Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 11 - Artificial Intelligence and Automation QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.1 - Briefly explain the nature of artificial intelligence. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/8/2020 5:23 PM 3. Although computers excel at numerical calculations, they are not as good at dealing with symbols and threedimensional objects. a. True b. False ANSWER: True RATIONALE: Although computers excel at numerical calculations, they must have extensive programming to deal with symbols and three-dimensional objects. FEEDBACK: Correct Although computers excel at numerical calculations, they must have extensive programming to deal with symbols and three-dimensional objects. Incorrect Although computers excel at numerical calculations, they must have extensive programming to deal with symbols and three-dimensional objects.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Nature of Intelligence QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.1 - Briefly explain the nature of artificial intelligence. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/8/2020 5:26 PM 4. Robotics involves developing mechanical or computer devices that can perform tasks that require a high degree of precision or are tedious or hazardous for humans. a. True b. False ANSWER: True RATIONALE: Robotics is a combination of mechanical engineering, computer science, AI, and machine learning used to create a device that can perform tasks with a high degree of precision. Most of these tasks are deemed tedious or dangerous for humans. FEEDBACK: Correct Robotics is a combination of mechanical engineering, computer science, AI, and machine learning used to create a device that can perform tasks with a high degree of precision. Most of these tasks are deemed tedious or dangerous for humans. Incorrect Robotics is a combination of mechanical engineering, computer science, AI, and machine learning used to create a device that can perform tasks with a high degree of precision. Most of these tasks are deemed tedious or dangerous for humans.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 11 - Artificial Intelligence and Automation REFERENCES: Robotics QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.11 - Briefly explain what comprises a robotic system. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/8/2020 6:12 PM 5. Vision systems include hardware and software that permit computers to capture, store, and process visual images. a. True b. False ANSWER: True RATIONALE: Another area of AI involves vision systems, which include hardware and software that permit computers to capture, store, and process visual images. FEEDBACK: Correct Another area of AI involves vision systems, which include hardware and software that permit computers to capture, store, and process visual images. Incorrect Another area of AI involves vision systems, which include hardware and software that permit computers to capture, store, and process visual images.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Vision Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.3 - Discuss how advancements in augmented reality are improving computer vision capabilities. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/8/2020 6:14 PM 6. A genetic algorithm can be used to search the vast resources of the Internet to find information on any topic. a. True b. False ANSWER: False RATIONALE: Another AI application, intelligent agent (also called an intelligent robot or bot), consists of programs and a knowledge base used to perform a specific task for a person, a process, or another program. Often used to search the vast resources of the Internet, intelligent agents can help people find information on any topic, such as the best price for a new camera or used car. FEEDBACK: Correct Often used to search the vast resources of the Internet, intelligent agents can help people find information on any topic, such as the best price for a new camera or used car. Incorrect Often used to search the vast resources of the Internet, intelligent agents can help people find information on any topic, such as the best price for a new camera or used car. Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 11 - Artificial Intelligence and Automation POINTS: 1 DIFFICULTY: Easy REFERENCES: Other AI Applications QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.1 - Briefly explain the nature of artificial intelligence. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/8/2020 6:21 PM 7. Expert systems use facts and heuristics to arrive at conclusions or make recommendations. a. True b. False ANSWER: True RATIONALE: Expert systems must be programmed for their issues, as this decision-making uses both facts and heuristics to solve the level of problems that would take the highest level of human intelligence and expertise to solve. FEEDBACK: Correct Expert systems must be programmed for their issues, as this decision-making uses both facts and heuristics to solve the level of problems that would take the highest level of human intelligence and expertise to solve. Incorrect Expert systems must be programmed for their issues, as this decision-making uses both facts and heuristics to solve the level of problems that would take the highest level of human intelligence and expertise to solve.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Expert Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.2 - Identify six components of expert systems and explain how they are used. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/8/2020 6:25 PM 8. The overall purpose of an inference engine is to seek information and relationships from the knowledge base and to provide answers, predictions, and suggestions similar to the way a human expert would. a. True b. False ANSWER: True RATIONALE: The main purpose of an inference engine is to seek information and relationships from the knowledge base and to provide answers, predictions, and suggestions. FEEDBACK: Correct The main purpose of an inference engine is to seek information and relationships from the knowledge base and to provide answers, predictions, and suggestions. Incorrect The main purpose of an inference engine is to seek information and relationships from the knowledge base and to provide answers, predictions, and suggestions. Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 11 - Artificial Intelligence and Automation POINTS: 1 DIFFICULTY: Easy REFERENCES: Expert Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.2 - Identify six components of expert systems and explain how they are used. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/8/2020 6:28 PM 9. An expert system can use a case-based solution process to develop the solution to a problem by finding cases stored in the knowledge base that are similar to the problem at hand and then modifying the solution to the cases to fit the current problem. a. True b. False ANSWER: True RATIONALE: A case-based system can also be used to develop a solution to a current problem or situation. In such a system, each case typically contains a description of the problem, plus a solution and/or the outcome. The case-based solution process involves (1) finding cases stored in the knowledge base that are similar to the problem or situation at hand, (2) reusing the case in an attempt to solve the problem at hand, (3) revising the proposed solution if necessary, and (4) retaining the new solution as part of a new case. FEEDBACK: Correct The case-based solution process involves (1) finding cases stored in the knowledge base that are similar to the problem or situation at hand, (2) reusing the case in an attempt to solve the problem at hand, (3) revising the proposed solution if necessary, and (4) retaining the new solution as part of a new case. Incorrect The case-based solution process involves (1) finding cases stored in the knowledge base that are similar to the problem or situation at hand, (2) reusing the case in an attempt to solve the problem at hand, (3) revising the proposed solution if necessary, and (4) retaining the new solution as part of a new case.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Expert Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.2 - Identify six components of expert systems and explain how they are used. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/8/2020 6:31 PM 10. An expert system, using the knowledge acquisition facility, can indicate all the facts and rules that were used in reaching a conclusion. a. True b. False ANSWER: False Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 11 - Artificial Intelligence and Automation RATIONALE:

An important part of an expert system is the explanation facility, which allows a user or decision maker to understand how the expert system arrived at certain conclusions or results. The purpose of the knowledge acquisition facility is to provide a convenient and efficient means of capturing and storing all components of the knowledge base. The knowledge acquisition facility acts as an interface between experts and the knowledge base.

FEEDBACK:

Correct

An important part of an expert system is the explanation facility, which allows a user or decision maker to understand how the expert system arrived at certain conclusions or results. Incorrect An important part of an expert system is the explanation facility, which allows a user or decision maker to understand how the expert system arrived at certain conclusions or results.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Expert Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.2 - Identify six components of expert systems and explain how they are used. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/8/2020 6:34 PM 11. A user interface makes an expert system easier to develop and use. a. True b. False ANSWER: True RATIONALE: The main purpose of the user interface is to make an expert system easier for users and decision makers to develop and use. FEEDBACK: Correct The main purpose of the user interface is to make an expert system easier for users and decision makers to develop and use. Incorrect The main purpose of the user interface is to make an expert system easier for users and decision makers to develop and use.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Expert Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.2 - Identify six components of expert systems and explain how they are used. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/8/2020 6:36 PM 12. The knowledge engineer is the person with the expertise the expert system is trying to capture. a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 11 - Artificial Intelligence and Automation ANSWER: RATIONALE:

False The domain expert is the person or group with the expertise or knowledge the expert system is trying to capture (domain). A knowledge engineer is a person who has training or experience in the design, development, implementation, and maintenance of an expert system, including training or experience with expert system shells.

FEEDBACK:

Correct

The domain expert is the person or group with the expertise or knowledge the expert system is trying to capture (domain). Incorrect The domain expert is the person or group with the expertise or knowledge the expert system is trying to capture (domain).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Expert Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.2 - Identify six components of expert systems and explain how they are used. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/8/2020 6:38 PM 13. Virtual reality and augmented reality are two different terms for the same technology, which allows the user to take tours or "walk through" different scenes. a. True b. False ANSWER: False RATIONALE: Augmented reality is different from virtual reality, which has been used in business and in homes for many years. Virtual reality allows for the user to take tours or “walk through” different scenes without leaving their chair. FEEDBACK: Correct Augmented reality is different from virtual reality, which has been used in business and in homes for many years. Virtual reality allows for the user to take tours or “walk through” different scenes without leaving their chair. Incorrect Augmented reality is different from virtual reality, which has been used in business and in homes for many years. Virtual reality allows for the user to take tours or “walk through” different scenes without leaving their chair.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Vision Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.3 - Discuss how advancements in augmented reality are improving computer vision capabilities. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/8/2020 6:43 PM Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 11 - Artificial Intelligence and Automation 14. Suppose you have an accounting background and you are considered an expert in the field of discovering errors in electronic spreadsheets. You are considered a knowledge engineer if you are part of a team that is developing an expert system to discover errors in spreadsheets. a. True b. False ANSWER: False RATIONALE: A knowledge engineer is a person who has training or experience in the design, development, implementation, and maintenance of an expert system, including training or experience with expert system shells. FEEDBACK: Correct A knowledge engineer is a person who has training or experience in the design, development, implementation, and maintenance of an expert system, including training or experience with expert system shells. Incorrect A knowledge engineer is a person who has training or experience in the design, development, implementation, and maintenance of an expert system, including training or experience with expert system shells.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Expert Systems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.2 - Identify six components of expert systems and explain how they are used. KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/9/2020 7:04 AM Multiple Choice 15. _____ include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes including learning, reasoning, and self-correction. a. Assistive technology systems b. Intelligence agents c. Artificial intelligence systems d. Virtual reality systems ANSWER: c RATIONALE: Artificial intelligence (AI) systems include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes, including learning (the acquisition of information and rules for using the information), reasoning (using rules to reach conclusions), and self-correction (using the outcome from one scenario to improve its performance on future scenarios). FEEDBACK: a. Artificial intelligence (AI) systems include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes, including learning (the acquisition of information and rules for using the information), reasoning (using rules to reach conclusions), and self-correction (using the outcome from one scenario to improve its performance on future scenarios). b. Artificial intelligence (AI) systems include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes, including learning (the acquisition of information and rules for using the information), reasoning (using rules to reach conclusions), and self-correction (using the outcome from one scenario to improve its performance on future scenarios).

Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 11 - Artificial Intelligence and Automation c. Artificial intelligence (AI) systems include the people, procedures, hardware,

software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes, including learning (the acquisition of information and rules for using the information), reasoning (using rules to reach conclusions), and self-correction (using the outcome from one scenario to improve its performance on future scenarios). d. Artificial intelligence (AI) systems include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes, including learning (the acquisition of information and rules for using the information), reasoning (using rules to reach conclusions), and self-correction (using the outcome from one scenario to improve its performance on future scenarios).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Artificial Intelligence in Perspective QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.1 - Briefly explain the nature of artificial intelligence. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/9/2020 7:07 AM 16. Sophisticated computer systems require an extension of understanding visual images. This is called a _____ system. a. robotic b. perceptive c. learning d. virtual reality ANSWER: b RATIONALE: Moving through a room of chairs, tables, and other objects can be trivial for people but extremely complex for machines, robots, and computers. Such machines require an extension of understanding visual images, called a perceptive system. FEEDBACK: a. Moving through a room of chairs, tables, and other objects can be trivial for people but extremely complex for machines, robots, and computers. Such machines require an extension of understanding visual images, called a perceptive system. b. Moving through a room of chairs, tables, and other objects can be trivial for people but extremely complex for machines, robots, and computers. Such machines require an extension of understanding visual images, called a perceptive system. c. Moving through a room of chairs, tables, and other objects can be trivial for people but extremely complex for machines, robots, and computers. Such machines require an extension of understanding visual images, called a perceptive system. d. Moving through a room of chairs, tables, and other objects can be trivial for people but extremely complex for machines, robots, and computers. Such machines require an extension of understanding visual images, called a perceptive system.

POINTS: DIFFICULTY: REFERENCES:

1 Easy Nature of Intelligence

Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 11 - Artificial Intelligence and Automation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.1 - Briefly explain the nature of artificial intelligence. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/9/2020 7:14 AM 17. _____ can process many pieces of data at the same time and learn to recognize patterns. a. Voice recognition systems b. Natural language processing systems c. Learning systems d. Artificial neural networks ANSWER: d RATIONALE: An artificial neural network is a computer system that can recognize and act on patterns or trends that it detects in large sets of data, developed to operate like the human brain. FEEDBACK: a. An artificial neural network is a computer system that can recognize and act on patterns or trends that it detects in large sets of data, developed to operate like the human brain. b. An artificial neural network is a computer system that can recognize and act on patterns or trends that it detects in large sets of data, developed to operate like the human brain. c. An artificial neural network is a computer system that can recognize and act on patterns or trends that it detects in large sets of data, developed to operate like the human brain. d. An artificial neural network is a computer system that can recognize and act on patterns or trends that it detects in large sets of data, developed to operate like the human brain.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Artificial Neural Networks QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.4 - Briefly explain how an artificial neural network works. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/9/2020 10:14 AM 18. A genetic algorithm is an approach to solving problems based on the _____. a. theory of evolution b. theory of relativity c. Compton effect d. intelligent agent principle ANSWER: a RATIONALE: Genetic algorithm are an approach to solving problems based on the theory of evolution. FEEDBACK: a. Genetic algorithm are an approach to solving problems based on the theory of evolution.

b. Genetic algorithm are an approach to solving problems based on the theory of evolution.

Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 11 - Artificial Intelligence and Automation c. Genetic algorithm are an approach to solving problems based on the theory of evolution.

d. Genetic algorithm are an approach to solving problems based on the theory of evolution.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Other AI Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.1 - Briefly explain the nature of artificial intelligence. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/9/2020 10:17 AM 19. A _____ is a conditional statement that links conditions to actions or outcomes. a. simulation b. case c. rule d. THEN-IF statement ANSWER: c RATIONALE: A rule is a conditional statement that links conditions to actions or outcomes. In many instances, these rules are stored as IF-THEN statements, which are rules that suggest certain conclusions. FEEDBACK: a. A rule is a conditional statement that links conditions to actions or outcomes. b. A rule is a conditional statement that links conditions to actions or outcomes. c. A rule is a conditional statement that links conditions to actions or outcomes. d. A rule is a conditional statement that links conditions to actions or outcomes. POINTS: 1 DIFFICULTY: Easy REFERENCES: Expert Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.2 - Identify six components of expert systems and explain how they are used. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/9/2020 10:36 AM 20. The _____ stores all relevant information, data, rules, cases, and relationships that an expert system uses. a. inference engine b. knowledge base c. user interface d. data warehouse ANSWER: b RATIONALE: The knowledge base stores all relevant information, data, rules, cases, and relationships that the expert system uses. FEEDBACK: a. The knowledge base stores all relevant information, data, rules, cases, and relationships that the expert system uses.

Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 11 - Artificial Intelligence and Automation b. The knowledge base stores all relevant information, data, rules, cases, and relationships that the expert system uses.

c. The knowledge base stores all relevant information, data, rules, cases, and relationships that the expert system uses. d. The knowledge base stores all relevant information, data, rules, cases, and relationships that the expert system uses.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Expert Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.2 - Identify six components of expert systems and explain how they are used. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/9/2020 10:37 AM 21. In an expert system, the _____ is the component that delivers the expert advice. a. inference engine b. knowledge acquisition facility c. knowledge base d. explanation facility ANSWER: a RATIONALE: The main purpose of an expert system’s inference engine is to seek information and relationships from the knowledge base and to provide answers, predictions, and suggestions. Inference engines are considered one of the most important components of an expert system, as these predictions and suggestions often take the place of human experts. In other words, the inference engine is the component that delivers the expert advice. FEEDBACK: a. The main purpose of an expert system’s inference engine is to seek information and relationships from the knowledge base and to provide answers, predictions, and suggestions. In other words, the inference engine is the component that delivers the expert advice. b. The main purpose of an expert system’s inference engine is to seek information and relationships from the knowledge base and to provide answers, predictions, and suggestions. In other words, the inference engine is the component that delivers the expert advice. c. The main purpose of an expert system’s inference engine is to seek information and relationships from the knowledge base and to provide answers, predictions, and suggestions. In other words, the inference engine is the component that delivers the expert advice. d. The main purpose of an expert system’s inference engine is to seek information and relationships from the knowledge base and to provide answers, predictions, and suggestions. In other words, the inference engine is the component that delivers the expert advice.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Expert Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.2 - Identify six components of expert systems and explain how they are used. Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 11 - Artificial Intelligence and Automation NATIONAL STANDARDS: KEYWORDS: DATE CREATED: DATE MODIFIED:

United States - BUSPROG: Legal - Legal Bloom’s: Remember 11/19/2019 6:01 PM 7/9/2020 10:40 AM

22. Doctor Green enters his patient's symptoms and test results into a medical expert system, and the system concludes the patient has as defective heart valve. The _____ allows Dr. Green to understand how the system arrived at its diagnosis. a. inference engine b. knowledge base c. explanation facility d. knowledge acquisition facility ANSWER: c RATIONALE: Another important part of an expert system is the explanation facility, which allows a user or decision maker to understand how the expert system arrived at certain conclusions or results. A medical expert system, for example, might reach the conclusion that a patient has a defective heart valve given certain symptoms and the results of tests conducted on the patient. The explanation facility allows a doctor to find out the logic or rationale of the diagnosis made by the expert system. FEEDBACK: a. A medical expert system might reach the conclusion that a patient has a defective heart valve given certain symptoms and the results of tests conducted on the patient. The explanation facility allows a doctor to find out the logic or rationale of the diagnosis made by the expert system. b. A medical expert system might reach the conclusion that a patient has a defective heart valve given certain symptoms and the results of tests conducted on the patient. The explanation facility allows a doctor to find out the logic or rationale of the diagnosis made by the expert system. c. A medical expert system might reach the conclusion that a patient has a defective heart valve given certain symptoms and the results of tests conducted on the patient. The explanation facility allows a doctor to find out the logic or rationale of the diagnosis made by the expert system. d. A medical expert system might reach the conclusion that a patient has a defective heart valve given certain symptoms and the results of tests conducted on the patient. The explanation facility allows a doctor to find out the logic or rationale of the diagnosis made by the expert system.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Expert Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.2 - Identify six components of expert systems and explain how they are used. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/9/2020 10:50 AM 23. An expert system's knowledge acquisition facility serves as an interface between _____. a. the end users and the inference engine b. the experts and the knowledge base c. the inference engine and the knowledge base d. the inference engine and the explanation facility Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 11 - Artificial Intelligence and Automation ANSWER: RATIONALE:

b The purpose of the knowledge acquisition facility is to provide a convenient and efficient means of capturing and storing all components of the knowledge base. The knowledge acquisition facility acts as an interface between experts and the knowledge base.

FEEDBACK:

a. The purpose of the knowledge acquisition facility is to provide a convenient and efficient means of capturing and storing all components of the knowledge base. The knowledge acquisition facility acts as an interface between experts and the knowledge base. b. The purpose of the knowledge acquisition facility is to provide a convenient and efficient means of capturing and storing all components of the knowledge base. The knowledge acquisition facility acts as an interface between experts and the knowledge base. c. The purpose of the knowledge acquisition facility is to provide a convenient and efficient means of capturing and storing all components of the knowledge base. The knowledge acquisition facility acts as an interface between experts and the knowledge base. d. The purpose of the knowledge acquisition facility is to provide a convenient and efficient means of capturing and storing all components of the knowledge base. The knowledge acquisition facility acts as an interface between experts and the knowledge base.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Expert Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.2 - Identify six components of expert systems and explain how they are used. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/9/2020 11:07 AM 24. _____ are people and groups who use and benefit from expert systems, even if they have had no previous training in computers or expert systems. a. Domain experts b. Knowledge users c. Knowledge engineers d. Intelligent agents ANSWER: b RATIONALE: The knowledge user is the person or group who uses and benefits from the expert system. Knowledge users do not need any previous training in computers or expert systems. FEEDBACK: a. The knowledge user is the person or group who uses and benefits from the expert system. Knowledge users do not need any previous training in computers or expert systems. b. The knowledge user is the person or group who uses and benefits from the expert system. Knowledge users do not need any previous training in computers or expert systems. c. The knowledge user is the person or group who uses and benefits from the expert system. Knowledge users do not need any previous training in computers or expert systems. d. The knowledge user is the person or group who uses and benefits from the expert system. Knowledge users do not need any previous training in computers

Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 11 - Artificial Intelligence and Automation or expert systems.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Expert Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.2 - Identify six components of expert systems and explain how they are used. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/9/2020 11:18 AM 25. _____ systems can superimpose images and data over a person's view of the real world. a. Immersive virtual reality b. Forward chaining c. Augmented reality d. Neural network ANSWER: c RATIONALE: Augmented reality (AR) is a type of vision system software that takes computer-generated images and superimposes them on a user’s view of the world through the use of specialized glasses or goggles. FEEDBACK: a. Augmented reality (AR) is a type of vision system software that takes computergenerated images and superimposes them on a user’s view of the world through the use of specialized glasses or goggles. b. Augmented reality (AR) is a type of vision system software that takes computergenerated images and superimposes them on a user’s view of the world through the use of specialized glasses or goggles. c. Augmented reality (AR) is a type of vision system software that takes computergenerated images and superimposes them on a user’s view of the world through the use of specialized glasses or goggles. d. Augmented reality (AR) is a type of vision system software that takes computergenerated images and superimposes them on a user’s view of the world through the use of specialized glasses or goggles.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Vision Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.3 - Discuss how advancements in augmented reality are improving computer vision capabilities. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/9/2020 2:10 PM 26. In the automotive industry, the fast-paced automated environment often requires that machines determine their direction of movement using new-generation _____. a. expert systems Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 11 - Artificial Intelligence and Automation b. augmented reality c. vision systems d. neural networks ANSWER: RATIONALE:

FEEDBACK:

c A rise in Industrial Internet of Things (IIoT) has resulted in a new generation of vision systems, which allow machines to communicate with each other and process information in a fast-paced automated environment. IIoT is used more in industrial settings and applications, with a focus on machine learning, big data, and communication. Manufacturing has long involved automated processes, and the automotive industry relies on 3D vision applications for determining the direction robots should move. a. A rise in Industrial Internet of Things (IIoT) has resulted in a new generation of

vision systems. Manufacturing has long involved automated processes, and the automotive industry relies on 3D vision applications for determining the direction robots should move. b. A rise in Industrial Internet of Things (IIoT) has resulted in a new generation of vision systems. Manufacturing has long involved automated processes, and the automotive industry relies on 3D vision applications for determining the direction robots should move. c. A rise in Industrial Internet of Things (IIoT) has resulted in a new generation of vision systems. Manufacturing has long involved automated processes, and the automotive industry relies on 3D vision applications for determining the direction robots should move. d. A rise in Industrial Internet of Things (IIoT) has resulted in a new generation of vision systems. Manufacturing has long involved automated processes, and the automotive industry relies on 3D vision applications for determining the direction robots should move.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Vision Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.3 - Discuss how advancements in augmented reality are improving computer vision capabilities. KEYWORDS: Bloom's: Remember DATE CREATED: 7/9/2020 2:46 PM DATE MODIFIED: 7/9/2020 3:13 PM 27. Advanced vision systems help manufacturing plants work efficiently because _____. a. robots stop when humans move around the production lines b. robots can continue working with humans nearby c. manufacturing processes can be manually controlled d. they combine virtual reality and machine learning systems ANSWER: b RATIONALE: Robots are used in manufacturing, and vision systems, with the use of captured images, are able to determine what is moving in and around the manufacturing lines. This includes both products and persons. When humans, such as inspectors, are moving around the production lines, the robot will stop if it determines a collision with the human is unavoidable. Otherwise, the robot will not stop, and the plant continues to work efficiently. Copyright Cengage Learning. Powered by Cognero.

Page 16


Chapter 11 - Artificial Intelligence and Automation FEEDBACK:

a. Robots are used in manufacturing, and vision systems, with the use of captured

images, are able to determine what is moving in and around the manufacturing lines. When humans, such as inspectors, are moving around the production lines, the robot will stop if it determines a collision with the human is unavoidable. Otherwise, the robot will not stop, and the plant continues to work efficiently. b. Robots are used in manufacturing, and vision systems, with the use of captured images, are able to determine what is moving in and around the manufacturing lines. When humans, such as inspectors, are moving around the production lines, the robot will stop if it determines a collision with the human is unavoidable. Otherwise, the robot will not stop, and the plant continues to work efficiently. c. Robots are used in manufacturing, and vision systems, with the use of captured images, are able to determine what is moving in and around the manufacturing lines. When humans, such as inspectors, are moving around the production lines, the robot will stop if it determines a collision with the human is unavoidable. Otherwise, the robot will not stop, and the plant continues to work efficiently. d. Robots are used in manufacturing, and vision systems, with the use of captured images, are able to determine what is moving in and around the manufacturing lines. When humans, such as inspectors, are moving around the production lines, the robot will stop if it determines a collision with the human is unavoidable. Otherwise, the robot will not stop, and the plant continues to work efficiently.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Vision Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.3 - Discuss how advancements in augmented reality are improving computer vision capabilities. KEYWORDS: Bloom's: Remember DATE CREATED: 7/9/2020 2:47 PM DATE MODIFIED: 7/9/2020 3:15 PM 28. A key difference between virtual reality and augmented reality is that augmented reality _____. a. is much a newer technology b. allows you to "walk through" different scenes from your current location c. is not yet used in the medical field d. can make objects seem to appear in your current surroundings ANSWER: d RATIONALE: Augmented reality (AR) is a type of vision system that is being used widely in the medical field. Augmented reality is different from virtual reality, which has been used in business and in homes for many years. Virtual reality allows for the user to take tours or “walk through” different scenes without leaving their chair. For example, if you wanted to walk around the Statue of Liberty, a virtual reality app would allow you to sit on your sofa and take a tour. Augmented reality would place the Statue of Liberty in your living room and you could walk around it by using your mobile device app. FEEDBACK: a. Augmented reality (AR) is a type of vision system that is being used widely in the medical field. Augmented reality is different from virtual reality, which has been used in business and in homes for many years. Virtual reality allows for the user to take tours or “walk through” different scenes without leaving their chair. For example, if you wanted to walk around the Statue of Liberty, a virtual reality app would allow you to sit on your sofa and take a tour. Augmented reality would

Copyright Cengage Learning. Powered by Cognero.

Page 17


Chapter 11 - Artificial Intelligence and Automation place the Statue of Liberty in your living room and you could walk around it by using your mobile device app. b. Augmented reality (AR) is a type of vision system that is being used widely in the medical field. Augmented reality is different from virtual reality, which has been used in business and in homes for many years. Virtual reality allows for the user to take tours or “walk through” different scenes without leaving their chair. For example, if you wanted to walk around the Statue of Liberty, a virtual reality app would allow you to sit on your sofa and take a tour. Augmented reality would place the Statue of Liberty in your living room and you could walk around it by using your mobile device app. c. Augmented reality (AR) is a type of vision system that is being used widely in the medical field. Augmented reality is different from virtual reality, which has been used in business and in homes for many years. Virtual reality allows for the user to take tours or “walk through” different scenes without leaving their chair. For example, if you wanted to walk around the Statue of Liberty, a virtual reality app would allow you to sit on your sofa and take a tour. Augmented reality would place the Statue of Liberty in your living room and you could walk around it by using your mobile device app. d. Augmented reality (AR) is a type of vision system that is being used widely in the medical field. Augmented reality is different from virtual reality, which has been used in business and in homes for many years. Virtual reality allows for the user to take tours or “walk through” different scenes without leaving their chair. For example, if you wanted to walk around the Statue of Liberty, a virtual reality app would allow you to sit on your sofa and take a tour. Augmented reality would place the Statue of Liberty in your living room and you could walk around it by using your mobile device app.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Vision Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.3 - Discuss how advancements in augmented reality are improving computer vision capabilities. KEYWORDS: Bloom's: Remember DATE CREATED: 7/9/2020 2:47 PM DATE MODIFIED: 7/9/2020 3:26 PM 29. Surgeons can wear specialized goggles to view a patient's body with images overlaid as well as vital signs information during surgery. What technology enables this? a. augmented reality b. virtual reality c. inference engine d. intelligent agent ANSWER: a RATIONALE: AR uses AI algorithms along with 3D anatomical algorithms to create images that can be seen with the use of special goggles. These images can then be overlaid onto the patient, and multiple surgical personnel can see the same overlay by wearing AR goggles, which provide more than just images. Chart information and real-time information, such as the patient’s heart rate, can be fed directly into the display so doctors do not have to divert their attention to monitors or charts during the procedures. Copyright Cengage Learning. Powered by Cognero.

Page 18


Chapter 11 - Artificial Intelligence and Automation FEEDBACK:

a. AR uses AI algorithms along with 3D anatomical algorithms to create images that

can be seen with the use of special goggles. These images can then be overlaid onto the patient, and multiple surgical personnel can see the same overlay by wearing AR goggles, which provide more than just images. Chart information and real-time information, such as the patient’s heart rate, can be fed directly into the display so doctors do not have to divert their attention to monitors or charts during the procedures. b. AR uses AI algorithms along with 3D anatomical algorithms to create images that can be seen with the use of special goggles. These images can then be overlaid onto the patient, and multiple surgical personnel can see the same overlay by wearing AR goggles, which provide more than just images. Chart information and real-time information, such as the patient’s heart rate, can be fed directly into the display so doctors do not have to divert their attention to monitors or charts during the procedures. c. AR uses AI algorithms along with 3D anatomical algorithms to create images that can be seen with the use of special goggles. These images can then be overlaid onto the patient, and multiple surgical personnel can see the same overlay by wearing AR goggles, which provide more than just images. Chart information and real-time information, such as the patient’s heart rate, can be fed directly into the display so doctors do not have to divert their attention to monitors or charts during the procedures. d. AR uses AI algorithms along with 3D anatomical algorithms to create images that can be seen with the use of special goggles. These images can then be overlaid onto the patient, and multiple surgical personnel can see the same overlay by wearing AR goggles, which provide more than just images. Chart information and real-time information, such as the patient’s heart rate, can be fed directly into the display so doctors do not have to divert their attention to monitors or charts during the procedures.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Vision Systems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.3 - Discuss how advancements in augmented reality are improving computer vision capabilities. KEYWORDS: Bloom's: Remember DATE CREATED: 7/9/2020 2:47 PM DATE MODIFIED: 7/9/2020 3:36 PM 30. Which technology that recognizes patterns and trends was first developed in 1943 by Warren McCulloch and Walter Pitts? a. genetic algorithms b. big data c. neural networks d. backward chaining ANSWER: c RATIONALE: An artificial neural network is a computer system that can recognize and act on patterns or trends that it detects in large sets of data, developed to operate like the human brain. Developed in 1943 by Warren McCulloch and Walter Pitts, neural networks were designed to review patterns and make decisions based on these patterns. Copyright Cengage Learning. Powered by Cognero.

Page 19


Chapter 11 - Artificial Intelligence and Automation FEEDBACK:

a. Developed in 1943 by Warren McCulloch and Walter Pitts, neural networks were designed to review patterns and make decisions based on these patterns.

b. Developed in 1943 by Warren McCulloch and Walter Pitts, neural networks were designed to review patterns and make decisions based on these patterns. c. Developed in 1943 by Warren McCulloch and Walter Pitts, neural networks were designed to review patterns and make decisions based on these patterns. d. Developed in 1943 by Warren McCulloch and Walter Pitts, neural networks were designed to review patterns and make decisions based on these patterns.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Artificial Neural Networks QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.4 - Briefly explain how an artificial neural network works. KEYWORDS: Bloom's: Remember DATE CREATED: 7/9/2020 3:37 PM DATE MODIFIED: 7/9/2020 3:42 PM 31. Humans can make decisions based on the data that is input through our senses because that data is filtered through _____. a. neurons b. feedforward mechanisms c. recombination d. fitness functions ANSWER: a RATIONALE: The human brain is connected by neurons through which information is filtered so that we can make decisions based on the data that is input through our senses. FEEDBACK: a. The human brain is connected by neurons through which information is filtered so that we can make decisions based on the data that is input through our senses. b. The human brain is connected by neurons through which information is filtered so that we can make decisions based on the data that is input through our senses. c. The human brain is connected by neurons through which information is filtered so that we can make decisions based on the data that is input through our senses. d. The human brain is connected by neurons through which information is filtered so that we can make decisions based on the data that is input through our senses.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Artificial Neural Networks QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.4 - Briefly explain how an artificial neural network works. KEYWORDS: Bloom's: Remember DATE CREATED: 7/9/2020 3:38 PM DATE MODIFIED: 7/9/2020 3:46 PM 32. Data is collected and input into an artificial neural network and then _____. Copyright Cengage Learning. Powered by Cognero.

Page 20


Chapter 11 - Artificial Intelligence and Automation a. the highest-scoring data is allowed to "reproduce" with random mutations b. filtered through networked connections that have a value associated with them c. the network works backward through the data to find out how a decision was made d. built into rules and processes using a development engine ANSWER: b RATIONALE: The human brain is connected by neurons through which information is filtered so that we can make decisions based on the data that is input through our senses. In much the same way, data is collected and input into an artificial neural network and then filtered through networked connections that have a value associated with them. FEEDBACK: a. Data is collected and input into an artificial neural network and then filtered through networked connections that have a value associated with them. b. Data is collected and input into an artificial neural network and then filtered through networked connections that have a value associated with them. c. Data is collected and input into an artificial neural network and then filtered through networked connections that have a value associated with them. d. Data is collected and input into an artificial neural network and then filtered through networked connections that have a value associated with them.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Artificial Neural Networks QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.4 - Briefly explain how an artificial neural network works. KEYWORDS: Bloom's: Remember DATE CREATED: 7/9/2020 3:38 PM DATE MODIFIED: 7/9/2020 3:55 PM 33. How does an artificial neural network make a decision and produce its final result? a. It identifies rules linking conditions from the data to actions or outcomes. b. It quantitatively evaluates several possible choices using a fitness function. c. It matches the current data to past cases and attempts to reuse or modify previous decisions. d. It compares the values associated with the networked connections through which data is filtered. ANSWER: d RATIONALE: The human brain is connected by neurons through which information is filtered so that we can make decisions based on the data that is input through our senses. In much the same way, data is collected and input into an artificial neural network and then filtered through networked connections that have a value associated with them. These values lead the program to make decisions that lead to a final result. FEEDBACK: a. Data is collected and input into an artificial neural network and then filtered through networked connections that have a value associated with them. These values lead the program to make decisions that lead to a final result. b. Data is collected and input into an artificial neural network and then filtered through networked connections that have a value associated with them. These values lead the program to make decisions that lead to a final result. c. Data is collected and input into an artificial neural network and then filtered through networked connections that have a value associated with them. These values lead the program to make decisions that lead to a final result.

Copyright Cengage Learning. Powered by Cognero.

Page 21


Chapter 11 - Artificial Intelligence and Automation d. Data is collected and input into an artificial neural network and then filtered

through networked connections that have a value associated with them. These values lead the program to make decisions that lead to a final result.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Artificial Neural Networks QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.4 - Briefly explain how an artificial neural network works. KEYWORDS: Bloom's: Remember DATE CREATED: 7/9/2020 3:38 PM DATE MODIFIED: 7/9/2020 4:05 PM 34. NASA's Intelligent Flight Control System, which helps pilots land planes that have been damaged or experienced major system failures, relies on which technology? a. augmented reality b. neural networks c. inference engine d. heuristics ANSWER: b RATIONALE: Neural networks are used in many industries, with more applications continually in development. NASA has been experimenting with neural networks for over twenty years with its Intelligent Flight Control System, which helps pilots land planes after they sustain battle damage or experience major system failures. FEEDBACK: a. NASA has been experimenting with neural networks for over twenty years with its Intelligent Flight Control System, which helps pilots land planes after they sustain battle damage or experience major system failures. b. NASA has been experimenting with neural networks for over twenty years with its Intelligent Flight Control System, which helps pilots land planes after they sustain battle damage or experience major system failures. c. NASA has been experimenting with neural networks for over twenty years with its Intelligent Flight Control System, which helps pilots land planes after they sustain battle damage or experience major system failures. d. NASA has been experimenting with neural networks for over twenty years with its Intelligent Flight Control System, which helps pilots land planes after they sustain battle damage or experience major system failures.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Artificial Neural Networks QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.4 - Briefly explain how an artificial neural network works. KEYWORDS: Bloom's: Remember DATE CREATED: 7/9/2020 3:38 PM DATE MODIFIED: 7/9/2020 4:09 PM 35. Familiar applications of neural networks include _____. Copyright Cengage Learning. Powered by Cognero.

Page 22


Chapter 11 - Artificial Intelligence and Automation a. surgical procedures and skills-based virtual labs b. Internet searches and database queries c. email spam filters and speech-to-text applications d. airline flight scheduling and solar mirror design ANSWER: c RATIONALE: Email software uses neural networks to differentiate spam email from genuine email, and you may be using neural networks if you are use a speech-to-text application or a touch screen on your smartphone or tablet. FEEDBACK: a. Email software uses neural networks to differentiate spam email from genuine email, and you may be using neural networks if you are use a speech-to-text application or a touch screen on your smartphone or tablet. b. Email software uses neural networks to differentiate spam email from genuine email, and you may be using neural networks if you are use a speech-to-text application or a touch screen on your smartphone or tablet. c. Email software uses neural networks to differentiate spam email from genuine email, and you may be using neural networks if you are use a speech-to-text application or a touch screen on your smartphone or tablet. d. Email software uses neural networks to differentiate spam email from genuine email, and you may be using neural networks if you are use a speech-to-text application or a touch screen on your smartphone or tablet.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Artificial Neural Networks QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.4 - Briefly explain how an artificial neural network works. KEYWORDS: Bloom's: Remember DATE CREATED: 7/9/2020 3:38 PM DATE MODIFIED: 7/9/2020 4:15 PM 36. What overall strategy is used to train artificial neural network programs? a. supervised learning b. unsupervised learning c. backward chaining d. forward chaining ANSWER: a RATIONALE: Data is collected and input into an artificial neural network and then filtered through networked connections that have a value associated with them. The program is trained through supervised learning, through the machine learning process. FEEDBACK: a. The neural network program is trained through supervised learning, through the machine learning process. b. The neural network program is trained through supervised learning, through the machine learning process. c. The neural network program is trained through supervised learning, through the machine learning process. d. The neural network program is trained through supervised learning, through the machine learning process.

Copyright Cengage Learning. Powered by Cognero.

Page 23


Chapter 11 - Artificial Intelligence and Automation POINTS: 1 DIFFICULTY: Easy REFERENCES: Artificial Neural Networks QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.5 - Describe two strategies used to train artificial neural networks. KEYWORDS: Bloom's: Remember DATE CREATED: 7/9/2020 4:46 PM DATE MODIFIED: 7/9/2020 4:52 PM 37. An artificial neural network is programmed to learn _____. a. without "training wheels" b. only before, not after, its implementation c. through feedforward, not circular, patterns d. from each iteration during the training phase ANSWER: d RATIONALE: Just as a child learns new things, an artificial neural network is programmed to learn from each iteration during the training phase—a process that continues even after the system is implemented. A feedforward neural network is a network where the information flows only in the forward direction, instead of in a circular motion. Most networks will feed data back into the pattern, creating that circular pattern. FEEDBACK:

a. Just as a child learns new things, an artificial neural network is programmed to learn from each iteration during the training phase—a process that continues even after the system is implemented. b. Just as a child learns new things, an artificial neural network is programmed to learn from each iteration during the training phase—a process that continues even after the system is implemented. c. Just as a child learns new things, an artificial neural network is programmed to learn from each iteration during the training phase—a process that continues even after the system is implemented. d. Just as a child learns new things, an artificial neural network is programmed to learn from each iteration during the training phase—a process that continues even after the system is implemented.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Artificial Neural Networks QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.5 - Describe two strategies used to train artificial neural networks. KEYWORDS: Bloom's: Remember DATE CREATED: 7/9/2020 4:48 PM DATE MODIFIED: 7/9/2020 4:58 PM 38. The approach used to train artificial neural networks is similar to the process of _____. a. natural selection Copyright Cengage Learning. Powered by Cognero.

Page 24


Chapter 11 - Artificial Intelligence and Automation b. learning to use software c. navigating a room d. learning to ride a bicycle ANSWER: d RATIONALE: Just as a child learns new things, an artificial neural network is programmed to learn from each iteration during the training phase—a process that continues even after the system is implemented. Think back to when you first learned to ride a bicycle. The same approach is used with neural networks. FEEDBACK: a. Just as a child learns new things, an artificial neural network is programmed to learn from each iteration during the training phase—a process that continues even after the system is implemented. Think back to when you first learned to ride a bicycle. The same approach is used with neural networks. b. Just as a child learns new things, an artificial neural network is programmed to learn from each iteration during the training phase—a process that continues even after the system is implemented. Think back to when you first learned to ride a bicycle. The same approach is used with neural networks. c. Just as a child learns new things, an artificial neural network is programmed to learn from each iteration during the training phase—a process that continues even after the system is implemented. Think back to when you first learned to ride a bicycle. The same approach is used with neural networks. d. Just as a child learns new things, an artificial neural network is programmed to learn from each iteration during the training phase—a process that continues even after the system is implemented. Think back to when you first learned to ride a bicycle. The same approach is used with neural networks.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Artificial Neural Networks QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.5 - Describe two strategies used to train artificial neural networks. KEYWORDS: Bloom's: Remember DATE CREATED: 7/9/2020 4:48 PM DATE MODIFIED: 7/9/2020 5:09 PM 39. What is the first step in the training process for an artificial neural network? a. recognition occurs b. connections are weighted c. input is given d. "points" are assigned to choices ANSWER: c RATIONALE: Just as a child learns new things, an artificial neural network is programmed to learn from each iteration during the training phase—a process that continues even after the system is implemented. Input is given, and feedback is received. The feedback is used to weight the connections, meaning it takes all the options and assigns the most “points” to the choice with the most feedback. The next iteration looks at the choices and takes the one with the highest weight based on the situation. FEEDBACK: a. Input is given, and feedback is received. The feedback is used to weight the connections, meaning it takes all the options and assigns the most “points” to the

Copyright Cengage Learning. Powered by Cognero.

Page 25


Chapter 11 - Artificial Intelligence and Automation choice with the most feedback.

b. Input is given, and feedback is received. The feedback is used to weight the

connections, meaning it takes all the options and assigns the most “points” to the choice with the most feedback. c. Input is given, and feedback is received. The feedback is used to weight the connections, meaning it takes all the options and assigns the most “points” to the choice with the most feedback. d. Input is given, and feedback is received. The feedback is used to weight the connections, meaning it takes all the options and assigns the most “points” to the choice with the most feedback.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Artificial Neural Networks QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.5 - Describe two strategies used to train artificial neural networks. KEYWORDS: Bloom's: Remember DATE CREATED: 7/9/2020 4:48 PM DATE MODIFIED: 7/9/2020 5:14 PM 40. An artificial neural network uses the feedback it receives to _____. a. assign the most "points" to the choice with the least feedback b. weight its connections c. select the option with the lowest weight d. generate new data ANSWER: b RATIONALE: Just as a child learns new things, an artificial neural network is programmed to learn from each iteration during the training phase—a process that continues even after the system is implemented. Input is given, and feedback is received. The feedback is used to weight the connections, meaning it takes all the options and assigns the most “points” to the choice with the most feedback. The next iteration looks at the choices and takes the one with the highest weight based on the situation. FEEDBACK: a. The feedback is used to weight the connections, meaning it takes all the options and assigns the most “points” to the choice with the most feedback. b. The feedback is used to weight the connections, meaning it takes all the options and assigns the most “points” to the choice with the most feedback. c. The feedback is used to weight the connections, meaning it takes all the options and assigns the most “points” to the choice with the most feedback. d. The feedback is used to weight the connections, meaning it takes all the options and assigns the most “points” to the choice with the most feedback.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Artificial Neural Networks QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.5 - Describe two strategies used to train artificial neural networks. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 26


Chapter 11 - Artificial Intelligence and Automation DATE CREATED: DATE MODIFIED:

7/9/2020 4:48 PM 7/10/2020 10:06 AM

41. An artificial neural network _____. a. learns each time it processes some input b. learns emotional responses c. is trained through unsupervised learning d. is not trained using a machine learning strategy ANSWER: a RATIONALE: An artificial neural network program is trained through supervised learning, through the machine learning process. Just as a child learns new things, an artificial neural network is programmed to learn from each iteration during the training phase—a process that continues even after the system is implemented. Input is given, and feedback is received. FEEDBACK: a. An artificial neural network program is trained through supervised learning, through the machine learning process. Just as a child learns new things, an artificial neural network is programmed to learn from each iteration during the training phase—a process that continues even after the system is implemented. Input is given, and feedback is received. b. An artificial neural network program is trained through supervised learning, through the machine learning process. Just as a child learns new things, an artificial neural network is programmed to learn from each iteration during the training phase—a process that continues even after the system is implemented. Input is given, and feedback is received. c. An artificial neural network program is trained through supervised learning, through the machine learning process. Just as a child learns new things, an artificial neural network is programmed to learn from each iteration during the training phase—a process that continues even after the system is implemented. Input is given, and feedback is received. d. An artificial neural network program is trained through supervised learning, through the machine learning process. Just as a child learns new things, an artificial neural network is programmed to learn from each iteration during the training phase—a process that continues even after the system is implemented. Input is given, and feedback is received.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Artificial Neural Networks QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.5 - Describe two strategies used to train artificial neural networks. KEYWORDS: Bloom's: Remember DATE CREATED: 7/9/2020 4:49 PM DATE MODIFIED: 7/10/2020 10:21 AM 42. Since the early 1800s, automation has often aroused workers' fears about _____. a. job loss b. unions c. workplace hazards d. minimum wages Copyright Cengage Learning. Powered by Cognero.

Page 27


Chapter 11 - Artificial Intelligence and Automation ANSWER: RATIONALE:

a Automation has often created a fear of job loss. Change can be hard to accept when it appears that it will affect your livelihood. In 1811, the Luddite movement began when textile workers protested the automation of textile manufacturing plants over fears that skilled workers would be displaced. Each decade has brought about its own fears of job loss due to automation.

FEEDBACK:

a. Automation has often created a fear of job loss. b. Automation has often created a fear of job loss. c. Automation has often created a fear of job loss. d. Automation has often created a fear of job loss.

POINTS: 1 DIFFICULTY: Easy REFERENCES: AI and Employment QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.11e.14.6 - Discuss the potential impact of artificial intelligence and automation on future employment. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 10:26 AM DATE MODIFIED: 7/10/2020 1:30 PM 43. Thomas and Emily are discussing the affect of AI on future employment. Emily correctly points out that _____. a. technology often replaces high-paying jobs but creates more low-paying jobs b. until the introduction of AI, workers welcomed automation as a way to increase safety c. the introduction of new technology has always resulted in the creation of more jobs than were lost d. historically, technology has seldom created labor that is chapter or faster than human labor ANSWER: c RATIONALE: Automation has often created a fear of job loss. Change can be hard to accept when it appears that it will affect your livelihood. In the long run, however, the introduction of new technology has always resulted in more jobs being created than were lost. Technology may create cheaper and faster labor, but other—higher paying—jobs are often created as a result of the new technology. FEEDBACK: a. In the long run the introduction of new technology has always resulted in more jobs being created than were lost. Technology may create cheaper and faster labor, but other—higher paying—jobs are often created as a result of the new technology. b. In the long run the introduction of new technology has always resulted in more jobs being created than were lost. Technology may create cheaper and faster labor, but other—higher paying—jobs are often created as a result of the new technology. c. In the long run the introduction of new technology has always resulted in more jobs being created than were lost. Technology may create cheaper and faster labor, but other—higher paying—jobs are often created as a result of the new technology. d. In the long run the introduction of new technology has always resulted in more jobs being created than were lost. Technology may create cheaper and faster labor, but other—higher paying—jobs are often created as a result of the new technology.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 28


Chapter 11 - Artificial Intelligence and Automation DIFFICULTY: Easy REFERENCES: AI and Employment QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.11e.14.6 - Discuss the potential impact of artificial intelligence and automation on future employment. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 10:28 AM DATE MODIFIED: 7/10/2020 1:37 PM 44. The 2017 study of the impact of automation on the global workforce by McKinsey & Company concluded that, by 2030, _____. a. the labor demand for occupations that didn't exist before will drop by 9 percent b. wages will decline by as much as 9 percent due to automation c. the unemployment rate will reach 30 percent worldwide d. 400 to 800 million people will be displaced from their jobs by automation ANSWER: d RATIONALE: In 2017, McKinsey & Company conducted a study that examined how automation will impact the global workforce by 2030. Included in the calculation was the cost of deploying the solutions, the quality and quantity of labor, wages, the benefits of automation, and social acceptance. The study estimated that approximately 30 percent of the hours worked worldwide could be automated by 2030—meaning 400 million to 800 million displaced individuals will need to learn new skills and move into new occupations. McKinsey & Company does have good news, however. The study estimates that 9 percent of the labor demand in 2030 will be in occupations that did not exist before. The study also predicted that wages in 2030 will be much higher due to automation. FEEDBACK: a. The study estimated that approximately 30 percent of the hours worked worldwide could be automated by 2030—meaning 400 million to 800 million displaced individuals will need to learn new skills and move into new occupations. b. The study estimated that approximately 30 percent of the hours worked worldwide could be automated by 2030—meaning 400 million to 800 million displaced individuals will need to learn new skills and move into new occupations. c. The study estimated that approximately 30 percent of the hours worked worldwide could be automated by 2030—meaning 400 million to 800 million displaced individuals will need to learn new skills and move into new occupations. d. The study estimated that approximately 30 percent of the hours worked worldwide could be automated by 2030—meaning 400 million to 800 million displaced individuals will need to learn new skills and move into new occupations.

POINTS: 1 DIFFICULTY: Easy REFERENCES: AI and Employment QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.11e.14.6 - Discuss the potential impact of artificial intelligence and automation on future employment. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 10:28 AM Copyright Cengage Learning. Powered by Cognero.

Page 29


Chapter 11 - Artificial Intelligence and Automation DATE MODIFIED:

7/10/2020 1:44 PM

45. According to experts, what organizational practice will allow the growth of AI to create new jobs? a. automating more tasks b. upskilling the workforce c. replacing the workforce d. transitioning to cloud computing ANSWER: b RATIONALE: A report released by the World Economic Forum titled “The Future of Jobs 2018” states that the growth of AI could actually create up to 58 million new jobs by 2022. In order for this to happen, organizations must recognize the talent within their workforce and upskill their workforce to meet the demands of new automation. Upskilling refers to training a workforce to perform higher-skilled roles to ensure they meet their full potential. FEEDBACK: a. A report released by the World Economic Forum titled “The Future of Jobs 2018” states that the growth of AI could actually create up to 58 million new jobs by 2022. In order for this to happen, organizations must recognize the talent within their workforce and upskill their workforce to meet the demands of new automation. b. A report released by the World Economic Forum titled “The Future of Jobs 2018” states that the growth of AI could actually create up to 58 million new jobs by 2022. In order for this to happen, organizations must recognize the talent within their workforce and upskill their workforce to meet the demands of new automation. c. A report released by the World Economic Forum titled “The Future of Jobs 2018” states that the growth of AI could actually create up to 58 million new jobs by 2022. In order for this to happen, organizations must recognize the talent within their workforce and upskill their workforce to meet the demands of new automation. d. A report released by the World Economic Forum titled “The Future of Jobs 2018” states that the growth of AI could actually create up to 58 million new jobs by 2022. In order for this to happen, organizations must recognize the talent within their workforce and upskill their workforce to meet the demands of new automation.

POINTS: 1 DIFFICULTY: Easy REFERENCES: AI and Employment QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.11e.14.6 - Discuss the potential impact of artificial intelligence and automation on future employment. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 10:28 AM DATE MODIFIED: 7/10/2020 1:51 PM 46. Mavis receives an e-mail announcing that her employer will be selecting employees from each department for upskillling and providing an application for those who are interested. What does this mean? a. Mavis should start looking for a new position, as her current one will be eliminated. b. Mavis should apply if she would like to advance her career by gaining new skills. c. Mavis is expected to acquire further education at her own expense to keep her job. Copyright Cengage Learning. Powered by Cognero.

Page 30


Chapter 11 - Artificial Intelligence and Automation d. Mavis's company has a strategic plan to change industries. ANSWER: b RATIONALE: Upskilling refers to training a workforce to perform higher-skilled roles to ensure they meet their full potential. For workers to take advantage of this trend, they must take personal responsibility for their own training and development. Employees can take advantage of career and professional development opportunities, return to school for more education, and apply for higher-skilled positions. FEEDBACK: a. Upskilling refers to training a workforce to perform higher-skilled roles to ensure they meet their full potential. For workers to take advantage of this trend, they must take personal responsibility for their own training and development. b. Upskilling refers to training a workforce to perform higher-skilled roles to ensure they meet their full potential. For workers to take advantage of this trend, they must take personal responsibility for their own training and development. c. Upskilling refers to training a workforce to perform higher-skilled roles to ensure they meet their full potential. For workers to take advantage of this trend, they must take personal responsibility for their own training and development. d. Upskilling refers to training a workforce to perform higher-skilled roles to ensure they meet their full potential. For workers to take advantage of this trend, they must take personal responsibility for their own training and development.

POINTS: 1 DIFFICULTY: Easy REFERENCES: AI and Employment QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.11e.14.6 - Discuss the potential impact of artificial intelligence and automation on future employment. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 10:28 AM DATE MODIFIED: 7/10/2020 2:05 PM 47. Top career options in AI include becoming _____. a. a business intelligence developer, who programs machine learning applications in Java b. a robotics scientist, who is a specialist in machine learning, applied mathematics, and computational statistics c. a data scientist, who analyzes large data sets to follow patterns and find trends d. an AI research scientist, who builds and maintains robots ANSWER: c RATIONALE: There are many options for a career in AI. A data scientist analyzes large data sets to follow patterns and find trends, allowing organizations to develop strategic plans and make effective decisions in a timely manner. Computer programmers with a strong background in languages such as Python and Java may work as machine learning engineers in industries such as technology, aerospace, and finance. Engineers who are responsible for robots, such as Alexa and Roomba, develop products that can take years of research and development before being released to the public. Data scientists working as business intelligence developers look for market trends that make data usable for business; these developers often maintain the cloudbased data storage systems. Specialists in machine learning, applied mathematics, and computational statistics, AI research scientists are responsible for developing the machine learning solutions for a variety of applications. FEEDBACK: a. A data scientist analyzes large data sets to follow patterns and find trends, Copyright Cengage Learning. Powered by Cognero.

Page 31


Chapter 11 - Artificial Intelligence and Automation allowing organizations to develop strategic plans and make effective decisions in a timely manner. b. A data scientist analyzes large data sets to follow patterns and find trends, allowing organizations to develop strategic plans and make effective decisions in a timely manner. c. A data scientist analyzes large data sets to follow patterns and find trends, allowing organizations to develop strategic plans and make effective decisions in a timely manner. d. A data scientist analyzes large data sets to follow patterns and find trends, allowing organizations to develop strategic plans and make effective decisions in a timely manner.

POINTS: 1 DIFFICULTY: Easy REFERENCES: AI and Employment QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.11e.14.6 - Discuss the potential impact of artificial intelligence and automation on future employment. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 10:28 AM DATE MODIFIED: 7/10/2020 2:13 PM 48. A LinkedIn report on AI skills among users identified three skill sets that are complementary to AI. Which of the following skill sets is NOT one of them? a. interpersonal skills b. data and programming skills c. skills to use the products or services powered by data d. mechanical engineering skills ANSWER: d RATIONALE: A report by LinkedIn noted that between 2015 and 2017, the number of AI skills listed on individual LinkedIn profiles increased by 190 percent. The LinkedIn report also identified three skill sets that are complementary to AI: data and programming skills, skills to use the products or services powered by data, and interpersonal skills. FEEDBACK: a. The LinkedIn report identified three skill sets that are complementary to AI: data and programming skills, skills to use the products or services powered by data, and interpersonal skills. b. The LinkedIn report identified three skill sets that are complementary to AI: data and programming skills, skills to use the products or services powered by data, and interpersonal skills. c. The LinkedIn report identified three skill sets that are complementary to AI: data and programming skills, skills to use the products or services powered by data, and interpersonal skills. d. The LinkedIn report identified three skill sets that are complementary to AI: data and programming skills, skills to use the products or services powered by data, and interpersonal skills.

POINTS: DIFFICULTY: REFERENCES:

1 Easy AI and Employment

Copyright Cengage Learning. Powered by Cognero.

Page 32


Chapter 11 - Artificial Intelligence and Automation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.11e.14.6 - Discuss the potential impact of artificial intelligence and automation on future employment. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 10:28 AM DATE MODIFIED: 7/10/2020 2:19 PM 49. What is machine learning? a. the ability of a computer to learn without having a programmer change the software for every scenario b. technology that distinguishes printed or handwritten text in a digital image c. the ability of a computer to recognize and act on patterns or trends that it detects in large sets of data d. an approach to solving problems that uses the concept of survival of the fittest as a strategy ANSWER: a RATIONALE: In 1959, Arthur Samuel defined the term machine learning as the ability of a computer “to learn without being explicitly programmed.” In other words, it refers to a computer that can learn without having a programmer change the software for every scenario it encounters. FEEDBACK: a. Machine learning refers to a computer that can learn without having a programmer change the software for every scenario it encounters. b. Machine learning refers to a computer that can learn without having a programmer change the software for every scenario it encounters. c. Machine learning refers to a computer that can learn without having a programmer change the software for every scenario it encounters. d. Machine learning refers to a computer that can learn without having a programmer change the software for every scenario it encounters.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Machine and Natural Language QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.7 - Define the term machine learning. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 2:21 PM DATE MODIFIED: 7/10/2020 2:28 PM 50. How are predictive analytics and machine learning related? a. Machine learning tools are used to develop predictive analytic models. b. Predictive analytics is the same thing as machine learning. c. Predictive analytics tools are used to develop machine learning models. d. Machine learning tools recommend actions based on predictive data models. ANSWER: a RATIONALE: Data analysts use machine learning tools to develop predictive analytic models. From each iteration of data, the computer will learn from the past process and look for trends and patterns to produce reliable results. These predictive data models are used by data and business analysts to predict future business operations, called predictive analytics, enabling faster and more accurate decision making. Predictive analytics is not the same as machine Copyright Cengage Learning. Powered by Cognero.

Page 33


Chapter 11 - Artificial Intelligence and Automation learning, but they are linked through predictive modeling. FEEDBACK:

a. Data analysts use machine learning tools to develop predictive analytic models. b. Data analysts use machine learning tools to develop predictive analytic models. c. Data analysts use machine learning tools to develop predictive analytic models. d. Data analysts use machine learning tools to develop predictive analytic models.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Machine and Natural Language QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.7 - Define the term machine learning. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 2:22 PM DATE MODIFIED: 7/10/2020 2:34 PM 51. How are machine learning and artificial intelligence different? a. Only machine learning systems learn. b. They learn through different processes. c. In artificial intelligence, the algorithms change as the machine learns. d. In machine learning, the process runs through an artificial neural network. ANSWER: b RATIONALE: The terms AI and machine learning are often used interchangeably; however, the terms refer to different functionality. The difference between the two is how the information in processed. In machine learning, the algorithms change as the machine learns about the information it is processing. In AI, the process runs through an artificial neural network to find the proper response. Both types of systems are learning, but the learning process is different. FEEDBACK: a. Both types of systems are learning, but the learning process is different. b. Both types of systems are learning, but the learning process is different. c. Both types of systems are learning, but the learning process is different. d. Both types of systems are learning, but the learning process is different. POINTS: 1 DIFFICULTY: Easy REFERENCES: Machine and Natural Language QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.7 - Define the term machine learning. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 2:22 PM DATE MODIFIED: 7/10/2020 2:38 PM 52. Which statement relating machine learning to other, related concepts is correct? a. Natural language processing is a subset of AI, and machine learning is a function of natural language processing. Copyright Cengage Learning. Powered by Cognero.

Page 34


Chapter 11 - Artificial Intelligence and Automation b. Machine learning is a subset of natural language processing, and AI is a function of machine learning. c. AI is a subset of machine learning, and natural language processing is a function of AI. d. Machine learning is a subset of AI, and natural language processing is a function of machine learning. ANSWER: d RATIONALE: Machine learning is a subset of AI, and natural language processing is a function of machine learning. FEEDBACK: a. Machine learning is a subset of AI, and natural language processing is a function of machine learning. b. Machine learning is a subset of AI, and natural language processing is a function of machine learning. c. Machine learning is a subset of AI, and natural language processing is a function of machine learning. d. Machine learning is a subset of AI, and natural language processing is a function of machine learning.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Machine and Natural Language QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.7 - Define the term machine learning. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 2:22 PM DATE MODIFIED: 7/10/2020 2:42 PM 53. Which statement about machine learning is true? a. Strategic forecasting relies heavily on machine learning, which is an excellent platform for predictive analytics. b. Antivirus software that uses machine learning works by looking for signatures of known malicious software. c. Both the cybersecurity industry and the hackers they combat now utilize machine learning. d. The Cyber Threat Alliance was founded to advance machine learning research in the financial industry. ANSWER: c RATIONALE: Cybersecurity is an industry that is advancing through the use of machine learning. A traditional, non-machine learning, antivirus software definition looks for a signature of known malicious software. Security software that uses machine learning works by finding anomalies in the patterns, or trends, in the data. According to McAfee, hackers are already making use of machine learning in the form of malware. Palo Alto founded the Cyber Threat Alliance, along with Cisco, Intel, Symantec, and Check Point Software Technologies to share information on growing threats and how to defend against them. Strategic planning and forecasting analytical models rely heavily on predictive analytics, and machine learning is an excellent platform for predictive analytics. FEEDBACK:

a. Cybersecurity is an industry that is advancing through the use of machine

learning. Meanwhile, according to McAfee, hackers are already making use of machine learning in the form of malware. b. Cybersecurity is an industry that is advancing through the use of machine learning. Meanwhile, according to McAfee, hackers are already making use of machine learning in the form of malware. Copyright Cengage Learning. Powered by Cognero.

Page 35


Chapter 11 - Artificial Intelligence and Automation c. Cybersecurity is an industry that is advancing through the use of machine

learning. Meanwhile, according to McAfee, hackers are already making use of machine learning in the form of malware. d. Cybersecurity is an industry that is advancing through the use of machine learning. Meanwhile, according to McAfee, hackers are already making use of machine learning in the form of malware.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Machine Learning Across Industries QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.7 - Define the term machine learning. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 2:38 PM DATE MODIFIED: 7/10/2020 2:55 PM 54. Examples of machine learning-based applications used to lower costs and improve operations in the auto insurance industry include _____. a. cryptocurrency and antivirus applications b. chatbots and driver performance monitoring applications c. logistics and supply chain management applications d. visual pattern and environmental recognition applications ANSWER: b RATIONALE: Four of the top auto insurance companies are using the same types of applications to lower cost and improve their operations. Chatbots and other similar applications allow customers to get answers quickly or get advice without long wait times over the phone. Another application is driver performance monitoring. FEEDBACK: a. Four of the top auto insurance companies are using the same types of applications to lower cost and improve their operations. Chatbots and other similar applications allow customers to get answers quickly or get advice without long wait times over the phone. Another application is driver performance monitoring. b. Four of the top auto insurance companies are using the same types of applications to lower cost and improve their operations. Chatbots and other similar applications allow customers to get answers quickly or get advice without long wait times over the phone. Another application is driver performance monitoring. c. Four of the top auto insurance companies are using the same types of applications to lower cost and improve their operations. Chatbots and other similar applications allow customers to get answers quickly or get advice without long wait times over the phone. Another application is driver performance monitoring. d. Four of the top auto insurance companies are using the same types of applications to lower cost and improve their operations. Chatbots and other similar applications allow customers to get answers quickly or get advice without long wait times over the phone. Another application is driver performance monitoring.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 36


Chapter 11 - Artificial Intelligence and Automation REFERENCES: Machine Learning Across Industries QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.7 - Define the term machine learning. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 2:43 PM DATE MODIFIED: 7/10/2020 3:02 PM 55. Machine learning is useful for the detection of health care fraud because it can successfully _____. a. detect the predictors of disease using large data sets b. distinguish printed or handwritten text in a digital image c. create predictive models using age, family history, and weight d. recognize patterns in the way insurance claims are filed ANSWER: d RATIONALE: Insurance claims are filed using the same method every time. A physician who is committing fraud for monetary gain will not change the method of filing, as this would draw attention to the claim. These filings may be for procedures or for prescriptions. However, this can also be the way they are caught. Machine learning is sometimes used to track these patterns to determine when fraudulent billing practices have occurred. Machine learning is being used in healthcare diagnostics. As more data is fed into the system, the learning process detects the predictors of disease, including age, family history, environment, weight, along with other factors. Predictive models are then created through the machine learning process. Optical character recognition is a technology that distinguishes printed or handwritten text in a digital image, such as a scanned document, that is converted into a computer-generated document, such as a PDF. FEEDBACK:

a. Insurance claims are filed using the same method every time. A physician who is committing fraud for monetary gain will not change the method of filing, as this would draw attention to the claim. These filings may be for procedures or for prescriptions. However, this can also be the way they are caught. Machine learning is sometimes used to track these patterns to determine when fraudulent billing practices have occurred. b. Insurance claims are filed using the same method every time. A physician who is committing fraud for monetary gain will not change the method of filing, as this would draw attention to the claim. These filings may be for procedures or for prescriptions. However, this can also be the way they are caught. Machine learning is sometimes used to track these patterns to determine when fraudulent billing practices have occurred. c. Insurance claims are filed using the same method every time. A physician who is committing fraud for monetary gain will not change the method of filing, as this would draw attention to the claim. These filings may be for procedures or for prescriptions. However, this can also be the way they are caught. Machine learning is sometimes used to track these patterns to determine when fraudulent billing practices have occurred. d. Insurance claims are filed using the same method every time. A physician who is committing fraud for monetary gain will not change the method of filing, as this would draw attention to the claim. These filings may be for procedures or for prescriptions. However, this can also be the way they are caught. Machine learning is sometimes used to track these patterns to determine when fraudulent

Copyright Cengage Learning. Powered by Cognero.

Page 37


Chapter 11 - Artificial Intelligence and Automation billing practices have occurred.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Machine Learning Across Industries QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.7 - Define the term machine learning. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 2:44 PM DATE MODIFIED: 7/10/2020 3:15 PM 56. Supervised learning requires _____. a. a set of data within a structured database b. two data sets: one labeled and one unlabeled c. a known set of data that is labeled or tagged d. processing of data through a neural network ANSWER: c RATIONALE: Supervised training begins with a known set of data in a training environment. The data must be labeled or have a tag applied to it. FEEDBACK: a. Supervised training begins with a known set of data in a training environment. The data must be labeled or have a tag applied to it. b. Supervised training begins with a known set of data in a training environment. The data must be labeled or have a tag applied to it. c. Supervised training begins with a known set of data in a training environment. The data must be labeled or have a tag applied to it. d. Supervised training begins with a known set of data in a training environment. The data must be labeled or have a tag applied to it.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Machine Learning Training QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.8 - Identify four types of machine learning training. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 3:16 PM DATE MODIFIED: 7/10/2020 3:35 PM 57. In supervised learning, how does the machine learn? a. by running through examples and storing the correct answers b. by labeling or tagging sets of data c. by playing a new game each day d. by comparing its outputs from several iterations ANSWER: a RATIONALE: Supervised training begins with a known set of data in a training environment. The data must be labeled or have a tag applied to it. After the data is provided, examples are input into the Copyright Cengage Learning. Powered by Cognero.

Page 38


Chapter 11 - Artificial Intelligence and Automation system, and the machine runs through different scenarios. The output is compared to a predefined correct answer. The machine “memorizes” or stores these correct answers, thus learning from each correct test. FEEDBACK:

a. After the data is provided, examples are input into the system, and the machine

runs through different scenarios. The output is compared to a predefined correct answer. The machine “memorizes” or stores these correct answers, thus learning from each correct test. b. After the data is provided, examples are input into the system, and the machine runs through different scenarios. The output is compared to a predefined correct answer. The machine “memorizes” or stores these correct answers, thus learning from each correct test. c. After the data is provided, examples are input into the system, and the machine runs through different scenarios. The output is compared to a predefined correct answer. The machine “memorizes” or stores these correct answers, thus learning from each correct test. d. After the data is provided, examples are input into the system, and the machine runs through different scenarios. The output is compared to a predefined correct answer. The machine “memorizes” or stores these correct answers, thus learning from each correct test.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Machine Learning Training QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.8 - Identify four types of machine learning training. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 3:17 PM DATE MODIFIED: 7/10/2020 3:44 PM 58. Which of the following statements about unsupervised learning is accurate? a. Unsupervised learning requires an unlabeled training data set. b. Unsupervised learning is like a child learning a game after being informed of the rules. c. In unsupervised learning, each piece of data must be associated with a name. d. In unsupervised learning, tests have formal, predetermined correct answers. ANSWER: a RATIONALE: Unsupervised learning is like a child learning a new game or skill, but with no written directions. Unsupervised machine learning requires a training data set. The data in the training set is not labeled, and the machine must learn from observing to infer the correct answer. With unsupervised learning, tests do not have formal correct answers. FEEDBACK: a. Unsupervised machine learning requires a training data set. The data in the training set is not labeled, and the machine must learn from observing to infer the correct answer. b. Unsupervised machine learning requires a training data set. The data in the training set is not labeled, and the machine must learn from observing to infer the correct answer. c. Unsupervised machine learning requires a training data set. The data in the training set is not labeled, and the machine must learn from observing to infer the correct answer. d. Unsupervised machine learning requires a training data set. The data in the

Copyright Cengage Learning. Powered by Cognero.

Page 39


Chapter 11 - Artificial Intelligence and Automation training set is not labeled, and the machine must learn from observing to infer the correct answer.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Machine Learning Training QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.8 - Identify four types of machine learning training. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 3:17 PM DATE MODIFIED: 7/10/2020 3:50 PM 59. The goal of unsupervised learning is for the machine to _____. a. "memorize," or store, correct answers it discovers as it processes example scenarios b. learn what to do and what not do through trial and error c. train itself to learn from the input and be in a mode of continuous improvement d. weight network connections so as to identify choices with the most feedback ANSWER: c RATIONALE: With unsupervised learning, tests do not have formal correct answers. The goal of this type of training is for the machine to train itself to learn from the input and be in a mode of continuous improvement. FEEDBACK: a. With unsupervised learning, tests do not have formal correct answers. The goal of this type of training is for the machine to train itself to learn from the input and be in a mode of continuous improvement. b. With unsupervised learning, tests do not have formal correct answers. The goal of this type of training is for the machine to train itself to learn from the input and be in a mode of continuous improvement. c. With unsupervised learning, tests do not have formal correct answers. The goal of this type of training is for the machine to train itself to learn from the input and be in a mode of continuous improvement. d. With unsupervised learning, tests do not have formal correct answers. The goal of this type of training is for the machine to train itself to learn from the input and be in a mode of continuous improvement.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Machine Learning Training QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.8 - Identify four types of machine learning training. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 3:18 PM DATE MODIFIED: 7/10/2020 3:58 PM 60. Reinforcement learning _____. a. uses the same type of training data set as supervised learning b. emulates the trial-and-error method through which humans learn Copyright Cengage Learning. Powered by Cognero.

Page 40


Chapter 11 - Artificial Intelligence and Automation c. involves the same type of feedback as unsupervised learning d. minimizes the errors the machine makes as it navigates a data set ANSWER: b RATIONALE: Reinforced learning begins with the same type of training data set as is used in unsupervised learning. The data is not labeled, and the algorithms must run through multiple iterations to restructure the data into a format that can be used in the next sample. The difference comes in the feedback that is received in reinforced learning. When a solution is returned, either positive or negative feedback is returned from the program, and the machine learns to keep the process as-is or to try again with a new method. The machine also uses input from the environment in the decision-making process. This trial-and-error method of learning emulates the human approach to learning. FEEDBACK: a. When a solution is returned, either positive or negative feedback is returned from the program, and the machine learns to keep the process as-is or to try again with a new method. The machine also uses input from the environment in the decision-making process. This trial-and-error method of learning emulates the human approach to learning. b. When a solution is returned, either positive or negative feedback is returned from the program, and the machine learns to keep the process as-is or to try again with a new method. The machine also uses input from the environment in the decision-making process. This trial-and-error method of learning emulates the human approach to learning. c. When a solution is returned, either positive or negative feedback is returned from the program, and the machine learns to keep the process as-is or to try again with a new method. The machine also uses input from the environment in the decision-making process. This trial-and-error method of learning emulates the human approach to learning. d. When a solution is returned, either positive or negative feedback is returned from the program, and the machine learns to keep the process as-is or to try again with a new method. The machine also uses input from the environment in the decision-making process. This trial-and-error method of learning emulates the human approach to learning.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Machine Learning Training QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.8 - Identify four types of machine learning training. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 3:18 PM DATE MODIFIED: 7/10/2020 4:03 PM 61. Which type of machine learning is used to train autonomous cars to drive? a. unsupervised learning b. semi-supervised learning c. supervised learning d. reinforcement learning ANSWER: d RATIONALE: Machine learning using this method may result in multiple errors until the machine learns how to navigate the data for ultimate success. Each failure is recorded, and the machine Copyright Cengage Learning. Powered by Cognero.

Page 41


Chapter 11 - Artificial Intelligence and Automation learns which path not to take in the future. After each successful test, a new scenario is given, and the testing resumes. This is the type of learning used when training autonomous cars. The input from the environment could be from other cars, trees on the side of the road, or even the sun reflecting off another car. All of this input provides valuable information as the machine decides whether to apply the brakes or increase speed. FEEDBACK:

a. Reinforcement learning is the type of learning used when training autonomous

cars. The input from the environment could be from other cars, trees on the side of the road, or even the sun reflecting off another car. b. Reinforcement learning is the type of learning used when training autonomous cars. The input from the environment could be from other cars, trees on the side of the road, or even the sun reflecting off another car. c. Reinforcement learning is the type of learning used when training autonomous cars. The input from the environment could be from other cars, trees on the side of the road, or even the sun reflecting off another car. d. Reinforcement learning is the type of learning used when training autonomous cars. The input from the environment could be from other cars, trees on the side of the road, or even the sun reflecting off another car.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Machine Learning Training QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.8 - Identify four types of machine learning training. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 3:18 PM DATE MODIFIED: 7/10/2020 4:06 PM 62. Which statement about types of machine learning is FALSE? a. Semi-supervised learning is a combination of supervised and unsupervised learning. b. With unsupervised learning, the computer restructures the data as each algorithm is processed. c. We see supervised learning in practice when we regularly use an online search engine. d. With reinforcement learning, the machine receives either positive or negative feedback when a solution is returned. ANSWER: c RATIONALE: Unsupervised machine learning requires a training data set. As each algorithm is processed, the computer restructures the data into something more useful, adding labels or classes that it can use for the next iteration. With unsupervised learning, tests do not have formal correct answers. The goal of this type of training is for the machine to train itself to learn from the input and be in a mode of continuous improvement. We see this in practice every time we use an online search engine. Semi-supervised learning is a combination of supervised and unsupervised learning. When a solution is returned during reinforcement learning, either positive or negative feedback is returned from the program, and the machine learns to keep the process as-is or to try again with a new method. FEEDBACK:

a. The goal of this unsupervised learning is for the machine to train itself to learn from the input and be in a mode of continuous improvement. We see this in practice every time we use an online search engine.

Copyright Cengage Learning. Powered by Cognero.

Page 42


Chapter 11 - Artificial Intelligence and Automation b. The goal of this unsupervised learning is for the machine to train itself to learn from the input and be in a mode of continuous improvement. We see this in practice every time we use an online search engine. c. The goal of this unsupervised learning is for the machine to train itself to learn from the input and be in a mode of continuous improvement. We see this in practice every time we use an online search engine. d. The goal of this unsupervised learning is for the machine to train itself to learn from the input and be in a mode of continuous improvement. We see this in practice every time we use an online search engine.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Machine Learning Training QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.8 - Identify four types of machine learning training. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 3:18 PM DATE MODIFIED: 7/10/2020 4:20 PM 63. The part of machine learning that allows computers to understand, analyze, manipulate, and generate natural language for processing is most specifically called _____. a. the neural net b. natural language processing c. reinforcement learning d. supervised learning ANSWER: b RATIONALE: Natural language processing (NLP) is a part of machine learning that allows computers to understand, analyze, manipulate, and generate natural language for processing. FEEDBACK: a. Natural language processing (NLP) is a part of machine learning that allows computers to understand, analyze, manipulate, and generate natural language for processing. b. Natural language processing (NLP) is a part of machine learning that allows computers to understand, analyze, manipulate, and generate natural language for processing. c. Natural language processing (NLP) is a part of machine learning that allows computers to understand, analyze, manipulate, and generate natural language for processing. d. Natural language processing (NLP) is a part of machine learning that allows computers to understand, analyze, manipulate, and generate natural language for processing.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Natural Language Processing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.9 - Define the term natural language processing. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 43


Chapter 11 - Artificial Intelligence and Automation DATE CREATED: DATE MODIFIED:

7/10/2020 4:21 PM 7/10/2020 4:29 PM

64. When a computer answers your phone call to a utility company and asks you to tell it why you are calling, that computer is using _____. a. natural language processing b. an explanation facility c. supervised learning d. a knowledge acquisition facility ANSWER: a RATIONALE: Many companies provide natural language processing help over the phone to guide a caller to the correct department or person. For example, when a call comes into a bank, department store, or customer service department, the call may be answered by a computer, which offers the caller a menu of options. A caller might be prompted to “say the option or type in the number of the option to continue.” The natural language processing component has been trained to listen for an answer and direct the call to the correct person or department. FEEDBACK: a. Many companies provide natural language processing help over the phone to guide a caller to the correct department or person. For example, when a call comes into a bank, department store, or customer service department, the call may be answered by a computer, which offers the caller a menu of options. b. Many companies provide natural language processing help over the phone to guide a caller to the correct department or person. For example, when a call comes into a bank, department store, or customer service department, the call may be answered by a computer, which offers the caller a menu of options. c. Many companies provide natural language processing help over the phone to guide a caller to the correct department or person. For example, when a call comes into a bank, department store, or customer service department, the call may be answered by a computer, which offers the caller a menu of options. d. Many companies provide natural language processing help over the phone to guide a caller to the correct department or person. For example, when a call comes into a bank, department store, or customer service department, the call may be answered by a computer, which offers the caller a menu of options.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Natural Language Processing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.9 - Define the term natural language processing. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 4:24 PM DATE MODIFIED: 7/10/2020 4:36 PM 65. Dialects, slang, and the context of speech are examples of which challenge associated with natural language processing? a. the difference between what humans think and what they say b. the ongoing nature of the learning process c. the frustration experienced by users with the trial-and-error learning approach d. the difference between how computers "listen" and humans speak Copyright Cengage Learning. Powered by Cognero.

Page 44


Chapter 11 - Artificial Intelligence and Automation ANSWER: RATIONALE:

d One of the challenges is in how computers “listen” and how humans speak. Computers expect to hear a programming language, and humans speak in a variety of ways. Every language may have different dialects, including slang, and the context of the sentence may cause a word to have a different meaning.

FEEDBACK:

a. One of the challenges is in how computers “listen” and how humans speak.

Computers expect to hear a programming language, and humans speak in a variety of ways. Every language may have different dialects, including slang, and the context of the sentence may cause a word to have a different meaning. b. One of the challenges is in how computers “listen” and how humans speak. Computers expect to hear a programming language, and humans speak in a variety of ways. Every language may have different dialects, including slang, and the context of the sentence may cause a word to have a different meaning. c. One of the challenges is in how computers “listen” and how humans speak. Computers expect to hear a programming language, and humans speak in a variety of ways. Every language may have different dialects, including slang, and the context of the sentence may cause a word to have a different meaning. d. One of the challenges is in how computers “listen” and how humans speak. Computers expect to hear a programming language, and humans speak in a variety of ways. Every language may have different dialects, including slang, and the context of the sentence may cause a word to have a different meaning.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Natural Language Processing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.9 - Define the term natural language processing. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 4:24 PM DATE MODIFIED: 7/10/2020 5:26 PM 66. Because they must interpret what a user is looking for and return relevant results in a timely manner, natural language processing is widely used in _____. a. search engines b. GPS devices c. insurance fraud detectors d. environmental recognition ANSWER: a RATIONALE: Natural language processing is widely used in search engines. Each time a search is entered, the engine must interpret what the user is looking for and return the relevant results in a timely manner. FEEDBACK: a. Natural language processing is widely used in search engines. Each time a search is entered, the engine must interpret what the user is looking for and return the relevant results in a timely manner. b. Natural language processing is widely used in search engines. Each time a search is entered, the engine must interpret what the user is looking for and return the relevant results in a timely manner. c. Natural language processing is widely used in search engines. Each time a search is entered, the engine must interpret what the user is looking for and

Copyright Cengage Learning. Powered by Cognero.

Page 45


Chapter 11 - Artificial Intelligence and Automation return the relevant results in a timely manner.

d. Natural language processing is widely used in search engines. Each time a

search is entered, the engine must interpret what the user is looking for and return the relevant results in a timely manner.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Natural Language Processing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.9 - Define the term natural language processing. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 4:24 PM DATE MODIFIED: 7/14/2020 10:09 AM 67. The learning process that builds natural language processing algorithms continues as they are used. When users enter or speak new search requests into a search engine, for example, that program continues to refine its results through _____. a. intelligent behavior b. deep learning c. heuristics d. upskilling ANSWER: b RATIONALE: Most search engines now return a list of “also asked questions” to determine if there is another way of asking the same question or to present additional questions that have been asked about the same topic. These algorithms are built into the search engines, but the learning process that builds the algorithms continue to learn as they are used. This is called deep learning. Deep learning allows the programs to grow and learn from the many examples provided by the users, either typed or spoken. FEEDBACK: a. Deep learning allows the programs to grow and learn from the many examples provided by the users, either typed or spoken. b. Deep learning allows the programs to grow and learn from the many examples provided by the users, either typed or spoken. c. Deep learning allows the programs to grow and learn from the many examples provided by the users, either typed or spoken. d. Deep learning allows the programs to grow and learn from the many examples provided by the users, either typed or spoken.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Natural Language Processing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.9 - Define the term natural language processing. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 4:24 PM DATE MODIFIED: 7/14/2020 10:19 AM 68. When Percy visits Spain, he uses an online translator to help him interpret signs because he knows very little Spanish. This handy tool is an example of a common application of _____. Copyright Cengage Learning. Powered by Cognero.

Page 46


Chapter 11 - Artificial Intelligence and Automation a. artificial neural networks b. reinforcement learning c. inference engines d. natural language processing ANSWER: d RATIONALE: Natural language processing (NLP) is a part of machine learning that allows computers to understand, analyze, manipulate, and generate natural language for processing. This means it translates what it learns into the speaking language of choice when “talking” back to you (press 1 for English, 2 for Spanish, 3 for French, etc.). Online translators must be trained in more than just word-to-word translations. Grammar rules and punctuation can make a difference on how a sentence is read and how it is interpreted in another language. FEEDBACK: a. Natural language processing (NLP) is a part of machine learning that allows computers to understand, analyze, manipulate, and generate natural language for processing. Online translators must be trained in more than just word-to-word translations. b. Natural language processing (NLP) is a part of machine learning that allows computers to understand, analyze, manipulate, and generate natural language for processing. Online translators must be trained in more than just word-to-word translations. c. Natural language processing (NLP) is a part of machine learning that allows computers to understand, analyze, manipulate, and generate natural language for processing. Online translators must be trained in more than just word-to-word translations. d. Natural language processing (NLP) is a part of machine learning that allows computers to understand, analyze, manipulate, and generate natural language for processing. Online translators must be trained in more than just word-to-word translations.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Natural Language Processing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.9 - Define the term natural language processing. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 4:24 PM DATE MODIFIED: 7/14/2020 10:26 AM 69. Which statement regarding the translation software using natural language processing is correct? a. Online translators simply present a word-to-word translation of what the user enters. b. Accuracy in translations is much less important in business than in personal communications. c. The more difficult translations are those that involve sentence restructuring. d. Translation apps for mobile devices are typically not trained for speech recognition. ANSWER: c RATIONALE: Natural language processing (NLP) is a part of machine learning that allows computers to understand, analyze, manipulate, and generate natural language for processing. Online translators must be trained in more than just word-to-word translations. Grammar rules and punctuation can make a difference on how a sentence is read and how it is interpreted in another language. The simple translations are those where the words have a one-to-one Copyright Cengage Learning. Powered by Cognero.

Page 47


Chapter 11 - Artificial Intelligence and Automation match. The harder translations have a different sentence structure. Translation apps for mobile devices must also be trained for speech recognition. When using an app for business, it is important to know that the translator is accurate, and it has been trained for your voice. FEEDBACK:

a. The simple translations are those where the words have a one-to-one match. The harder translations have a different sentence structure. b. The simple translations are those where the words have a one-to-one match. The harder translations have a different sentence structure. c. The simple translations are those where the words have a one-to-one match. The harder translations have a different sentence structure. d. The simple translations are those where the words have a one-to-one match. The harder translations have a different sentence structure.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Natural Language Processing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.9 - Define the term natural language processing. KEYWORDS: Bloom's: Remember DATE CREATED: 7/10/2020 4:24 PM DATE MODIFIED: 7/14/2020 10:41 AM 70. Technology that interacts with a human's neural structure and translates the information into activity is known as _____. a. an artificial neural network b. an intelligent agent c. the brain computer interface d. the explanation facility ANSWER: c RATIONALE: The brain computer interface (BCI) is technology that interacts with a human’s neural structure (brain) and translates the information (thoughts) into activity (actions). FEEDBACK: a. The brain computer interface (BCI) is technology that interacts with a human’s neural structure (brain) and translates the information (thoughts) into activity (actions). b. The brain computer interface (BCI) is technology that interacts with a human’s neural structure (brain) and translates the information (thoughts) into activity (actions). c. The brain computer interface (BCI) is technology that interacts with a human’s neural structure (brain) and translates the information (thoughts) into activity (actions). d. The brain computer interface (BCI) is technology that interacts with a human’s neural structure (brain) and translates the information (thoughts) into activity (actions).

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Brain Computer Interface Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 48


Chapter 11 - Artificial Intelligence and Automation HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.10 - Discuss how the brain computer interface is being advanced through research. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 10:55 AM DATE MODIFIED: 7/14/2020 12:04 PM 71. In 1977, a patient moved a cursor across a screen using only electrical signals from his brain, and an account of this event was published as the first successful experiment with _____. a. a brain computer interface b. an artificial neural network c. machine learning d. augmented reality ANSWER: a RATIONALE: Experiments in BCI have been ongoing for fifty years. The first successful experiment was published in 1977, when a patient was able to move a cursor across a screen using only the brain’s electrical signals. FEEDBACK: a. The first successful experiment with BCI was published in 1977, when a patient was able to move a cursor across a screen using only the brain’s electrical signals. b. The first successful experiment with BCI was published in 1977, when a patient was able to move a cursor across a screen using only the brain’s electrical signals. c. The first successful experiment with BCI was published in 1977, when a patient was able to move a cursor across a screen using only the brain’s electrical signals. d. The first successful experiment with BCI was published in 1977, when a patient was able to move a cursor across a screen using only the brain’s electrical signals.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Brain Computer Interface QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.10 - Discuss how the brain computer interface is being advanced through research. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 10:57 AM DATE MODIFIED: 7/14/2020 3:21 PM 72. In which field is brain computer interface technology seeing the most growth through research? a. accounting b. medicine c. data analytics d. logistics ANSWER: b RATIONALE: The medical field is seeing tremendous growth in the use of BCI technology. Researchers Copyright Cengage Learning. Powered by Cognero.

Page 49


Chapter 11 - Artificial Intelligence and Automation have been working on devices such as the cochlear implant and prosthetic limbs. FEEDBACK:

a. The medical field is seeing tremendous growth in the use of BCI technology. b. The medical field is seeing tremendous growth in the use of BCI technology. c. The medical field is seeing tremendous growth in the use of BCI technology. d. The medical field is seeing tremendous growth in the use of BCI technology.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Brain Computer Interface QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.10 - Discuss how the brain computer interface is being advanced through research. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 10:57 AM DATE MODIFIED: 7/14/2020 3:26 PM 73. What device developed through brain computer interface research picks up signals from the environment and sends them directly to the brain via the auditory nerve? a. hearing aid b. neurorecovery agent c. BrainSTORMS system d. cochlear implant ANSWER: d RATIONALE: Researchers have been working on devices such as the cochlear implant, which uses BCI to give the deaf or severely hard-of-hearing patients “the sense of sound.” The device picks up signals and sends them directly to the brain via the auditory nerve. This is different from normal hearing, and it uses both an external and implanted device to receive and process the sound. FEEDBACK: a. Researchers have been working on devices such as the cochlear implant, which uses BCI to give the deaf or severely hard-of-hearing patients “the sense of sound.” The device picks up signals and sends them directly to the brain via the auditory nerve. b. Researchers have been working on devices such as the cochlear implant, which uses BCI to give the deaf or severely hard-of-hearing patients “the sense of sound.” The device picks up signals and sends them directly to the brain via the auditory nerve. c. Researchers have been working on devices such as the cochlear implant, which uses BCI to give the deaf or severely hard-of-hearing patients “the sense of sound.” The device picks up signals and sends them directly to the brain via the auditory nerve. d. Researchers have been working on devices such as the cochlear implant, which uses BCI to give the deaf or severely hard-of-hearing patients “the sense of sound.” The device picks up signals and sends them directly to the brain via the auditory nerve.

POINTS: DIFFICULTY: REFERENCES:

1 Easy Brain Computer Interface

Copyright Cengage Learning. Powered by Cognero.

Page 50


Chapter 11 - Artificial Intelligence and Automation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.10 - Discuss how the brain computer interface is being advanced through research. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 10:58 AM DATE MODIFIED: 7/14/2020 3:37 PM 74. Advanced brain computer interface research has developed _____. a. highly successful health insurance fraud detection techniques b. augmented reality goggles for visually impaired people c. an implant that immediately restores speaking ability after a stroke d. a prosthetic limb that can perceive both touch and pain ANSWER: d RATIONALE: BCI is being used in other areas as well, including the development of prosthetic limbs. Advanced research conducted at Johns Hopkins University has produced a prosthetic limb that can perceive both touch and pain. This research took many hours of mapping, but the result was that the patient could “feel” again through the artificial limb. FEEDBACK: a. Advanced research conducted at Johns Hopkins University has produced a prosthetic limb that can perceive both touch and pain.

b. Advanced research conducted at Johns Hopkins University has produced a prosthetic limb that can perceive both touch and pain. c. Advanced research conducted at Johns Hopkins University has produced a prosthetic limb that can perceive both touch and pain. d. Advanced research conducted at Johns Hopkins University has produced a prosthetic limb that can perceive both touch and pain.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Brain Computer Interface QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.10 - Discuss how the brain computer interface is being advanced through research. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 10:58 AM DATE MODIFIED: 7/14/2020 3:45 PM 75. Two DARPA BCI programs, RAM and RAM-Replay, were designed to _____. a. accelerate development of a cure for Alzheimer's disease b. help restore and retrieve traumatic brain injury patients' memories c. explore aircraft flight control via implanted microchips d. improve hearing in patients with auditory nerve damage ANSWER: b RATIONALE: The Defense Advanced Research Projects Agency (DARPA) has long been involved with BCI technology. In 2013, President Obama announced the BRAIN (Brain Research through Advancing Innovative Neurotechnologies) Initiative with the goal of uncovering new Copyright Cengage Learning. Powered by Cognero.

Page 51


Chapter 11 - Artificial Intelligence and Automation treatments and cures for brain disorders such as Alzheimer’s, epilepsy, and traumatic brain injury. DARPA worked to support this research initiative with several programs. Two of these programs were the RAM (Restoring Active Memory) program and the RAM-Replay program. These two programs were designed to help restore a patient’s memory, retrieve existing memories, and facilitate new memories in patients who have sustained a traumatic brain injury or contracted a neurological disease. FEEDBACK:

a. Two DARPA programs were the RAM (Restoring Active Memory) program and

the RAM-Replay program. These two programs were designed to help restore a patient’s memory, retrieve existing memories, and facilitate new memories in patients who have sustained a traumatic brain injury or contracted a neurological disease. b. Two DARPA programs were the RAM (Restoring Active Memory) program and the RAM-Replay program. These two programs were designed to help restore a patient’s memory, retrieve existing memories, and facilitate new memories in patients who have sustained a traumatic brain injury or contracted a neurological disease. c. Two DARPA programs were the RAM (Restoring Active Memory) program and the RAM-Replay program. These two programs were designed to help restore a patient’s memory, retrieve existing memories, and facilitate new memories in patients who have sustained a traumatic brain injury or contracted a neurological disease. d. Two DARPA programs were the RAM (Restoring Active Memory) program and the RAM-Replay program. These two programs were designed to help restore a patient’s memory, retrieve existing memories, and facilitate new memories in patients who have sustained a traumatic brain injury or contracted a neurological disease.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Brain Computer Interface QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.10 - Discuss how the brain computer interface is being advanced through research. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 10:58 AM DATE MODIFIED: 7/14/2020 3:53 PM 76. What is made possible through a bi-directional brain computer interface? a. a device picks up signals and sends them directly to the brain b. a device perceives both touch and pain sensations c. an operator can both receive signals from and control the actions of a device d. an operator can control cyberdefense systems and unmanned vehicles ANSWER: c RATIONALE: DARPA has continued its research into BCI, and in 2015, in an experiment it conducted jointly with the University of Pittsburgh, a paralyzed individual was able to control multiple aircraft in a flight simulator through a surgically implanted microchip. The significance of this study was that the individual was able to receive signals from each of the aircraft, thus proving the concept of a bi-directional interface. The operator could sense the environment around each aircraft, understand if the surroundings held potential threats, and react accordingly. Copyright Cengage Learning. Powered by Cognero.

Page 52


Chapter 11 - Artificial Intelligence and Automation FEEDBACK:

a. In one BCI experiment, a paralyzed individual was able to control multiple aircraft in a flight simulator through a surgically implanted microchip. The significance of this study was that the individual was able to receive signals from each of the aircraft, thus proving the concept of a bi-directional interface. b. In one BCI experiment, a paralyzed individual was able to control multiple aircraft in a flight simulator through a surgically implanted microchip. The significance of this study was that the individual was able to receive signals from each of the aircraft, thus proving the concept of a bi-directional interface. c. In one BCI experiment, a paralyzed individual was able to control multiple aircraft in a flight simulator through a surgically implanted microchip. The significance of this study was that the individual was able to receive signals from each of the aircraft, thus proving the concept of a bi-directional interface. d. In one BCI experiment, a paralyzed individual was able to control multiple aircraft in a flight simulator through a surgically implanted microchip. The significance of this study was that the individual was able to receive signals from each of the aircraft, thus proving the concept of a bi-directional interface.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Brain Computer Interface QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.10 - Discuss how the brain computer interface is being advanced through research. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 10:58 AM DATE MODIFIED: 7/14/2020 4:05 PM 77. Which of the following technologies is a combination of mechanical engineering, computer science, AI, and machine learning? a. robotics b. artificial neural networks c. augmented reality d. expert systems ANSWER: a RATIONALE: Robotics is a technology using a combination of mechanical engineering, computer science, and machine learning to create a device that can perform tasks with a high degree of precision. FEEDBACK: a. Robotics is a technology using a combination of mechanical engineering, computer science, and machine learning to create a device that can perform tasks with a high degree of precision. b. Robotics is a technology using a combination of mechanical engineering, computer science, and machine learning to create a device that can perform tasks with a high degree of precision. c. Robotics is a technology using a combination of mechanical engineering, computer science, and machine learning to create a device that can perform tasks with a high degree of precision. d. Robotics is a technology using a combination of mechanical engineering, computer science, and machine learning to create a device that can perform tasks with a high degree of precision.

Copyright Cengage Learning. Powered by Cognero.

Page 53


Chapter 11 - Artificial Intelligence and Automation POINTS: 1 DIFFICULTY: Easy REFERENCES: Robotics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.11 - Briefly explain what comprises a robotic system. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 4:07 PM DATE MODIFIED: 7/14/2020 4:10 PM 78. Manufacturing, healthcare, gaming, and logistics are several areas where we are beginning to see practical applications of _____. a. BCI technology b. robotics c. drones d. intelligent agents ANSWER: b RATIONALE: We are now beginning to see practical applications of robotics in many areas, such as manufacturing, healthcare, gaming, and logistics. FEEDBACK: a. We are now beginning to see practical applications of robotics in many areas, such as manufacturing, healthcare, gaming, and logistics. b. We are now beginning to see practical applications of robotics in many areas, such as manufacturing, healthcare, gaming, and logistics. c. We are now beginning to see practical applications of robotics in many areas, such as manufacturing, healthcare, gaming, and logistics. d. We are now beginning to see practical applications of robotics in many areas, such as manufacturing, healthcare, gaming, and logistics.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Robotics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.11 - Briefly explain what comprises a robotic system. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 4:08 PM DATE MODIFIED: 7/14/2020 4:21 PM 79. Drones that deliver packages, unmanned home vacuum cleaners, and toy dogs that entertain children are all examples of _____. a. domain expert devices b. perceptive systems c. BCI systems d. robots ANSWER: d RATIONALE: We are now beginning to see practical applications of robotics in many areas, such as Copyright Cengage Learning. Powered by Cognero.

Page 54


Chapter 11 - Artificial Intelligence and Automation manufacturing, healthcare, gaming, and logistics. Drones are being used to deliver packages, robots are used to vacuum homes, and toy dogs are entertaining children. FEEDBACK:

a. We are now beginning to see practical applications of robotics in many areas,

such as manufacturing, healthcare, gaming, and logistics. Drones are being used to deliver packages, robots are used to vacuum homes, and toy dogs are entertaining children. b. We are now beginning to see practical applications of robotics in many areas, such as manufacturing, healthcare, gaming, and logistics. Drones are being used to deliver packages, robots are used to vacuum homes, and toy dogs are entertaining children. c. We are now beginning to see practical applications of robotics in many areas, such as manufacturing, healthcare, gaming, and logistics. Drones are being used to deliver packages, robots are used to vacuum homes, and toy dogs are entertaining children. d. We are now beginning to see practical applications of robotics in many areas, such as manufacturing, healthcare, gaming, and logistics. Drones are being used to deliver packages, robots are used to vacuum homes, and toy dogs are entertaining children.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Robotics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.11 - Briefly explain what comprises a robotic system. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 4:08 PM DATE MODIFIED: 7/14/2020 4:25 PM 80. Which 1960s innovation combining mechanical engineering and computer science could perform tasks that involved arranging simple objects and planning routes, and was shown to be able to perceive and reason about its environment? a. Shakey b. ELIZA c. Unimate d. Deep Blue ANSWER: a RATIONALE: In 1966, Shakey the Robot was created. Shakey could perform tasks that involved rearranging simple objects and planning routes. Shakey was shown to have the ability to “perceive and reason about its surroundings, and in 1970, Life magazine referred to it as the “first electronic person.” FEEDBACK: a. In 1966, Shakey the Robot was created. Shakey could perform tasks that involved rearranging simple objects and planning routes. b. In 1966, Shakey the Robot was created. Shakey could perform tasks that involved rearranging simple objects and planning routes. c. In 1966, Shakey the Robot was created. Shakey could perform tasks that involved rearranging simple objects and planning routes. d. In 1966, Shakey the Robot was created. Shakey could perform tasks that involved rearranging simple objects and planning routes.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 55


Chapter 11 - Artificial Intelligence and Automation REFERENCES: Overview of Artificial Intelligence QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.11 - Briefly explain what comprises a robotic system. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 4:08 PM DATE MODIFIED: 7/14/2020 4:31 PM 81. Which statement about industrial robots is true? a. They have the same look and feel as robots for health care industry or household use. b. All industrial robot models are designed to work with humans rather than independently. c. They are designed to achieve and maintain speed, accuracy, and safety. d. There are no common designs among robots used in industrial applications. ANSWER: c RATIONALE: Robots have a different look-and-feel in the industrial world than in healthcare or household products. Industrial robots are designed for speed, accuracy, and safety. The size and look of industrial robots is dependent on the application for which they are designed. Some are large models that work independently, while others are small and designed to work with humans. FEEDBACK: a. Industrial robots are designed for speed, accuracy, and safety. b. Industrial robots are designed for speed, accuracy, and safety. c. Industrial robots are designed for speed, accuracy, and safety. d. Industrial robots are designed for speed, accuracy, and safety. POINTS: 1 DIFFICULTY: Easy REFERENCES: Industrial Robots QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.12 - Describe three types of robots, including the environment in which they operate and the purpose they serve. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 4:39 PM DATE MODIFIED: 7/14/2020 4:47 PM 82. Which of the most common types of industrial robot takes up a smaller footprint and moves in straight lines? a. Cartesian b. SCARA c. articulated d. DARPA ANSWER: a RATIONALE: Cartesian robots take up a smaller space, called a footprint, and move in straight lines. FEEDBACK: a. Cartesian robots take up a smaller space, called a footprint, and move in straight lines. b. Cartesian robots take up a smaller space, called a footprint, and move in straight lines. c. Cartesian robots take up a smaller space, called a footprint, and move in straight

Copyright Cengage Learning. Powered by Cognero.

Page 56


Chapter 11 - Artificial Intelligence and Automation lines.

d. Cartesian robots take up a smaller space, called a footprint, and move in straight lines.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Industrial Robots QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.12 - Describe three types of robots, including the environment in which they operate and the purpose they serve. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 4:40 PM DATE MODIFIED: 7/14/2020 5:00 PM 83. One of the most common applications for Cartesian robots is for _____. a. industrial manufacturing b. autonomous vehicles c. 3D printing d. biomedicine ANSWER: c RATIONALE: One of the most common applications for Cartesian robots is for 3D printing. These robots are easy to program, can be customized for many different projects, and come in different shapes and sizes, based on the needs of the company. 3D printers may be more cube-shaped than other types of robots, based on what they will be printing. FEEDBACK: a. One of the most common applications for Cartesian robots is for 3D printing. b. One of the most common applications for Cartesian robots is for 3D printing. c. One of the most common applications for Cartesian robots is for 3D printing. d. One of the most common applications for Cartesian robots is for 3D printing. POINTS: 1 DIFFICULTY: Easy REFERENCES: Industrial Robots QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.12 - Describe three types of robots, including the environment in which they operate and the purpose they serve. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 4:40 PM DATE MODIFIED: 7/14/2020 5:04 PM 84. Which of the most common types of industrial robots features both a lateral movement and a rotary movement, and is often used in the biomedical field? a. Cartesian b. SCARA c. articulated d. DARPA Copyright Cengage Learning. Powered by Cognero.

Page 57


Chapter 11 - Artificial Intelligence and Automation ANSWER: RATIONALE:

b Selective Compliance Assembly Robot Arm (SCARA) robots are easier to integrate into complex printing designs than Cartesian robots. SCARA robots have both a lateral movement and a rotary movement, and they can move faster than Cartesian models. SCARA robots are often used in the biomedical field because they are faster and have a wider field of movement.

FEEDBACK:

a. SCARA robots have both a lateral movement and a rotary movement, and they can move faster than Cartesian models. SCARA robots are often used in the biomedical field because they are faster and have a wider field of movement. b. SCARA robots have both a lateral movement and a rotary movement, and they can move faster than Cartesian models. SCARA robots are often used in the biomedical field because they are faster and have a wider field of movement. c. SCARA robots have both a lateral movement and a rotary movement, and they can move faster than Cartesian models. SCARA robots are often used in the biomedical field because they are faster and have a wider field of movement. d. SCARA robots have both a lateral movement and a rotary movement, and they can move faster than Cartesian models. SCARA robots are often used in the biomedical field because they are faster and have a wider field of movement.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Industrial Robots QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.12 - Describe three types of robots, including the environment in which they operate and the purpose they serve. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 4:40 PM DATE MODIFIED: 7/14/2020 5:08 PM 85. What is SCARA? a. a decision-making system b. a data processing strategy c. a trial-and-error method d. a type of industrial robot ANSWER: d RATIONALE: Selective Compliance Assembly Robot Arm (SCARA) robots are easier to integrate into complex printing designs than Cartesian robots. SCARA robots have both a lateral movement and a rotary movement, and they can move faster than Cartesian models. SCARA robots are often used in the biomedical field because they are faster and have a wider field of movement. FEEDBACK: a. Selective Compliance Assembly Robot Arm (SCARA) robots are easier to integrate into complex printing designs than Cartesian robots. SCARA robots have both a lateral movement and a rotary movement, and they can move faster than Cartesian models. b. Selective Compliance Assembly Robot Arm (SCARA) robots are easier to integrate into complex printing designs than Cartesian robots. SCARA robots have both a lateral movement and a rotary movement, and they can move faster than Cartesian models. c. Selective Compliance Assembly Robot Arm (SCARA) robots are easier to

Copyright Cengage Learning. Powered by Cognero.

Page 58


Chapter 11 - Artificial Intelligence and Automation integrate into complex printing designs than Cartesian robots. SCARA robots have both a lateral movement and a rotary movement, and they can move faster than Cartesian models. d. Selective Compliance Assembly Robot Arm (SCARA) robots are easier to integrate into complex printing designs than Cartesian robots. SCARA robots have both a lateral movement and a rotary movement, and they can move faster than Cartesian models.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Industrial Robots QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.12 - Describe three types of robots, including the environment in which they operate and the purpose they serve. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 4:40 PM DATE MODIFIED: 7/14/2020 5:10 PM 86. Which of the most common types of industrial robot is made to function like an arm? a. SCARA b. articulated c. DARPA d. Cartesian ANSWER: b RATIONALE: An articulated robot is made to function like an arm. These robots may have ten or more rotary joints that can move up and down like an elbow but that can also twist. FEEDBACK: a. An articulated robot is made to function like an arm. These robots may have ten or more rotary joints that can move up and down like an elbow but that can also twist. b. An articulated robot is made to function like an arm. These robots may have ten or more rotary joints that can move up and down like an elbow but that can also twist. c. An articulated robot is made to function like an arm. These robots may have ten or more rotary joints that can move up and down like an elbow but that can also twist. d. An articulated robot is made to function like an arm. These robots may have ten or more rotary joints that can move up and down like an elbow but that can also twist.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Industrial Robots QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.12 - Describe three types of robots, including the environment in which they operate and the purpose they serve. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 4:40 PM Copyright Cengage Learning. Powered by Cognero.

Page 59


Chapter 11 - Artificial Intelligence and Automation DATE MODIFIED:

7/14/2020 5:14 PM

87. Which type of robot is frequency used in industrial manufacturing settings such as automotive lines because of their quick and precise movements? a. articulated b. Cartesian c. DARPA d. SCARA ANSWER: a RATIONALE: An articulated robot is made to function like an arm. These robots may have ten or more rotary joints that can move up and down like an elbow but that can also twist. Articulated robots are frequently used in industrial manufacturing settings, such as on automotive lines, as they can move quickly and with precision. The unique twisting joints allow articulated robots to accomplish tasks that could be hazardous for humans. FEEDBACK: a. Articulated robots are frequently used in industrial manufacturing settings, such as on automotive lines, as they can move quickly and with precision. b. Articulated robots are frequently used in industrial manufacturing settings, such as on automotive lines, as they can move quickly and with precision. c. Articulated robots are frequently used in industrial manufacturing settings, such as on automotive lines, as they can move quickly and with precision. d. Articulated robots are frequently used in industrial manufacturing settings, such as on automotive lines, as they can move quickly and with precision.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Industrial Robots QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.12 - Describe three types of robots, including the environment in which they operate and the purpose they serve. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 4:40 PM DATE MODIFIED: 7/14/2020 5:17 PM 88. Which industry was one of the first to embrace robotics, and thus operated over 90 percent of all robots in 2005? a. chemicals b. nuclear power c. automotive d. health care ANSWER: c RATIONALE: Robotics, along with AI and machine learning, is being applied in many industries, but the automotive industry was one of the first industries to embrace robotics. At one time, there was fear that robots would take over the auto manufacturing plants and workers would lose their jobs, especially because at the time robots were introduced into the auto industry, they were found very few other industries. In fact, in 2005, over 90 percent of all robots were in the auto industry. FEEDBACK: a. The automotive industry was one of the first industries to embrace robotics. In fact, in 2005, over 90 percent of all robots were in the auto industry.

Copyright Cengage Learning. Powered by Cognero.

Page 60


Chapter 11 - Artificial Intelligence and Automation b. The automotive industry was one of the first industries to embrace robotics. In fact, in 2005, over 90 percent of all robots were in the auto industry.

c. The automotive industry was one of the first industries to embrace robotics. In fact, in 2005, over 90 percent of all robots were in the auto industry. d. The automotive industry was one of the first industries to embrace robotics. In fact, in 2005, over 90 percent of all robots were in the auto industry.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Industry Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.13 - Identify two industry applications of robotics. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 5:17 PM DATE MODIFIED: 7/14/2020 5:23 PM 89. Robots that work with humans on manufacturing lines, handling work that is hard on a person and could cause repetitive injuries, are known as _____. a. Cartesian robots b. da Vinci systems c. SCARA robots d. cobots ANSWER: d RATIONALE: The auto industry has made use of collaborative robots (or “cobots”) to work with humans on the manufacturing lines. Cobots handle work that is hard on a person and could cause repetitive injuries. FEEDBACK: a. The auto industry has made use of collaborative robots (or “cobots”) to work with humans on the manufacturing lines. Cobots handle work that is hard on a person and could cause repetitive injuries. b. The auto industry has made use of collaborative robots (or “cobots”) to work with humans on the manufacturing lines. Cobots handle work that is hard on a person and could cause repetitive injuries. c. The auto industry has made use of collaborative robots (or “cobots”) to work with humans on the manufacturing lines. Cobots handle work that is hard on a person and could cause repetitive injuries. d. The auto industry has made use of collaborative robots (or “cobots”) to work with humans on the manufacturing lines. Cobots handle work that is hard on a person and could cause repetitive injuries.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Industry Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.13 - Identify two industry applications of robotics. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 5:18 PM DATE MODIFIED: 7/14/2020 5:26 PM Copyright Cengage Learning. Powered by Cognero.

Page 61


Chapter 11 - Artificial Intelligence and Automation 90. What sorts of tasks are performed by collaborative robots in automobile manufacturing plants? a. delivering small components b. conducting performance audits c. stacking tires and glueing fabric d. designing and sketching new models ANSWER: c RATIONALE: The cobots handle the dangerous work, leaving the work that requires intelligence to the humans. One plant where cobots are used in Detroit builds three models of cars on one assembly line. According to the plant’s general manager, Marty Linn, cobots perform tasks such as stacking tires and using glue that is heated to a very high temperature to apply fabric to the ceiling of the cars. Both of these jobs can cause injuries, and employees hated being assigned these tasks. FEEDBACK: a. In one plant where cobots are used in Detroit, cobots perform tasks such as stacking tires and using glue that is heated to a very high temperature to apply fabric to the ceiling of the cars. b. In one plant where cobots are used in Detroit, cobots perform tasks such as stacking tires and using glue that is heated to a very high temperature to apply fabric to the ceiling of the cars. c. In one plant where cobots are used in Detroit, cobots perform tasks such as stacking tires and using glue that is heated to a very high temperature to apply fabric to the ceiling of the cars. d. In one plant where cobots are used in Detroit, cobots perform tasks such as stacking tires and using glue that is heated to a very high temperature to apply fabric to the ceiling of the cars.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Industry Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.13 - Identify two industry applications of robotics. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 5:19 PM DATE MODIFIED: 7/14/2020 5:30 PM 91. What is the da Vinci system? a. a robot that handles dangerous manufacturing tasks b. a set of robotic-assisted surgery instruments c. a group of small-footprint robots that move in straight lines d. an artificial intelligence supercomputer ANSWER: b RATIONALE: While it may seem that robotics is new in healthcare, the da Vinci® Surgical System (da Vinci®) has been on the market since 2000. The da Vinci® system allows for minimally invasive surgery by giving the doctors control of instruments via a console. The correct term is robotic-assisted surgery, although some people erroneously believe that the robot is performing the surgery. FEEDBACK: a. The da Vinci® system allows for minimally invasive surgery by giving the doctors control of instruments via a console. The correct term is robotic-assisted surgery,

Copyright Cengage Learning. Powered by Cognero.

Page 62


Chapter 11 - Artificial Intelligence and Automation although some people erroneously believe that the robot is performing the surgery. b. The da Vinci® system allows for minimally invasive surgery by giving the doctors control of instruments via a console. The correct term is robotic-assisted surgery, although some people erroneously believe that the robot is performing the surgery. c. The da Vinci® system allows for minimally invasive surgery by giving the doctors control of instruments via a console. The correct term is robotic-assisted surgery, although some people erroneously believe that the robot is performing the surgery. d. The da Vinci® system allows for minimally invasive surgery by giving the doctors control of instruments via a console. The correct term is robotic-assisted surgery, although some people erroneously believe that the robot is performing the surgery.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Industry Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.13 - Identify two industry applications of robotics. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 5:19 PM DATE MODIFIED: 7/14/2020 6:09 PM 92. Which of the following statements about the current use of robots in pharmacies is accurate? a. They have not been shown to increase efficiency or reduce errors. b. They have begun to replace pharmacists because they can dispense medications. c. They can administer intravenous medications to patients using syringes. d. They can receive orders for intravenous medications and deliver them. ANSWER: d RATIONALE: Many pharmacies now use robots to prepare medications and IV solutions. According to Cerner, a leading EHR provider, robots working in the pharmacy can receive orders to prepare intravenous medication and deliver them, along with the appropriate syringes, to the patient’s floor to be administered. These same robots can dispense and label medication using barcoded inventory. These robots are not replacing pharmacists, as oversight is still needed and human interaction with patients must be available. However, the robots are making pharmacies more efficient and reducing errors during peak volume times. FEEDBACK: a. Robots working in the pharmacy can receive orders to prepare intravenous medication and deliver them, along with the appropriate syringes, to the patient’s floor to be administered. b. Robots working in the pharmacy can receive orders to prepare intravenous medication and deliver them, along with the appropriate syringes, to the patient’s floor to be administered. c. Robots working in the pharmacy can receive orders to prepare intravenous medication and deliver them, along with the appropriate syringes, to the patient’s floor to be administered. d. Robots working in the pharmacy can receive orders to prepare intravenous medication and deliver them, along with the appropriate syringes, to the patient’s floor to be administered.

Copyright Cengage Learning. Powered by Cognero.

Page 63


Chapter 11 - Artificial Intelligence and Automation POINTS: 1 DIFFICULTY: Easy REFERENCES: Industry Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.13 - Identify two industry applications of robotics. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 5:19 PM DATE MODIFIED: 7/14/2020 6:15 PM 93. Applications of robots in the health care setting include _____. a. transporting patient specimens to labs b. performing minor surgeries on patients c. conducting physical examinations d. prescribing and dispensing medications ANSWER: a RATIONALE: One hospital in San Francisco has “delivery robots” that bring lunches to patients and carry specimens to labs. Some of these robots are programmed to use the elevators and open doors to maneuver around the building. The da Vinci® system allows for minimally invasive surgery by giving the doctors control of instruments via a console. The correct term is robotic-assisted surgery, although some people erroneously believe that the robot is performing the surgery. Robots working in the pharmacy can receive orders to prepare intravenous medication and deliver them, along with the appropriate syringes, to the patient’s floor to be administered. These same robots can dispense and label medication using barcoded inventory. FEEDBACK:

a. One hospital in San Francisco has “delivery robots” that bring lunches to patients and carry specimens to labs. b. One hospital in San Francisco has “delivery robots” that bring lunches to patients and carry specimens to labs. c. One hospital in San Francisco has “delivery robots” that bring lunches to patients and carry specimens to labs. d. One hospital in San Francisco has “delivery robots” that bring lunches to patients and carry specimens to labs.

POINTS: DIFFICULTY: REFERENCES:

1 Easy Industry Applications What's Next QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.11.13 - Identify two industry applications of robotics. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 5:19 PM DATE MODIFIED: 7/14/2020 6:19 PM Essay Copyright Cengage Learning. Powered by Cognero.

Page 64


Chapter 11 - Artificial Intelligence and Automation 94. Define the term artificial intelligence system and list the characteristics of intelligent behavior. ANSWER: Artificial intelligence systems include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes, including learning (the acquisition of information and rules for using the information), reasoning (using rules to reach conclusions), and self-correction (using the outcome from one scenario to improve its performance on future scenarios).

RATIONALE:

POINTS: RUBRIC:

The characteristics of intelligent behavior include the ability to: (1) learn from experience and apply the knowledge acquired from experience, (2) handle complex situations, (3) solve problems when important information is missing, (4) determine what is important, (5) react quickly and correctly to a new situation, (6) understand visual images, (7) process and manipulate symbols, (8) be creative and imaginative, and (9) use heuristics. Artificial intelligence systems include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes, including learning (the acquisition of information and rules for using the information), reasoning (using rules to reach conclusions), and self-correction (using the outcome from one scenario to improve its performance on future scenarios). The characteristics of intelligent behavior include the ability to: (1) learn from experience and apply the knowledge acquired from experience, (2) handle complex situations, (3) solve problems when important information is missing, (4) determine what is important, (5) react quickly and correctly to a new situation, (6) understand visual images, (7) process and manipulate symbols, (8) be creative and imaginative, and (9) use heuristics. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Defines artificial intelligence systems Names nine characteristics of intelligent behavior

DIFFICULTY: Easy REFERENCES: Overview of Artificial Intelligence QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.11.1 - Briefly explain the nature of artificial intelligence. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/9/2020 2:22 PM 95. Briefly describe the roles of the inference engine and the explanation facility components of an expert system. ANSWER: The main purpose of an inference engine is to seek information and relationships from the knowledge base and to provide answers, predictions, and suggestions. Inference engines are considered one of the most important components of an expert system, as these predictions and suggestions often take the place of human experts. In other words, the inference engine is the component that delivers the expert advice. Copyright Cengage Learning. Powered by Cognero.

Page 65


Chapter 11 - Artificial Intelligence and Automation

RATIONALE:

POINTS: RUBRIC:

Another important part of an expert system is the explanation facility, which allows a user or decision maker to understand how the expert system arrived at certain conclusions or results. The main purpose of an inference engine is to seek information and relationships from the knowledge base and to provide answers, predictions, and suggestions. Inference engines are considered one of the most important components of an expert system, as these predictions and suggestions often take the place of human experts. In other words, the inference engine is the component that delivers the expert advice. Another important part of an expert system is the explanation facility, which allows a user or decision maker to understand how the expert system arrived at certain conclusions or results. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Describes the purpose of the inference engine in an expert system Describes the purpose of the explanation facility in an expert system

DIFFICULTY: Easy REFERENCES: Expert Systems QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.11.2 - Identify six components of expert systems and explain how they are used. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom’s: Remember DATE CREATED: 11/19/2019 6:01 PM DATE MODIFIED: 7/9/2020 2:26 PM 96. Briefly describe how an artificial neural network trains and operates to provide results. ANSWER: An artificial neural network program is trained through supervised learning, through the machine learning process. Just as a child learns new things, an artificial neural network is programmed to learn from each iteration during the training phase—a process that continues even after the system is implemented. Input is given, and feedback is received. The feedback is used to weight the connections, meaning it takes all the options and assigns the most “points” to the choice with the most feedback. The next iteration looks at the choices and takes the one with the highest weight based on the situation. RATIONALE: An artificial neural network program is trained through supervised learning, through the machine learning process. Just as a child learns new things, an artificial neural network is programmed to learn from each iteration during the training phase—a process that continues even after the system is implemented. Input is given, and feedback is received. The feedback is used to weight the connections, meaning it takes all the options and assigns the most “points” to the choice with the most feedback. The next iteration looks at the choices and takes the one with the highest weight based on the situation. Copyright Cengage Learning. Powered by Cognero.

Page 66


Chapter 11 - Artificial Intelligence and Automation POINTS: RUBRIC:

1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Briefly describes the iterative training and operation of an artificial neural network

DIFFICULTY: Moderate REFERENCES: Artificial Neural Networks QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.11.5 - Describe two strategies used to train artificial neural networks. KEYWORDS: Bloom's: Understand DATE CREATED: 7/10/2020 10:22 AM DATE MODIFIED: 7/10/2020 10:24 AM 97. What is a robot, and what areas of expertise must be combined to produce one? ANSWER: Robotics is a combination of mechanical engineering, computer science, AI, and machine learning used to create a device that can perform tasks with a high degree of precision. Most of these tasks are deemed tedious or dangerous for humans. The idea of robots is not new; cartoons dating back to the 1960s portrayed robotic housekeepers and pets. However, we are now beginning to see practical applications of robotics in many areas, such as manufacturing, healthcare, gaming, and logistics. RATIONALE: Robotics is a combination of mechanical engineering, computer science, AI, and machine learning used to create a device that can perform tasks with a high degree of precision. Most of these tasks are deemed tedious or dangerous for humans. The idea of robots is not new; cartoons dating back to the 1960s portrayed robotic housekeepers and pets. However, we are now beginning to see practical applications of robotics in many areas, such as manufacturing, healthcare, gaming, and logistics. POINTS: 1 RUBRIC: 0 1 2 3 4 Criteria

Failure

Below Expectations

Developing

Competent

Mastery

Describes a robot. Names the fields involved in robotics.

DIFFICULTY: Easy REFERENCES: Robotics QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.11.11 - Briefly explain what comprises a robotic system. KEYWORDS: Bloom's: Remember DATE CREATED: 7/14/2020 4:31 PM Copyright Cengage Learning. Powered by Cognero.

Page 67


Chapter 11 - Artificial Intelligence and Automation DATE MODIFIED:

7/14/2020 4:36 PM

98. Briefly describe two industry applications of robotics. ANSWER: Robotics, along with AI and machine learning, is being applied in many industries, but the automotive industry was one of the first industries to embrace robotics. The auto industry has made use of collaborative robots (or “cobots”) to work with humans on the manufacturing lines. Cobots handle work that is hard on a person and could cause repetitive injuries. These cobots are programmed to work with humans by knowing the environment and moving out of the way when something is blocking their path. The cobots handle the dangerous work, leaving the work that requires intelligence to the humans.

RATIONALE:

POINTS: RUBRIC:

Healthcare is another industry that has seen a rapid rise in the use of robots. While it may seem that robotics is new in healthcare, the da Vinci® Surgical System (da Vinci®) has been on the market since 2000. The da Vinci® system allows for minimally invasive surgery by giving the doctors control of instruments via a console. The correct term is robotic-assisted surgery, although some people erroneously believe that the robot is performing the surgery. The physician works behind a console to control the robotic arms. The jointed arms can twist in ways that human arms cannot, giving the surgeon greater flexibility The console has a 3D high-definition screen, which magnifies the view, so the surgeon often has to make fewer incisions, and the recovery time for the patient is lessened. Robotics, along with AI and machine learning, is being applied in many industries, but the automotive industry was one of the first industries to embrace robotics. The auto industry has made use of collaborative robots (or “cobots”) to work with humans on the manufacturing lines. Cobots handle work that is hard on a person and could cause repetitive injuries. These cobots are programmed to work with humans by knowing the environment and moving out of the way when something is blocking their path. The cobots handle the dangerous work, leaving the work that requires intelligence to the humans. Healthcare is another industry that has seen a rapid rise in the use of robots. While it may seem that robotics is new in healthcare, the da Vinci® Surgical System (da Vinci®) has been on the market since 2000. The da Vinci® system allows for minimally invasive surgery by giving the doctors control of instruments via a console. The correct term is robotic-assisted surgery, although some people erroneously believe that the robot is performing the surgery. The physician works behind a console to control the robotic arms. The jointed arms can twist in ways that human arms cannot, giving the surgeon greater flexibility The console has a 3D high-definition screen, which magnifies the view, so the surgeon often has to make fewer incisions, and the recovery time for the patient is lessened. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Describes two industry applications of robotics.

DIFFICULTY: Moderate REFERENCES: Industry Applications QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.11.13 - Identify two industry applications of robotics. Copyright Cengage Learning. Powered by Cognero.

Page 68


Chapter 11 - Artificial Intelligence and Automation KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 7/14/2020 6:20 PM 7/14/2020 6:23 PM

Copyright Cengage Learning. Powered by Cognero.

Page 69


Chapter 12 - Strategic Planning and Project Management True / False 1. Typically, information systems planning is not tied to overall strategic planning. a. True b. False ANSWER: False RATIONALE: Ever since the dawn of the computer age, business and IS executives have been working to improve the alignment between business and IS as a top business priority. In this context, alignment means that the IS organization and its resources are focused on efforts that support the key objectives defined in the strategic plan of the business. FEEDBACK: Correct Alignment means that the IS organization and its resources are focused on efforts that support the key objectives defined in the strategic plan of the business. Incorrect Alignment means that the IS organization and its resources are focused on efforts that support the key objectives defined in the strategic plan of the business.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Why Learn About Strategic Planning and Project Management? QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.1 - Describe the four phases of a goals-based strategic planning process. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 2:28 PM 2. Strategic planning provides a clearly defined direction to guide decision making at all levels throughout the organization. a. True b. False ANSWER: True RATIONALE: One of the frequently cited benefits of strategic planning is that it provides a framework and a clearly defined direction to guide decision making at all levels throughout the organization. FEEDBACK: Correct One of the frequently cited benefits of strategic planning is that it provides a framework and a clearly defined direction to guide decision making at all levels throughout the organization. Incorrect One of the frequently cited benefits of strategic planning is that it provides a framework and a clearly defined direction to guide decision making at all levels throughout the organization.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Easy Strategic Planning True / False False

Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 12 - Strategic Planning and Project Management LEARNING OBJECTIVES: POIS.14e.12.1 - Describe the four phases of a goals-based strategic planning process. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 2:32 PM 3. Strategic planning does not enable organizational units to participate and work together toward accomplishing a common set of goals. a. True b. False ANSWER: False RATIONALE: One of the frequently cited benefits of strategic planning is that it enables all organizational units to participate and work together toward accomplishing a common set of goals. FEEDBACK: Correct One of the frequently cited benefits of strategic planning is that it enables all organizational units to participate and work together toward accomplishing a common set of goals. Incorrect One of the frequently cited benefits of strategic planning is that it enables all organizational units to participate and work together toward accomplishing a common set of goals.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Strategic Planning QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.1 - Describe the four phases of a goals-based strategic planning process. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 2:34 PM 4. In organizations with more advanced planning processes, strategic planning is focused inward only. a. True b. False ANSWER: False RATIONALE: In some organizations with immature planning processes, strategic planning is an annual process timed to yield results used to prepare the annual expense budget and capital forecast. The process is focused inward, concentrating on the individual needs of various departments. Organizations that are more advanced in their planning processes develop multiple-year plans based on a situational analysis, competitive assessments, consideration of factors external to the organization, and an evaluation of strategic options. FEEDBACK: Correct Organizations that are more advanced in their planning processes develop multiple-year plans based on a situational analysis, competitive assessments, consideration of factors external to the organization, and an evaluation of strategic options. Incorrect Organizations that are more advanced in their planning processes develop Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 12 - Strategic Planning and Project Management multiple-year plans based on a situational analysis, competitive assessments, consideration of factors external to the organization, and an evaluation of strategic options.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Strategic Planning QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.1 - Describe the four phases of a goals-based strategic planning process. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 2:47 PM 5. It is appropriate for Mavis, who is the CEO of an organization, to delegate long-term decisions about the organization to a subordinate. a. True b. False ANSWER: False RATIONALE: The CEO of an organization must make long-term decisions about where the organization is headed and how it will operate and has ultimate responsibility for strategic planning. Subordinates, lower-level managers, and consultants typically gather useful information, perform much of the underlying analysis, and provide valuable input. But the CEO must thoroughly understand the analysis and be heavily involved in setting high-level business objectives and defining strategies. FEEDBACK: Correct The CEO of an organization must make long-term decisions about where the organization is headed and how it will operate and has ultimate responsibility for strategic planning. Incorrect The CEO of an organization must make long-term decisions about where the organization is headed and how it will operate and has ultimate responsibility for strategic planning.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Strategic Planning QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.1 - Describe the four phases of a goals-based strategic planning process. NATIONAL STANDARDS: United States - BUSPROG: Group Dynamics - Group Dynamics KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 2:50 PM 6. A CEO must be heavily involved in setting high-level business objectives and defining strategies. a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 12 - Strategic Planning and Project Management ANSWER: RATIONALE:

True The CEO of an organization must make long-term decisions about where the organization is headed and how it will operate and has ultimate responsibility for strategic planning. Subordinates, lower-level managers, and consultants typically gather useful information, perform much of the underlying analysis, and provide valuable input. But the CEO must thoroughly understand the analysis and be heavily involved in setting high-level business objectives and defining strategies.

FEEDBACK:

Correct

Subordinates, lower-level managers, and consultants typically gather useful information, perform much of the underlying analysis, and provide valuable input. But the CEO must thoroughly understand the analysis and be heavily involved in setting high-level business objectives and defining strategies Incorrect Subordinates, lower-level managers, and consultants typically gather useful information, perform much of the underlying analysis, and provide valuable input. But the CEO must thoroughly understand the analysis and be heavily involved in setting high-level business objectives and defining strategies

POINTS: 1 DIFFICULTY: Easy REFERENCES: Strategic Planning QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.1 - Describe the four phases of a goals-based strategic planning process. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 2:51 PM 7. Organic strategic planning defines the organization’s vision and values and then identifies projects and initiatives that will achieve the vision while adhering to the values. a. True b. False ANSWER: True RATIONALE: Organic strategic planning defines the organization’s vision and values and then identifies projects and initiatives to achieve the vision while adhering to the values. FEEDBACK: Correct Organic strategic planning defines the organization’s vision and values and then identifies projects and initiatives to achieve the vision while adhering to the values. Incorrect Organic strategic planning defines the organization’s vision and values and then identifies projects and initiatives to achieve the vision while adhering to the values.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Strategic Planning QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.1 - Describe the four phases of a goals-based strategic planning process. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 12 - Strategic Planning and Project Management KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 11/19/2019 5:55 PM 7/15/2020 2:53 PM

8. Suppose the industry your business is in has 10 buyers but 50 sellers. This means there is a low bargaining power of buyers. a. True b. False ANSWER: False RATIONALE: The bargaining power of buyers determines prices and long-term profitability. This bargaining power is stronger when there are relatively few buyers but many sellers in the industry or when the products offered are all essentially the same. The bargaining power of suppliers can significantly affect the industry’s profitability. Suppliers have strong bargaining power in industries that have many buyers and only a few dominant suppliers and in industries that do not represent a key customer group for suppliers. FEEDBACK: Correct The bargaining power of buyers is stronger when there are relatively few buyers but many sellers in the industry or when the products offered are all essentially the same. Incorrect The bargaining power of buyers is stronger when there are relatively few buyers but many sellers in the industry or when the products offered are all essentially the same.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Analyze Situation QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.1 - Describe the four phases of a goals-based strategic planning process. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 2:56 PM 9. The degree of rivalry between competitors is low in industries with many equally sized competitors or little differentiation between products. a. True b. False ANSWER: False RATIONALE: The degree of rivalry between competitors is high in industries with many equally sized competitors or little differentiation between products. FEEDBACK: Correct The degree of rivalry between competitors is high in industries with many equally sized competitors or little differentiation between products. Incorrect The degree of rivalry between competitors is high in industries with many equally sized competitors or little differentiation between products.

POINTS: DIFFICULTY: REFERENCES:

1 Easy Analyze Situation

Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 12 - Strategic Planning and Project Management QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.1 - Describe the four phases of a goals-based strategic planning process. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 2:58 PM 10. If a company considers its IS organization as a cost center or service provider, then the IS organization's strategic planning will be inward focused. a. True b. False ANSWER: True RATIONALE: The strategic planning process for the IS organization and the factors that influence it depend on how the organization is perceived by the rest of the organization. An IS organization can be viewed as a cost center/service provider, a business partner/business peer, or as a game changer. When the IS organization is viewed as a cost center/service provider, the strategic planning focus is inward looking. FEEDBACK: Correct When the IS organization is viewed as a cost center/service provider, the strategic planning focus is inward looking. Incorrect When the IS organization is viewed as a cost center/service provider, the strategic planning focus is inward looking.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Setting the Information System Organizational Strategy QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.3 - Outline a process for prioritizing IS projects and initiatives. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 3:01 PM 11. An increase in customer satisfaction is considered a tangible benefit. a. True b. False ANSWER: False RATIONALE: Tangible benefits can be measured directly and assigned a monetary value. For example, the number of staff before and after the completion of an initiative can be measured, and the monetary value is the decrease in staffing costs, such as salary, benefits, and overhead. Intangible benefits cannot directly be measured and cannot easily be quantified in monetary terms. For example, an increase in customer satisfaction due to an initiative is important but is difficult to measure and cannot easily be converted into a monetary value. FEEDBACK: Correct Intangible benefits cannot directly be measured and cannot easily be quantified in monetary terms. For example, an increase in customer satisfaction due to an initiative is important but is difficult to measure and cannot easily be converted Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 12 - Strategic Planning and Project Management into a monetary value. Incorrect Intangible benefits cannot directly be measured and cannot easily be quantified in monetary terms. For example, an increase in customer satisfaction due to an initiative is important but is difficult to measure and cannot easily be converted into a monetary value.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Prioritizing IS Projects and Initiatives QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.3 - Outline a process for prioritizing IS projects and initiatives. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 3:04 PM 12. If a company considers its IS organization to be a game changer, then its strategy would be to use IS to achieve a competitive advantage. a. True b. False ANSWER: True RATIONALE: The strategic planning process for the IS organization and the factors that influence it depend on how the organization is perceived by the rest of the organization. An IS organization can be viewed as a cost center/service provider, a business partner/business peer, or as a game changer. When an IS organization is viewed as a game changer, the IS strategy is to use IS to achieve a competitive advantage. FEEDBACK: Correct When an IS organization is viewed as a game changer, the IS strategy is to use IS to achieve a competitive advantage. Incorrect When an IS organization is viewed as a game changer, the IS strategy is to use IS to achieve a competitive advantage.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Setting the Information System Organizational Strategy QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.3 - Outline a process for prioritizing IS projects and initiatives. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 3:07 PM 13. If you wish to work as an IS professional in a construction business, it does not matter if you cannot communicate with the business managers in their business terms. a. True b. False ANSWER: False Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 12 - Strategic Planning and Project Management RATIONALE:

According to the Project Management Institute (PMI), project managers must coordinate 10 areas of expertise: scope, schedule, cost, quality, resource, communications, risk, procurement, integration, and stakeholder management. Communications management involves the generation, collection, dissemination, and storage of project information in a timely and effective manner. It includes communications planning, information distribution, performance reporting, and managing communications to meet the needs of project shareholders. The key stakeholders include the project steering team, the team itself, end users, and others who may be affected by the project (potentially customers or suppliers).

FEEDBACK:

Correct

Communications management involves the generation, collection, dissemination, and storage of project information in a timely and effective manner. It includes managing communications to meet the needs of project shareholders. The key stakeholders include the project steering team, the team itself, end users, and others who may be affected by the project (potentially customers or suppliers). Incorrect Communications management involves the generation, collection, dissemination, and storage of project information in a timely and effective manner. It includes managing communications to meet the needs of project shareholders. The key stakeholders include the project steering team, the team itself, end users, and others who may be affected by the project (potentially customers or suppliers).

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Project Management Knowledge Areas QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.6 - Briefly discuss the 10 knowledge areas associated with the science of project management. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 3:12 PM 14. According to a study by the Standish Group, approximately 70% of IS projects fail outright. a. True b. False ANSWER: False RATIONALE: Unfortunately, IS-related projects are not always successful. The Standish Group has been tracking the success rate of IS projects for over 20 years, and although the success rate has improved over time due to improved methods, training, and tools, roughly 14 percent of all IS projects fail outright, but many more face major challenges such as lateness, budget overruns, and lack of required features. FEEDBACK: Correct The Standish Group has been tracking the success rate of IS projects for over 20 years, and although the success rate has improved over time due to improved methods, training, and tools, roughly 14 percent of all IS projects fail outright. Incorrect The Standish Group has been tracking the success rate of IS projects for over 20 years, and although the success rate has improved over time due to improved methods, training, and tools, roughly 14 percent of all IS projects fail outright.

POINTS: DIFFICULTY: REFERENCES:

1 Easy Project Management

Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 12 - Strategic Planning and Project Management QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.4 - Discuss why project management is considered to be a core competency for many organizations. NATIONAL STANDARDS: United States - BUSPROG: Group Dynamics - Group Dynamics KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 3:16 PM 15. Employee salary is considered a capital item. a. True b. False ANSWER: False RATIONALE: Capital is money spent to purchase assets that appear on the organization’s balance sheet and are depreciated over the life of the asset. Many organizations use a system of internal cross-charges to account for the cost of employees assigned to a project. FEEDBACK: Correct Capital is money spent to purchase assets that appear on the organization’s balance sheet and are depreciated over the life of the asset. Many organizations use a system of internal cross-charges to account for the cost of employees assigned to a project. Incorrect Capital is money spent to purchase assets that appear on the organization’s balance sheet and are depreciated over the life of the asset. Many organizations use a system of internal cross-charges to account for the cost of employees assigned to a project.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Variables QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.5 - Identify the five highly interrelated parameters that define a project. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 3:20 PM 16. Money from the budget for one type of cost cannot be used to pay for an item associated with another type of cost. a. True b. False ANSWER: True RATIONALE: Organizations have different processes and mechanisms for budgeting and controlling each of the three types of costs: capital, expense, and internal cross-charge. Money from the budget for one type of cost cannot be used to pay for an item associated with another type of cost. FEEDBACK: Correct Organizations have different processes and mechanisms for budgeting and controlling each of the three types of costs: capital, expense, and internal crosscharge. Money from the budget for one type of cost cannot be used to pay for an Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 12 - Strategic Planning and Project Management item associated with another type of cost. Incorrect Organizations have different processes and mechanisms for budgeting and controlling each of the three types of costs: capital, expense, and internal crosscharge. Money from the budget for one type of cost cannot be used to pay for an item associated with another type of cost.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Variables QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.5 - Identify the five highly interrelated parameters that define a project. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 3:22 PM 17. You are involved in an information systems project. The project's scope has widened, but there is no change in the cost, quality, or user expectations. This will result in an increase in time taken to complete the project. a. True b. False ANSWER: True RATIONALE: Five highly interrelated parameters define a project—scope, cost, time, quality, and user expectations. If any one of these parameters changes for a project, there must be a corresponding change in one or more of the other parameters. FEEDBACK: Correct Five highly interrelated parameters define a project—scope, cost, time, quality, and user expectations. If any one of these parameters changes for a project, there must be a corresponding change in one or more of the other parameters. Incorrect Five highly interrelated parameters define a project—scope, cost, time, quality, and user expectations. If any one of these parameters changes for a project, there must be a corresponding change in one or more of the other parameters.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Project Variables QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.5 - Identify the five highly interrelated parameters that define a project. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 3:28 PM 18. Project management is the application of knowledge, skills, and techniques to project activities so that the allotted budget can be spent. a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 12 - Strategic Planning and Project Management ANSWER: RATIONALE:

False Project management is the application of knowledge, skills, and techniques to project activities to meet project requirements.

FEEDBACK:

Correct

Project management is the application of knowledge, skills, and techniques to project activities to meet project requirements. Incorrect Project management is the application of knowledge, skills, and techniques to project activities to meet project requirements.

POINTS: 1 DIFFICULTY: Easy REFERENCES: What Is Project Management? QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.4 - Discuss why project management is considered to be a core competency for many organizations. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 3:30 PM 19. All software licenses qualify as capital expenses. a. True b. False ANSWER: False RATIONALE: Computer software also can be classified as a capital item if it costs more than $1000 per unit, has a useful life exceeding one year, and is not used for research and development. Software that does not meet the criteria to be classified as a capital item is classified as an expense item. FEEDBACK: Correct Computer software also can be classified as a capital item if it costs more than $1000 per unit, has a useful life exceeding one year, and is not used for research and development. Software that does not meet the criteria to be classified as a capital item is classified as an expense item. Incorrect Computer software also can be classified as a capital item if it costs more than $1000 per unit, has a useful life exceeding one year, and is not used for research and development. Software that does not meet the criteria to be classified as a capital item is classified as an expense item.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Variables QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.5 - Identify the five highly interrelated parameters that define a project. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 3:33 PM Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 12 - Strategic Planning and Project Management 20. Quality management is the set of activities designed to make the most effective use of the people involved with a project. a. True b. False ANSWER: False RATIONALE: Quality management is a set of activities designed to ensure that a project will meet the needs for which it was undertaken. FEEDBACK: Correct Quality management is a set of activities designed to ensure that a project will meet the needs for which it was undertaken. Incorrect Quality management is a set of activities designed to ensure that a project will meet the needs for which it was undertaken.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Management Knowledge Areas QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.6 - Briefly discuss the 10 knowledge areas associated with the science of project management. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 3:36 PM 21. A senior manager from the business unit most affected by a project and who ensures the project will indeed meet the needs of his or her organization is known as the project sponsor. a. True b. False ANSWER: True RATIONALE: The three key members of the steering team include: (1) the project champion, who is a well-respected manager with a passion to see the project succeed and who removes barriers to the success of the project; (2) the project sponsor, who is a senior manager from the business unit most affected by the project and who ensures the project will indeed meet the needs of his or her organization; and (3) the IS manager, who ensures proper IS staffing for the project and ensures the project uses approved technology and vendors. FEEDBACK: Correct The project sponsor is a senior manager from the business unit most affected by the project and who ensures the project will indeed meet the needs of his or her organization. Incorrect The project sponsor is a senior manager from the business unit most affected by the project and who ensures the project will indeed meet the needs of his or her organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Management Knowledge Areas QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.6 - Briefly discuss the 10 knowledge areas associated with the science of project management. Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 12 - Strategic Planning and Project Management NATIONAL STANDARDS: KEYWORDS: DATE CREATED: DATE MODIFIED:

United States - BUSPROG: Group Dynamics - Group Dynamics Bloom's: Remember 11/19/2019 5:55 PM 7/15/2020 3:39 PM

22. A Gantt chart is a graphical tool used for planning, monitoring, and coordinating projects; it is essentially a grid that lists activities and deadlines. a. True b. False ANSWER: True RATIONALE: A Gantt chart is a graphical tool used for planning, monitoring, and coordinating projects; it is essentially a grid drawn on a timescale that lists activities and deadlines. FEEDBACK: Correct A Gantt chart is a graphical tool used for planning, monitoring, and coordinating projects; it is essentially a grid drawn on a timescale that lists activities and deadlines. Incorrect A Gantt chart is a graphical tool used for planning, monitoring, and coordinating projects; it is essentially a grid drawn on a timescale that lists activities and deadlines.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Management Knowledge Areas QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.6 - Briefly discuss the 10 knowledge areas associated with the science of project management. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 3:41 PM 23. Your iPhone app project team has determined that the marketing campaign for the project can be delayed a bit without delaying the entire project. So, technically, the marketing campaign is part of the critical path of the project. a. True b. False ANSWER: False RATIONALE: The critical path of a project consists of the set of project activities that, if delayed, would delay the entire project. FEEDBACK: Correct The critical path of a project consists of the set of project activities that, if delayed, would delay the entire project. Incorrect The critical path of a project consists of the set of project activities that, if delayed, would delay the entire project.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Moderate Project Management Knowledge Areas True / False False

Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 12 - Strategic Planning and Project Management LEARNING OBJECTIVES: POIS.14e.12.6 - Briefly discuss the 10 knowledge areas associated with the science of project management. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 3:43 PM 24. Suppose there is a high probability that the user interface design for a project will not meet the quality requirements. In addition, this design will potentially have a significant impact on the project as a whole. It is advisable to assign a risk owner for this part of the project. a. True b. False ANSWER: True RATIONALE: Risks with a high probability of occurrence and a high potential impact need to have a risk owner assigned. The risk owner is responsible for developing a risk management strategy and monitoring the project to determine if the risk is about to occur or has occurred. FEEDBACK: Correct Risks with a high probability of occurrence and a high potential impact need to have a risk owner assigned. Incorrect Risks with a high probability of occurrence and a high potential impact need to have a risk owner assigned.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Project Management Knowledge Areas QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.6 - Briefly discuss the 10 knowledge areas associated with the science of project management. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 3:53 PM 25. As a project manager, you would use the stakeholder analysis matrix to manage communications with external entities such as customers, vendors, and regulatory bodies. a. True b. False ANSWER: False RATIONALE: In preparing a communications plan, the project manager should recognize that the various project stakeholders have different information needs. A useful tool for identifying and documenting these needs is the stakeholder analysis matrix. The key stakeholders include the project steering team, the team itself, end users, and others who may be affected by the project. FEEDBACK: Correct In preparing a communications plan, the project manager should recognize that the various project stakeholders have different information needs. A useful tool for identifying and documenting these needs is the stakeholder analysis matrix. The key stakeholders include the project steering team, the team itself, end users, and others who may be affected by the project. Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 12 - Strategic Planning and Project Management Incorrect In preparing a communications plan, the project manager should recognize that the various project stakeholders have different information needs. A useful tool for identifying and documenting these needs is the stakeholder analysis matrix. The key stakeholders include the project steering team, the team itself, end users, and others who may be affected by the project.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Project Management Knowledge Areas QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.6 - Briefly discuss the 10 knowledge areas associated with the science of project management. NATIONAL STANDARDS: United States - BUSPROG: Group Dynamics - Group Dynamics KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 3:58 PM 26. Project integration management is perhaps the most important knowledge area because it requires the assimilation of all nine other project management knowledge areas. a. True b. False ANSWER: True RATIONALE: Project integration management is perhaps the most important knowledge area because it requires the assimilation of all nine other project management knowledge areas. FEEDBACK: Correct Project integration management is perhaps the most important knowledge area because it requires the assimilation of all nine other project management knowledge areas. Incorrect Project integration management is perhaps the most important knowledge area because it requires the assimilation of all nine other project management knowledge areas.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Management Knowledge Areas QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.6 - Briefly discuss the 10 knowledge areas associated with the science of project management. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 4:01 PM Multiple Choice 27. Which of the five forces in Michael Porter's model is determined by entry barriers such as the capital required? a. threat of new competitors b. buyers' bargaining power Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 12 - Strategic Planning and Project Management c. suppliers' bargaining power d. rivalry between competitors ANSWER: a RATIONALE: The threat of new competitors will raise the level of competition. Entry barriers determine the relative threat of new competitors. These barriers include the capital required to enter the industry and the cost to customers to switch to a competitor. FEEDBACK: a. The threat of new competitors will raise the level of competition. Entry barriers determine the relative threat of new competitors. These barriers include the capital required to enter the industry and the cost to customers to switch to a competitor. b. The threat of new competitors will raise the level of competition. Entry barriers determine the relative threat of new competitors. These barriers include the capital required to enter the industry and the cost to customers to switch to a competitor. c. The threat of new competitors will raise the level of competition. Entry barriers determine the relative threat of new competitors. These barriers include the capital required to enter the industry and the cost to customers to switch to a competitor. d. The threat of new competitors will raise the level of competition. Entry barriers determine the relative threat of new competitors. These barriers include the capital required to enter the industry and the cost to customers to switch to a competitor.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze Situation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.1 - Describe the four phases of a goals-based strategic planning process. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 4:09 PM 28. Which type of strategic planning begins by identifying and analyzing key problems facing the organization, setting strategies to address those problems, and identifying projects and initiatives that are consistent with those strategies? a. issues-based strategic planning b. organic strategic planning c. goals-based strategic planning d. This does not describe any of the major strategic planning approaches. ANSWER: a RATIONALE: Issues-based strategic planning begins by identifying and analyzing key issues facing the organization, setting strategies to address those issues, and identifying projects and initiatives that are consistent with those strategies. FEEDBACK: a. Issues-based strategic planning begins by identifying and analyzing key issues facing the organization, setting strategies to address those issues, and identifying projects and initiatives that are consistent with those strategies. b. Issues-based strategic planning begins by identifying and analyzing key issues

Copyright Cengage Learning. Powered by Cognero.

Page 16


Chapter 12 - Strategic Planning and Project Management facing the organization, setting strategies to address those issues, and identifying projects and initiatives that are consistent with those strategies. c. Issues-based strategic planning begins by identifying and analyzing key issues facing the organization, setting strategies to address those issues, and identifying projects and initiatives that are consistent with those strategies. d. Issues-based strategic planning begins by identifying and analyzing key issues facing the organization, setting strategies to address those issues, and identifying projects and initiatives that are consistent with those strategies.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Strategic Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.1 - Describe the four phases of a goals-based strategic planning process. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 4:13 PM 29. Which of the following tasks is the first step in goals-based strategic planning? a. define strategies b. set direction c. deploy plan d. analyze situation ANSWER: d RATIONALE: The major phases in goals-based strategic planning are (1) analyze situation, (2) set direction, (3) define strategies, and (4) deploy plan. FEEDBACK: a. The major phases in goals-based strategic planning are (1) analyze situation, (2) set direction, (3) define strategies, and (4) deploy plan. b. The major phases in goals-based strategic planning are (1) analyze situation, (2) set direction, (3) define strategies, and (4) deploy plan. c. The major phases in goals-based strategic planning are (1) analyze situation, (2) set direction, (3) define strategies, and (4) deploy plan. d. The major phases in goals-based strategic planning are (1) analyze situation, (2) set direction, (3) define strategies, and (4) deploy plan.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Strategic Planning QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.1 - Describe the four phases of a goals-based strategic planning process. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM Copyright Cengage Learning. Powered by Cognero.

Page 17


Chapter 12 - Strategic Planning and Project Management DATE MODIFIED:

7/15/2020 4:15 PM

30. What topics are considered so important that they are placed on top of the strategic planning pyramid? a. goals, strategies, and initiatives b. programs and projects c. objectives d. mission and vision ANSWER: d RATIONALE: The strategic planning pyramid is a top-down approach to identify initiatives, programs, and projects that are well-suited for the organization. The organization’s vision/mission statement forms a foundation for making decisions and taking action, and thus these topics are placed at the top of the strategic planning pyramid. FEEDBACK: a. The organization’s vision/mission statement forms a foundation for making decisions and taking action, and thus these topics are placed at the top of the strategic planning pyramid. b. The organization’s vision/mission statement forms a foundation for making decisions and taking action, and thus these topics are placed at the top of the strategic planning pyramid. c. The organization’s vision/mission statement forms a foundation for making decisions and taking action, and thus these topics are placed at the top of the strategic planning pyramid. d. The organization’s vision/mission statement forms a foundation for making decisions and taking action, and thus these topics are placed at the top of the strategic planning pyramid.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Set Direction QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.2 - Discuss how the seven layers of the strategic planning pyramid can improve the planning process. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 4:20 PM 31. The organization's _____ is typically stated in a challenging manner to inspire employees, customers, and shareholders. a. vision statement b. mission statement c. objective d. goal ANSWER: b RATIONALE: The mission statement concisely defines the organization’s fundamental purpose for existing. It usually is stated in a challenging manner to inspire employees, customers, and shareholders. FEEDBACK: a. The mission statement concisely defines the organization’s fundamental Copyright Cengage Learning. Powered by Cognero.

Page 18


Chapter 12 - Strategic Planning and Project Management purpose for existing. It usually is stated in a challenging manner to inspire employees, customers, and shareholders. b. The mission statement concisely defines the organization’s fundamental purpose for existing. It usually is stated in a challenging manner to inspire employees, customers, and shareholders. c. The mission statement concisely defines the organization’s fundamental purpose for existing. It usually is stated in a challenging manner to inspire employees, customers, and shareholders. d. The mission statement concisely defines the organization’s fundamental purpose for existing. It usually is stated in a challenging manner to inspire employees, customers, and shareholders.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Set Direction QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.2 - Discuss how the seven layers of the strategic planning pyramid can improve the planning process. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 4:23 PM 32. The use of so-called SMART goals has long been advocated by management consultants. What does the M in SMART stand for? a. measurable b. managed c. multifaceted d. mature ANSWER: a RATIONALE: The SMART acronym stands for: specific, measurable, achievable, relevant, and time constrained. FEEDBACK: a. The SMART acronym stands for: specific, measurable, achievable, relevant, and time constrained. b. The SMART acronym stands for: specific, measurable, achievable, relevant, and time constrained. c. The SMART acronym stands for: specific, measurable, achievable, relevant, and time constrained. d. The SMART acronym stands for: specific, measurable, achievable, relevant, and time constrained.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Set Direction QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.2 - Discuss how the seven layers of the strategic planning pyramid can improve the planning process. Copyright Cengage Learning. Powered by Cognero.

Page 19


Chapter 12 - Strategic Planning and Project Management NATIONAL STANDARDS: KEYWORDS: DATE CREATED: DATE MODIFIED:

United States - BUSPROG: Strategy - Strategy Bloom's: Remember 11/19/2019 5:55 PM 7/15/2020 4:26 PM

33. A core _____ is a widely accepted principle that guides how employees behave and make decisions in the organization. a. strategy b. value c. objective d. goal ANSWER: b RATIONALE: A core value is a widely accepted principle that guides how people behave and make decisions in the organization. FEEDBACK: a. A core value is a widely accepted principle that guides how people behave and make decisions in the organization. b. A core value is a widely accepted principle that guides how people behave and make decisions in the organization. c. A core value is a widely accepted principle that guides how people behave and make decisions in the organization. d. A core value is a widely accepted principle that guides how people behave and make decisions in the organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Set Direction QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.2 - Discuss how the seven layers of the strategic planning pyramid can improve the planning process. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 4:28 PM 34. Which Internet business lists "You can make money without doing evil" as one of its values? a. Microsoft b. Yahoo c. eBay d. Google ANSWER: d RATIONALE: One of Google’s values is: You can make money without doing evil. FEEDBACK: a. One of Google’s values is: You can make money without doing evil. b. One of Google’s values is: You can make money without doing evil. c. One of Google’s values is: You can make money without doing evil. d. One of Google’s values is: You can make money without doing evil. Copyright Cengage Learning. Powered by Cognero.

Page 20


Chapter 12 - Strategic Planning and Project Management POINTS: 1 DIFFICULTY: Easy REFERENCES: Set Direction QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.2 - Discuss how the seven layers of the strategic planning pyramid can improve the planning process. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 4:31 PM 35. Suppose a goal your employer sets reads as "95% of our customers will be happy with our latest software upgrade within 1 month of its release." For which of the following characteristics is this goal inadequate? a. time constrained b. measurable c. achievable d. relevant ANSWER: b RATIONALE: Goals that are measurable include numeric or descriptive measures that define criteria such as quantity, quality, and cost so that progress toward meeting the goal can be determined. The parameters used to measure customer happiness are not adequately defined by this goal. FEEDBACK: a. Goals that are measurable include numeric or descriptive measures that define criteria such as quantity, quality, and cost so that progress toward meeting the goal can be determined. The parameters used to measure customer happiness are not adequately defined by this goal. b. Goals that are measurable include numeric or descriptive measures that define criteria such as quantity, quality, and cost so that progress toward meeting the goal can be determined. The parameters used to measure customer happiness are not adequately defined by this goal. c. Goals that are measurable include numeric or descriptive measures that define criteria such as quantity, quality, and cost so that progress toward meeting the goal can be determined. The parameters used to measure customer happiness are not adequately defined by this goal. d. Goals that are measurable include numeric or descriptive measures that define criteria such as quantity, quality, and cost so that progress toward meeting the goal can be determined. The parameters used to measure customer happiness are not adequately defined by this goal.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Set Direction QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.2 - Discuss how the seven layers of the strategic planning pyramid can improve the planning process. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Application Copyright Cengage Learning. Powered by Cognero.

Page 21


Chapter 12 - Strategic Planning and Project Management DATE CREATED: DATE MODIFIED:

11/19/2019 5:55 PM 7/15/2020 4:37 PM

36. Your new employer wishes to use strategic planning to grow the business. Which of the following would you advise is the most essential task? a. create a vision/mission statement b. plan several new initiatives c. list the business objectives d. define the yearly goals ANSWER: a RATIONALE: Senior management must create a vision/mission statement that communicates an organization’s overarching aspirations to guide it through changing objectives, goals, and strategies. Mission and vision top the strategic planning pyramid. FEEDBACK: a. Senior management must create a vision/mission statement that communicates an organization’s overarching aspirations to guide it through changing objectives, goals, and strategies. Mission and vision top the strategic planning pyramid. b. Senior management must create a vision/mission statement that communicates an organization’s overarching aspirations to guide it through changing objectives, goals, and strategies. Mission and vision top the strategic planning pyramid. c. Senior management must create a vision/mission statement that communicates an organization’s overarching aspirations to guide it through changing objectives, goals, and strategies. Mission and vision top the strategic planning pyramid. d. Senior management must create a vision/mission statement that communicates an organization’s overarching aspirations to guide it through changing objectives, goals, and strategies. Mission and vision top the strategic planning pyramid.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Set Direction QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.2 - Discuss how the seven layers of the strategic planning pyramid can improve the planning process. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 4:48 PM 37. Which of the following does NOT strongly influence an IS organization's strategic planning? a. government regulations b. innovative thinking c. technology innovations d. business unit objectives ANSWER: a RATIONALE: The strategic plan of the information system (IS) organization must identify those Copyright Cengage Learning. Powered by Cognero.

Page 22


Chapter 12 - Strategic Planning and Project Management technologies, vendors, competencies, people, systems, and projects in which the organization will invest to support the corporate and business unit objectives, goals, and strategies. The IS strategic plan is strongly influenced by new technology innovations (e.g., increasingly more powerful mobile devices, advanced printers that can generate threedimensional objects from a digital file, access to shared computer resources over the Internet, and advanced software that can analyze large amounts of structured and unstructured data) and innovative thinking by others both inside and outside the organization. FEEDBACK:

a. The strategic plan of the information system (IS) organization must identify

those technologies, vendors, competencies, people, systems, and projects in which the organization will invest to support the corporate and business unit objectives, goals, and strategies. The IS strategic plan is strongly influenced by new technology innovations and innovative thinking by others both inside and outside the organization. b. The strategic plan of the information system (IS) organization must identify those technologies, vendors, competencies, people, systems, and projects in which the organization will invest to support the corporate and business unit objectives, goals, and strategies. The IS strategic plan is strongly influenced by new technology innovations and innovative thinking by others both inside and outside the organization. c. The strategic plan of the information system (IS) organization must identify those technologies, vendors, competencies, people, systems, and projects in which the organization will invest to support the corporate and business unit objectives, goals, and strategies. The IS strategic plan is strongly influenced by new technology innovations and innovative thinking by others both inside and outside the organization. d. The strategic plan of the information system (IS) organization must identify those technologies, vendors, competencies, people, systems, and projects in which the organization will invest to support the corporate and business unit objectives, goals, and strategies. The IS strategic plan is strongly influenced by new technology innovations and innovative thinking by others both inside and outside the organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Setting the Information System Organizational Strategy QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.3 - Outline a process for prioritizing IS projects and initiatives. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 4:52 PM 38. Which type of IS project has the highest risk of failure? a. mandatory b. breakthrough c. enhancement d. maintenance ANSWER: b RATIONALE: Most organizations find it useful to classify various potential IS projects by type. One IS Copyright Cengage Learning. Powered by Cognero.

Page 23


Chapter 12 - Strategic Planning and Project Management project classification system categorizes projects as breakthrough, growth, innovation, enhancement, maintenance, or mandatory projects. Breakthrough projects carry a very high risk of failure and potential business disruption. FEEDBACK:

a. One IS project classification system categorizes projects as breakthrough,

growth, innovation, enhancement, maintenance, or mandatory projects. Breakthrough projects carry a very high risk of failure and potential business disruption. b. One IS project classification system categorizes projects as breakthrough, growth, innovation, enhancement, maintenance, or mandatory projects. Breakthrough projects carry a very high risk of failure and potential business disruption. c. One IS project classification system categorizes projects as breakthrough, growth, innovation, enhancement, maintenance, or mandatory projects. Breakthrough projects carry a very high risk of failure and potential business disruption. d. One IS project classification system categorizes projects as breakthrough, growth, innovation, enhancement, maintenance, or mandatory projects. Breakthrough projects carry a very high risk of failure and potential business disruption.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Identifying IS Projects and Initiatives QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.3 - Outline a process for prioritizing IS projects and initiatives. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 4:55 PM 39. If an organization considers its IS organization a cost center or service provider, then one of its primary IS goals would be to _____. a. reach new customers b. expand IS services c. make IS investments to deliver new products and services d. reduce IS costs ANSWER: d RATIONALE: The strategic planning process for the IS organization and the factors that influence it depend on how the organization is perceived by the rest of the organization. An IS organization can be viewed as a cost center/service provider, a business partner/business peer, or as a game changer. When an IS organization is viewed as a cost center/service provider, the IS goals are to reduce IS costs and improve IS services. FEEDBACK: a. When an IS organization is viewed as a cost center/service provider, the IS goals are to reduce IS costs and improve IS services. b. When an IS organization is viewed as a cost center/service provider, the IS goals are to reduce IS costs and improve IS services. c. When an IS organization is viewed as a cost center/service provider, the IS goals are to reduce IS costs and improve IS services. d. When an IS organization is viewed as a cost center/service provider, the IS

Copyright Cengage Learning. Powered by Cognero.

Page 24


Chapter 12 - Strategic Planning and Project Management goals are to reduce IS costs and improve IS services.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Setting the Information System Organizational Strategy QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.3 - Outline a process for prioritizing IS projects and initiatives. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 4:59 PM 40. The percentage of CIOs surveyed who would describe their IS strategy as inward focused to deliver their services cheaper, faster, and better is _____. a. 11% b. 32% c. 59% d. 78% ANSWER: b RATIONALE: In a recent survey of CIOs, 32 percent said that their IS organization is viewed as a cost center/service provider that is expected to reduce IS costs and improve IS services. The strategic planning process for such an organization is typically directed inward and focused on determining how to do what it is currently doing but cheaper, faster, and better. FEEDBACK: a. In a recent survey of CIOs, 32 percent said that their IS organization is viewed as a cost center/service provider that is expected to reduce IS costs and improve IS services. The strategic planning process for such an organization is typically directed inward and focused on determining how to do what it is currently doing but cheaper, faster, and better. b. In a recent survey of CIOs, 32 percent said that their IS organization is viewed as a cost center/service provider that is expected to reduce IS costs and improve IS services. The strategic planning process for such an organization is typically directed inward and focused on determining how to do what it is currently doing but cheaper, faster, and better. c. In a recent survey of CIOs, 32 percent said that their IS organization is viewed as a cost center/service provider that is expected to reduce IS costs and improve IS services. The strategic planning process for such an organization is typically directed inward and focused on determining how to do what it is currently doing but cheaper, faster, and better. d. In a recent survey of CIOs, 32 percent said that their IS organization is viewed as a cost center/service provider that is expected to reduce IS costs and improve IS services. The strategic planning process for such an organization is typically directed inward and focused on determining how to do what it is currently doing but cheaper, faster, and better.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Moderate Setting the Information System Organizational Strategy Multiple Choice False

Copyright Cengage Learning. Powered by Cognero.

Page 25


Chapter 12 - Strategic Planning and Project Management LEARNING OBJECTIVES: POIS.14e.12.3 - Outline a process for prioritizing IS projects and initiatives. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/15/2020 5:02 PM 41. As the members of the _____ review and consider the corporate objectives, goals, and strategies, and they can generate many ideas for IS projects that support corporate objectives and goals. a. senior management team b. accounting department c. IS organization d. investors group ANSWER: c RATIONALE: As members of the IS organization review and consider the corporate objectives, goals, and strategies, they can generate many ideas for IS projects that support corporate objectives and goals. They also recognize the need for IS projects that help other corporate units fulfill their business objectives. FEEDBACK: a. As members of the IS organization review and consider the corporate objectives, goals, and strategies, they can generate many ideas for IS projects that support corporate objectives and goals. b. As members of the IS organization review and consider the corporate objectives, goals, and strategies, they can generate many ideas for IS projects that support corporate objectives and goals. c. As members of the IS organization review and consider the corporate objectives, goals, and strategies, they can generate many ideas for IS projects that support corporate objectives and goals. d. As members of the IS organization review and consider the corporate objectives, goals, and strategies, they can generate many ideas for IS projects that support corporate objectives and goals.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Identifying IS Projects and Initiatives QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.3 - Outline a process for prioritizing IS projects and initiatives. NATIONAL STANDARDS: United States - BUSPROG: Group Dynamics - Group Dynamics KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/16/2020 11:04 AM 42. Which of the following is considered a core competency of an organization? a. its ability to deliver goods on time b. its ability to pay employees on time c. its ability to keep its employees motivated d. its ability to do something that its competition cannot imitate ANSWER: d RATIONALE: Researchers Hamel and Prahalad defined the term core competency to mean something Copyright Cengage Learning. Powered by Cognero.

Page 26


Chapter 12 - Strategic Planning and Project Management that a firm can do well and that provides customer benefits, is hard for competitors to imitate, and can be leveraged widely to many products and markets. FEEDBACK:

a. Researchers Hamel and Prahalad defined the term core competency to mean something that a firm can do well and that provides customer benefits, is hard for competitors to imitate, and can be leveraged widely to many products and markets. b. Researchers Hamel and Prahalad defined the term core competency to mean something that a firm can do well and that provides customer benefits, is hard for competitors to imitate, and can be leveraged widely to many products and markets. c. Researchers Hamel and Prahalad defined the term core competency to mean something that a firm can do well and that provides customer benefits, is hard for competitors to imitate, and can be leveraged widely to many products and markets. d. Researchers Hamel and Prahalad defined the term core competency to mean something that a firm can do well and that provides customer benefits, is hard for competitors to imitate, and can be leveraged widely to many products and markets.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.4 - Discuss why project management is considered to be a core competency for many organizations. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/16/2020 11:07 AM 43. Which of the following is considered an "expense" among typical IS project-related costs? a. employee effort b. software license that costs $3000 c. consultant charges d. cost of data entry equipment ANSWER: c RATIONALE: Expense items are non-depreciable items that are consumed shortly after they are purchased. Typical expenses associated with an IS-related project include the use of outside labor or consultants, travel, and training. FEEDBACK: a. Typical expenses associated with an IS-related project include the use of outside labor or consultants, travel, and training. b. Typical expenses associated with an IS-related project include the use of outside labor or consultants, travel, and training. c. Typical expenses associated with an IS-related project include the use of outside labor or consultants, travel, and training. d. Typical expenses associated with an IS-related project include the use of outside labor or consultants, travel, and training.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 27


Chapter 12 - Strategic Planning and Project Management REFERENCES: Project Variables QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.5 - Identify the five highly interrelated parameters that define a project. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/16/2020 11:12 AM 44. The business unit most affected by the project and the one whose budget will cover the project costs is known as the _____. a. stakeholders' business unit b. sponsoring business unit c. champion business unit d. project management department ANSWER: b RATIONALE: The sponsoring business unit is the business unit most affected by the project and the one whose budget will cover the project costs. FEEDBACK: a. The sponsoring business unit is the business unit most affected by the project and the one whose budget will cover the project costs.

b. The sponsoring business unit is the business unit most affected by the project and the one whose budget will cover the project costs. c. The sponsoring business unit is the business unit most affected by the project and the one whose budget will cover the project costs. d. The sponsoring business unit is the business unit most affected by the project and the one whose budget will cover the project costs.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Variables QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.5 - Identify the five highly interrelated parameters that define a project. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/16/2020 11:16 AM 45. A building, office equipment, computer hardware, and network equipment are examples of _____. a. capital assets b. expense items c. internal cross-charges d. project variables ANSWER: a RATIONALE: Capital is money spent to purchase assets that appear on the organization’s balance sheet Copyright Cengage Learning. Powered by Cognero.

Page 28


Chapter 12 - Strategic Planning and Project Management and are depreciated over the life of the asset. Capital items typically have a useful life of at least several years. A building, office equipment, computer hardware, and network equipment are examples of capital assets. FEEDBACK:

a. A building, office equipment, computer hardware, and network equipment are examples of capital assets. b. A building, office equipment, computer hardware, and network equipment are examples of capital assets. c. A building, office equipment, computer hardware, and network equipment are examples of capital assets. d. A building, office equipment, computer hardware, and network equipment are examples of capital assets.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Variables QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.5 - Identify the five highly interrelated parameters that define a project. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/16/2020 11:23 AM 46. _____ is a set of activities that includes defining an achievable completion date that is acceptable to the project stakeholders, developing a workable project schedule, and ensuring the timely completion of the project. a. Scope management b. Cost management c. Schedule management d. Quality management ANSWER: c RATIONALE: Schedule management includes defining an achievable completion date that is acceptable to the project stakeholders, developing a workable project schedule, and ensuring the timely completion of the project. FEEDBACK: a. Schedule management includes defining an achievable completion date that is acceptable to the project stakeholders, developing a workable project schedule, and ensuring the timely completion of the project. b. Schedule management includes defining an achievable completion date that is acceptable to the project stakeholders, developing a workable project schedule, and ensuring the timely completion of the project. c. Schedule management includes defining an achievable completion date that is acceptable to the project stakeholders, developing a workable project schedule, and ensuring the timely completion of the project. d. Schedule management includes defining an achievable completion date that is acceptable to the project stakeholders, developing a workable project schedule, and ensuring the timely completion of the project.

POINTS: DIFFICULTY: REFERENCES:

1 Easy Project Management Knowledge Areas

Copyright Cengage Learning. Powered by Cognero.

Page 29


Chapter 12 - Strategic Planning and Project Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.6 - Briefly discuss the 10 knowledge areas associated with the science of project management. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/16/2020 11:27 AM 47. A useful model that describes how teams develop is the forming-storming-norming-performing-_____ model. a. conforming b. informing c. programming d. adjourning ANSWER: d RATIONALE: A useful model to describe how teams develop and evolve is the forming-stormingnorming-performing-adjourning model, which was first proposed by Bruce Tuckman. FEEDBACK: a. A useful model to describe how teams develop and evolve is the formingstorming-norming-performing-adjourning model, which was first proposed by Bruce Tuckman. b. A useful model to describe how teams develop and evolve is the formingstorming-norming-performing-adjourning model, which was first proposed by Bruce Tuckman. c. A useful model to describe how teams develop and evolve is the formingstorming-norming-performing-adjourning model, which was first proposed by Bruce Tuckman. d. A useful model to describe how teams develop and evolve is the formingstorming-norming-performing-adjourning model, which was first proposed by Bruce Tuckman.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Management Knowledge Areas QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.6 - Briefly discuss the 10 knowledge areas associated with the science of project management. NATIONAL STANDARDS: United States - BUSPROG: Group Dynamics - Group Dynamics KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/16/2020 11:30 AM 48. You are part of an information systems project team. Your job is to ensure that the technology and vendor suggested for use in the project are consistent with the IS strategy. Your role in the project steering team is _____. a. project manager b. project champion c. project sponsor d. IS manager Copyright Cengage Learning. Powered by Cognero.

Page 30


Chapter 12 - Strategic Planning and Project Management ANSWER: RATIONALE:

d The three key members of the steering team include: (1) the project champion, who is a well-respected manager with a passion to see the project succeed and who removes barriers to the success of the project; (2) the project sponsor, who is a senior manager from the business unit most affected by the project and who ensures the project will indeed meet the needs of his or her organization; and (3) the IS manager, who ensures proper IS staffing for the project and ensures the project uses approved technology and vendors.

FEEDBACK:

a. The three key members of the steering team include: (1) the project champion,

who is a well-respected manager with a passion to see the project succeed and who removes barriers to the success of the project; (2) the project sponsor, who is a senior manager from the business unit most affected by the project and who ensures the project will indeed meet the needs of his or her organization; and (3) the IS manager, who ensures proper IS staffing for the project and ensures the project uses approved technology and vendors. b. The three key members of the steering team include: (1) the project champion, who is a well-respected manager with a passion to see the project succeed and who removes barriers to the success of the project; (2) the project sponsor, who is a senior manager from the business unit most affected by the project and who ensures the project will indeed meet the needs of his or her organization; and (3) the IS manager, who ensures proper IS staffing for the project and ensures the project uses approved technology and vendors. c. The three key members of the steering team include: (1) the project champion, who is a well-respected manager with a passion to see the project succeed and who removes barriers to the success of the project; (2) the project sponsor, who is a senior manager from the business unit most affected by the project and who ensures the project will indeed meet the needs of his or her organization; and (3) the IS manager, who ensures proper IS staffing for the project and ensures the project uses approved technology and vendors. d. The three key members of the steering team include: (1) the project champion, who is a well-respected manager with a passion to see the project succeed and who removes barriers to the success of the project; (2) the project sponsor, who is a senior manager from the business unit most affected by the project and who ensures the project will indeed meet the needs of his or her organization; and (3) the IS manager, who ensures proper IS staffing for the project and ensures the project uses approved technology and vendors.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Project Management Knowledge Areas QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.6 - Briefly discuss the 10 knowledge areas associated with the science of project management. NATIONAL STANDARDS: United States - BUSPROG: Group Dynamics - Group Dynamics KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/16/2020 11:34 AM 49. _____ involves the generation, collection, dissemination, and storage of project information in a timely and effective manner. a. Scope management b. Schedule management Copyright Cengage Learning. Powered by Cognero.

Page 31


Chapter 12 - Strategic Planning and Project Management c. Communications management d. Cost management ANSWER: c RATIONALE: Communications management involves the generation, collection, dissemination, and storage of project information in a timely and effective manner. FEEDBACK: a. Communications management involves the generation, collection, dissemination, and storage of project information in a timely and effective manner. b. Communications management involves the generation, collection, dissemination, and storage of project information in a timely and effective manner. c. Communications management involves the generation, collection, dissemination, and storage of project information in a timely and effective manner. d. Communications management involves the generation, collection, dissemination, and storage of project information in a timely and effective manner.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Management Knowledge Areas QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.6 - Briefly discuss the 10 knowledge areas associated with the science of project management. NATIONAL STANDARDS: United States - BUSPROG: Group Dynamics - Group Dynamics KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/16/2020 11:37 AM 50. Which tool is useful in identifying the interests and information needs of project stakeholders? a. Gantt chart b. stakeholder analysis matrix c. work breakdown structure d. program evaluation and review technique ANSWER: b RATIONALE: In preparing a communications plan, the project manager should recognize that the various project stakeholders have different information needs. A useful tool for identifying and documenting these needs is the stakeholder analysis matrix. This matrix identifies the interests of the stakeholders, their information needs, and important facts for managing communications with the champion, sponsor, project team members, and key end users associated with the project. FEEDBACK: a. A useful tool for identifying and documenting these needs is the stakeholder analysis matrix. This matrix identifies the interests of the stakeholders, their information needs, and important facts for managing communications with the champion, sponsor, project team members, and key end users associated with the project. b. A useful tool for identifying and documenting these needs is the stakeholder analysis matrix. This matrix identifies the interests of the stakeholders, their

Copyright Cengage Learning. Powered by Cognero.

Page 32


Chapter 12 - Strategic Planning and Project Management information needs, and important facts for managing communications with the champion, sponsor, project team members, and key end users associated with the project. c. A useful tool for identifying and documenting these needs is the stakeholder analysis matrix. This matrix identifies the interests of the stakeholders, their information needs, and important facts for managing communications with the champion, sponsor, project team members, and key end users associated with the project. d. A useful tool for identifying and documenting these needs is the stakeholder analysis matrix. This matrix identifies the interests of the stakeholders, their information needs, and important facts for managing communications with the champion, sponsor, project team members, and key end users associated with the project.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Management Knowledge Areas QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.6 - Briefly discuss the 10 knowledge areas associated with the science of project management. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/16/2020 11:41 AM 51. Suppose Task C has two predecessor tasks: Task A and Task B. Task A ends on May 8 and Task B ends on May 13. When can Task C begin? a. May 8 b. May 10 c. May 12 d. May 14 ANSWER: d RATIONALE: After the activities are identified in the WBS, the tasks within each stage are sequenced. All predecessor tasks are identified—these are tasks that must be completed before a later task can begin. For example, the testing of a unit of program code cannot begin until the program has been coded, compiled, and debugged. FEEDBACK: a. After the activities are identified in the WBS, the tasks within each stage are sequenced. All predecessor tasks are identified—these are tasks that must be completed before a later task can begin. b. After the activities are identified in the WBS, the tasks within each stage are sequenced. All predecessor tasks are identified—these are tasks that must be completed before a later task can begin. c. After the activities are identified in the WBS, the tasks within each stage are sequenced. All predecessor tasks are identified—these are tasks that must be completed before a later task can begin. d. After the activities are identified in the WBS, the tasks within each stage are sequenced. All predecessor tasks are identified—these are tasks that must be completed before a later task can begin.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 33


Chapter 12 - Strategic Planning and Project Management DIFFICULTY: Moderate REFERENCES: Project Management Knowledge Areas QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.6 - Briefly discuss the 10 knowledge areas associated with the science of project management. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/16/2020 11:53 AM 52. For one critical path activity within a project, the optimistic estimated duration is 10 days, but the project manager allows 15 days for this activity in his schedule. This means that the project manager is incorporating _____. a. no deadline for this activity b. 5 days of slack time c. no WBS for this activity d. an additional milestone ANSWER: b RATIONALE: In a systems development project, each activity is assigned an earliest start time and an earliest finish time. Each activity is also allocated slack time, which is the amount of time an activity can be delayed without delaying the entire project. FEEDBACK: a. In a systems development project, each activity is assigned an earliest start time and an earliest finish time. Each activity is also allocated slack time, which is the amount of time an activity can be delayed without delaying the entire project. b. In a systems development project, each activity is assigned an earliest start time and an earliest finish time. Each activity is also allocated slack time, which is the amount of time an activity can be delayed without delaying the entire project. c. In a systems development project, each activity is assigned an earliest start time and an earliest finish time. Each activity is also allocated slack time, which is the amount of time an activity can be delayed without delaying the entire project. d. In a systems development project, each activity is assigned an earliest start time and an earliest finish time. Each activity is also allocated slack time, which is the amount of time an activity can be delayed without delaying the entire project.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Project Management Knowledge Areas QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.6 - Briefly discuss the 10 knowledge areas associated with the science of project management. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/16/2020 12:04 PM Copyright Cengage Learning. Powered by Cognero.

Page 34


Chapter 12 - Strategic Planning and Project Management 53. Activities related to the acquisition of goods and/or services for a project from sources outside the organization make up _____. a. procurement management b. schedule management c. human resources management d. risk management ANSWER: a RATIONALE: Procurement management is a set of activities related to the acquisition of goods and/or services for a project from sources outside the performing organization. FEEDBACK: a. Procurement management is a set of activities related to the acquisition of goods and/or services for a project from sources outside the performing organization. b. Procurement management is a set of activities related to the acquisition of goods and/or services for a project from sources outside the performing organization. c. Procurement management is a set of activities related to the acquisition of goods and/or services for a project from sources outside the performing organization. d. Procurement management is a set of activities related to the acquisition of goods and/or services for a project from sources outside the performing organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Management Knowledge Areas QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.6 - Briefly discuss the 10 knowledge areas associated with the science of project management. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/16/2020 12:06 PM 54. Suppose your business has agreed to pay a vendor for his services using a cost-plus-fixed-fee contract. This means that your business will _____. a. pay the vendor a total fixed price for the service b. reimburse the vendor for all allowable costs and pay a percentage of those costs as a fee c. reimburse the vendor for all allowable costs plus pay an incentive fee if the vendor meets the deadline d. reimburse the vendor for all allowable costs plus pay a fixed amount as a fee ANSWER: d RATIONALE: A cost-reimbursable contract is a type of contract that requires the buyer to pay the provider an amount that covers the provider’s actual costs plus an additional amount or percentage for profit. In a cost-plus-fixed-fee contract, the provider is reimbursed for all allowable costs and receives a fixed fee. FEEDBACK: a. In a cost-plus-fixed-fee contract, the provider is reimbursed for all allowable costs and receives a fixed fee.

Copyright Cengage Learning. Powered by Cognero.

Page 35


Chapter 12 - Strategic Planning and Project Management b. In a cost-plus-fixed-fee contract, the provider is reimbursed for all allowable costs and receives a fixed fee. c. In a cost-plus-fixed-fee contract, the provider is reimbursed for all allowable costs and receives a fixed fee. d. In a cost-plus-fixed-fee contract, the provider is reimbursed for all allowable costs and receives a fixed fee.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Management Knowledge Areas QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.6 - Briefly discuss the 10 knowledge areas associated with the science of project management. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/16/2020 12:13 PM 55. How do experienced project managers handle risk? a. They avoid taking on risky projects. b. They outsource the risky parts of a project. c. They plan alternative courses of action. d. They delegate the work to more experienced staff. ANSWER: c RATIONALE: A hallmark of experienced project managers is that they follow a deliberate and systematic process of risk management to identify, analyze, and manage project risks. Having identified potential risks, they can make plans to avoid them entirely. When an unavoidable risk occurs and becomes an issue, the project team has already defined an alternative course of action to minimize the impact on the project. FEEDBACK: a. A hallmark of experienced project managers is that they follow a deliberate and systematic process of risk management to identify, analyze, and manage project risks. Having identified potential risks, they can make plans to avoid them entirely. When an unavoidable risk occurs and becomes an issue, the project team has already defined an alternative course of action to minimize the impact on the project. b. A hallmark of experienced project managers is that they follow a deliberate and systematic process of risk management to identify, analyze, and manage project risks. Having identified potential risks, they can make plans to avoid them entirely. When an unavoidable risk occurs and becomes an issue, the project team has already defined an alternative course of action to minimize the impact on the project. c. A hallmark of experienced project managers is that they follow a deliberate and systematic process of risk management to identify, analyze, and manage project risks. Having identified potential risks, they can make plans to avoid them entirely. When an unavoidable risk occurs and becomes an issue, the project team has already defined an alternative course of action to minimize the impact on the project. d. A hallmark of experienced project managers is that they follow a deliberate and systematic process of risk management to identify, analyze, and manage project risks. Having identified potential risks, they can make plans to avoid

Copyright Cengage Learning. Powered by Cognero.

Page 36


Chapter 12 - Strategic Planning and Project Management them entirely. When an unavoidable risk occurs and becomes an issue, the project team has already defined an alternative course of action to minimize the impact on the project.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Management Knowledge Areas QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.6 - Briefly discuss the 10 knowledge areas associated with the science of project management. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/16/2020 1:04 PM 56. You have observed that some of your organization's projects end up having little or no value after they are completed. You are tasked with selecting potential future projects. Which type of projects would you recommend the organization consider? a. only projects that are tied to specific organizational goals b. only projects that are similar to those the team has successfully completed c. only projects that have been completed successfully by your competitors d. only low-budget, narrowly scoped projects ANSWER: a RATIONALE: Many organizations create an IS investment board of business unit executives to review potential projects and evaluate them from several different perspectives. First and foremost, each viable project must relate to a specific organizational goal. These relationships make it clear that executing each project will help meet important organizational objectives. FEEDBACK: a. First and foremost, each viable project must relate to a specific organizational goal. These relationships make it clear that executing each project will help meet important organizational objectives. b. First and foremost, each viable project must relate to a specific organizational goal. These relationships make it clear that executing each project will help meet important organizational objectives. c. First and foremost, each viable project must relate to a specific organizational goal. These relationships make it clear that executing each project will help meet important organizational objectives. d. First and foremost, each viable project must relate to a specific organizational goal. These relationships make it clear that executing each project will help meet important organizational objectives.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Prioritizing IS Projects and Initiatives QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.3 - Outline a process for prioritizing IS projects and initiatives. NATIONAL STANDARDS: United States - BUSPROG: Analysis Copyright Cengage Learning. Powered by Cognero.

Page 37


Chapter 12 - Strategic Planning and Project Management KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Understand 11/19/2019 5:55 PM 7/16/2020 4:50 PM

57. Thomas is involved in the direction-setting phase of strategic planning at his company. What top-down approach will help him identify the proper strategies, initiatives, programs, and projects? a. strategic planning pyramid b. SWOT matrix c. Five Forces Model d. stakeholder matrix ANSWER: a RATIONALE: The direction-setting phase of strategic planning involves defining the mission, vision, values, objectives, and goals of the organization. Determining these will enable the organization to identify the proper strategies, initiatives, programs, and projects. The strategic planning pyramid is a top-down approach to identify initiatives, programs, and projects that are well-suited for the organization. FEEDBACK: a. The strategic planning pyramid is a top-down approach to identify initiatives, programs, and projects that are well-suited for the organization. b. The strategic planning pyramid is a top-down approach to identify initiatives, programs, and projects that are well-suited for the organization. c. The strategic planning pyramid is a top-down approach to identify initiatives, programs, and projects that are well-suited for the organization. d. The strategic planning pyramid is a top-down approach to identify initiatives, programs, and projects that are well-suited for the organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Set Direction QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.2 - Discuss how the seven layers of the strategic planning pyramid can improve the planning process. KEYWORDS: Bloom's: Remember DATE CREATED: 7/17/2020 7:39 AM DATE MODIFIED: 7/17/2020 7:46 AM 58. Creating the top of the strategic planning pyramid remains an academic exercise if an organization does not pursue specific _____. a. missions b. core values c. projects d. visions ANSWER: c RATIONALE: Without specific projects, creating the top of the strategic planning pyramid is simply academic. Projects are temporary endeavors that create an actionable plan, allowing organizations to achieve their goals and objectives. In other words, a project is an opportunity for the organization to implement specific actions to achieve its goals. FEEDBACK: a. Without specific projects, creating the top of the strategic planning pyramid is Copyright Cengage Learning. Powered by Cognero.

Page 38


Chapter 12 - Strategic Planning and Project Management simply academic. Projects are temporary endeavors that create an actionable plan, allowing organizations to achieve their goals and objectives. b. Without specific projects, creating the top of the strategic planning pyramid is simply academic. Projects are temporary endeavors that create an actionable plan, allowing organizations to achieve their goals and objectives. c. Without specific projects, creating the top of the strategic planning pyramid is simply academic. Projects are temporary endeavors that create an actionable plan, allowing organizations to achieve their goals and objectives. d. Without specific projects, creating the top of the strategic planning pyramid is simply academic. Projects are temporary endeavors that create an actionable plan, allowing organizations to achieve their goals and objectives.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Set Direction QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.2 - Discuss how the seven layers of the strategic planning pyramid can improve the planning process. KEYWORDS: Bloom's: Remember DATE CREATED: 7/17/2020 7:40 AM DATE MODIFIED: 7/17/2020 10:09 AM 59. Which statement about objectives and goals matches the way these terms are used in your text? a. an objective is a specific result that must be achieved to reach a goal b. an objective is a statement of a compelling business need that an organization must meet c. several objectives may be associated with a single goal d. several objectives specify how to determine whether a goal has been reached ANSWER: b RATIONALE: The terms objective and goal are frequently used interchangeably. For this discussion, we distinguish between the two—defining objective as a statement of a compelling business need that an organization must meet to achieve its vision and mission. A goal is a specific result that must be achieved to reach an objective. In fact, several goals may be associated with a single objective. The objective states what must be accomplished, and the associated goals specify how to determine whether the objective is being met. FEEDBACK: a. The authors define objective as a statement of a compelling business need that an organization must meet to achieve its vision and mission. b. The authors define objective as a statement of a compelling business need that an organization must meet to achieve its vision and mission. c. The authors define objective as a statement of a compelling business need that an organization must meet to achieve its vision and mission. d. The authors define objective as a statement of a compelling business need that an organization must meet to achieve its vision and mission.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Set Direction QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.2 - Discuss how the seven layers of the strategic planning pyramid Copyright Cengage Learning. Powered by Cognero.

Page 39


Chapter 12 - Strategic Planning and Project Management KEYWORDS: DATE CREATED: DATE MODIFIED:

can improve the planning process. Bloom's: Remember 7/17/2020 7:40 AM 7/17/2020 10:17 AM

60. An IS investment board that is prioritizing IS projects _____. a. should consider only the tangible benefits of a project, disregarding intangible benefits b. can safely assume that a project will succeed and that its costs can be predicted accurately c. need not relate each project to a specific organizational objective and goal d. must weigh costs and benefits to see if a project has an attractive rate of return ANSWER: d RATIONALE: Many organizations create an IS investment board of business unit executives to review potential projects and evaluate them from several different perspectives. These include: • •

FEEDBACK:

First and foremost, each viable project must relate to a specific organizational goal. These relationships make it clear that executing each project will help meet important organizational objectives. Preliminary costs and benefits are weighed to see if the project has an attractive rate of return. Unfortunately, costs and benefits may not be well understood at an early phase of the project, and many worthwhile projects do not have benefits that are easy to quantify. Risk is another factor to consider. Managers must consider the likelihood that the project will fail to deliver the expected benefits; the actual cost will be significantly more than expected; the technology will become obsolete before the project is completed; the technology is too “cutting edge” and will not deliver what is promised; or the business situation will change so that the proposed project is no longer necessary.

a. Many organizations create an IS investment board of business unit executives

to review potential projects and evaluate them from several different perspectives. These include: Preliminary costs and benefits are weighed to see if the project has an attractive rate of return. b. Many organizations create an IS investment board of business unit executives to review potential projects and evaluate them from several different perspectives. These include: Preliminary costs and benefits are weighed to see if the project has an attractive rate of return. c. Many organizations create an IS investment board of business unit executives to review potential projects and evaluate them from several different perspectives. These include: Preliminary costs and benefits are weighed to see if the project has an attractive rate of return. d. Many organizations create an IS investment board of business unit executives to review potential projects and evaluate them from several different perspectives. These include: Preliminary costs and benefits are weighed to see if the project has an attractive rate of return.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Prioritizing IS Projects and Initiatives QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.3 - Outline a process for prioritizing IS projects and initiatives. Copyright Cengage Learning. Powered by Cognero.

Page 40


Chapter 12 - Strategic Planning and Project Management KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Understand 7/17/2020 11:56 AM 7/17/2020 12:08 PM

61. What is a project? a. a form of innovation that involves constantly seeking ways to improve processes b. a plan that defines objectives, establishes goals, and sets strategies c. a temporary endeavor undertaken to create a unique product, service, or result d. a specific task that must be completed to reach an objective ANSWER: c RATIONALE: A project is a temporary endeavor undertaken to create a unique product, service, or result. FEEDBACK: a. A project is a temporary endeavor undertaken to create a unique product, service, or result.

b. A project is a temporary endeavor undertaken to create a unique product, service, or result. c. A project is a temporary endeavor undertaken to create a unique product, service, or result. d. A project is a temporary endeavor undertaken to create a unique product, service, or result.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.4 - Discuss why project management is considered to be a core competency for many organizations. KEYWORDS: Bloom's: Remember DATE CREATED: 7/17/2020 12:12 PM DATE MODIFIED: 7/17/2020 12:19 PM 62. Mavis is a customer service manager. Suppose one of the business objectives at Mavis's firm is to improve customer service by offering a consistently high level of service that exceeds customers' expectations. Which of the following statements about this situation is FALSE? a. Mavis should ensure her proposed projects are not inconsistent with this business objective. b. Mavis should initiate a project to reduce costs by eliminating all but essential customer services. c. Mavis's customer service improvement projects will be subject to cost and schedule constraints. d. Mavis will be expected to make clear connections between this objective and customer service projects. ANSWER: b RATIONALE: Each project attempts to achieve specific business objectives and is subject to certain constraints, such as total cost and completion date. Organizations must always make clear connections among business objectives, goals, and projects; also, projects must be consistent with business strategies. For example, an organization may have a business objective to improve customer service by offering a consistently high level of service that exceeds customers’ expectations. Initiating a project to reduce costs in the customer service area by eliminating all but essential services would be inconsistent with this business objective. FEEDBACK: a. An organization may have a business objective to improve customer service by Copyright Cengage Learning. Powered by Cognero.

Page 41


Chapter 12 - Strategic Planning and Project Management offering a consistently high level of service that exceeds customers’ expectations. Initiating a project to reduce costs in the customer service area by eliminating all but essential services would be inconsistent with this business objective. b. An organization may have a business objective to improve customer service by offering a consistently high level of service that exceeds customers’ expectations. Initiating a project to reduce costs in the customer service area by eliminating all but essential services would be inconsistent with this business objective. c. An organization may have a business objective to improve customer service by offering a consistently high level of service that exceeds customers’ expectations. Initiating a project to reduce costs in the customer service area by eliminating all but essential services would be inconsistent with this business objective. d. An organization may have a business objective to improve customer service by offering a consistently high level of service that exceeds customers’ expectations. Initiating a project to reduce costs in the customer service area by eliminating all but essential services would be inconsistent with this business objective.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.4 - Discuss why project management is considered to be a core competency for many organizations. KEYWORDS: Bloom's: Remember DATE CREATED: 7/17/2020 12:13 PM DATE MODIFIED: 7/17/2020 5:03 PM 63. Projects _____. a. are the same thing as operational activities, which are repetitive actions performed over and over b. typically are few in number and are not finite in time or scope c. are usually completely successful, and rarely fail outright d. range in size and complexity from completing a spreadsheet to integrating two corporations ANSWER: d RATIONALE: At any point in time, an organization may have dozens or even hundreds of active projects, aimed at accomplishing a wide range of results. Projects are different from operational activities, which are repetitive activities performed over and over again. Projects are not repetitive; they come to a definite end once the project objectives are met or the project is cancelled. Projects come in all sizes and levels of complexity, as you can see from the following examples: (a) A senior executive led a project to integrate two organizations following a corporate merger. (b) A manager completed a project to enter her departmental budget into a preformatted spreadsheet template. FEEDBACK: a. Projects come in all sizes and levels of complexity, as you can see from the following examples: (a) A senior executive led a project to integrate two organizations following a corporate merger. (b) A manager completed a project to enter her departmental budget into a preformatted spreadsheet template. b. Projects come in all sizes and levels of complexity, as you can see from the following examples: (a) A senior executive led a project to integrate two

Copyright Cengage Learning. Powered by Cognero.

Page 42


Chapter 12 - Strategic Planning and Project Management organizations following a corporate merger. (b) A manager completed a project to enter her departmental budget into a preformatted spreadsheet template. c. Projects come in all sizes and levels of complexity, as you can see from the following examples: (a) A senior executive led a project to integrate two organizations following a corporate merger. (b) A manager completed a project to enter her departmental budget into a preformatted spreadsheet template. d. Projects come in all sizes and levels of complexity, as you can see from the following examples: (a) A senior executive led a project to integrate two organizations following a corporate merger. (b) A manager completed a project to enter her departmental budget into a preformatted spreadsheet template.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.4 - Discuss why project management is considered to be a core competency for many organizations. KEYWORDS: Bloom's: Remember DATE CREATED: 7/17/2020 12:13 PM DATE MODIFIED: 7/18/2020 5:59 AM 64. Percy's team is asked to add a new feature to their firm's customer-facing smartphone app. After a few weeks of work, they push the new feature out to users and start working on an enhancement to the Web site. Adding the feature to the app is an example of _____. a. a project b. an operational activity c. a milestone d. quality planning ANSWER: a RATIONALE: A project is a temporary endeavor undertaken to create a unique product, service, or result. Projects are different from operational activities, which are repetitive activities performed over and over again. Projects are not repetitive; they come to a definite end once the project objectives are met or the project is cancelled. FEEDBACK: a. A project is a temporary endeavor undertaken to create a unique product, service, or result. b. A project is a temporary endeavor undertaken to create a unique product, service, or result. c. A project is a temporary endeavor undertaken to create a unique product, service, or result. d. A project is a temporary endeavor undertaken to create a unique product, service, or result.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.4 - Discuss why project management is considered to be a core competency for many organizations. Copyright Cengage Learning. Powered by Cognero.

Page 43


Chapter 12 - Strategic Planning and Project Management KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Understand 7/17/2020 12:14 PM 7/18/2020 6:13 AM

65. Why do many organizations spend considerable effort identifying and training people who are successful at temporary endeavors to create a unique product, service, or result? a. They understand that strategic planning helps managers keep on track. b. They recognize project management as one of their core competencies. c. They must be prepared to deal with various market forces effectively. d. They rely on these individuals to set the organization's direction. ANSWER: b RATIONALE: A project is a temporary endeavor undertaken to create a unique product, service, or result. Today, many organizations recognize project management as one of their core competencies and see their ability to manage projects better as a way to achieve an edge over competitors and deliver greater value to shareholders and customers. As a result, those organizations spend considerable effort identifying potential project managers and then training and developing them. FEEDBACK: a. Today, many organizations recognize project management as one of their core competencies and see their ability to manage projects better as a way to achieve an edge over competitors and deliver greater value to shareholders and customers. As a result, those organizations spend considerable effort identifying potential project managers and then training and developing them. b. Today, many organizations recognize project management as one of their core competencies and see their ability to manage projects better as a way to achieve an edge over competitors and deliver greater value to shareholders and customers. As a result, those organizations spend considerable effort identifying potential project managers and then training and developing them. c. Today, many organizations recognize project management as one of their core competencies and see their ability to manage projects better as a way to achieve an edge over competitors and deliver greater value to shareholders and customers. As a result, those organizations spend considerable effort identifying potential project managers and then training and developing them. d. Today, many organizations recognize project management as one of their core competencies and see their ability to manage projects better as a way to achieve an edge over competitors and deliver greater value to shareholders and customers. As a result, those organizations spend considerable effort identifying potential project managers and then training and developing them.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.4 - Discuss why project management is considered to be a core competency for many organizations. KEYWORDS: Bloom's: Remember DATE CREATED: 7/17/2020 12:14 PM DATE MODIFIED: 7/18/2020 10:25 AM 66. Emily must deliver a solution that meets specific scope, cost, time, and quality goals while managing the expectations of the people involved in the delivery process as well as the end users. Emily is a _____. Copyright Cengage Learning. Powered by Cognero.

Page 44


Chapter 12 - Strategic Planning and Project Management a. technical resource b. subject matter expert c. project stakeholder d. project manager ANSWER: RATIONALE:

FEEDBACK:

d Project managers must deliver a solution that meets specific scope, cost, time, and quality goals while managing the expectations of the project stakeholders—the people involved in the project or those affected by its outcome. a. Project managers must deliver a solution that meets specific scope, cost, time, and quality goals while managing the expectations of the project stakeholders—the people involved in the project or those affected by its outcome. b. Project managers must deliver a solution that meets specific scope, cost, time, and quality goals while managing the expectations of the project stakeholders—the people involved in the project or those affected by its outcome. c. Project managers must deliver a solution that meets specific scope, cost, time, and quality goals while managing the expectations of the project stakeholders—the people involved in the project or those affected by its outcome. d. Project managers must deliver a solution that meets specific scope, cost, time, and quality goals while managing the expectations of the project stakeholders—the people involved in the project or those affected by its outcome.

POINTS: 1 DIFFICULTY: Easy REFERENCES: What Is Project Management? QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.4 - Discuss why project management is considered to be a core competency for many organizations. KEYWORDS: Bloom's: Remember DATE CREATED: 7/17/2020 12:14 PM DATE MODIFIED: 7/18/2020 10:30 AM 67. James is hired as a consultant for an IS-related project and tasked with checking the finished system to ensure it meets the quality standards identified earlier in the course of the project. In this situation, James is responsible for _____. a. quality control b. quality planning c. quality assurance d. requirements validation ANSWER: a RATIONALE: Quality planning involves determining which quality standards are relevant to the project and determining how they will be met. Quality assurance involves evaluating the progress of the project on an ongoing basis to ensure that it meets the identified quality standards. Quality control involves checking project results to ensure that they meet identified quality standards. Most organizations put a heavy emphasis on accurately capturing and documenting system requirements and carefully managing changes in user requirements over the course of the project. Copyright Cengage Learning. Powered by Cognero.

Page 45


Chapter 12 - Strategic Planning and Project Management FEEDBACK:

a. Quality control involves checking project results to ensure that they meet identified quality standards. b. Quality control involves checking project results to ensure that they meet identified quality standards. c. Quality control involves checking project results to ensure that they meet identified quality standards. d. Quality control involves checking project results to ensure that they meet identified quality standards.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Management Knowledge Areas QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.4 - Discuss why project management is considered to be a core competency for many organizations. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 10:25 AM DATE MODIFIED: 7/18/2020 10:39 AM 68. Because Rosie's organization views project management as a core competency, they reward Rosie with a gift card for her work on a recent project. Rosie defined the work that would be required for the project at the onset, monitored progress, and kept changes to the work within the limits everyone agreed upon at the beginning. This helped her team complete the project on time and within budget. Rosie received the reward for her successful _____. a. risk management b. cost management c. scope management d. schedule management ANSWER: c RATIONALE: Scope management includes defining the work that must be done as part of the project and then controlling the work to stay within the agreed-upon scope. Key activities include initiation, scope planning, scope definition, scope verification, and scope change control. The project manager and key business managers should decide whether they will allow scope changes at any time during the project, only in the early stages of the project, or not at all. FEEDBACK: a. Scope management includes defining the work that must be done as part of the project and then controlling the work to stay within the agreed-upon scope. Key activities include initiation, scope planning, scope definition, scope verification, and scope change control. b. Scope management includes defining the work that must be done as part of the project and then controlling the work to stay within the agreed-upon scope. Key activities include initiation, scope planning, scope definition, scope verification, and scope change control. c. Scope management includes defining the work that must be done as part of the project and then controlling the work to stay within the agreed-upon scope. Key activities include initiation, scope planning, scope definition, scope verification, and scope change control. d. Scope management includes defining the work that must be done as part of the project and then controlling the work to stay within the agreed-upon scope. Key activities include initiation, scope planning, scope definition, scope verification,

Copyright Cengage Learning. Powered by Cognero.

Page 46


Chapter 12 - Strategic Planning and Project Management and scope change control.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Management Knowledge Areas QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.4 - Discuss why project management is considered to be a core competency for many organizations. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 10:25 AM DATE MODIFIED: 7/18/2020 10:51 AM 69. Millie, who recently took a project management course, is preparing a work breakdown structure. This means that _____. a. Millie is drawing a grid on a timescale that lists activities and deadlines. b. Millie is defining an achievable and acceptable project completion date c. Millie will be able to estimate all costs associated with each task in the project d. Millie is struggling with schedule management and needs training in this area ANSWER: c RATIONALE: A work breakdown structure (WBS) is an outline of the work to be done to complete the project. You start by breaking the project into various stages or groups of activities that need to be performed. Then, you identify the tasks associated with each project stage. One approach to cost estimating uses the WBS to estimate all costs (capital, expense, and crosscharge) associated with the completion of each task. FEEDBACK: a. A work breakdown structure (WBS) is an outline of the work to be done to complete the project. You start by breaking the project into various stages or groups of activities that need to be performed. Then, you identify the tasks associated with each project stage. One approach to cost estimating uses the WBS to estimate all costs (capital, expense, and cross-charge) associated with the completion of each task. b. A work breakdown structure (WBS) is an outline of the work to be done to complete the project. You start by breaking the project into various stages or groups of activities that need to be performed. Then, you identify the tasks associated with each project stage. One approach to cost estimating uses the WBS to estimate all costs (capital, expense, and cross-charge) associated with the completion of each task. c. A work breakdown structure (WBS) is an outline of the work to be done to complete the project. You start by breaking the project into various stages or groups of activities that need to be performed. Then, you identify the tasks associated with each project stage. One approach to cost estimating uses the WBS to estimate all costs (capital, expense, and cross-charge) associated with the completion of each task. d. A work breakdown structure (WBS) is an outline of the work to be done to complete the project. You start by breaking the project into various stages or groups of activities that need to be performed. Then, you identify the tasks associated with each project stage. One approach to cost estimating uses the WBS to estimate all costs (capital, expense, and cross-charge) associated with the completion of each task.

POINTS: DIFFICULTY:

1 Easy

Copyright Cengage Learning. Powered by Cognero.

Page 47


Chapter 12 - Strategic Planning and Project Management REFERENCES: Project Management Knowledge Areas QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.4 - Discuss why project management is considered to be a core competency for many organizations. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 10:25 AM DATE MODIFIED: 7/18/2020 11:04 AM 70. The definition of which tasks are and which tasks are not included in a project is called the project's _____. a. expectations b. cost c. quality d. scope ANSWER: d RATIONALE: Project scope is a definition of which tasks are and which tasks are not included in a project. FEEDBACK: a. Project scope is a definition of which tasks are and which tasks are not included in a project.

b. Project scope is a definition of which tasks are and which tasks are not included in a project. c. Project scope is a definition of which tasks are and which tasks are not included in a project. d. Project scope is a definition of which tasks are and which tasks are not included in a project.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Variables QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.5 - Identify the five highly interrelated parameters that define a project. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 11:06 AM DATE MODIFIED: 7/18/2020 11:10 AM 71. In most organizations, projects that involve finance and accounting must be scheduled to avoid conflicting with endof-quarter operations. This demonstrates which key project parameter (and constraint)? a. scope b. timing c. cost d. user expectations ANSWER: b RATIONALE: The timing of a project is frequently a critical constraint. For example, in most organizations, projects that involve finance and accounting must be scheduled to avoid any conflict with operations associated with the closing of end-of-quarter books. Copyright Cengage Learning. Powered by Cognero.

Page 48


Chapter 12 - Strategic Planning and Project Management FEEDBACK:

a. The timing of a project is frequently a critical constraint. For example, in most

organizations, projects that involve finance and accounting must be scheduled to avoid any conflict with operations associated with the closing of end-ofquarter books. b. The timing of a project is frequently a critical constraint. For example, in most organizations, projects that involve finance and accounting must be scheduled to avoid any conflict with operations associated with the closing of end-ofquarter books. c. The timing of a project is frequently a critical constraint. For example, in most organizations, projects that involve finance and accounting must be scheduled to avoid any conflict with operations associated with the closing of end-ofquarter books. d. The timing of a project is frequently a critical constraint. For example, in most organizations, projects that involve finance and accounting must be scheduled to avoid any conflict with operations associated with the closing of end-ofquarter books.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Variables QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.5 - Identify the five highly interrelated parameters that define a project. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 11:07 AM DATE MODIFIED: 7/18/2020 11:17 AM 72. Which project variable is defined as the degree to which the project meets the needs of its users? a. quality b. user expectations c. scope d. validity ANSWER: a RATIONALE: The quality of a project can be defined as the degree to which the project meets the needs of its users. FEEDBACK: a. The quality of a project can be defined as the degree to which the project meets the needs of its users. b. The quality of a project can be defined as the degree to which the project meets the needs of its users. c. The quality of a project can be defined as the degree to which the project meets the needs of its users. d. The quality of a project can be defined as the degree to which the project meets the needs of its users.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Easy Project Variables Multiple Choice False

Copyright Cengage Learning. Powered by Cognero.

Page 49


Chapter 12 - Strategic Planning and Project Management LEARNING OBJECTIVES: POIS.14e.12.5 - Identify the five highly interrelated parameters that define a project. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 11:07 AM DATE MODIFIED: 7/18/2020 11:19 AM 73. Kevin, who is managing a project to implement a new travel expense reporting system, asks his coworkers who will be using the system to help him define the system requirements and provide feedback on three available options. His coworkers are annoyed at Kevin, declaring that it is his job to figure all of that out and that he should approach them again when it is time for them to be trained on the new system. Kevin misjudged what project parameter? a. quality b. user expectations c. scope d. time ANSWER: b RATIONALE: As a project begins, stakeholders will form expectations—or will already have expectations—about how the project will be conducted and how it will affect them. For example, based on previous project experience, the end users of a new IS system may expect that they will have no involvement with the system until it is time for them to be trained. However, the project manager may follow a more progressive development process that requires users to help define system requirements, evaluate system options, try out system prototypes, develop user documentation, and define and conduct the user acceptance test. FEEDBACK: a. As a project begins, stakeholders will form expectations—or will already have expectations—about how the project will be conducted and how it will affect them. For example, based on previous project experience, the end users of a new IS system may expect that they will have no involvement with the system until it is time for them to be trained. b. As a project begins, stakeholders will form expectations—or will already have expectations—about how the project will be conducted and how it will affect them. For example, based on previous project experience, the end users of a new IS system may expect that they will have no involvement with the system until it is time for them to be trained. c. As a project begins, stakeholders will form expectations—or will already have expectations—about how the project will be conducted and how it will affect them. For example, based on previous project experience, the end users of a new IS system may expect that they will have no involvement with the system until it is time for them to be trained. d. As a project begins, stakeholders will form expectations—or will already have expectations—about how the project will be conducted and how it will affect them. For example, based on previous project experience, the end users of a new IS system may expect that they will have no involvement with the system until it is time for them to be trained.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Project Variables QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.5 - Identify the five highly interrelated parameters that define a project. Copyright Cengage Learning. Powered by Cognero.

Page 50


Chapter 12 - Strategic Planning and Project Management KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 7/18/2020 11:08 AM 7/18/2020 11:36 AM

74. The radical redesign of business processes, organizational structures, information systems, and values of the organization to achieve a breakthrough in business results is termed _____. a. continuous improvement b. organizational change c. reengineering d. a change model ANSWER: c RATIONALE: Reengineering, also called process redesign and business process reengineering (BPR), involves the radical redesign of business processes, organizational structures, information systems, and values of the organization to achieve a breakthrough in business results. FEEDBACK: a. Reengineering, also called process redesign and business process reengineering (BPR), involves the radical redesign of business processes, organizational structures, information systems, and values of the organization to achieve a breakthrough in business results. b. Reengineering, also called process redesign and business process reengineering (BPR), involves the radical redesign of business processes, organizational structures, information systems, and values of the organization to achieve a breakthrough in business results. c. Reengineering, also called process redesign and business process reengineering (BPR), involves the radical redesign of business processes, organizational structures, information systems, and values of the organization to achieve a breakthrough in business results. d. Reengineering, also called process redesign and business process reengineering (BPR), involves the radical redesign of business processes, organizational structures, information systems, and values of the organization to achieve a breakthrough in business results.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Reengineering and Continuous Improvement QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.7 - Identify the primary difference between business process reengineering and continuous improvement. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 11:37 AM DATE MODIFIED: 7/18/2020 11:46 AM 75. The form of innovation that involves constantly seeking ways to improve business processes and add value to products and services is called _____. a. continuous improvement b. reengineering c. process redesign d. BPR ANSWER: a Copyright Cengage Learning. Powered by Cognero.

Page 51


Chapter 12 - Strategic Planning and Project Management RATIONALE:

In contrast to reengineering, the idea of continuous improvement (often referred to by the Japanese word “Kaizen”) is a form of innovation that involves constantly seeking ways to improve business processes and add value to products and services.

FEEDBACK:

a. In contrast to reengineering, the idea of continuous improvement (often referred to by the Japanese word “Kaizen”) is a form of innovation that involves constantly seeking ways to improve business processes and add value to products and services. b. In contrast to reengineering, the idea of continuous improvement (often referred to by the Japanese word “Kaizen”) is a form of innovation that involves constantly seeking ways to improve business processes and add value to products and services. c. In contrast to reengineering, the idea of continuous improvement (often referred to by the Japanese word “Kaizen”) is a form of innovation that involves constantly seeking ways to improve business processes and add value to products and services. d. In contrast to reengineering, the idea of continuous improvement (often referred to by the Japanese word “Kaizen”) is a form of innovation that involves constantly seeking ways to improve business processes and add value to products and services.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Reengineering and Continuous Improvement QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.7 - Identify the primary difference between business process reengineering and continuous improvement. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 11:40 AM DATE MODIFIED: 7/18/2020 11:49 AM 76. Michael Hammer, who coined the term "business process reengineering," urged businesses to _____. a. make changes narrow in scope b. constantly add value to products c. automate existing processes d. eliminate steps that do not add value ANSWER: d RATIONALE: Michael Hammer, former professor of computer science at MIT, coined the term “business process reengineering.” His message was simple. He implored businesses not to automate what has always been done, but rather to eliminate steps that do not add value and then to reimagine the process. FEEDBACK: a. Michael Hammer, former professor of computer science at MIT, coined the term “business process reengineering.” His message was simple. He implored businesses not to automate what has always been done, but rather to eliminate steps that do not add value and then to reimagine the process. b. Michael Hammer, former professor of computer science at MIT, coined the term “business process reengineering.” His message was simple. He implored businesses not to automate what has always been done, but rather to eliminate steps that do not add value and then to reimagine the process. c. Michael Hammer, former professor of computer science at MIT, coined the term “business process reengineering.” His message was simple. He implored

Copyright Cengage Learning. Powered by Cognero.

Page 52


Chapter 12 - Strategic Planning and Project Management businesses not to automate what has always been done, but rather to eliminate steps that do not add value and then to reimagine the process. d. Michael Hammer, former professor of computer science at MIT, coined the term “business process reengineering.” His message was simple. He implored businesses not to automate what has always been done, but rather to eliminate steps that do not add value and then to reimagine the process.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Reengineering and Continuous Improvement QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.7 - Identify the primary difference between business process reengineering and continuous improvement. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 11:40 AM DATE MODIFIED: 7/18/2020 11:53 AM 77. Successful reengineering can reduce _____. a. employee salaries b. service quality c. job skill requirements d. delivery time ANSWER: d RATIONALE: Successful reengineering can reduce delivery time, increase product and service quality, enhance customer satisfaction, and increase revenues and profitability. FEEDBACK: a. Successful reengineering can reduce delivery time, increase product and service quality, enhance customer satisfaction, and increase revenues and profitability. b. Successful reengineering can reduce delivery time, increase product and service quality, enhance customer satisfaction, and increase revenues and profitability. c. Successful reengineering can reduce delivery time, increase product and service quality, enhance customer satisfaction, and increase revenues and profitability. d. Successful reengineering can reduce delivery time, increase product and service quality, enhance customer satisfaction, and increase revenues and profitability.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Reengineering and Continuous Improvement QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.7 - Identify the primary difference between business process reengineering and continuous improvement. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 11:40 AM DATE MODIFIED: 7/18/2020 11:58 AM Copyright Cengage Learning. Powered by Cognero.

Page 53


Chapter 12 - Strategic Planning and Project Management 78. The reengineering of Ford Motor Company's accounts payable process in the 1990s _____. a. created many new entry-level positions b. reduced their accounting staff by 75 percent c. met their original goal of a 20 percent cost reduction d. damaged their relationships with vendors ANSWER: b RATIONALE: In the 1990s, Ford Motor Company decided that cost cutting was necessary in its bloated accounts payable department. The accounts payable process was quite complex and inefficient at Ford. With a workforce of 500 people in the department, errors were unavoidable. In order to repair the process, management initially set a goal of reducing the department headcount by 20 percent. When discovered that their competitor, Mazda, was able to run their accounts payable department with only five people, Ford’s management decided that a full redesign process was needed. In the end, Ford was able to reduce the size of the department by 75 percent and also improved their vendor relationships in the process. FEEDBACK: a. Ford was able to reduce the size of the accounts payable department by 75 percent and also improved their vendor relationships in the process. b. Ford was able to reduce the size of the accounts payable department by 75 percent and also improved their vendor relationships in the process. c. Ford was able to reduce the size of the accounts payable department by 75 percent and also improved their vendor relationships in the process. d. Ford was able to reduce the size of the accounts payable department by 75 percent and also improved their vendor relationships in the process.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Reengineering and Continuous Improvement QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.7 - Identify the primary difference between business process reengineering and continuous improvement. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 11:40 AM DATE MODIFIED: 7/18/2020 12:04 PM 79. When service organizations regularly find ways to provide faster and more effective assistance to customers, and manufacturers regularly make beneficial changes to their product designs, these companies are engaging in _____. a. reengineering b. process redesign c. continuous improvement d. organizational change ANSWER: c RATIONALE: In contrast to reengineering, the idea of continuous improvement (often referred to by the Japanese word “Kaizen”) is a form of innovation that involves constantly seeking ways to improve business processes and add value to products and services. Manufacturing companies make continual product changes and improvements. Service organizations regularly find ways to provide faster and more effective assistance to customers. FEEDBACK: a. In contrast to reengineering, the idea of continuous improvement (often referred Copyright Cengage Learning. Powered by Cognero.

Page 54


Chapter 12 - Strategic Planning and Project Management to by the Japanese word “Kaizen”) is a form of innovation that involves constantly seeking ways to improve business processes and add value to products and services. b. In contrast to reengineering, the idea of continuous improvement (often referred to by the Japanese word “Kaizen”) is a form of innovation that involves constantly seeking ways to improve business processes and add value to products and services. c. In contrast to reengineering, the idea of continuous improvement (often referred to by the Japanese word “Kaizen”) is a form of innovation that involves constantly seeking ways to improve business processes and add value to products and services. d. In contrast to reengineering, the idea of continuous improvement (often referred to by the Japanese word “Kaizen”) is a form of innovation that involves constantly seeking ways to improve business processes and add value to products and services.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Reengineering and Continuous Improvement QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.7 - Identify the primary difference between business process reengineering and continuous improvement. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 11:40 AM DATE MODIFIED: 7/18/2020 12:09 PM 80. Lean, Six Sigma, and Total Quality Management are popular methods for implementing _____. a. continuous improvement b. process redesign c. goals-based strategic planning d. IS projects and initiatives ANSWER: a RATIONALE: Popular continuous improvement methods include Lean, Six Sigma, and Total Quality Management. FEEDBACK: a. Popular continuous improvement methods include Lean, Six Sigma, and Total Quality Management. b. Popular continuous improvement methods include Lean, Six Sigma, and Total Quality Management. c. Popular continuous improvement methods include Lean, Six Sigma, and Total Quality Management. d. Popular continuous improvement methods include Lean, Six Sigma, and Total Quality Management.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Reengineering and Continuous Improvement QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.7 - Identify the primary difference between business process Copyright Cengage Learning. Powered by Cognero.

Page 55


Chapter 12 - Strategic Planning and Project Management KEYWORDS: DATE CREATED: DATE MODIFIED:

reengineering and continuous improvement. Bloom's: Remember 7/18/2020 11:40 AM 7/18/2020 12:12 PM

81. Which of the following processes was invented by Toyota and involves taking a customer-centric approach by looking to eliminate processes that don't deliver value to the customer, that result in errors, or that waste resources? a. SWOT b. TQM c. Six Sigma d. Lean ANSWER: d RATIONALE: Popular continuous improvement methods include Lean, Six Sigma, and Total Quality Management. Toyota invented the Lean process, which involves taking a customer-centric approach by looking to eliminate processes that don’t deliver value to the customer, result in errors, or waste resources. FEEDBACK: a. Toyota invented the Lean process, which involves taking a customer-centric approach by looking to eliminate processes that don’t deliver value to the customer, result in errors, or waste resources. b. Toyota invented the Lean process, which involves taking a customer-centric approach by looking to eliminate processes that don’t deliver value to the customer, result in errors, or waste resources. c. Toyota invented the Lean process, which involves taking a customer-centric approach by looking to eliminate processes that don’t deliver value to the customer, result in errors, or waste resources. d. Toyota invented the Lean process, which involves taking a customer-centric approach by looking to eliminate processes that don’t deliver value to the customer, result in errors, or waste resources.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Reengineering and Continuous Improvement QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.7 - Identify the primary difference between business process reengineering and continuous improvement. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 11:40 AM DATE MODIFIED: 7/18/2020 12:19 PM 82. Which of the following processes takes a quality approach that focuses on identifying and rectifying the root causes of problems or defects? a. SWOT b. TQM c. Six Sigma d. Lean ANSWER: c RATIONALE: Popular continuous improvement methods include Lean, Six Sigma, and Total Quality Copyright Cengage Learning. Powered by Cognero.

Page 56


Chapter 12 - Strategic Planning and Project Management Management. Six Sigma takes a quality approach that focuses on identifying and rectifying the root causes of problems or defects. FEEDBACK:

a. Six Sigma takes a quality approach that focuses on identifying and rectifying the root causes of problems or defects. b. Six Sigma takes a quality approach that focuses on identifying and rectifying the root causes of problems or defects. c. Six Sigma takes a quality approach that focuses on identifying and rectifying the root causes of problems or defects. d. Six Sigma takes a quality approach that focuses on identifying and rectifying the root causes of problems or defects.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Reengineering and Continuous Improvement QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.7 - Identify the primary difference between business process reengineering and continuous improvement. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 11:41 AM DATE MODIFIED: 7/18/2020 12:21 PM 83. Which of the following processes was developed by W. Edward Deming and emphasizes the need to involve all employees in improving quality by eliminating errors? a. SWOT b. TQM c. Six Sigma d. Lean ANSWER: b RATIONALE: Popular continuous improvement methods include Lean, Six Sigma, and Total Quality Management. Total Quality Management (TQM), developed by W. Edward Deming, is the oldest of these methods, and it emphasizes the need to involve all employees in improving quality by eliminating errors. FEEDBACK: a. Total Quality Management (TQM), developed by W. Edward Deming, is the oldest of the popular continuous improvement methods, and it emphasizes the need to involve all employees in improving quality by eliminating errors. b. Total Quality Management (TQM), developed by W. Edward Deming, is the oldest of the popular continuous improvement methods, and it emphasizes the need to involve all employees in improving quality by eliminating errors. c. Total Quality Management (TQM), developed by W. Edward Deming, is the oldest of the popular continuous improvement methods, and it emphasizes the need to involve all employees in improving quality by eliminating errors. d. Total Quality Management (TQM), developed by W. Edward Deming, is the oldest of the popular continuous improvement methods, and it emphasizes the need to involve all employees in improving quality by eliminating errors.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Reengineering and Continuous Improvement Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 57


Chapter 12 - Strategic Planning and Project Management HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.7 - Identify the primary difference between business process reengineering and continuous improvement. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 11:41 AM DATE MODIFIED: 7/18/2020 12:23 PM 84. Which of the following characterizes business process reengineering? a. information systems are integral to the solution b. routine action taken to make minor improvements c. bottom-up change driven by workers d. narrow in scope; focuses on tasks in a given area ANSWER: a RATIONALE: Reengineering, also called process redesign and business process reengineering (BPR), involves the radical redesign of business processes, organizational structures, information systems, and values of the organization to achieve a breakthrough in business results. Characteristics of BPR include: a strong action is taken to solve a serious problem; it is a top-down change driven by senior executives; it is broad in scope, cutting across departments; the goal is to achieve a major breakthrough; it is often led by resources from outside the company; and information systems are integral to the solution. FEEDBACK: a. Characteristics of BPR include: a strong action is taken to solve a serious problem; it is a top-down change driven by senior executives; it is broad in scope, cutting across departments; the goal is to achieve a major breakthrough; it is often led by resources from outside the company; and information systems are integral to the solution. b. Characteristics of BPR include: a strong action is taken to solve a serious problem; it is a top-down change driven by senior executives; it is broad in scope, cutting across departments; the goal is to achieve a major breakthrough; it is often led by resources from outside the company; and information systems are integral to the solution. c. Characteristics of BPR include: a strong action is taken to solve a serious problem; it is a top-down change driven by senior executives; it is broad in scope, cutting across departments; the goal is to achieve a major breakthrough; it is often led by resources from outside the company; and information systems are integral to the solution. d. Characteristics of BPR include: a strong action is taken to solve a serious problem; it is a top-down change driven by senior executives; it is broad in scope, cutting across departments; the goal is to achieve a major breakthrough; it is often led by resources from outside the company; and information systems are integral to the solution.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Reengineering and Continuous Improvement QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.7 - Identify the primary difference between business process reengineering and continuous improvement. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 11:41 AM Copyright Cengage Learning. Powered by Cognero.

Page 58


Chapter 12 - Strategic Planning and Project Management DATE MODIFIED:

7/18/2020 12:29 PM

85. The major understandings and assumptions for an organization, which are often neither stated nor documented as goals or formal policies, are known as _____. a. organizational culture b. organizational values c. its mission d. initiatives ANSWER: a RATIONALE: Organizational culture consists of the major understandings and assumptions for an organization. The understandings, which can include common beliefs, values, and approaches to decision making, are often neither stated nor documented as goals or formal policies. FEEDBACK: a. Organizational culture consists of the major understandings and assumptions for an organization. The understandings, which can include common beliefs, values, and approaches to decision making, are often neither stated nor documented as goals or formal policies. b. Organizational culture consists of the major understandings and assumptions for an organization. The understandings, which can include common beliefs, values, and approaches to decision making, are often neither stated nor documented as goals or formal policies. c. Organizational culture consists of the major understandings and assumptions for an organization. The understandings, which can include common beliefs, values, and approaches to decision making, are often neither stated nor documented as goals or formal policies. d. Organizational culture consists of the major understandings and assumptions for an organization. The understandings, which can include common beliefs, values, and approaches to decision making, are often neither stated nor documented as goals or formal policies.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Organizational Culture and Change QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.8 - Identify the appropriate strategy to employ with each of five categories of innovation adopters. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 12:34 PM DATE MODIFIED: 7/18/2020 12:39 PM 86. Internal factors, such as those initiated by employees at all levels, or external factors, such as those wrought by competitors, stakeholders, federal and state laws, community regulations, natural disasters, and general economic conditions, can create a need for _____. a. a new change model b. intangible benefits c. organizational change d. organizational culture ANSWER: c Copyright Cengage Learning. Powered by Cognero.

Page 59


Chapter 12 - Strategic Planning and Project Management RATIONALE:

FEEDBACK:

Organizational change deals with how organizations successfully plan for, implement, and handle change. Change can be caused by internal factors, such as those initiated by employees at all levels, or by external factors, such as those wrought by competitors, stockholders, federal and state laws, community regulations, natural disasters, and general economic conditions. a. Organizational change deals with how organizations successfully plan for,

implement, and handle change. Change can be caused by internal factors, such as those initiated by employees at all levels, or by external factors, such as those wrought by competitors, stockholders, federal and state laws, community regulations, natural disasters, and general economic conditions. b. Organizational change deals with how organizations successfully plan for, implement, and handle change. Change can be caused by internal factors, such as those initiated by employees at all levels, or by external factors, such as those wrought by competitors, stockholders, federal and state laws, community regulations, natural disasters, and general economic conditions. c. Organizational change deals with how organizations successfully plan for, implement, and handle change. Change can be caused by internal factors, such as those initiated by employees at all levels, or by external factors, such as those wrought by competitors, stockholders, federal and state laws, community regulations, natural disasters, and general economic conditions. d. Organizational change deals with how organizations successfully plan for, implement, and handle change. Change can be caused by internal factors, such as those initiated by employees at all levels, or by external factors, such as those wrought by competitors, stockholders, federal and state laws, community regulations, natural disasters, and general economic conditions.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Organizational Culture and Change QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.8 - Identify the appropriate strategy to employ with each of five categories of innovation adopters. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 12:35 PM DATE MODIFIED: 7/18/2020 12:44 PM 87. Which statement about the soft side of implementing change is FALSE? a. It involves work designed to help employees embrace a new IS. b. It represents the biggest challenge to successful change implementation. c. It should include addressing employee adoption and resistance jointly. d. It usually receives more attention than the technological side ANSWER: d RATIONALE: The so-called soft side of implementing change involves work designed to help employees embrace a new information system and way of working. This effort represents the biggest challenge to successful change implementation, yet it is often overlooked or downplayed, resulting in project failure. Indeed, both the Standish Group and Gartner, two highly respected organizations that track project implementations globally, believe that a significant contributor to project failures is overlooking the need to address employee adoption and resistance jointly. FEEDBACK: a. The so-called soft side of implementing change involves work designed to help Copyright Cengage Learning. Powered by Cognero.

Page 60


Chapter 12 - Strategic Planning and Project Management employees embrace a new information system and way of working. This effort represents the biggest challenge to successful change implementation, yet it is often overlooked or downplayed, resulting in project failure. b. The so-called soft side of implementing change involves work designed to help employees embrace a new information system and way of working. This effort represents the biggest challenge to successful change implementation, yet it is often overlooked or downplayed, resulting in project failure. c. The so-called soft side of implementing change involves work designed to help employees embrace a new information system and way of working. This effort represents the biggest challenge to successful change implementation, yet it is often overlooked or downplayed, resulting in project failure. d. The so-called soft side of implementing change involves work designed to help employees embrace a new information system and way of working. This effort represents the biggest challenge to successful change implementation, yet it is often overlooked or downplayed, resulting in project failure.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Organizational Culture and Change QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.8 - Identify the appropriate strategy to employ with each of five categories of innovation adopters. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 12:36 PM DATE MODIFIED: 7/18/2020 12:52 PM 88. The dynamics of how change is implemented can be viewed in terms of a representation that identifies the phases of change and the best way to implement them, known as a _____. a. Gantt chart b. change model c. network diagram d. stakeholder engagement assessment matrix ANSWER: b RATIONALE: The dynamics of how change is implemented can be viewed in terms of a change model. A change model represents change theories by identifying the phases of change and the best way to implement them. FEEDBACK: a. The dynamics of how change is implemented can be viewed in terms of a change model. A change model represents change theories by identifying the phases of change and the best way to implement them. b. The dynamics of how change is implemented can be viewed in terms of a change model. A change model represents change theories by identifying the phases of change and the best way to implement them. c. The dynamics of how change is implemented can be viewed in terms of a change model. A change model represents change theories by identifying the phases of change and the best way to implement them. d. The dynamics of how change is implemented can be viewed in terms of a change model. A change model represents change theories by identifying the phases of change and the best way to implement them.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 61


Chapter 12 - Strategic Planning and Project Management DIFFICULTY: Easy REFERENCES: Organizational Culture and Change QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.8 - Identify the appropriate strategy to employ with each of five categories of innovation adopters. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 12:36 PM DATE MODIFIED: 7/18/2020 12:58 PM 89. The technology acceptance model (TAM) _____. a. defines perceived ease of use as the belief that the system will improve one's performance b. specifies the factors that can lead to better attitudes about the use of a new information system c. defines perceived usefulness as the belief that the system will be easy to learn and use d. stipulates that perceptions about a system are not influenced by the expressed opinions of others ANSWER: b RATIONALE: The technology acceptance model (TAM) specifies the factors that can lead to better attitudes about the use of a new information system, along with its higher acceptance and usage. In this model, “perceived usefulness” is defined as the degree to which individuals believe that use of the system will improve their performance. The “perceived ease of use” is the degree to which individuals believe that the system will be easy to learn and use. Both the perceived usefulness and ease of use can be strongly influenced by the expressed opinions of others who have used the system and the degree to which the organization supports use of the system (e.g., providing incentives and offering training and coaching from key users). FEEDBACK: a. The technology acceptance model (TAM) specifies the factors that can lead to better attitudes about the use of a new information system, along with its higher acceptance and usage. b. The technology acceptance model (TAM) specifies the factors that can lead to better attitudes about the use of a new information system, along with its higher acceptance and usage. c. The technology acceptance model (TAM) specifies the factors that can lead to better attitudes about the use of a new information system, along with its higher acceptance and usage. d. The technology acceptance model (TAM) specifies the factors that can lead to better attitudes about the use of a new information system, along with its higher acceptance and usage.

POINTS: 1 DIFFICULTY: Easy REFERENCES: User Satisfaction and Technology Acceptance QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.8 - Identify the appropriate strategy to employ with each of five categories of innovation adopters. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 12:36 PM DATE MODIFIED: 7/18/2020 1:09 PM Copyright Cengage Learning. Powered by Cognero.

Page 62


Chapter 12 - Strategic Planning and Project Management 90. Which change model was developed by E.M. Rogers to explain how a new idea or product gains acceptance and spreads through a specific population? a. diffusion of innovation theory b. technology acceptance model c. Five Forces Model d. forming-storming-norming-performing-adjourning model ANSWER: a RATIONALE: The diffusion of innovation theory was developed by E.M. Rogers to explain how a new idea or product gains acceptance and diffuses (or spreads) through a specific population or subset of an organization. FEEDBACK: a. The diffusion of innovation theory was developed by E.M. Rogers to explain how a new idea or product gains acceptance and diffuses (or spreads) through a specific population or subset of an organization. b. The diffusion of innovation theory was developed by E.M. Rogers to explain how a new idea or product gains acceptance and diffuses (or spreads) through a specific population or subset of an organization. c. The diffusion of innovation theory was developed by E.M. Rogers to explain how a new idea or product gains acceptance and diffuses (or spreads) through a specific population or subset of an organization. d. The diffusion of innovation theory was developed by E.M. Rogers to explain how a new idea or product gains acceptance and diffuses (or spreads) through a specific population or subset of an organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Diffusion of Innovation Theory QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.8 - Identify the appropriate strategy to employ with each of five categories of innovation adopters. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 1:01 PM DATE MODIFIED: 7/18/2020 1:16 PM 91. According to the diffusion of innovation theory, which strategy is recommended when rolling out a new information system to a group of innovators? a. provide them with evidence of the system’s effectiveness and success stories b. provide them data on how many others have tried this and have used it successfully c. simply provide them with access to the new system and get out of their way d. provide them assistance getting started ANSWER: c RATIONALE: The diffusion of innovation theory was developed by E.M. Rogers to explain how a new idea or product gains acceptance and diffuses (or spreads) through a specific population or subset of an organization. For an innovator, the recommended strategy is simply to provide them with access to the new system and get out of their way. FEEDBACK: a. For an innovator, the recommended strategy is simply to provide them with access to the new system and get out of their way. b. For an innovator, the recommended strategy is simply to provide them with access to the new system and get out of their way.

Copyright Cengage Learning. Powered by Cognero.

Page 63


Chapter 12 - Strategic Planning and Project Management c. For an innovator, the recommended strategy is simply to provide them with access to the new system and get out of their way. d. For an innovator, the recommended strategy is simply to provide them with access to the new system and get out of their way.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Diffusion of Innovation Theory QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.8 - Identify the appropriate strategy to employ with each of five categories of innovation adopters. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 1:10 PM DATE MODIFIED: 7/18/2020 1:24 PM 92. Jeannine is aware that her company's IS needs a serious upgrade, and others in her department respect her opinion about this. Which is likely the most appropriate strategy for convincing Jeannine to adopt a new IS? a. simply provide Jeannine with access to the new system and get out of her way b. provide Jeannine with evidence of the system’s effectiveness and success stories c. provide Jeannine with data on how many others have tried the new system and have used it successfully d. provide Jeannine assistance getting started with the new system ANSWER: d RATIONALE: The diffusion of innovation theory was developed by E.M. Rogers to explain how a new idea or product gains acceptance and diffuses (or spreads) through a specific population or subset of an organization. Early adopters are opinion leaders whom others listen to and follow and are aware of the need for change. For an early adopter, the recommended strategy is to provide them assistance getting started. FEEDBACK: a. Early adopters are opinion leaders whom others listen to and follow and are aware of the need for change. For an early adopter, the recommended strategy is to provide them assistance getting started. b. Early adopters are opinion leaders whom others listen to and follow and are aware of the need for change. For an early adopter, the recommended strategy is to provide them assistance getting started. c. Early adopters are opinion leaders whom others listen to and follow and are aware of the need for change. For an early adopter, the recommended strategy is to provide them assistance getting started. d. Early adopters are opinion leaders whom others listen to and follow and are aware of the need for change. For an early adopter, the recommended strategy is to provide them assistance getting started.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Diffusion of Innovation Theory QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.8 - Identify the appropriate strategy to employ with each of five categories of innovation adopters. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 64


Chapter 12 - Strategic Planning and Project Management DATE CREATED: DATE MODIFIED:

7/18/2020 1:11 PM 7/18/2020 1:30 PM

93. For members of what the diffusion of innovation theory calls the early majority, the recommended strategy for promoting a new technology is to _____. a. provide them data on how many others have tried this and have used it successfully b. simply provide them with access to the new system and get out of their way c. provide them assistance getting started d. provide them with evidence of the system’s effectiveness and success stories ANSWER: d RATIONALE: The diffusion of innovation theory was developed by E.M. Rogers to explain how a new idea or product gains acceptance and diffuses (or spreads) through a specific population or subset of an organization. For an early majority target population, the recommended strategy is to provide them with evidence of the system’s effectiveness and success stories. FEEDBACK: a. For an early majority target population, the recommended strategy is to provide them with evidence of the system’s effectiveness and success stories. b. For an early majority target population, the recommended strategy is to provide them with evidence of the system’s effectiveness and success stories. c. For an early majority target population, the recommended strategy is to provide them with evidence of the system’s effectiveness and success stories. d. For an early majority target population, the recommended strategy is to provide them with evidence of the system’s effectiveness and success stories.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Diffusion of Innovation Theory QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.8 - Identify the appropriate strategy to employ with each of five categories of innovation adopters. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 1:12 PM DATE MODIFIED: 7/18/2020 1:34 PM 94. Rinor is skeptical of change and new ideas, even when they are promoted by opinion leaders. Which strategy would likely be most effective in convincing Rinor to try using a new information system? a. provide Rinor with evidence of the system’s effectiveness and success stories b. provide Rinor with data on how many others have tried the system and have used it successfully c. provide Rinor assistance getting started d. have Rinor's peers demonstrate how this change has helped them and bring pressure to bear on Rinor from other adopters ANSWER: b RATIONALE: The diffusion of innovation theory was developed by E.M. Rogers to explain how a new idea or product gains acceptance and diffuses (or spreads) through a specific population or subset of an organization. For a late majority target population, the recommended strategy is to provide them data on how many others have tried this and have used it successfully. FEEDBACK: a. For a late majority target population, the recommended strategy is to provide them data on how many others have tried this and have used it successfully.

Copyright Cengage Learning. Powered by Cognero.

Page 65


Chapter 12 - Strategic Planning and Project Management b. For a late majority target population, the recommended strategy is to provide them data on how many others have tried this and have used it successfully. c. For a late majority target population, the recommended strategy is to provide them data on how many others have tried this and have used it successfully. d. For a late majority target population, the recommended strategy is to provide them data on how many others have tried this and have used it successfully.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Diffusion of Innovation Theory QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.8 - Identify the appropriate strategy to employ with each of five categories of innovation adopters. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 1:12 PM DATE MODIFIED: 7/18/2020 1:43 PM 95. An IS manager has identified several of what the diffusion of innovation theory would term "laggards" in his department. It is likely that the most successful approach to persuading them to adopt a new information system would be to _____. a. have their peers demonstrate how this change has helped them and bring pressure to bear from other adopters b. provide them with data on how many others have tried this and have used it successfully c. provide them assistance getting started d. provide them with evidence of the system’s effectiveness and success stories ANSWER: a RATIONALE: The diffusion of innovation theory was developed by E.M. Rogers to explain how a new idea or product gains acceptance and diffuses (or spreads) through a specific population or subset of an organization. For a laggard target population, the recommended strategy is to have their peers demonstrate how this change has helped them and bring pressure to bear from other adopters. FEEDBACK: a. For a laggard target population, the recommended strategy is to have their peers demonstrate how this change has helped them and bring pressure to bear from other adopters. b. For a laggard target population, the recommended strategy is to have their peers demonstrate how this change has helped them and bring pressure to bear from other adopters. c. For a laggard target population, the recommended strategy is to have their peers demonstrate how this change has helped them and bring pressure to bear from other adopters. d. For a laggard target population, the recommended strategy is to have their peers demonstrate how this change has helped them and bring pressure to bear from other adopters.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Diffusion of Innovation Theory QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.8 - Identify the appropriate strategy to employ with each of five Copyright Cengage Learning. Powered by Cognero.

Page 66


Chapter 12 - Strategic Planning and Project Management KEYWORDS: DATE CREATED: DATE MODIFIED:

categories of innovation adopters. Bloom's: Remember 7/18/2020 1:12 PM 7/18/2020 1:47 PM

96. A simple way to illustrate what a company is doing well, where it can improve, what opportunities are available to it, and what environmental factors threaten its future is to _____. a. engage in organic strategic planning b. apply the Five Forces Model c. create a SWOT matrix d. write a mission statement and vision ANSWER: c RATIONALE: The analysis of an organization’s internal assessment and study of its external environment is summarized into a Strengths, Weaknesses, Opportunities, Threats (SWOT) matrix. The SWOT matrix is a simple way to illustrate what the company is doing well, where it can improve, what opportunities are available, and what environmental factors threaten the future of the organization. FEEDBACK: a. The SWOT matrix is a simple way to illustrate what the company is doing well, where it can improve, what opportunities are available, and what environmental factors threaten the future of the organization. b. The SWOT matrix is a simple way to illustrate what the company is doing well, where it can improve, what opportunities are available, and what environmental factors threaten the future of the organization. c. The SWOT matrix is a simple way to illustrate what the company is doing well, where it can improve, what opportunities are available, and what environmental factors threaten the future of the organization. d. The SWOT matrix is a simple way to illustrate what the company is doing well, where it can improve, what opportunities are available, and what environmental factors threaten the future of the organization.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Analyze Situation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.1 - Describe the four phases of a goals-based strategic planning process. KEYWORDS: Bloom's: Remember DATE CREATED: 7/18/2020 1:47 PM DATE MODIFIED: 7/18/2020 1:52 PM Essay 97. As strategic planner of the newly formed Business Technology Student Club, you are tasked with formulating a goal to improve the members' professional development. How would you employ the SMART goals principles in this situation? ANSWER:

A SMART goal is specific, measurable, achievable, relevant, and time constrained. First, I would make the goal specific enough. For example, I would focus on technological skills development of the members. Second, the goal must be measurable. This means that there

Copyright Cengage Learning. Powered by Cognero.

Page 67


Chapter 12 - Strategic Planning and Project Management must be an adequate means of measuring professional development. I would look for questionnaires or quizzes to measure the technological skills of members. Third, the goal must be achievable, which means the members must have adequate opportunities for technological skills development. Next, the goal must be relevant. I would narrow down the goal to spreadsheet modeling and analysis, which is a relevant skill required by most employers. Finally, the goal must be time constrained, which means we would measure the progress at specific time intervals. For example, we could measure spreadsheet modeling knowledge at the beginning and at the end of an academic year. RATIONALE:

The use of so-called SMART goals has long been advocated by management consultants. The principal advantages of SMART goals are that they are easy to understand, are easily tracked, and contribute real value to the organization. The SMART acronym stands for: • • • • •

POINTS: RUBRIC:

Specific. Specific goals have a much greater chance of being understood and accomplished than vague goals. Specific goals use action verbs and specify who, what, when, where, and why. Measurable. Goals that are measurable include numeric or descriptive measures that define criteria such as quantity, quality, and cost so that progress toward meeting the goal can be determined. Achievable. Goals should be ambitious yet realistic and attainable. Goals that are either completely out of reach or below standard performance are worthless and demotivating. Relevant. Goals should strongly contribute to the mission of the department; why else expend the effort? Time constrained. A time limit should be set to reach the goal to help define the priority to assign to meeting the goal.

1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Applies the SMART goals principles to the professional development scenario Demonstrates knowledge of the SMART goals principles

DIFFICULTY: Moderate REFERENCES: Set Direction QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.12.2 - Discuss how the seven layers of the strategic planning pyramid can improve the planning process. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/16/2020 5:01 PM Copyright Cengage Learning. Powered by Cognero.

Page 68


Chapter 12 - Strategic Planning and Project Management 98. Suppose you have joined a new business at the entry level. In the long run, you wish to establish yourself as an IS strategy person. How would you chart your organizational growth in that direction? ANSWER: First, I would examine and familiarize myself with the corporate objectives, goals, and strategies. I would generate many ideas that support these corporate-level goals. I would volunteer to serve as a liaison with business units in order to gain a deeper understanding of their needs. In addition, I would identify IS projects that would meet those business units' needs. RATIONALE:

POINTS: RUBRIC:

In mature planning organizations, IS workers are constantly picking up ideas for potential projects through their interactions with various business managers and from observing other IS organizations and competitors. They also keep abreast of new IS developments and consider how innovations and new technologies might be applied in their firm. As members of the IS organization review and consider the corporate objectives, goals, and strategies, they can generate many ideas for IS projects that support corporate objectives and goals. They also recognize the need for IS projects that help other corporate units fulfill their business objectives. Often, experienced IS managers are assigned to serve as liaisons with the business units in order to gain a deeper understanding of each business unit and its needs. The IS managers are then able to help identify and define IS projects needed to meet those needs. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Describes successful pathways for identifying beneficial IS projects and initiatives

DIFFICULTY: Moderate REFERENCES: Identifying IS Projects and Initiatives QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.12.3 - Outline a process for prioritizing IS projects and initiatives. NATIONAL STANDARDS: United States - BUSPROG: Strategy - Strategy KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/16/2020 5:05 PM 99. Suppose you work for a specialty food store. The owners are considering providing an e-commerce solution for their customers and have asked your opinion on this "make or buy" decision. How would you approach this problem? ANSWER: I would start by assessing whether we have an adequate number of qualified staff to develop and deliver this product at an acceptable level of quality and within a reasonable timeframe. If we cannot be assured of all of these factors--human resources, time, experience, and quality--then I would find out whether the factor that is missing can be attained reasonably. Next, I would assess the willingness of staff to take the necessary measures to create the e-commerce product. If the answer to both questions is "yes," I would advise that we make the solution in-house. If the answers to these questions are Copyright Cengage Learning. Powered by Cognero.

Page 69


Chapter 12 - Strategic Planning and Project Management negative, I would recommend that we buy the solution from a vendor. RATIONALE:

POINTS: RUBRIC:

The make-or-buy decision is a key decision made during the plan purchase and acquisition process. The make-or-buy decision involves comparing the pros and cons of in-house production versus outsourcing of a given product or service. In addition to cost, two key factors to consider in this decision are (1) “Do we have a sufficient number of employees with the skills and experience required to deliver the product or service at an acceptable level of quality and within the required deadlines?” and (2) “Are we willing to invest the management time, energy, and money required to identify, recruit, train, develop, and manage people with the skills to do this kind of work?” 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Demonstrates understanding of the term "make-or-buy decision" Cites the key factors to consider in a make-or-buy decision

DIFFICULTY: Moderate REFERENCES: Project Management Knowledge Areas QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.12.6 - Briefly discuss the 10 knowledge areas associated with the science of project management. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/16/2020 5:16 PM 100. You own a company that designs and installs data back-up systems. You are proud of your staff, who are quite adept at delivering high-quality services quicker than most of the competition. You are negotiating with a potential customer interested in your services, and they have asked you to choose a pricing contract. Which pricing contract would you opt for and why? ANSWER: I would choose the cost-reimbursement contract model for pricing my services. To be more specific, I would choose the cost-plus-incentive-fee model. Since my staff are quicker and better than the competition, I am confident of delivering quality service. By choosing a cost-plus-incentive-fee model, I will be able to ensure maximum benefits for the business and the staff. RATIONALE:

Contract types fall into three main categories: • •

Fixed-price contract. With this type of contract, the buyer and provider agree to a total fixed price for a well-defined product or service. Cost-reimbursable contract. This type of contract requires the buyer to pay the provider an amount that covers the provider’s actual costs plus an additional

Copyright Cengage Learning. Powered by Cognero.

Page 70


Chapter 12 - Strategic Planning and Project Management

POINTS: RUBRIC:

amount or percentage for profit. Three common types of cost-reimbursable contracts exist. In a cost-plus-fee or cost-plus-percentage of cost contract, the provider is reimbursed for all allowable costs and receives a percentage of the costs as a fee. In a cost-plus-fixed-fee contract, the provider is reimbursed for all allowable costs and receives a fixed fee. In a cost-plus-incentive-fee contract, the provider is reimbursed for all allowable costs. In addition, a predetermined fee is paid if the provider achieves specified performance objectives. Time and material contract. Under this type of contract, the buyer pays the provider for both the time and materials required to complete the contract. The contract includes an agreed-upon hourly rate and unit price for the various materials to be used.

1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Demonstrates knowledge of the types of contracts Justifies selection of the chosen contract type using data from the scenario

DIFFICULTY: Moderatea REFERENCES: Project Management Knowledge Areas QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.12.6 - Briefly discuss the 10 knowledge areas associated with the science of project management. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/16/2020 5:22 PM 101. You have been assigned the task of ensuring that the new reimbursement system project stays within the agreed-upon scope. What activities would you perform to accomplish your assignment? ANSWER: I would begin by defining a formal scope change process, conferring with the project manager and key business managers to determine whether and when changes in scope will be allowed. If changes are allowed, I would require the business units to clearly state the scope changes requested along with reasons for each change. If changes are not allowed, I will notify requesters that their concerns will be addressed after the project is completed. If changes are allowed, the impact on related tasks and costs will will be studied. If the impacts are within acceptable limits, the change will be implemented. RATIONALE:

To avoid problems associated with a change in project scope, a formal scope change process should be defined before the project begins. The project manager and key business managers should decide whether they will allow scope changes at any time during the project, only in the early stages of the project, or not at all. The trade-off is that the more

Copyright Cengage Learning. Powered by Cognero.

Page 71


Chapter 12 - Strategic Planning and Project Management flexibility you allow for scope changes, the more likely the project will meet users’ features and performance requirements. However, the project will be more difficult to complete within changing time and budget constraints as it is harder to hit a moving target. The change process should capture a clear definition of the change that is being requested, who is requesting it, and why. If the project team has decided not to allow any scope changes during the project, then each new requested scope change is filed with other requested changes. Once the original project is complete, the entire set of requested scope changes can be reviewed, and the project team can decide which, if any, of the changes will be implemented and when. Often, it is cheaper to initiate one project to implement numerous related changes rather than start several independent projects. A follow-on project can then be considered to implement the recommended changes. The scope, cost, schedule, and benefits of the project must be determined to ensure that it is well defined and worth doing.

POINTS: RUBRIC:

If the project team has decided to allow scope changes during the project, then time and effort must be allowed to assess how the scope change will affect the interrelated project variables of cost, schedule, quality, and expectations. This impact on the project must be weighed against the benefits of implementing the scope change, and the team must decide whether to implement the scope change. Of course, there may be alternatives for implementing a particular scope change, and the pros and cons must be weighed for each. The time required just to research scope changes can add considerable cost and time to the original project. Each scope change should be formally approved or rejected by the project manager and key stakeholders. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Demonstrates understanding of scope management guidelines Applies scope management guidelines to the given scenario

DIFFICULTY: Moderate REFERENCES: Project Management Knowledge Areas QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.12.6 - Briefly discuss the 10 knowledge areas associated with the science of project management. NATIONAL STANDARDS: United States - BUSPROG: Analysis KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:55 PM DATE MODIFIED: 7/16/2020 5:30 PM

Copyright Cengage Learning. Powered by Cognero.

Page 72


Chapter 13 - System Acquisition and Development True / False 1. Pressure to increase profitability and improve operational efficiencies often drives organizations to implement new approaches and technology. a. True b. False ANSWER: True RATIONALE: To stay competitive and profitable, companies must upgrade the core tools they use to deliver products and services to their customers. The need to improve business processes prompts some businesses to pursue opportunities outside their traditional areas of business. FEEDBACK: Correct To stay competitive and profitable, companies must upgrade the core tools they use to deliver products and services to their customers. The need to improve business processes prompts some businesses to pursue opportunities outside their traditional areas of business. Incorrect To stay competitive and profitable, companies must upgrade the core tools they use to deliver products and services to their customers. The need to improve business processes prompts some businesses to pursue opportunities outside their traditional areas of business.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Subscribe vs. Buy vs. Build QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.1 - Identify the pros and cons associated with subscribing to, buying, and building software. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:53 PM DATE MODIFIED: 7/18/2020 4:39 PM 2. The purpose of studying a system is to identify the strengths and weaknesses of the existing system and examine current inputs, outputs, processes, security and controls, and system performance. a. True b. False ANSWER: True RATIONALE: The purpose of studying the system is to identify the strengths and weaknesses of the existing system and examine current inputs, outputs, processes, security and controls, and system performance. FEEDBACK: Correct The purpose of studying the system is to identify the strengths and weaknesses of the existing system and examine current inputs, outputs, processes, security and controls, and system performance. Incorrect The purpose of studying the system is to identify the strengths and weaknesses of the existing system and examine current inputs, outputs, processes, security and controls, and system performance.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy System Analysis True / False

Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 13 - System Acquisition and Development HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.7 - Identify and state the goal of each of the six phases of the Waterfall approach. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:53 PM DATE MODIFIED: 7/18/2020 4:44 PM 3. Joint application development (JAD) sessions with a cross section of users and stakeholders in a project are an effective way to define system requirements. a. True b. False ANSWER: True RATIONALE: The use of JAD sessions with a cross section of users and stakeholders in the project is an effective way to define system requirements. FEEDBACK: Correct The use of JAD sessions with a cross section of users and stakeholders in the project is an effective way to define system requirements. Incorrect The use of JAD sessions with a cross section of users and stakeholders in the project is an effective way to define system requirements.

POINTS: 1 DIFFICULTY: Easy REFERENCES: System Analysis QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.8 - Identify and briefly describe the primary tools and techniques used during system development. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:53 PM DATE MODIFIED: 7/18/2020 4:50 PM 4. Security and control considerations are a negligible part of the system development process. a. True b. False ANSWER: False RATIONALE: Security and control considerations need to be an integral part of the entire system development process. FEEDBACK: Correct Security and control considerations need to be an integral part of the entire system development process. Incorrect Security and control considerations need to be an integral part of the entire system development process.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy System Analysis True / False

Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 13 - System Acquisition and Development HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.7 - Identify and state the goal of each of the six phases of the Waterfall approach. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:53 PM DATE MODIFIED: 7/18/2020 4:53 PM 5. A data flow diagram (DFD) does not provide any information about process timing. a. True b. False ANSWER: True RATIONALE: A data-flow diagram (DFD) is a diagram used during both the analysis and design phases to document the processes of the current system or to provide a model of a proposed new system. The DFD does not provide any information about the process timing (e.g., whether the various processes happen in sequence or are parallel). FEEDBACK: Correct The DFD does not provide any information about the process timing (e.g., whether the various processes happen in sequence or are parallel). Incorrect The DFD does not provide any information about the process timing (e.g., whether the various processes happen in sequence or are parallel).

POINTS: 1 DIFFICULTY: Easy REFERENCES: System Analysis QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.8 - Identify and briefly describe the primary tools and techniques used during system development. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/18/2020 4:56 PM 6. Feasibility analysis assesses the technical, economic, legal, operational, and schedule feasibility of a project. a. True b. False ANSWER: True RATIONALE: Feasibility analysis is an assessment of the technical, economic, legal, operational, and schedule feasibility of a project. FEEDBACK: Correct Feasibility analysis is an assessment of the technical, economic, legal, operational, and schedule feasibility of a project. Incorrect Feasibility analysis is an assessment of the technical, economic, legal, operational, and schedule feasibility of a project.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy System Investigation True / False

Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 13 - System Acquisition and Development HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.9 - Define five types of feasibility that must be assessed. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/18/2020 4:58 PM 7. The disaster recovery plan focuses on technology recovery and identifies the people or the teams that are responsible to take action in the event of a disaster, what exactly these people will do when a disaster strikes, and the information system resources required to support critical business processes. a. True b. False ANSWER: True RATIONALE: A disaster recovery plan focuses on technology recovery and identifies the people or the teams responsible for taking action in the event of a disaster, what exactly these people will do when a disaster strikes, and the information system resources required to support critical business processes. FEEDBACK: Correct A disaster recovery plan focuses on technology recovery and identifies the people or the teams responsible for taking action in the event of a disaster, what exactly these people will do when a disaster strikes, and the information system resources required to support critical business processes. Incorrect A disaster recovery plan focuses on technology recovery and identifies the people or the teams responsible for taking action in the event of a disaster, what exactly these people will do when a disaster strikes, and the information system resources required to support critical business processes.

POINTS: 1 DIFFICULTY: Easy REFERENCES: System Design QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.7 - Identify and state the goal of each of the six phases of the Waterfall approach. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/18/2020 5:00 PM 8. All members of a system investigation team must be co-located to ensure a successful start to a project. a. True b. False ANSWER: False RATIONALE: The system investigation team can be quite diverse, often with members located around the world. FEEDBACK: Correct The system investigation team can be quite diverse, often with members located around the world. Incorrect The system investigation team can be quite diverse, often with members located around the world. Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 13 - System Acquisition and Development POINTS: 1 DIFFICULTY: Easy REFERENCES: System Investigation QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.7 - Identify and state the goal of each of the six phases of the Waterfall approach. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/18/2020 5:03 PM 9. Operational feasibility takes into account the need to meet certain system performance requirements that are considered important to system users and stakeholders. a. True b. False ANSWER: True RATIONALE: Operational feasibility also takes into account the need to meet certain system performance requirements (e.g., response time for frequent online transactions, number of concurrent users it must support, reliability, and ease of use) that are considered important to system users and stakeholders. FEEDBACK: Correct Operational feasibility also takes into account the need to meet certain system performance requirements (e.g., response time for frequent online transactions, number of concurrent users it must support, reliability, and ease of use) that are considered important to system users and stakeholders. Incorrect Operational feasibility also takes into account the need to meet certain system performance requirements (e.g., response time for frequent online transactions, number of concurrent users it must support, reliability, and ease of use) that are considered important to system users and stakeholders.

POINTS: 1 DIFFICULTY: Easy REFERENCES: System Investigation QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.9 - Define five types of feasibility that must be assessed. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/18/2020 5:08 PM 10. The primary outcome of systems analysis is a prioritized list of system requirements and a recommendation of how to proceed with a project. a. True b. False ANSWER: True RATIONALE: The primary outcome of system analysis is a prioritized list of system requirements and a Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 13 - System Acquisition and Development recommendation of how to proceed with the project. FEEDBACK:

Correct

The primary outcome of system analysis is a prioritized list of system requirements and a recommendation of how to proceed with the project. Incorrect The primary outcome of system analysis is a prioritized list of system requirements and a recommendation of how to proceed with the project.

POINTS: 1 DIFFICULTY: Easy REFERENCES: System Analysis QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.7 - Identify and state the goal of each of the six phases of the Waterfall approach. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/18/2020 5:10 PM 11. System testing is often done by independent testers who are not involved in developing program code. a. True b. False ANSWER: True RATIONALE: System testing is often done by independent testers who were not involved in developing program code. FEEDBACK: Correct System testing is often done by independent testers who were not involved in developing program code. Incorrect System testing is often done by independent testers who were not involved in developing program code.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Integration and Testing QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.10 - Identify the purpose and participants involved in various types of testing from unit testing to user acceptance testing. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/18/2020 5:12 PM 12. Even if unit testing is successful, developers cannot assume they can combine individual components into a working system without any problems. a. True b. False ANSWER: True RATIONALE: Even if unit testing is successful, developers cannot assume that individual components can Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 13 - System Acquisition and Development be combined into a working system. Unfortunately, one component that functions incorrectly can affect another component and, if these problems go undetected, they can cause serious trouble later. FEEDBACK:

Correct

Even if unit testing is successful, developers cannot assume that individual components can be combined into a working system. Unfortunately, one component that functions incorrectly can affect another component and, if these problems go undetected, they can cause serious trouble later. Incorrect Even if unit testing is successful, developers cannot assume that individual components can be combined into a working system. Unfortunately, one component that functions incorrectly can affect another component and, if these problems go undetected, they can cause serious trouble later.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Integration and Testing QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.10 - Identify the purpose and participants involved in various types of testing from unit testing to user acceptance testing. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/18/2020 5:14 PM 13. While discussing the preliminary feasibility of a project, your colleague insists that figures used in the economic feasibility analysis be very accurate down to the last cent. His claim is appropriate and not uncommon. a. True b. False ANSWER: False RATIONALE: It is important to recognize that at this early stage of the development process, the cost and benefit amounts are rough estimates and subject to change should the project continue. So, while the mathematics involved may make it appear that the results are precise, the result is no more accurate than cash flow estimates, which are often no more than refined guesses. FEEDBACK: Correct It is important to recognize that at this early stage of the development process, the cost and benefit amounts are rough estimates and subject to change should the project continue. Incorrect It is important to recognize that at this early stage of the development process, the cost and benefit amounts are rough estimates and subject to change should the project continue.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: System Investigation QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.9 - Define five types of feasibility that must be assessed. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:54 PM Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 13 - System Acquisition and Development DATE MODIFIED:

7/18/2020 5:17 PM

14. User acceptance testing (UAT) is a critical activity that must be completed successfully before newly developed software can be rolled out to the market. a. True b. False ANSWER: True RATIONALE: UAT is a critical activity that must be completed successfully before newly developed software can be rolled out to the market. FEEDBACK: Correct UAT is a critical activity that must be completed successfully before newly developed software can be rolled out to the market. Incorrect UAT is a critical activity that must be completed successfully before newly developed software can be rolled out to the market.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Integration and Testing QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.10 - Identify the purpose and participants involved in various types of testing from unit testing to user acceptance testing. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/18/2020 5:19 PM 15. The eventual success of any system solely depends on how users work with it. a. True b. False ANSWER: False RATIONALE: The eventual success of any system depends not only on how users work with it, but how well the IS personnel within the organization can operate and support it. FEEDBACK: Correct The eventual success of any system depends not only on how users work with it, but how well the IS personnel within the organization can operate and support it. Incorrect The eventual success of any system depends not only on how users work with it, but how well the IS personnel within the organization can operate and support it.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementation QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.7 - Identify and state the goal of each of the six phases of the Waterfall approach. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 13 - System Acquisition and Development DATE MODIFIED:

7/18/2020 5:21 PM

16. Unit testing uncovers any defects in the interface between individual components of an information system. a. True b. False ANSWER: False RATIONALE: Integration testing involves linking individual components together and testing them as a group to uncover any defects in the interface between one component and another (e.g., component 1 fails to pass a key parameter to component 2). FEEDBACK: Correct Integration testing involves linking individual components together and testing them as a group to uncover any defects in the interface between one component and another (e.g., component 1 fails to pass a key parameter to component 2). Incorrect Integration testing involves linking individual components together and testing them as a group to uncover any defects in the interface between one component and another (e.g., component 1 fails to pass a key parameter to component 2).

POINTS: 1 DIFFICULTY: Easy REFERENCES: Integration and Testing QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.10 - Identify the purpose and participants involved in various types of testing from unit testing to user acceptance testing. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/18/2020 5:26 PM 17. Perceived usefulness and perceived ease of use do not have any influence in determining whether someone will use an information system. a. True b. False ANSWER: False RATIONALE: Recall that the technology acceptance model (TAM) specifies the factors that can lead to better attitudes about the use of a new information system, along with its higher acceptance and usage. Perceived usefulness and perceived ease of use strongly influence whether someone will use an information system. FEEDBACK: Correct Perceived usefulness and perceived ease of use strongly influence whether someone will use an information system. Incorrect Perceived usefulness and perceived ease of use strongly influence whether someone will use an information system.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementation QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.7 - Identify and state the goal of each of the six phases of the Waterfall approach. Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 13 - System Acquisition and Development NATIONAL STANDARDS: KEYWORDS: DATE CREATED: DATE MODIFIED:

United States - BUSPROG: Technology Bloom's: Remember 11/19/2019 5:54 PM 7/18/2020 5:28 PM

18. For a small system, site preparation can be as simple as rearranging the furniture in an office to make room for a computer. a. True b. False ANSWER: True RATIONALE: For a small system, site preparation can be as simple as rearranging the furniture in an office to make room for a computer. FEEDBACK: Correct For a small system, site preparation can be as simple as rearranging the furniture in an office to make room for a computer. Incorrect For a small system, site preparation can be as simple as rearranging the furniture in an office to make room for a computer.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementation QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.7 - Identify and state the goal of each of the six phases of the Waterfall approach. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/18/2020 5:30 PM 19. Parallel start-up involves running a complete new system for one group of users while the rest of the users still run an old system. a. True b. False ANSWER: False RATIONALE: Pilot start-up involves running the complete new system for one group of users rather than for all users. FEEDBACK: Correct Pilot start-up involves running the complete new system for one group of users rather than for all users. Incorrect Pilot start-up involves running the complete new system for one group of users rather than for all users.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementation QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.11 - Identify three approaches for system cutover. Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 13 - System Acquisition and Development NATIONAL STANDARDS: KEYWORDS: DATE CREATED: DATE MODIFIED:

United States - BUSPROG: Technology Bloom's: Remember 11/19/2019 5:54 PM 7/19/2020 6:01 AM

20. One of the significant drawbacks to building a custom system is the high cost compared to off-the-shelf software. a. True b. False ANSWER: True RATIONALE: Building custom software can provide a better match to the current work processes along with a potential competitive advantage; however, software development can be extremely costly, and it can take months or even years to develop custom software. FEEDBACK: Correct Building custom software can provide a better match to the current work processes along with a potential competitive advantage; however, software development can be extremely costly, and it can take months or even years to develop custom software. Incorrect Building custom software can provide a better match to the current work processes along with a potential competitive advantage; however, software development can be extremely costly, and it can take months or even years to develop custom software.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Subscribe vs. Buy vs. Build QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.1 - Identify the pros and cons associated with subscribing to, buying, and building software. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/19/2020 6:05 AM 21. Monitoring is the process of analyzing systems to make sure they are operating as intended. a. True b. False ANSWER: False RATIONALE: System review is the process of analyzing a system to make sure it is operating as intended. FEEDBACK: Correct System review is the process of analyzing a system to make sure it is operating as intended. Incorrect System review is the process of analyzing a system to make sure it is operating as intended.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Easy System Operation and Maintenance True / False False

Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 13 - System Acquisition and Development LEARNING OBJECTIVES: POIS.14e.13.7 - Identify and state the goal of each of the six phases of the Waterfall approach. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/21/2020 9:39 AM 22. Suppose your employer is using software that was written using FORTRAN 77. They wish to modify it to accommodate new requirements. It is sound advice to suggest that they consider switching to an application using newer technologies (e.g., Microsoft ASP.Net) rather than modify the current software. a. True b. False ANSWER: True RATIONALE: The maintenance process can be especially difficult for older software. A legacy system might have cost millions of dollars to develop, patch, and modify over the years. The maintenance costs for legacy systems can become quite expensive, and, at some point, it becomes more cost effective to switch to new programs and applications than to repair and maintain the legacy system. FEEDBACK: Correct The maintenance process can be especially difficult for older software. A legacy system might have cost millions of dollars to develop, patch, and modify over the years. The maintenance costs for legacy systems can become quite expensive, and, at some point, it becomes more cost effective to switch to new programs and applications than to repair and maintain the legacy system. Incorrect The maintenance process can be especially difficult for older software. A legacy system might have cost millions of dollars to develop, patch, and modify over the years. The maintenance costs for legacy systems can become quite expensive, and, at some point, it becomes more cost effective to switch to new programs and applications than to repair and maintain the legacy system.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: System Operation and Maintenance QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.7 - Identify and state the goal of each of the six phases of the Waterfall approach. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/21/2020 9:46 AM 23. A slipstream upgrade is a minor upgrade—typically a code adjustment or minor bug fix. a. True b. False ANSWER: True RATIONALE: A slipstream upgrade is a minor system upgrade—typically a code adjustment or minor bug fix. FEEDBACK: Correct A slipstream upgrade is a minor system upgrade—typically a code adjustment or Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 13 - System Acquisition and Development minor bug fix. Incorrect A slipstream upgrade is a minor system upgrade—typically a code adjustment or minor bug fix.

POINTS: 1 DIFFICULTY: Easy REFERENCES: System Operation and Maintenance QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.7 - Identify and state the goal of each of the six phases of the Waterfall approach. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/21/2020 10:22 AM 24. Waterfall and Agile are two types of software development processes available to organizations. a. True b. False ANSWER: True RATIONALE: Organizations can use several different approaches when developing their own software. Two of those are the Waterfall and Agile software development processes. FEEDBACK: Correct Organizations can use several different approaches when developing their own software. Two of those are the Waterfall and Agile software development processes. Incorrect Organizations can use several different approaches when developing their own software. Two of those are the Waterfall and Agile software development processes.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Subscribe vs. Buy vs. Build QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.3 - Identify two approaches to software development. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/21/2020 10:25 AM 25. Agile is better suited for developing larger information systems than smaller ones. a. True b. False ANSWER: False RATIONALE: Agile is often better suited for developing smaller information systems than larger ones. FEEDBACK: Correct Agile is often better suited for developing smaller information systems than larger ones. Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 13 - System Acquisition and Development Incorrect Agile is often better suited for developing smaller information systems than larger ones.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Agile Development QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.13 - Identify the advantages and disadvantages of the Agile system development approach. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/21/2020 10:30 AM Multiple Choice 26. _____ requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system. a. Causal analysis b. Creative analysis c. Critical analysis d. Data flow analysis ANSWER: c RATIONALE: Critical analysis requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system. Critical analysis also involves challenging users about their needs and determining which are truly critical requirements rather than “nice to have” features. FEEDBACK: a. Critical analysis requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system. b. Critical analysis requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system. c. Critical analysis requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system. d. Critical analysis requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Easy System Analysis Multiple Choice False

Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 13 - System Acquisition and Development LEARNING OBJECTIVES: POIS.14e.13.8 - Identify and briefly describe the primary tools and techniques used during system development. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/21/2020 10:33 AM 27. A scrum team usually consists of _____. a. 12 or fewer people b. 12 to 15 people c. 15 to 20 people d. more than 20 people ANSWER: a RATIONALE: A Scrum master is the person who coordinates all Scrum activities, and a Scrum team consists of a dozen or fewer people who perform all systems development activities from investigation to testing so there is less personnel turnover than on the typical Waterfall system development project. FEEDBACK: a. A Scrum master is the person who coordinates all Scrum activities, and a Scrum team consists of a dozen or fewer people who perform all systems development activities from investigation to testing so there is less personnel turnover than on the typical Waterfall system development project. b. A Scrum master is the person who coordinates all Scrum activities, and a Scrum team consists of a dozen or fewer people who perform all systems development activities from investigation to testing so there is less personnel turnover than on the typical Waterfall system development project. c. A Scrum master is the person who coordinates all Scrum activities, and a Scrum team consists of a dozen or fewer people who perform all systems development activities from investigation to testing so there is less personnel turnover than on the typical Waterfall system development project. d. A Scrum master is the person who coordinates all Scrum activities, and a Scrum team consists of a dozen or fewer people who perform all systems development activities from investigation to testing so there is less personnel turnover than on the typical Waterfall system development project.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Agile Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.12 - Describe the Agile development process. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/21/2020 10:38 AM 28. The Pareto principle is also known as the _____. a. results rule b. causes rule c. 50-50 rule d. 80-20 rule ANSWER: d RATIONALE: The Pareto principle (also known as the 80–20 rule) is a rule of thumb used in business that helps people focus on the vital 20 percent that generate 80 percent of the results. Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 13 - System Acquisition and Development FEEDBACK:

a. The Pareto principle (also known as the 80–20 rule) is a rule of thumb used in

business that helps people focus on the vital 20 percent that generate 80 percent of the results. b. The Pareto principle (also known as the 80–20 rule) is a rule of thumb used in business that helps people focus on the vital 20 percent that generate 80 percent of the results. c. The Pareto principle (also known as the 80–20 rule) is a rule of thumb used in business that helps people focus on the vital 20 percent that generate 80 percent of the results. d. The Pareto principle (also known as the 80–20 rule) is a rule of thumb used in business that helps people focus on the vital 20 percent that generate 80 percent of the results.

POINTS: 1 DIFFICULTY: Easy REFERENCES: System Analysis QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.8 - Identify and briefly describe the primary tools and techniques used during system development. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/21/2020 10:39 AM 29. In the context of data-flow diagrams (DFDs), a(n) _____ shows either the source or destination of the data. a. data-flow line b. entity symbol c. process symbol d. data store symbol ANSWER: b RATIONALE: Data-flow diagrams use four primary symbols. Of these, the entity symbol shows either the source or destination of the data (e.g., customer, warehouse). FEEDBACK: a. Data-flow diagrams use four primary symbols. Of these, the entity symbol shows either the source or destination of the data (e.g., customer, warehouse). b. Data-flow diagrams use four primary symbols. Of these, the entity symbol shows either the source or destination of the data (e.g., customer, warehouse). c. Data-flow diagrams use four primary symbols. Of these, the entity symbol shows either the source or destination of the data (e.g., customer, warehouse). d. Data-flow diagrams use four primary symbols. Of these, the entity symbol shows either the source or destination of the data (e.g., customer, warehouse).

POINTS: 1 DIFFICULTY: Easy REFERENCES: System Analysis QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.8 - Identify and briefly describe the primary tools and techniques used during system development. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 16


Chapter 13 - System Acquisition and Development DATE CREATED: DATE MODIFIED:

11/19/2019 5:54 PM 7/21/2020 10:42 AM

30. Tara and Zach are leading a systems development project and they want the investigation phase to go smoothly and quickly. They decide to use _____ because it will also help with the analysis and design phases. a. direct observation b. Agile systems development c. functional decomposition d. joint application development ANSWER: d RATIONALE: Joint application development (JAD) is a structured meeting process that can accelerate and improve the efficiency and effectiveness of not only the investigation phase but also the analysis and design phases of a system development project. FEEDBACK: a. Joint application development (JAD) is a structured meeting process that can accelerate and improve the efficiency and effectiveness of not only the investigation phase but also the analysis and design phases of a system development project. b. Joint application development (JAD) is a structured meeting process that can accelerate and improve the efficiency and effectiveness of not only the investigation phase but also the analysis and design phases of a system development project. c. Joint application development (JAD) is a structured meeting process that can accelerate and improve the efficiency and effectiveness of not only the investigation phase but also the analysis and design phases of a system development project. d. Joint application development (JAD) is a structured meeting process that can accelerate and improve the efficiency and effectiveness of not only the investigation phase but also the analysis and design phases of a system development project.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: System Investigation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.8 - Identify and briefly describe the primary tools and techniques used during system development. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/21/2020 10:45 AM 31. Laura is carefully estimating the time required for each phase of a proposed system development project to determine whether her company can meet the client's desired completion date. Laura is checking on _____. a. technical feasibility b. schedule feasibility c. deadline feasibility d. economic feasibility ANSWER: b RATIONALE: Schedule feasibility is the process of determining whether a project can be completed within a desired time frame. FEEDBACK: a. Schedule feasibility is the process of determining whether a project can be completed within a desired time frame.

Copyright Cengage Learning. Powered by Cognero.

Page 17


Chapter 13 - System Acquisition and Development b. Schedule feasibility is the process of determining whether a project can be completed within a desired time frame.

c. Schedule feasibility is the process of determining whether a project can be completed within a desired time frame. d. Schedule feasibility is the process of determining whether a project can be completed within a desired time frame.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: System Investigation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.9 - Define five types of feasibility that must be assessed. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/21/2020 10:47 AM 32. _____ determines whether the expected benefits associated with a project outweigh the expected costs sufficiently to make the project financially attractive. a. Economic feasibility b. Technical feasibility c. Legal feasibility d. Operational feasibility ANSWER: a RATIONALE: Economic feasibility determines whether the expected benefits associated with the project outweigh the expected costs sufficiently to make the project financially attractive. FEEDBACK: a. Economic feasibility determines whether the expected benefits associated with the project outweigh the expected costs sufficiently to make the project financially attractive. b. Economic feasibility determines whether the expected benefits associated with the project outweigh the expected costs sufficiently to make the project financially attractive. c. Economic feasibility determines whether the expected benefits associated with the project outweigh the expected costs sufficiently to make the project financially attractive. d. Economic feasibility determines whether the expected benefits associated with the project outweigh the expected costs sufficiently to make the project financially attractive.

POINTS: 1 DIFFICULTY: Easy REFERENCES: System Investigation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.9 - Define five types of feasibility that must be assessed. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/21/2020 10:50 AM Copyright Cengage Learning. Powered by Cognero.

Page 18


Chapter 13 - System Acquisition and Development 33. A _____ is a description of the logical and physical structure of data and the relationships among the data for each user. a. data dictionary b. process c. schema d. cold site ANSWER: c RATIONALE: One of the steps in designing a database involves “telling” the database management system (DBMS) the logical and physical structure of the data and the relationships among the data for each user. Recall that this description is called a schema, and it is entered into the DBMS using a data definition language. FEEDBACK: a. One of the steps in designing a database involves “telling” the database management system (DBMS) the logical and physical structure of the data and the relationships among the data for each user. Recall that this description is called a schema, and it is entered into the DBMS using a data definition language. b. One of the steps in designing a database involves “telling” the database management system (DBMS) the logical and physical structure of the data and the relationships among the data for each user. Recall that this description is called a schema, and it is entered into the DBMS using a data definition language. c. One of the steps in designing a database involves “telling” the database management system (DBMS) the logical and physical structure of the data and the relationships among the data for each user. Recall that this description is called a schema, and it is entered into the DBMS using a data definition language. d. One of the steps in designing a database involves “telling” the database management system (DBMS) the logical and physical structure of the data and the relationships among the data for each user. Recall that this description is called a schema, and it is entered into the DBMS using a data definition language.

POINTS: 1 DIFFICULTY: Easy REFERENCES: System Design QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.8 - Identify and briefly describe the primary tools and techniques used during system development. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/21/2020 10:53 AM 34. _____ creates a complete set of technical specifications that can be used to construct an information system. a. System design b. System investigation c. System analysis d. System development ANSWER: a RATIONALE: The purpose of system design phase is to answer the question, “How will the information system solve this problem?” The primary result of the system design phase is a technical design that details system outputs, inputs, controls, and user interfaces; specifies hardware, software, databases, telecommunications, personnel, and procedures; and shows how these Copyright Cengage Learning. Powered by Cognero.

Page 19


Chapter 13 - System Acquisition and Development components are interrelated. In other words, system design creates a complete set of technical specifications that can be used to construct the information system. FEEDBACK:

a. System design creates a complete set of technical specifications that can be used to construct the information system.

b. System design creates a complete set of technical specifications that can be used to construct the information system. c. System design creates a complete set of technical specifications that can be used to construct the information system. d. System design creates a complete set of technical specifications that can be used to construct the information system.

POINTS: 1 DIFFICULTY: Easy REFERENCES: System Design QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.7 - Identify and state the goal of each of the six phases of the Waterfall approach. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/21/2020 10:56 AM 35. In a data-flow diagram (DFD), the _____ includes arrows that show the direction of data movement. a. process symbol b. entity symbol c. data-flow line d. data store symbol ANSWER: c RATIONALE: Data-flow diagrams use four primary symbols. The data-flow line includes arrows that show the direction of data movement. FEEDBACK: a. Data-flow diagrams use four primary symbols. The data-flow line includes arrows that show the direction of data movement. b. Data-flow diagrams use four primary symbols. The data-flow line includes arrows that show the direction of data movement. c. Data-flow diagrams use four primary symbols. The data-flow line includes arrows that show the direction of data movement. d. Data-flow diagrams use four primary symbols. The data-flow line includes arrows that show the direction of data movement.

POINTS: 1 DIFFICULTY: Easy REFERENCES: System Analysis QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.12.8 - Identify the appropriate strategy to employ with each of five categories of innovation adopters. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM Copyright Cengage Learning. Powered by Cognero.

Page 20


Chapter 13 - System Acquisition and Development DATE MODIFIED:

7/21/2020 1:57 PM

36. Once new software has been selected, implementation will include all of these tasks EXCEPT _____. a. making any needed customizations to the solution b. consulting with stakeholders to establish future needs c. training end users d. configuring all of the software's capabilities and options to meet requirements ANSWER: b RATIONALE: Key implementation tasks for off-the-shelf software include the following: Install the software and configure all its capabilities and options to meet the project requirements. Customize aspects the solution as needed for the organization. Train end users. FEEDBACK: a. Key implementation tasks for off-the-shelf software include the following: Install the software and configure all its capabilities and options to meet the project requirements. Customize aspects the solution as needed for the organization. Train end users. b. Key implementation tasks for off-the-shelf software include the following: Install the software and configure all its capabilities and options to meet the project requirements. Customize aspects the solution as needed for the organization. Train end users. c. Key implementation tasks for off-the-shelf software include the following: Install the software and configure all its capabilities and options to meet the project requirements. Customize aspects the solution as needed for the organization. Train end users. d. Key implementation tasks for off-the-shelf software include the following: Install the software and configure all its capabilities and options to meet the project requirements. Customize aspects the solution as needed for the organization. Train end users.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Buying Off-The-Shelf-Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.4 - Outline a process for evaluating and selecting a software package. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/22/2020 11:38 AM 37. _____ involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that an information system meets all specified requirements. a. Integration testing b. System testing c. Volume testing d. User acceptance testing ANSWER: b RATIONALE: System testing involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that the information system meets all specified requirements. FEEDBACK: a. System testing involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that the information

Copyright Cengage Learning. Powered by Cognero.

Page 21


Chapter 13 - System Acquisition and Development system meets all specified requirements.

b. System testing involves testing the complete, integrated system (hardware,

software, databases, people, and procedures) to validate that the information system meets all specified requirements. c. System testing involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that the information system meets all specified requirements. d. System testing involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that the information system meets all specified requirements.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Integration and Testing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.10 - Identify the purpose and participants involved in various types of testing from unit testing to user acceptance testing. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/22/2020 11:41 AM 38. The goals of _____ are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance. a. unit testing b. user acceptance testing c. volume testing d. integration testing ANSWER: c RATIONALE: Volume testing involves evaluating the performance of the information system under varying yet realistic work volume and operating conditions (e.g., database size, number of concurrent users, number of transactions, and number of queries). The goals of volume testing are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance. FEEDBACK: a. The goals of volume testing are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance. b. The goals of volume testing are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance. c. The goals of volume testing are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance. d. The goals of volume testing are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance.

POINTS: DIFFICULTY: REFERENCES:

1 Easy Integration and Testing

Copyright Cengage Learning. Powered by Cognero.

Page 22


Chapter 13 - System Acquisition and Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.10 - Identify the purpose and participants involved in various types of testing from unit testing to user acceptance testing. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/22/2020 11:43 AM 39. _____ explains the purpose of every major piece of computer code and also identifies and describes key variables. a. A schema b. Technical documentation c. Systems documentation d. User documentation ANSWER: b RATIONALE: An organization also needs useful software documentation to accompany the software code. Technical documentation includes written details that computer operators follow to execute the program and that analysts and programmers use to solve problems or modify the program. Technical documentation explains the purpose of every major piece of computer code. It also identifies and describes key variables. FEEDBACK: a. Technical documentation explains the purpose of every major piece of computer code. It also identifies and describes key variables. b. Technical documentation explains the purpose of every major piece of computer code. It also identifies and describes key variables. c. Technical documentation explains the purpose of every major piece of computer code. It also identifies and describes key variables. d. Technical documentation explains the purpose of every major piece of computer code. It also identifies and describes key variables.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Construction QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.8 - Identify and briefly describe the primary tools and techniques used during system development. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/22/2020 11:46 AM 40. Your new software project manager is comfortable working on projects without fully specifying the requirements up front. He recommends a team-based approach to development. He is very likely to be a proponent of the _____ approach to software development. a. Waterfall b. outsourced c. Agile d. packaged solution ANSWER: c RATIONALE: Unlike the Waterfall system development process, Agile development accepts the fact that system requirements are evolving and cannot be fully understood or defined at the start of the project. Agile development concentrates instead on maximizing the team’s ability to deliver Copyright Cengage Learning. Powered by Cognero.

Page 23


Chapter 13 - System Acquisition and Development quickly and respond to emerging requirements—hence the name Agile. Scrum is an Agile development framework that uses a team-based approach in order to keep the development effort focused and moving quickly. FEEDBACK:

a. Agile development accepts the fact that system requirements are evolving and

cannot be fully understood or defined at the start of the project. Agile development concentrates instead on maximizing the team’s ability to deliver quickly and respond to emerging requirements—hence the name Agile. Scrum is an Agile development framework that uses a team-based approach in order to keep the development effort focused and moving quickly. b. Agile development accepts the fact that system requirements are evolving and cannot be fully understood or defined at the start of the project. Agile development concentrates instead on maximizing the team’s ability to deliver quickly and respond to emerging requirements—hence the name Agile. Scrum is an Agile development framework that uses a team-based approach in order to keep the development effort focused and moving quickly. c. Agile development accepts the fact that system requirements are evolving and cannot be fully understood or defined at the start of the project. Agile development concentrates instead on maximizing the team’s ability to deliver quickly and respond to emerging requirements—hence the name Agile. Scrum is an Agile development framework that uses a team-based approach in order to keep the development effort focused and moving quickly. d. Agile development accepts the fact that system requirements are evolving and cannot be fully understood or defined at the start of the project. Agile development concentrates instead on maximizing the team’s ability to deliver quickly and respond to emerging requirements—hence the name Agile. Scrum is an Agile development framework that uses a team-based approach in order to keep the development effort focused and moving quickly.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Agile Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.3 - Identify two approaches to software development. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/22/2020 11:50 AM 41. The process of switching from an old information system to a replacement system is called _____. a. installation b. phase-in c. site preparation d. cutover ANSWER: d RATIONALE: Cutover is the process of switching from an old information system to a replacement system. FEEDBACK: a. Cutover is the process of switching from an old information system to a replacement system. b. Cutover is the process of switching from an old information system to a replacement system. c. Cutover is the process of switching from an old information system to a replacement system. d. Cutover is the process of switching from an old information system to a

Copyright Cengage Learning. Powered by Cognero.

Page 24


Chapter 13 - System Acquisition and Development replacement system.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.11 - Identify three approaches for system cutover. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/22/2020 12:01 PM 42. You are part of the team assigned to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results obtained from the old software, but are cautious about accepting those from the proposed new software. What software implementation strategy would you recommend in this situation to allow users fall-back access to the old system as the new one is implemented? a. direct conversion b. phase-in approach c. pilot startup d. parallel start up ANSWER: d RATIONALE: Parallel start-up involves running both the old and new systems for a set period of time. The performance and output of the new system are compared closely with the performance and output of the old system, and any differences are reconciled. When users are comfortable that the new system is working correctly, the old system is eliminated. FEEDBACK: a. Parallel start-up involves running both the old and new systems for a set period of time. The performance and output of the new system are compared closely with the performance and output of the old system, and any differences are reconciled. When users are comfortable that the new system is working correctly, the old system is eliminated. b. Parallel start-up involves running both the old and new systems for a set period of time. The performance and output of the new system are compared closely with the performance and output of the old system, and any differences are reconciled. When users are comfortable that the new system is working correctly, the old system is eliminated. c. Parallel start-up involves running both the old and new systems for a set period of time. The performance and output of the new system are compared closely with the performance and output of the old system, and any differences are reconciled. When users are comfortable that the new system is working correctly, the old system is eliminated. d. Parallel start-up involves running both the old and new systems for a set period of time. The performance and output of the new system are compared closely with the performance and output of the old system, and any differences are reconciled. When users are comfortable that the new system is working correctly, the old system is eliminated.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Implementation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.11 - Identify three approaches for system cutover. Copyright Cengage Learning. Powered by Cognero.

Page 25


Chapter 13 - System Acquisition and Development NATIONAL STANDARDS: KEYWORDS: DATE CREATED: DATE MODIFIED:

United States - BUSPROG: Technology Bloom's: Understand 11/19/2019 5:54 PM 7/22/2020 12:00 PM

43. You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing. a. system b. volume c. acceptance d. integration ANSWER: b RATIONALE: Volume testing involves evaluating the performance of the information system under varying yet realistic work volume and operating conditions (e.g., database size, number of concurrent users, number of transactions, and number of queries). The goals of volume testing are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance. FEEDBACK: a. Volume testing involves evaluating the performance of the information system under varying yet realistic work volume and operating conditions (e.g., database size, number of concurrent users, number of transactions, and number of queries). The goals of volume testing are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance. b. Volume testing involves evaluating the performance of the information system under varying yet realistic work volume and operating conditions (e.g., database size, number of concurrent users, number of transactions, and number of queries). The goals of volume testing are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance. c. Volume testing involves evaluating the performance of the information system under varying yet realistic work volume and operating conditions (e.g., database size, number of concurrent users, number of transactions, and number of queries). The goals of volume testing are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance. d. Volume testing involves evaluating the performance of the information system under varying yet realistic work volume and operating conditions (e.g., database size, number of concurrent users, number of transactions, and number of queries). The goals of volume testing are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Integration and Testing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.10 - Identify the purpose and participants involved in various types of testing from unit testing to user acceptance testing. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand Copyright Cengage Learning. Powered by Cognero.

Page 26


Chapter 13 - System Acquisition and Development DATE CREATED: DATE MODIFIED:

11/19/2019 5:54 PM 7/22/2020 12:03 PM

44. _____ involves using a new or modified system under all kinds of operating conditions. a. System operation b. System construction c. System review d. System modification ANSWER: a RATIONALE: System operation involves the use of a new or modified system under all kinds of operating conditions. FEEDBACK: a. System operation involves the use of a new or modified system under all kinds of operating conditions.

b. System operation involves the use of a new or modified system under all kinds of operating conditions. c. System operation involves the use of a new or modified system under all kinds of operating conditions. d. System operation involves the use of a new or modified system under all kinds of operating conditions.

POINTS: 1 DIFFICULTY: Easy REFERENCES: System Operation and Maintenance QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.7 - Identify and state the goal of each of the six phases of the Waterfall approach. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/22/2020 12:11 PM 45. Which of the following statements is true of user acceptance testing (UAT)? a. UAT involves linking individual components together and testing them as a group to uncover any defects in the interface. b. A goal of UAT is to determine the work load at which systems performance begins to degrade. c. UAT is often done by independent testers who were not involved in developing program code. d. UAT must be completed successfully before newly developed software can be rolled out to the market. ANSWER: d RATIONALE: During user acceptance testing (UAT), trained users test the information system to verify that it can complete required tasks in a real-world operating environment and perform according to the system design specifications. UAT is a critical activity that must be completed successfully before newly developed software can be rolled out to the market. FEEDBACK: a. During user acceptance testing (UAT), trained users test the information system to verify that it can complete required tasks in a real-world operating environment and perform according to the system design specifications. UAT is a critical activity that must be completed successfully before newly developed software can be rolled out to the market. b. During user acceptance testing (UAT), trained users test the information system to verify that it can complete required tasks in a real-world operating environment

Copyright Cengage Learning. Powered by Cognero.

Page 27


Chapter 13 - System Acquisition and Development and perform according to the system design specifications. UAT is a critical activity that must be completed successfully before newly developed software can be rolled out to the market. c. During user acceptance testing (UAT), trained users test the information system to verify that it can complete required tasks in a real-world operating environment and perform according to the system design specifications. UAT is a critical activity that must be completed successfully before newly developed software can be rolled out to the market. d. During user acceptance testing (UAT), trained users test the information system to verify that it can complete required tasks in a real-world operating environment and perform according to the system design specifications. UAT is a critical activity that must be completed successfully before newly developed software can be rolled out to the market.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Integration and Testing QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.10 - Identify the purpose and participants involved in various types of testing from unit testing to user acceptance testing. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/22/2020 12:07 PM 46. _____ involves running a complete new system for one group of users rather than all users. a. A phase-in approach b. Parallel start-up c. Cutover always d. Pilot start-up ANSWER: d RATIONALE: Pilot start-up involves running the complete new system for one group of users rather than for all users. FEEDBACK: a. Pilot start-up involves running the complete new system for one group of users rather than for all users. b. Pilot start-up involves running the complete new system for one group of users rather than for all users. c. Pilot start-up involves running the complete new system for one group of users rather than for all users. d. Pilot start-up involves running the complete new system for one group of users rather than for all users.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.11 - Identify three approaches for system cutover. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 28


Chapter 13 - System Acquisition and Development DATE CREATED: DATE MODIFIED:

11/19/2019 5:54 PM 7/22/2020 12:09 PM

47. _____ is an iterative system development process that develops a system in "sprint" increments lasting from two weeks to two months. a. Prototyping b. Waterfall development c. Individual development d. Agile development ANSWER: d RATIONALE: Agile development is an iterative system development process that develops a system in “sprint” increments lasting from two weeks to two months. FEEDBACK: a. Agile development is an iterative system development process that develops a system in “sprint” increments lasting from two weeks to two months. b. Agile development is an iterative system development process that develops a system in “sprint” increments lasting from two weeks to two months. c. Agile development is an iterative system development process that develops a system in “sprint” increments lasting from two weeks to two months. d. Agile development is an iterative system development process that develops a system in “sprint” increments lasting from two weeks to two months.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Agile Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.12 - Describe the Agile development process. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/22/2020 12:15 PM 48. Suppose the customer data analysis software used by ABC Bank is significantly changed, and its documentation is therefore revised, but no new features are added. This type of maintenance is called a _____. a. patch b. slipstream upgrade c. version d. release ANSWER: d RATIONALE: A slipstream upgrade is a minor system upgrade—typically a code adjustment or minor bug fix. A patch is a minor change to correct a problem or make a small enhancement. A new release is a significant program change that often requires changes in the documentation of the software. Finally, a new version is a major program change, typically encompassing many new features. FEEDBACK: a. A new release is a significant program change that often requires changes in the documentation of the software. b. A new release is a significant program change that often requires changes in the documentation of the software. c. A new release is a significant program change that often requires changes in the documentation of the software. d. A new release is a significant program change that often requires changes in the documentation of the software.

Copyright Cengage Learning. Powered by Cognero.

Page 29


Chapter 13 - System Acquisition and Development POINTS: 1 DIFFICULTY: Moderate REFERENCES: System Operation and Maintenance QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.7 - Identify and state the goal of each of the six phases of the Waterfall approach. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/22/2020 12:22 PM 49. A _____ is a major program change, typically encompassing many new features. a. new release b. patch c. slipstream upgrade d. new version ANSWER: d RATIONALE: A slipstream upgrade is a minor system upgrade—typically a code adjustment or minor bug fix. A patch is a minor change to correct a problem or make a small enhancement. A new release is a significant program change that often requires changes in the documentation of the software. Finally, a new version is a major program change, typically encompassing many new features. FEEDBACK: a. A new version is a major program change, typically encompassing many new features. b. A new version is a major program change, typically encompassing many new features. c. A new version is a major program change, typically encompassing many new features. d. A new version is a major program change, typically encompassing many new features.

POINTS: 1 DIFFICULTY: Easy REFERENCES: System Operation and Maintenance QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.7 - Identify and state the goal of each of the six phases of the Waterfall approach. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/22/2020 12:24 PM 50. _____ is the process of analyzing systems to make sure they are operating as intended. a. System review b. System operation c. System maintenance d. System construction ANSWER: a RATIONALE: System review is the process of analyzing a system to make sure it is operating as intended. Copyright Cengage Learning. Powered by Cognero.

Page 30


Chapter 13 - System Acquisition and Development FEEDBACK:

a. System review is the process of analyzing a system to make sure it is operating as intended.

b. System review is the process of analyzing a system to make sure it is operating as intended. c. System review is the process of analyzing a system to make sure it is operating as intended. d. System review is the process of analyzing a system to make sure it is operating as intended.

POINTS: 1 DIFFICULTY: Easy REFERENCES: System Operation and Maintenance QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.7 - Identify and state the goal of each of the six phases of the Waterfall approach. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/22/2020 12:25 PM 51. Phil has been working on a new version of his company's best-selling sales management software and now he plans to ask several coworkers and a handful of the existing version's users who rate it highly to perform an acceptance test. Phil is preparing for _____. a. integration testing b. beta testing c. unit testing d. alpha testing ANSWER: d RATIONALE: Prior to releasing a new software package or a major revision of an existing package, commercial software development organizations conduct alpha and beta testing. Alpha testing is a limited internal acceptance test where employees of the software development organization and a limited number of other “friendlies” use the software and provide feedback. After fixing problems uncovered in alpha testing, the developer makes a beta test version of the software available to potential users outside the organization. FEEDBACK: a. Alpha testing is a limited internal acceptance test where employees of the software development organization and a limited number of other “friendlies” use the software and provide feedback. b. Alpha testing is a limited internal acceptance test where employees of the software development organization and a limited number of other “friendlies” use the software and provide feedback. c. Alpha testing is a limited internal acceptance test where employees of the software development organization and a limited number of other “friendlies” use the software and provide feedback. d. Alpha testing is a limited internal acceptance test where employees of the software development organization and a limited number of other “friendlies” use the software and provide feedback.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Moderate Integration and Testing Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 31


Chapter 13 - System Acquisition and Development HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.10 - Identify the purpose and participants involved in various types of testing from unit testing to user acceptance testing. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/22/2020 12:31 PM 52. Buying off-the-shelf software _____. a. is less risky than building software b. can slow deployment compared with other options c. avoids maintenance and support costs d. does not allow companies a "test drive" before purchase ANSWER: a RATIONALE: Buying off-the-shelf software is less risky and leads to quicker deployment; however, maintenance and support costs may become expensive with this approach, and the software may not be an exact match to the needs and work processes of the organization. An organization can “test drive” such software before acquiring it. FEEDBACK: a. Buying off-the-shelf software is less risky and leads to quicker deployment; however, maintenance and support costs may become expensive with this approach, and the software may not be an exact match to the needs and work processes of the organization. An organization can “test drive” such software before acquiring it. b. Buying off-the-shelf software is less risky and leads to quicker deployment; however, maintenance and support costs may become expensive with this approach, and the software may not be an exact match to the needs and work processes of the organization. An organization can “test drive” such software before acquiring it. c. Buying off-the-shelf software is less risky and leads to quicker deployment; however, maintenance and support costs may become expensive with this approach, and the software may not be an exact match to the needs and work processes of the organization. An organization can “test drive” such software before acquiring it. d. Buying off-the-shelf software is less risky and leads to quicker deployment; however, maintenance and support costs may become expensive with this approach, and the software may not be an exact match to the needs and work processes of the organization. An organization can “test drive” such software before acquiring it.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Subscribe vs. Buy vs. Build QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.1 - Identify the pros and cons associated with subscribing to, buying, and building software. KEYWORDS: Bloom's: Remember DATE CREATED: 7/22/2020 1:27 PM DATE MODIFIED: 7/22/2020 1:35 PM Copyright Cengage Learning. Powered by Cognero.

Page 32


Chapter 13 - System Acquisition and Development 53. A major advantage to building customized software is that it _____. a. costs less up front than subscribing to or buying software b. promotes licensing agreements with vendors c. can help a business to achieve a competitive advantage d. is typically deployed within weeks of the decision to build ANSWER: c RATIONALE: Building custom software can provide a better match to the current work processes along with a potential competitive advantage; however, software development can be extremely costly, and it can take months or even years to develop custom software. FEEDBACK: a. Building custom software can provide a better match to the current work processes along with a potential competitive advantage; however, software development can be extremely costly, and it can take months or even years to develop custom software. b. Building custom software can provide a better match to the current work processes along with a potential competitive advantage; however, software development can be extremely costly, and it can take months or even years to develop custom software. c. Building custom software can provide a better match to the current work processes along with a potential competitive advantage; however, software development can be extremely costly, and it can take months or even years to develop custom software. d. Building custom software can provide a better match to the current work processes along with a potential competitive advantage; however, software development can be extremely costly, and it can take months or even years to develop custom software.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Subscribe vs. Buy vs. Build QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.1 - Identify the pros and cons associated with subscribing to, buying, and building software. KEYWORDS: Bloom's: Remember DATE CREATED: 7/22/2020 1:28 PM DATE MODIFIED: 7/22/2020 1:42 PM 54. When an organization chooses to subscribe to an on-demand software service rather than buy or build software, that organization _____. a. must manage their own software upgrades and updates b. can usually modify the software to match their needs c. pays a single price up front for the software license d. typically has 24/7 access to technical support ANSWER: d RATIONALE: With subscription-based software, software updates and upgrades are completed by the vendor after being tested for consistency. Technical support is typically available 24/7. Ondemand software is usually offered “as-is” and cannot be modified to match the organization’s needs. An organization incurs recurring licensing costs. FEEDBACK: a. With subscription-based software, software updates and upgrades are completed Copyright Cengage Learning. Powered by Cognero.

Page 33


Chapter 13 - System Acquisition and Development by the vendor after being tested for consistency. Technical support is typically available 24/7. On-demand software is usually offered “as-is” and cannot be modified to match the organization’s needs. An organization incurs recurring licensing costs. b. With subscription-based software, software updates and upgrades are completed by the vendor after being tested for consistency. Technical support is typically available 24/7. On-demand software is usually offered “as-is” and cannot be modified to match the organization’s needs. An organization incurs recurring licensing costs. c. With subscription-based software, software updates and upgrades are completed by the vendor after being tested for consistency. Technical support is typically available 24/7. On-demand software is usually offered “as-is” and cannot be modified to match the organization’s needs. An organization incurs recurring licensing costs. d. With subscription-based software, software updates and upgrades are completed by the vendor after being tested for consistency. Technical support is typically available 24/7. On-demand software is usually offered “as-is” and cannot be modified to match the organization’s needs. An organization incurs recurring licensing costs.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Subscribe vs. Buy vs. Build QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.1 - Identify the pros and cons associated with subscribing to, buying, and building software. KEYWORDS: Bloom's: Remember DATE CREATED: 7/22/2020 1:28 PM DATE MODIFIED: 7/22/2020 1:47 PM 55. Which statement related to the pros and cons of the three basic approaches to obtaining software is accurate? a. Software buyers own the purchased software and can access it to make improvements. b. Off-the-shelf software can be installed with minimal disruption to quickly meet user needs. c. Unlike software built in house, off-the-shelf software does not involve maintenance or support costs. d. Organizations cannot use open source software owing to poor quality and lack of support. ANSWER: b RATIONALE: Once purchased, the existing software can be installed with minimal disruption (ideally) so that user needs can be quickly met, and the organization can begin reaping the benefits from the information system. Software buyers do not actually own the software, nor can they access it to make changes or improvements; they are simply licensed to use the software on a computer. With no access to the underlying source code, user organizations must pay maintenance and support costs to the manufacturer or to a third party authorized to fix bugs or add new functionality. For some organizations, these costs can become excessive. As a result, many organizations turn to open source software, which permits access to the source code, so that it can be studied, changed, and improved by the organization’s own software professionals—with no maintenance charges. Indeed, the amount and quality of support for open source software is dependent on whether there are people, resources, and interest among the organizations using the software to develop updates and fix bugs. FEEDBACK: a. Once purchased, the existing software can be installed with minimal disruption (ideally) so that user needs can be quickly met, and the organization can begin

Copyright Cengage Learning. Powered by Cognero.

Page 34


Chapter 13 - System Acquisition and Development reaping the benefits from the information system.

b. Once purchased, the existing software can be installed with minimal disruption

(ideally) so that user needs can be quickly met, and the organization can begin reaping the benefits from the information system. c. Once purchased, the existing software can be installed with minimal disruption (ideally) so that user needs can be quickly met, and the organization can begin reaping the benefits from the information system. d. Once purchased, the existing software can be installed with minimal disruption (ideally) so that user needs can be quickly met, and the organization can begin reaping the benefits from the information system.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Subscribe vs. Buy vs. Build QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.1 - Identify the pros and cons associated with subscribing to, buying, and building software. KEYWORDS: Bloom's: Remember DATE CREATED: 7/22/2020 1:28 PM DATE MODIFIED: 7/22/2020 1:54 PM 56. Which approach to obtaining software is taken when an organization uses Microsoft Office 365 or Adobe's Creative Cloud suite? a. building software b. buying software c. SaaS subscription d. IaaS subscription ANSWER: c RATIONALE: Microsoft Office 365 is an example of a SaaS product. Adobe also offers subscription-based licenses for its Creative Cloud suite, which includes applications such as InDesign, Illustrator, and Photoshop. FEEDBACK: a. Microsoft Office 365 is an example of a SaaS product. Adobe also offers subscription-based licenses for its Creative Cloud suite, which includes applications such as InDesign, Illustrator, and Photoshop. b. Microsoft Office 365 is an example of a SaaS product. Adobe also offers subscription-based licenses for its Creative Cloud suite, which includes applications such as InDesign, Illustrator, and Photoshop. c. Microsoft Office 365 is an example of a SaaS product. Adobe also offers subscription-based licenses for its Creative Cloud suite, which includes applications such as InDesign, Illustrator, and Photoshop. d. Microsoft Office 365 is an example of a SaaS product. Adobe also offers subscription-based licenses for its Creative Cloud suite, which includes applications such as InDesign, Illustrator, and Photoshop.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Easy Software as a Service (SaaS) Multiple Choice False

Copyright Cengage Learning. Powered by Cognero.

Page 35


Chapter 13 - System Acquisition and Development LEARNING OBJECTIVES: POIS.14e.13.2 - Explain the advantages and disadvantages of the software as a service (SaaS) model. KEYWORDS: Bloom's: Remember DATE CREATED: 7/22/2020 1:55 PM DATE MODIFIED: 7/22/2020 2:04 PM 57. Because SaaS runs in the cloud, companies that use SaaS_____. a. must verify that it will run on their existing hardware b. can more quickly realize a return on their investment c. often must upgrade their hardware before purchasing it d. need not establish a timeline for its implementation ANSWER: b RATIONALE: There are many advantages to obtaining software via a SaaS subscription. One advantage is how quickly the company can benefit from the software. After a decision has been made to acquire new software, a timeline is established for the project. Sometimes this timeline is short due to the needs of the company. Utilizing SaaS allows the company to bypass the process of verifying if existing hardware will run the new software and avoid the expense of upgrading hardware before purchasing and installing software. Because SaaS runs in the cloud, companies can more quickly realize a return on their investment. FEEDBACK: a. Because SaaS runs in the cloud, companies can more quickly realize a return on their investment. b. Because SaaS runs in the cloud, companies can more quickly realize a return on their investment. c. Because SaaS runs in the cloud, companies can more quickly realize a return on their investment. d. Because SaaS runs in the cloud, companies can more quickly realize a return on their investment.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Advantages of Saas QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.2 - Explain the advantages and disadvantages of the software as a service (SaaS) model. KEYWORDS: Bloom's: Remember DATE CREATED: 7/22/2020 1:57 PM DATE MODIFIED: 7/22/2020 2:35 PM 58. What is one advantage that SaaS confers because it is deployed and managed from a central location? a. A company can run its business from a computer with any browser. b. Employees can access data only from desktops on the company's premises. c. Companies can secure their data on their own servers. d. In-person training is always provided as part of the service. ANSWER: a RATIONALE: SaaS is deployed over the Internet, meaning deployment and management is handled from a centralized location. SaaS models utilize cloud storage and Internet browsers for data access and user interface, which lets companies save money on technical support staff and in-house Copyright Cengage Learning. Powered by Cognero.

Page 36


Chapter 13 - System Acquisition and Development technology expense. A company can run its business from a computer with any browser—or even from a mobile device. Employees can access data from anywhere in the world, and the data remains secure on the server. FEEDBACK:

a. SaaS is deployed over the Internet, meaning deployment and management is handled from a centralized location. A company can run its business from a computer with any browser—or even from a mobile device. b. SaaS is deployed over the Internet, meaning deployment and management is handled from a centralized location. A company can run its business from a computer with any browser—or even from a mobile device. c. SaaS is deployed over the Internet, meaning deployment and management is handled from a centralized location. A company can run its business from a computer with any browser—or even from a mobile device. d. SaaS is deployed over the Internet, meaning deployment and management is handled from a centralized location. A company can run its business from a computer with any browser—or even from a mobile device.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Advantages of Saas QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.2 - Explain the advantages and disadvantages of the software as a service (SaaS) model. KEYWORDS: Bloom's: Remember DATE CREATED: 7/22/2020 1:57 PM DATE MODIFIED: 7/22/2020 2:47 PM 59. Which statement about the SaaS pricing model is FALSE? a. Implementation costs are lower owing to quick integration and little downtime. b. SaaS software can be license on a per user, rather than a per computer, basis. c. Licenses can be added as needed to provide flexibility in managing costs. d. SaaS upgrades are usually not included in the contract and so incur extra costs. ANSWER: d RATIONALE: Another advantage of SaaS is its lower implementation costs. SaaS software can be implemented, or deployed, during normal business hours, as the software is not installed on the organization’s computers. Users can be trained online, or the price of training can be negotiated within the contract, for minimal impact on productivity. All of this enables quick integration and little to no downtime. Unlike off-the-shelf software, which must be licensed for each computer, SaaS software can be licensed on a per user basis, meaning the fees are based on the number of users logged into the system at any given time. As the company grows, the licenses or seats, can be increased. Adding capacity in this manner saves both time and money for the organization. SaaS software upgrades are tested by the provider and then deployed via the Web. These upgrades are included in the contract, unless requested otherwise. FEEDBACK:

a. SaaS software upgrades are tested by the provider and then deployed via the

Web. These upgrades are included in the contract, unless requested otherwise. b. SaaS software upgrades are tested by the provider and then deployed via the Web. These upgrades are included in the contract, unless requested otherwise. Copyright Cengage Learning. Powered by Cognero.

Page 37


Chapter 13 - System Acquisition and Development c. SaaS software upgrades are tested by the provider and then deployed via the

Web. These upgrades are included in the contract, unless requested otherwise.

d. SaaS software upgrades are tested by the provider and then deployed via the

Web. These upgrades are included in the contract, unless requested otherwise.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Advantages of Saas QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.2 - Explain the advantages and disadvantages of the software as a service (SaaS) model. KEYWORDS: Bloom's: Remember DATE CREATED: 7/22/2020 1:57 PM DATE MODIFIED: 7/22/2020 2:55 PM 60. One notable disadvantage of SaaS is that _____. a. it is not scalable or flexible b. it requires a stable Internet connection c. it increases the burden on the subscriber's IS department d. it requires the subscriber to create training materials ANSWER: b RATIONALE: Because SaaS is deployed over the Internet, it requires a company to have a stable Internet connection. SaaS software offers a solution in terms of both scalability and flexibility. The subscribing company’s IS department can focus their efforts on the day-to-day operations of the business. Users can be trained online, or the price of training can be negotiated within the contract, for minimal impact on productivity. FEEDBACK: a. Because SaaS is deployed over the Internet, it requires a company to have a stable Internet connection. b. Because SaaS is deployed over the Internet, it requires a company to have a stable Internet connection. c. Because SaaS is deployed over the Internet, it requires a company to have a stable Internet connection. d. Because SaaS is deployed over the Internet, it requires a company to have a stable Internet connection.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Disadvantages of SaaS QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.2 - Explain the advantages and disadvantages of the software as a service (SaaS) model. KEYWORDS: Bloom's: Remember DATE CREATED: 7/22/2020 1:57 PM DATE MODIFIED: 7/22/2020 3:04 PM 61. Before signing a contract with a SaaS vendor, an organization must ensure that the vendor has acceptable answers to questions about the storage and protection of the data shared with them because _____. Copyright Cengage Learning. Powered by Cognero.

Page 38


Chapter 13 - System Acquisition and Development a. SaaS requires a company to have a stable Internet connection b. the availability of specific tools may vary among vendors c. working offline may cause errors and rework d. security and privacy must be addressed by all organizations ANSWER: d RATIONALE: Another potential area of concern is the sharing of data with a third-party provider. Security and privacy are topics that must be addressed by all organizations. Software companies that rely on a third-party vendor to host their data must be secure in the knowledge that the data is protected. FEEDBACK: a. Another potential area of concern is the sharing of data with a third-party provider. Security and privacy are topics that must be addressed by all organizations. Software companies that rely on a third-party vendor to host their data must be secure in the knowledge that the data is protected. b. Another potential area of concern is the sharing of data with a third-party provider. Security and privacy are topics that must be addressed by all organizations. Software companies that rely on a third-party vendor to host their data must be secure in the knowledge that the data is protected. c. Another potential area of concern is the sharing of data with a third-party provider. Security and privacy are topics that must be addressed by all organizations. Software companies that rely on a third-party vendor to host their data must be secure in the knowledge that the data is protected. d. Another potential area of concern is the sharing of data with a third-party provider. Security and privacy are topics that must be addressed by all organizations. Software companies that rely on a third-party vendor to host their data must be secure in the knowledge that the data is protected.

POINTS: 1 DIFFICULTY: Moderate REFERENCES: Disadvantages of SaaS QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.2 - Explain the advantages and disadvantages of the software as a service (SaaS) model. KEYWORDS: Bloom's: Remember DATE CREATED: 7/22/2020 1:57 PM DATE MODIFIED: 7/22/2020 3:14 PM 62. The set of activities involved in building information systems, large and small, to meet users' needs is called _____. a. system development b. system design c. system construction d. system integration ANSWER: a RATIONALE: The set of activities involved in building information systems to meet users’ needs is called system development. System development projects can range from small to very large and are conducted in fields as diverse as nuclear science research and video game development. FEEDBACK: a. The set of activities involved in building information systems to meet users’ needs is called system development. b. The set of activities involved in building information systems to meet users’ needs

Copyright Cengage Learning. Powered by Cognero.

Page 39


Chapter 13 - System Acquisition and Development is called system development.

c. The set of activities involved in building information systems to meet users’ needs is called system development. d. The set of activities involved in building information systems to meet users’ needs is called system development.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Subscribe vs. Buy vs. Build QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.3 - Identify two approaches to software development. KEYWORDS: Bloom's: Remember DATE CREATED: 7/22/2020 3:15 PM DATE MODIFIED: 7/22/2020 3:22 PM 63. If an organization elects to undergo system development, _____. a. it must use its own employees for this project b. it must choose the Waterfall development process c. it can choose to hire an outside company for this project d. it is at low or no risk of project failure ANSWER: c RATIONALE: If an organization elects to build a system, it can use its own employees (perhaps augmented with contractors) to develop the system, or it can hire an outside company to manage and/or perform all the system development work. Unfortunately, despite everyone’s best efforts, a significant number of large system development projects fail. Organizations can use several different approaches when developing their own software. Two of those are the Waterfall and Agile software development processes. FEEDBACK: a. If an organization elects to build a system, it can use its own employees (perhaps augmented with contractors) to develop the system, or it can hire an outside company to manage and/or perform all the system development work. b. If an organization elects to build a system, it can use its own employees (perhaps augmented with contractors) to develop the system, or it can hire an outside company to manage and/or perform all the system development work. c. If an organization elects to build a system, it can use its own employees (perhaps augmented with contractors) to develop the system, or it can hire an outside company to manage and/or perform all the system development work. d. If an organization elects to build a system, it can use its own employees (perhaps augmented with contractors) to develop the system, or it can hire an outside company to manage and/or perform all the system development work.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Subscribe vs. Buy vs. Build QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.3 - Identify two approaches to software development. KEYWORDS: Bloom's: Remember DATE CREATED: 7/22/2020 3:18 PM Copyright Cengage Learning. Powered by Cognero.

Page 40


Chapter 13 - System Acquisition and Development DATE MODIFIED:

7/22/2020 3:44 PM

64. Which of the following are common software development approaches organizations can use? a. Adobe and Microsoft b. JAD and UAT c. Agile and Waterfall d. DFD and CSF ANSWER: c RATIONALE: Organizations can use several different approaches when developing their own software. Two of those are the Waterfall and Agile software development processes. FEEDBACK: a. Organizations can use several different approaches when developing their own software. Two of those are the Waterfall and Agile software development processes. b. Organizations can use several different approaches when developing their own software. Two of those are the Waterfall and Agile software development processes. c. Organizations can use several different approaches when developing their own software. Two of those are the Waterfall and Agile software development processes. d. Organizations can use several different approaches when developing their own software. Two of those are the Waterfall and Agile software development processes.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Subscribe vs. Buy vs. Build QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.3 - Identify two approaches to software development. KEYWORDS: Bloom's: Remember DATE CREATED: 7/22/2020 3:18 PM DATE MODIFIED: 7/22/2020 3:48 PM 65. An organization that builds software via a sequential, multistage system development process in which work on the next stage cannot begin until the results of the current stage are reviewed and approved or modified as necessary is using what system development process? a. Agile b. Waterfall c. joint application development d. integrative ANSWER: b RATIONALE: The Waterfall system development process is a sequential, multistage system development process in which work on the next stage cannot begin until the results of the current stage are reviewed and approved or modified as necessary. FEEDBACK: a. The Waterfall system development process is a sequential, multistage system development process in which work on the next stage cannot begin until the results of the current stage are reviewed and approved or modified as necessary. b. The Waterfall system development process is a sequential, multistage system

Copyright Cengage Learning. Powered by Cognero.

Page 41


Chapter 13 - System Acquisition and Development development process in which work on the next stage cannot begin until the results of the current stage are reviewed and approved or modified as necessary. c. The Waterfall system development process is a sequential, multistage system development process in which work on the next stage cannot begin until the results of the current stage are reviewed and approved or modified as necessary. d. The Waterfall system development process is a sequential, multistage system development process in which work on the next stage cannot begin until the results of the current stage are reviewed and approved or modified as necessary.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Waterfall System Development Process QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.3 - Identify two approaches to software development. KEYWORDS: Bloom's: Remember DATE CREATED: 7/22/2020 3:18 PM DATE MODIFIED: 7/22/2020 3:53 PM 66. Thomas is part of a project team charged with selecting a software package for his company. The primary tool he can use to determine whether the market has a product to meet their needs is the _____. a. technical documentation b. request for information c. database schema d. performance evaluation ANSWER: b RATIONALE: The project team should make a preliminary assessment of the software marketplace to determine whether existing packages can meet the organization’s needs. The primary tool for doing this is the request for information (RFI), a document that outlines an organization’s needs and requests vendors to respond with information about if and how they can meet those needs and the time and resources required. FEEDBACK: a. The project team should make a preliminary assessment of the software marketplace to determine whether existing packages can meet the organization’s needs. The primary tool for doing this is the request for information (RFI), a document that outlines an organization’s needs and requests vendors to respond with information about if and how they can meet those needs and the time and resources required. b. The project team should make a preliminary assessment of the software marketplace to determine whether existing packages can meet the organization’s needs. The primary tool for doing this is the request for information (RFI), a document that outlines an organization’s needs and requests vendors to respond with information about if and how they can meet those needs and the time and resources required. c. The project team should make a preliminary assessment of the software marketplace to determine whether existing packages can meet the organization’s needs. The primary tool for doing this is the request for information (RFI), a document that outlines an organization’s needs and requests vendors to respond with information about if and how they can meet those needs and the time and resources required. d. The project team should make a preliminary assessment of the software marketplace to determine whether existing packages can meet the organization’s

Copyright Cengage Learning. Powered by Cognero.

Page 42


Chapter 13 - System Acquisition and Development needs. The primary tool for doing this is the request for information (RFI), a document that outlines an organization’s needs and requests vendors to respond with information about if and how they can meet those needs and the time and resources required.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Package Evaluation Phase QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.4 - Outline a process for evaluating and selecting a software package. KEYWORDS: Bloom's: Remember DATE CREATED: 7/22/2020 3:54 PM DATE MODIFIED: 7/22/2020 4:04 PM 67. Thomas's project team, which is tasked with selecting a new software package for their company, has narrowed the options to thee most promising alternatives. In order to further research these alternatives, Thomas asks each contender to demonstrate their solution in a computing environment with a workload that matches the load the company expects to support. Thomas has just _____. a. submitted a request for information b. begun the integration and testing phase c. completed his software package analysis d. requested a performance evaluation test ANSWER: d RATIONALE: For major software purchases, the contenders should be asked to make a final presentation and to fully demonstrate their solution using a performance evaluation test conducted in a computing environment (e.g., computing hardware, operating system software, database management system) and with a workload (e.g., number of concurrent users, database size, and number of transactions) that matches the intended operating conditions. FEEDBACK: a. For major software purchases, the contenders should be asked to make a final presentation and to fully demonstrate their solution using a performance evaluation test conducted in a computing environment (e.g., computing hardware, operating system software, database management system) and with a workload (e.g., number of concurrent users, database size, and number of transactions) that matches the intended operating conditions. b. For major software purchases, the contenders should be asked to make a final presentation and to fully demonstrate their solution using a performance evaluation test conducted in a computing environment (e.g., computing hardware, operating system software, database management system) and with a workload (e.g., number of concurrent users, database size, and number of transactions) that matches the intended operating conditions. c. For major software purchases, the contenders should be asked to make a final presentation and to fully demonstrate their solution using a performance evaluation test conducted in a computing environment (e.g., computing hardware, operating system software, database management system) and with a workload (e.g., number of concurrent users, database size, and number of transactions) that matches the intended operating conditions. d. For major software purchases, the contenders should be asked to make a final presentation and to fully demonstrate their solution using a performance evaluation test conducted in a computing environment (e.g., computing hardware, operating system software, database management system) and with a workload

Copyright Cengage Learning. Powered by Cognero.

Page 43


Chapter 13 - System Acquisition and Development (e.g., number of concurrent users, database size, and number of transactions) that matches the intended operating conditions.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Package Evaluation Phase QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.4 - Outline a process for evaluating and selecting a software package. KEYWORDS: Bloom's: Remember DATE CREATED: 7/22/2020 3:56 PM DATE MODIFIED: 7/22/2020 4:11 PM 68. When Thomas negotiates and finalizes a contract with a software vendor who will provide an application package for his organization, _____. a. he should clarify how the provider will ensure data privacy and handle discovery in the event of a lawsuit for a cloud solution b. he should recognize that the standard contract is written from the buyer's perspective and thus protects his company's interests c. less care in reviewing the contract is necessary if the vendor is modifying their standard software for Thomas's company d. having a standard vendor contract reviewed by experienced members of the legal and purchasing departments is overkill ANSWER: a RATIONALE: Organizations that use the cloud-computing or SaaS approach need to take special precautions in signing contracts with the service provider. The contract should clarify how the provider ensures data privacy, handles discovery if there is a lawsuit, resolves servicelevel problems, and manages disaster recovery. Although the vendor may insist that everyone signs a standard contract, every contract should be thoroughly reviewed by experienced members of an organization’s legal and purchasing departments. Recognize that the standard contract is written from the vendor’s perspective and protects its interests, not yours. A contract covering the modification of a software package should have provisions for monitoring system modification quality and progress, ownership and property rights of the new or modified system, contingency provisions in case something doesn’t work as expected, and dispute resolution if something goes wrong. FEEDBACK: a. Organizations that use the cloud-computing or SaaS approach need to take special precautions in signing contracts with the service provider. The contract should clarify how the provider ensures data privacy, handles discovery if there is a lawsuit, resolves service-level problems, and manages disaster recovery. b. Organizations that use the cloud-computing or SaaS approach need to take special precautions in signing contracts with the service provider. The contract should clarify how the provider ensures data privacy, handles discovery if there is a lawsuit, resolves service-level problems, and manages disaster recovery. c. Organizations that use the cloud-computing or SaaS approach need to take special precautions in signing contracts with the service provider. The contract should clarify how the provider ensures data privacy, handles discovery if there is a lawsuit, resolves service-level problems, and manages disaster recovery. d. Organizations that use the cloud-computing or SaaS approach need to take special precautions in signing contracts with the service provider. The contract should clarify how the provider ensures data privacy, handles discovery if there is

Copyright Cengage Learning. Powered by Cognero.

Page 44


Chapter 13 - System Acquisition and Development a lawsuit, resolves service-level problems, and manages disaster recovery.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Finalize Contract QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.4 - Outline a process for evaluating and selecting a software package. KEYWORDS: Bloom's: Remember DATE CREATED: 7/22/2020 3:56 PM DATE MODIFIED: 7/22/2020 4:22 PM 69. Before a newly purchased software package is ready for use, it should undergo integration, system, volume, and user acceptance _____. a. testing b. customization c. research d. implementation ANSWER: a RATIONALE: Several types of testing must be conducted before a software package is ready to be put into production. The following types of tests need to be completed: integration testing, system testing, volume testing, and user acceptance testing. FEEDBACK: a. Several types of testing must be conducted before a software package is ready to be put into production. The following types of tests need to be completed: integration testing, system testing, volume testing, and user acceptance testing. b. Several types of testing must be conducted before a software package is ready to be put into production. The following types of tests need to be completed: integration testing, system testing, volume testing, and user acceptance testing. c. Several types of testing must be conducted before a software package is ready to be put into production. The following types of tests need to be completed: integration testing, system testing, volume testing, and user acceptance testing. d. Several types of testing must be conducted before a software package is ready to be put into production. The following types of tests need to be completed: integration testing, system testing, volume testing, and user acceptance testing.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Buying Off-The-Shelf-Software QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.4 - Outline a process for evaluating and selecting a software package. KEYWORDS: Bloom's: Remember DATE CREATED: 7/22/2020 3:56 PM DATE MODIFIED: 7/23/2020 10:02 AM 70. Thomas is preparing to implement a new software package that his project team has selected and purchased. Thomas should _____. a. rely on the vendor to execute the implementation of the package without his company's participation Copyright Cengage Learning. Powered by Cognero.

Page 45


Chapter 13 - System Acquisition and Development b. keep the new software separate from their existing software and historical data c. create an RFI to collect information from the software vendor about their product's implementation d. help his coworkers identify and make any needed changes to their current processes using a DFD ANSWER: d RATIONALE: The organization cannot just count on the vendor to execute the implementation of the package—full and active participation by the project’s stakeholders and end users is essential to success. Key implementation tasks include the following: • • • • • • • • • FEEDBACK:

Use data-flow diagrams to map current business processes and requirements to the software, and identify any gaps that must be filled by changing current processes or by modifying the software. Install the software and configure all its capabilities and options to meet the project requirements. Customize aspects the solution as needed for the organization. Integrate existing software with the new software. Train end users. Test the software to ensure that it meets all processes and requirements. Convert historical data from the old software so that it can be used by the new software. Roll out the new software to users in a live work environment. Provide for ongoing end-user support and training.

a. The organization cannot just count on the vendor to execute the implementation

of the package—full and active participation by the project’s stakeholders and end users is essential to success. Key implementation tasks include using data-flow diagrams to map current business processes and requirements to the software, and identify any gaps that must be filled by changing current processes or by modifying the software. b. The organization cannot just count on the vendor to execute the implementation of the package—full and active participation by the project’s stakeholders and end users is essential to success. Key implementation tasks include using data-flow diagrams to map current business processes and requirements to the software, and identify any gaps that must be filled by changing current processes or by modifying the software. c. The organization cannot just count on the vendor to execute the implementation of the package—full and active participation by the project’s stakeholders and end users is essential to success. Key implementation tasks include using data-flow diagrams to map current business processes and requirements to the software, and identify any gaps that must be filled by changing current processes or by modifying the software. d. The organization cannot just count on the vendor to execute the implementation of the package—full and active participation by the project’s stakeholders and end users is essential to success. Key implementation tasks include using data-flow diagrams to map current business processes and requirements to the software, and identify any gaps that must be filled by changing current processes or by modifying the software.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE: HAS VARIABLES:

1 Easy Buying Off-The-Shelf-Software Multiple Choice False

Copyright Cengage Learning. Powered by Cognero.

Page 46


Chapter 13 - System Acquisition and Development LEARNING OBJECTIVES: POIS.14e.13.4 - Outline a process for evaluating and selecting a software package. KEYWORDS: Bloom's: Remember DATE CREATED: 7/22/2020 3:56 PM DATE MODIFIED: 7/23/2020 10:21 AM 71. Mavis is working with her colleagues on a software selection project. They must already know the desired scope of the system as well as critical business and user requirements to make a selection because _____. a. a contract with a vendor must be negotiated and finalized b. they must judge how well the vendor's solution matches the needs of the users and business c. they plan to conduct several types of testing before placing the software package in production d. costs should be the principal factor in making this decision ANSWER: b RATIONALE: Before software packages are evaluated, the scope of the system and critical business and user requirements should be known. Selecting the best software package solution involves weighing several factors, one of which is how well the vendor’s solution matches the needs of the users and business. FEEDBACK: a. Before software packages are evaluated, the scope of the system and critical business and user requirements should be known. Selecting the best software package solution involves weighing several factors, one of which is how well the vendor’s solution matches the needs of the users and business. b. Before software packages are evaluated, the scope of the system and critical business and user requirements should be known. Selecting the best software package solution involves weighing several factors, one of which is how well the vendor’s solution matches the needs of the users and business. c. Before software packages are evaluated, the scope of the system and critical business and user requirements should be known. Selecting the best software package solution involves weighing several factors, one of which is how well the vendor’s solution matches the needs of the users and business. d. Before software packages are evaluated, the scope of the system and critical business and user requirements should be known. Selecting the best software package solution involves weighing several factors, one of which is how well the vendor’s solution matches the needs of the users and business.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Package Evaluation Phase QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.5 - Identify the key factors to be considered when selecting a software package. KEYWORDS: Bloom's: Remember DATE CREATED: 7/23/2020 10:21 AM DATE MODIFIED: 7/23/2020 12:30 PM 72. As Mavis researches her company's options for new software, she learns that a vendor who producers several of their existing applications offers a product of the types they are looking for and advertises that all of their systems "talk to each other." Mavis recognizes that one reason to select this product is that _____. a. this guarantees it matches the needs of the users and business b. it is certain to be feasible from legal, technical, and schedule perspectives c. it may reduce the effort required to integrate the new software with existing software Copyright Cengage Learning. Powered by Cognero.

Page 47


Chapter 13 - System Acquisition and Development d. the positive feedback from customers is generalized rather than specific to this product ANSWER: c RATIONALE: Selecting the best software package solution involves weighing several factors, one of which is the amount of effort required to integrate the new software with existing software. Software components from a single vendor that are designed to “talk to each other” will likely be easier to integrate than components from different vendors. FEEDBACK: a. Selecting the best software package solution involves weighing several factors, one of which is the amount of effort required to integrate the new software with existing software. Software components from a single vendor that are designed to “talk to each other” will likely be easier to integrate than components from different vendors. b. Selecting the best software package solution involves weighing several factors, one of which is the amount of effort required to integrate the new software with existing software. Software components from a single vendor that are designed to “talk to each other” will likely be easier to integrate than components from different vendors. c. Selecting the best software package solution involves weighing several factors, one of which is the amount of effort required to integrate the new software with existing software. Software components from a single vendor that are designed to “talk to each other” will likely be easier to integrate than components from different vendors. d. Selecting the best software package solution involves weighing several factors, one of which is the amount of effort required to integrate the new software with existing software. Software components from a single vendor that are designed to “talk to each other” will likely be easier to integrate than components from different vendors.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Package Evaluation Phase QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.5 - Identify the key factors to be considered when selecting a software package. KEYWORDS: Bloom's: Remember DATE CREATED: 7/23/2020 10:23 AM DATE MODIFIED: 7/23/2020 12:49 PM 73. Mavis invites several software vendors to demonstrate the products they have recommended based on her RFI, within a computing environment and with a workload that match the intended operating conditions. Mavis and her project team will use the results of this performance evaluation to _____. a. help them to implement a software product b. train end users of the software solution c. help them select a new software solution d. complete their system investigation ANSWER: c RATIONALE: Selecting the best software package solution involves weighing several factors, one of which is the results of the performance evaluation test. FEEDBACK: a. Selecting the best software package solution involves weighing several factors, one of which is the results of the performance evaluation test.

b. Selecting the best software package solution involves weighing several factors, Copyright Cengage Learning. Powered by Cognero.

Page 48


Chapter 13 - System Acquisition and Development one of which is the results of the performance evaluation test.

c. Selecting the best software package solution involves weighing several factors, one of which is the results of the performance evaluation test. d. Selecting the best software package solution involves weighing several factors, one of which is the results of the performance evaluation test.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Package Evaluation Phase QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.5 - Identify the key factors to be considered when selecting a software package. KEYWORDS: Bloom's: Remember DATE CREATED: 7/23/2020 10:23 AM DATE MODIFIED: 7/23/2020 12:56 PM 74. When comparing potential software solutions for her company, Mavis observes that two of the three packages meet their needs closely and are similar in price, whereas the third is significantly cheaper but would require custom modifications to meet their needs. Which of the following is true? a. Mavis should recommend the option that is least expensive out of the box. b. Mavis should eliminate the third option because it will need customization. c. Mavis should suggest her company revise their software requirements. d. Mavis should investigate the costs for modifying the less expensive option. ANSWER: d RATIONALE: Selecting the best software package solution involves weighing several factors, one of which is the relative costs (including any software modifications) and benefits. How well the vendor’s solution matches the needs of the users and business is another key factor. FEEDBACK: a. Selecting the best software package solution involves weighing several factors, one of which is the relative costs (including any software modifications) and benefits. How well the vendor’s solution matches the needs of the users and business is another key factor. b. Selecting the best software package solution involves weighing several factors, one of which is the relative costs (including any software modifications) and benefits. How well the vendor’s solution matches the needs of the users and business is another key factor. c. Selecting the best software package solution involves weighing several factors, one of which is the relative costs (including any software modifications) and benefits. How well the vendor’s solution matches the needs of the users and business is another key factor. d. Selecting the best software package solution involves weighing several factors, one of which is the relative costs (including any software modifications) and benefits. How well the vendor’s solution matches the needs of the users and business is another key factor.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Package Evaluation Phase QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.5 - Identify the key factors to be considered when selecting a software package. Copyright Cengage Learning. Powered by Cognero.

Page 49


Chapter 13 - System Acquisition and Development KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember 7/23/2020 10:23 AM 7/23/2020 1:05 PM

75. As Mavis and her project team evaluate potential new sales/contact management software packages for their company, they request input from the company's lawyer and purchasing staff regarding _____. a. the legal and financial viability of each contender b. how well each vendor's solution matches the needs of users c. the amount of effort required to integrate the new software with existing software d. how well the software performs ANSWER: a RATIONALE: Selecting the best software package solution involves weighing several factors, one of which is input from legal and purchasing resources on the legal and financial viability of the contender. FEEDBACK: a. Selecting the best software package solution involves weighing several factors, one of which is input from legal and purchasing resources on the legal and financial viability of the contender. b. Selecting the best software package solution involves weighing several factors, one of which is input from legal and purchasing resources on the legal and financial viability of the contender. c. Selecting the best software package solution involves weighing several factors, one of which is input from legal and purchasing resources on the legal and financial viability of the contender. d. Selecting the best software package solution involves weighing several factors, one of which is input from legal and purchasing resources on the legal and financial viability of the contender.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Package Evaluation Phase QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.5 - Identify the key factors to be considered when selecting a software package. KEYWORDS: Bloom's: Remember DATE CREATED: 7/23/2020 10:23 AM DATE MODIFIED: 7/23/2020 1:11 PM 76. Mavis and her project team are evaluating candidates for a new off-the-shelf software package for their company. Mavis calls some professional acquaintances who use these candidate packages in order to _____. a. determine the amount of effort required to integrate this software with their existing systems b. elicit feedback regarding the software performance and the quality of technical support available c. gather data about the relative costs of the various candidate products d. identify the legal, technical, and schedule feasibility of the software ANSWER: b RATIONALE: Selecting the best software package solution involves weighing several factors, one of which is feedback from customers on how well the software performs as well as on the quality of the support provided by the vendor. FEEDBACK: a. Selecting the best software package solution involves weighing several factors, Copyright Cengage Learning. Powered by Cognero.

Page 50


Chapter 13 - System Acquisition and Development one of which is feedback from customers on how well the software performs as well as on the quality of the support provided by the vendor. b. Selecting the best software package solution involves weighing several factors, one of which is feedback from customers on how well the software performs as well as on the quality of the support provided by the vendor. c. Selecting the best software package solution involves weighing several factors, one of which is feedback from customers on how well the software performs as well as on the quality of the support provided by the vendor. d. Selecting the best software package solution involves weighing several factors, one of which is feedback from customers on how well the software performs as well as on the quality of the support provided by the vendor.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Package Evaluation Phase QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.5 - Identify the key factors to be considered when selecting a software package. KEYWORDS: Bloom's: Remember DATE CREATED: 7/23/2020 10:23 AM DATE MODIFIED: 7/23/2020 1:20 PM 77. The major advantage of the Waterfall approach to software development is the _____. a. high degree of management control b. high level of user interaction throughout the process c. rapid pace of product iterations d. informality of ongoing evaluation ANSWER: a RATIONALE: At the end of each phase, the overall project scope, costs, schedule, and benefits associated with the project are reviewed to ensure that the project is on track and worth completing. As a result, the Waterfall approach allows for a high degree of management control. However, a major problem with this approach is that users do not interact with the solution until the integration and testing phase, when the system is nearly complete. FEEDBACK: a. At the end of each phase, the overall project scope, costs, schedule, and benefits associated with the project are reviewed to ensure that the project is on track and worth completing. As a result, the Waterfall approach allows for a high degree of management control. b. At the end of each phase, the overall project scope, costs, schedule, and benefits associated with the project are reviewed to ensure that the project is on track and worth completing. As a result, the Waterfall approach allows for a high degree of management control. c. At the end of each phase, the overall project scope, costs, schedule, and benefits associated with the project are reviewed to ensure that the project is on track and worth completing. As a result, the Waterfall approach allows for a high degree of management control. d. At the end of each phase, the overall project scope, costs, schedule, and benefits associated with the project are reviewed to ensure that the project is on track and worth completing. As a result, the Waterfall approach allows for a high degree of management control.

POINTS:

1

Copyright Cengage Learning. Powered by Cognero.

Page 51


Chapter 13 - System Acquisition and Development DIFFICULTY: Easy REFERENCES: Waterfall System Development Process QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.6 - Identify the advantages and disadvantages of the Waterfall approach to system development. KEYWORDS: Bloom's: Remember DATE CREATED: 7/23/2020 1:26 PM DATE MODIFIED: 7/23/2020 1:34 PM 78. The disadvantages of the Waterfall approach to software development relate primarily to _____. a. management b. contractors c. end users d. executives ANSWER: c RATIONALE: A major problem with this approach is that users do not interact with the solution until the integration and testing phase, when the system is nearly complete. This can lead to a mismatch between system capabilities, users’ expectations, and organizational needs. FEEDBACK: a. A major problem with this approach is that users do not interact with the solution until the integration and testing phase, when the system is nearly complete. This can lead to a mismatch between system capabilities, users’ expectations, and organizational needs. b. A major problem with this approach is that users do not interact with the solution until the integration and testing phase, when the system is nearly complete. This can lead to a mismatch between system capabilities, users’ expectations, and organizational needs. c. A major problem with this approach is that users do not interact with the solution until the integration and testing phase, when the system is nearly complete. This can lead to a mismatch between system capabilities, users’ expectations, and organizational needs. d. A major problem with this approach is that users do not interact with the solution until the integration and testing phase, when the system is nearly complete. This can lead to a mismatch between system capabilities, users’ expectations, and organizational needs.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Waterfall System Development Process QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.6 - Identify the advantages and disadvantages of the Waterfall approach to system development. KEYWORDS: Bloom's: Remember DATE CREATED: 7/23/2020 1:27 PM DATE MODIFIED: 7/23/2020 1:36 PM 79. One advantage of the Waterfall approach to software development is that _____. a. users can easily review intermediate products at the end of each phase Copyright Cengage Learning. Powered by Cognero.

Page 52


Chapter 13 - System Acquisition and Development b. it requires creation of system documentation that traces system requirements back to business needs c. the system requirements as understood by users are communicated clearly to the developers d. it emphasizes a team-based approach through multiple development "sprints" ANSWER: b RATIONALE: The Waterfall approach requires creation of considerable system documentation so that system requirements can be traced back to stated business needs. Users get a system that meets the needs as understood by the developers; however, this might not be what the users really needed. Users can’t easily review intermediate products and evaluate whether a product (e.g., a data-flow diagram) will lead to a system that meets their business requirements. FEEDBACK: a. The Waterfall approach requires creation of considerable system documentation so that system requirements can be traced back to stated business needs. b. The Waterfall approach requires creation of considerable system documentation so that system requirements can be traced back to stated business needs. c. The Waterfall approach requires creation of considerable system documentation so that system requirements can be traced back to stated business needs. d. The Waterfall approach requires creation of considerable system documentation so that system requirements can be traced back to stated business needs.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Waterfall System Development Process QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.6 - Identify the advantages and disadvantages of the Waterfall approach to system development. KEYWORDS: Bloom's: Remember DATE CREATED: 7/23/2020 1:28 PM DATE MODIFIED: 7/23/2020 2:12 PM 80. The U.S. Department of Veterans Affairs (VA) has undertaken three separate electronic health record system upgrade projects, none of which produced systems that fully met the organization's needs, were well integrated, or met budget or schedule goals. The Waterfall software development approach would likely have benefitted the VA because it offers _____. a. maximum end user involvement b. the Scrum framework c. a short product iteration cycle d. maximum management control ANSWER: d RATIONALE: Over the last twenty years, the VA undertook three separate projects intended to upgrade the agency’s electronic health record system. All three projects came in over budget and behind schedule, and they produced faulty systems that were not integrated as a whole. These projects obviously would have benefitted from a higher degree of management control; unfortunately, CIOs at the VA lasted less than two years on average, meaning no one stayed in that critical leadership position long enough to establish the strategic planning and project management practices necessary to effectively complete such complex projects. The Waterfall approach allows for a high degree of management control. FEEDBACK: a. The VA’s projects obviously would have benefitted from a higher degree of management control. The Waterfall approach allows for a high degree of

Copyright Cengage Learning. Powered by Cognero.

Page 53


Chapter 13 - System Acquisition and Development management control.

b. The VA’s projects obviously would have benefitted from a higher degree of management control. The Waterfall approach allows for a high degree of management control. c. The VA’s projects obviously would have benefitted from a higher degree of management control. The Waterfall approach allows for a high degree of management control. d. The VA’s projects obviously would have benefitted from a higher degree of management control. The Waterfall approach allows for a high degree of management control.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Waterfall System Development Process QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.6 - Identify the advantages and disadvantages of the Waterfall approach to system development. KEYWORDS: Bloom's: Remember DATE CREATED: 7/23/2020 1:28 PM DATE MODIFIED: 7/23/2020 2:22 PM 81. With the Waterfall approach, a mismatch between system capabilities, users' expectations, and organizational needs can occur. Why is this more likely with the Waterfall approach? a. Intermediate products that can be reviewed to measure progress are not produced. b. Management control is loose because reviews are not conducted regularly. c. Users do not interact with the solution until the integration and testing phase. d. Users' needs are often stated and understood, yet ignored. ANSWER: c RATIONALE: A system under development moves from one phase of the Waterfall process to the next. At the end of each phase, a review is conducted to ensure that all tasks and deliverables associated with that phase were produced and that they are of good quality. In addition, at the end of each phase, the overall project scope, costs, schedule, and benefits associated with the project are reviewed to ensure that the project is on track and worth completing. As a result, the Waterfall approach allows for a high degree of management control. However, a major problem with this approach is that users do not interact with the solution until the integration and testing phase, when the system is nearly complete. This can lead to a mismatch between system capabilities, users’ expectations, and organizational needs. FEEDBACK: a. A major problem with the Waterfall approach is that users do not interact with the solution until the integration and testing phase, when the system is nearly complete. This can lead to a mismatch between system capabilities, users’ expectations, and organizational needs. b. A major problem with the Waterfall approach is that users do not interact with the solution until the integration and testing phase, when the system is nearly complete. This can lead to a mismatch between system capabilities, users’ expectations, and organizational needs. c. A major problem with the Waterfall approach is that users do not interact with the solution until the integration and testing phase, when the system is nearly complete. This can lead to a mismatch between system capabilities, users’ expectations, and organizational needs.

Copyright Cengage Learning. Powered by Cognero.

Page 54


Chapter 13 - System Acquisition and Development d. A major problem with the Waterfall approach is that users do not interact with the solution until the integration and testing phase, when the system is nearly complete. This can lead to a mismatch between system capabilities, users’ expectations, and organizational needs.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Waterfall System Development Process QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.6 - Identify the advantages and disadvantages of the Waterfall approach to system development. KEYWORDS: Bloom's: Remember DATE CREATED: 7/23/2020 1:28 PM DATE MODIFIED: 7/23/2020 2:28 PM 82. One positive aspect of the Waterfall approach is that, at the end of each phase of the process, _____. a. developers consult with users to ensure they understand what users need b. the team reevaluates and adjusts the system requirements c. users can adequately assess whether the end result will meet their needs d. a formal review ensures that the project is on track and worth completing ANSWER: d RATIONALE: A system under development moves from one phase of the Waterfall process to the next. At the end of each phase, a review is conducted to ensure that all tasks and deliverables associated with that phase were produced and that they are of good quality. In addition, at the end of each phase, the overall project scope, costs, schedule, and benefits associated with the project are reviewed to ensure that the project is on track and worth completing. FEEDBACK: a. A system under development moves from one phase of the Waterfall process to the next. At the end of each phase, a review is conducted to ensure that all tasks and deliverables associated with that phase were produced and that they are of good quality. In addition, at the end of each phase, the overall project scope, costs, schedule, and benefits associated with the project are reviewed to ensure that the project is on track and worth completing. b. A system under development moves from one phase of the Waterfall process to the next. At the end of each phase, a review is conducted to ensure that all tasks and deliverables associated with that phase were produced and that they are of good quality. In addition, at the end of each phase, the overall project scope, costs, schedule, and benefits associated with the project are reviewed to ensure that the project is on track and worth completing. c. A system under development moves from one phase of the Waterfall process to the next. At the end of each phase, a review is conducted to ensure that all tasks and deliverables associated with that phase were produced and that they are of good quality. In addition, at the end of each phase, the overall project scope, costs, schedule, and benefits associated with the project are reviewed to ensure that the project is on track and worth completing. d. A system under development moves from one phase of the Waterfall process to the next. At the end of each phase, a review is conducted to ensure that all tasks and deliverables associated with that phase were produced and that they are of good quality. In addition, at the end of each phase, the overall project scope, costs, schedule, and benefits associated with the project are reviewed to ensure that the project is on track and worth completing.

Copyright Cengage Learning. Powered by Cognero.

Page 55


Chapter 13 - System Acquisition and Development POINTS: 1 DIFFICULTY: Easy REFERENCES: Waterfall System Development Process QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.6 - Identify the advantages and disadvantages of the Waterfall approach to system development. KEYWORDS: Bloom's: Remember DATE CREATED: 7/23/2020 1:28 PM DATE MODIFIED: 7/23/2020 2:34 PM 83. Percy's business is implementing a new information system. Percy and his colleagues are discussing how to switch from their old system to its replacement, and Percy asserts that they should avoid the riskiest approach--simply stopping the old system and starting the new one--which is called _____. a. direct conversion b. pilot start-up c. parallel start-up d. a phase-in approach ANSWER: a RATIONALE: Organizations can follow one of several cutover strategies. Direct conversion (also called plunge or direct cutover) involves stopping the old system and starting the new system on a given date. Direct conversion is a high-risk approach because of the potential for problems and errors when the old system is shut off and the new system is turned on at the same instant. FEEDBACK: a. Direct conversion (also called plunge or direct cutover) involves stopping the old system and starting the new system on a given date. Direct conversion is a highrisk approach because of the potential for problems and errors when the old system is shut off and the new system is turned on at the same instant. b. Direct conversion (also called plunge or direct cutover) involves stopping the old system and starting the new system on a given date. Direct conversion is a highrisk approach because of the potential for problems and errors when the old system is shut off and the new system is turned on at the same instant. c. Direct conversion (also called plunge or direct cutover) involves stopping the old system and starting the new system on a given date. Direct conversion is a highrisk approach because of the potential for problems and errors when the old system is shut off and the new system is turned on at the same instant. d. Direct conversion (also called plunge or direct cutover) involves stopping the old system and starting the new system on a given date. Direct conversion is a highrisk approach because of the potential for problems and errors when the old system is shut off and the new system is turned on at the same instant.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.11 - Identify three approaches for system cutover. KEYWORDS: Bloom's: Remember DATE CREATED: 7/23/2020 7:47 PM Copyright Cengage Learning. Powered by Cognero.

Page 56


Chapter 13 - System Acquisition and Development DATE MODIFIED:

7/24/2020 7:00 AM

84. Many organizations replace an information system by slowly phasing in components of the new system while slowly phasing out components of the old one. What is this cutover strategy called? a. parallel start-up b. phase-in approach c. direct conversion d. pilot start-up ANSWER: b RATIONALE: Organizations can follow one of several cutover strategies. Many organizations follow a phase-in approach, where components of the new system are slowly phased in while components of the old one are slowly phased out. When everyone is confident that all components of the new system are performing as expected, the old system is completely phased out. FEEDBACK: a. Many organizations follow a phase-in approach, where components of the new system are slowly phased in while components of the old one are slowly phased out. When everyone is confident that all components of the new system are performing as expected, the old system is completely phased out b. Many organizations follow a phase-in approach, where components of the new system are slowly phased in while components of the old one are slowly phased out. When everyone is confident that all components of the new system are performing as expected, the old system is completely phased out c. Many organizations follow a phase-in approach, where components of the new system are slowly phased in while components of the old one are slowly phased out. When everyone is confident that all components of the new system are performing as expected, the old system is completely phased out d. Many organizations follow a phase-in approach, where components of the new system are slowly phased in while components of the old one are slowly phased out. When everyone is confident that all components of the new system are performing as expected, the old system is completely phased out

POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.11 - Identify three approaches for system cutover. KEYWORDS: Bloom's: Remember DATE CREATED: 7/23/2020 7:48 PM DATE MODIFIED: 7/24/2020 7:01 AM 85. What does "agility" mean in the context of the Agile development process? a. rapidly evolving technical and user documentation b. immediately and fully defined system requirements c. highly responsive to emerging requirements d. ready to report progress after each major phase ANSWER: c RATIONALE: Agile development accepts the fact that system requirements are evolving and cannot be fully understood or defined at the start of the project. Agile development concentrates instead on Copyright Cengage Learning. Powered by Cognero.

Page 57


Chapter 13 - System Acquisition and Development maximizing the team’s ability to deliver quickly and respond to emerging requirements— hence the name Agile. FEEDBACK:

a. Agile development concentrates instead on maximizing the team’s ability to

deliver quickly and respond to emerging requirements—hence the name Agile.

b. Agile development concentrates instead on maximizing the team’s ability to

deliver quickly and respond to emerging requirements—hence the name Agile. c. Agile development concentrates instead on maximizing the team’s ability to deliver quickly and respond to emerging requirements—hence the name Agile. d. Agile development concentrates instead on maximizing the team’s ability to deliver quickly and respond to emerging requirements—hence the name Agile.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Agile Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.12 - Describe the Agile development process. KEYWORDS: Bloom's: Remember DATE CREATED: 7/24/2020 7:02 AM DATE MODIFIED: 7/24/2020 7:11 AM 86. Within the Scrum framework for Agile software development, the prioritized list of project requirements collected from stakeholders prior to a sprint planning session is called a _____. a. product backlog b. sprint backlog c. system investigation report d. system analysis ANSWER: a RATIONALE: Using the Scrum method, the product owner works with the stakeholders and team to create a prioritized list of project requirements called a product backlog. Next, a sprint planning session is held, during which the team selects the highest priority requirements from the top of the product backlog to create the sprint backlog; they then decide how to implement those requirements. FEEDBACK: a. Using the Scrum method, the product owner works with the stakeholders and team to create a prioritized list of project requirements called a product backlog. b. Using the Scrum method, the product owner works with the stakeholders and team to create a prioritized list of project requirements called a product backlog. c. Using the Scrum method, the product owner works with the stakeholders and team to create a prioritized list of project requirements called a product backlog. d. Using the Scrum method, the product owner works with the stakeholders and team to create a prioritized list of project requirements called a product backlog.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Agile Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.12 - Describe the Agile development process. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 58


Chapter 13 - System Acquisition and Development DATE CREATED: DATE MODIFIED:

7/24/2020 7:03 AM 7/24/2020 11:54 AM

87. Which statement about an Agile sprint is correct? a. Sprints typically last two to eight months. b. The purpose of a sprint is to determine system requirements. c. An Agile team holds an hour-long meeting weekly during a sprint. d. Daily meetings allow team members to coordinate their activities. ANSWER: d RATIONALE: The team planning a sprint sets a certain amount of time—typically two to eight weeks—to complete its work. During the sprint, each day at the same time, the team meets briefly (15 minutes at most) to share information necessary for coordination. At this meeting, team members describe what they completed the previous day and identify any obstacles that stand in the way of them completing this day’s activities. FEEDBACK: a. During the sprint, each day at the same time, the team meets briefly (15 minutes at most) to share information necessary for coordination. b. During the sprint, each day at the same time, the team meets briefly (15 minutes at most) to share information necessary for coordination. c. During the sprint, each day at the same time, the team meets briefly (15 minutes at most) to share information necessary for coordination. d. During the sprint, each day at the same time, the team meets briefly (15 minutes at most) to share information necessary for coordination.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Agile Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.12 - Describe the Agile development process. KEYWORDS: Bloom's: Remember DATE CREATED: 7/24/2020 7:04 AM DATE MODIFIED: 7/24/2020 12:00 PM 88. What signals the end of a sprint in the Agile development process? a. management approval to proceed to the next phase in the implementation plan b. selection of the highest priority requirements from the top of the product backlog c. identification of obstacles to overcome during the next sprint d. completion of a working system that incorporates the requirements from the sprint backlog ANSWER: d RATIONALE: The sprint is complete when the team presents a working system that incorporates the new requirements, and it can be used and evaluated. FEEDBACK: a. The sprint is complete when the team presents a working system that incorporates the new requirements, and it can be used and evaluated. b. The sprint is complete when the team presents a working system that incorporates the new requirements, and it can be used and evaluated. c. The sprint is complete when the team presents a working system that incorporates the new requirements, and it can be used and evaluated.

Copyright Cengage Learning. Powered by Cognero.

Page 59


Chapter 13 - System Acquisition and Development d. The sprint is complete when the team presents a working system that

incorporates the new requirements, and it can be used and evaluated.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Agile Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.12 - Describe the Agile development process. KEYWORDS: Bloom's: Remember DATE CREATED: 7/24/2020 7:04 AM DATE MODIFIED: 7/24/2020 12:06 PM 89. Agile development requires _____. a. management control and JAD sessions b. the up-front determination of requirements c. cooperation and frequent meetings d. less input from stakeholders than other approaches ANSWER: c RATIONALE: Agile development requires cooperation and frequent face-to-face meetings with all participants, including system developers and users, as they modify, refine, and test the system’s capabilities and how it meets users’ needs. FEEDBACK: a. Agile development requires cooperation and frequent face-to-face meetings with all participants, including system developers and users, as they modify, refine, and test the system’s capabilities and how it meets users’ needs. b. Agile development requires cooperation and frequent face-to-face meetings with all participants, including system developers and users, as they modify, refine, and test the system’s capabilities and how it meets users’ needs. c. Agile development requires cooperation and frequent face-to-face meetings with all participants, including system developers and users, as they modify, refine, and test the system’s capabilities and how it meets users’ needs. d. Agile development requires cooperation and frequent face-to-face meetings with all participants, including system developers and users, as they modify, refine, and test the system’s capabilities and how it meets users’ needs.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Agile Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.13 - Identify the advantages and disadvantages of the Agile system development approach. KEYWORDS: Bloom's: Remember DATE CREATED: 7/24/2020 12:07 PM DATE MODIFIED: 7/24/2020 12:16 PM 90. When it is used for the right projects, a major advantage of Agile development is that it is _____. a. quick Copyright Cengage Learning. Powered by Cognero.

Page 60


Chapter 13 - System Acquisition and Development b. relaxed c. easy d. inexpensive ANSWER: RATIONALE: FEEDBACK:

a For appropriate projects, the Agile approach puts an application into production sooner than any other approach. a. For appropriate projects, the Agile approach puts an application into production sooner than any other approach. b. For appropriate projects, the Agile approach puts an application into production sooner than any other approach. c. For appropriate projects, the Agile approach puts an application into production sooner than any other approach. d. For appropriate projects, the Agile approach puts an application into production sooner than any other approach.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Agile Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.13 - Identify the advantages and disadvantages of the Agile system development approach. KEYWORDS: Bloom's: Remember DATE CREATED: 7/24/2020 12:09 PM DATE MODIFIED: 7/24/2020 12:20 PM 91. Which statement about Agile software development is true? a. It incorporates a sprint period specifically for documentation creation. b. It is an intense process that increases the risk for burnout among team members. c. It is less time-consuming for stakeholders and users than alternative approaches. d. It requires no special knowledge of process-specific tools and techiques. ANSWER: b RATIONALE: Agile is an intense process that can burn out system developers and other project participants. Documentation is produced as a by-product of completing project tasks. Agile requires a larger percentage of stakeholders’ and users’ time than other approaches. This approach requires system analysts and users to be skilled in Agile system development tools and Agile techniques. FEEDBACK: a. Agile is an intense process that can burn out system developers and other project participants. b. Agile is an intense process that can burn out system developers and other project participants. c. Agile is an intense process that can burn out system developers and other project participants. d. Agile is an intense process that can burn out system developers and other project participants.

POINTS: DIFFICULTY: REFERENCES:

1 Easy Agile Development

Copyright Cengage Learning. Powered by Cognero.

Page 61


Chapter 13 - System Acquisition and Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.13 - Identify the advantages and disadvantages of the Agile system development approach. KEYWORDS: Bloom's: Remember DATE CREATED: 7/24/2020 12:09 PM DATE MODIFIED: 7/24/2020 12:27 PM 92. Rosie's software development team, which has always relied on a Waterfall approach, is considering trying Agile for a few projects. One potential problem Rosie should anticipate if they make this change is that _____. a. developers and other team members might be bored by the slower pace b. stakeholders might be annoyed when it places greater demands on their time c. the reduced level of interaction and collaboration might disappoint some team members d. documentation will no longer be produced as project tasks are completed ANSWER: b RATIONALE: Agile requires a larger percentage of stakeholders’ and users’ time than other approaches. An advantage is that, for appropriate projects, this approach puts an application into production sooner than any other approach. Agile forces teamwork and lots of interaction between users and stakeholders. It is an intense process that can burn out system developers and other project participants. Documentation is produced as a by-product of completing project tasks. FEEDBACK: a. Agile requires a larger percentage of stakeholders’ and users’ time than other approaches. b. Agile requires a larger percentage of stakeholders’ and users’ time than other approaches. c. Agile requires a larger percentage of stakeholders’ and users’ time than other approaches. d. Agile requires a larger percentage of stakeholders’ and users’ time than other approaches.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Agile Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.13 - Identify the advantages and disadvantages of the Agile system development approach. KEYWORDS: Bloom's: Remember DATE CREATED: 7/24/2020 12:09 PM DATE MODIFIED: 7/24/2020 12:40 PM 93. Within the Agile Scrum framework, the person who coordinates all Scrum activities is called a _____. a. Scrum master b. sprint planner c. Scrum stakeholder d. product owner ANSWER: a RATIONALE: A Scrum master is the person who coordinates all Scrum activities, and a Scrum team Copyright Cengage Learning. Powered by Cognero.

Page 62


Chapter 13 - System Acquisition and Development consists of a dozen or fewer people who perform all systems development activities from investigation to testing so there is less personnel turnover than on the typical Waterfall system development project. FEEDBACK:

a. A Scrum master is the person who coordinates all Scrum activities, and a Scrum team consists of a dozen or fewer people who perform all systems development activities from investigation to testing so there is less personnel turnover than on the typical Waterfall system development project. b. A Scrum master is the person who coordinates all Scrum activities, and a Scrum team consists of a dozen or fewer people who perform all systems development activities from investigation to testing so there is less personnel turnover than on the typical Waterfall system development project. c. A Scrum master is the person who coordinates all Scrum activities, and a Scrum team consists of a dozen or fewer people who perform all systems development activities from investigation to testing so there is less personnel turnover than on the typical Waterfall system development project. d. A Scrum master is the person who coordinates all Scrum activities, and a Scrum team consists of a dozen or fewer people who perform all systems development activities from investigation to testing so there is less personnel turnover than on the typical Waterfall system development project.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Agile Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.14 - Describe the role of the Scrum master and product owner in the Scrum framework. KEYWORDS: Bloom's: Remember DATE CREATED: 7/24/2020 12:41 PM DATE MODIFIED: 7/24/2020 12:47 PM 94. Within the Scrum framework for Agile development, the person who is responsible for communicating and aligning project priorities between the project stakeholders and development team is the _____. a. Scrum master b. splint planner c. Scrum stakeholder d. product owner ANSWER: d RATIONALE: The product owner is a person who represents the project stakeholders and is responsible for communicating and aligning project priorities between the stakeholders and development team. FEEDBACK: a. The product owner is a person who represents the project stakeholders and is responsible for communicating and aligning project priorities between the stakeholders and development team. b. The product owner is a person who represents the project stakeholders and is responsible for communicating and aligning project priorities between the stakeholders and development team. c. The product owner is a person who represents the project stakeholders and is responsible for communicating and aligning project priorities between the stakeholders and development team.

Copyright Cengage Learning. Powered by Cognero.

Page 63


Chapter 13 - System Acquisition and Development d. The product owner is a person who represents the project stakeholders and is responsible for communicating and aligning project priorities between the stakeholders and development team.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Agile Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.14 - Describe the role of the Scrum master and product owner in the Scrum framework. KEYWORDS: Bloom's: Remember DATE CREATED: 7/24/2020 12:42 PM DATE MODIFIED: 7/24/2020 12:50 PM 95. An Agile development Scrum master _____. a. performs the role of a traditional project manager b. has several people management responsibilities c. anticipates and removes barriers to producing deliverables d. is concerned with product quality but not the delivery schedule ANSWER: c RATIONALE: The Scrum master does not fill the role of a traditional project manager and has no people management responsibilities. Instead, the primary responsibility of the Scrum master is to anticipate and remove barriers to the project team producing its deliverables and meeting the project schedule. FEEDBACK: a. The Scrum master does not fill the role of a traditional project manager and has no people management responsibilities. Instead, the primary responsibility of the Scrum master is to anticipate and remove barriers to the project team producing its deliverables and meeting the project schedule. b. The Scrum master does not fill the role of a traditional project manager and has no people management responsibilities. Instead, the primary responsibility of the Scrum master is to anticipate and remove barriers to the project team producing its deliverables and meeting the project schedule. c. The Scrum master does not fill the role of a traditional project manager and has no people management responsibilities. Instead, the primary responsibility of the Scrum master is to anticipate and remove barriers to the project team producing its deliverables and meeting the project schedule. d. The Scrum master does not fill the role of a traditional project manager and has no people management responsibilities. Instead, the primary responsibility of the Scrum master is to anticipate and remove barriers to the project team producing its deliverables and meeting the project schedule.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Agile Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.14 - Describe the role of the Scrum master and product owner in the Scrum framework. KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.

Page 64


Chapter 13 - System Acquisition and Development DATE CREATED: DATE MODIFIED:

7/24/2020 12:42 PM 7/24/2020 12:55 PM

96. An important role of the product owner in the Scrum framework for Agile development is to _____. a. describe what should be built and why b. coordinate all Scrum activities c. describe how the software should be built d. act as a traditional project manager ANSWER: a RATIONALE: The product owner holds the product vision; he or she is responsible for describing what should be built and why—but not how. FEEDBACK: a. The product owner holds the product vision; he or she is responsible for describing what should be built and why—but not how. b. The product owner holds the product vision; he or she is responsible for describing what should be built and why—but not how. c. The product owner holds the product vision; he or she is responsible for describing what should be built and why—but not how. d. The product owner holds the product vision; he or she is responsible for describing what should be built and why—but not how.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Agile Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.14 - Describe the role of the Scrum master and product owner in the Scrum framework. KEYWORDS: Bloom's: Remember DATE CREATED: 7/24/2020 12:43 PM DATE MODIFIED: 7/24/2020 12:59 PM 97. Gordon's software development company uses an Agile approach. Gordon works with project stakeholders and his team to create a prioritized list of project requirements for use during a sprint planning session. Gordon is the _____ for this project. a. project champion b. project manager c. product owner d. Scrum master ANSWER: c RATIONALE: Using the Scrum method, the product owner works with the stakeholders and team to create a prioritized list of project requirements called a product backlog. Next, a sprint planning session is held, during which the team selects the highest priority requirements from the top of the product backlog to create the sprint backlog. FEEDBACK: a. Using the Scrum method, the product owner works with the stakeholders and team to create a prioritized list of project requirements called a product backlog. b. Using the Scrum method, the product owner works with the stakeholders and team to create a prioritized list of project requirements called a product backlog. c. Using the Scrum method, the product owner works with the stakeholders and

Copyright Cengage Learning. Powered by Cognero.

Page 65


Chapter 13 - System Acquisition and Development team to create a prioritized list of project requirements called a product backlog.

d. Using the Scrum method, the product owner works with the stakeholders and

team to create a prioritized list of project requirements called a product backlog.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Agile Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.14 - Describe the role of the Scrum master and product owner in the Scrum framework. KEYWORDS: Bloom's: Remember DATE CREATED: 7/24/2020 12:43 PM DATE MODIFIED: 7/24/2020 1:06 PM 98. Emily, as part of a Scrum team, must keep her fellow team members focused on their goals through each iteration of the software product they are developing. She coordinates their activities and helps them overcome obstacles that might prevent them from achieving these goals. What role is Emily fulfilling for this project? a. project manager b. project champion c. product owner d. Scrum master ANSWER: d RATIONALE: A Scrum master is the person who coordinates all Scrum activities. The Scrum master does not fill the role of a traditional project manager and has no people management responsibilities. Instead, the primary responsibility of the Scrum master is to anticipate and remove barriers to the project team producing its deliverables and meeting the project schedule. During a sprint, the Scrum master keeps the team focused on its goals. FEEDBACK: a. A Scrum master is the person who coordinates all Scrum activities. The Scrum master does not fill the role of a traditional project manager and has no people management responsibilities. Instead, the primary responsibility of the Scrum master is to anticipate and remove barriers to the project team producing its deliverables and meeting the project schedule. During a sprint, the Scrum master keeps the team focused on its goals. b. A Scrum master is the person who coordinates all Scrum activities. The Scrum master does not fill the role of a traditional project manager and has no people management responsibilities. Instead, the primary responsibility of the Scrum master is to anticipate and remove barriers to the project team producing its deliverables and meeting the project schedule. During a sprint, the Scrum master keeps the team focused on its goals. c. A Scrum master is the person who coordinates all Scrum activities. The Scrum master does not fill the role of a traditional project manager and has no people management responsibilities. Instead, the primary responsibility of the Scrum master is to anticipate and remove barriers to the project team producing its deliverables and meeting the project schedule. During a sprint, the Scrum master keeps the team focused on its goals. d. A Scrum master is the person who coordinates all Scrum activities. The Scrum master does not fill the role of a traditional project manager and has no people management responsibilities. Instead, the primary responsibility of the Scrum master is to anticipate and remove barriers to the project team producing its deliverables and meeting the project schedule. During a sprint, the Scrum master

Copyright Cengage Learning. Powered by Cognero.

Page 66


Chapter 13 - System Acquisition and Development keeps the team focused on its goals.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Agile Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.14 - Describe the role of the Scrum master and product owner in the Scrum framework. KEYWORDS: Bloom's: Remember DATE CREATED: 7/24/2020 12:43 PM DATE MODIFIED: 7/24/2020 1:11 PM 99. What form of Agile software development promotes incremental development of a system using short development cycles to improve productivity and accommodate new customer requirements? a. DevOps b. extreme programming c. joint application development d. Scrum ANSWER: b RATIONALE: Extreme programming (XP) is a form of Agile software development that promotes incremental development of a system using short development cycles to improve productivity and to accommodate new customer requirements. FEEDBACK: a. Extreme programming (XP) is a form of Agile software development that promotes incremental development of a system using short development cycles to improve productivity and to accommodate new customer requirements. b. Extreme programming (XP) is a form of Agile software development that promotes incremental development of a system using short development cycles to improve productivity and to accommodate new customer requirements. c. Extreme programming (XP) is a form of Agile software development that promotes incremental development of a system using short development cycles to improve productivity and to accommodate new customer requirements. d. Extreme programming (XP) is a form of Agile software development that promotes incremental development of a system using short development cycles to improve productivity and to accommodate new customer requirements.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Agile Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.15 - Discuss extreme programming (XP) and DevOps. KEYWORDS: Bloom's: Remember DATE CREATED: 7/24/2020 1:12 PM DATE MODIFIED: 7/24/2020 1:18 PM 100. Which of the following is characteristic of extreme programming? a. programming in teams of 12 or more Copyright Cengage Learning. Powered by Cognero.

Page 67


Chapter 13 - System Acquisition and Development b. unit testing of all code c. use of a hierarchical project management structure d. programming of system features before they are needed ANSWER: b RATIONALE: Essentials of extreme programming include programming in pairs, performing extensive code review, unit testing of all code, putting off the programming of system features until they are actually needed, use of a flat project management structure, simplicity and clarity in code, expecting changes in system requirements as the project progresses and the desired solution is better understood, and frequent communication with the customer and among programmers. FEEDBACK: a. Essentials of extreme programming include programming in pairs, performing extensive code review, unit testing of all code, putting off the programming of system features until they are actually needed, use of a flat project management structure, simplicity and clarity in code, expecting changes in system requirements as the project progresses and the desired solution is better understood, and frequent communication with the customer and among programmers. b. Essentials of extreme programming include programming in pairs, performing extensive code review, unit testing of all code, putting off the programming of system features until they are actually needed, use of a flat project management structure, simplicity and clarity in code, expecting changes in system requirements as the project progresses and the desired solution is better understood, and frequent communication with the customer and among programmers. c. Essentials of extreme programming include programming in pairs, performing extensive code review, unit testing of all code, putting off the programming of system features until they are actually needed, use of a flat project management structure, simplicity and clarity in code, expecting changes in system requirements as the project progresses and the desired solution is better understood, and frequent communication with the customer and among programmers. d. Essentials of extreme programming include programming in pairs, performing extensive code review, unit testing of all code, putting off the programming of system features until they are actually needed, use of a flat project management structure, simplicity and clarity in code, expecting changes in system requirements as the project progresses and the desired solution is better understood, and frequent communication with the customer and among programmers.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Agile Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.15 - Discuss extreme programming (XP) and DevOps. KEYWORDS: Bloom's: Remember DATE CREATED: 7/24/2020 1:14 PM DATE MODIFIED: 7/24/2020 1:22 PM 101. The practice of blending of tasks such as design, coding, and testing with tasks such server provisioning and job scheduling is known as _____. a. DevOps Copyright Cengage Learning. Powered by Cognero.

Page 68


Chapter 13 - System Acquisition and Development b. joint application development c. extreme programming d. process integration ANSWER: a RATIONALE: DevOps is the practice of blending of the tasks performed by the development staff (who are typically responsible for design, coding, and testing) and the IT operations groups (who typically handle operational deployment tasks, such as server provisioning and job scheduling) to enable faster and more reliable software releases. FEEDBACK: a. DevOps is the practice of blending of the tasks performed by the development staff (who are typically responsible for design, coding, and testing) and the IT operations groups (who typically handle operational deployment tasks, such as server provisioning and job scheduling) to enable faster and more reliable software releases. b. DevOps is the practice of blending of the tasks performed by the development staff (who are typically responsible for design, coding, and testing) and the IT operations groups (who typically handle operational deployment tasks, such as server provisioning and job scheduling) to enable faster and more reliable software releases. c. DevOps is the practice of blending of the tasks performed by the development staff (who are typically responsible for design, coding, and testing) and the IT operations groups (who typically handle operational deployment tasks, such as server provisioning and job scheduling) to enable faster and more reliable software releases. d. DevOps is the practice of blending of the tasks performed by the development staff (who are typically responsible for design, coding, and testing) and the IT operations groups (who typically handle operational deployment tasks, such as server provisioning and job scheduling) to enable faster and more reliable software releases.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Agile Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.15 - Discuss extreme programming (XP) and DevOps. KEYWORDS: Bloom's: Remember DATE CREATED: 7/24/2020 1:14 PM DATE MODIFIED: 7/24/2020 1:26 PM 102. Which practice is essential to organizations who use Agile development with frequent releases or a continuous deployment strategy? a. JAD b. using DFDs c. DevOps d. XP ANSWER: c RATIONALE: DevOps is key to successful Agile development environments where organizations go live with new software releases every two to four weeks. And in many organizations, DevOps is being used as part of a continuous deployment strategy, in which releases are launched daily—and in some cases, multiple times a day. Copyright Cengage Learning. Powered by Cognero.

Page 69


Chapter 13 - System Acquisition and Development FEEDBACK:

a. DevOps is key to successful Agile development environments where

organizations go live with new software releases every two to four weeks. And in many organizations, DevOps is being used as part of a continuous deployment strategy, in which releases are launched daily—and in some cases, multiple times a day. b. DevOps is key to successful Agile development environments where organizations go live with new software releases every two to four weeks. And in many organizations, DevOps is being used as part of a continuous deployment strategy, in which releases are launched daily—and in some cases, multiple times a day. c. DevOps is key to successful Agile development environments where organizations go live with new software releases every two to four weeks. And in many organizations, DevOps is being used as part of a continuous deployment strategy, in which releases are launched daily—and in some cases, multiple times a day. d. DevOps is key to successful Agile development environments where organizations go live with new software releases every two to four weeks. And in many organizations, DevOps is being used as part of a continuous deployment strategy, in which releases are launched daily—and in some cases, multiple times a day.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Agile Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.15 - Discuss extreme programming (XP) and DevOps. KEYWORDS: Bloom's: Remember DATE CREATED: 7/24/2020 1:14 PM DATE MODIFIED: 7/24/2020 1:37 PM 103. With the DevOps approach, _____. a. the application development team writes and tests code in an isolated environment b. completed code is released to the IT operations group to deploy in the end users' environment c. deployment includes gluing together all of an application's components d. move-into-production activities are automated, incremental, and self-service ANSWER: d RATIONALE: Under traditional software development approaches, the application development team gathers business requirements, writes code, and tests programs in an isolated development environment. The code is then released to the IT operations group to deploy in the real-world operational environment of end users. This involves gluing together all the components of an application, including databases, messaging infrastructure, external services, the passing and receiving of data to and from other systems, and third-party dependencies. DevOps principles reshape all the move-into-production activities so that they become automated, collaborative, continuous, incremental, iterative, and self-service. FEEDBACK:

a. DevOps principles reshape all the move-into-production activities so that they

become automated, collaborative, continuous, incremental, iterative, and selfservice. b. DevOps principles reshape all the move-into-production activities so that they become automated, collaborative, continuous, incremental, iterative, and selfCopyright Cengage Learning. Powered by Cognero.

Page 70


Chapter 13 - System Acquisition and Development service.

c. DevOps principles reshape all the move-into-production activities so that they

become automated, collaborative, continuous, incremental, iterative, and selfservice. d. DevOps principles reshape all the move-into-production activities so that they become automated, collaborative, continuous, incremental, iterative, and selfservice.

POINTS: 1 DIFFICULTY: Easy REFERENCES: Agile Development QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.15 - Discuss extreme programming (XP) and DevOps. KEYWORDS: Bloom's: Remember DATE CREATED: 7/24/2020 1:14 PM DATE MODIFIED: 7/24/2020 1:45 PM 104. James is a web application developer. Because his organization has adopted DevOps practices, James can expect that _____. a. he will be required to manually provision web servers b. collaboration will always be emphasized c. application builds will follow a Waterfall approach d. development will not be incremental or iterative ANSWER: b RATIONALE: Responsive teams adopt DevOps practices of self-service configuration, automated provisioning (using predefined procedures that are carried out electronically without requiring human intervention), continuous build, continuous integration, continuous delivery, automated release management, and incremental testing. Although DevOps can mean slightly different things depending on how it is deployed at different companies, at its core, DevOps places a priority on collaboration, with operations staff and development engineers participating together, over the entire system’s lifecycle—from design and development through testing and implementation. FEEDBACK: a. At its core, DevOps places a priority on collaboration, with operations staff and development engineers participating together, over the entire system’s lifecycle— from design and development through testing and implementation. b. At its core, DevOps places a priority on collaboration, with operations staff and development engineers participating together, over the entire system’s lifecycle— from design and development through testing and implementation. c. At its core, DevOps places a priority on collaboration, with operations staff and development engineers participating together, over the entire system’s lifecycle— from design and development through testing and implementation. d. At its core, DevOps places a priority on collaboration, with operations staff and development engineers participating together, over the entire system’s lifecycle— from design and development through testing and implementation.

POINTS: DIFFICULTY: REFERENCES: QUESTION TYPE:

1 Easy Agile Development Multiple Choice

Copyright Cengage Learning. Powered by Cognero.

Page 71


Chapter 13 - System Acquisition and Development HAS VARIABLES: False LEARNING OBJECTIVES: POIS.14e.13.15 - Discuss extreme programming (XP) and DevOps. KEYWORDS: Bloom's: Remember DATE CREATED: 7/24/2020 1:14 PM DATE MODIFIED: 7/24/2020 1:55 PM Essay 105. Briefly describe the various types of project feasibility that must be evaluated. ANSWER: Technical feasibility examines whether a project is feasible within the current limits of available technology. Determining the technical feasibility is critical when new technology is first being considered for use within an organization, prior to its widespread use. Economic feasibility determines whether the expected benefits associated with a project outweigh the expected costs sufficiently to make the project financially attractive. Legal feasibility determines whether laws or regulations may prevent or limit a systems development project. Legal feasibility involves an analysis of existing and future laws to determine the likelihood of legal action against the systems development project and the possible consequences of such action. Operational feasibility is concerned with how the system will be accepted by people and how well it will meet various system performance expectations. Schedule feasibility determines whether a project can be completed in a reasonable amount of time. This process involves balancing the time and resource requirements of the project with those of other projects. RATIONALE: Technical feasibility examines whether a project is feasible within the current limits of available technology. Determining the technical feasibility is critical when new technology is first being considered for use within an organization, prior to its widespread use. Economic feasibility determines whether the expected benefits associated with a project outweigh the expected costs sufficiently to make the project financially attractive. Legal feasibility determines whether laws or regulations may prevent or limit a systems development project. Legal feasibility involves an analysis of existing and future laws to determine the likelihood of legal action against the systems development project and the possible consequences of such action. Operational feasibility is concerned with how the system will be accepted by people and how well it will meet various system performance expectations. Schedule feasibility determines whether a project can be completed in a reasonable amount of time. This process involves balancing the time and resource requirements of the project with those of other projects. POINTS: 1 RUBRIC: 0 1 2 3 4 Criteria

Failure

Below Expectations

Developing

Competent

Mastery

Names and defines five types of feasibility that should be assessed during a feasibility analysis

DIFFICULTY: Moderate REFERENCES: System Investigation QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic Copyright Cengage Learning. Powered by Cognero.

Page 72


Chapter 13 - System Acquisition and Development LEARNING OBJECTIVES: POIS.14e.13.9 - Define five types of feasibility that must be assessed. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Remember DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/22/2020 1:09 PM 106. Briefly explain the difference between system testing and user acceptance testing (UAT). ANSWER: System testing involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that an information system meets all specified requirements. System testing is often done by independent testers who were not involved in developing program code. They attempt to make the system fail. They frequently employ testing called black box testing because it requires no specific knowledge of an application’s code and internal logic. In other words, a system tester is aware of what the software is supposed to do but is not aware of how it does it.

RATIONALE:

POINTS: RUBRIC:

During user acceptance testing (UAT), trained users test the information system to verify that it can complete required tasks in a real-world operating environment and perform according to the system design specifications. UAT is also known as beta testing, application testing, and end-user testing. Unlike system testing, which ensures that the system itself works, UAT determines whether the system meets its intended business needs. System testing involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that an information system meets all specified requirements. System testing is often done by independent testers who were not involved in developing program code. They attempt to make the system fail. They frequently employ testing called black box testing because it requires no specific knowledge of an application’s code and internal logic. In other words, a system tester is aware of what the software is supposed to do but is not aware of how it does it. During user acceptance testing (UAT), trained users test the information system to verify that it can complete required tasks in a real-world operating environment and perform according to the system design specifications. UAT is also known as beta testing, application testing, and end-user testing. Unlike system testing, which ensures that the system itself works, UAT determines whether the system meets its intended business needs. 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Defines system testing and user acceptance testing Compares system testing with user acceptance testing

DIFFICULTY: Moderate REFERENCES: Integration and Testing QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.13.10 - Identify the purpose and participants involved in various types of testing from unit testing to user acceptance testing. Copyright Cengage Learning. Powered by Cognero.

Page 73


Chapter 13 - System Acquisition and Development NATIONAL STANDARDS: KEYWORDS: DATE CREATED: DATE MODIFIED:

United States - BUSPROG: Technology Bloom's: Understand 11/19/2019 5:54 PM 7/22/2020 1:11 PM

107. What is system maintenance? List the reasons for systems maintenance. ANSWER: Systems maintenance is a stage of systems development that involves changing and enhancing a system to make it more useful in achieving user and organizational goals. Reasons for program maintenance include the following: • • • • • • • • RATIONALE:

Systems maintenance is a stage of systems development that involves changing and enhancing a system to make it more useful in achieving user and organizational goals. Reasons for program maintenance include the following: • • • • • • • •

POINTS: RUBRIC:

Poor system performance such as slow response time for frequent transactions Changes in business processes Changes in the needs of system stakeholders, users, and managers Bugs or errors in the program Technical and hardware problems Corporate mergers and acquisitions Changes in government regulations Changes in the operating system or hardware on which the application runs

Poor system performance such as slow response time for frequent transactions Changes in business processes Changes in the needs of system stakeholders, users, and managers Bugs or errors in the program Technical and hardware problems Corporate mergers and acquisitions Changes in government regulations Changes in the operating system or hardware on which the application runs

1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

Defines system maintenance Lists common reasons for system maintenance

DIFFICULTY: Moderate REFERENCES: System Operation and Maintenance QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.13.7 - Identify and state the goal of each of the six phases of the Waterfall approach. NATIONAL STANDARDS: United States - BUSPROG: Technology Copyright Cengage Learning. Powered by Cognero.

Page 74


Chapter 13 - System Acquisition and Development KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Understand 11/19/2019 5:54 PM 7/22/2020 1:14 PM

108. Discuss the advantages and disadvantages of Agile development. ANSWER: Like any other approach, Agile development has its advantages and disadvantages. For appropriate projects, this approach puts an application into production sooner than any other approach. On the other hand, this intense systems development life cycle can burn out systems developers and other project participants. In Agile development, documentation is produced as a by-product of completing project tasks, but this approach requires systems analysts and users to be skilled in Agile systems development tools and Agile techniques. Agile forces teamwork and lots of interaction between users and stakeholders; however, it requires a larger percentage of stakeholders' and users' time than other approaches. RATIONALE: Like any other approach, Agile development has its advantages and disadvantages. For appropriate projects, this approach puts an application into production sooner than any other approach. On the other hand, this intense systems development life cycle can burn out systems developers and other project participants. In Agile development, documentation is produced as a by-product of completing project tasks, but this approach requires systems analysts and users to be skilled in Agile systems development tools and Agile techniques. Agile forces teamwork and lots of interaction between users and stakeholders; however, it requires a larger percentage of stakeholders' and users' time than other approaches. POINTS: 1 RUBRIC: 0 1 2 3 4 Criteria

Failure

Below Expectations

Developing

Competent

Mastery

Names several advantages of Agile development Names several disadvantages of Agile development

DIFFICULTY: Moderate REFERENCES: Agile Development QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.13.13 - Identify the advantages and disadvantages of the Agile system development approach. NATIONAL STANDARDS: United States - BUSPROG: Technology KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/22/2020 1:18 PM 109. System investigation is the initial phase in the development of a new or modified business information system. What is the purpose of this phase, and what questions are typically explored during the investigation? ANSWER: The purpose of system investigation is to gain a clear understanding of the specifics of the problem to solve or the opportunity to address. Questions typically asked during this phase are: What is the scope of the problem? Who is affected and how? How often does this occur? Copyright Cengage Learning. Powered by Cognero.

Page 75


Chapter 13 - System Acquisition and Development

RATIONALE:

POINTS: RUBRIC:

After gaining a good understanding of the problem, the next question is, “Is the problem worth addressing?” What are the potential costs, both the one-time initial costs and recurring costs? What risks are associated with the project? If successful, what benefits, both tangible and intangible, will the system provide? Given that organizations have limited resources— people and money—these questions deserve careful attention. The purpose of system investigation is to gain a clear understanding of the specifics of the problem to solve or the opportunity to address. Questions typically asked during this phase are: What is the scope of the problem? Who is affected and how? How often does this occur? After gaining a good understanding of the problem, the next question is, “Is the problem worth addressing?” What are the potential costs, both the one-time initial costs and recurring costs? What risks are associated with the project? If successful, what benefits, both tangible and intangible, will the system provide? Given that organizations have limited resources— people and money—these questions deserve careful attention 1 Criteria

0

1

2

3

4

Failure

Below Expectations

Developing

Competent

Mastery

States the purpose of system investigation Lists questions that should be addressed during a system investigation

DIFFICULTY: Moderate REFERENCES: System Investigation QUESTION TYPE: Essay HAS VARIABLES: False STUDENT ENTRY MODE: Basic LEARNING OBJECTIVES: POIS.14e.13.7 - Identify and state the goal of each of the six phases of the Waterfall approach. NATIONAL STANDARDS: United States - BUSPROG: Legal - Legal KEYWORDS: Bloom's: Understand DATE CREATED: 11/19/2019 5:54 PM DATE MODIFIED: 7/22/2020 1:22 PM

Copyright Cengage Learning. Powered by Cognero.

Page 76


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.