TEST BANK for Using MIS, 11e (Global Edition) David Kroenke, Randall Boyle. Answers At The End Of Ea

Page 1


Using MIS, 11e (Global Edition) David Kroenke, Randall Boyle (Test Bank All Chapters, 100% Original Verified, A+ Grade) Using MIS, 11e (Kroenke) Chapter 1 The Importance of MIS 1) ________ states that the number of transistors per square inch on an integrated chip doubles every 18 months. A) Nielsen's Law B) Faraday's Law C) Moore's Law D) Newton's Law E) Metcalfe's Law Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 2) According to Moore's Law, the ________. A) price of an integrated chip reduces once in 18 months B) performance of each transistor on a square inch of an integrated chip doubles every year C) number of transistors per square inch on an integrated chip doubles every 18 months D) density of a transistor decreases every year E) rate of innovation increases exponentially Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 3) ________ states that network connection speeds for high-end users will increase by 50 percent per year. A) Nielsen's Law B) Kryder's Law C) Moore's Law D) Bell's Law E) Metcalfe's Law Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept

1 Copyright © 2020 Pearson Education, Inc.


4) Which of the following ratios has fallen as a result of Moore's Law? A) price/performance B) demand/supply C) profit/loss D) debt/equity E) price/earnings Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 5) In 1972, computer scientist ________ recognized that digital devices would change the world as they evolved and became widely used. A) Gordon Bell B) Robert Metcalfe C) Gordon Moore D) Jakob Nielsen E) Sam Flynn Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 6) ________ states that the value of a network is equal to the square of the number of users connected to it. A) Moore's Law B) Metcalfe's Law C) Bell's Law D) Nielsen's Law E) Flynn's Law Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept

2 Copyright © 2020 Pearson Education, Inc.


7) Google's Project Loon is a major effort to ________. A) decrease the size of storage devices, while increasing their capacity B) facilitate the use of Internet on submarines, while they are submerged C) promote the use of virtual machines, that operate on voice command D) bring Internet access to everyone using a network of inflated balloons E) reduce the rate of decay in magnetic disks Answer: D Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 8) According to Bell's Law, ________ will evolve so quickly they will enable new platforms every 10 years. A) systems thinking B) human interactions C) digital devices D) television E) technology companies Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 9) Because of Moore's Law, the ________ of data processing is approaching zero. A) cost B) power C) speed D) use E) applications Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept

3 Copyright © 2020 Pearson Education, Inc.


10) A primary metric for social media companies is ________. A) revenue B) the number of monthly active users C) the number of ads shown to users D) the total number of users E) how much it costs the company to maintain social media connections Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 11) ________ states the storage density on magnetic disks is increasing at an exponential rate. A) Nielsen's Law B) Faraday's Law C) Moore's Law D) Kryder's Law E) Metcalfe's Law Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 12) Despite the rapid growth of technology, digital devices fail to impact the industry. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 13) Gordon Moore was the inventor of Ethernet. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept

4 Copyright © 2020 Pearson Education, Inc.


14) The Information Age is a period in history where the production, distribution, and control of information is the primary driver of the economy. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 15) Bell's Law states that a new computer class forms roughly each decade establishing a new industry. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 16) The Digital Revolution was the conversion from mechanical and analog devices to digital devices. Answer: TRUE Diff: 2 AACSB: Information Technology Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 17) Kryder's Law states that the storage density on magnetic disks is increasing at an exponential rate. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 18) The hottest jobs are found in marketing companies. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept

5 Copyright © 2020 Pearson Education, Inc.


19) Discuss the Digital Revolution. Answer: The Digital Revolution was the conversion from mechanical and analog devices to digital devices. This shift to digital devices meant monumental changes for companies, individuals, and the society as a whole. The problem was, people couldn't really understand how, or even why, this shift was going to affect them. Much like people today, they based their future projections on past events. They knew factories, bureaucracies, mass production, and operational efficiency. But this knowledge didn't prepare them for the changes that were coming. The Digital Revolution didn't just mean that new "digital" equipment was replacing old mechanical, or analog, equipment. These new digital devices could now be connected to other digital devices and share data among themselves. They could also work faster as processor speed increased. Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 20) State Nielsen's Law. What is the implication of Nielsen's Law for managers? Answer: According to Nielsen's Law, "network connection speeds for high-end users will increase by 50 percent per year." Because of this law, the types of services and applications that can be provided over networks (i.e. the Internet) have changed radically. Therefore, it is important for managers to realize that, because of Nielsen's Law, networks will become faster, new companies, new products, and new platforms will emerge. Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 21) ________ are most likely to be outsourced to the lowest bidder. A) Ability to experiment B) Routine skills C) Ability to collaborate D) Abstract reasoning skill E) Systems thinking Answer: B Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.2: How will MIS affect me? Classification: Concept

6 Copyright © 2020 Pearson Education, Inc.


22) Which of the following is categorized as a nonroutine cognitive skill? A) symbolic thinking B) marketing knowledge C) tax accounting D) systems thinking E) data entry Answer: D Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.2: How will MIS affect me? Classification: Concept 23) Dallas is an analyst at an online retailer. He is great at creating representative diagrams showing the relationships between customer purchases, billing, and shipment. This indicates that he has ________ skills. A) abstract reasoning B) collaborative C) experimental D) systems thinking E) spatial intelligence Answer: A Diff: 3 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.2: How will MIS affect me? Classification: Application 24) Abstract reasoning is the ability to ________. A) develop ideas and plans with others when performing tasks B) make and manipulate models C) act quickly on a problem D) provide and receive critical feedback E) identify the crux of an argument Answer: B Diff: 1 AACSB: Information Technology Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.2: How will MIS affect me? Classification: Concept

7 Copyright © 2020 Pearson Education, Inc.


25) ________ is the ability to model the components of a system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed. A) Abstract reasoning B) Systems thinking C) Collaboration D) Experimentation E) Function modeling Answer: B Diff: 1 AACSB: Information Technology Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.2: How will MIS affect me? Classification: Concept 26) A manager will essentially require ________ skills to test ideas clearly on a small scale, before taking bigger risks or committing significant resources to a larger project. A) collaboration B) experimentation C) interpersonal D) systems thinking E) social Answer: B Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.2: How will MIS affect me? Classification: Concept 27) Lindsay is an analyst at a large power company. She creates a custom spreadsheet showing how cold weather might affect the company's profitability. This shows her ________ skills. A) abstract reasoning B) experimentation C) systems thinking D) problem-solving E) risk ordering Answer: C Diff: 2 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.2: How will MIS affect me? Classification: Application

8 Copyright © 2020 Pearson Education, Inc.


28) After making minor changes to a team report, Jeff felt like he had done enough work on the project. When he was asked to contribute more, he got offended and quit responding to requests from some team members. Jeff's inability to receive critical feedback indicates a lack of ________ skills. A) systems thinking B) collaboration C) abstract reasoning D) experimentation E) ideation Answer: B Diff: 3 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.2: How will MIS affect me? Classification: Application 29) ________ is the activity of two or more people working together to achieve a common goal, result, or work product. A) Systems thinking B) Abstract reasoning C) Collaboration D) Experimentation E) Competition Answer: C Diff: 1 AACSB: Information Technology Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.2: How will MIS affect me? Classification: Concept 30) Cami is the marketing manager for a regional furniture maker. She closely monitors the impact of each marketing campaign on overall sales. She routinely tries novel promotional offers to reach first-time customers. Which of the following skills does Cami exhibit? A) systems thinking B) experimentation C) abstract reasoning D) collaboration E) troubleshooting Answer: B Diff: 3 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.2: How will MIS affect me? Classification: Application

9 Copyright © 2020 Pearson Education, Inc.


31) ________ is defined as making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has. A) Troubleshooting B) Abstract reasoning C) Problem-solving D) Experimentation E) Cognition Answer: D Diff: 1 AACSB: Information Technology Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.2: How will MIS affect me? Classification: Concept 32) Which of the following is an example of systems thinking? A) Working with colleagues in other countries. B) Testing a new product before presenting it to management. C) Looking at a can of beans in the grocery store and connecting it to U.S. immigration. D) Creating a model of how customers are created. E) Providing and receiving critical feedback. Answer: A Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.2: How will MIS affect me? Classification: Concept 33) ________ is the single most important skill for effective collaboration. A) Being nice B) Experimentation C) Being able to connect the inputs with the outputs D) Giving and receiving feedback E) Fearlessness Answer: D Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.2: How will MIS affect me? Classification: Concept

10 Copyright © 2020 Pearson Education, Inc.


34) The mismatch between the high level of tech skills demanded by employers and the low level of tech skills held by employees is called ________. A) the technology skills gap B) the digital divide C) under demand training D) systems thinking E) social re-engineering. Answer: A Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.2: How will MIS affect me? Classification: Concept 35) Bryce, a floor manager at an industrial plant, works well with all of his line employees. Bryce's ability to collaborate is a routine skill. Answer: FALSE Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.2: How will MIS affect me? Classification: Application 36) A person's strong abstract reasoning skills won't be able to easily construct models. Answer: FALSE Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.2: How will MIS affect me? Classification: Concept 37) According to The U.S. Bureau of Labor Statistics, the demand for information systems and business jobs are low and future wage growth appears stagnant. Answer: FALSE Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.2: How will MIS affect me? Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


38) What job prospects are available for professionals who know how to use information systems (ISs)? Answer: Information systems and computer technology provide job and wage benefits beyond just IS professionals. As the price of computer technology plummets, the value of jobs that benefit from it increases dramatically. For example, plentiful, high-paying jobs are available to business professionals who know how to use information systems to improve business process quality, or those who know how to interpret data mining results for improved marketing, or those who know how to use emerging technology like 3D printing to create new products and address new markets. Diff: 3 AACSB: Information Technology Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.2: How will MIS affect me? Classification: Concept 39) Explain the four nonroutine cognitive skills that are key to a successful career today. Answer: The four nonroutine cognitive skills identified as critical for organizations in the current scenario are as follows: (1) Abstract reasoning–the ability to make and manipulate models. (2) Systems thinking–the ability to model the components of a system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed. (3) Collaboration–the activity of two or more people working together to achieve a common goal, result, or work product. (4) Ability to experiment–making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources you have. Diff: 3 AACSB: Information Technology Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.2: How will MIS affect me? Classification: Concept 40) Why does the author feel this course is the most important course in the business school? Answer: 1. It will give you the background you need to assess, evaluate, and apply emerging information systems technology to business. 2. It can give you the ultimate in job security–marketable skills–by helping you learn abstraction, systems thinking, collaboration, and experimentation. 3. Many well-paid MIS-related jobs are in high demand. Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.2: How will MIS affect me? Classification: Concept

12 Copyright © 2020 Pearson Education, Inc.


41) Which of the following is an example of computer hardware? A) a monitor B) a browser C) a spreadsheet D) an operating system E) a variable Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.3: What is MIS? Classification: Concept 42) The storage disks in a computer are an example of the ________ component of information systems. A) hardware B) software C) intangible D) virtual E) bootable Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.3: What is MIS? Classification: Concept 43) An operating system like Windows or Linux is an example of the ________ component of an information system. A) software B) hardware C) tangible D) physical E) virtual Answer: A Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.3: What is MIS? Classification: Application

13 Copyright © 2020 Pearson Education, Inc.


44) The method used to start a program is part of the ________ component in the fivecomponent framework. A) hardware B) software C) people D) procedures E) data Answer: D Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.3: What is MIS? Classification: Application 45) Even if you are not a programmer or a database designer, you still should take a(n) ________ in the systems development process. A) interest B) active role C) positive outlook D) your opinion E) matter of fact attitude Answer: B Diff: 2 AACSB: Information Technology; Analytical Thinking Course LO: Describe the components of an information system (IS) LO: 1.3: What is MIS? Classification: Application 46) Zach follows the instructions that show him how to create a custom Web site in his school's learning management system. These steps that he follows are examples of the ________ component of an information system. A) procedure B) data C) software D) hardware E) memory Answer: A Diff: 3 AACSB: Information Technology; Reflective Thinking Course LO: Describe the components of an information system (IS) LO: 1.3: What is MIS? Classification: Application

14 Copyright © 2020 Pearson Education, Inc.


47) Noel creates a table listing the number of students in his biology class, their names, age, and phone numbers. His table is an example of the ________ component of an information system. A) program B) data C) information D) hardware E) process Answer: B Diff: 2 AACSB: Reflective Thinking Course LO: Describe the components of an information system (IS) LO: 1.3: What is MIS? Classification: Application 48) The ________ component of the five-component framework of an information system includes individuals who maintain the data and support the networks of computers. A) procedural B) people C) data D) networking E) storage Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.3: What is MIS? Classification: Concept 49) Which of the following statements is TRUE of business users who administer the development of information systems? A) It is mandatory that they hold a degree in database management. B) They should take an active role in the system's development. C) They should refrain from specifying the system's requirements. D) When the system fails, they must refrain from performing tasks related to system recovery. E) They are skilled programmers. Answer: B Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 1.3: What is MIS? Classification: Concept

15 Copyright © 2020 Pearson Education, Inc.


50) As a business professional, what is one of the reasons you should be involved in information systems (IS) development? A) Information technology professionals know exactly what the business needs. B) To understand the business requirements. C) Because you are in upper management and must decide all of the information technology requirements. D) You do not have to be involved. E) You have to know what to do in case the system fails. Answer: B Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.3: What is MIS? Classification: Concept 51) All of the following are examples of ancillary functions you may be asked to do in your department as a user of information systems (IS) except: ________. A) Create a database B) Protect the security of the system C) Back up data D) Perform tasks while the system is down. E) Employ the system Answer: A Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.3: What is MIS? Classification: Concept 52) According to the five-component framework, the five components of an information system are present in every information system. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.3: What is MIS? Classification: Concept 53) The five-component framework applies to simple and complex information systems. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.3: What is MIS? Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


54) Information systems exist to help people who work in an organization to achieve the strategies of that business. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 1.3: What is MIS? Classification: Concept 55) Social networking has all the components in the Five-component framework. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.3: What is MIS? Classification: Concept 56) Information systems are created for the sheer joy of exploring new technologies. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.3: What is MIS? Classification: Concept 57) Define the terms system, information system, and management information system. Answer: A system is a group of components that interact to achieve some purpose. An information system (IS) is a group of components that interact to produce information. A management information system is defined as a system that helps organizations achieve their strategies. Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.3: What is MIS? Classification: Concept

17 Copyright © 2020 Pearson Education, Inc.


58) List and briefly explain the five-component model of an information system with examples. Answer: The five components described in the model are: computer hardware, software, data, procedures, and people. These five components are present in every information system, from the simplest to the most complex. For example, when one uses a computer to write a class report, he/she is using hardware (the computer, storage disk, keyboard, and monitor), software (Word, WordPerfect, or some other word-processing program), data (the words, sentences, and paragraphs in the report), procedures (the methods used to start the program, enter the report, print it, and save and back up the file), and people (the user). Diff: 3 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.3: What is MIS? Classification: Concept 59) List the three key elements of management information systems. Answer: Management and use, information systems, and strategies. Diff: 3 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 1.3: What is MIS? Classification: Concept 60) What is the difference between information systems (IS) and information technology (IT)? Answer: An information system (IS) is an assembly of hardware, software, data, procedures, and people that produces information. In contrast, information technology (IT) refers to the products, methods, inventions, and standards used for the purpose of producing information. Diff: 2 AACSB: Information Technology; Reflective Thinking Course LO: Describe the components of an information system (IS) LO: 1.3: What is MIS? Classification: Application 61) According to the five-component model of information systems, the ________ component provides instructions for the people who use information systems. A) software B) data C) hardware D) procedure E) storage Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.4: How can you use the five-component model? Classification: Concept

18 Copyright © 2020 Pearson Education, Inc.


62) In the five-component model, the process of automation is a process of moving work from ________. A) processes to procedures B) procedures to people C) the digital mode to the analog mode D) the human side to the computer side E) processing to storage Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.4: How can you use the five-component model? Classification: Concept 63) In the five-component model of information systems, which of the following components is considered an actor? A) software B) hardware C) data D) procedure E) information Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.4: How can you use the five-component model? Classification: Concept 64) The hardware components of an information system will act as a(n) ________. A) bridge between the computer side and the human side B) actor on the human side C) instruction on the computer side D) actor on the computer side E) functional anchor on the human side Answer: D Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.4: How can you use the five-component model? Classification: Concept

19 Copyright © 2020 Pearson Education, Inc.


65) BigBank uses a custom customer management system to manage all of its interactions with retail clients. This system is an ________ of the company's information system. A) instruction on the computer side B) actor on the human side C) instruction on the human side D) actor on the computer side E) instruction for the hardware Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.4: How can you use the five-component model? Classification: Application 66) The ________ component in the five-component model of information systems is considered a bridge that connects the computer side and the human side. A) software B) procedure C) data D) hardware E) virtual Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.4: How can you use the five-component model? Classification: Concept 67) Which of the following pairs of components constitutes the computer side of information systems? A) software and data B) data and hardware C) people and procedures D) hardware and software E) data and memory Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.4: How can you use the five-component model? Classification: Concept

20 Copyright © 2020 Pearson Education, Inc.


68) Which of the following pairs of components constitutes the human side of information systems? A) software and procedures B) software and people C) people and procedures D) hardware and people E) instructions and code Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.4: How can you use the five-component model? Classification: Concept 69) Which of the following is an example of a low-tech information system? A) an inventory tracking system that stores millions of records and produces reports every 24 hours B) a file of email addresses stored in an email program C) a customer support system that keeps track of product issues D) a decision support system that analyzes multiple variables E) an enterprise data loss prevention system that monitors the flow of data over a network Answer: B Diff: 2 AACSB: Information Technology; Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 1.4: How can you use the five-component model? Classification: Concept 70) Which of the following components of an information system is the easiest to change and results in the least amount of organizational disruption? A) hardware B) software C) database D) procedures E) protocols Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.4: How can you use the five-component model? Classification: Concept

21 Copyright © 2020 Pearson Education, Inc.


71) Drudgen Fitness Inc. is a fitness equipment provider that markets its products through a chain of retail outlets in four states. As part of its expansion strategy, the company decides to open outlets in four more states and decides to revise its existing business processes. According to the five-component model of information systems, which of the following processes will be the least disruptive to the organization? A) collecting demographic data from the new markets B) developing new CRM software for the existing and new outlets C) relocating existing employees and hiring new employees D) buying and installing new computers in the new outlets E) changing the sales, reporting, and compensation procedures Answer: D Diff: 3 AACSB: Information Technology; Reflective Thinking Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.4: How can you use the five-component model? Classification: Application 72) Which of the following would be the most disruptive to an organization when implementing an information system? A) installing new hardware components B) creating new databases C) developing new programs D) changing reporting relationships E) setting up online data backups Answer: D Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.4: How can you use the five-component model? Classification: Concept 73) It is generally more difficult to make changes to the ________ of an information system than to the database itself. A) software B) hardware C) programs D) procedures E) memory Answer: D Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.4: How can you use the five-component model? Classification: Concept

22 Copyright © 2020 Pearson Education, Inc.


74) A large retailer loses millions of customer records in a major data breach. They must develop and implement a new system which includes new hardware, applications, and storage. Which of the following actions will be most difficult to perform when implementing the new information system? A) upgrading the computer systems used by the retail chain B) writing the programs to create the software C) changing the structure of existing databases that reflect supplier and customer data D) training the employees to use and manage the new system E) installing new transaction processing hardware Answer: D Diff: 3 AACSB: Reflective Thinking Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.4: How can you use the five-component model? Classification: Application 75) You cannot increase your basic IQ, but you can increase the quality of your ________. A) thinking B) procedures C) life D) habits E) IS system Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.4: How can you use the five-component model? Classification: Concept 76) The five-component framework can be used when assessing the scope of ________. A) new systems B) hiring new people C) life D) habits E) organization disruption Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.4: How can you use the five-component model? Classification: Concept

23 Copyright © 2020 Pearson Education, Inc.


77) According to the five-component model of information systems, the data and software components of information systems are capable of performing actions. Answer: FALSE Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.4: How can you use the five-component model? Classification: Concept 78) In the five-component model of an information system, data is the bridge between the computer and the human sides. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.4: How can you use the five-component model? Classification: Concept 79) In the five-component model of an information system, hardware and software are part of the human side. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.4: How can you use the five-component model? Classification: Concept 80) According to the five-component model of an information system, software is the most important component of an information system. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.4: How can you use the five-component model? Classification: Concept 81) The lower the amount of work to be moved from the human side to the computer side of an information system, the higher is the complexity of that system. Answer: FALSE Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 1.4: How can you use the five-component model? Classification: Concept

24 Copyright © 2020 Pearson Education, Inc.


82) Obtaining or developing new programs is more difficult than ordering additional hardware. Answer: TRUE Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.4: How can you use the five-component model? Classification: Concept 83) Changing personnel responsibilities to suit an information system is more disruptive to an organization than ordering additional hardware for the information system. Answer: TRUE Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.4: How can you use the five-component model? Classification: Concept 84) Changing the structure of existing databases causes more organizational disruption than changing working procedures. Answer: FALSE Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.4: How can you use the five-component model? Classification: Concept 85) Ordering additional hardware creates the least amount of organizational disruption compared to changes in the four components of an information system. Answer: TRUE Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.4: How can you use the five-component model? Classification: Concept 86) It is only humans that produce information. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 1.4: How can you use the five-component model? Classification: Concept

25 Copyright © 2020 Pearson Education, Inc.


87) Which is the most important component of an information system? Why? Answer: People are part of every information system that they use. The user's mind and thinking are not merely a component of the information systems they use; they are the most important component. This is so because, even if users have the perfect information system, if they do not know what to do with the data that it produces, they are wasting both their time and money. The quality of users' thinking is what determines the quality of the information that is produced. Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.4: How can you use the five-component model? Classification: Concept 88) Explain how the five components of an information system are arranged in terms of ease of change and organizational disruption. Answer: The five components of the information systems framework are: computer hardware, software, data, procedures, and people. The five components are arranged in order of ease of change and the amount of organizational disruption. It is usually a simple matter to order new hardware and install it. Obtaining or developing new programs is more difficult. Creating new databases or changing the structure of existing databases is still more difficult. Changing procedures, requiring people to work in new ways, is even more difficult. Finally, changing personnel responsibilities and reporting relationships and hiring and terminating employees are both very difficult and very disruptive to an organization. Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.4: How can you use the five-component model? Classification: Concept 89) Which of the following is considered as information rather than mere data? A) a list of property prices in a neighborhood B) the return on investment of an advertising campaign C) the total number of students in a school D) the price of a company's shares on a given day E) the weight of a car Answer: B Diff: 2 AACSB: Analytical Thinking Course LO: Describe the components of an information system (IS) LO: 1.5: What is information? Classification: Concept

26 Copyright © 2020 Pearson Education, Inc.


90) Which of the following is a common description of information? A) collection of unprocessed data B) unbiased, unrelated data C) knowledge derived from data D) list of recorded facts or figures E) an array of related variables Answer: C Diff: 1 AACSB: Analytical Thinking Course LO: Describe the components of an information system (IS) LO: 1.5: What is information? Classification: Concept 91) Which of the following best describes data? A) information presented in a meaningful context B) processed information C) recorded facts or figures D) knowledge derived from facts or figures E) the ability to use knowledge Answer: C Diff: 1 AACSB: Analytical Thinking Course LO: Describe the components of an information system (IS) LO: 1.5: What is information? Classification: Concept 92) Which of the following terms is described as processed data or data presented in a meaningful context? A) questionnaires B) scenarios C) illustrations D) information E) forms Answer: D Diff: 1 AACSB: Analytical Thinking Course LO: Describe the components of an information system (IS) LO: 1.5: What is information? Classification: Application

27 Copyright © 2020 Pearson Education, Inc.


93) ________ skills determine the ability to conceive information from data. A) Cognitive B) Abstract reasoning C) Symbolic thinking D) Experimentation E) Spatial Answer: A Diff: 2 AACSB: Analytical Thinking Course LO: Describe the components of an information system (IS) LO: 1.5: What is information? Classification: Concept 94) A furniture manufacturer keeps details of its current inventory including weight, quantity, and price. These details can be called ________. A) an analysis B) data C) information D) an assessment E) knowledge Answer: B Diff: 2 AACSB: Analytical Thinking Course LO: Describe the components of an information system (IS) LO: 1.5: What is information? Classification: Application 95) Silway Travels organizes tours to a number of cities in Illinois. The manager of the company examines a spreadsheet which is an annual record of airfares to different cities from Chicago. The contents of the spreadsheet will be used to determine the difference in peak season and offseason airfares. The spreadsheet, in this case, represents ________. A) a survey B) data C) information D) an analysis E) a system Answer: B Diff: 3 AACSB: Reflective Thinking Course LO: Describe the components of an information system (IS) LO: 1.5: What is information? Classification: Application

28 Copyright © 2020 Pearson Education, Inc.


96) Data becomes information when it is presented in a meaningful context. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.5: What is information? Classification: Concept 97) The statement that the average computer network architect makes $98,430, is information. Answer: TRUE Diff: 2 AACSB: Analytical Thinking Course LO: Describe the components of an information system (IS) LO: 1.5: What is information? Classification: Application 98) Because you can determine if a graph is useful information further proves that you are the most important part of the five-component model. Answer: TRUE Diff: 1 AACSB: Analytical Thinking Course LO: Describe the components of an information system (IS) LO: 1.5: What is information? Classification: Application 99) Discuss the common definitions of information. Answer: The most common definition of information is that information is knowledge derived from data, whereas data is defined as recorded facts or figures. Another common definition is that information is data presented in a meaningful context. A third definition of information that one often hears is that information is processed data, or sometimes, information is data processed by summing, ordering, averaging, grouping, comparing, or other similar operations. The fundamental idea of this definition is that individuals do something to data to produce information. Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.5: What is information? Classification: Concept

29 Copyright © 2020 Pearson Education, Inc.


100) Explain the relation between data and information. Answer: The relation between data and information can be understood with the help of a graph. The graph is data that humans perceive, and from that perception conceive information. In short, if it's on a piece of paper or on a digital screen, it's data. If it's in the mind of a human, it's information. The quality of thinking, or ability to conceive information from data, is determined by one's cognitive skills. The data is just the data; the information conceived from it is the value that one adds to the information system. People have different perceptions and points of view, not surprisingly, then, they will conceive different information from the same data. Diff: 3 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.5: What is information? Classification: Concept 101) Which of the following is a critical characteristic of good information? A) abundance of details B) accuracy C) inexpensive D) ease of creation E) quantity Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.6: What are necessary data characteristics? Classification: Concept 102) Sandra is a production manager at a soda manufacturing and bottling plant. One of her duties is to create a monthly inventory report based on the list of material received from the supplier on delivery. Sandra's report for the previous month, however, turned out to be invalid as the supplier provided an erroneous list. In this scenario, her report cannot be considered good information as it was lacking in ________. A) accuracy B) effectiveness C) method D) content E) quantity Answer: A Diff: 3 AACSB: Reflective Thinking Course LO: Describe the components of an information system (IS) LO: 1.6: What are necessary data characteristics? Classification: Application

30 Copyright © 2020 Pearson Education, Inc.


103) Which of the following statements is TRUE of good information? A) Good information should go well beyond the scope of the purpose for which it is generated. B) Information should be relevant to the subject, not necessarily to the context. C) Good information should be based on correct and complete data. D) Good information is only received from sources that provide data for free. E) Good information comes from large data sets. Answer: C Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.6: What are necessary data characteristics? Classification: Concept 104) John Carter, the CEO of Carter Steels, is concerned about the sudden rise in employee attrition in his organization. He asks Walter, the human resources manager, to provide him with the last quarter's report showing the rate of attrition. Walter, however, sends the salary details of the new hires for the last quarter. This report is of no use to Carter as it is ________. A) inaccurate B) not timely C) irrelevant D) miscalculated E) uncleaned Answer: C Diff: 3 AACSB: Reflective Thinking Course LO: Describe the components of an information system (IS) LO: 1.6: What are necessary data characteristics? Classification: Application 105) The CEO of a large company asks the sales manager to report the sales figures of the previous quarter. The manager immediately sends her the list of products sold in the previous quarter. These details do NOT qualify as good information because they are ________. A) too narrow in scope B) too expensive C) not timely D) not relevant E) too large Answer: D Diff: 2 AACSB: Analytical Thinking Course LO: Describe the components of an information system (IS) LO: 1.6: What are necessary data characteristics? Classification: Application

31 Copyright © 2020 Pearson Education, Inc.


106) In the context of information systems, which of the following statements is TRUE of data characteristics? A) Data generated should be in excess of what is required. B) An appropriate relationship should exist between the cost of data and its value. C) Data should be relevant to the context, not necessarily to the subject. D) Freely available data is always accurate and timely. E) Larger data sets yield more accurate information. Answer: B Diff: 2 AACSB: Analytical Thinking Course LO: Describe the components of an information system (IS) LO: 1.6: What are necessary data characteristics? Classification: Concept 107) Will decides to gift his wife a house for their 10th wedding anniversary. He contacts his real estate agent about a specific house that he wants to buy. The realtor assures him that he will contact the owners immediately to find out the asking price. The agent, however, informs Will about the price two months after the anniversary. The information provided by the agent is most likely to be useless because it lacked ________. A) sufficiency B) relevance C) timeliness D) accuracy E) precision Answer: C Diff: 3 AACSB: Reflective Thinking Course LO: Describe the components of an information system (IS) LO: 1.6: What are necessary data characteristics? Classification: Application 108) Kevin is the manager over the southern part of the country. The administrative assistant provided him a report for the northern part of the country. Kevin thanked his assistant but noted the data was ________ because he only requested the report for his region. A) not accurate B) created too early C) not sufficient D) not relevant E) not worth the cost Answer: D Diff: 1 AACSB: Analytical Thinking Course LO: Describe the components of an information system (IS) LO: 1.6: What are necessary data characteristics? Classification: Concept

32 Copyright © 2020 Pearson Education, Inc.


109) Which of the following is the least critical aspect of good information? A) data accuracy B) timeliness of data C) additional data D) relevance of data E) sufficiency of data Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.6: What are necessary data characteristics? Classification: Concept 110) Caroline asks her secretary to send information on the meetings that she needs to attend next month. Her secretary, Joanne, provides her with the details immediately, but leaves out certain additional details that are irrelevant to Caroline's requirements. Which of the following statements is TRUE about this scenario? A) The information that Joanne provided was partly good, as it was timely but inaccurate. B) Joanne provided adequate and timely information, but the information was of no value to Caroline. C) The information that Joanne gave was accurate and sufficient for Caroline's purpose. D) The information that Caroline obtained through Joanne was not timely or worth its cost. E) The information that Caroline obtained through Joanne was not accurate. Answer: C Diff: 3 AACSB: Reflective Thinking Course LO: Describe the components of an information system (IS) LO: 1.6: What are necessary data characteristics? Classification: Application 111) Robert is a strategic planner for a consulting firm. He receives countless reports for daily analysis, but he avoids being inundated with information by selecting only the few reports that actually serve his purpose. Which principle of data characterization is Robert following? A) Information should be just barely sufficient for its purpose. B) Data that arrives after a prolonged period of time is of the highest quality. C) Information needs to be relevant to the subject, not necessarily to the context. D) Freely available data is always accurate and timely. E) Collecting as much data as possible is always preferable. Answer: A Diff: 3 AACSB: Reflective Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 1.6: What are necessary data characteristics? Classification: Application

33 Copyright © 2020 Pearson Education, Inc.


112) Accuracy is ________ because business professionals must be able to rely on the results of their information systems. A) an analysis B) data C) information D) crucial E) knowledge Answer: D Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.6: What are necessary data characteristics? Classification: Concept 113) The marketing director asks James to bring her the sales data from the last quarter; however, he misunderstood and brought her sales data from 2010. The information is not useful because it is not ________. A) timely B) worth the cost C) necessary D) crucial E) knowledge Answer: A Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.6: What are necessary data characteristics? Classification: Concept 114) As you go higher in management the more data you will be given, but your time will be limited so you will have to ________ some of the data. A) ignore B) sort C) manipulate D) add to E) take to look over Answer: A Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.6: What are necessary data characteristics? Classification: Concept

34 Copyright © 2020 Pearson Education, Inc.


115) A good information system is one that provides the users with more information than what is required. Answer: FALSE Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 1.6: What are necessary data characteristics? Classification: Concept 116) Data is worth its cost when an appropriate relationship exists between the cost of data and its value. Answer: TRUE Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.6: What are necessary data characteristics? Classification: Concept 117) Data is free. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.6: What are necessary data characteristics? Classification: Concept 118) Information systems should be subject to the same financial analyses other assets are subjected. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.6: What are necessary data characteristics? Classification: Concept

35 Copyright © 2020 Pearson Education, Inc.


119) What are the five characteristics of good data? Answer: The five characteristics of data are as follows: (1) Accurate–Good information is based on correct and complete data, and it has been processed correctly as expected. (2) Timely–Good data is produced in time for its intended use. (3) Relevant–Good data is relevant both to the context and to the subject. (4) Just barely sufficient–Good data is sufficient for the purpose for which it is generated, but just barely so. (5) Worth its cost–For good data to be worth its cost, there must be an appropriate relationship between the cost of data and its value. Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.6: What are necessary data characteristics? Classification: Concept 120) Explain why data accuracy is crucial to the success of an information system. Answer: Good information is conceived from accurate, correct, and complete data that has been processed correctly as expected. The IS function can develop a bad reputation in the organization if a system is known to produce inaccurate data. In such a case, the information system becomes a waste of time and money as users develop work-arounds to avoid the inaccurate data. Diff: 3 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.6: What are necessary data characteristics? Classification: Concept 121) Explain the concept of "just barely sufficient" data. Answer: Data needs to be sufficient for the purpose for which it is generated, but just barely so. We are inundated with data; one of the critical decisions that each of us has to make each day is what data to ignore. The higher one rises into management, the more data one will be given, and because there is only so much time, the more data one will need to ignore. So, data should be sufficient, but just barely. Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.6: What are necessary data characteristics? Classification: Concept

36 Copyright © 2020 Pearson Education, Inc.


122) Which of the following statements is TRUE about the changes and developments foreseen by the year 2029? A) Smartphones may fade away. B) Desktop and portable computers will increase in popularity. C) Processing image data would be difficult. D) Mobile devices would have to be charged multiple times a day. E) Mainframes will overtake servers. Answer: A Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 1.7: 2029? Classification: Concept 123) By 2029, your data will be safer and more private. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 1.7: 2029? Classification: Concept 124) In the year 2029, you may be able to turn off your smart bulbs by pointing at them. Answer: TRUE Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 1.7: 2029? Classification: Concept 125) What are some potential downsides of advances in technology in the future? Answer: By 2029, privacy may be increasingly difficult to maintain. Your data will be collected by new kinds of apps, flowing through the cloud, and be packaged for sale by companies providing "free" services. Social relationships may suffer as well. We may become less connected to people as we become more connected to systems. Diff: 3 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 1.7: 2029? Classification: Concept

37 Copyright © 2020 Pearson Education, Inc.


Using MIS, 11e (Kroenke) Chapter 2 Strategy and Information Systems 1) Which of the following factors determines the structure, features, and functions of an information system used in a company? A) the competitive strategy B) the value of its brands C) the size of the company D) the number of competitors E) the company's PE ratio Answer: A Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.1: How does organizational strategy determine information systems structure? Classification: Concept 2) Competitive strategy determines all of the following except ________. A) structure of the information system B) goals and objectives C) features D) functions E) the company's PE ratio Answer: E Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.1: How does organizational strategy determine information systems structure? Classification: Concept 3) An organization's goals and objectives are determined by its competitive strategy. Answer: TRUE Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.1: How does organizational strategy determine information systems structure? Classification: Concept 4) The collective technical capability of an organization determines its competitive strategy. Answer: FALSE Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.1: How does organizational strategy determine information systems structure? Classification: Concept

1 Copyright © 2020 Pearson Education, Inc.


5) Explain the relation between competitive strategies and information systems. Answer: An organization's goals and objectives are determined by its competitive strategy. Thus, ultimately, competitive strategy determines the structure, features, and functions of every information system. In short, organizations examine the structure of their industry and determine a competitive strategy. That strategy determines value chains, which, in turn, determine business processes. The structure of business processes determines the design of supporting information systems. Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.1: How does organizational strategy determine information systems structure? Classification: Concept 6) Porter's five forces model is used to assess ________. A) industry structure B) market share C) internal competition D) life cycles of products E) future product demand Answer: A Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.2: What five forces determine industry structure? Classification: Concept 7) According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes? A) a used car dealership in New York B) a convenience store that sells retail products C) a firm that sells the only drug for a disease D) a corner latte shop in Atlanta E) a food vendor at a county fair Answer: C Diff: 3 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.2: What five forces determine industry structure? Classification: Application

2 Copyright © 2020 Pearson Education, Inc.


8) According to Porter's five forces model, a student's choice of lunch options at a large food court would be an example of a strong force for ________. A) rivalry B) threat of new entrants C) threat of substitutions D) bargaining power of customers E) industry power Answer: C Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.2: What five forces determine industry structure? Classification: Concept 9) According to Porter's five forces model, in which of the following situations would the supplier have the highest bargaining power? A) a dealer of a patented material for smartphone manufacturers B) a fashion designer catering to a niche market C) a restaurant owner who serves only army veterans D) a retailer who buys finished goods from many small suppliers E) a defense contractor that only makes products for the U.S. Navy Answer: A Diff: 3 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.2: What five forces determine industry structure? Classification: Application 10) According to Porter's five forces model, in which of the following examples would rivalry be considered as a weak force affecting the market? A) search engine designers B) used car dealers C) holiday tour agents D) packaged food manufacturers E) insurance providers Answer: A Diff: 3 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.2: What five forces determine industry structure? Classification: Application

3 Copyright © 2020 Pearson Education, Inc.


11) A mining company develops a new processing technique using only light and patents the process. This situation is characterized by ________. A) low threat of substitutions B) high bargaining power of customers C) high threat of new entrants D) low bargaining power of suppliers E) low threat of new entrants Answer: A Diff: 3 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.2: What five forces determine industry structure? Classification: Application 12) According to Porter's five forces model, an oil producer will have increased ________ if the supply of oil drops sharply. A) bargaining power B) threat of substitutes C) risk of rivalry D) threat of new entrants E) industry coalescence Answer: A Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.2: What five forces determine industry structure? Classification: Concept 13) Bargaining power of customers is likely to be the highest for markets involving ________. A) limited edition apparel B) industrial products C) patented drugs D) vintage cars E) rare paintings Answer: B Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.2: What five forces determine industry structure? Classification: Concept

4 Copyright © 2020 Pearson Education, Inc.


14) The automobile industry is characterized by many manufacturers and intense competition among them. According to Porter's five forces model, this statement illustrates ________. A) low threat of substitutions B) high bargaining power of suppliers C) high levels of rivalry D) low bargaining power of customers E) low levels of rivalry Answer: C Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.2: What five forces determine industry structure? Classification: Concept 15) LNG is a large multinational appliance manufacturer. The company gets raw materials from many vendors. In this case, LNG is characterized by ________. A) very low threat of substitute products B) high bargaining power over its suppliers C) very low threat of new entrants in the market D) very high bargaining power over its customers E) low bargaining power over its suppliers Answer: B Diff: 3 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.2: What five forces determine industry structure? Classification: Application 16) A major drawback of Porter's five forces model is that it ignores the rivalry among firms in the industry. Answer: FALSE Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.2: What five forces determine industry structure? Classification: Concept

5 Copyright © 2020 Pearson Education, Inc.


17) Briefly explain Porter's five forces model. Answer: Porter's five forces model is used to assess an industry structure. According to this model, five competitive forces determine industry profitability: bargaining power of customers, threat of substitutions, bargaining power of suppliers, threat of new entrants, and rivalry among existing firms. The intensity of each of the five forces determines the characteristics of the industry, how profitable it is, and how sustainable that profitability will be. Diff: 3 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.2: What five forces determine industry structure? Classification: Concept 18) I-scream-4 Ice Cream recently faced competition against their flagship brand of "Orange peel ice cream." A competitor made significant in-roads into the market by offering three varieties of "Orange peel ice cream." I-scream-4 Ice Cream decided to counter this threat by introducing five new varieties of ice creams. Which competitive strategy is I-scream-4 Ice Cream implementing? A) cost leadership B) product differentiation C) cost differentiation D) service focus E) innovation focus Answer: B Diff: 3 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.3: How does analysis of industry structure determine competitive strategy? Classification: Application 19) An automobile company decides to improve the quality of its products and bring more variety into its entire product line. The company has decided to adopt ________. A) focused cost leadership B) industry-wide differentiation C) industry-wide cost leadership D) focused differentiation E) broad differentiation Answer: B Diff: 2 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.3: How does analysis of industry structure determine competitive strategy? Classification: Application

6 Copyright © 2020 Pearson Education, Inc.


20) According to Porter, all of the following must be consistent with the organization's strategy except ________. A) the budget B) the culture C) the activities D) the goals E) the objectives Answer: A Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.3: How does analysis of industry structure determine competitive strategy? Classification: Concept 21) Focused cost leadership is observed when a product has the lowest cost ________. A) within an industry segment B) across the product mix offered by a company C) across the entire industry D) among a group of competitors E) across multiple product categories Answer: A Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.3: How does analysis of industry structure determine competitive strategy? Classification: Concept 22) According to Porter, to be effective all of the following must be consistent with the organization's strategy except ________. A) goals B) objectives C) culture D) activities E) budget Answer: E Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.3: How does analysis of industry structure determine competitive strategy? Classification: Concept

7 Copyright © 2020 Pearson Education, Inc.


23) An organization responds to the structure of its industry by choosing a competitive strategy. Answer: TRUE Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.3: How does analysis of industry structure determine competitive strategy? Classification: Concept 24) An automobile manufacturer focusing on low-end buyers is following an industry-wide differentiation strategy. Answer: TRUE Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.3: How does analysis of industry structure determine competitive strategy? Classification: Application 25) According to Porters five forces model, companies compete in one of five strategies. Answer: FALSE Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.3: How does analysis of industry structure determine competitive strategy? Classification: Concept 26) According to Porter's four competitive strategy model, what are the four competitive strategies from which firms can choose? Answer: An organization responds to the structure of its industry by choosing a competitive strategy. According to Porter's competitive strategy model, firms engage in one of these four strategies. An organization can focus on being the cost leader, or it can focus on differentiating its products or services from those of the competition. Further, the organization can employ the cost or differentiation strategy across an industry or it can focus its strategy on a particular industry segment. Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.3: How does analysis of industry structure determine competitive strategy? Classification: Concept

8 Copyright © 2020 Pearson Education, Inc.


27) The difference between the value that an activity generates and the cost of the activity is called the ________. A) margin B) turnover C) revenue D) profit E) quick ratio Answer: A Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 28) Porter defined value as the ________. A) amount of money that a customer is willing to pay for an offering B) extent of after-sale service provided to customers C) perceived satisfaction of the customers and sellers after a transaction D) actual money exchanged in return of a product/service E) perceived quality differences across products Answer: A Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 29) Identify the activity in the value chain that involves receiving and handling of raw materials and other inputs to the product. A) inbound logistics B) procurement C) manufacturing D) outbound logistics E) optimized ordering Answer: A Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept

9 Copyright © 2020 Pearson Education, Inc.


30) The difference between the total value added and the total costs incurred is called the ________ of the value chain. A) actual value B) total margin C) total revenue D) gross turnover E) taxable income Answer: B Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 31) A retail company sells agricultural produce and consumer products. The company procures materials from farmers and local producers. This process is an example of ________. A) outbound logistics B) inbound logistics C) operational management D) internal marketing E) customer service Answer: B Diff: 2 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Application 32) Which of the following statements best describes the role of operations in a value chain? A) transforming inputs into the final products B) collecting, storing, and distributing products to buyers C) inducing buyers to purchase products and providing a means for them to do so D) receiving, storing, and disseminating inputs to products E) assisting customers' use of products Answer: A Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept

10 Copyright © 2020 Pearson Education, Inc.


33) Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers? A) inbound logistics B) operations C) customer service D) outbound logistics E) sales and marketing Answer: D Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 34) Which of the following value chain activities involves inducing buyers to purchase a product and providing a means for them to do so? A) inbound logistics B) operations C) sales and marketing D) outbound logistics E) customer service Answer: C Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 35) Which of the following value chain activities involves assisting users with handling of the products after sale, thus maintaining and enhancing the products' value? A) inbound logistics B) customer service C) operations D) outbound logistics E) sales and marketing Answer: B Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


36) Which of the following is a primary activity in the value chain? A) receiving and handling of raw materials and other inputs B) negotiating prices with vendors C) finding suitable vendors to supply raw materials D) setting up contractual arrangements with various suppliers E) investigating new designs Answer: A Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 37) Kai runs a local auto parts store. A customer comes in and asks for special supercharger. Kai orders it from the factory. This activity can be classified under ________. A) inbound logistics B) operations C) customer service D) marketing E) outbound logistics Answer: A Diff: 3 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Application 38) Lynn, the manager of a transportation company, goes through the product delivery schedule. She assigns territories to each executive of the delivery team, and also contacts the fleet supervisor to arrange trucks for transportation. Which activity of the value chain is Lynn executing? A) inbound logistics B) marketing C) sales D) outbound logistics E) customer service Answer: D Diff: 3 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Application

12 Copyright © 2020 Pearson Education, Inc.


39) Madison, the project manager of a sports apparel company, estimates that the demand for jogging shoes is likely to decline in the coming months. He advises the procurement department to order raw material accordingly to ensure minimum wastage. This intercommunication that facilitates smooth operations is called ________. A) market research B) outbound logistics C) strategizing D) linkages E) interoperation Answer: D Diff: 3 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Application 40) Which of the following employees performs a support activity in the value chain? A) Jackson is involved in the development of technological infrastructure. B) Sofia is a member of the recruitment team. C) Nathaniel is in charge of setting up contractual agreements with vendors. D) Nora is a financial analyst who rates and gives investment advice. E) Noah is the corporate accountant who manages tax liabilities. Answer: C Diff: 3 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Application 41) Which of the following paved the way for the creation of a business process design? A) support activities B) triggers C) linkages D) primary activities E) electronic data interchanges Answer: C Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept

13 Copyright © 2020 Pearson Education, Inc.


42) Which of the following statements is consistent with the central idea of business process design? A) Technology should be used to supplement the existing value chain. B) Business processes should focus on improving individual functional systems. C) Organizations should create new business processes instead of improving existing systems. D) Technology should be used to modify and improve standard business processes. E) Experimental technology can drive innovative business processes. Answer: C Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 43) The ________ created by Porter states that firms should create new, more efficient business processes that integrate the activities of all departments involved in a value chain. A) Six Sigma methodology B) product differentiation model C) Lean Manufacturing method D) business process design E) Lean Innovation model Answer: D Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 44) In the value chain, which of the following is an example of a primary activity? A) service customers B) procurement C) human resources D) manage company resources E) support employees Answer: A Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept

14 Copyright © 2020 Pearson Education, Inc.


45) Porter recognized a movement to create integrated, cross-departmental systems. His work lead to the creation of a new discipline called ________. A) value chaining B) business process design C) cost reduction planning D) linkages E) supporting activities Answer: B Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 46) According to Porter, most of the value in service-oriented companies is generated by all of the following activities except ________. A) operations B) marketing C) inbound logistics D) sales E) service activities Answer: C Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 47) Porter defined value as the amount of money that a customer is willing to pay for a resource, product, or service. Answer: TRUE Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 48) The difference between the value that an activity generates and the cost of the activity is called margin. Answer: TRUE Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept

15 Copyright © 2020 Pearson Education, Inc.


49) A business with a differentiation strategy will add cost to an activity only as long as the activity has a positive margin. Answer: TRUE Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 50) In the inbound logistics activity of a value chain, the manufacturer receives, stores, and disseminates inputs to a product. Answer: TRUE Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 51) The primary activity of sales and marketing is the collection, storage, and physical distribution of the products to the buyers. Answer: FALSE Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 52) In the value chain, customer service is concerned with inducing buyers to purchase the product and providing a means for them to do so. Answer: FALSE Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 53) The total margin of the value chain is the difference between the total value added and the total costs incurred. Answer: TRUE Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


54) Support activities in a value chain include the processes of finding vendors, setting up contractual arrangements, and negotiating prices. Answer: TRUE Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 55) A linkage is a network of activities that generate value by transforming inputs into outputs. Answer: FALSE Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 56) Briefly describe the concepts of value, margin, and value chain as defined by Porter. Answer: Porter defined value as the amount of money that a customer is willing to pay for a resource, product, or service. The difference between the value that an activity generates and the cost of the activity is called the margin. A value chain is a network of value-creating activities. That generic chain consists of five primary activities and four support activities. Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 57) Define the primary activities in a generic value chain. Answer: The primary activities in a generic value chain are as follows: (1) Inbound logistics–It is the receiving, storing, and disseminating of inputs to the products. (2) Operations/manufacturing–It is the transforming of inputs into the final products. (3) Outbound logistics–It is the collecting, storing, and physically distributing of the products to buyers. (4) Sales and marketing–It is defined as inducing buyers to purchase the products and providing a means for them to do so. (5) Customer service–It is defined as assisting customers' use of the products and thus maintaining and enhancing the products' value. Diff: 3 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept

17 Copyright © 2020 Pearson Education, Inc.


58) Distinguish between the primary and support activities of a value chain. Answer: Primary activities directly add value to the value chain of an organization. Examples are operations and marketing. The support activities in the generic value chain contribute indirectly to the production, sale, and service of the product. They include procurement, which consists of the processes of finding vendors, setting up contractual arrangements, and negotiating prices. Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 59) What are the various support activities in a value chain? Answer: The support activities in the generic value chain contribute indirectly to the production, sale, and service of the product. They include procurement, which consists of the processes of finding vendors, setting up contractual arrangements, and negotiating prices. Supporting functions add value, albeit indirectly, and they also have costs. It is difficult to calculate the margin for such activities because it is difficult to know the specific value added by a support activity. Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 60) Explain linkages with an example. Answer: Porter's model of business activities includes linkages, which are interactions across value activities. For example, manufacturing systems use linkages to reduce inventory costs. Such a system uses sales forecasts to plan production; it then uses the production plan to determine raw material needs and then uses the material needs to schedule purchases. The end result is just-in-time inventory, which reduces inventory sizes and costs. Diff: 2 AACSB: Written and Oral Communication Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 61) Explain the concept of business process design. Answer: The central idea of business process design is that organizations should not automate or improve existing functional systems. Rather, they should create new, more efficient business processes that integrate the activities of all departments involved in a value chain. Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.4: How does competitive strategy determine value chain structure? Classification: Concept 18 Copyright © 2020 Pearson Education, Inc.


62) A(n) ________ is a network of activities that generate worth by transforming inputs into outputs. A) business process B) competitive strategy C) value chain D) information system E) linked investment Answer: A Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 2.5: How do business processes generate value? Classification: Concept 63) The cost of the business process is the sum of the cost of the inputs and the ________. A) cost of the activities B) cost of the outputs C) value of the outputs D) value of the products E) cost of the products Answer: A Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 2.5: How do business processes generate value? Classification: Concept 64) Which of the following defines a repository? A) a backup plan of action in case of emergencies B) a department devoted specifically for market research C) a place where finished goods undergo a quality check before shipment D) a collection of something, such as data or raw materials E) a financial center for storing overnight balances Answer: D Diff: 2 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 2.5: How do business processes generate value? Classification: Concept

19 Copyright © 2020 Pearson Education, Inc.


65) Neil creates an application which facilitates the easy storage and access of employee information like name, age, experience, and qualification for his organization. The application is an example of a(n) ________. A) repository B) program C) linkage D) activity E) array Answer: A Diff: 2 AACSB: Reflective Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 2.5: How do business processes generate value? Classification: Application 66) In a manufacturing business, which of the following transforms finished goods into cash? A) warehouse operations B) manufacturing process C) sales process D) outbound logistics E) inbound logistics Answer: C Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 2.5: How do business processes generate value? Classification: Concept 67) As the purchasing manager of a company that designs costumes, Natalie orders yards of fabric in preparation for Halloween. Natalie's duties can be classified under the ________ category of a business process. A) outbound logistics B) marketing C) operations D) inbound logistics E) sales Answer: D Diff: 3 AACSB: Reflective Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 2.5: How do business processes generate value? Classification: Application

20 Copyright © 2020 Pearson Education, Inc.


68) Which of the following statements is TRUE of business process designs? A) Most process designs require people to work in new ways. B) They do not involve the need to follow different procedures. C) They should be accompanied by a change in management. D) Process designs very rarely attract employee resistance. E) Process designs map directly to existing work processes. Answer: A Diff: 2 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 2.5: How do business processes generate value? Classification: Concept 69) Which of the following could be a result of changing business processes. A) Satisfied employees because many embrace changes. B) The reuse of databases. C) Employees may have to learn a new procedure. D) Returning customers because the new process improves communication. E) A new way of performing activities is encouraging to employees. Answer: C Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 2.5: How do business processes generate value? Classification: Concept 70) Each activity in a business process is a business function that receives inputs and produces outputs. Answer: TRUE Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 2.5: How do business processes generate value? Classification: Concept 71) The cost of the business process is the cost of the inputs plus the cost of the outputs. Answer: FALSE Diff: 2 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 2.5: How do business processes generate value? Classification: Concept

21 Copyright © 2020 Pearson Education, Inc.


72) In a manufacturing business, the materials ordering process transforms cash into a raw materials inventory. Answer: TRUE Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 2.5: How do business processes generate value? Classification: Concept 73) An inventory of raw materials is an example of a repository. Answer: TRUE Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 2.5: How do business processes generate value? Classification: Concept 74) The sales process involves sales and marketing as well as outbound logistics activities. Answer: TRUE Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 2.5: How do business processes generate value? Classification: Concept 75) The streamlining of business processes to increase margin is key to obtaining competitive advantage. Answer: TRUE Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 2.5: How do business processes generate value? Classification: Concept 76) Only humans can perform an activity in a business process. Answer: FALSE Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 2.5: How do business processes generate value? Classification: Concept

22 Copyright © 2020 Pearson Education, Inc.


77) The streamlining of business processes to reduce costs is key to competitive strategy. Answer: TRUE Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 2.5: How do business processes generate value? Classification: Concept 78) What is a business process? How do you determine the cost and margin of a business process? Answer: A business process is a network of activities that generate value by transforming inputs into outputs. Each activity is a business function that receives inputs and produces outputs. An activity can be performed by a human, by a computer system, or by both. The cost of the business process is the cost of the inputs plus the cost of the activities. The margin of the business process is the value of the outputs minus the cost. Diff: 3 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 2.5: How do business processes generate value? Classification: Concept 79) RAC Associates is a car rental company that rents cars to tourists in the United States. The company uses tracking devices and magnetic locks to prevent car theft. These procedures are examples of ________. A) primary business processes B) core activities C) strategic activities D) supporting business processes E) premeditated activities Answer: D Diff: 3 AACSB: Reflective Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 2.6: How does competitive strategy determine business processes and the structure of information systems? Classification: Application 80) An organization's competitive strategy determines the structure of information systems. Answer: TRUE Diff: 1 AACSB: Reflective Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 2.6: How does competitive strategy determine business processes and the structure of information systems? Classification: Application

23 Copyright © 2020 Pearson Education, Inc.


81) Which of the following principles of competitive advantage is associated with product implementations? A) locking in customers B) differentiating service offerings C) locking in suppliers D) establishing alliances E) raising barriers to market entry Answer: B Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Concept 82) Cooper, the owner of a small bicycle manufacturing company, is striving to keep his organization running smoothly while remaining profitable in a highly competitive market. Cooper chooses process implementation to give his company a competitive edge over others. Which of the following principles is he most likely to implement? A) creating new products B) enhancing services C) reducing costs D) differentiating products E) redesign existing products Answer: C Diff: 3 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Application 83) Hueblue Software, an application provider to the gaming industry, decided to enhance its portfolio by developing motion-control-enabled games for the mobile gaming industry. In this scenario, which competitive strategy is Hueblue Software implementing? A) establishment of alliances B) product differentiation C) raising barriers to market entry D) locking in buyers E) locking in customers Answer: B Diff: 3 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Application

24 Copyright © 2020 Pearson Education, Inc.


84) FunText is a company that owns an app used for text messaging. It recently offered a sixmonth membership extension to its existing customers without any additional charges. Which competitive strategy is FunText trying to implement in this scenario? A) creation of a new service B) product differentiation C) locking in customers D) locking in suppliers E) enhancing existing products Answer: C Diff: 3 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Application 85) ________ is a means through which an organization can gain a competitive advantage through process implementations. A) Establishing alliances B) Creating new products C) Enhancing products D) Differentiating services E) Creating new services Answer: A Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Concept 86) Streamtech, a manufacturer of automobiles, recently received a patent for an unmanned search boat. By doing this, Streamtech has ________. A) created an entry barrier B) introduced product differentiation C) locked in its suppliers D) reduced the cost of operations E) established an alliance Answer: B Diff: 3 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Application

25 Copyright © 2020 Pearson Education, Inc.


87) Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________. A) entry barriers B) switching costs C) product standards D) brand value E) technological dependency Answer: B Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Concept 88) The International Zoological club publishes a monthly magazine for zoology enthusiasts. Members are required to pay an initial fee to cover the first two years of the subscription when registering with the club. In this scenario, the International Zoological club is ________. A) enhancing services B) establishing alliances C) locking in customers D) standardizing the product E) creating a new product Answer: C Diff: 3 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Application 89) A large software manufacturer attempts to lock in customers by making it difficult for them to substitute their software with one from another company. The strategy used by the company is referred to as ________. A) switching costs strategy B) low cost operation strategy C) standardization strategy D) marketing strategy E) bait-and-switch strategy Answer: A Diff: 2 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Application

26 Copyright © 2020 Pearson Education, Inc.


90) Organizations can lock in suppliers either by making it difficult to switch to another organization or by ________. A) increasing the margin on their products B) reducing investments in their supply chain C) making it easy to work with the organization D) reducing the bargaining power of consumers E) increasing the complexity of their products Answer: C Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Concept 91) A group of shoe manufacturing firms purchases raw materials collectively from a single supplier to obtain better deals. This is an example of obtaining competitive advantage by ________. A) differentiating the industry B) locking in customers C) establishing alliances D) enhancing the products E) creating a new service Answer: C Diff: 2 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Application 92) PL Inc. implements an information system to improve its supply chain. The system helps the organization to reduce wastes and optimally utilize its resources. In this scenario, implementing the information system has helped PL Inc. to gain a competitive advantage by ________. A) enhancing its products B) reducing its costs C) establishing alliances D) differentiating its products E) locking in customers Answer: B Diff: 3 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Application

27 Copyright © 2020 Pearson Education, Inc.


93) Reduction in production cost results in ________. A) better customer service B) lower shareholder value C) increased profitability D) increased competition E) increased process complexity Answer: C Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Concept 94) Which of the following principles of competitive advantage is related to process implementations? A) create new products B) enhance services C) reduce costs D) differentiate products E) create new services Answer: C Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Concept 95) Which of the following principles of competitive advantage is related to process implementations? A) create new products B) lock in buyers C) enhance services D) differentiate services E) create new services Answer: B Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Concept

28 Copyright © 2020 Pearson Education, Inc.


96) Which of the following principles of competitive advantage is related to process implementations? A) create new products B) enhance services C) differentiate services D) raise the barriers to market entry E) create new services Answer: D Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Concept 97) Identify the principle of competitive advantage that is associated with product implementations. A) lock in customers B) enhance services C) lock in suppliers D) establish alliances E) raise barriers to market entry Answer: B Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Concept 98) Jason's Burgers, a famous diner, recently started taking orders online to reduce the customer wait time. This arrangement was perfect for busy office workers who frequented the place, and the sales went up considerably. Jason's Burgers attempted to ________. A) reduce costs B) raise barriers to market entry C) establish alliances D) lock in customers E) create a new product Answer: D Diff: 3 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Concept

29 Copyright © 2020 Pearson Education, Inc.


99) Launch Cars, a car manufacturing company, has patented its breakthrough technology that reduces pollutant emissions by half. The company is now an active supporter of anti-pollution laws that are likely to diminish the profitability of many other auto makers. Launch Cars is attempting to ________. A) reduce costs B) raise barriers to market entry C) establish alliances D) lock in customers E) lock in suppliers Answer: B Diff: 3 AACSB: Reflective Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Application 100) As a competitive advantage, how can a company make it difficult for a customer to switch to another company? A) Allow a customer to purchase a new phone on a payment plan, but they have to sign a 2-year contract. B) Give a customer a new doorbell camera on their month-to-month contract. C) Offer a new service that is different from their competitors. D) Establishing service sharing between the company's competitor. E) Allowing open source developers to create apps for their tablet. Answer: A Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Concept 101) Organizations cannot gain a competitive advantage by enhancing existing products or services. Answer: FALSE Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Concept

30 Copyright © 2020 Pearson Education, Inc.


102) Creating a new product to increase margin is an example of using product implementations to achieve competitive advantage. Answer: TRUE Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Concept 103) Information systems create competitive advantage by providing support to a product rather than by becoming a part of the product. Answer: FALSE Diff: 2 AACSB: Information Technology Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Concept 104) Organizations can lock in customers by making it difficult or expensive for them to move to another product. Answer: TRUE Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Concept 105) The competitive strategy of locking in customers by making it difficult for them to move to another product is called establishing high switching costs. Answer: TRUE Diff: 1 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Concept 106) Briefly explain product implementation in competitive strategies. Answer: Organizations gain a competitive advantage by creating new products or services, by enhancing existing products or services, and by differentiating their products and services from those of their competitors. Information systems create competitive advantages either as part of a product or by providing support to a product. Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Concept 31 Copyright © 2020 Pearson Education, Inc.


107) Briefly explain process implementation in competitive strategies. Answer: Organizations can use various process implementation competitive strategies to gain competitive advantage. Organizations can lock in customers by making it difficult or expensive for customers to switch to another product. This strategy is sometimes called establishing high switching costs. Organizations can lock in suppliers by making it difficult to switch to another organization, or, stated positively, by making it easy to connect to and work with the organization. Competitive advantage can also be gained by creating entry barriers that make it difficult and expensive for new competition to enter the market. Another means to gain competitive advantage is to establish alliances with other organizations. Finally, organizations can gain competitive advantage by reducing costs. Diff: 3 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.7: How do information systems provide competitive advantages? Classification: Concept 108) Which of the following is most likely to change in the next ten years? A) model of business strategy B) competitive advantage mechanism C) relationship between competitive advantage and information systems D) pace of integration of new technology E) principles of competitive advantage Answer: D Diff: 1 AACSB: Information Technology Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.8: 2029? Classification: Concept 109) What kind of technological changes can be expected in the next ten years? Answer: In the next 10 years, business models, strategies, and competitive advantages are unlikely to change. Their relationships to business processes and IS are also unlikely to change. They may evolve and new models may rise to the surface, but those new models will likely be extensions of existing models within existing paradigms. What is likely to change, however, is pace. The speed of business is continuing to accelerate because of faster Internet speeds, new networked devices, and improved hardware. The Web and other social sites (e.g., Twitter, Facebook, etc.) enable the rapid spread of new ideas and innovations. They also require businesses to constantly be on alert for changes that may affect their strategy in the near future. Diff: 3 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.8: 2029? Classification: Concept

32 Copyright © 2020 Pearson Education, Inc.


110) Give an example of a technology that is likely to have a major effect on competitive strategies in the years to come. Answer: Augmented reality (AR) and virtual reality devices (VR) are just now being released to consumers. Drones are currently used by hobbyists and some small companies, but large-scale commercial use is still in the experimental stage. Self-driving cars are in the late development to early adoption phases and are getting a lot of attention from manufacturers and consumers. By 2029, new 3D applications, games, and user interfaces will be developed. Consequently, companies may need to redesign their business processes. Drones and self-driving cars will see widespread use and have a major effect on competitive strategies. For many products, transportation is a major cost. Entire value chains will be disrupted as transportation and delivery costs plummet. Robotics will likely be the next big area of technological expansion. Diff: 2 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.8: 2029? Classification: Concept 111) What changes will the pace of change bring about in the future? Answer: We can reasonably assume that the pace of change and the pace at which new technology is integrated will be fast and increasing, possibly accelerating, in the next 10 years. We need to view this increased pace as rapidly creating opportunities in which you can excel. You know it's coming. You know that, if not self-driving vehicles, then some other new technology-based product that is being constructed in someone's garage today will change the competitive landscape for the company for which you will work. Diff: 3 AACSB: Analytical Thinking Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.8: 2029? Classification: Concept 112) How might robotics be used in the future and why would companies want to use robots? Answer: Robotics will likely be the next big area of technological expansion. Even now, companies are introducing robotics into areas outside of manufacturing. The strategic implications of a robotic workforce cannot be understated. Robots don't require health care, time off, vacations, breaks, sick days, or workman's compensation. They don't join unions, get mad, sue their employer, harass coworkers, or drink on the job. They also work 24 hours a day without a paycheck! Combine that with a great AI like IBM's Watson, and you've got an entirely different workforce. By 2029 we may understand "labor" in an entirely different way. Diff: 3 AACSB: Information Technology Course LO: Explain how IS can be used to gain and sustain competitive advantage LO: 2.8: 2029? Classification: Concept

33 Copyright © 2020 Pearson Education, Inc.


Using MIS, 11e (Kroenke) Chapter 3 Business Intelligence Systems 1) ________ is defined as information containing patterns, relationships, and trends of various forms of data. A) Process mining B) Business process management C) Business intelligence D) Spatial intelligence E) Pattern recognition Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.1: How do organizations use business intelligence (BI) systems? Classification: Concept 2) Which of the following statements is TRUE of source data for a business intelligence (BI) system? A) It refers to the organization's metadata. B) It refers to data that the organization purchases from data vendors. C) It refers to the detailed level of data. D) It refers to the hierarchical arrangement of criteria that predict a classification or a value. E) It refers to the relative strength of data's predictive capabilities. Answer: B Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.1: How do organizations use business intelligence (BI) systems? Classification: Concept 3) ________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. A) Data entry B) Data acquisition C) Data mining D) Data encryption E) Data scrubbing Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.1: How do organizations use business intelligence (BI) systems? Classification: Concept

1 Copyright © 2020 Pearson Education, Inc .


4) Which of the following is a fundamental category of business intelligence (BI) analysis? A) automation B) encapsulation C) data hiding D) data mining E) cataloging Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.1: How do organizations use business intelligence (BI) systems? Classification: Concept 5) ________ delivers business intelligence to users without any request from the users. A) Push publishing B) Pull publishing C) Desktop publishing D) Accessible publishing E) Pulse publishing Answer: A Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.1: How do organizations use business intelligence (BI) systems? Classification: Concept 6) ________ requires the user to request business intelligence (BI) results. A) Push publishing B) Pull publishing C) Desktop publishing D) Accessible publishing E) Pulse publishing Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.1: How do organizations use business intelligence (BI) systems? Classification: Concept 7) Business intelligence (BI) systems have five standard components called hardware, software, data, procedures and people. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.1: How do organizations use business intelligence (BI) systems? Classification: Concept 2 Copyright © 2020 Pearson Education, Inc .


8) The three primary activities in the business intelligence (BI) process are to acquire data, perform analysis, and publish results. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.1: How do organizations use business intelligence (BI) systems? Classification: Concept 9) Push publishing can deliver results according to a schedule or as a result of an event or particular data condition. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.1: How do organizations use business intelligence (BI) systems? Classification: Concept 10) Define business intelligence (BI) and BI systems. Answer: Business intelligence (BI) systems are information systems that process operational, social, and other data to identify patterns, relationships, and trends for use by business professionals and other knowledge workers. These patterns, relationships, trends, and predictions are referred to as business intelligence. As information systems, BI systems have the five standard components: hardware, software, data, procedures, and people. The software component of a BI system is called a BI application. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.1: How do organizations use business intelligence (BI) systems? Classification: Concept

3 Copyright © 2020 Pearson Education, Inc .


11) Name and describe the three primary activities in the business intelligence (BI) process. Answer: The three primary activities in the BI process are: acquire data, perform analysis, and publish results. Data acquisition is the process of obtaining, cleaning, organizing, relating, and cataloging source data. BI analysis is the process of creating business intelligence. The four fundamental categories of BI analysis are reporting, data mining, BigData, and knowledge management. Publish results is the process of delivering business intelligence to the knowledge workers who need it. Push publishing delivers business intelligence to users without any request from the users; the BI results are delivered according to a schedule or as a result of an event or particular data condition. Pull publishing requires the user to request BI results. Publishing media include print as well as online content delivered via Web servers, specialized Web servers known as report servers, and BI results that are sent via automation to other programs. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.1: How do organizations use business intelligence (BI) systems? Classification: Concept 12) In large organizations, a group of people manage and run a(n) ________, which is a facility for managing an organization's BI data. A) OLAP cube B) neural network C) data warehouse D) Web server E) information tank Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.2: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 13) ________ refers to the source, format, assumptions and constraints, and other facts about the data. A) Clickstream data B) Dimensional data C) Outsourced data D) Metadata E) Attributed data Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.2: How do organizations use data warehouses and data marts to acquire data? Classification: Concept

4 Copyright © 2020 Pearson Education, Inc .


14) Problematic operational data is termed as ________. A) metadata B) rough data C) dirty data D) granular data E) septic data Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.2: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 15) ________ is a term that refers to the level of detail represented by the data. A) Granularity B) Intricacy C) Interoperability D) Complexity E) Identifiable Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.2: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 16) What is a good solution to assist an organization when there is a need to reduce data? A) Averaging the columns B) Statistical sampling C) Clean the data D) Integrate the data E) Use a different source Answer: B Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.2: How do organizations use data warehouses and data marts to acquire data? Classification: Concept

5 Copyright © 2020 Pearson Education, Inc .


17) All of the following is considered metadata except ________. A) the source of the data B) the format of the data C) the constraints on the data D) the assumptions about the data E) the granularity of the data Answer: E Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.2: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 18) Capturing customers' clicking behavior is referred to as ________. A) Clickstream data B) Dimensional data C) Outsourced data D) Metadata E) Attributed data Answer: A Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.2: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 19) Which of the following phenomena states that the more attributes there are, the easier it is to build a model that fits the sample data? A) attribute paradox B) curse of dimensionality C) uncertainty principle D) economies of scale E) Murphy's law Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.2: How do organizations use data warehouses and data marts to acquire data? Classification: Concept

6 Copyright © 2020 Pearson Education, Inc .


20) A ________ takes data from the data manufacturers, cleans and processes the data, and locates the data on the shelves. A) data link layer B) data mine C) data warehouse D) data model E) data bus Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.2: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 21) A data ________ is a data collection, smaller than the data warehouse that addresses the needs of a particular department or functional area of the business. A) mart B) mine C) cube D) model E) conduit Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.2: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 22) Which of the following statements is TRUE about data marts? A) A data mart is like a distributor in a supply chain, while a data warehouse can be compared to a retail store. B) Data mart users possess the data management expertise that data warehouse employees have. C) Data marts address the needs of a particular department or functional area of a business. D) Data marts are larger than data warehouses. E) Data marts contain only metadata for data warehouses. Answer: C Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.2: How do organizations use data warehouses and data marts to acquire data? Classification: Concept

7 Copyright © 2020 Pearson Education, Inc .


23) Operational data is structured for fast and reliable transaction processing. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.2: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 24) Data warehouses may include data that is purchased from outside sources. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.2: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 25) Granularity is a term that refers to the level of detail represented by the data. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.2: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 26) It is better to have data with too coarse a granularity than too fine. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.2: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 27) Data mart is another term used for a data warehouse. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.2: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 28) A data mart is larger than a data warehouse. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.2: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 8 Copyright © 2020 Pearson Education, Inc .


29) Describe the functions of data warehouses and the need for them. Answer: Operational data is structured for fast and reliable transaction processing. It is seldom structured in a way that readily supports BI analysis. Finally, BI analyses can require considerable processing; placing BI applications on operational servers can dramatically reduce system performance. Hence, most organizations extract operational data for BI processing. For small organizations, the extraction may be as simple as an Access database. The larger organizations typically create and staff a group of people who manage and run a data warehouse, which is a facility for managing an organization's BI data. The functions of a data warehouse are to: • Obtain data • Cleanse data • Organize and relate data • Catalog data Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.2: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 30) What are the common problems with using operational data? Answer: The problems associated with operational data are: • Problematic (dirty) data • Missing values • Inconsistent data • Nonintegrated data • Wrong granularity (too fine; not fine enough) • Too much data (too many attributes; too many data points) Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.2: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 31) Describe the features of a data mart. Answer: A data mart is a data collection, smaller than the data warehouse that addresses the needs of a particular department or functional area of the business. If the data warehouse is the distributor in a supply chain, then a data mart is like a retail store in a supply chain. Users in the data mart obtain data that pertain to a particular business function from the data warehouse. Such users do not have the data management expertise that data warehouse employees have, but they are knowledgeable analysts for a given business function. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.2: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 9 Copyright © 2020 Pearson Education, Inc .


32) ________ is a BI application that inputs data from one or more sources and applies reporting operations to that data to produce business intelligence. A) An OLAP application B) A reporting application C) A NoSQL application D) A trans enterprise application E) A classful application Answer: B Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 33) ________ is data in the form of rows and columns? A) Coalescing B) Filtered C) Analysis D) Structured data E) A server log Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 34) ________ analysis is a way of analyzing and ranking customers according to their purchasing patterns. A) Regression B) CRM C) Market-basket D) RFM E) Cluster analysis Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept

10 Copyright © 2020 Pearson Education, Inc .


35) RFM analysis is used to analyze and rank customers according to their ________. A) purchasing patterns B) propensity to respond to marketing stimulus C) socioeconomic status D) motivation and needs E) receptivity to promotions Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 36) U.S. Steel Corp. is a well-known steel manufacturing company. SAMCROW, one of the customers of U.S. Steel Corp. holds an RFM score of 111. Which of the following characteristics relates SAMCROW with its RFM score? A) SAMCROW has ordered recently and orders frequently, but it orders the least expensive goods. B) SAMCROW has not ordered anything for a while, but when it did order in the past, it ordered frequently, and its orders were of the highest monetary value. C) SAMCROW has not ordered anything for a while and it did not order frequently, but when it did order, it bought the least expensive items. D) SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods. E) SAMCROW has ordered recently, but orders infrequently, and it orders the most expensive goods. Answer: C Diff: 3 AACSB: Reflective Thinking Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Application 37) Achilles Gear has four major retail customers. Based on the following RFM scores of these customers, the sales team at Achilles' should attempt to up-sell more expensive sporting goods to ________. A) Five Star Stores with an RFM score of 214 B) Goalkeeper with an RFM score of 551 C) Pelican Stores with an RFM score of 113 D) Cable Sports Inc. with an RFM score of 545 E) WindyRiver Sports with an RFM score of 225 Answer: B Diff: 2 AACSB: Reflective Thinking Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Application 11 Copyright © 2020 Pearson Education, Inc .


38) Ajax Inc. is one of the customers of a well-known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past it ordered frequently, and its orders were of the highest monetary value. Under the given circumstances, Ajax is most likely to have an RFM score of ________. A) 155 B) 511 C) 555 D) 151 E) 515 Answer: A Diff: 3 AACSB: Analytical Thinking Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Application 39) Opezim Plastics has been supplying raw materials to JM Toys for five years. JM Toys has an RFM score of 121. With reference to the score, how should the sales team at Opezim respond to JM Toys? A) The sales team should contact JM Toys immediately. B) The sales team should let go of JM Toys, for the loss will be minimal. C) The sales team should attempt to up-sell more expensive goods to JM Toys. D) The sales team should spend more time with JM Toys. E) The sales team should attempt to sell directly to the CEO. Answer: B Diff: 2 AACSB: Reflective Thinking Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Application 40) OLAP stands for ________. A) online analytical processing B) object-based lead analysis procedure C) object-oriented analytical protocol D) organizational lead analysis process E) optimal linear analytical processing Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept

12 Copyright © 2020 Pearson Education, Inc .


41) The viewer of an OLAP report can change its format. Which term implies this capability? A) processing B) analytical C) dimension D) online E) alteration Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 42) The remarkable characteristic of OLAP reports is that they are ________, as they are online and the viewer of the report can change their format. A) accurate B) informal C) specific D) dynamic E) precise Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 43) An OLAP report has measures and dimensions. Which of the following is an example of a dimension? A) total sales B) average sales C) sales region D) average cost E) average net sales Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept

13 Copyright © 2020 Pearson Education, Inc .


44) Which of the following accurately defines a dimension in an OLAP report? A) It is a characteristic of a measure. B) It is an item that is processed in the OLAP report. C) It is a data item of interest. D) It is referred to a decision tree. E) It is a branch in a decision tree. Answer: A Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 45) Which of the following is an example of a measure in an OLAP report? A) customer type B) purchase date C) sales region D) average cost E) customer location Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 46) An ________ and an OLAP report are the same thing. A) OLAP measure B) OLAP cube C) OLAP dimension D) OLAP array E) OLAP permutation Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept

14 Copyright © 2020 Pearson Education, Inc .


47) Which of the following observations about RFM and OLAP reports is TRUE? A) RFM reports are more generic than OLAP reports. B) OLAP reports are more dynamic than RFM reports. C) RFM reports have measures and dimensions. D) RFM reports can drill down into the data to a greater extent than OLAP reports. E) RFM reports are more easily manipulated than OLAP reports. Answer: B Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 48) ________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction. A) Data optimization B) Database normalization C) Data mining D) Data warehousing E) Data clustering Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 49) Which of the following statements is TRUE about unsupervised data mining? A) Analysts do not create a model or hypothesis before running the analysis. B) Neural networks are a popular unsupervised data mining application. C) Unsupervised data mining requires tools such as regression analysis. D) Data miners develop a model prior to the analysis and apply statistical techniques to data. E) Hypotheses must be made before running the analysis. Answer: A Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept

15 Copyright © 2020 Pearson Education, Inc .


50) In ________, statistical techniques can identify groups of entities that have similar characteristics. A) regression analysis B) cluster analysis C) supervised data mining D) neural networks E) metadata matching Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 51) Samuel, a researcher, deduces that single women between the ages of 25 and 30, who usually live in the suburbs and make thrifty purchases, prefer a particular brand of washing machines. In this case, Samuel uses ________ to understand customer behavior. A) supervised data mining B) cluster analysis C) neural networks D) market-basket analysis E) metadata matching Answer: B Diff: 2 AACSB: Reflective Thinking Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Application 52) In ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. A) cluster analysis B) unsupervised data mining C) supervised data mining D) click streaming E) metadata matching Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept

16 Copyright © 2020 Pearson Education, Inc .


53) Which of the following is an example of a supervised data mining technique? A) cluster analysis B) market-basket analysis C) regression analysis D) click streaming E) metadata matching Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 54) Which of the following is a characteristic of BigData? A) It is usually around 100 gigabytes in size. B) It is generated rapidly. C) It is processed using traditional techniques. D) It is unstructured. E) It is typically only text-based. Answer: B Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 55) ________ is a technique for harnessing the power of thousands of computers working in parallel. A) RFM analysis B) MapReduce C) Granularity D) Reposition E) Big data looping Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept

17 Copyright © 2020 Pearson Education, Inc .


56) ________ includes a query language titled Pig. A) MapReduce B) Hadoop C) RFM Analysis D) Online analytical processing (OLAP) E) Korn shell Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 57) OLAP provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 58) An OLAP cube and an OLAP report are the same thing. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 59) An advantage of OLAP reports is their ability to let users drill down into the data. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 60) A retailer can use purchasing patterns to determine the likelihood of someone being pregnant. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 18 Copyright © 2020 Pearson Education, Inc .


61) Data mining is the application of statistical techniques to find patterns and relationships among data for classification and prediction. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 62) In an unsupervised data mining technique, analysts do not create a model or hypothesis before running the analysis. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 63) Cluster analysis is used to identify groups of entities that have similar characteristics. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 64) Regression analysis measures the effect of a set of variables on another variable. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 65) Neural networks are popular unsupervised data mining techniques used to predict values and make classifications. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept

19 Copyright © 2020 Pearson Education, Inc .


66) Hadoop is an open-source program supported by the Apache Foundation that implements MapReduce on potentially thousands of computers. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 67) What is a reporting application? Name five basic reporting operations. Answer: A reporting application is a BI application that inputs data from one or more sources and applies reporting operations to that data to produce business intelligence. Reporting applications produce business intelligence using five basic operations: • Sorting • Filtering • Grouping • Calculating • Formatting Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 68) Explain the concept of RFM analysis. Answer: RFM analysis, a technique readily implemented with basic reporting operations, is used to analyze and rank customers according to their purchasing patterns. RFM considers how recently (R) a customer has ordered, how frequently (F) a customer ordered, and how much money (M) the customer has spent. To produce an RFM score, the RFM reporting tool first sorts customer purchase records by the date of their most recent (R) purchase. In a common form of this analysis, the tool then divides the customers into five groups and gives customers in each group a score of 5 to 1. The 20 percent of the customers having the most recent orders are given an R score of 5, the 20 percent of the customers having the next most recent orders are given an R score of 4, and so forth, down to the last 20 percent, who are given an R score of 1. The tool then re-sorts the customers on the basis of how frequently they order. The 20 percent of the customers who order most frequently are given an F score of 5, the next 20 percent of most frequently ordering customers are given a score of 4, and so forth, down to the least frequently ordering customers, who are given an F score of 1. Finally, the tool sorts the customers again according to the amount spent on their orders. The 20 percent who have ordered the most expensive items are given an M score of 5, the next 20 percent are given an M score of 4, and so forth, down to the 20 percent who spend the least, who are given an M score of 1. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 20 Copyright © 2020 Pearson Education, Inc .


69) What is OLAP? Explain its features. Answer: Online analytical processing (OLAP) is an important reporting application. It is more generic than RFM. OLAP provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. The remarkable characteristic of OLAP reports is that they are dynamic. The viewer of the report can change the report's format, hence the term online. An OLAP report has measures and dimensions. A measure is the data item of interest. It is the item that is to be summed or averaged or otherwise processed in the OLAP report. Total sales, average sales, and average cost are examples of measures. A dimension is a characteristic of a measure. Purchase date, customer type, customer location, and sales region are all examples of dimensions. With an OLAP report, it is possible to drill down into the data. This term means to further divide the data into more detail. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 70) Differentiate between unsupervised and supervised data mining. Answer: Data mining techniques fall into two broad categories: unsupervised and supervised. With unsupervised data mining, analysts do not create a model or hypothesis before running the analysis. Instead, they apply a data mining application to the data and observe the results. With this method, analysts create hypotheses after the analysis, in order to explain the patterns found. With supervised data mining, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept 71) What are MapReduce and Hadoop? Answer: MapReduce is a technique for harnessing the power of thousands of computers working in parallel. The basic idea is that the BigData collection is broken into pieces, and hundreds or thousands of independent processors search these pieces for something of interest. Hadoop is an open-source program supported by the Apache Foundation that implements MapReduce on potentially thousands of computers. Hadoop could drive the process of finding and counting the Google search terms, but Google uses its own proprietary version of MapReduce to do so, instead. Hadoop includes a query language titled Pig. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.3: What are three techniques for processing BI data? Classification: Concept

21 Copyright © 2020 Pearson Education, Inc .


72) A sales report that is current at the time the user accessed it on a Web server is an example of a(n) ________. A) static report B) dynamic report C) expert system D) hybrid market report E) temporal report Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.4: What are the alternatives for publishing BI? Classification: Concept 73) BI servers use ________ to determine what results to send to which users and on which schedule. A) expert systems B) metadata C) RSS feeds D) neural networks E) IP logs Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.4: What are the alternatives for publishing BI? Classification: Concept 74) ________ is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it. A) Intellectual property protection B) Knowledge management C) Business process reengineering D) Repository management E) Industrial information exchange Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.4: What are the alternatives for publishing BI? Classification: Concept

22 Copyright © 2020 Pearson Education, Inc .


75) Knowledge management (KM) benefits organizations because it ________. A) allows distributors to work within the company premises B) allows suppliers to work according to the organizational policies C) enables employees to solve problems and rectify mistakes later D) improves process quality and increases team strength E) improves data integrity, transmission, and value Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.4: What are the alternatives for publishing BI? Classification: Concept 76) ________ are information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge. A) Decision Support Systems (DSS) B) Online Analytical Processing (OLAP) systems C) Content Management Systems (CMS) D) Data Transfer Protocols (DTP) E) Document Delivery System (DDS) Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.4: What are the alternatives for publishing BI? Classification: Concept 77) For BI to be actionable, it must be published to the right user at the right time. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.4: What are the alternatives for publishing BI? Classification: Concept 78) Dynamic reports are business intelligence (BI) documents that are updated at the time they are requested. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.4: What are the alternatives for publishing BI? Classification: Concept

23 Copyright © 2020 Pearson Education, Inc .


79) A business intelligence (BI) server extends alert/RSS functionality to support user subscriptions. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.4: What are the alternatives for publishing BI? Classification: Concept 80) Knowledge management was done only after the advent of social media. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.4: What are the alternatives for publishing BI? Classification: Concept 81) Explain the difference between static and dynamic reports. Answer: Static reports are business intelligence (BI) documents that are fixed at the time of creation and do not change. A printed sales analysis is an example of a static report. In the BI context, most static reports are published as PDF documents. Dynamic reports are BI documents that are updated at the time they are requested. A sales report that is current at the time the user accessed it on a Web server is a dynamic report. In almost all cases, publishing a dynamic report requires the BI application to access a database or other data source at the time the report is delivered to the user. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.4: What are the alternatives for publishing BI? Classification: Concept 82) Describe the management functions of business intelligence (BI) servers. Answer: Business intelligence servers provide two major functions: management and delivery. The management function maintains metadata about the authorized allocation of BI results to users. The BI server tracks what results are available, what users are authorized to view those results, and the schedule upon which the results are provided to the authorized users. It adjusts allocations as available results change and users come and go. All management data needed by any of the BI servers is stored in metadata. The amount and complexity of such data depends, of course, on the functionality of the BI server. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.4: What are the alternatives for publishing BI? Classification: Concept

24 Copyright © 2020 Pearson Education, Inc .


83) Explain knowledge management and its primary benefits. Answer: Knowledge management (KM) is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need that capital. KM benefits organizations in two fundamental ways: • Improve process quality • Increase team strength Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.4: What are the alternatives for publishing BI? Classification: Concept 84) A(n) ________ is a computing system modelled after the human brain that is used to predict values and make classifications. A) data warehouse B) neural network C) expert system D) online analytical processing (OLAP) cube E) artificial intelligence Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.5: Why is artificial intelligence important? Classification: Concept 85) ________ is the ability of a machine to simulate human abilities such as vision, communication, recognition, learning, and decision making in order to achieve a goal. A) Artificial intelligence (AI) B) Computer programming C) Knowledge management D) Automation E) Thinking Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.5: Why is artificial intelligence important? Classification: Concept

25 Copyright © 2020 Pearson Education, Inc .


86) ________ is the process of making systems operate without human intervention. A) Artificial intelligence (AI) B) Computer programming C) Knowledge management D) Automation E) Belief Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.5: Why is artificial intelligence important? Classification: Concept 87) Because artificial intelligence (AI) started developing a bad reputation, IBM titled their AI research ________. A) automation B) advances in computing C) cognitive computing D) the brain E) Incognito Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.5: Why is artificial intelligence important? Classification: Concept 88) What is a reason why artificial intelligence (AI) has advanced in recent years. A) The cost to implement AI has decreased. B) There are more connected devices. C) Consumers are demanding more AI. D) Cloud computing is on the decline and AI will take the cloudspace. E) The Internet demanded it. Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.5: Why is artificial intelligence important? Classification: Concept

26 Copyright © 2020 Pearson Education, Inc .


89) Artificial intelligence (AI) requires a large amount of ________ in order to learn, represent knowledge, and process natural language. A) time B) consumers C) developers D) data E) permission Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.5: Why is artificial intelligence important? Classification: Concept 90) What is an example of an Amazon practical artificial intelligence (AI) application? A) Echo B) DeepText C) Cortana D) Siri E) Homepod Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.5: Why is artificial intelligence important? Classification: Concept 91) What is an example of a Google practical artificial intelligence (AI) application? A) AWS Deep Learning B) OpenFrameworks C) Content Moderator D) Translator Text E) Bing Answer: B Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.5: Why is artificial intelligence important? Classification: Concept

27 Copyright © 2020 Pearson Education, Inc .


92) Artificial intelligence (AI) research has been driven by the demand for applications that ________ such as ways to filter offense content. A) use theories B) are useful for just one task C) solve practical problems D) are cheap E) cater to everyone Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.5: Why is artificial intelligence important? Classification: Concept 93) Artificial intelligence (AI) research can be done by more people at a lower cost because of ________. A) new AI techniques B) the availability of large data sets C) device connectivity D) cloud computing E) faster PCs Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.5: Why is artificial intelligence important? Classification: Concept 94) Only desktops can be connected smart devices. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.5: Why is artificial intelligence important? Classification: Concept 95) Deep learning has greatly increased the accuracy and practical usefulness of artificial intelligence. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.5: Why is artificial intelligence important? Classification: Concept

28 Copyright © 2020 Pearson Education, Inc .


96) Artificial intelligence research began in the 1990s. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.5: Why is artificial intelligence important? Classification: Concept 97) List at least four out of the six forces driving advances in artificial innovation developments. Answer: 1) Increases in computing power. 2) Availability of large data sets for training. 3) Cloud scalability and applications. 4) Increased device connectivity. 5) New AI techniques. 6) practical AI applications. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.5: Why is artificial intelligence important? Classification: Concept 98) Describe deep learning. Answer: A neural network is a computing system modelled after the human brain that is used to predict values and make classifications. This multilayered neural network technique was applied to learning tasks and is now commonly known as deep learning Diff: 3 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.5: Why is artificial intelligence important? Classification: Concept 99) All of the following are benefits of artificial intelligence except ________. A) increase costs B) increase productivity C) create new services D) find unique solutions for age-old problems E) enable smart devices with new capabilities Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.6: How will artificial intelligence and automation affect organizations? Classification: Concept

29 Copyright © 2020 Pearson Education, Inc .


100) All of the following are potential benefits for using a robotic fast-food worker except ________. A) it doesn't take breaks B) it doesn't' sue you for lost wages C) it can replace three full-time cooks D) it is cleaner than a human E) it may give away food Answer: E Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.6: How will artificial intelligence and automation affect organizations? Classification: Concept 101) Which type of employee fraud is the most frequent? A) Skimming B) Non-cash C) Billing D) Payroll E) Expense reimbursement Answer: C Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.6: How will artificial intelligence and automation affect organizations? Classification: Concept 102) Which type of employee fraud has the highest median loss? A) Billing B) Check tampering C) Financial statement fraud D) Payroll E) Cash on hand Answer: C Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.6: How will artificial intelligence and automation affect organizations? Classification: Concept

30 Copyright © 2020 Pearson Education, Inc .


103) Jobs requiring ________ are prime candidates for automation. A) higher level decision making tasks B) executive level decision making tasks C) hand calculations D) routine mental tasks E) split shifts Answer: D Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.6: How will artificial intelligence and automation affect organizations? Classification: Concept 104) Because of artificial intelligence, jobs may go away but there will be new types of jobs for humans as long as companies and individuals participate in ________. A) project management B) the dot-com boom C) startups D) reorganization process E) retooling Answer: E Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.6: How will artificial intelligence and automation affect organizations? Classification: Concept 105) What is one way humans can survive the workplace shift caused by artificial intelligence? A) Stop experimenting. B) Discourage creativity. C) Create personal goals. D) Develop skills machines cannot do. E) Fight back. Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.6: How will artificial intelligence and automation affect organizations? Classification: Concept

31 Copyright © 2020 Pearson Education, Inc .


106) AI-enabled machines need humans because they lack ________. A) instincts B) oil C) the ability to think like humans D) the ability to perform routine tasks E) sensitivity Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.6: How will artificial intelligence and automation affect organizations? Classification: Concept 107) Business leaders need to understand the broader implications of using automated machines. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.6: How will artificial intelligence and automation affect organizations? Classification: Concept 108) A robotic fast-food worker is far-fetched and something that may occur far in the future. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.6: How will artificial intelligence and automation affect organizations? Classification: Concept 109) In the future, jobs will be given to robots with IQs higher than 90% of the U.S. population. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.6: How will artificial intelligence and automation affect organizations? Classification: Concept 110) In the future, robots will do jobs most people would prefer go away. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.6: How will artificial intelligence and automation affect organizations? Classification: Concept

32 Copyright © 2020 Pearson Education, Inc .


111) List at least five productivity gains from using automation. Answer: The productivity gains from automation include: can work 24 hours, 365 days; immediately trained, no "onboarding"; no breaks during work hours; no impaired workers; no time-wasting activities; no accidents or injuries; no arguments with other employees or managers; no scheduling issues; all holiday shifts covered; and more accurate, precise, and consistent. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.6: How will artificial intelligence and automation affect organizations? Classification: Concept 112) Describe how humans can survive the workplace shift caused by AI. Answer: First, human workers need to develop skills that machines can't do. Second, lots of human workers will be needed to take care of these new machines. Even the best AIs need training. AI-enabled machines will also need humans for the foreseeable future because they lack something humans have–instincts. Machines need humans to survive. They also need humans to help them to improve. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.6: How will artificial intelligence and automation affect organizations? Classification: Concept 113) When a system is considered ________ it can complete all of the same tasks a human can. A) complete B) super intelligent C) user friendly D) strong AI E) singular Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.7: What is the goal of AI? Classification: Concept

33 Copyright © 2020 Pearson Education, Inc .


114) ________ is focused on completing a single specific task. A) Weak AI B) Super intelligent C) A machine D) Strong AI E) Singular Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.7: What is the goal of AI? Classification: Concept 115) In order for a computer to pass the ________, a human should have a conversation with it and not be able to tell if it was a machine or a human. A) super test B) language test C) smart test D) turing test E) Intelligence Test Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.7: What is the goal of AI? Classification: Concept 116) Organizations see artificial intelligence (AI) as a(n) ________ of new technologies. A) precursor B) enabler C) twin D) representation E) goal Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.7: What is the goal of AI? Classification: Concept

34 Copyright © 2020 Pearson Education, Inc .


117) What may happen if an organization chooses to say no to artificial intelligence (AI)? A) The organization will shut down. B) It will be more expensive to do business. C) The organization may lose a competitive advantage. D) Workers may quit. E) The government may force an organization to adopt AI. Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.7: What is the goal of AI? Classification: Concept 118) Artificial intelligence is the ability of a machine to simulate all human abilities. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.7: What is the goal of AI? Classification: Concept 119) Currently we have strong artificial intelligence (AI). Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.7: What is the goal of AI? Classification: Concept 120) Describe the evolution of artificial intelligence abilities. Answer: Artificial intelligence begins with weak AI. Weak AI is focused on a single task. Next is strong AI. Strong AI is equal to human intelligence for any task. In the future, there will be superintelligence. Superintelligence is intelligence more advanced than human intelligence. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.7: What is the goal of AI? Classification: Concept

35 Copyright © 2020 Pearson Education, Inc .


121) Manipulations is a major AI research area under ________. A) robotics B) natural language processing C) planning D) knowledge representation E) machine learning Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.8: How does AI work? Classification: Concept 122) ________ is the extraction of knowledge from data based on algorithms created from training data. A) Machine learning B) Historical analysis C) Simulation D) Computer analysis E) Processing data Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.8: How does AI work? Classification: Concept 123) How do machines learn? A) By humans teaching them things B) Through experience C) By listening to the surroundings D) With repetition of the same facts E) By listening for a wake word Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.8: How does AI work? Classification: Concept

36 Copyright © 2020 Pearson Education, Inc .


124) A set of procedures used to solve mathematical problems is called ________. A) a flowchart B) a metadata C) an algorithm D) a set of procedures E) a process Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.8: How does AI work? Classification: Concept 125) An algorithm that predicts the probability of a certain outcome based on prior occurrences of related events is called ________. A) Myers Briggs B) an algorithm C) LIDAR D) Naïve Bayes Classifier E) a backend system Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.8: How does AI work? Classification: Concept 126) IBM's Watson uses ________ or the ability of a computer system to understand spoken human language. A) common sense B) spatial analysis C) context clues D) extreme questioning E) natural language processing (NLP) Answer: E Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.8: How does AI work? Classification: Concept

37 Copyright © 2020 Pearson Education, Inc .


127) All of the following are sources Watson's acquires content except ________. A) from questions B) literature C) databases D) dictionaries E) reports Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.8: How does AI work? Classification: Concept 128) A corpus of knowledge is a large set of related data and texts. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.8: How does AI work? Classification: Concept 129) An organization can use machine learning to detect spam. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.8: How does AI work? Classification: Concept 130) As a business professional, you need to become an expert in artificial intelligence (AI) to use it. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.8: How does AI work? Classification: Concept

38 Copyright © 2020 Pearson Education, Inc .


131) List at least three examples of machine learning. Answer: Answers may vary. Machine learning can be used in a wide variety of tasks including college admissions decisions, credit approvals, fraud detection, search result optimization, and dating site matching. It can use other algorithms (like decision trees, linear regression, and logistic regression) depending on the type of data being analyzed. It can also use neural networks to predict values and make classifications such as "good prospect" or "poor prospect" based on a complicated set of possibly nonlinear equations. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.8: How does AI work? Classification: Concept 132) Briefly describe how IBM's Watson works. Answer: First, Watson acquires content from sources like dictionaries, encyclopedias, literature, reports and databases. It extracts valuable pieces of data from structured and semi-structured data sources and adds them to a corpus of knowledge. Next Watson generates hypothesis about what the might be the right answer to the question looking for evidence that supports each answer. Final Watson, merges all of the scored candidates, identifies the best possible answer, and estimates the probability that the answer is correct. Diff: 3 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.8: How does AI work? Classification: Concept 133) ________ is a concept that computer systems will become sophisticated enough that they can adapt and create their own software and hence adapt their behavior without human assistance. A) Expert systems B) The Singularity C) Knowledge management D) Business intelligence systems E) Moore's Law Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.9: 2029? Classification: Concept

39 Copyright © 2020 Pearson Education, Inc .


134) By 2029, data storage, processing power, and network speeds will have increased exponentially. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 3.9: 2029? Classification: Concept

40 Copyright © 2020 Pearson Education, Inc .


Using MIS, 11e (Kroenke) Chapter 4 Hardware, Software, and Mobile Systems 1) The CPU stores the results of computations in ________. A) floppy disks B) main memory C) secondary memory D) network cards E) SSD storage Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept 2) Which of the following is an example of storage hardware in computers? A) plotter B) magnetic disk C) projector D) inkjet printer E) Web camera Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept 3) Which of the following refers to a small, portable storage device that can be used to back up data and transfer it from one computer to another? A) USB flash drive B) projector C) mouse D) barcode scanner E) Bluetooth speaker Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept

1 Copyright © 2020 Pearson Education, Inc.


4) A ________ is also called "the brain" of the computer. A) network card B) motherboard C) thumb drive D) central processing unit E) CMOS Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept 5) A(n)________ is an example of storage hardware in computers. A) overhead projector B) keyboard C) magnetic disk D) barcode scanner E) wireless mouse Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept 6) Main memory is also known as ________. A) cache memory B) random access memory C) read-only memory D) optical memory E) the system bus Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept

2 Copyright © 2020 Pearson Education, Inc.


7) Which of the following devices is an example of a storage hardware device? A) barcode scanner B) central processing unit C) optical disk D) random access memory E) the system bus Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept 8) Which of the following terms refers to a collection of servers? A) server database B) server farm C) firmware D) shareware E) parallel nodes Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept 9) Bits are used for computer data because they ________. A) are represented exclusively as letters of the alphabet B) are easy to represent physically C) represent the orientation of a nonoptical media D) can have more than two values at a time E) have an infinite number of states Answer: B Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept

3 Copyright © 2020 Pearson Education, Inc.


10) Bits are grouped into 8-bit chunks called ________. A) switches B) strings C) bytes D) kilobytes E) nibbles Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept 11) A ________ is equivalent to 1,024 kilobytes. A) gigabyte B) kilobyte C) terabyte D) zettabyte E) megabyte Answer: E Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept 12) 1 PB is equivalent to ________ terabytes. A) 10,240 B) 1,000 C) 1,024 D) 102.4 E) 100,000 Answer: C Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept

4 Copyright © 2020 Pearson Education, Inc.


13) Which of the following is a characteristic of volatile memory? A) Processor heats up during the operation. B) Files are stored permanently. C) Processing of data is very slow. D) Contents are lost when power is off. E) It should be purged at least once a year. Answer: D Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept 14) Which of the following is an example of nonvolatile memory? A) optical disk B) main memory C) cache memory D) static random access memory (SRAM) E) the system bus Answer: A Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept 15) Which of the following memory devices is volatile in nature? A) magnetic disk B) cache memory C) erasable programmable read only memory (EPROM) D) optical disk E) SSD Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept

5 Copyright © 2020 Pearson Education, Inc.


16) A mobile device called a(n) ________ combines the functionality of a smartphone with the larger screen of a tablet. A) big personal computer B) phablet C) iPhone 8 D) e-book reader E) server Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept 17) ________ is considered a tablet. A) iPhone 8 Plus B) Dell Poweredge C) Kindle Fire D) Mac Pro E) Samsung Galaxy Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept 18) Server infrastructure is delivered as a service via the Internet and often referred to as ________. A) computer hardware B) main memory C) secondary memory D) the cloud E) SSD storage Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept

6 Copyright © 2020 Pearson Education, Inc.


19) Which size of main memory is the largest? A) kilobyte B) gigabyte C) exabyte D) terabyte E) petabyte Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept 20) Cache memory is also called "the brain" of a computer. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept 21) Main memory stores the results of computations on the hard drive. Answer: FALSE Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept 22) The main memory of a computer is also called random access memory (RAM). Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept 23) A client is a computer that is designed to support processing from many remote computers and users. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept

7 Copyright © 2020 Pearson Education, Inc.


24) The cache and main memory are nonvolatile, meaning their contents survive when power is off. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept 25) Quad-processor computers have two CPUs. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept 26) Some high-end computers have 16 or more CPUs. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept 27) Describe the various hardware components and provide examples. Answer: Hardware consists of electronic components and related gadgetry that input, process, output, and store data according to instructions encoded in computer programs or software. Processing devices include the central processing unit (CPU), which is also called the brain of the computer. The CPU works in conjunction with main memory. The CPU reads data and instructions from memory, and then stores the results of computations in main memory. Main memory is also called RAM, which stands for random access memory. Storage hardware saves data and programs. Magnetic disk is the most common storage device, although optical disks such as CDs and DVDs are also popular. Thumb drives are small, portable storage devices that can be used to back up data and transfer it from one computer to another. Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept

8 Copyright © 2020 Pearson Education, Inc.


28) Describe the difference between volatile and nonvolatile memory. Answer: The cache and main memory are volatile, meaning their contents are lost when power is off. Magnetic and optical disks are nonvolatile, meaning their contents survive when power is off. If you suddenly lose power, the contents of unsaved memory–say, documents that have been altered–will be lost. Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept 29) Define the terms personal computers, servers, and server farms. Answer: Personal computers (PCs) are classic computing devices that are used by individuals. In the past, PCs were the primary computer used in business. Today, they are gradually being supplanted by tablets and other mobile devices. A server is a computer that is designed to support processing requests from many remote computers and users. A server is essentially a PC on steroids. A server differs from a PC principally because of what it does. A server farm is a collection of, typically, thousands of servers. Server farms are often placed in large truck trailers that hold 5,000 servers or more. Typically, a trailer has two large cables coming out of it; one is for power and the other is for data communications. The operator of the farm backs a trailer into a pre-prepared slab, plugs in the power and communications cables, and runs thousands of servers. Diff: 2 AACSB: Analytical Thinking Course LO: Discuss the ethical and social issues raised by the use of information systems LO: 4.1: What do business professionals need to know about computer hardware? Classification: Concept 30) Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device? A) Internet of things (IoT) B) 3D printing C) self-driving cars D) automated guided vehicles E) visual mapping Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.2: How can new hardware affect competitive strategies? Classification: Concept

9 Copyright © 2020 Pearson Education, Inc.


31) Which of the following is a characteristic of smart devices? A) require microprocessors and new protocols B) have lower bandwidth C) consume less energy D) have less processing power E) lack Internet connectivity Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.2: How can new hardware affect competitive strategies? Classification: Concept 32) ________ is the altering of reality by overlaying digital information on real-world objects. A) Reality B) Augmented reality (AR) C) Mixed reality (MR) D) Virtual reality (VR) E) Sense of presence Answer: B Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.2: How can new hardware affect competitive strategies? Classification: Concept 33) ________ is the combination of the real physical world with interactive virtual images or objects. A) Reality B) Augmented reality (AR) C) Mixed reality (MR) D) Virtual reality (VR) E) Sense of presence Answer: C Diff: 2 AACSB: Reflective Thinking Course LO: Describe the components of an information system (IS) LO: 4.2: How can new hardware affect competitive strategies? Classification: Application

10 Copyright © 2020 Pearson Education, Inc.


34) ________ is a completely computer-generated virtual world with interactive digital objects. A) Reality B) Augmented reality (AR) C) Mixed reality (MR) D) Virtual reality (VR) E) Sense of presence Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.2: How can new hardware affect competitive strategies? Classification: Concept 35) Which of the following statements is TRUE about self-driving cars? A) increased fuel consumption B) expensive and complex C) reduced car insurance cost D) cause more accidents E) will increase the number of DUIs Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.2: How can new hardware affect competitive strategies? Classification: Concept 36) All of the following contributed to making a mobile phone "smart" except ________. A) more processing power B) Internet access C) Wi-Fi connectivity D) bigger screens E) the Internet of Things Answer: D Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.2: How can new hardware affect competitive strategies? Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


37) All of the following are disruptive forces to change business except ________. A) Internet of Things B) digital reality devices C) self-driving cars D) 2D printing E) cryptocurrencies Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.2: How can new hardware affect competitive strategies? Classification: Concept 38) ________ are digital-only currencies. A) Cryptocurrencies B) E-checks C) Debit cards D) E-wallets E) Online payments Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.2: How can new hardware affect competitive strategies? Classification: Concept 39) All of the following are benefits to using cryptocurrencies except ________. A) it is faster and easier to use than traditional payment methods B) it is insured by the Federal Reserve Bank C) there are no taxes D) there is protection from inflation E) it cannot be seized by the government Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.2: How can new hardware affect competitive strategies? Classification: Concept

12 Copyright © 2020 Pearson Education, Inc.


40) ________ is the decentralized public ledgering system used to record cryptocurrency transactions. A) Blockchain B) Fiat currencies C) Satoshi D) Inflation E) Bitcoin Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.2: How can new hardware affect competitive strategies? Classification: Concept 41) Sense of presence is the illusion that a virtual experience is real. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.2: How can new hardware affect competitive strategies? Classification: Concept 42) Nike has used 3D printing to create a cleat plate for a shoe. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.2: How can new hardware affect competitive strategies? Classification: Concept 43) The smallest unit of a bit coin is the satoshi. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.2: How can new hardware affect competitive strategies? Classification: Concept 44) Some governments are launching their own cryptocurrencies. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.2: How can new hardware affect competitive strategies? Classification: Concept

13 Copyright © 2020 Pearson Education, Inc.


45) Explain the term Internet of Things. Answer: The first disruptive force that has the power to change business is the Internet of Things (IoT). This is the idea that objects are becoming connected to the Internet so they can interact with other devices, applications, or services. Everyday objects are being embedded with hardware capable of sensing, processing, and transmitting data. Objects can then connect to a network and share data with any other application, service, or device. Diff: 2 AACSB: Analytical Thinking Course LO: Discuss the ethical and social issues raised by the use of information systems LO: 4.2: How can new hardware affect competitive strategies? Classification: Concept 46) Describe how self-driving cars can threaten and disrupt established businesses. Answer: Self-driving cars have the potential to disrupt well-established industries. Self-driving cars may mean fewer cars on the road. Fewer cars on the road may mean fewer cars sold (transportation), fewer auto loans written (finance), fewer automobile insurance policies underwritten (insurance), and fewer parking lots (real estate). If they didn't have to drive, consumers might take more trips by car than by plane or train (transportation). The production of self-driving cars will mean more jobs for engineers, programmers, and systems designers. There will be more computer hardware, sensors, and cameras in the vehicle. Corporations may not completely see the far-reaching effects of self-driving cars on existing industries. Diff: 2 AACSB: Analytical Thinking Course LO: Discuss the ethical and social issues raised by the use of information systems LO: 4.2: How can new hardware affect competitive strategies? Classification: Concept 47) What is the future of 3D printing? Answer: 3D printing is a disruptive force that has the power to change businesses. 3D printing will not only change the competitive landscape but may change the nature of businesses themselves. Nike, for example, used 3D printing to create the world's first 3D-printed cleat plate for a shoe called the Nike Vapor Laser Talon. 3D printers have the potential to affect a broad array of industries beyond sporting equipment. 3D printers can print in more than just plastics. They can print in metals, ceramics, foods, and biological material too. The technology could also be used across the aerospace, defense, automotive, entertainment, and healthcare industries. Diff: 2 AACSB: Analytical Thinking Course LO: Discuss the ethical and social issues raised by the use of information systems LO: 4.2: How can new hardware affect competitive strategies? Classification: Concept

14 Copyright © 2020 Pearson Education, Inc.


48) What are some risks of cryptocurrencies? Answer: There are risks to cryptocurrencies, too. The value of a cryptocurrency can drop to zero if enough big holders of the currency sell their coins. Bitcoin, for example, derives its value because enough people perceive it as valuable. There is nothing like gold backing its value, and it is not government approved legal tender. It's all perception. That can lead to extreme price volatility. Bitcoin also suffers from the fact that relatively few businesses accept it as payment, and it initially got a bad reputation for being used by organized crime. Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.2: How can new hardware affect competitive strategies? Classification: Concept 49) ________ applications are programs that are written to use a particular operating system. A) Web B) Thin-client C) Native D) Browser E) Enterprise Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.3: What do business professionals need to know about software? Classification: Concept 50) Which of the following is an example of an application program? A) Microsoft Word B) Unix C) Linux D) Windows E) Dell Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.3: What do business professionals need to know about software? Classification: Concept

15 Copyright © 2020 Pearson Education, Inc.


51) Which of the following statements is TRUE about operating systems? A) The server operating system Linux is gradually being replaced by Unix. B) Android is a mobile operating system licensed by Apple. C) Nonmobile client operating systems are used on personal computers. D) iOS is the most popular server operating system. E) Unix is the most popular client operating system. Answer: C Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.3: What do business professionals need to know about software? Classification: Concept 52) Which of the following operating systems was designed by Apple? A) Android B) Unix C) Linux D) Mac OS E) Ubuntu Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.3: What do business professionals need to know about software? Classification: Concept 53) ________ is a version of Unix that was developed by an open source community. A) Symbian OS B) Android C) Linux D) Mac OS E) SPX Answer: C Diff: 2 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.3: What do business professionals need to know about software? Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


54) Linux is an example of a(n) ________. A) open source operating system B) mobile operating system C) user community D) workstation client E) third-party encryption software Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.3: What do business professionals need to know about software? Classification: Concept 55) Which of the following mobile operating systems is licensed by Google? A) Blackberry OS B) Symbian C) Android D) Windows 10 E) PCLinuxOS Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.3: What do business professionals need to know about software? Classification: Concept 56) Virtualization is the process by which ________. A) a single server is used to host the operations of a workstation B) many computers are used to control a server C) one physical computer hosts many different virtual computers within it D) a single operating system is licensed for multiple computers E) a single operating system is shared by multiple users. Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.3: What do business professionals need to know about software? Classification: Concept

17 Copyright © 2020 Pearson Education, Inc.


57) The process by which a personal computer hosts several different operating systems is known as ________. A) PC virtualization B) parallel computing C) cloud computing D) normalization E) multiplexing Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.3: What do business professionals need to know about software? Classification: Concept 58) Ronald runs both Windows 10 and Linux on his desktop computer. This process is called ________. A) PC virtualization B) server virtualization C) cloud computing D) application virtualization E) BIOS Answer: A Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.3: What do business professionals need to know about software? Classification: Application 59) Which of the following statements refers to server virtualization? A) a personal computer, such as a desktop or portable computer, that hosts several different operating systems B) a server computer that hosts one or more other server computers C) a storage area that loses its contents when the power is off D) a server that hosts many versions of desktop operating systems E) a server can connect to multiple networks at the same time Answer: B Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.3: What do business professionals need to know about software? Classification: Concept

18 Copyright © 2020 Pearson Education, Inc.


60) In ________ process, a server hosts many versions of desktop operating systems. A) PC virtualization B) server virtualization C) desktop virtualization D) application virtualization E) VLAN Answer: C Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.3: What do business professionals need to know about software? Classification: Concept 61) Which of the following operating systems is used by Apple? A) Windows OS B) Symbian C) iOS D) Android E) AIX Answer: C Diff: 2 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.3: What do business professionals need to know about software? Classification: Concept 62) Toby has lost valuable data on his computer a number of times due to system crashes caused by viruses. He decides to invest in a powerful antivirus program. When Toby buys the program, he will actually be buying the software ________. A) copyright B) trademark C) patent D) license E) code Answer: D Diff: 3 AACSB: Reflective Thinking Course LO: Describe the components of an information system (IS) LO: 4.3: What do business professionals need to know about software? Classification: Application

19 Copyright © 2020 Pearson Education, Inc.


63) Melissa is a senior accountant at a consulting firm. She brings to her manager's notice the considerable amount of time that is wasted when accounting tasks are performed manually, and proposes that the department automates these tasks. Melissa's accounting department is in need of a(n) ________. A) application software B) system software C) firmware D) operating system E) network connection Answer: A Diff: 3 AACSB: Reflective Thinking Course LO: Describe the major types of computer hardware and software used by companies LO: 4.3: What do business professionals need to know about software? Classification: Application 64) Adobe's Acrobat, Photoshop, and PageMaker are examples of ________. A) vertical-market application software B) operating systems C) firmware D) horizontal-market application software E) drivers Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.3: What do business professionals need to know about software? Classification: Concept 65) Which of the following is an example of vertical-market application software? A) inventory tracking software for an automobile manufacturer B) Tally software that is used to maintain business and personal accounts C) Adobe suite, used by graphic designers D) Microsoft PowerPoint, used to create presentations E) YouTube Answer: A Diff: 2 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.3: What do business professionals need to know about software? Classification: Concept

20 Copyright © 2020 Pearson Education, Inc.


66) DenTimes, a software package installed in hospitals, is used to schedule appointments and bill patients. DenTimes is an example of ________. A) horizontal-market application software B) vertical-market application software C) firmware D) adware E) Web application Answer: B Diff: 2 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.3: What do business professionals need to know about software? Classification: Application 67) ________ is installed into special, read-only memory of devices like printers and print servers or devices used for various types of communication. A) Vertical-market software B) Application software C) Firmware D) Spyware E) AIX kernel Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.3: What do business professionals need to know about software? Classification: Concept 68) Which of the following statements is TRUE about firmware? A) The software is not coded like other software. B) Users do not need to load firmware into a device's memory. C) Firmware is the same as cache memory. D) Firmware cannot be changed or upgraded. E) Firmware is another name for Linux. Answer: B Diff: 2 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.3: What do business professionals need to know about software? Classification: Concept

21 Copyright © 2020 Pearson Education, Inc.


69) Which of the following is a nonmobile client operating system? A) macOS B) iOS C) Blackberry OS D) Android E) Windows Server Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.3: What do business professionals need to know about software? Classification: Concept 70) An operating system is a program that controls a computer's resources. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.3: What do business professionals need to know about software? Classification: Concept 71) Web applications are programs that are written to use a particular operating system. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.3: What do business professionals need to know about software? Classification: Concept 72) Thin-client applications can seldom run within a computer browser. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.3: What do business professionals need to know about software? Classification: Concept 73) The minimization of menu bars, status lines, and other visual overhead is a key feature of modern-style applications. Answer: TRUE Diff: 2 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.3: What do business professionals need to know about software? Classification: Concept

22 Copyright © 2020 Pearson Education, Inc.


74) Symbian is a popular operating system used on devices like iPhone, iPad, and iPod Touch. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.3: What do business professionals need to know about software? Classification: Concept 75) Linux is high-priced and closed source software developed by Google. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.3: What do business professionals need to know about software? Classification: Concept 76) Horizontal-market applications are developed for specific, unique needs of an industry. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.3: What do business professionals need to know about software? Classification: Concept 77) If a company wants to avoid a server commitment to Microsoft, they can choose Linux. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.3: What do business professionals need to know about software? Classification: Concept 78) Anyone can upgrade or change firmware. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.3: What do business professionals need to know about software? Classification: Concept

23 Copyright © 2020 Pearson Education, Inc.


79) Explain the two types of application programs. Answer: The two types of application programs are native applications and Web applications. Native applications are programs that are written to use a particular operating system. Microsoft Access, for example, will only run on the Windows operating system. Some applications come in multiple versions. For example, there are Windows and Macintosh versions of Microsoft Word. Native applications are also known as thick-client applications. A Web application is designed to run within a computer browser such as Firefox, Chrome, Opera, and Internet Explorer. Web applications run within the browser and can run on any type of computer. Web applications are also known as thin-client applications. Diff: 2 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.3: What do business professionals need to know about software? Classification: Concept 80) Briefly describe the nonmobile client operating system Microsoft Windows. Answer: Nonmobile client operating systems are used on personal computers. The most popular is Microsoft Windows. Some version of Windows resides on more than 85 percent of the world's desktops, and, if just business users are considered, the figure is more than 95 percent. The most recent client version of Windows is Windows 10, a major rewrite of prior versions. Windows 8 was distinguished by what Microsoft calls modern-style applications. These applications, now carried over into Windows 10, are touch-screen oriented and provide contextsensitive, pop-up menus. They can also be used with a mouse and keyboard. Microsoft claims that modern-style applications work just as well on portable, mobile devices such as tablet computers as they do on desktop computers. One key feature of modern-style applications is the minimization of menu bars, status lines, and other visual overhead. Diff: 2 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.3: What do business professionals need to know about software? Classification: Concept

24 Copyright © 2020 Pearson Education, Inc.


81) Define virtualization and list its types. Answer: Virtualization is the process by which one physical computer hosts many different virtual computers within it. One operating system, called the host operating system, runs one or more operating systems as applications. Those hosted operating systems are called virtual machines (vm). Each virtual machine has disk space and other resources allocated to it. The host operating system controls the activities of the virtual machines it hosts to prevent them from interfering with one another. With virtualization, each vm is able to operate exactly the same as it would if it were operating in a stand-alone, nonvirtual environment. There are three types of virtualization: PC virtualization–With PC virtualization, a personal computer, such as a desktop or laptop, hosts several different operating systems. Server virtualization–With server virtualization, a server computer hosts one, or more, other server computers. Desktop virtualization–With desktop virtualization, a server hosts many versions of desktop operating systems. Diff: 2 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.3: What do business professionals need to know about software? Classification: Concept 82) List the various categories of application software. Answer: The three major categories of application software are horizontal-market, verticalmarket, and one-of-a-kind application software. Horizontal-market application software provides capabilities that are common across all organizations and industries. Word processors, graphics programs, spreadsheets, and presentation programs are all horizontal-market application software. Examples of such software are Microsoft Word, Excel, and PowerPoint. Vertical-market application software serves the needs of a specific industry. Examples of such programs are those used by dental offices to schedule appointments and bill patients, those used by auto mechanics to keep track of customer data and customers' automobile repairs, and those used by parts warehouses to track inventory, purchases, and sales. Vertical applications usually can be altered or customized. One-of-a-kind application software is developed for a specific, unique need. The department of Internal Revenue Service (IRS) develops such software, for example, because it has needs no other organization has. Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.3: What do business professionals need to know about software? Classification: Concept

25 Copyright © 2020 Pearson Education, Inc.


83) Clark's microbiology report is due the next day. Being short on time, he collects most of the information for his report from an open-source Web browser. In this case, which of the following has Clark used to complete his report? A) Edge B) Ubuntu C) Firefox D) Apache E) IIS Answer: C Diff: 2 AACSB: Reflective Thinking Course LO: Describe the major types of computer hardware and software used by companies LO: 4.4: Is open source software a viable alternative? Classification: Application 84) Which of the following is an example of an open-source desktop operating system? A) Microsoft Windows B) Apache C) MySQL D) Ubuntu E) IIS Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.4: Is open source software a viable alternative? Classification: Concept 85) Carter is the Web designer for an open source project. He has created a program that facilitates the easy collation of data for a large-scale logistics firm. Which of the following is TRUE of the source code for Carter's program? A) It is less stable and platform dependent. B) It is available to the public. C) It is highly protected and obtained only by having a license. D) It is available only to carefully vetted contractors. E) It cannot be compiled. Answer: B Diff: 3 AACSB: Reflective Thinking Course LO: Describe the major types of computer hardware and software used by companies LO: 4.4: Is open source software a viable alternative? Classification: Application

26 Copyright © 2020 Pearson Education, Inc.


86) Source code is computer code ________. A) that is written by humans B) that is not understandable by humans C) that is represented as bits and bytes D) that cannot be modified E) that cannot be sold publicly Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.4: Is open source software a viable alternative? Classification: Concept 87) Machine code ________. A) is understandable by humans B) cannot be modified by humans C) is written by humans D) cannot be processed by computers E) is never greater than 256 KB per application Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.4: Is open source software a viable alternative? Classification: Concept 88) Rebecca is one of the few reliable programmers of her organization who is authorized to work on a closed source project. The project will be especially useful to track the progress of outsourced activities. Which of the following statements is most likely to be TRUE of Rebecca's project? A) Only users and developers will be allowed to alter the source code of the project. B) Anyone could obtain the source code for the project. C) Only trusted programmers will be allowed to make changes to the project. D) Programmers could alter the source code based on their interests and goals. E) The source code will eventually be made open source. Answer: C Diff: 2 AACSB: Reflective Thinking Course LO: Describe the major types of computer hardware and software used by companies LO: 4.4: Is open source software a viable alternative? Classification: Concept

27 Copyright © 2020 Pearson Education, Inc.


89) Which of the following is an example of a closed source project? A) Native Client B) Android C) Microsoft Office D) Ubuntu E) Apache Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.4: Is open source software a viable alternative? Classification: Concept 90) Jerry wants to save his company money. He decides to move to open source software for his word processing needs. Jerry then downloads ________. A) LibreOffice B) Android C) Microsoft Office D) Firefox E) Apache Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.4: Is open source software a viable alternative? Classification: Concept 91) The term open source means that the source code of the program is not available to the public. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.4: Is open source software a viable alternative? Classification: Concept 92) Source code is computer code as written by humans and understandable by humans. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.4: Is open source software a viable alternative? Classification: Concept

28 Copyright © 2020 Pearson Education, Inc.


93) Source code is made available from an open source project's Web site to any user. Answer: TRUE Diff: 2 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.4: Is open source software a viable alternative? Classification: Concept 94) Programmers are not allowed to alter or add to an open source code. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.4: Is open source software a viable alternative? Classification: Concept 95) Open source succeeds because of collaboration. Answer: TRUE Diff: 2 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.4: Is open source software a viable alternative? Classification: Concept 96) Distinguish between open source and closed source programs. Answer: The term open source means that the source code of the program is available to the public. Source code is computer code as written by humans and understandable by humans. Source code is compiled into machine code that is processed by a computer. Machine code is, in general, not understandable by humans and cannot be modified. In a closed source project, for example Microsoft Office, the source code is highly protected and only available to trusted employees and carefully vetted contractors. The source code is protected like gold in a vault. Only those trusted programmers can make changes to a closed source project. With open source, anyone can obtain the source code from the open source project's Web site. Programmers alter or add to this code depending on their interests and goals. In most cases, programmers can incorporate code they find into their own projects. They may be able to resell those projects depending on the type of license agreement the project uses. Diff: 2 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.4: Is open source software a viable alternative? Classification: Concept

29 Copyright © 2020 Pearson Education, Inc.


97) Mac OS and iOS applications are constructed using ________ programming language. A) Objective-C B) C# C) Java D) VB.NET E) HTML Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.5: What are the differences between native and Web applications? Classification: Concept 98) Linux applications are developed using ________ programming language. A) Objective-C B) C# C) Java D) VB.NET E) Swift Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.5: What are the differences between native and Web applications? Classification: Concept 99) Android applications are developed using ________ programming language. A) Objective-C B) C# C) Java D) VB.NET E) Swift Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.5: What are the differences between native and Web applications? Classification: Concept

30 Copyright © 2020 Pearson Education, Inc.


100) Java, C#, and VB.NET are examples of ________. A) thin-client applications B) client operating systems C) structured queries D) object-oriented languages E) hyper-text languages Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.5: What are the differences between native and Web applications? Classification: Concept 101) The limits on creating native applications are usually ________, not technological. A) based on complexity B) in finding skilled programmers C) based on requirements D) budgetary E) based on an executive board decision Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.5: What are the differences between native and Web applications? Classification: Concept 102) Which of the following statements is TRUE about native applications? A) They only run on the operating system for which they are programmed. B) The cost of native applications is low. C) They can be developed by less skilled, lesser-paid employees. D) The limits on native applications are usually technological, not budgetary. E) They are run exclusively through a Web browser. Answer: A Diff: 2 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.5: What are the differences between native and Web applications? Classification: Concept

31 Copyright © 2020 Pearson Education, Inc.


103) Reed Technologies has hired certified programmers to create an application for its Web site. The application would run inside a browser and support graphics and animation. Which of the following will the programmers use to develop this application? A) HTML5 B) Java C) Objective-C D) C# E) C++ Answer: A Diff: 3 AACSB: Information Technology; Reflective Thinking Course LO: Describe the major types of computer hardware and software used by companies LO: 4.5: What are the differences between native and Web applications? Classification: Application 104) Web applications are typically limited by the capabilities of the ________. A) programming language B) browser C) hardware D) operating system E) motherboard Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.5: What are the differences between native and Web applications? Classification: Concept 105) macOS is written in ________. A) Swift B) Java C) Android D) C# E) C++ Answer: A Diff: 3 AACSB: Information Technology; Reflective Thinking Course LO: Describe the major types of computer hardware and software used by companies LO: 4.5: What are the differences between native and Web applications? Classification: Application

32 Copyright © 2020 Pearson Education, Inc.


106) Linux applications are constructed using Objective-C and VB.NET languages. Answer: FALSE Diff: 2 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.5: What are the differences between native and Web applications? Classification: Concept 107) Object-oriented languages cannot be used to create difficult and complex applications. Answer: FALSE Diff: 2 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.5: What are the differences between native and Web applications? Classification: Concept 108) Web applications can be developed by professional programmers, technically oriented Web developers, or business professionals. Answer: TRUE Diff: 2 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.5: What are the differences between native and Web applications? Classification: Concept 109) Native applications are developed by professional programmers only. Answer: TRUE Diff: 1 AACSB: Information Technology; Reflective Thinking Course LO: Describe the major types of computer hardware and software used by companies LO: 4.5: What are the differences between native and Web applications? Classification: Application 110) Describe how native applications are developed. Answer: Native applications are developed using serious, heavy-duty, professional programming languages. Mac OS and iOS applications are constructed using Objective-C, Linux (Android) applications are constructed using Java, and Windows applications are constructed using C#, VB.NET, C++ and others. All of these languages are object-oriented, which means they can be used to create difficult, complex applications, and, if used properly, will result in high-performance code that is easy to alter when requirements change. Object-oriented languages can only be used by professional programmers who have devoted years to learning object-oriented design and coding skills. Diff: 3 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.5: What are the differences between native and Web applications? Classification: Concept 33 Copyright © 2020 Pearson Education, Inc.


111) Describe Web development languages. Answer: Web development languages are HTML5, CSS3, and JavaScript. HTML5 is the latest version of HTML. The advantages of this version are support for graphics, animation, 3D drawing, and other sophisticated user experiences. CSS3 is used with HTML5 to specify the appearance of content coded in HTML. JavaScript is a scripting programming language that is much easier to learn than object-oriented languages. It is used to provide the underlying logic of the application. Diff: 2 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.5: What are the differences between native and Web applications? Classification: Concept 112) A ________ is a small, lightweight, power-conserving, computing device that is capable of wireless connectivity. A) PC B) mainframe computer C) server D) mobile device E) server cluster Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.6: Why are mobile systems increasingly important? Classification: Concept 113) Users in motion, wireless connectivity, and a cloud-based resource are the elements in a ________. A) mobile system B) nonmobile system C) client operating system D) native application E) virtual private network Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.6: Why are mobile systems increasingly important? Classification: Concept

34 Copyright © 2020 Pearson Education, Inc.


114) Which of the following is an example of a mobile device? A) a smartphone B) an Xbox C) a desktop computer D) a mainframe E) VoIP phone Answer: A Diff: 1 AACSB: Analytical Thinking Course LO: Describe the major types of computer hardware and software used by companies LO: 4.6: Why are mobile systems increasingly important? Classification: Concept 115) What is the impact of mobile systems growth on the procedures under the five components model? A) Compact interfaces B) Always on, always at work C) Personal mobile devices at work D) An increase in independent contractors E) Jobs for mobile device sales Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.6: Why are mobile systems increasingly important? Classification: Concept 116) Mobile systems offer the potential of ________, which is data delivered to the user at the precise time it is needed. A) clean data B) convenient data C) granular data D) just-in-time data E) cluster data Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.6: Why are mobile systems increasingly important? Classification: Concept

35 Copyright © 2020 Pearson Education, Inc.


117) Mobile devices cannot be connected through the cloud. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.6: Why are mobile systems increasingly important? Classification: Concept 118) Mobile systems offer the potential of just-in-time data, which is data delivered to the user at the precise time it is needed. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the components of an information system (IS) LO: 4.6: Why are mobile systems increasingly important? Classification: Concept 119) As of 2018, 95% of people in the United States owned a mobile phone. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.6: Why are mobile systems increasingly important? Classification: Concept 120) Mobile use is favored by the elder. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.6: Why are mobile systems increasingly important? Classification: Concept

36 Copyright © 2020 Pearson Education, Inc.


121) Why are mobile systems important? Answer: Mobile systems are information systems that support users in motion. Mobile systems users access the system from any place–at home, at work, in the car, on the bus, or at the beach– using any smart device, such as a smartphone, tablet, or PC. Mobile systems users move not only geographically, but also from device to device. The user who starts reading a book on an iPad on a bus, continues reading that book on a PC at work, and finishes it on Kindle Fire at home is mobile both geographically and across devices. The major elements in a mobile system are users in motion, mobile devices, wireless connectivity, and a cloud-based resource. A mobile device is a small, lightweight, power-conserving, computing device that is capable of wireless access. Almost all mobile devices have a display and some means for data entry. Mobile devices include smartphones, tablets, personal digital assistants, and small, light laptops. Desktop computers, Xboxes, and large, heavy, power-hungry laptops are not mobile devices. Diff: 2 AACSB: Information Technology Course LO: Describe the major types of computer hardware and software used by companies LO: 4.6: Why are mobile systems increasingly important? Classification: Concept 122) Which of the following is an advantage to an organization if its bring your own device (BYOD) policy offers wireless network to mobile devices? A) The organization can sniff employees' mobile traffic. B) Employees gain public access from any device, not just mobile devices. C) The policy appears to be permissive without actually being so. D) Employees independently manage their own devices. E) The internal network will be inherently more secure. Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss the ethical and social issues raised by the use of information systems LO: 4.7: What are the challenges of personal mobile devices at work? Classification: Concept 123) Which of the following is the most controlling BYOD policy? A) For an organization to declare that it owns any device that employees connect to its network. B) If the employee signs on to the company's network, they are financially responsible for any damage done. C) The company creates special logins for BYOD. D) For the company to offer coffee shop style networking. E) For the organization to sniff employees' mobile traffic. Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss the ethical and social issues raised by the use of information systems LO: 4.7: What are the challenges of personal mobile devices at work? Classification: Concept

37 Copyright © 2020 Pearson Education, Inc.


124) A (bring your own device) BYOD policy is a statement concerning employees' permissions and responsibilities when they use their own device for organizational business. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the ethical and social issues raised by the use of information systems LO: 4.7: What are the challenges of personal mobile devices at work? Classification: Concept 125) What are the disadvantages of employee use of mobile systems at work? Answer: Employee use of mobile devices has significant disadvantages. First, there is the real danger of lost or damaged data. When data is brought into employee-owned computing devices, the organization loses control over where it goes or what happens to it. Also, if an employee loses his or her device, the data goes with it, and when employees leave the organization, the data on their personal devices needs to be deleted somehow. The disadvantages are data loss or damage, loss of control, compatibility problems, risk of infection, and greater support costs. Diff: 2 AACSB: Analytical Thinking Course LO: Discuss the ethical and social issues raised by the use of information systems LO: 4.7: What are the challenges of personal mobile devices at work? Classification: Concept 126) In the future, your house will be so smart it will analyze you. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the ethical and social issues raised by the use of information systems LO: 4.8: 2029? Classification: Concept

38 Copyright © 2020 Pearson Education, Inc.


Using MIS, 11e (Kroenke) Chapter 5 Database Processing 1) A database is used instead of a spreadsheet when ________. A) lists of data involve a single theme B) structures of data lists are simple C) lists involve data with multiple themes D) users do not want to store all data in one place E) users have a small amount of data to store Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.1: What is the purpose of a database? Classification: Concept 2) Larry wants to keep track of his vintage vinyl records, the value of each record, and who he lends the records to for parties. Larry should use a ________. A) database B) spreadsheet C) table in Microsoft Word D) sticky note E) bulletin board Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.1: What is the purpose of a database? Classification: Concept 3) Lists that involve data with multiple themes can be stored in a spreadsheet. Answer: FALSE Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.1: What is the purpose of a database? Classification: Concept 4) The purpose of a database is to keep track of lists of data that involve multiple themes. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.1: What is the purpose of a database? Classification: Concept

1 Copyright © 2020 Pearson Education, Inc.


5) What is the purpose of a database? Answer: The purpose of a database is to keep track of things. Lists of data involving a single theme can be stored in a spreadsheet; while lists that involve data with multiple themes require a database. Thus, the purpose of a database is to keep track of things that involve more than one theme. Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.1: What is the purpose of a database? Classification: Concept 6) Which of the following is the smallest element in a database? A) field B) record C) byte D) metadata E) zetta Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.2: What is a database? Classification: Concept 7) In a database, ________ are grouped into columns. A) fields B) records C) bytes D) files E) nibbles Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.2: What is a database? Classification: Concept

2 Copyright © 2020 Pearson Education, Inc.


8) The columns in a database are also called ________. A) records B) tables C) files D) fields E) verticals Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.2: What is a database? Classification: Concept 9) The rows in a database are also called ________. A) records B) tables C) files D) fields E) laterals Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.2: What is a database? Classification: Concept 10) A group of similar rows or records is known as ________. A) a prototype B) a table C) a field D) an attribute E) a cluster Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.2: What is a database? Classification: Concept

3 Copyright © 2020 Pearson Education, Inc.


11) Which of the following data elements is placed higher than records in the database hierarchy? A) file B) field C) character D) byte E) bit Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.2: What is a database? Classification: Concept 12) A primary key in a database is a ________. A) group of rows that identifies a unique table or file B) column or group of columns that identifies a unique row in a table C) group of fields or columns that represent metadata D) group of tables or files formed to identify a unique field or row E) group of records that identifies similar attribute Answer: B Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.2: What is a database? Classification: Concept 13) Maria creates a relational database to keep track of cars in her repair shop. She stores information about each car in the "vehicle" table, and creates a column labeled "vehicle_ID" where she stores the vehicle VIN number. The "vehicle_ID" column is referred to as a ________. A) primary key B) key attribute C) foreign key D) functionally dependent record E) secondary key Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.2: What is a database? Classification: Application

4 Copyright © 2020 Pearson Education, Inc.


14) Columns that are keys to different tables than the ones in which they reside are called ________. A) attributes B) foreign keys C) primary keys D) internal records E) nonlocal keys Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.2: What is a database? Classification: Concept 15) Relational databases represent relationships using ________. A) foreign keys B) file systems C) metadata D) primary keys E) trees Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.2: What is a database? Classification: Concept 16) Metadata is/are ________. A) codes used for server-side processing B) error logs of databases C) data that describes data D) data that are encrypted E) more important data Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.2: What is a database? Classification: Concept

5 Copyright © 2020 Pearson Education, Inc.


17) A group of similar rows or records in a table is called a file. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.2: What is a database? Classification: Concept 18) Metadata refers to special data that describes the structure of a database. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.2: What is a database? Classification: Concept 19) Each table in a database must have at least one foreign key. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.2: What is a database? Classification: Concept 20) A foreign key is a key of a different (foreign) table than the one in which it resides. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.2: What is a database? Classification: Concept 21) Describe a database and its elements. Answer: A database is a self-describing collection of integrated records. A byte is a character of data. In databases, bytes are grouped into columns, which are also called fields. Columns or fields are grouped into rows, which are also called records. Finally, a group of similar rows or records is called a table or a file. A database is thus a collection of tables, relationships among the rows in those tables, and special data called metadata, that describes the structure of the database. Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.2: What is a database? Classification: Concept

6 Copyright © 2020 Pearson Education, Inc.


22) Define primary key, foreign key, and metadata. Answer: A primary key is a column or group of columns that identifies a unique row in a table. Columns that are primary keys in a table other than the one in which they reside are called foreign keys. Metadata are data that describe data in the database. Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.2: What is a database? Classification: Concept 23) Why does the presence of metadata make databases more useful? Answer: Because of metadata, no one needs to guess, remember, or even record what is in the database. To find out what a database contains, we just look at the metadata inside the database. Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.2: What is a database? Classification: Concept 24) A(n) ________ is a program used to create, process, and administer a database. A) operating system B) database management system C) information system D) database system E) operating system driver Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.3: What is a database management system (DBMS)? Classification: Concept 25) Which of the following is an example of a database management system? A) MS Excel B) BigData C) NoSQL D) Access E) MS Visio Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.3: What is a database management system (DBMS)? Classification: Concept

7 Copyright © 2020 Pearson Education, Inc.


26) Identify an open source DBMS product. A) MySQL B) DB2 C) Access D) Oracle Database E) TableOS Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.3: What is a database management system (DBMS)? Classification: Concept 27) Which of the following is TRUE of MySQL? A) It is a Microsoft product. B) It is license-free for most applications. C) It is a paid and proprietary database product. D) It uses Static Query Language (SQL) to manage a database. E) It limits databases to 2 TB in size. Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.3: What is a database management system (DBMS)? Classification: Concept 28) The modification or deletion of data in a database is an example of ________ operations of a database management system. A) statistical B) analytical C) administrative D) processing E) technical Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.3: What is a database management system (DBMS)? Classification: Concept

8 Copyright © 2020 Pearson Education, Inc.


29) Which of the following is an international standard language for processing a database? A) Cassandra B) DB2 C) SQL D) MS Access E) Relational LM Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.3: What is a database management system (DBMS)? Classification: Concept 30) Which of the following is a developmental task of database administration? A) evaluating an application design B) monitoring backup procedures C) conducting training for users D) managing configuration changes in systems E) testing backup procedures Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.3: What is a database management system (DBMS)? Classification: Concept 31) Jed is a database administrator for a mid-sized computer component manufacturer. Part of his duties include managing security, tracking problems, and monitoring the performance of the database. This is an example of Jed's ________ tasks. A) development B) adaptation C) backup and recovery D) operation E) data audit Answer: D Diff: 2 AACSB: Reflective Thinking Course LO: Discuss best practices for using and managing databases LO: 5.3: What is a database management system (DBMS)? Classification: Application

9 Copyright © 2020 Pearson Education, Inc.


32) Sonya is the database administrator for RedTriangle media. She is responsible for validating the data model to be used by the DBMS, and specifying the database requirements to endure all appropriate user input is considered. This is an example of Sonya's ________ tasks. A) development B) recovery C) adaptation D) operation E) data audit Answer: A Diff: 3 AACSB: Reflective Thinking Course LO: Discuss best practices for using and managing databases LO: 5.3: What is a database management system (DBMS)? Classification: Application 33) Which of the following database administration tasks is related to adaptation? A) monitoring backup procedures B) conducting training for users C) monitoring database performance D) managing configuration changes in systems E) conducting data audit requirements Answer: D Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.3: What is a database management system (DBMS)? Classification: Concept 34) All of the following are functions of the DBMS except ________. A) processing the database B) providing tools to administer the database C) creating the database D) modifying the database E) getting the users to use the database Answer: E Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.3: What is a database management system (DBMS)? Classification: Concept

10 Copyright © 2020 Pearson Education, Inc.


35) A DBMS and database are synonymous terms that can be used interchangeably. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.3: What is a database management system (DBMS)? Classification: Concept 36) To modify an existing table, a developer can open the metadata form for that table and add a new row of metadata. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.3: What is a database management system (DBMS)? Classification: Concept 37) SQL is an international standard language for processing a database. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.3: What is a database management system (DBMS)? Classification: Concept 38) One of the functions of a DBMS is to provide tools to assist in the administration of a database. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.3: What is a database management system (DBMS)? Classification: Concept 39) A user must have a valid user account to access and process a database. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.3: What is a database management system (DBMS)? Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


40) Managing the impact of database structural changes on applications and users is an operational task for a database administrator. Answer: FALSE Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.3: What is a database management system (DBMS)? Classification: Concept 41) Explain how a database management system processes a database. Answer: A function of the DBMS is to process the database. Such processing can be quite complex, but, fundamentally, the DBMS provides applications for four processing operations: to read, insert, modify, or delete data. These operations are requested in application calls upon the DBMS. From a form, when a user enters new or changed data, a computer program behind the form calls the DBMS to make the necessary database changes. From a Web application, a program on the client or on the server calls the DBMS to make the change. Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.3: What is a database management system (DBMS)? Classification: Concept 42) What is database administration? Answer: Database administration involves a wide variety of activities. For example, the database management system can be used to set up a security system involving user accounts, passwords, permissions, and limits for processing the database. To provide database security, a user must sign on using a valid user account before she can process the database. In addition to security, DBMS administrative functions include backing up database data, adding structures to improve the performance of database applications, removing data that are no longer wanted or needed, and similar tasks. For important databases, most organizations dedicate one or more employees to the role of database administration. Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.3: What is a database management system (DBMS)? Classification: Concept

12 Copyright © 2020 Pearson Education, Inc.


43) A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data. A) database application B) database design C) data field D) data model E) data bridge Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Concept 44) Katrina is a sales representative for an online retailer. She needs to update her customer list with new contact information for five customers. Which of the following elements will help Katrina modify her data? A) reports B) forms C) queries D) operations E) triggers Answer: B Diff: 2 AACSB: Reflective Thinking Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Application 45) ________ are more stringent for browser-based Internet applications than for traditional ones. A) Graphical queries B) Coding standards C) Multi-user processing applications D) Security requirements E) Data consistency checks Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Concept

13 Copyright © 2020 Pearson Education, Inc.


46) Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of the second and third quarter of the year. She should use a ________ to obtain the information that she wants from the database. A) report B) data model C) database administrative function D) query E) pull function Answer: D Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Application 47) Which of the following is TRUE of single-user databases? A) They are displayed and processed using HTML5, CSS3, and JavaScript. B) They use JavaScript for user-side processing. C) The Internet is used to access the DBMS server computer. D) The application, the DBMS, and the database all reside on the user's computer. E) They run on clustered Linux or Unix systems Answer: D Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Concept 48) Which of the following is TRUE of traditional database application programs? A) Application forms, reports, and queries are displayed and processed using a browser application. B) The application logic is contained in a program on the client-side computer. C) They are written in object-oriented languages such as C++ and VisualBasic. D) They are thin-client applications that need not be preinstalled on the users' computers. E) They are cloud-based applications that need not be preinstalled on the users' computers. Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Concept

14 Copyright © 2020 Pearson Education, Inc.


49) Traditional database application programs are ________. A) browser-based and display dynamic content B) written in languages such as HTML5 and JavaScript C) entirely dependent on the database server for application logic D) thick applications that need to be installed on users' computers E) cloud-based applications Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Concept 50) Browser applications are thin-client applications that ________. A) use COBOL as the standard language for user-side processing B) are processed using VisualBasic and C++ C) need not be preinstalled on the users' computers D) depend on internal networks and not the Internet to transmit data E) do not need to be encrypted Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Concept 51) Which of the following is used to process and display browser database application forms, reports, and queries? A) C++ B) html C) COBOL D) VisualBasic E) DB2 Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Concept

15 Copyright © 2020 Pearson Education, Inc.


52) Browser-based applications ________. A) are thick-client applications B) can display only static content C) support graphical queries D) process queries using C++ E) process queries without using SQL Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Concept 53) Browser-based applications ________. A) need to be preinstalled on the users' computers B) run within a corporate network that is protected from the Internet C) eliminate the need to check for data consistency D) are more vulnerable to security threats than are traditional applications E) do not need to be encrypted Answer: D Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Concept 54) Charles and Irene are editors at a content development firm. Both of them, unknowingly, are working on the same copy of the annual report. Irene finishes editing the report and saves her copy; Charles saves his report an hour after Irene. Charles's report overwrites Irene's, and her changes are lost. This scenario is an example of the ________. A) lost-update problem B) crow's-foot paradigm C) bullwhip effect D) update query problem E) bait-and-switch problem Answer: A Diff: 3 AACSB: Reflective Thinking Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Application

16 Copyright © 2020 Pearson Education, Inc.


55) Reports refer to the structured presentation of data using sorting, grouping, filtering, and other operations. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Concept 56) Most traditional databases use the Internet to transmit traffic back and forth between the users' computers and the DBMS server. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Concept 57) The lost-update problem can be resolved by implementing single-user database processing. Answer: FALSE Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Concept 58) Locking must be used to coordinate the activities of users in order to prevent the lost-update problem. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Concept 59) Browser applications are thin-client applications that need to be preinstalled on the users' computers. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Concept

17 Copyright © 2020 Pearson Education, Inc.


60) Single-user databases are an exception to a traditional database because the databases, application, and the DBMS all reside on the user's computer. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Concept 61) What is a database application? Answer: A database application is a collection of forms, reports, queries, and application programs that serves as an intermediary between users and database data. Database applications reformat database table data to make it more informative and more easily updated. Application programs also have features that provide security, maintain data consistency, and handle special cases. Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Concept 62) State the purposes of the four elements of a database application. Answer: The specific purposes of the four elements of a database application are as follows: Forms–View data; insert new, update existing, and delete existing data Reports–Structured presentation of data using sorting, grouping, filtering, and other operations Queries–Search based upon data values provided by the user Application programs–Provide security, data consistency, and special purpose processing, e.g., handle out-of-stock situations Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Concept

18 Copyright © 2020 Pearson Education, Inc.


63) What are traditional database applications? Answer: A traditional database is shared among many users. In that case, the application resides on the users' computers and the database management system and database reside on a server computer. A network, in most cases not the Internet, is used to transmit traffic back and forth between the users' computers and the DBMS server computer. Traditional database application programs are written in object-oriented languages such as C++ and VisualBasic (and even in earlier languages like COBOL). They are thick applications that need to be installed on users' computers. In some cases, all of the application logic is contained in a program on users' computers and the server does nothing except run the DBMS and serve up data. Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Concept 64) Explain the functioning of browser applications. Answer: Browser applications are thin-client applications that need not be preinstalled on the users' computers. In most cases, all of the code for generating and processing the application elements is shared between the users' computers and the servers. JavaScript is the standard language for user-side processing. Languages like C# and Java are used for server-side code. The databases in browser-based Internet applications are nearly always shared among many users. The users' browsers connect over the Internet to a Web server computer, which in turn connects to a database server computer. Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Concept 65) What is the disadvantage of multiuser processing? Answer: Most traditional and browser-based Internet applications involve multiple users processing the same database. While such multiuser processing is common, it does pose unique problems. The lost-update problem exemplifies one of the special characteristics of multiuser database processing. To prevent this problem, some type of locking must be used to coordinate the activities of users who know nothing about one another. Locking brings its own set of problems, however, and those problems must be addressed as well. Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.4: How do database applications make databases more useful? Classification: Concept

19 Copyright © 2020 Pearson Education, Inc.


66) A ________ describes the data and relationships that will be stored in a database. A) data aggregator B) query model C) data model D) data application E) data-tree model Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Concept 67) Ryan, a database administrator, is in the process of designing his company's database. Which of the following would Ryan have had to create before he began designing? A) data aggregator B) query model C) data model D) data application E) data tunnel outlay Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Application 68) A data model is a ________. A) logical representation of database data B) repository of unprocessed data C) collection of isolated databases D) set of programs used to retrieve data E) array of data variables Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Concept

20 Copyright © 2020 Pearson Education, Inc.


69) In a data model, a(n) ________ is something that a user wants to track. A) record B) byte C) entity D) primary key E) quark Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Concept 70) Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wants to track information such as task name, productivity of an employee on daily basis, and employee name. These aspects that Brad wants to track are called ________. A) identifiers B) records C) primary keys D) entities E) quarks Answer: D Diff: 3 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Application 71) Entities in a data model have ________ that describe the characteristics of the entity. A) characters B) primary keys C) codes D) attributes E) scribes Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Concept

21 Copyright © 2020 Pearson Education, Inc.


72) Each entity in a database has a unique attribute called a(n) ________. A) public key B) identifier C) foreign key D) index field E) prime value Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Concept 73) In an E-R diagram, a line between two entities represents a(n) ________. A) attribute B) identifier C) cardinality D) relationship E) branch Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Concept 74) The forked lines on the lines representing relationship between two related entities are referred to as ________. A) identifiers B) foreign keys C) crow's feet D) entities E) switch Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Concept

22 Copyright © 2020 Pearson Education, Inc.


75) Which of the following is TRUE of N:M relationships? A) They are the same as N:N relationships. B) They represent minimum cardinalities in a relationship. C) They are also called one-to-many relationships. D) They can have more than one entity on each side of the relationship. E) They connect different data types. Answer: D Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Concept 76) Acelane Inc., unlike its competitors, procures raw material from multiple suppliers. Each supplier in turn supplies raw material to many buyers, including Acelane. This is an example of a(n) ________ relationship. A) 1:N B) 1:1 C) N:M D) M:1 E) N:1 Answer: C Diff: 2 AACSB: Reflective Thinking Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Application 77) ________ in an E-R diagram refer to the least number of entities required in a relationship. A) Minimum candidate keys B) Primary keys C) Foreign keys D) Minimum cardinalities E) Chernozem cardinalities Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Concept

23 Copyright © 2020 Pearson Education, Inc.


78) Constraints on the minimum number of entities in a relationship are called ________ cardinalities. A) specific B) minimum C) primary D) critical E) plank Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Concept 79) In an E-R diagram, a(n) ________ on a line means that at least one entity of that type is required. A) small oval B) vertical bar C) arrow D) triangular block E) wave Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Concept 80) Which of the following notations in an E-R diagram means that the entity is optional and a relationship need not have an entity of that type? A) vertical bar B) arrow C) double line D) small oval E) triangle Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Concept

24 Copyright © 2020 Pearson Education, Inc.


81) Why is user involvement critical for database development? A) Because they use the system. B) The design of the database depends on how users view their business environment. C) The executive board says it is critical. D) Because users design the system. E) The data model states it is important. Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Concept 82) A logical representation of database data, called the data model, is constructed by developers after building a database. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Concept 83) An identifier is an attribute or a group of attributes whose value is associated with one and only one entity instance. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Concept 84) A line in an entity-relationship (E-R) diagram is used to represent the relationships between two entities. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Concept

25 Copyright © 2020 Pearson Education, Inc.


85) The crow's-foot notation in an E-R diagram shows the maximum number of entities that can be involved in a relationship. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Concept 86) Describe entities in the context of data models. Answer: An entity is something that the users want to track. Examples of entities are Order, Customer, Salesperson, and Item. Some entities represent a physical object, such as Item or Salesperson; others represent a logical construct or transaction, such as Order or Contract. Entities have attributes that describe characteristics of the entity. Example attributes of Order are OrderNumber, OrderDate, SubTotal, Tax, Total, and so forth. Entities have an identifier, which is an attribute (or group of attributes) whose value is associated with one, and only one, entity instance. For example, OrderNumber is an identifier of Order, because only one Order instance has a given value of OrderNumber. Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Concept 87) Define the symbols and terms used in entity-relationship (E-R) diagrams. Answer: Database designers use diagrams called entity-relationship (E-R) diagrams. In these diagrams, all of the entities of one type are represented by a single rectangle. Little lines, which are referred to as crow's feet, are shorthand for the multiple lines between these entities. 1:N, one-to-many relationships, and N:M, many-to-many relationships, represent the relationship between entities. The crow's-foot notation shows the maximum number of entities that can be involved in a relationship. They are called the relationship's maximum cardinality, and constraints on minimum requirements are called minimum cardinalities. Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.5: How are data models used for database development? Classification: Concept

26 Copyright © 2020 Pearson Education, Inc.


88) ________ is the process of converting a data model into tables, relationships, and data constraints. A) Database design B) Database querying C) Data mining D) Database aggregation E) Database cross modeling Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.6: How is a data model transformed into a database design? Classification: Concept 89) ________ is the process of converting a poorly-structured table into two or more wellstructured tables. A) Optimization B) Normalization C) Refactoring D) Standardization E) Banding Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.6: How is a data model transformed into a database design? Classification: Concept 90) In a database, when data items are inaccurate and inconsistent with one another, it leads to a(n) ________. A) data integrity problem B) crow's-foot paradigm C) adaptation conflict D) security problem E) data loopback problem Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.6: How is a data model transformed into a database design? Classification: Concept

27 Copyright © 2020 Pearson Education, Inc.


91) A data integrity problem will occur only if ________. A) a database has multiple administrators B) data are duplicated in a database C) the database is very complex D) there are complex relationships between entities in a database E) the database has too many keys Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.6: How is a data model transformed into a database design? Classification: Concept 92) The process of normalization constructs tables such that every table has a ________. A) one-to-one relationship between entities B) single theme C) foreign key D) specialized graphical query E) minimized metadata footprint Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.6: How is a data model transformed into a database design? Classification: Concept 93) Identify the first step in transforming a data model into a relational database design. A) representing the entity relationships B) normalizing the data and files C) creating foreign keys D) creating a table for each entity E) creating data triggers for export Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.6: How is a data model transformed into a database design? Classification: Concept

28 Copyright © 2020 Pearson Education, Inc.


94) When using the relational model to represent two tables, one must ________. A) add a foreign key to one of the tables B) have more than two primary keys in the model C) establish only N:M relationships between the tables D) use metadata instead of foreign keys E) minimize the number of columns in the second table Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.6: How is a data model transformed into a database design? Classification: Concept 95) Which of the following is TRUE about the database development process? A) The database structure is easy to change during the data modeling stage. B) Changing a relationship from 1:N to N:M in an existing database is a complex and lengthy process. C) User review of the data model is avoided as it is not helpful in data modeling. D) Databases are easier to develop than spreadsheets. E) Normalization is unnecessary for large databases. Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.6: How is a data model transformed into a database design? Classification: Concept 96) ________ are the final judges as to what data the database should contain and how the records in that database should be related to one another. A) Administrators B) Developers C) Users D) Designers E) Auditors Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.6: How is a data model transformed into a database design? Classification: Concept

29 Copyright © 2020 Pearson Education, Inc.


97) All of these issues are results of data integrity problems except ________, A) incorrect results B) inconsistent results C) users lose confidence in the data D) the system will develop a poor reputation E) the system will give users too much information Answer: E Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.6: How is a data model transformed into a database design? Classification: Concept 98) All of these are steps to transform a data model into a database design except ________. A) identify results B) represent each entity with a table C) use foreign keys D) add additional tables for N:M relationships E) entity attributes become table columns Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.6: How is a data model transformed into a database design? Classification: Concept 99) The data integrity problem occurs only if data are duplicated. Answer: TRUE Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.6: How is a data model transformed into a database design? Classification: Concept 100) The accuracy of a database design is not dependent on the corresponding data model. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.6: How is a data model transformed into a database design? Classification: Concept

30 Copyright © 2020 Pearson Education, Inc.


101) The easiest time to change the database structure is after the data modeling stage. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.6: How is a data model transformed into a database design? Classification: Concept 102) Database design is easy and can be explained in a paragraph. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.6: How is a data model transformed into a database design? Classification: Concept 103) How does normalization resolve the data integrity problem? Answer: Normalization is the process of converting a poorly-structured table into two or more well-structured tables. If an attribute is entered correctly in one row and incorrectly in another, this leads to a problem called a data integrity problem. The data integrity problem can occur only if data are duplicated. Because of this, one easy way to eliminate the problem is to eliminate the duplication of data. The general goal of normalization is to construct tables such that every table has a single topic or theme. Database practitioners classify tables into various normal forms according to the kinds of problems they have. Transforming a table into a normal form to remove duplicated data and other problems is called normalizing the table. Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.6: How is a data model transformed into a database design? Classification: Concept 104) What are the steps involved in transforming a data model into a relational database design? Answer: To transform a data model into a relational database design, a database designer creates a table for each entity. The identifier of the entity becomes the key of the table. Each attribute of the entity then becomes a column of the table. Next, the resulting tables are normalized so that each table has a single theme followed by representing relationships among the tables that are normalized. This includes adding foreign keys and additional tables for N:M relationships. Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.6: How is a data model transformed into a database design? Classification: Concept

31 Copyright © 2020 Pearson Education, Inc.


105) Explain the role of users in the database development process. Answer: A database is a model of how the users view their business world. This means that the users are the final judges as to what data the database should contain and how the records in that database should be related to one another. Thus, user review of the data model is crucial. When a database is developed, users must carefully review the data model. If they do not understand any aspect of it, they should ask for clarification until they do. Entities must contain all of the data they need to do their jobs, and relationships must accurately reflect their view of the business. If the data model is wrong, the database will be designed incorrectly, and the applications will be difficult to use, if not worthless. Developers should not proceed with the database design unless the data model is accurate. Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.6: How is a data model transformed into a database design? Classification: Concept 106) eHermes decides to store the URL of the file server location for the images in the ________. A) metadata B) database C) spreadsheet D) table of entities E) E-R document Answer: A Diff: 3 AACSB: Application of Knowledge Course LO: Discuss best practices for using and managing databases LO: 5.7: How can Falcon Security benefit from a database system? Classification: Application 107) Why does eHermes want so implement a database system? A) Because their competitors are doing it. B) The customer has requested they implement a database. C) To speed up the process of inventorying the new items it receives from sellers. D) Because the IT department won't do it. E) To better encrypt the data. Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.7: How can eHermes benefit from a database system? Classification: Concept

32 Copyright © 2020 Pearson Education, Inc.


108) Why did eHermes choose to use Microsoft SQL server database instead of Mongo DB to store image information? A) They wanted to learn something new. B) Microsoft SQL was free. C) It was less risky to implement the database in Microsoft SQL. D) It is difficult to understand Mongo DB. E) The database would be too big for Mongo DB. Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.7: How can eHermes benefit from a database system? Classification: Concept 109) The term ________ implies that either all transactions related to a traditional relational DBMS are processed or none of them are processed. A) consistent B) atomic C) durable D) isolated E) iconic Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.8: 2029? Classification: Concept 110) Which of the following is TRUE of in-memory DBMS products? A) They support or extend the relational model. B) They do not provide ACID transaction support. C) They are a hotbed of development. D) MongoDB is an in-memory DBMS product. E) They are low-volume, but high integrity DBMS product. Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.8: 2029? Classification: Concept

33 Copyright © 2020 Pearson Education, Inc.


111) NoSQL DBMS refer to nonrelational databases that support very high transaction rates processing relatively simple data structures, replicated on many servers in the cloud. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.8: 2029? Classification: Concept 112) It is to the users advantage to have a working knowledge of database developments. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.8: 2029? Classification: Concept 113) Define the acronym ACID, and describe why ACID transactions are important. Answer: Traditional relational DBMS products devote considerable code and processing power to support what are termed ACID (atomic, consistent, isolated, durable) transactions. In essence, this acronym means that either all of a transaction is processed or none of it is (atomic), that transactions are processed in the same manner (consistent) whether processed alone or in the presence of millions of other transactions (isolated), and that once a transaction is stored it never goes away–even in the presence of failure (durable). ACID transactions are critical to traditional commercial applications. Even in the presence of machine failure, systems must process both sides of a transaction (i.e. the sell and the buy sides); it cannot process part of a transaction. Also, what it stores today must be stored tomorrow. Diff: 1 AACSB: Information Technology Course LO: Discuss best practices for using and managing databases LO: 5.8: 2029? Classification: Concept

34 Copyright © 2020 Pearson Education, Inc.


Using MIS, 11e (Kroenke) Chapter 6 The Cloud 1) Which of the following is defined as the elastic leasing of pooled computer resources over the Internet? A) broadband B) wiki C) the cloud D) Bluetooth E) SSD Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.1: Why are organizations moving to the cloud? Classification: Concept 2) ________ are large-scale high-speed centralized computers, used for internal corporate data processing needs. A) Mainframes B) Thin clients C) Hosts D) Clients E) NAS Answer: A Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.1: Why are organizations moving to the cloud? Classification: Concept 3) The term ________ means that the computing resources leased can be increased or decreased dynamically in a short span of time and that organizations pay for just the resources that they use. A) portable B) pooled C) programmatic D) elastic E) incremental Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.1: Why are organizations moving to the cloud? Classification: Concept

1 Copyright © 2020 Pearson Education, Inc.


4) Cloud resources are ________ because many different organizations use the same physical hardware. A) elastic B) pooled C) programmatic D) portable E) shared Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.1: Why are organizations moving to the cloud? Classification: Concept 5) Which of the following is a characteristic of cloud-based hosting? A) unknown cost structure B) full control of data location C) no obsolescence D) in-depth visibility of security E) static storage capacity Answer: C Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.1: Why are organizations moving to the cloud? Classification: Concept 6) Which of the following characteristics is a disadvantage of cloud-based hosting? A) It involves high dependency on vendor. B) It involves significant requirement of capital. C) It involves high annual maintenance costs. D) It involves high ongoing support costs. E) It involves high cost uncertainties. Answer: A Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.1: Why are organizations moving to the cloud? Classification: Concept

2 Copyright © 2020 Pearson Education, Inc.


7) Identify a characteristic that is a disadvantage of cloud-based hosting. A) loss of control over data location B) ongoing support costs C) increased management requirements D) significant development effort E) significant capital required Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.1: Why are organizations moving to the cloud? Classification: Concept 8) In cloud computing, resources are said to be "pooled" because organizations ________. A) use the public Internet to create the appearance of a private connection B) use open source standards that enable users to modify a program's source code C) offer their services to each other free of charge, in a give-and-take arrangement D) share the same physical hardware through virtualization E) share the same physical address range Answer: D Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.1: Why are organizations moving to the cloud? Classification: Concept 9) Compared to in-house hosting, cloud-based hosting ________. A) provides better visibility of security and disaster preparedness capabilities B) minimizes the risk of investing in technology that will soon become obsolete C) provides greater control over the location of data D) requires a significant amount of capital E) requires significant development effort Answer: B Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.1: Why are organizations moving to the cloud? Classification: Concept

3 Copyright © 2020 Pearson Education, Inc.


10) Which of the following is a benefit of in-house hosting? A) superior flexibility and adaptability to growing or fluctuating demand B) lower capital requirements C) in-depth visibility of security and disaster preparedness D) fewer training requirements E) no obsolescence Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.1: Why are organizations moving to the cloud? Classification: Concept 11) Why was the client-server architecture more appealing to organizations than mainframes? A) The mainframes were getting older. B) Mainframes cannot connect to the cloud. C) The client-server architecture was cheaper. D) Companies were not using mainframes anymore. E) It is easier to set up a client-server architecture than a mainframe. Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.1: Why are organizations moving to the cloud? Classification: Concept 12) All of the following are negatives of cloud computing except ________. A) having a disaster recovery plan B) loss of control C) dependency on a vendor D) no control over prices E) the company has to rely on vender management Answer: A Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.1: Why are organizations moving to the cloud? Classification: Concept 13) Cloud-based hosting is the ideal choice for organizations that are required by law to have physical control over their data. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.1: Why are organizations moving to the cloud? Classification: Concept 4 Copyright © 2020 Pearson Education, Inc.


14) The cloud is defined as the elastic leasing of pooled computer resources over the Internet. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.1: Why are organizations moving to the cloud? Classification: Concept 15) Define the cloud, and discuss its attributes. Answer: The cloud is defined as the elastic leasing of pooled computer resources over the Internet. The term cloud is used because most early diagrams of three-tier and other Internetbased systems used a cloud symbol to represent the Internet, and organizations came to view their infrastructure as being "somewhere in the cloud." The term elastic means that the computing resources leased can be increased or decreased dynamically, programmatically, in a short span of time and that organizations pay for just the resources that they use. Cloud resources are pooled because many different organizations use the same physical hardware; they share that hardware through virtualization. The cloud resources are accessed over the Internet, which refers to a set of standard ways of requesting and receiving services over the Internet. Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.1: Why are organizations moving to the cloud? Classification: Concept 16) Explain the relevance of cloud-based hosting today. Answer: Three factors have made cloud-based hosting advantageous today. First, processors, data communication, and data storage are so cheap that they are nearly free. Because data communication is so cheap, getting the data to and from that processor is also nearly free. Second, virtualization technology enables the near instantaneous creation of a new virtual machine. The customer provides (or creates in the cloud) a disk image of the data and programs of the machine it wants to provision. Virtualization software takes it from there. Finally, as stated, Internet-based standards enable cloud-hosting vendors to provide processing capabilities in flexible yet standardized ways. Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.1: Why are organizations moving to the cloud? Classification: Concept

5 Copyright © 2020 Pearson Education, Inc.


17) When does it not make sense to use cloud-based hosting infrastructure? Answer: Cloud-based hosting makes sense for most organizations. The only organizations for which it may not make sense are those that are required by law or by industry standard practice to have physical control over their data. Such organizations might be forced to create and maintain their own hosting infrastructure. A financial institution, for example, might be legally required to maintain physical control over its data. Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.1: Why are organizations moving to the cloud? Classification: Concept 18) Which of the following is an example of PaaS, a category of cloud hosting? A) Microsoft Office 365 B) Microsoft Azure C) iCloud D) Amazon S3 E) Skype Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.2: How do organizations use the cloud? Classification: Concept 19) Which of the following is an example of SaaS? A) iCloud B) Microsoft Azure C) Oracle On Demand D) Amazon S3 E) Google App Engine Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.2: How do organizations use the cloud? Classification: Concept

6 Copyright © 2020 Pearson Education, Inc.


20) Which of the following is the most basic cloud offering? A) SaaS B) CDN C) IaaS D) VPN E) SAS Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.2: How do organizations use the cloud? Classification: Concept 21) Layla runs a startup that makes custom engraved floor tiles. Her business is growing rapidly and she needs a cloud vendor to provide her with an operating system and a database management system. In this scenario, which of the following services will the vendor provide? A) CDN B) PaaS C) IaaS D) VPN E) Web hosting Answer: B Diff: 3 AACSB: Reflective Thinking Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.2: How do organizations use the cloud? Classification: Application 22) Jerry wants to use ________ so that he can add his own application on top of the hosted platform. A) Apple iCloud B) Amazon S3 C) Microsoft Azure D) Office 365 E) Skype Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.2: How do organizations use the cloud? Classification: Concept

7 Copyright © 2020 Pearson Education, Inc.


23) Which of the following is an example of IaaS? A) Apple iCloud B) Microsoft Azure C) Office 365 D) Amazon S3 E) Salesforce.com Answer: D Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.2: How do organizations use the cloud? Classification: Concept 24) Amazon S3 is an example of ________. A) CDN B) PaaS C) IaaS D) VPN E) SaaS Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.2: How do organizations use the cloud? Classification: Concept 25) ________ is a category of cloud hosting where vendors provide hosted computers with an operating system, runtime environment, and middleware like a Web server or a DBMS. A) SaaS B) PaaS C) IaaS D) BaaS E) TaaS Answer: B Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.2: How do organizations use the cloud? Classification: Concept

8 Copyright © 2020 Pearson Education, Inc.


26) ________ is a category of cloud hosting where vendors provide not only hardware infrastructure and an operating system but application programs and databases as well. A) SaaS B) PaaS C) IaaS D) BaaS E) TaaS Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.2: How do organizations use the cloud? Classification: Concept 27) ________ is a category of cloud hosting where vendors provide a bare server computer, data storage, network, and virtualization. A) SaaS B) PaaS C) IaaS D) BaaS E) TaaS Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.2: How do organizations use the cloud? Classification: Concept 28) All of the following are benefits of content delivery networks except ________. A) increased loadtime B) increased reliability C) pay-as-you-go D) reduced delivery costs for mobile users E) protection from DoS attacks Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.2: How do organizations use the cloud? Classification: Concept

9 Copyright © 2020 Pearson Education, Inc.


29) An organization that provides software as a service provides not only hardware infrastructure and an operating system but application programs and databases as well. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.2: How do organizations use the cloud? Classification: Concept 30) The most basic cloud offering is infrastructure as a service (IaaS) that is the cloud hosting of a bare server computer or data storage. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.2: How do organizations use the cloud? Classification: Concept 31) As a business professional, you will need to know the advantages and disadvantages of onpremise hosting. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.2: How do organizations use the cloud? Classification: Concept 32) Define SaaS, PaaS, and IaaS. Provide an example of each. Answer: An organization that provides software as a service (SaaS) provides not only hardware infrastructure, but also an operating system and application programs as well. For example, Salesforce.com provides programs for customer and sales tracking as a service. The second category of cloud hosting is platform as a service (PaaS), whereby vendors provide hosted computers, an operating system, and possibly a DBMS. Microsoft Windows Azure, for example, provides servers installed with Windows Server. Customers of Windows Azure then add their own applications on top of the hosted platform. The third category of cloud hosting is infrastructure as a service (IaaS) that is the cloud hosting of a bare server computer or disk drive. Amazon EC2 provides bare servers, and its Simple Storage Server provides, in essence, an unlimited, reliable disk drive in the cloud. Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.2: How do organizations use the cloud? Classification: Concept

10 Copyright © 2020 Pearson Education, Inc.


33) What are content delivery networks? Discuss some of its uses. Answer: A content delivery network (CDN) is a system of hardware and software that stores user data in many different geographical locations and makes those data available on demand. A CDN provides a specialized type of PaaS but is usually considered in its own category. A news organization could use a CDN to store copies of its news articles. The CDN vendor replicates articles on servers, possibly worldwide, so as to speed response time. In addition to news articles, CDNs are often used to store and deliver content that seldom changes. For example, the company banner on an organization's Web page might be stored on many CDN servers. Various pieces of the Web page could be obtained from different servers on the CDN. Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.2: How do organizations use the cloud? Classification: Concept 34) A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly. A) database B) application C) network D) server E) processor Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept 35) Which of the following features distinguishes a LAN from a WAN? A) A LAN connects computers in a single location. B) A WAN has a limit on the number of users. C) A WAN has low bandwidth. D) A LAN has stringent hardware requirements. E) A LAN is bigger than a WAN. Answer: A Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


36) Tristom Technologies, based in New York, opens branches in Chicago and Detroit. Which of the following networks will the company use to connect computers in the three offices? A) WAN B) LAN C) URL D) XML E) HTML Answer: A Diff: 2 AACSB: Reflective Thinking Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Application 37) Zapstreet is a stock brokering firm. Its employees use a private network within the organization to communicate with each other regarding stock prices and trading accounts. Zapstreet's network is an example of a(n) ________. A) Ethernet B) intranet C) cloud D) server E) WLAN Answer: B Diff: 2 AACSB: Reflective Thinking Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Application 38) A ________ is a set of rules and data structures for organizing communication. A) codec B) cloud C) packet D) protocol E) syntax Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept

12 Copyright © 2020 Pearson Education, Inc.


39) To enable a seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used. A) layered protocol B) virtual private network C) three-tier system D) remote access system E) virtual LAN Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept 40) The ________ protocol standard is also known as Ethernet. A) Bluetooth B) IEEE 802.11 C) IEEE 802.3 D) DSL E) X25 Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept 41) Which of the following statements is TRUE about IEEE 802.3? A) It is the protocol for wireless LAN connections. B) It is the protocol for Bluetooth. C) It is the protocol for wired LAN connections. D) It is the universal standard protocol for all WAN connections. E) It is the protocol for optical fiber rings. Answer: C Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept

13 Copyright © 2020 Pearson Education, Inc.


42) For communications equipment, K stands for ________. A) 1,000 B) 1,024 C) 100 D) 1,042 E) 10,000 Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept 43) Maxwell Insurance recently got its communication network updated to the IEEE 802.11ac protocol. Which of the following is TRUE of this protocol? A) It is also known as Ethernet. B) It is used for wired LAN connections. C) It cannot be processed by access points. D) It allows speeds of up to 1.3 Gbps. E) It defines high-speed infrared connections. Answer: D Diff: 2 AACSB: Reflective Thinking Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Application 44) A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ________ per second. A) megabytes B) megabits C) kilobytes D) kilobits E) zetabits Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept

14 Copyright © 2020 Pearson Education, Inc.


45) For communications equipment, M stands for ________. A) 1,000 B) 1,024 C) 1,000,000 D) 500 E) 15,000 Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept 46) ________ is a wireless protocol designed for transmitting data over short distances, replacing cables. A) IPv6 B) PaaS C) Bluetooth D) IPv4 E) 802.5 Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept 47) Which of the following is a function of an Internet service provider? A) It transmits data over short distances, replacing cables. B) It serves as a user's gateway to the Internet. C) It describes how messages must be processed for wired transmission. D) It connects computers within a LAN. E) It converts analog signals to binary signals. Answer: B Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept

15 Copyright © 2020 Pearson Education, Inc.


48) Which of the following statements is TRUE of digital subscriber line signals? A) Digital subscriber line signals do not interfere with telephone signals. B) Digital subscriber line signals use the same protocols as cable modems for data transmission. C) Digital subscriber line signals replace phone signals and are sent to the ISP. D) Digital subscriber line signal data transmission and telephone conversations cannot occur simultaneously. E) Digital subscriber lines use single-mode optical fiber only. Answer: A Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept 49) Carol uses a high-speed internet connection at home. Her connection is supported by the television line, but it does not interfere with the television signal. Carol uses a(n) ________ connection. A) DSL B) dial-up C) cable D) ADSL E) satellite Answer: C Diff: 2 AACSB: Reflective Thinking Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Application 50) Which of the following statements is TRUE about cable lines? A) They provide high-speed data transmission using telephone cables. B) They offer consistent performance irrespective of the number of users sending and receiving data. C) They rely on high-capacity optical fiber cables and use their own protocols for data transmission. D) They provide faster download speeds than DSL modems. E) They provide faster download speeds than OC128 lines. Answer: C Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


51) If you use your smart phone as a hotspot to connect to the Internet on your tablet you are using a ________. A) personal area network B) local area network C) wide area network D) metro area network E) satellite Answer: A Diff: 1 AACSB: Reflective Thinking Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Application 52) A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept 53) With a WAN, an organization is allowed to place communications lines wherever it wants because all lines reside on its premises. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept 54) An Internet is a network of networks that connects LANs, WANs, and other internets. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept 55) An intranet is a private internet that is used exclusively within an organization. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept 17 Copyright © 2020 Pearson Education, Inc.


56) Bluetooth is a common wireless protocol used to make PAN connections. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept 57) The World Wide Web sponsors committees that create and publish protocol and other standards. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept 58) Wired LAN connections use a protocol standard called Ethernet to communicate. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept 59) The committee that addresses LAN standards is called IEEE 802 Committee. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept 60) When a person connects to the Internet, he or she is actually connecting to an Internet service provider. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept

18 Copyright © 2020 Pearson Education, Inc.


61) Because DSL signals interfere with telephone signals, DSL data transmission and telephone conversations cannot occur simultaneously. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept 62) Wireless internet standards do not change. Answer: FALSE Diff: 1 AACSB: Reflective Thinking Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Application 63) What is a computer network? What are the various types of networks? Answer: A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly. A local area network (LAN) connects computers that reside in a single geographic location on the premises of the company that operates the LAN. The number of connected computers can range from two to several hundred. The distinguishing characteristic of a LAN is a single location. A wide area network (WAN) connects computers at different geographic locations. The computers in two separated company sites must be connected using a WAN. An internet is a network of networks. Internets connect LANs, WANs, and other internets. The most famous internet is "the Internet." In addition to the Internet, private networks of networks, called internets, also exist. A private internet that is used exclusively within an organization is sometimes called an intranet. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept 64) Discuss wireless LAN and PAN connections. Answer: Wireless LAN connections use the IEEE 802.11 protocol. Several versions of 802.11 exist, and as of 2016, the most current one is IEEE 802.11ac. The current standard, 802.11ac, allows speeds of up to 1.3 Gbps, though few users have an Internet connection fast enough to take full advantage of that speed. Bluetooth is another common wireless protocol used to make PAN connections. It is designed for transmitting data over short distances, replacing cables. Devices, such as wireless mice, keyboards, printers, and headphones, use Bluetooth to connect to desktop computers. Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.3: What network technology supports the cloud? Classification: Concept 19 Copyright © 2020 Pearson Education, Inc.


65) List the functions of an Internet service provider (ISP). Answer: An ISP has three important functions. First, it provides the user with a legitimate Internet address. Second, it serves as the user's gateway to the Internet. The ISP receives the communications from the user's computer and passes them on to the Internet, and it receives communications from the Internet and passes them on to the user. Finally, ISPs pay for the Internet. They collect money from their customers and pay access fees and other charges on the user's behalf. Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept 66) What is a digital subscriber line (DSL)? Answer: Digital subscriber lines (DSLs) operate on the same lines as voice telephones, but they operate so that their signals do not interfere with voice telephone service. Because DSL signals do not interfere with telephone signals, DSL data transmission and telephone conversations can occur simultaneously. A device at the telephone company separates the phone signals from the computer signals and sends the latter signal to the ISP. Digital subscriber lines use their own protocols for data transmission. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.3: What network technology supports the cloud? Classification: Concept 67) A ________ is a formatted message that passes through networks. A) codec B) protocol C) package D) packet E) SLACC Answer: D Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.4: How does the Internet work? Classification: Application

20 Copyright © 2020 Pearson Education, Inc.


68) A ________ is a worldwide-unique term that is affiliated with a public IP address. A) URL B) domain name C) packet D) hyperlink E) DNF Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.4: How does the Internet work? Classification: Concept 69) A(n) ________ is a number that identifies a particular device. A) domain B) IP address C) hyperlink D) WSDL E) NIP Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.4: How does the Internet work? Classification: Concept 70) Which of the following is the most common format for IP addresses? A) IPv4 B) TCP C) IPv6 D) http E) IPF Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.4: How does the Internet work? Classification: Concept

21 Copyright © 2020 Pearson Education, Inc.


71) The organization responsible for assigning public IP addresses is called ________. A) CERN B) IEEE C) ICANN D) ISO E) USIPA Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.4: How does the Internet work? Classification: Concept 72) Vivian wants to book a suite at Baron & Olufsen, a luxury hotel chain in Europe, for her brief stay in Austria. When she visits the Web page, the address bar reads http://www.baronolufsen.com/. This information is the ________ of the Web page. A) URL B) IP address C) protocol D) email ID E) MAC address Answer: A Diff: 3 AACSB: Reflective Thinking Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.4: How does the Internet work? Classification: Application 73) The ________ is a core Internet protocol that guarantees the reliable delivery of packets. A) FTP B) HTML C) IP D) UDP E) TCP Answer: E Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.4: How does the Internet work? Classification: Application

22 Copyright © 2020 Pearson Education, Inc.


74) Large carriers like Sprint, AT&T, and XO Communications exchange Internet traffic freely at physical locations called ________. A) Internet hubs B) Internet exchange points C) Internet cross points D) Internet way points E) Internet processing points Answer: B Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.4: How does the Internet work? Classification: Application 75) Where does the cloud reside? A) in the Internet B) inside the browser C) on a PC D) at the local TELCO E) underground Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.4: How does the Internet work? Classification: Concept 76) All of the following applications create the contents of a packet except ________. A) Word B) Firefox C) Skype D) Filezilla E) Safari Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.4: How does the Internet work? Classification: Concept

23 Copyright © 2020 Pearson Education, Inc.


77) ________ is the principle that all data is treated equally. A) Fair play B) Net neutrality C) Equal access D) IP E) ISP Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.4: How does the Internet work? Classification: Concept 78) In 2015, the Federal Communications Commission approved new net neutrality regulations, making the Internet more ________. A) expensive B) a network C) like a utility D) controlling E) safer Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.4: How does the Internet work? Classification: Concept 79) In 2017, the FCC reversed the 2015 ruling on net neutrality classifying the Internet as ________. A) an information service B) a network C) a utility D) old E) a luxury Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.4: How does the Internet work? Classification: Concept

24 Copyright © 2020 Pearson Education, Inc.


80) Assignment of both public and private IP addresses is controlled by ICANN. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.4: How does the Internet work? Classification: Concept 81) The owner of a domain name can change the affiliated IP addresses at its discretion. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.4: How does the Internet work? Classification: Concept 82) A URL consists of a protocol followed by a domain name or public IP address. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.4: How does the Internet work? Classification: Concept 83) In order to get on the Internet, every device must have access to a public IP address. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.4: How does the Internet work? Classification: Concept 84) With the 2017 FCC ruling ISPs could manage the flow of network traffic over their networks. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.4: How does the Internet work? Classification: Concept

25 Copyright © 2020 Pearson Education, Inc.


85) Compare the movement of packages in the U.S. postal system to the movement of packets through the Internet. Answer: The Internet works much like the U.S. postal system in that both systems transport things from one location to another. The Internet transports email, while the U.S. postal system sends paper mail. Packets wind their way through the Internet much the same way packages wind their way through the U.S. postal system. Names are like domain names; a phone book is like DNS; mailing addresses are like IP addresses; registered mail is like TCP; airlines are like carriers; and airports are like routers. Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.4: How does the Internet work? Classification: Concept 86) What is an IP address? Describe the advantages of private and public IP addresses. Answer: An IP address is a number that identifies a particular device. Public IP addresses identify a particular device on the public Internet. Because public IP addresses must be unique, worldwide, their assignment is controlled by a public agency known as ICANN (Internet Corporation for Assigned Names and Numbers). Private IP addresses identify a particular device on a private network, usually on a LAN. Their assignment is controlled within the LAN. The private/public IP address scheme has two major benefits. First, public IP addresses are conserved. All of the computers on the LAN use only one public IP address. Second, by using private IP addresses, one is protected from attackers directly attacking him or her because attackers cannot send attack packs to private IP addresses. They can only send attacks to devices with public IP addresses. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.4: How does the Internet work? Classification: Concept 87) Which of the following refers to the three tiers in the three-tier architecture? A) TCP, IP, and http B) HTML, XML, and JSON C) user, server, and database D) tunnel, switch, and access point E) IP, IPv4, and IPv6 Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.5: How do web servers support the cloud? Classification: Concept

26 Copyright © 2020 Pearson Education, Inc.


88) The ________ tier of the three-tier architecture consists of computers, phones, and other mobile devices that have browsers that request and process Web pages. A) user B) server C) database D) data link E) mainframe Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.5: How do web servers support the cloud? Classification: Concept 89) ________ are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients. A) Web servers B) Web browsers C) Server farms D) Server racks E) VPNs Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.5: How do web servers support the cloud? Classification: Concept 90) The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture. A) ftp B) smtp C) http D) TCP/IP E) telnet Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.5: How do web servers support the cloud? Classification: Concept

27 Copyright © 2020 Pearson Education, Inc.


91) Which of the following protocols guarantees secure data transmission? A) http B) ftp C) https D) smtp E) IP Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.5: How do web servers support the cloud? Classification: Concept 92) Which of the following TCP/IP application-layer protocols is used for email transmissions? A) ftp B) https C) smtp D) IP E) UDP Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.5: How do web servers support the cloud? Classification: Concept 93) Which of the following TCP/IP application-layer protocols is used to move files over the Internet and maintain Web sites? A) ftp B) smtp C) https D) http E) rdp Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.5: How do web servers support the cloud? Classification: Concept

28 Copyright © 2020 Pearson Education, Inc.


94) ________ contains much metadata that can be used to validate the format and completeness of the document, but includes considerable overhead. A) WSDL B) SOAP C) JSON D) XML E) RTP Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.5: How do web servers support the cloud? Classification: Concept 95) ________ is a standard for describing the services, inputs and outputs, and other data supported by a Web service. A) WSDL B) SOAP C) JSON D) XML E) RTP Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.5: How do web servers support the cloud? Classification: Concept 96) Derek, a Web designer, works for a pharmaceutical company. He uploads information about the company's products on to its official Web site. Which of the following will Derek use to transmit data from the company's server to its Web site? A) WSDL B) SOAP C) JSON D) XML E) RTP Answer: C Diff: 3 AACSB: Reflective Thinking Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.5: How do web servers support the cloud? Classification: Application

29 Copyright © 2020 Pearson Education, Inc.


97) A ________ is an application program that runs on a server-tier computer and manages processes such as items in a shopping cart. A) database tier B) web server C) database D) commerce server Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.5: How do web servers support the cloud? Classification: Concept 98) TCP/IP protocol architecture is a scheme of protocol types arranged in four layers. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.5: How do web servers support the cloud? Classification: Concept 99) Https is the secure version of http. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.5: How do web servers support the cloud? Classification: Concept 100) SOAP is a protocol for requesting Web services and for sending responses to Web service requests. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.5: How do web servers support the cloud? Classification: Concept 101) Ftp is the protocol used mainly for email transmissions. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.5: How do web servers support the cloud? Classification: Concept

30 Copyright © 2020 Pearson Education, Inc.


102) Unlike ftp, http does not have a secure version. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.5: How do web servers support the cloud? Classification: Concept 103) Web servers are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.5: How do web servers support the cloud? Classification: Concept 104) Every organization uses the cloud well. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.5: How do web servers support the cloud? Classification: Concept 105) Describe the three-tier architecture for Web applications such as e-commerce. Answer: The three-tier architecture is an arrangement of user computers and servers into three categories, or tiers. The user tier consists of computers, phones, and other mobile devices that have browsers that request and process Web pages. The server tier consists of computers that run Web servers and process application programs. The database tier consists of computers that run a DBMS that processes requests to retrieve and store data. Web servers are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients. A commerce server is an application program that runs on a server-tier computer. Typical commerce server functions are to obtain product data from a database, manage the items in a shopping cart, and coordinate the checkout process. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.5: How do web servers support the cloud? Classification: Concept

31 Copyright © 2020 Pearson Education, Inc.


106) Discuss TCP/IP Protocol Architecture, and define Internet protocols. Answer: The basic plumbing of the Internet is governed by protocols that are defined according to an arrangement called the TCP/IP protocol architecture. This architecture has five layers; one or more protocols are defined at each layer. Data communications and software vendors write computer programs that implement the rules of a particular protocol. The Internet protocols that a business professional is likely to encounter are as follows: Hypertext Transfer Protocol (http) is the protocol used between browsers and Web servers. Whenever a browser such as Microsoft Edge, Safari, or Chrome is used, a program that implements the http protocol is being used. A secure version of http is called https. Simple Mail Transfer Protocol, or smtp, is used for email transmissions (along with other protocols). File Transfer Protocol, or ftp, is used to move files over the Internet. Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.5: How do web servers support the cloud? Classification: Concept 107) Small companies usually lack the technical expertise and management to load operating systems onto servers acquired via the cloud. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.6: How can eHermes use the cloud? Classification: Concept 108) The connection between a VPN client and a VPN server is called a(n) ________. A) data highway B) hyperlink C) tunnel D) access point E) bridge Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.7: How can organizations use cloud services securely? Classification: Concept

32 Copyright © 2020 Pearson Education, Inc.


109) Which of the following statements is TRUE about a VPN? A) A VPN client software encrypts messages to ensure secure transmissions. B) A VPN network does not provide users with remote access. C) A VPN connection utilizes private networks instead of the public network. D) A VPN connection appears as a secure connection, though it is not. E) A VPN is only used between hosts on local networks. Answer: A Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.7: How can organizations use cloud services securely? Classification: Concept 110) A(n) ________ uses the Internet to create the appearance of private, secure connections. A) VPN B) ISP C) URL D) DSL E) ASP Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.7: How can organizations use cloud services securely? Classification: Concept 111) A ________ is a cloud that is owned and operated by an organization for its own benefit. A) private cloud B) virtual private network C) wide area network D) service as a cloud E) IPX/SPX Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.7: How can organizations use cloud services securely? Classification: Concept

33 Copyright © 2020 Pearson Education, Inc.


112) ABC, Inc wants to securely share electronic documents internally with the employees. The best way to implement this strategy is to ________. A) create a private cloud B) use Google docs C) send documents via interoffice mail D) use an access point E) create a bridge Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.7: How can organizations use cloud services securely? Classification: Concept 113) To ensure security, the VPN client software decrypts the original message so that its contents are protected from snooping. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.7: How can organizations use cloud services securely? Classification: Concept 114) What is a private cloud? Describe how a private cloud is created and the security it provides? Answer: A private cloud is a cloud owned and operated by an organization for its own benefit. To create a private cloud, the organization creates a private internet and designs applications using accepted Web services standards. A private cloud consists of a farm of servers and manages those servers with elastic load balancing just as the cloud service vendors do. Private clouds provide security within the organizational infrastructure but do not provide secure access from outside that infrastructure. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different ways of connecting to the Internet LO: 6.7: How can organizations use cloud services securely? Classification: Concept

34 Copyright © 2020 Pearson Education, Inc.


115) Soon more companies may use ________ to help analyze the mountains of big data they're collecting. A) EaaS B) AaaS C) IaaS D) PaaS E) PBaaS Answer: B Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.8: 2029? Classification: Concept 116) ________ is information systems that provide computer-based activity or action at a distance. A) Google's Project Loon B) Remote action systems C) Google Fiber D) Office 365 E) Hudl Answer: B Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.8: 2029? Classification: Concept 117) What are remote action systems? Explain with the help of examples. Answer: Remote action systems provide computer-based activity or action at a distance. By enabling action at a distance, remote action systems save time and travel expense and make the skills and abilities of an expert available in places where he or she is not physically located. They also enable experts to scale their expertise. Remote action systems include telediagnosis, telesurgery, and telelaw enforcement. Telediagnosis is a remote action system that health care professionals use to diagnose illness for rural or remote areas. Telesurgery uses telecommunications to link surgeons to robotic equipment at distant locations. Telelaw enforcement, such as the RedFlex system, uses cameras and motion-sensing equipment to issue tickets for red-light and speeding violations. Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 6.8: 2029? Classification: Concept

35 Copyright © 2020 Pearson Education, Inc.


Using MIS, 11e (Kroenke) Chapter 7 Collaboration Information Systems 1) ________ is a group of people working together, all doing essentially the same work to accomplish a job. A) Cooperation B) Collaboration C) Team work D) Working together E) Strategists Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.1: What are the two key characteristics of collaboration? Classification: Concept 2) ________ is a group of people working together to achieve a common goals via a process of feedback and iteration. A) Cooperation B) Collaboration C) Team work D) Working together E) Strategists Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.1: What are the two key characteristics of collaboration? Classification: Concept 3) Jerry is in a group that only provides positive feedback because of group cohesion. Jerry is concerned the group is participating in ________. A) cooperation B) collaboration C) groupthink D) criticism E) a feedback loop Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.1: What are the two key characteristics of collaboration? Classification: Concept

1 Copyright © 2020 Pearson Education, Inc.


4) All of the following are characteristics of an effective collaborator except ________. A) is a popular leader B) is open-minded C) is willing to enter difficult conversations D) is known for following through on commitments E) is curious Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.1: What are the two key characteristics of collaboration? Classification: Concept 5) Jack is frustrating his team because the feedback he provided for the last set of project documents was "this document is a mess". Jack's feedback was ________. A) unconstructive B) specific C) goal oriented D) timely E) much needed Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.1: What are the two key characteristics of collaboration? Classification: Concept 6) Constructive criticism is both ________ advice given to improve an outcome. A) unconstructive and negative B) positive and negative C) positive and collaborative D) timely and favorable E) effective and negative Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.1: What are the two key characteristics of collaboration? Classification: Concept

2 Copyright © 2020 Pearson Education, Inc.


7) The two key characteristics of collaboration are iteration and feedback. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.1: What are the two key characteristics of collaboration? Classification: Concept 8) A cooperative group can accomplish a given task faster and at a higher quality than an individual. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.1: What are the two key characteristics of collaboration? Classification: Concept 9) For most groups, success is achieved when group members are able to give both favorable and critical feedback. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.1: What are the two key characteristics of collaboration? Classification: Concept 10) What are the guidelines for giving and receiving constructive criticism? Answer: The guidelines for giving constructive criticism are be specific, offer suggestions, avoid personal comments, and set positive goals. The guidelines for accepting constructive criticism is question your emotions, do not dominate, and demonstrate a commitment to the group. Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.1: What are the two key characteristics of collaboration? Classification: Concept 11) What is the difference between collaboration and cooperation? Answer: Cooperation is a group of people working together, all doing essentially the same type of work, to accomplish a job. Collaboration as a group of people working together to achieve a common goal via a process of feedback and iteration. Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.1: What are the two key characteristics of collaboration? Classification: Concept 3 Copyright © 2020 Pearson Education, Inc.


12) Most student teams are concerned with ________. The first criterion for a successful team. A) successful outcomes B) being on time C) getting better D) growth in team capability E) meaningful and satisfying experience Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.2: What are three criteria for successful collaboration? Classification: Concept 13) Because of growth in team capability, over time the team becomes more ________ and over time can perform the same service for less cost. A) stable B) efficient C) cohesive D) able to report tasks E) loyal to the organization Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.2: What are three criteria for successful collaboration? Classification: Concept 14) One aspect of team satisfaction is ________. A) a high salary B) efficiency C) camaraderie D) loyalty to the team manager E) team growth Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.2: What are three criteria for successful collaboration? Classification: Concept

4 Copyright © 2020 Pearson Education, Inc.


15) Which of the following is vitally important to a meaningful work experience? A) Teaching other team members tasks. B) Having a successful outcome C) Recognizing individuals for their contribution to the team. D) Promotion opportunities. E) Shortening the learning curve for new activities. Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.2: What are three criteria for successful collaboration? Classification: Concept 16) How do teams get better? Answer: How does a team get better? For one, it develops better work processes. Activities are combined or eliminated. Linkages are established so that "the left hand knows what the right hand is doing" or needs or can provide. Teams also get better as individuals improve at their tasks. Part of that improvement is the learning curve; as someone does something over and over, he or she gets better at it. But team members also teach task skills and give knowledge to one another. Team members also provide perspectives that other team members need. Diff: 3 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.2: What are three criteria for successful collaboration? Classification: Concept 17) List the three criteria for successful collaboration. Answer: The three criteria for successful collaboration are successful outcome, growth in team capability, and meaningful and satisfying experience. Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.2: What are three criteria for successful collaboration? Classification: Concept 18) All of the following are four primary purposes of collaboration except ________. A) become informed B) make decisions C) solve problems D) camaraderie E) manage projects Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.3: What are the four primary purposes of collaboration? Classification: Concept 5 Copyright © 2020 Pearson Education, Inc.


19) ________ is a necessary task in keeping the team informed because team membership can change. A) Frequent team members B) A daily newsletter C) Micromanagement D) Goal setting E) Keeping documentation Answer: E Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.3: What are the four primary purposes of collaboration? Classification: Concept 20) ________ are those that support operational day-to-day activities. A) Operational decisions B) Managerial decisions C) Strategic decisions D) Snap decisions E) Allocation resources Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.3: What are the four primary purposes of collaboration? Classification: Concept 21) ________ are those that support broad-scope, organizational issues. A) Operational decisions B) Managerial decisions C) Strategic decisions D) Snap decisions E) Allocation resources Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.3: What are the four primary purposes of collaboration? Classification: Concept

6 Copyright © 2020 Pearson Education, Inc.


22) The manager of ABC, Inc decides to order the same number of widgets this year as last year. The manager has made a(n) ________ decision. A) informed B) structured C) gut D) regular E) centralized Answer: B Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.3: What are the four primary purposes of collaboration? Classification: Concept 23) If there is not an agreed-on-decision-making method a person is dealing with ________. A) operational decisions B) managerial decisions C) strategic decisions D) unstructured decision E) structured decision Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.3: What are the four primary purposes of collaboration? Classification: Concept 24) What types of decisions tend to be made at the operational level? A) operational decisions B) managerial decisions C) strategic decisions D) unstructured decisions E) structured decisions Answer: E Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.3: What are the four primary purposes of collaboration? Classification: Concept

7 Copyright © 2020 Pearson Education, Inc.


25) What is the most important task for a problem-solving collaborative group? A) Deciding if the problem is structured or unstructured B) Making decisions C) Breaking the problem down into pieces D) Defining the problem E) Solving the problem Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.3: What are the four primary purposes of collaboration? Classification: Concept 26) All of the following are part of problem-solving tasks except ________. A) define the problem B) increase revenues C) specify evaluation criteria D) implement solutions E) evaluate alternatives Answer: B Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.3: What are the four primary purposes of collaboration? Classification: Concept 27) Which of the following happens during the starting phase of project management? A) Establish team rules. B) Assign tasks. C) Solve problems. D) Determine completion E) Revise budget Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.3: What are the four primary purposes of collaboration? Classification: Concept

8 Copyright © 2020 Pearson Education, Inc.


28) Which of the following happens during the planning phase of project management? A) Perform project tasks. B) Revise budget. C) Form the team. D) Document and report progress. E) Disband team. Answer: B Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.3: What are the four primary purposes of collaboration? Classification: Concept 29) Which of the following happens during the doing phase of project management? A) Set team authority. B) Determine dependencies. C) Reschedule tasks as necessary. D) Determine completion. E) Plan the budget. Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.3: What are the four primary purposes of collaboration? Classification: Concept 30) Which of the following happens during the finalizing phase of project management? A) Prepare archival documents. B) Solve problems. C) Establish team roles. D) Determine schedule. E) Update project budget. Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.3: What are the four primary purposes of collaboration? Classification: Concept

9 Copyright © 2020 Pearson Education, Inc.


31) What is the fundamental purpose of the starting phase? A) To prepare documents. B) To set the ground rules for the project. C) To let everyone know the project is beginning. D) To identify who does what. E) To create alternative tasks. Answer: B Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.3: What are the four primary purposes of collaboration? Classification: Concept 32) Decisions are made at four levels. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.3: What are the four primary purposes of collaboration? Classification: Concept 33) Managerial decisions tend to be structured and unstructured. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.3: What are the four primary purposes of collaboration? Classification: Concept 34) List the problem-solving tasks when managing projects. Answer: 1) Define the problem. 2) Identify alternative solutions 3) Specify evaluation criteria 4) Evaluate alternatives 5) Select an alternative and 6) Implement solution Diff: 3 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.3: What are the four primary purposes of collaboration? Classification: Concept

10 Copyright © 2020 Pearson Education, Inc.


35) List the four phases and the main purpose of each phase. Answer: The fundamental purpose of the starting phase is to set the ground rules for the project and the team. The purpose of the planning phase is to determine "who will do what and by when." Work activities are defined, and resources such as personnel, budget, and equipment are assigned to them. Project tasks are accomplished during the doing phase. For the finalizing phase. Are we done? This question is an important and sometimes difficult one to answer. If work is not finished, the team needs to define more tasks and continue the doing phase. If the answer is yes, then the team needs to document its results, document information for future teams, close down the project, and disband the team. Diff: 3 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.3: What are the four primary purposes of collaboration? Classification: Concept 36) ________ data is part of the collaboration's work product. A) Project B) Metadata C) New D) Big E) Tasks Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.4: What are the requirements for a collaboration information system? Classification: Concept 37) ________ is used to manage the product. A) Project data B) Metadata C) New data D) Big data E) Tasks data Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.4: What are the requirements for a collaboration information system? Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


38) All of the following are examples of project metadata except ________. A) hardware serial numbers B) schedules C) tasks D) budgets E) managerial data Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.4: What are the requirements for a collaboration information system? Classification: Concept 39) All of the following are considered collaboration programs except ________. A) email B) text messaging C) Google Docs D) OneDrive E) Microsoft Word Answer: E Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.4: What are the requirements for a collaboration information system? Classification: Concept 40) A collaboration information system is an information system that supports collaboration. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.4: What are the requirements for a collaboration information system? Classification: Concept 41) For doing work on time and on budget, teams need support from their collaboration system. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.4: What are the requirements for a collaboration information system? Classification: Concept

12 Copyright © 2020 Pearson Education, Inc.


42) Collaboration information system do not specify standards, and techniques for conducting the team's work. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.4: What are the requirements for a collaboration information system? Classification: Concept 43) Provide a brief overview of the five components of an IS for collaboration system. Answer: As information systems, collaboration systems have the five components of every information system: hardware, software, data, procedures, and people. Concerning hardware, every team member needs a device for participating in the group's work, either a personal computer or a mobile device like an iPad. conducting the team's work. Collaboration programs are applications like email or text messaging, Google Docs, Microsoft Office Online, and other tools that support collaborative work In addition, because teams need to share data, most collaboration systems store documents and other files on a server like Google Drive or Microsoft. Regarding the data component, collaboration involves two types. Project data is data that is part of the collaboration's work product. Project metadata is data used to manage the project. Schedules, tasks, budgets, and other managerial data are examples of project metadata. Both types of data, by the way, are subject to iteration and feedback. Collaboration information systems procedures specify standards, policies, and techniques for. The final component of a collaboration system is, of course, people. Diff: 3 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.4: What are the requirements for a collaboration information system? Classification: Concept 44) Because of the need to provide feedback, ________ is/are essential to every collaborative project. A) good management skills B) meetings C) tasks D) team communication E) metadata Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.5: How can you use collaboration tools to improve team communication? Classification: Concept

13 Copyright © 2020 Pearson Education, Inc.


45) All of the following are criterion for team success when using a collaboration IS except ________. A) completing the work on time B) completing the work within budget C) growth in team capability D) satisfying experience E) non-meaningful experience Answer: E Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.5: How can you use collaboration tools to improve team communication? Classification: Concept 46) ________ occurs when all team members meet at the same time. A) Synchronous communication B) Asynchronous communication C) History D) Team communication E) Manage projects efficiently Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.5: How can you use collaboration tools to improve team communication? Classification: Concept 47) ________ occurs when all team members do not meet at the same time. A) Synchronous communication B) Asynchronous communication C) History D) Team communication E) Manage projects efficiently Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.5: How can you use collaboration tools to improve team communication? Classification: Concept

14 Copyright © 2020 Pearson Education, Inc.


48) Mary's team is located in different countries. Because of the time zone differences, it is difficult for the team to meet all together so their meetings are conducted ________. A) synchronously B) asynchronously C) at the same time D) when Mary can meet because she is the leader E) the end of the project is reached Answer: B Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.5: How can you use collaboration tools to improve team communication? Classification: Concept 49) ________ occur when participants do not meet in the same place and possibly not at the same time. A) Workspaces B) Meetings C) Virtual meetings D) Shared spaces E) Networking Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.5: How can you use collaboration tools to improve team communication? Classification: Concept 50) Jason wanted to have a virtual meeting where all participants could participate simultaneously so he opted to use ________. A) a screen-sharing application B) the same computer C) a webinar D) videoconferencing E) discussion forum Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.5: How can you use collaboration tools to improve team communication? Classification: Concept

15 Copyright © 2020 Pearson Education, Inc.


51) A ________ is a virtual meeting in which attendees view one of the attendees' computer screens for a more formal and organized presentation. A) a screen-sharing application B) the same computer C) a webinar D) videoconferencing E) discussion forum Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.5: How can you use collaboration tools to improve team communication? Classification: Concept 52) Pam purchased video cameras for all of her employees so they can participate in ________. A) a screen-sharing application B) the same computer C) a webinar D) videoconferencing E) discussion forum Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.5: How can you use collaboration tools to improve team communication? Classification: Concept 53) Using emails to communicate asynchronously is not a good idea for all of the reasons below except ________. A) email threads are organized B) too much freedom C) difficult to find particular emails D) it is easy to hide from email E) difficulty in finding attachments Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.5: How can you use collaboration tools to improve team communication? Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


54) If one group member posts an entry and the other group members respond to that post the group is most likely participating in ________. A) a discussion forum B) an email thread C) a webinar D) a videoconference E) Google Hangout Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.5: How can you use collaboration tools to improve team communication? Classification: Concept 55) Stan uses a ________ because wants to gather the team's opinion on where the next milestone meeting should be located. A) Skype call B) WebEx C) team survey D) videoconference E) discussion forum Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.5: How can you use collaboration tools to improve team communication? Classification: Concept 56) Communication is important to manage content, project tasks, and other requirements. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.5: How can you use collaboration tools to improve team communication? Classification: Concept 57) Face-to-face meetings require a lot of applications to be successful. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.5: How can you use collaboration tools to improve team communication? Classification: Concept

17 Copyright © 2020 Pearson Education, Inc.


58) Virtual meetings area always asynchronous. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.5: How can you use collaboration tools to improve team communication? Classification: Concept 59) What are the issues with using emails for communication? Answer: The problem with email is that there is too much freedom. Not everyone will participate because it is easy to hide from email. Email threads become disorganized and disconnected. After the fact, it is difficult to find particular emails, comments, or attachments. Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.5: How can you use collaboration tools to improve team communication? Classification: Concept 60) List at least four types of virtual meetings. Answer: Four types of virtual meetings are 1) screen sharing applications 2) webinars 3) videoconferencing and 4) discussion forums Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.5: How can you use collaboration tools to improve team communication? Classification: Concept 61) List the four types of team purposes along with at least two requirements for each purpose. Answer: The four types of team purposes for collaboration are become informed, make decisions, solve problems, and manage projects. Requirements for each purpose include: 1) Become informed: share data, support group communication, manage project tasks, and store history. 2) Make decisions: share decision criteria, alternative descriptions, evaluation tools, evaluation results, and implementation plan; support group communication; manage project tasks; publish decisions, store analysis and results. 3) Solve problems: share problem definitions, solution alternatives, costs and benefits; alternative evaluations, and solution implementation plan; support group communication; manage project tasks; publish problem and solution; and store problem definition, alternatives, analysis, and plan. 4) Manage projects: support starting, planning, doing, and finalizing project phases; support group communication; and manage project tasks. Diff: 3 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.5: How can you use collaboration tools to improve team communication? Classification: Concept

18 Copyright © 2020 Pearson Education, Inc.


62) Which desktop application would be best suited for photos? A) Adobe Photoshop B) Microsoft Office C) Google SketchUp D) Sharepoint E) Excel Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.6: How can you use collaboration tools to manage shared content? Classification: Concept 63) Which application below is an open-source, license free product? A) Camtasia B) Adobe Photoshop C) OpenOffice D) Word E) Microsoft Office Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.6: How can you use collaboration tools to manage shared content? Classification: Concept 64) Which application processes PDF files? A) Camtasia B) Adobe Photoshop C) Adobe Acrobat D) Word E) Microsoft Office Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.6: How can you use collaboration tools to manage shared content? Classification: Concept

19 Copyright © 2020 Pearson Education, Inc.


65) Which application would one use to process photos? A) Google Drive B) Microsoft Word C) Microsoft SharePoint D) Dropbox E) Google Picasa Answer: E Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.6: How can you use collaboration tools to manage shared content? Classification: Concept 66) Sally saves her files using OpenOffice. What is the name of her file? A) TeamDoc.odt B) TeamDoc.docx C) TeamDoc.xls D) TeamDoc.drp E) TeamDoc.zip Answer: A Diff: 3 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.6: How can you use collaboration tools to manage shared content? Classification: Concept 67) A computer that stores shared files is called a ________. A) file server B) hard drive C) desktop PC D) USB drive E) group drive Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.6: How can you use collaboration tools to manage shared content? Classification: Concept

20 Copyright © 2020 Pearson Education, Inc.


68) If a document is stored on a file server but team members can edit the document anonymously, the content on the file server is ________. A) shared with the public B) shared content with no control C) shared content with version management D) shared content with version control E) shared on Google drive Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.6: How can you use collaboration tools to manage shared content? Classification: Concept 69) ________ track(s) changes to documents and provide features and functions to accommodate concurrent work. A) Version management B) Microsoft Word C) Version control D) Sharing content E) Using a file server will Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.6: How can you use collaboration tools to manage shared content? Classification: Concept 70) ________ occurs when the collaboration tool limits and sometimes even directs user activity. A) Version management B) Microsoft Word C) Version control D) Sharing content E) Using a file server Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.6: How can you use collaboration tools to manage shared content? Classification: Concept

21 Copyright © 2020 Pearson Education, Inc.


71) Version control involves all of the following capabilities except ________. A) user activity limited by permissions B) document checkout C) version histories D) workflow control E) access to the documents on your personal hard drive Answer: E Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.6: How can you use collaboration tools to manage shared content? Classification: Concept 72) Which of the following applications will allow a user to practice shared content with version control? A) Microsoft SharePoint B) Microsoft Word C) Google Docs D) Dropbox E) Apple's iCloud Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.6: How can you use collaboration tools to manage shared content? Classification: Concept 73) What happens when a user checks out a document in a version control application? A) No other user is allowed to modify the document. B) Users are permitted to edit the document while it is checked out to another user. C) An Acrobat PDF document is created for each checked out document. D) The document can be checked in by a different user so it can be edited. E) The system will notify via email about the unavailable document. Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.6: How can you use collaboration tools to manage shared content? Classification: Concept

22 Copyright © 2020 Pearson Education, Inc.


74) If a collaboration tool provides ________ it manages activities in a predefined process. A) version management B) shared content C) a file server D) history E) workflow control Answer: E Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.6: How can you use collaboration tools to manage shared content? Classification: Concept 75) With collaboration tools it is possible to view the history of a document using version control software. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.6: How can you use collaboration tools to manage shared content? Classification: Concept 76) Once you upload a Microsoft Word document to Google Docs, you can no longer use Microsoft Word. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.6: How can you use collaboration tools to manage shared content? Classification: Concept 77) The application teams use and the means by which they share data depend on the team leads preference. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.6: How can you use collaboration tools to manage shared content? Classification: Concept

23 Copyright © 2020 Pearson Education, Inc.


78) What are the issues in sharing content via email attachments. Answer: The most primitive way to share content is via email attachments. However, email attachments have numerous problems. For one, there is always the danger that someone does not receive an email, does not notice it in his or her inbox, or does not bother to save the attachments. Then, too, if three users obtain the same document as an email attachment, each changes it, and each sends back the changed document via email, three different, incompatible versions of that document will be floating around. So, although email is simple, easy, and readily available, it will not suffice for collaborations in which there are many document versions or for which there is a desire for content control. Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.6: How can you use collaboration tools to manage shared content? Classification: Concept 79) What is a key to making team progress? A) Using version management software. B) Keeping a current task list. C) Using test plans. D) Team comradery. E) Workflow control. Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.7: How can you use collaboration tools to manage tasks? Classification: Concept 80) Which of the following is not true when using a task list? A) Task descriptions should be specific. B) A due date is provided for each task. C) Create a testable task description D) The person assigned the task is also responsible for completing the tasks. E) Specify which tasks need to be finished before another task begins. Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.7: How can you use collaboration tools to manage tasks? Classification: Concept

24 Copyright © 2020 Pearson Education, Inc.


81) What is one way to share a task list effectively? A) Keep an excel spreadsheet on your personal hard drive. B) Use Microsoft SharePoint. C) Handwrite the list and pass it around during the meeting. D) Keep it on the bulletin board. E) Send an email with the task list. Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.7: How can you use collaboration tools to manage tasks? Classification: Concept 82) What is one of the most useful features of Microsoft SharePoint when sharing a task list? A) The ability to share tasks list. B) The ability for team members to edit the task. C) Integration into Google docs. D) The different views in Microsoft SharePoint E) Alerts Answer: E Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.7: How can you use collaboration tools to manage tasks? Classification: Concept 83) Google Drive is a simple way to share task lists. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.7: How can you use collaboration tools to manage tasks? Classification: Concept 84) Creating a task list is tedious and difficult. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.7: How can you use collaboration tools to manage tasks? Classification: Concept

25 Copyright © 2020 Pearson Education, Inc.


85) Describe how to manage a project with a task list. Answer: One of the keys for making team progress is keeping a current task list. Good project managers make sure that every team meeting ends with an updated list of tasks, including who is responsible for getting each task done and the date by which he or she will get it done. Managing with a task list is critical for making progress. Task descriptions need to be specific and worded so it is possible to decide whether the task was accomplished. Finally, no benefit will come from this list unless every task has a date by which it is to be completed. Team leaders need to follow up on tasks to ensure they are done by that date. Without accountability and follow-up, there is no task management. You might want to add critical resources that are required, and you might want to specify tasks that need to be finished before a given task can be started. For team members to utilize the task list effectively, they need to share it. Diff: 3 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.7: How can you use collaboration tools to manage tasks? Classification: Concept 86) As a student you would most likely use the ________ collaboration tool set because it is free and takes not time to learn. A) minimal B) good C) comprehensive D) wikis E) maximum Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.8: Which collaboration IS is right your team? Classification: Concept 87) Microsoft Skype for Business is part of the ________ tool set. A) minimal B) good C) comprehensive D) wikis E) SharePoint Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.8: Which collaboration IS is right your team? Classification: Concept

26 Copyright © 2020 Pearson Education, Inc.


88) Even if your team could afford the comprehensive tool set why might you decide not to use it? A) The power curve is too high. B) Management may not want to train the team. C) The team voted on using email. D) You want to reallocate the budget to a different task. E) The team is more comfortable with texting. Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.8: Which collaboration IS is right your team? Classification: Concept 89) When evaluating a tools set you do not be concerned with procedures. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.8: Which collaboration IS is right your team? Classification: Concept 90) Briefly describe the three sets of collaboration tools. Answer: The first, the Minimal set, has the minimum possible set of tools. With this set, you should be able to collaborate with your team, though you will get little support from the software. The second set, the Good set is a more sophisticated set of collaboration tools. With it, you will have the ability to conduct multiparty audio and video virtual meetings, and you will also have support for concurrent access to document, spreadsheet, and presentation files The third set of collaboration tools, the Comprehensive set, is the best of these three because it includes content management and control, workflow control, and online meetings with sharing. Diff: 3 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.8: Which collaboration IS is right your team? Classification: Concept

27 Copyright © 2020 Pearson Education, Inc.


91) A ________ is where businesses hire many people as independent contractors for a short period of time. A) gig economy B) sharing economy C) new economy D) relaxed economy E) freedom economy Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.9: 2029? Classification: Concept 92) Which of the following is true of a sharing economy? A) Consumers participate in boarding asset. B) Consumers temporarily share their assets with other consumers via lending. C) Businesses lend their assets to facilitate a gig economy. D) Businesses and consumers share the costs of an asset. E) Consumers share their assets by leaving them at a business location. Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.9: 2029? Classification: Concept 93) Airbnb is the largest owner of hotel properties. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 7.9: 2029? Classification: Concept

28 Copyright © 2020 Pearson Education, Inc.


Using MIS, 11e (Kroenke) Chapter 8 Processes, Organizations, and Information Systems 1) ________ are formally defined, standardized processes that involve day-to-day operations. A) Dynamic processes B) Unstructured processes C) Structured processes D) Kinetic processes E) Benchmarked processes Answer: C Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Concept 2) Which of the following is an example of a structured process? A) ill-defined situations B) collaboration C) customer returns D) social networking E) new product offerings Answer: C Diff: 2 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Concept 3) ________ are flexible, informal, and adaptive processes that normally involve strategic and less structured managerial decisions and activities. A) Operational processes B) Dynamic processes C) Inherent processes D) Structured processes E) Malleable processes Answer: B Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Concept

1 Copyright © 2020 Pearson Education, Inc.


4) Which of the following is an example of a dynamic process? A) Samsung accepts the return of a defective television from its dealer. B) Starbucks places an order for coffee beans from its local supplier. C) Amazon.com hires customer service representatives to help customers with their online orders. D) Nike uses Facebook and Twitter to generate buzz about its new line of running shoes. E) IBM orders more CPUs for a cluster. Answer: D Diff: 3 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Application 5) Which of the following is a characteristic of dynamic processes? A) They support strategic and less structured managerial decisions. B) They are usually formally defined and documented. C) They support operational and managerial decisions and activities. D) They are standardized processes. E) They are clearly expressed and articulated. Answer: A Diff: 2 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Concept 6) Which of the following workgroup processes is related to sales and marketing? A) lead tracking B) order management C) customer support D) accounts receivable E) HR planning Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Concept

2 Copyright © 2020 Pearson Education, Inc.


7) Which of the following workgroup processes is related to operations? A) account updating and tracking B) sales forecasting C) finished goods inventory management D) treasury and account management E) account tracking Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Concept 8) Which of the following workgroup processes is related to manufacturing? A) order entry and tracking B) finished goods inventory management C) product and brand management D) capacity planning and scheduling E) compensation Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Concept 9) Which of the following workgroup processes is related to customer service? A) assessment B) account tracking C) sales forecasting D) accounts payable E) lead generation Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Concept

3 Copyright © 2020 Pearson Education, Inc.


10) Sina looks over annual performance evaluations for all employees in the sales department. Based on their performance, she determines who is eligible for merit-based salary increases. Sina belongs to the ________ workgroup. A) customer service B) operations C) human resources D) marketing E) sales Answer: C Diff: 2 AACSB: Reflective Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Application 11) Which of the following information systems eliminates data duplication and carefully manages changes to duplicated data to maintain consistency? A) departmental information systems B) workgroup information systems C) personal information systems D) enterprise information systems E) virtual information systems Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.1: What are the basic types of processes? Classification: Concept 12) Which of the following statements is TRUE about workgroup information systems? A) They are easy to change. B) They minimize data duplication among departments. C) They can be operated without training. D) They support 10 to 100 users. E) They support 1,000+ users. Answer: D Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.1: What are the basic types of processes? Classification: Concept

4 Copyright © 2020 Pearson Education, Inc.


13) ________ processes span an organization and support activities in multiple departments. A) Enterprise B) Inter-enterprise C) Strategic D) Reactive E) Clustered Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.1: What are the basic types of processes? Classification: Concept 14) Which of the following statements about enterprise information systems is TRUE? A) The procedures are not formalized or documented. B) They do not require users to have any formal training. C) They are very difficult to change. D) They support 10 to 100 users. E) They promote substantial workgroup data duplication. Answer: C Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.1: What are the basic types of processes? Classification: Concept 15) Supply chain management is an example of a(n) ________. A) enterprise information system B) personal information system C) inter-enterprise information system D) departmental information system E) macro-enterprise information system Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.1: What are the basic types of processes? Classification: Concept

5 Copyright © 2020 Pearson Education, Inc.


16) Which of the following is a characteristic of an inter-enterprise information system? A) Its problem solutions affect multiple organizations. B) It is flexible and easily adaptable to organizational changes. C) It increases data duplication among departments. D) It does not require users to have any formal training. E) It supports 10-100 users. Answer: A Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.1: What are the basic types of processes? Classification: Concept 17) ________ is an example of an inter-enterprise information system. A) CRM B) ARES C) ERP D) EAI E) SMTP Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.1: What are the basic types of processes? Classification: Concept 18) Accepting a return is what type of process? A) Dynamic process B) Unstructured process C) Structured process D) Kinetic process E) Benchmarked process Answer: C Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Concept 19) Both structured processes and dynamic processes are formally defined processes. Answer: FALSE Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Concept 6 Copyright © 2020 Pearson Education, Inc.


20) Dynamic processes are standardized processes that involve day-to-day operations. Answer: FALSE Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Concept 21) Dynamic processes are adaptive processes that change structure rapidly and readily. Answer: TRUE Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Concept 22) Dynamic processes support operational activities. Answer: FALSE Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Concept 23) Product and brand management is a process concerning the sales and marketing department. Answer: TRUE Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Concept 24) Order tracking and account tracking are business processes concerning the operations department. Answer: FALSE Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Concept

7 Copyright © 2020 Pearson Education, Inc.


25) The procedures for using workgroup information systems need to be understood only by the IT department of an organization. Answer: FALSE Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Concept 26) Inter-enterprise processes span an organization and support activities in multiple departments. Answer: FALSE Diff: 1 AACSB: Analytical Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Concept 27) Enterprise processes span an organization and support activities in multiple departments. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Concept 28) Define structured processes and list their characteristics. Answer: Structured processes are formally defined, standardized processes that involve day-today operations: accepting a return, placing an order, purchasing raw materials, and so forth. The characteristics of structured processes are: 1. They support operational and structured managerial decisions and activities. 2. They are standardized. 3. They are usually formally defined and documented. 4. Exceptions are rare and not (well) tolerated. 5. Their process structures change slowly and with organizational agony. Diff: 2 AACSB: Information Technology; Written and Oral Communication Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Concept

8 Copyright © 2020 Pearson Education, Inc.


29) Define dynamic processes and list their characteristics. Answer: Dynamic processes are flexible, informal, and adaptive processes that normally involve strategic and less unstructured managerial decisions and activities. Deciding whether to open a new store location or how best to solve the problem of excessive product returns are examples, as is using Twitter to generate buzz about next season's product line. The characteristics of dynamic processes are: 1. They support strategic and less structured managerial decisions and activities. 2. They are less specific and fluid. 3. They are usually informal. 4. Exceptions are frequent and expected. 5. They are adaptive processes that change structure rapidly and readily. Diff: 2 AACSB: Information Technology; Written and Oral Communication Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Concept 30) Define workgroup processes, enterprise processes, and inter-enterprise processes. Answer: A workgroup process is a structured process that exists to enable workgroups to fulfill the charter, purpose, and goals of a particular organizational unit. Enterprise processes are structured processes that span an organization and support activities in multiple departments. Inter-enterprise processes are structured processes that span two or more independent organizations. Diff: 1 AACSB: Information Technology; Written and Oral Communication Course LO: Discuss the role of information systems in supporting business processes LO: 8.1: What are the basic types of processes? Classification: Concept 31) Define enterprise information systems, and describe their characteristics. Answer: Enterprise information systems are information systems that span an organization and support activities in multiple departments. They typically have hundreds to thousands of users. Procedures are formalized and extensively documented; users undergo formal procedure training. The solutions to problems in an enterprise system usually involve more than one department. Because enterprise systems span many departments and involve potentially thousands of users, they are very difficult to change. Changes must be carefully planned, cautiously implemented, and users given considerable training. Sometimes users are given incentives and other inducements to motivate them to change. Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.1: What are the basic types of processes? Classification: Concept

9 Copyright © 2020 Pearson Education, Inc.


32) Describe inter-enterprise information systems. Answer: Inter-enterprise information systems support one or more inter-enterprise processes. Such systems typically involve thousands of users, and solutions to problems require cooperation among different, usually independently owned organizations. Problems are resolved by meeting, by contract, and sometimes by litigation. Data are often duplicated between organizations; such duplication is either eliminated or is carefully managed. Because of their wide span, complexity, and use by multiple companies, such systems can be exceedingly difficult to change. Supply chain management is a classic example of an inter-enterprise information system. Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.1: What are the basic types of processes? Classification: Concept 33) The two dimensions of process quality are ________. A) efficiency and effectiveness B) performance and reliability C) conformance and durability D) perception and serviceability E) ease of use and usability Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.2: How can information systems improve process quality? Classification: Concept 34) ________ is a measure of the ratio of process outputs to inputs. A) Process effectiveness B) Process efficiency C) Process conformance D) Process reliability E) Process consistency Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.2: How can information systems improve process quality? Classification: Concept

10 Copyright © 2020 Pearson Education, Inc.


35) Process ________ is a measure of how well a process achieves organizational strategy. A) efficiency B) conformance C) effectiveness D) reliability E) adeptness Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.2: How can information systems improve process quality? Classification: Concept 36) SmartToy Corporation's current market strategy is to gain a larger share of the high-end toy market by integrating IBM's AI, named Watson, into its teddy bears. The new line of AI enhanced teddy bears is a hit. SmartToy's market share increases fivefold. This is an example of the company's ________. A) conformity B) effectiveness C) reliability D) efficiency E) competence Answer: B Diff: 3 AACSB: Reflective Thinking Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.2: How can information systems improve process quality? Classification: Application 37) Information systems improve process quality by ________. A) duplicating data B) entirely replacing human activity C) changing the work culture D) controlling process flow E) increasing purchasing power Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.2: How can information systems improve process quality? Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


38) Dollar Bill Supermarket is one of the best in the city. However, shoppers prefer other supermarkets to it as there is always a long queue at the billing counter. The outdated billing registers make the entire process inefficient. Which of the following steps should the supermarket management take to improve the billing process? A) limit the number of products customers can buy B) limit the number of customers in the supermarket C) change the process structure D) change process resources E) change the process requirements Answer: D Diff: 3 AACSB: Reflective Thinking Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.2: How can information systems improve process quality? Classification: Application 39) Matt works at a take-out restaurant. His job is to take orders over the phone and then pass it on to the kitchen staff. As a result of being short-staffed, the restaurant management decided to automate Matt's job and assign him kitchen duties instead. In this case, information systems are ________. A) augmenting a human performing an activity B) controlling data quality process flow C) performing an activity D) cutting down expenses E) changing the process requirements Answer: C Diff: 3 AACSB: Reflective Thinking Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.2: How can information systems improve process quality? Classification: Application 40) Process efficiency is a measure of the ratio of process outputs to inputs. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.2: How can information systems improve process quality? Classification: Concept 41) The structure of a process has no bearing on its efficiency. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.2: How can information systems improve process quality? Classification: Concept 12 Copyright © 2020 Pearson Education, Inc.


42) Adding process resources increases process effectiveness but adds costs. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.2: How can information systems improve process quality? Classification: Concept 43) Information systems can improve process quality by augmenting the actions of a human who is performing that activity. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.2: How can information systems improve process quality? Classification: Concept 44) Unless a structure changes is only a simple reordering of tasks, changing the structure of a process never involves a change in resources. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.2: How can information systems improve process quality? Classification: Concept 45) What are the two dimensions of process quality? How can organizations improve process quality? How do information systems improve process quality? Answer: The two dimensions of process quality are efficiency and effectiveness. Process efficiency is a measure of the ratio of process outputs to inputs. Process effectiveness is a measure of how well a process achieves organizational strategy. Organizations can improve the quality (efficiency and/or effectiveness) of a process in one of three ways: – Change the process structure. – Change the process resources. – Change both process structure and resources. Information systems can be used to improve process quality by: – Performing an activity. – Augmenting a human who is performing an activity. – Controlling data quality and process flow. Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.2: How can information systems improve process quality? Classification: Concept 13 Copyright © 2020 Pearson Education, Inc.


46) What are the three ways information systems improve process quality? Answer: The three ways information systems can be used to improve process quality are: 1) performing an activity; 2) augmenting a human who is performing an activity; and 3) controlling data quality and process flow. Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.2: How can information systems improve process quality? Classification: Concept 47) Which of the following conditions exists when data are isolated in separated information systems? A) information overload B) encapsulation C) information silo D) data segregation E) data branching Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.3: How do information systems eliminate the problems of information silos? Classification: Concept 48) When an organization has inconsistent duplicated data, it is said to have a(n) ________. A) information silo B) data integrity problem C) error of omission D) data segregation problem E) data disunity problem Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.3: How do information systems eliminate the problems of information silos? Classification: Concept

14 Copyright © 2020 Pearson Education, Inc.


49) Tony requests a credit approval of $25,000. Instead, he gets $15,000 approved as customer credit. Which of the following problems caused by information silos is most likely the reason behind it? A) data duplication B) isolated decisions C) limited information D) disjointed processes E) improper data normalization Answer: D Diff: 3 AACSB: Reflective Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 8.3: How do information systems eliminate the problems of information silos? Classification: Application 50) The finance department of Global Couriers decides that half of the previous year's profits should be reinvested into the business. The marketing department, however, plans to extend the company's services to five more cities, which would require additional investment. The department heads hold a meeting at the end of the quarter to discuss the company's strategies; the meeting is, however, adjourned when they realize that their opinions clash. Information silo, in this case, has led to ________. A) organizational inefficiency B) loss of business C) data duplication D) increased expense E) data paralysis Answer: A Diff: 3 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.3: How do information systems eliminate the problems of information silos? Classification: Application 51) Which of the following is a solution for problems arising from information silos? A) departmentalization of an organization B) limiting communication to top-level management C) integrating data into a single database D) isolating functional applications E) implementation of a data concentration server Answer: C Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.3: How do information systems eliminate the problems of information silos? Classification: Concept

15 Copyright © 2020 Pearson Education, Inc.


52) XYZ, inc has a new order entry system that uses the old databases. The shipping addresses are correct in one system, but the billing address is located in another system. The company is experiencing a(n) ________. A) disjointed process B) data duplication problem C) data integrity problem D) server problem E) employee error situation Answer: C Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.3: How do information systems eliminate the problems of information silos? Classification: Concept 53) Workgroups can develop information systems for their own needs, but, over time, this would result in information silos. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.3: How do information systems eliminate the problems of information silos? Classification: Concept 54) If an organization cannot integrate the data into a single database, they can allow the information silo isolation, but manage it to avoid the problems. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.3: How do information systems eliminate the problems of information silos? Classification: Concept 55) List the problems associated with information silos. Answer: The problems associated with information silos include: – Data duplication and data inconsistency – Disjointed processes – Limited information and lack of integrated information – Isolated decisions that lead to organizational inefficiencies – Increased expense Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.3: How do information systems eliminate the problems of information silos? Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


56) What is the fundamental problem of information silos? How can this problem be remedied? Answer: The fundamental problem of information silos is that data are duplicated in isolated systems. The most obvious fix is to integrate the data into a single database and revise applications (and business processes) to use that database. Another remedy is to allow the isolation, but to manage it to avoid problems. Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.3: How do information systems eliminate the problems of information silos? Classification: Concept 57) ________ is the activity of altering existing and designing new business processes to take advantage of new information systems. A) Business process modeling B) Business process reengineering C) Business process outsourcing D) Enterprise resource planning E) Process innovation planning Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.4: How do CRM, ERP, and EAI support enterprise processes? Classification: Concept 58) ________ are predesigned procedures for using software products. A) Inherent processes B) Triggers C) Modules D) Service descriptions E) Encapsulated processes Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.4: How do CRM, ERP, and EAI support enterprise processes? Classification: Concept

17 Copyright © 2020 Pearson Education, Inc.


59) A(n)________ system is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service. A) business process reengineering B) customer relationship management C) enterprise resource planning D) customer lifecycle management E) customer pomological network Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe the functions of customer relationship management (CRM) systems LO: 8.4: How do CRM, ERP, and EAI support enterprise processes? Classification: Concept 60) Striking Apparels has launched its new stock of summer wear. It plans to target shoppers between the ages of twenty and thirty to sell its products. Daniel is responsible for sending out promotional emails and messages to these target customers. Daniel belongs to the ________ department of Striking Apparels. A) relationship management B) loss/churn C) marketing D) customer acquisition E) engineering Answer: C Diff: 3 AACSB: Reflective Thinking Course LO: Describe the functions of customer relationship management (CRM) systems LO: 8.4: How do CRM, ERP, and EAI support enterprise processes? Classification: Application 61) Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more product? A) marketing B) customer acquisition C) relationship management D) loss/churn E) customer endorsement Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe the functions of customer relationship management (CRM) systems LO: 8.4: How do CRM, ERP, and EAI support enterprise processes? Classification: Concept

18 Copyright © 2020 Pearson Education, Inc.


62) Which phase of the customer life cycle categorizes customers according to value and attempt to win back high-value customers? A) loss/churn B) customer acquisition C) relationship management D) marketing E) customer sponsorship Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the functions of customer relationship management (CRM) systems LO: 8.4: How do CRM, ERP, and EAI support enterprise processes? Classification: Concept 63) ________ is a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform. A) Enterprise resource planning B) Customer relationship management C) Enterprise application integration D) Business process reengineering E) Centralized process planning Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.4: How do CRM, ERP, and EAI support enterprise processes? Classification: Concept 64) The primary purpose of an ERP system is ________. A) customization B) duplication C) integration D) customer acquisition E) process exploitation Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.4: How do CRM, ERP, and EAI support enterprise processes? Classification: Concept

19 Copyright © 2020 Pearson Education, Inc.


65) Enterprise application integration is a ________. A) suite of software applications that consolidates existing systems by providing layers of software that connect applications together B) strategy that uses business process management to radically enhance customer service experience from any customer base C) suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform D) suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service E) strategy that uses business process management to radically enhance data quality Answer: A Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.4: How do CRM, ERP, and EAI support enterprise processes? Classification: Concept 66) Which of the following is performed by enterprise application integration? A) It duplicates the data because each application has its own database. B) It connects system "islands" via a new layer of software. C) It prevents a gradual move to ERP. D) It prevents existing applications from communicating and sharing data. E) It prevents data loss. Answer: B Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.4: How do CRM, ERP, and EAI support enterprise processes? Classification: Concept 67) The major benefit of enterprise application integration is that it ________. A) minimizes the requirement for formalized procedures B) acts as a cost-effective alternative to ERP, with greater capabilities C) utilizes a centralized database D) enables organizations to use existing applications E) decentralizes unnecessary information Answer: D Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.4: How do CRM, ERP, and EAI support enterprise processes? Classification: Concept

20 Copyright © 2020 Pearson Education, Inc.


68) A company uses their ________ to send coupons to your email for the things you buy at their store. A) customer relationship management (CRM) system B) enterprise resource planning (ERP C) modules D) know how E) personnel Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.4: How do CRM, ERP, and EAI support enterprise processes? Classification: Concept 69) Business process reengineering is a quick process but is exceedingly expensive. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 8.4: How do CRM, ERP, and EAI support enterprise processes? Classification: Concept 70) CRM systems incorporate solicitation, sales, relationship management, and customer support applications. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.4: How do CRM, ERP, and EAI support enterprise processes? Classification: Concept 71) The primary purpose of an ERP system is integration. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.4: How do CRM, ERP, and EAI support enterprise processes? Classification: Concept 72) Business process reengineering is quick and easy. Answer: FALSE Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.4: How do CRM, ERP, and EAI support enterprise processes? Classification: Concept 21 Copyright © 2020 Pearson Education, Inc.


73) What are the four phases of the customer life cycle? Briefly describe each phase. Answer: The four phases of the customer life cycle include: marketing, customer acquisition, relationship management, and loss/churn. Marketing sends messages to the target market to attract customer prospects. When prospects order, they become customers who need to be supported. Additionally, relationship management processes increase the value of existing customers by selling them more product. Inevitably, over time the organization loses customers. When this occurs, win-back processes categorize customers according to value and attempt to win back high-value customers. Diff: 2 AACSB: Information Technology Course LO: Describe the functions of customer relationship management (CRM) systems LO: 8.4: How do CRM, ERP, and EAI support enterprise processes? Classification: Concept 74) Define ERP. What is the primary purpose of an ERP system? Answer: Enterprise resource planning (ERP) is a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform. An ERP system is an information system based on ERP technology. The primary purpose of an ERP system is integration; an ERP system allows the left hand of the organization to know what the right hand is doing. This integration allows real-time updates globally, whenever and wherever a transaction takes place. Critical business decisions can then be made on a timely basis using the latest data. Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.4: How do CRM, ERP, and EAI support enterprise processes? Classification: Concept 75) List the functions of enterprise application integration (EAI). Answer: The functions of EAI are as follows: – It connects system "islands" via a new layer of software/system. – It enables existing applications to communicate and share data. – It provides integrated information. – It leverages existing systems–leaving functional applications as is, but providing an integration layer over the top. – It enables a gradual move to ERP. Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.4: How do CRM, ERP, and EAI support enterprise processes? Classification: Concept

22 Copyright © 2020 Pearson Education, Inc.


76) An Enterprise Resource Planning (ERP) solution does NOT include ________. A) a database design B) the company's operational data C) initial configuration data D) stored procedures E) primary keys Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.5: What are the elements of an ERP system? Classification: Concept 77) A(n) ________ is a computer program stored within a database that runs to keep the database consistent when certain conditions arise. A) stored procedure B) index C) trigger D) transaction E) compressor Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.5: What are the elements of an ERP system? Classification: Concept 78) A stored procedure is a ________. A) program stored in a database that keeps the database consistent when certain conditions arise B) history of actions executed by a database management system C) computer program stored in a database that is used to enforce business rules D) data structure that improves the speed of data-retrieval operations in a database E) smaller code segment which is part of a larger data auditing application Answer: C Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.5: What are the elements of an ERP system? Classification: Concept

23 Copyright © 2020 Pearson Education, Inc.


79) The inherent processes defined in an ERP solution are referred to by some ERP vendors as ________. A) database transactions B) stored procedures C) transaction logs D) process blueprints E) process trees Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.5: What are the elements of an ERP system? Classification: Concept 80) ERP vendors sometimes train an organization's employees, called Super Users, to become inhouse ERP trainers in training sessions called ________. A) train the trainer B) top-down training C) on-the-job training D) employ the employer E) sprints Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.5: What are the elements of an ERP system? Classification: Concept 81) ERP training falls into two broad categories. One of the categories is training on how to use the ERP application software. What does the training include? A) steps for obtaining top-level management support B) steps for using the applications to accomplish the activities in various processes C) procedures to deal with employee resistance to the new system D) procedures to prepare for organizational changes while implementing ERP solutions E) procedures for handling system error codes Answer: B Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.5: What are the elements of an ERP system? Classification: Concept

24 Copyright © 2020 Pearson Education, Inc.


82) To reduce the substantial work that needs to be done to customize an ERP application to a particular customer, ERP vendors provide ________. A) service descriptions B) industry-specific solutions C) inherent processes D) DIY modules E) process statistics Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.5: What are the elements of an ERP system? Classification: Concept 83) Identify the top two ERP vendors. A) Infor and SAP B) SAP and Oracle C) Microsoft Dynamics and Infor D) Microsoft Dynamics and SAP E) Sage and Microsoft Dynamics Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.5: What are the elements of an ERP system? Classification: Concept 84) Which company is considered the gold standard as an ERP vendor? A) SAP B) Microsoft C) Oracle D) Infor ERP E) Epicor Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.5: What are the elements of an ERP system? Classification: Concept

25 Copyright © 2020 Pearson Education, Inc.


85) What is having a major impact on ERP vendors? A) Lazy users B) System analysts C) Market size D) The cloud E) Epicor Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.5: What are the elements of an ERP system? Classification: Concept 86) The ERP market is mature and facing stiff competition from ________. A) new developers B) SaaS C) PaaS D) IaaS E) Oracle Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.5: What are the elements of an ERP system? Classification: Concept 87) Choosing an ERP solution that has applications that function close to the organization's requirements is critical to its successful implementation. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.5: What are the elements of an ERP system? Classification: Concept 88) An ERP solution includes a database design, initial configuration data, and the company's operational data. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.5: What are the elements of an ERP system? Classification: Concept

26 Copyright © 2020 Pearson Education, Inc.


89) The inherent processes that are defined in an ERP solution are referred to by some ERP vendors as process blueprints. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.5: What are the elements of an ERP system? Classification: Concept 90) ERP vendors sometimes train an organization's employees to become in-house trainers in training sessions called train the trainer. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.5: What are the elements of an ERP system? Classification: Concept 91) Microsoft Dynamics and Oracle are the highest ranked ERP vendors in the market. Answer: FALSE Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.5: What are the elements of an ERP system? Classification: Concept 92) A computer program stored within the database that runs to keep the database consistent when certain conditions arise is called a stored procedure. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.5: What are the elements of an ERP system? Classification: Concept

27 Copyright © 2020 Pearson Education, Inc.


93) Explain the nature of the database component of an Enterprise Resource Planning (ERP) solution. Answer: An ERP solution includes a database design as well as initial configuration data. It does not, of course, contain the company's operational data. During development, the team must enter the initial values for that data as part of the development effort. SAP, the leading vendor of ERP solutions, provides ERP databases that contain over 15,000 tables. The design includes the metadata for those tables, as well as their relationships to each other, and rules and constraints about how the data in some tables must relate to data in other tables. The ERP solution also contains tables filled with initial configuration data. Large organizational databases contain two types of program code. The first, called a trigger, is a computer program stored within the database that runs to keep the database consistent when certain conditions arise. The second, called a stored procedure, is a computer program stored in the database that is used to enforce business rules. An example of such a rule would be never to sell certain items at a discount. Triggers and stored procedures are also part of the ERP solution. Developers and business users need to configure the operation of such code during the ERP implementation as well. Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.5: What are the elements of an ERP system? Classification: Concept 94) Describe the two categories of Enterprise Resource Planning (ERP) training. Answer: ERP vendors have developed training curricula and numerous classes because of the complexity and difficulty of implementing and using ERP solutions. ERP training falls into two broad categories. The first category is training about how to implement the ERP solution. This training includes topics such as obtaining top-level management support, preparing the organization for change, and dealing with the inevitable resistance that develops when people are asked to perform work in new ways. The second category is training on how to use the ERP application software. Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.5: What are the elements of an ERP system? Classification: Concept

28 Copyright © 2020 Pearson Education, Inc.


95) Which of the following is TRUE of implementing new enterprise systems? A) It poses no risks. B) It is expensive and can be well over the budget. C) It does not require updates. D) It is simple and adaptable. E) It can be done in a short period of time. Answer: B Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.6: What are the challenges of implementing and upgrading enterprise information systems? Classification: Concept 96) When implementing new enterprise systems, usually the only solution for resolving process issues and providing enterprise process management is to ________. A) develop committees and steering groups B) reinforce employees' sense of self-efficacy C) establish clear and absolute contractual guidelines D) communicate the need for change to the employees E) provide additional financial incentives Answer: A Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.6: What are the challenges of implementing and upgrading enterprise information systems? Classification: Concept 97) Since the features and functions of complex products like CRM or ERP are not easy to identify, ________ is a major task when implementing enterprise systems. A) virtualization B) encapsulation C) gap identification D) data duplication E) data tunneling Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.6: What are the challenges of implementing and upgrading enterprise information systems? Classification: Concept

29 Copyright © 2020 Pearson Education, Inc.


98) A toy manufacturing company installed a new enterprise system. The installation and adaptation gave rise to a number of issues among different departments. These issues complicated the process as the company had not appointed anyone to resolve them. This situation is an example of ________ while implementing enterprise information systems. A) a lack of collaborative management B) the occurrence of requirement gaps C) transition problems D) employee resistance E) inability to adapt to new technology Answer: A Diff: 3 AACSB: Reflective Thinking Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.6: What are the challenges of implementing and upgrading enterprise information systems? Classification: Application 99) Arctic Gear LLC. recently adopted a new ERP system, but quickly found that it wasn't a perfect fit with their existing procedures. These differences between the organization's requirements and the application's capabilities are known as ________. A) employee resistance B) transition problems C) requirements gaps D) lack of collaborative management E) inability to adapt to new technology Answer: C Diff: 3 AACSB: Reflective Thinking Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.6: What are the challenges of implementing and upgrading enterprise information systems? Classification: Application 100) Which of the following is an effective and acceptable technique to overcome employee resistance while implementing new enterprise systems? A) giving employees ultimatums and deadlines B) paying employees straight-out for transitioning to the new system C) coercing employees to learn the new system D) conducting contests with cash prizes among employees E) tech shaming employees into accepting the system Answer: D Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.6: What are the challenges of implementing and upgrading enterprise information systems? Classification: Concept 30 Copyright © 2020 Pearson Education, Inc.


101) Jakub was recently hired as the tennis professional for a private country club. Jakub won national tennis titles in college and competed in a few professional matches. Jakub is confident he will do well in his new job. His confidence is a reflection of his ________. A) self-appraisal B) self-actualization C) self-efficacy D) self-elevation E) self-elation Answer: C Diff: 2 AACSB: Reflective Thinking Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.6: What are the challenges of implementing and upgrading enterprise information systems? Classification: Application 102) All of the following are challenges of implementing and upgrading enterprise information systems except ________. A) employee resistance B) collaborative management C) old technology D) requirements gaps E) transitions problems Answer: C Diff: 2 AACSB: Reflective Thinking Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.6: What are the challenges of implementing and upgrading enterprise information systems? Classification: Application 103) Why would an organization want to move their enterprise system to the cloud? A) Because they do not want to deal with data issues. B) Because they want their data in another country. C) Organizations cannot move their enterprise system to the cloud. D) Because the cloud is popular. E) Because of a cost savings. Answer: E Diff: 2 AACSB: Reflective Thinking Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.6: What are the challenges of implementing and upgrading enterprise information systems? Classification: Application

31 Copyright © 2020 Pearson Education, Inc.


104) Transitioning to a new enterprise system requires careful planning and substantial training. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.6: What are the challenges of implementing and upgrading enterprise information systems? Classification: Concept 105) Discuss the challenge of requirements gaps when implementing new enterprise systems. Answer: Few organizations today create their own enterprise systems from scratch. Instead, they license an enterprise product that provides specific functions and features and that includes inherent procedures. But such licensed products are never a perfect fit. Almost always there are gaps between the organization's requirements and the application's capabilities. The first challenge is identifying the gaps. To specify a gap, an organization must know both what it needs and what the new product does. However, it can be very difficult for an organization to determine what it needs; that difficulty is one reason organizations choose to license rather than to build. Further, the features and functions of complex products like CRM or ERP are not easy to identify. Thus, gap identification is a major task when implementing enterprise systems. The second challenge is deciding what to do with gaps, once they are identified. Either the organization needs to change the way it does things to adapt to the new application, or the application must be altered to match what the organization does. Either choice is problematic. Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.6: What are the challenges of implementing and upgrading enterprise information systems? Classification: Concept

32 Copyright © 2020 Pearson Education, Inc.


106) In the context of new enterprise systems, how should organizations manage employee resistance to change? Answer: First, senior-level management needs to communicate the need for the change to the organization and reiterate this, as necessary, throughout the transition process. Second, employees fear change because it threatens self-efficacy, which is a person's belief that he or she can be successful at his or her job. To enhance confidence, employees need to be trained and coached on the successful use of the new system. Word-of-mouth is a very powerful factor, and in some cases key users are trained ahead of time to create positive buzz about the new system. Video demonstrations of employees successfully using the new system are also effective. Third, in many ways, the primary benefits of a new ERP system are felt by the accounting and finance departments and the senior management. Many of the employees who are asked to change their activities to implement ERP will not receive any direct benefit from it. Therefore, employees may need to be given extra inducement to change to the new system. Implementing new enterprise systems can solve many problems and bring great efficiency and cost savings to an organization, but it is not for the faint of heart. Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.6: What are the challenges of implementing and upgrading enterprise information systems? Classification: Concept 107) What are some risks to using an enterprise system on a mobile device? Answer: Employees want to use mobile devices to access and even modify enterprise system data. But mobile devices are just that–mobile. The enterprise system may be exposed to considerable risk while outside the control of the organization. And ERP data is a juicy target for crime. Diff: 2 AACSB: Reflective Thinking Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.6: What are the challenges of implementing and upgrading enterprise information systems? Classification: Application 108) Systems where applications processing is distributed across multiple computing devices are known as ________. A) remote systems B) telephony systems C) Web systems D) thick-client systems E) distributed systems Answer: E Diff: 3 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.7: How do inter-enterprise IS solve the problems of enterprise silos? Classification: Application 33 Copyright © 2020 Pearson Education, Inc.


109) Carla, a budding restaurateur, meets a veteran chef and restaurateur, Giovanni. Carla wishes to analyze the purchasing pattern of her customer base. Which of the following is most likely to be a piece of sound advice that Giovanni would offer to Carla? A) Carla should use her restaurant's distributed systems to know more about her customers' purchasing patterns. B) Carla should avoid using the restaurant's integrated system to analyze her customers' purchasing patterns. C) Carla should support strategic and less structured managerial decisions to ensure that standardization occurs. D) Carla should support less specific and fluid managerial decisions to ensure that standardization occurs. E) Carla should delete any data over thirty days old to protect customer privacy. Answer: A Diff: 3 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.7: How do inter-enterprise IS solve the problems of enterprise silos? Classification: Application 110) All of the following are standards that enable programs to receive data from and display data to a variety of mobile and desktop devices except ________. A) CSS 3 B) javascript C) html5 D) SOA E) AOL Answer: E Diff: 3 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.7: How do inter-enterprise IS solve the problems of enterprise silos? Classification: Application 111) Inter-enterprise systems can solve the problems of workgroup information silos but not those of enterprise silos. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.7: How do inter-enterprise IS solve the problems of enterprise silos? Classification: Concept

34 Copyright © 2020 Pearson Education, Inc.


112) In distributed systems, applications processing is distributed across multiple computing devices. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.7: How do inter-enterprise IS solve the problems of enterprise silos? Classification: Concept 113) ERP customers will store most of their data on cloud servers managed by cloud vendors and store sensitive data on servers they manage themselves. This is known as the ________. A) mobility model B) hybrid model C) information silo D) EAI model E) compliance model Answer: B Diff: 2 AACSB: Information Technology Course LO: Describe the uses of enterprise systems and enterprise resource planning LO: 8.8: 2029? Classification: Application

35 Copyright © 2020 Pearson Education, Inc.


Using MIS, 11e (Kroenke) Chapter 9 Social Media Information Systems 1) ________ is the use of information technology to support the sharing of content among networks of users. A) Social media B) Networking C) The Internet D) The world wide web E) Group connection Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.1: What is a social media information system (SMIS)? Classification: Concept 2) Facebooks is an example of a ________ because it provides a platform that enables the creation of social networks. A) marketing platform B) social media provider C) user D) community E) connection Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.1: What is a social media information system (SMIS)? Classification: Concept 3) Which social media platform has the most active users? A) Twitter B) Snapchat C) Facebook D) Instagram E) LinkedIn Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.1: What is a social media information system (SMIS)? Classification: Concept

1 Copyright © 2020 Pearson Education, Inc.


4) Organizations as social media users use the platforms to accomplish all of the following except ________. A) promote products B) build relationships C) manager their image D) monitor employees E) hire people to maintain their social media presence Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.1: What is a social media information system (SMIS)? Classification: Concept 5) Facebook is an example of a ________ because it provides a platform that enables the creation of social networks. A) marketing platform B) social media provider C) user D) community E) connection Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.1: What is a social media information system (SMIS)? Classification: Concept 6) How are social media communities formed? A) They are formed based on location. B) They are formed based on familial relationships. C) They are formed based on neighborhoods. D) They naturally occur. E) They are formed based on mutual interests. Answer: E Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.1: What is a social media information system (SMIS)? Classification: Concept

2 Copyright © 2020 Pearson Education, Inc.


7) The Doggie Store created a "cutest dog" competition with a grand prize of a $100 gift certificate to the store and put it on their Instagram to create a ________. A) marketing platform B) viral hook C) social media community D) media superstar E) group with mutual interests Answer: B Diff: 3 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.1: What is a social media information system (SMIS)? Classification: Concept 8) The hardware component for social media information systems (SMIS) ________. A) provides elastic, cloud-based servers B) provides analytics C) creates content for rapid retrieval D) provides a browser E) maintains applications Answer: A Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.1: What is a social media information system (SMIS)? Classification: Concept 9) What is one feature that differentiates social media information systems (SMIS) from Web site applications? A) A user can comment on a Web site. B) SMIS has connection data. C) SMIS has more users than a Web site. D) SMIS do not use browsers. E) A user has to login to a Web site to use the special features. Answer: B Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.1: What is a social media information system (SMIS)? Classification: Concept

3 Copyright © 2020 Pearson Education, Inc.


10) For social networking users, procedures are formal and socially oriented. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.1: What is a social media information system (SMIS)? Classification: Concept 11) A social media information systems (SMIS) is an information system that supports the sharing of content among networks of users. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.1: What is a social media information system (SMIS)? Classification: Concept 12) Social media allows people to form communities. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.1: What is a social media information system (SMIS)? Classification: Concept 13) An organization can be a social media provider but not a social media user. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.1: What is a social media information system (SMIS)? Classification: Concept 14) Describe the role of a user of social media. Answer: Users of social media do what they want to do depending on their goals and their personalities. They behave in certain ways and observe the consequences. They may or may not change their behavior. By the way, note that SM users aren't necessarily rational, at least not in purely monetary ways. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.1: What is a social media information system (SMIS)? Classification: Concept

4 Copyright © 2020 Pearson Education, Inc.


15) List and describe the two categories of social media data. Answer: SM data falls into two categories: content and connections. Content data is data and responses to data that are contributed by users. Connection data is data about relationships. On Facebook, for example, the relationships to your friends are connection data. SM providers store and retrieve SM data on behalf of users. Diff: 3 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.1: What is a social media information system (SMIS)? Classification: Concept 16) All of the following are forms of promotion using social media information systems created by employees for customers except ________. A) creating wikis B) answering phone calls C) creating frequently asked questions D) create blogs E) sites for user reviews Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.2: How do SMIS advance organizational strategy? Classification: Concept 17) What is the primary risk of peer-to-peer support in social media? A) The cost. B) Difficulty getting users to write reviews. C) The short feedback loop. D) The demands on employees to provide reviews. E) Loss of control. Answer: E Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.2: How do SMIS advance organizational strategy? Classification: Concept

5 Copyright © 2020 Pearson Education, Inc.


18) What is one risk in supply chain problem solving via social media? A) The inability to sort through all of the solutions coming from the community. B) A company would be solving their problem in front of their competitor. C) The lack of creation of viable solutions. D) The tightly integrated structure of manufacturing processes. E) The slowness of feedback from social media communities. Answer: B Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.2: How do SMIS advance organizational strategy? Classification: Concept 19) All of the following are benefits to using social media to solve supply chain management problems except ________. A) the numerous solution ideas generated. B) faster problem solving C) the inability for management to catalog all of the solutions. D) providing better solutions to problems E) the rapid evaluation of solutions Answer: C Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.2: How do SMIS advance organizational strategy? Classification: Concept 20) ________ is the dynamic social media process of employing users to participate in product design or product redesign. A) Business-to-consumer relationships B) Business-to-business relationships C) Supply chain management D) Crowdsourcing E) Customer relationship management Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.2: How do SMIS advance organizational strategy? Classification: Concept

6 Copyright © 2020 Pearson Education, Inc.


21) Jerry is using social media to market products directly to end users. This type of marketing is defined as ________. A) feedback loops B) real-time feedback C) crowdsourcing D) businesses-to-consumer E) direct sales Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.2: How do SMIS advance organizational strategy? Classification: Concept 22) Which social media site would organizations use to hire the best people? A) Twitter B) Facebook C) SharePoint D) LinkedIn E) Instagram Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.2: How do SMIS advance organizational strategy? Classification: Concept 23) Which social media site would organizations use to search for expertise within the organization? A) Twitter B) Facebook C) SharePoint D) LinkedIn E) Instagram Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.2: How do SMIS advance organizational strategy? Classification: Concept

7 Copyright © 2020 Pearson Education, Inc.


24) Recruiters who notice poor grammar on social media sites tend to have a negative view of a potential candidate. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.2: How do SMIS advance organizational strategy? Classification: Concept 25) Because relationships emerge from a joint activity in social customer relationship management, customers have as much control as companies over what the customers read about a product. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.2: How do SMIS advance organizational strategy? Classification: Concept 26) The social media flow can be diagrammed and designed because it is static. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.2: How do SMIS advance organizational strategy? Classification: Concept 27) Describe the difference between traditional CRM and social CRM. Answer: Social CRM flies in the face of the structured and controlled processes of traditional CRM. Because relationships emerge from joint activity, customers have as much control as companies. This characteristic is anathema to traditional sales managers who want structured processes for controlling what the customer reads, sees, and hears about the company and its products. Further, traditional CRM is centered on lifetime value; customers that are likely to generate the most business get the most attention and have the most effect on the organization. Traditional CRM ensured that the organization spoke to customers with one voice and that it controlled the messages, the offers, and even the support that customers received based on the value of a particular customer. However, with social CRM, the customer who spends 10 cents but who is an effective reviewer, commentator, or blogger can have more influence than the quiet customer who purchases $10M a year. Diff: 3 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.2: How do SMIS advance organizational strategy? Classification: Concept

8 Copyright © 2020 Pearson Education, Inc.


28) Describe how an organization can use a social media site such as LinkedIn to hire the best people. Answer: Organizations use social media sites like LinkedIn to hire the best people more quickly and at a lower cost. For about $900 a month, recruiters can search through 433 million LinkedIn members to find the perfect candidate. The cost of hiring just one new employee runs around $5,000. If an independent recruiting company is involved, that cost can be as high as 10 percent of the new employee's salary. LinkedIn also gives employers access to passive candidates who might not be looking for a job but are a perfect fit for a particular position. Once the employee is hired, the employer can leverage that new employee's social network to hire more candidates just like him or her. Diff: 3 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.2: How do SMIS advance organizational strategy? Classification: Concept 29) ________ is the investment of resources for future profit. A) Business to business B) Social media C) The marketplace D) Capital E) Attending a business function Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.3: How do SMIS increase social capital? Classification: Concept 30) All of the following are ways social capital adds value except ________. A) information B) influence C) social credentials D) personal reinforcement E) it allows to make more friends Answer: E Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.3: How do SMIS increase social capital? Classification: Concept

9 Copyright © 2020 Pearson Education, Inc.


31) What is a Web site that will help you measure your individual social capital? A) Influencer B) Facebook C) Klout D) Linkedin E) Analytics Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.3: How do SMIS increase social capital? Classification: Concept 32) What factor(s) are included to determine the value of social capital? A) The number of relationships in a social network, by the strength of those relationships, and by the number of resources controlled by those related. B) The number of likes and forwards a person has in their social network. C) The number of famous people who follow you. D) The number of people you interact with on a daily basis by the number of times a post is followed. E) The number of people who mention and tag you. Answer: A Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.3: How do SMIS increase social capital? Classification: Concept 33) Cocoa ________ in her social network because her opinion may force a change in others' behavior and beliefs. A) is a successful small business owner B) is an influencer C) has social credentials D) tweets at least ten times per day E) rarely accepts friend requests Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.3: How do SMIS increase social capital? Classification: Concept

10 Copyright © 2020 Pearson Education, Inc.


34) To an organization, the ________ is the likelihood that the other entity in the relationship will do something that benefits the organization. A) the number of social media sites used B) the strength of their employees C) strength of the relationship D) number of pictures retweeted E) acceptance of the executive board Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.3: How do SMIS increase social capital? Classification: Concept 35) The factors included in social capital evaluation are ________. A) Social Capital = Number of Relationships + Relationship Strength + Entity Resources B) Social Capital = Number of Relationships + Relationship Strength / Entity Resources C) Social Capital = (Number of Relationships + Relationship Strength) x Entity Resources D) Social Capital = Number of Relationships / Relationship Strength x Entity Resources E) Social Capital = Number of Relationships * Relationship Strength * Entity Resources Answer: E Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.3: How do SMIS increase social capital? Classification: Concept 36) Social capital can be earned and spent. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.3: How do SMIS increase social capital? Classification: Concept 37) Organizations have social capital. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.3: How do SMIS increase social capital? Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


38) Business literature defines four types of capital. Answer: FALSE Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.3: How do SMIS increase social capital? Classification: Concept 39) Define the three types of capital per business literature. Answer: Business literature defines three types of capital. Karl Marx defined capital as the investment of resources for future profit. This traditional definition refers to investments into resources such as factories, machines, manufacturing equipment, and the like. Human capital is the investment in human knowledge and skills for future profit. According to Nan Lin, social capital is the investment in social relations with the expectation of returns in the marketplace. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.3: How do SMIS increase social capital? Classification: Concept 40) What factors should you consider when using social networking professionally? Answer: So, when you use social networking professionally, consider these three factors. You gain social capital by adding more friends and by strengthening the relationships you have with existing friends. Further, you gain more social capital by adding friends and strengthening relationships with people who control resources that are important to you. Such calculations may seem cold, impersonal, and possibly even phony. When applied to the recreational use of social networking, they may be. But when you use social networking for professional purposes, keep them in mind. Diff: 3 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.3: How do SMIS increase social capital? Classification: Concept 41) In social media, ________ are the product. A) you B) the number of users on the network C) businesses selling goods D) active users E) all of the connected active users Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.4: How do (some) companies earn revenue from social media? Classification: Concept 12 Copyright © 2020 Pearson Education, Inc.


42) All of these are forms of advertising revenue on social media except ________. A) paid search B) offer a basic service for free and then charge for upgrades C) digital video ads D) mobile ads E) pay-per-click Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.4: How do (some) companies earn revenue from social media? Classification: Concept 43) ABC Corp is partnering with a company to offer ads. The company will show the ads for free and ABC Corp only pays if the customer visits the page from that ad. ABC Corp is using the ________. A) freemium revenue model B) digital video ads model C) user contribution model D) business-to-consumer revenue model E) pay-per-click Answer: E Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.4: How do (some) companies earn revenue from social media? Classification: Concept 44) LinkedIn uses the ________ because regular users access LinkedIn for free but you can upgrade individual upgrades range from $29 a month to use services such as the ability to direct email messages to LinkedIn users outside one's network. A) freemium revenue model B) digital video ads model C) user contribution model D) business-to-consumer revenue model E) pay-per-click Answer: A Diff: 3 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.4: How do (some) companies earn revenue from social media? Classification: Concept

13 Copyright © 2020 Pearson Education, Inc.


45) All of these are ways to generate revenue using the freemium model except ________. A) sale of apps B) sale of virtual goods C) affiliate commissions D) pay-per-click E) donations Answer: D Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.4: How do (some) companies earn revenue from social media? Classification: Concept 46) ________ measures the frequency that someone who clicks on an ad makes a purchase, "likes" a site, or takes some other action desired by the advertiser. A) Freemium revenue model B) Digital ad spending C) Company revenue D) Business-to-consumer revenue model E) Conversion rate Answer: E Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.4: How do (some) companies earn revenue from social media? Classification: Concept 47) ________ is a location service that allows applications to know when a user has crossed a specific location and then triggers an automated action. A) Paid advertising B) Wi-fi C) GPS D) Geofencing E) Mobile ad services Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.4: How do (some) companies earn revenue from social media? Classification: Concept

14 Copyright © 2020 Pearson Education, Inc.


48) Social media companies generate revenue with advertising and charging for premium services. Answer: TRUE Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.4: How do (some) companies earn revenue from social media? Classification: Concept 49) Advertisers like digital ads because users can respond directly to Web ads by clicking on them. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.4: How do (some) companies earn revenue from social media? Classification: Concept 50) Mobile users click ads less often than PC users. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.4: How do (some) companies earn revenue from social media? Classification: Concept 51) The term use increases value means the more people use the site, the more value it has, and the more people will visit. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.4: How do (some) companies earn revenue from social media? Classification: Concept

15 Copyright © 2020 Pearson Education, Inc.


52) Describe the two most common ways social media generates revenue. Answer: The two most common ways SM companies generate revenue are advertising and charging for premium services. Most SM companies earn revenue through advertising. Advertising on SM can come in the form of paid search, display or banner ads, mobile ads, classifieds, or digital video ads. The freemium revenue model offers users a basic service for free and then charges a premium for upgrades or advanced features. LinkedIn earns part of its revenue by selling upgrades to its standard software as a service (SaaS) product. As of May 2018, regular users access LinkedIn for free; individual upgrades range from $29 to $99 a month and offer advanced search capabilities, greater visibility of user profiles, and more direct email messages to LinkedIn users outside one's network. Businesses that want to use LinkedIn for recruiting can purchase a Recruiter Corporate account for $120 to $1200 a month. Diff: 3 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.4: How do (some) companies earn revenue from social media? Classification: Concept 53) Define geofencing and provide an example of how it may work. Answer: Example answers may vary. Companies can use geofencing to target customers with ads when they are physically on company premises. Geofencing is a location service that allows applications to know when a user has crossed a virtual fence (specific location) and then triggers an automated action. For example, suppose a user enters a coffee shop and her phone automatically connects to the free Wi-Fi. An app on her phone recognizes the coffee shop wireless network and pushes an in-store ad to her phone for a free donut. Her phone might also be able to use her cellular network to determine her location, and she could see that there's a sale on shoes at the outdoor mall down the street. Diff: 3 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.4: How do (some) companies earn revenue from social media? Classification: Concept 54) What is the second step in developing a practical social media plan? A) Define your goals B) Identify target audience C) Make personal connections D) Define your value E) Identify success metrics Answer: E Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.5: How do organizations develop an effective SMIS? Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


55) ________ are measurements used to track performance. A) Key performance indicators B) Success metrics C) Geofences D) Conversion rates E) Click stream data Answer: A Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.5: How do organizations develop an effective SMIS? Classification: Concept 56) Julie explained to management that she only counts active users on the site and not only registered users. Measuring all of the registered users is considered a ________ and does not improve decision making. A) bounce rate B) success metric C) vanity metric D) conversion rate E) quantity metric Answer: C Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.5: How do organizations develop an effective SMIS? Classification: Concept 57) A question such as "Why should these users tweet about your products?" is identified under which social media development plan step? A) Define your goal. B) Define your value C) Identify success metrics D) Identify your target audience E) Gather data Answer: B Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.5: How do organizations develop an effective SMIS? Classification: Concept

17 Copyright © 2020 Pearson Education, Inc.


58) All of the following are common social media strategic goals except ________. A) brand awareness B) conversion rates C) identifying the target audience D) frequency of Web site traffic E) extent to which users interact with the site. Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.5: How do organizations develop an effective SMIS? Classification: Concept 59) A Kred score metric identifies with the ________ goal for social media metrics. A) key performance indicator B) conversion rate C) user engagement D) brand awareness E) web site traffic Answer: D Diff: 3 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.5: How do organizations develop an effective SMIS? Classification: Concept 60) What is one reason younger users are skeptical of organizational messages? A) Younger users listen to their parents who are skeptical of organizational messages. B) Younger users do not feel comfortable with social media coming from organizations. C) Younger users are more influenced by TV ads. D) Younger users prefer prepackaged organizational messages to learn about products. E) Younger users grew up with more sources of information. Answer: E Diff: 3 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.5: How do organizations develop an effective SMIS? Classification: Concept

18 Copyright © 2020 Pearson Education, Inc.


61) All of the following analytical tools are ways to gather success metrics except ________. A) Anecdotes from friends B) Google Analytics C) KISSmetrics D) Clicky E) Facebook Page Insights Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.5: How do organizations develop an effective SMIS? Classification: Concept 62) A bounce rate is the percentage of people who visit your Web site and then purchase a product. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.5: How do organizations develop an effective SMIS? Classification: Concept 63) List the steps in developing a social media plan. Answer: FALSE Diff: 3 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.5: How do organizations develop an effective SMIS? Classification: Concept 64) Younger users of social media are more trusting of the organizational messages. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.5: How do organizations develop an effective SMIS? Classification: Concept

19 Copyright © 2020 Pearson Education, Inc.


65) Describe how organizations can make personal connections with younger users. Answer: According to recent studies, younger users are more skeptical of organizational messages and may no longer listen to them. Such skepticism by younger consumers is understandable. They grew up with more sources of information and feel comfortable using social media. Skepticism of organizational messages gives a competitive advantage to organizations that can make personal connections with users via social media. Today, people want informed, useful interactions that help them solve particular problems and satisfy unique needs. They increasingly ignore prepackaged organizational messages that tout product benefits. This requires you to engage audience members, ask them questions, and respond to their posts. It also means you must avoid hard-selling products, overwhelming audience members with content, and contacting them too often. Diff: 3 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.5: How do organizations develop an effective SMIS? Classification: Concept 66) ________ is the use of emergent social software platforms within companies. A) Enterprise 2.0 B) Web 2.0 C) Folksonomy D) SLATES E) Web 3.0 Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.6: What is an enterprise social network (ESN)? Classification: Concept 67) All of the following are Enterprise 2.0 SLATES components except ________. A) search B) layers C) tags D) signals E) authoring Answer: B Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.6: What is an enterprise social network (ESN)? Classification: Concept

20 Copyright © 2020 Pearson Education, Inc.


68) ________ is defined as content structure that emerges from the processing of many user tags. A) Authoring B) Web 2.0 C) Folksonomy D) Enterprise social network E) Extension Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.6: What is an enterprise social network (ESN)? Classification: Concept 69) In the recent decades all of the following have altered existing communication channels except ________, A) email B) cable TV C) smartphones D) national newspapers E) Web sites Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.6: What is an enterprise social network (ESN)? Classification: Concept 70) Enterprise social networks have changed communication channels within corporations in all of the following dramatic ways except ________. A) the ability to create encrypted emails B) the ability for employees to bypass managers C) the ability for employees to quickly identify internal subject matter experts D) the ability to collaborate with global teams E) the ability to post ideas directly for the executive team to read Answer: A Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.6: What is an enterprise social network (ESN)? Classification: Concept

21 Copyright © 2020 Pearson Education, Inc.


71) All of the following are enterprise social network deployment best practices except ________. A) folksonomy B) strategy C) sponsorship D) support E) success Answer: A Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.6: What is an enterprise social network (ESN)? Classification: Concept 72) Providing incentives for enterprise social network adoption and use is under the ________ best practice. A) success metric B) strategy C) sponsorship D) support E) success Answer: D Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.6: What is an enterprise social network (ESN)? Classification: Concept 73) Organizations should use the same process for creating a plan to use enterprise social networks internally as using social media networks externally. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.6: What is an enterprise social network (ESN)? Classification: Concept 74) A potential problem with enterprise social networks is the quality of their state process. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.6: What is an enterprise social network (ESN)? Classification: Concept

22 Copyright © 2020 Pearson Education, Inc.


75) Briefly discuss McAfee's SLATES Model in Enterprise 2.0 (ESN). Answer: McAfee defined six characteristics that he refers to with the acronym SLATES. First, workers want to be able to search for content inside the organization just like they do on the Web. Second, workers want to access organizational content via links, just as they do on the Web. They also want to author organizational content using blogs, wikis, discussion groups, published presentations, and so on. The fourth characteristic of ESNs is that their content is tagged, just like content on the Web, and these tags are organized into structures Fifth, workers want applications that enable them to rate tagged content and to use the tags to predict content that will be of interest to them. Finally, workers to be signaled when something of interest to them happens in organizational content. Diff: 3 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.6: What is an enterprise social network (ESN)? Classification: Concept 76) How would an organization successfully deploy an enterprise social network (ESN)? Answer: The use of ESNs in organizations is new, and organizations are still learning how to use ESNs successfully Before deploying an ESN, organizations should develop a strategic plan for using SM internally via the same process they used for their external social media use. Once a strategic plan has been created, an ESN can then be implemented. Deploying new systems– including ESNs–can be problematic, so the organization's strategic plan should be sure to address possible challenges, including the likelihood of employee resistance. In order to ensure a successful implementation of an ESN, organizations can also follow industry best practices, or methods that have been shown to produce successful results in prior implementations. When implementing an ESN, successful companies follow a process of four stages having the elements strategy, sponsorship, support, and success. Diff: 3 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.6: What is an enterprise social network (ESN)? Classification: Concept 77) A statement that delineates employees' rights and responsibilities is known as a(n) ________. A) social media policy B) statement of denial C) censorship plan D) index of social media rights E) open policies plan Answer: A Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.7: How can organizations address SMIS security concerns? Classification: Concept

23 Copyright © 2020 Pearson Education, Inc.


78) Which of the following is the best way for organization employees to avoid a misstep when using social media? A) Display the company polices on the bulletin board. B) Hold annual security training for the employees. C) Social media is so new, employees do not make missteps. D) Publicly punish any employee that misuses social media. E) If a misstep occurs, shut down the social media site. Answer: B Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.7: How can organizations address SMIS security concerns? Classification: Concept 79) All of the following are major sources of problems from external user-generated content except ________. A) junk contributions B) unfavorable reviews C) mutinous movements D) appropriate content E) crackpot contributions Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.7: How can organizations address SMIS security concerns? Classification: Concept 80) User generated content should only be deleted by the organization in all of the following cases except ________. A) the contribution is inappropriate because they are contributed by crackpots B) if the user community requests it C) the comment has nothing to do with the site D) the comment is obscene E) the comment is inappropriate content Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.7: How can organizations address SMIS security concerns? Classification: Concept

24 Copyright © 2020 Pearson Education, Inc.


81) Companies should develop a social media policy for internal use. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.7: How can organizations address SMIS security concerns? Classification: Concept 82) In general, the more technical the organization the more open and lenient the social policies. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.7: How can organizations address SMIS security concerns? Classification: Concept 83) List three ways to respond to social networking problems generated by an unfavorable review. Answer: TRUE Diff: 3 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.7: How can organizations address SMIS security concerns? Classification: Concept 84) List and briefly describe the three key pillars of Intel's policy. Answer: The three key pillars of Intel's policy in 2018 are: Disclose: your presence in social media must be transparent • Protect: take extra care to protect both Intel and yourself • Use Common Sense: remember that professional, straightforward, and appropriate communication is best. Diff: 3 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.7: How can organizations address SMIS security concerns? Classification: Concept

25 Copyright © 2020 Pearson Education, Inc.


85) Describe some recent internal risks from social media? Answer: First, the use of social media can directly affect the ability of an organization to secure its information resources. seemingly innocuous comments such as "married 20 years ago today in Dallas" can inadvertently leak information used to secure access to organizational resources. The information could be used to reset a password. Second, employees may inadvertently increase corporate liability when they use social media. Finally, increased use of social media can be a threat to employee productivity. Posts, tweets, pins, likes, comments, and endorsements all take time. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.7: How can organizations address SMIS security concerns? Classification: Concept 86) What is a new position created because of social media? A) Chief Digital Officer (CDO) B) Chief Information Officer (CIO) C) Chief Social Media Officer (CSM) D) Chief Privacy Officer (CPO) E) Chief Metrics Officer (CMO) Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.8: 2029? Classification: Concept 87) The general belief of social media providers is that the users wouldn't mind the "small" loss of privacy if they got the service for free. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different business intelligence systems LO: 9.8: 2029? Classification: Concept

26 Copyright © 2020 Pearson Education, Inc.


Using MIS, 11e (Kroenke) Chapter 10 Information Systems Security 1) A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge. A) target B) vulnerability C) threat D) key escrow E) cipher Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 2) Which of the following is considered a threat caused by human error? A) an employee inadvertently installing an old database on top of the current one B) an employee intentionally destroying data and system components C) a virus and worm writer infecting computer systems D) a hacker breaking into a system to steal for financial gain E) a tsunami floods a data center causing total data loss Answer: A Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 3) Which of the following is considered a computer crime? A) accidental deletion of important records B) poorly written programs resulting in information loss C) loss of data as a result of flooding D) hacking of information systems E) failure to correctly back up customer data Answer: D Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept

1 Copyright © 2020 Pearson Education, Inc.


4) A person claiming to be from central IT called Chris and asked him to participate in a password reset audit. The person had Chris change his password to the word "123456", and then again to a secret passphrase only Chris knew. Later that day Chris noticed odd system behavior, and then the system crashed. Chris was a victim of ________. A) hacking B) usurping C) sniffing D) pretexting E) appropriating Answer: D Diff: 2 AACSB: Reflective Thinking Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Application 5) In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________. A) unauthorized data disclosure B) incorrect data modification C) faulty services D) loss of infrastructure E) SQL injection Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 6) Stan loves collecting stamps. He receives an email that appears to come from a well-known stamp auction site asking him to reset his username and password. He clicks on the link and it takes him to a site that looks similar to the auction site, but the Web address is "scrambled" and unreadable. He emails the customer service desk at the auction site and discovers they never sent the email. This scenario is an example of attempted ________. A) hacking B) phishing C) sniffing D) wardriving E) stack smashing Answer: B Diff: 3 AACSB: Reflective Thinking Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Application 2 Copyright © 2020 Pearson Education, Inc.


7) Email spoofing is a synonym for ________. A) hacking B) phishing C) usurping D) sniffing E) baiting Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 8) ________ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection in the case of wireless networks. A) Spoofing B) Phishing C) Sniffing D) Pretexting E) Port scanning Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 9) ________ take computers with wireless connections through an area and search for unprotected wireless networks, and then monitor and intercept wireless traffic on unsecured wireless networks. A) Keyloggers B) Pretexters C) Wardrivers D) Phishers E) Tibutors Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept

3 Copyright © 2020 Pearson Education, Inc.


10) Which of the following is a sniffing technique? A) IP spoofing B) caches C) denial of service D) adware E) port scanner Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 11) Sally has been working really hard lately and asks her manager for a raise. Her manager tells her that she is already the highest paid employee on the floor. Sally doesn't believe her manager, and illegally accesses the employee database to look at salary data. Sally's act can be termed as ________. A) pretexting B) phishing C) hacking D) spoofing E) skimming Answer: C Diff: 3 AACSB: Reflective Thinking Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Application 12) Which of the following is most likely to be a result of hacking? A) certain Web sites being censored for hurting sentiments B) small amounts of spam in a user's inbox C) an unauthorized transaction from a user's credit card D) pop-up ads appearing frequently E) slowing of network speed Answer: C Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept

4 Copyright © 2020 Pearson Education, Inc.


13) ________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed. A) Unauthorized data disclosure B) Incorrect data modification C) Denial of service D) Loss of infrastructure E) Unauthorized data encryption Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 14) ________ occurs when computer criminals invade a computer system and replace legitimate programs with their own, unauthorized ones that shut down legitimate applications. A) Encryption B) Spoofing C) Phishing D) Usurpation E) Spear Phishing Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 15) Which of the following usually happens in a malicious denial-of-service attack? A) A hacker monitors and intercepts wireless traffic at will. B) A hacker floods a Web server with many millions of bogus service requests. C) An intruder uses another site's IP address to masquerade as that other site. D) A phisher pretends to be a legitimate company and requests confidential data. E) A hacker identifies vulnerabilities in network hosts. Answer: B Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept

5 Copyright © 2020 Pearson Education, Inc.


16) ________ present(s) the largest risk for an organization's infrastructure loss. A) Employees' dissatisfaction B) Natural disasters C) Hackers D) Competitors E) Electromagnetic pulse weapons Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 17) ________ is a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations such as governments. A) State sponsored threat B) Lengthy collective C) Poisoned pool D) Hacker collective E) Advanced persistent threat Answer: E Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 18) All of the following are sources of threats except ________. A) human error B) computer crime C) natural events D) firewalls E) natural disasters Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept

6 Copyright © 2020 Pearson Education, Inc.


19) What is a potential problem if there is a natural disaster? A) property loss B) theft C) accidents D) terrorist activity E) hacking Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 20) A computer crime is committed if an employee inadvertently installs an old database on top of the current one. Answer: FALSE Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 21) Human error cannot cause unauthorized data disclosure. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 22) Spoofing occurs when someone pretends to be someone else. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 23) Phishing is a technique for obtaining unauthorized data that uses pretexting via email. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept

7 Copyright © 2020 Pearson Education, Inc.


24) Email spoofing is a synonym for phishing. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 25) IP spoofing occurs when an intruder uses another site's IP address to masquerade as that other site. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 26) Faulty service excludes problems that result due to incorrect data modification. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 27) A denial-of-service attack is launched when a hacker takes computers with wireless connections through an area and searches for unprotected wireless networks. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 28) Natural disasters present the largest risk for infrastructure loss. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept

8 Copyright © 2020 Pearson Education, Inc.


29) Advanced persistent threats (APT) can be funded by governments. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 30) Deleting browser cookies can make using your computer more difficult. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 31) Define threat, vulnerability, safeguard, and target. Answer: A threat is a person or organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge. A vulnerability is an opportunity for threats to gain access to individual or organizational assets. For example, when an individual buys something online, he or she provides his or her credit card data; when that data is transmitted over the Internet, it is vulnerable to threats. A safeguard is some measure that individuals or organizations take to block the threat from obtaining the asset. The target is the asset that is desired by the threat. Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 32) What are the three general sources of security threats? Answer: A security threat is a challenge to the integrity of information systems that arises from one of three sources: human errors and mistakes, computer crime, and natural events and disasters. Human errors and mistakes include accidental problems caused by both employees and nonemployees. Computer crime includes employees and former employees who intentionally destroy data or other system components. It also includes hackers who break into a system and virus and worm writers who infect computer systems. Natural events and disasters include fires, floods, hurricanes, earthquakes, tsunamis, avalanches, and other acts of nature. Problems in this category include not only the initial loss of capability and service, but also losses stemming from actions to recover from the initial problem. Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 9 Copyright © 2020 Pearson Education, Inc.


33) Define pretexting, phishing, spoofing, and sniffing. Answer: Pretexting occurs when someone deceives by pretending to be someone else. A common scam involves a telephone caller who pretends to be from a credit card company and claims to be checking the validity of credit card numbers. Phishing is a similar technique for obtaining unauthorized data that uses pretexting via email. The phisher pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth. Spoofing is another term for someone pretending to be someone else. IP spoofing occurs when an intruder uses another site's IP address to masquerade as that other site. Sniffing is a technique for intercepting computer communications. With wired networks, sniffing requires a physical connection to the network. With wireless networks, no such connection is required. Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 34) What is meant by denial of service? Answer: Human error in following procedures, or a lack of procedures, can result in denial of service. For example, humans can inadvertently shut down a Web server or corporate gateway router by starting a computationally intensive application. Computer criminals can launch an intentional denial-of-service attack in which a malicious hacker floods a Web server, for example, with millions of bogus service requests that so occupy the server that it cannot service legitimate requests. Finally, natural disasters may cause systems to fail, resulting in denial of service. Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.1: What is the goal of information systems security? Classification: Concept 35) Which of the following statements is TRUE about losses due to computer security threats? A) Surveys on computer crimes provide accurate results since they use standard parameters to measure and tally computer crime costs. B) Surveys suggest that some organizations do not report all their computer crime losses, and some will not report such losses at all. C) Losses due to natural disasters can be measured accurately. D) Losses due to human error are insignificant. E) Losses due to hacking may be overstated. Answer: B Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.2: How big is the computer security problem? Classification: Concept 10 Copyright © 2020 Pearson Education, Inc.


36) According to the Ponemon Institute study, what is a bottom line of security problems? A) Security safeguards do not work. B) Companies have to be forced to reveal if they have been hacked. C) Web-based attacks are increasingly serious threats. D) Detection and recovery account for less than 10% of the internal costs related to cyber intrusions. E) Ransomware attacks are on the decline. Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.2: How big is the computer security problem? Classification: Concept 37) The losses due to human error are minimal, and hence, organizations tend to ignore these losses. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.2: How big is the computer security problem? Classification: Concept 38) All of the studies on the cost of computer crime are based on surveys. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.2: How big is the computer security problem? Classification: Concept 39) Describe the magnitude of security problems in the present day. Answer: The full extent of the financial and data losses due to computer security threats is unknown. Certainly, the losses due to human error are enormous, but few organizations compute those losses and even fewer publish them. Losses due to natural disasters are also enormous and impossible to compute. The earthquake in Japan, for example, shut down Japanese manufacturing, and losses rippled through the supply chain from the Far East to Europe and the United States. One can only imagine the enormous expense for Japanese companies as they restored their information systems. Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.2: How big is the computer security problem? Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


40) Why does no one know the cost of computer crime? Answer: For one, there are no standards for tallying crime costs. Does the cost of a denial-ofservice attack include lost employee time, lost revenue, or long-term revenue losses due to lost customers? Or, if an employee loses a $2,000 laptop, does the cost include the value of the data that was on it? Does it include the cost of the time of replacing it and reinstalling software? Or, if someone steals next year's financial plan, how is the cost of the value that competitors glean determined? Second, all the studies on the cost of computer crime are based on surveys. Different respondents interpret terms differently, some organizations don't report all their losses, and some won't report computer crime losses at all. Absent standard definitions and a more accurate way of gathering crime data, we cannot rely on the accuracy of any particular estimate. The most we can do is look for trends by comparing year-to-year data, assuming the same methodology is used by the various types of survey respondents. Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.2: How big is the computer security problem? Classification: Concept 41) Which of the following is a personal security safeguard? A) sending valuable data only via email or IM B) using single password for all the sites C) removing high-value assets from computers D) storing browsing history, temporary files, and cookies E) disabling operating system updates Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.3: How should you respond to security threats? Classification: Concept 42) Nonword passwords are vulnerable to a ________ attack in which the password cracker tries every possible combination of characters. A) denial-of-service B) sniffing C) brute force D) phishing E) nuanced Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.3: How should you respond to security threats? Classification: Concept

12 Copyright © 2020 Pearson Education, Inc.


43) ________ are small files that enables a browser to access Web sites without having to sign in every time. A) Cookies B) Botnets C) Payloads D) Public keys E) Web bugs Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.3: How should you respond to security threats? Classification: Concept 44) Removing and disabling ________ that may contain sensitive security data presents an excellent example of the trade-off between improved security and cost. A) bookmarks B) pop-ups C) cookies D) toolbars E) key loggers Answer: C Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.3: How should you respond to security threats? Classification: Concept 45) All of the following are personal security safeguards except ________. A) Use https B) pop-ups C) regularly update antivirus software D) remove high-value assets from computers E) send no valuable data via email Answer: B Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.3: How should you respond to security threats? Classification: Concept

13 Copyright © 2020 Pearson Education, Inc.


46) One of the personal security safeguards is to use https at trusted, reputable vendors. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.3: How should you respond to security threats? Classification: Concept 47) Most emails and IMs are protected by encryption. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.3: How should you respond to security threats? Classification: Concept 48) Cookies enable an individual to access Web sites without having to sign in every time. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.3: How should you respond to security threats? Classification: Concept 49) Removing and disabling cookies presents an excellent example of the trade-off between improved security and cost. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.3: How should you respond to security threats? Classification: Concept

14 Copyright © 2020 Pearson Education, Inc.


50) List various personal security safeguards. Answer: The various personal security safeguards that one can implement for computer security: • One should take security seriously. • One should create strong passwords. • One should use multiple passwords. • One should not send valuable data via email or IM. • One should use https at trusted, reputable vendors. • One should remove high-value assets from computers. • One should clear browsing history, temporary files, and cookies. • One should update antivirus software. • One should demonstrate security concern to one's fellow workers. • One should follow organizational security directives and guidelines. • One should consider security for all business initiatives. Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.3: How should you respond to security threats? Classification: Concept 51) Which of the following is a critical security function that should be addressed by the senior management of an organization? A) sharing the private key with all systems connected to the network B) creating IS security software programs C) establishing the security policy D) avoiding the use of perimeter firewalls E) reducing internal systems auditing Answer: C Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.4: How should organizations respond to security threats? Classification: Concept 52) In information security, which of the following is TRUE about managing risk? A) All organizations except financial institutions should invest heavily in security safeguards. B) Organizations should implement safeguards that balance the trade-off between risk and cost. C) Passwords are classified as technical safeguards. D) Physical security is classified as human safeguards. E) All risks should be eliminated. Answer: B Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.4: How should organizations respond to security threats? Classification: Concept 15 Copyright © 2020 Pearson Education, Inc.


53) Which of the following is classified as a technical safeguard? A) cookies B) firewalls C) key escrow D) passwords E) training Answer: B Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.4: How should organizations respond to security threats? Classification: Concept 54) What is the basic information that a security policy must stipulate? Answer: At a minimum, a security policy should stipulate: • What sensitive data the organization will store • How it will process that data • Whether data will be shared with other organizations • How employees and others can obtain copies of data stored about them • How employees and others can request changes to inaccurate data Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.4: How should organizations respond to security threats? Classification: Concept 55) How should organizations make trade-off decisions when it comes to assessing security threats? Answer: To make trade-off decisions, organizations need to create an inventory of the data and hardware they want to protect and then evaluate safeguards relative to the probability of each potential threat. Given this set of inventory and threats, the organization needs to decide how much risk it wishes to take or, stated differently, which security safeguards it wishes to implement. Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.4: How should organizations respond to security threats? Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


56) All of the following are ways to avoid most malware except ________. A) install antivirus B) open email attachments only from known sources C) use public Wi-Fi D) browse only reputable Web sites E) update malware definitions Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 57) A(n) ________ has a microchip in it to hold data. A) ATM card B) smart card C) cookie D) key escrow E) dropper Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 58) Users of smart cards are required to enter a ________ to be authenticated. A) Social Security number B) public key C) personal identification number D) private key E) passphrase Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept

17 Copyright © 2020 Pearson Education, Inc.


59) Which of the following is used for biometric authentication? A) smart cards B) facial features C) passwords D) personal identification numbers E) MD5 hashes Answer: B Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 60) Which of the following statements is TRUE about biometric identification? A) It involves the use of a personal identification number (PIN) for authentication. B) It provides weak authentication. C) It is a relatively inexpensive mode of authentication. D) It often faces resistance from users for its invasive nature. E) It will decline in usage in the future. Answer: D Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 61) A ________ is a string of bits used to encrypt data. A) key B) honeypot C) cookie D) cache E) cipher Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept

18 Copyright © 2020 Pearson Education, Inc.


62) In a special version of asymmetric encryption, each site has a ________ for encoding messages. A) botnet B) private key C) public key D) cookie E) cipher Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 63) With ________, the sender and receiver transmit a message using different keys. A) asymmetric encryption B) a block cipher C) symmetric encryption D) a stream cipher E) a Caesar shift Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Application 64) Secure Sockets Layer is also known as ________. A) Advanced Persistent Threat Layer B) Transport Layer Security C) Presentation Interface Layer D) Network Interface Layer Security E) Media Access Security Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept

19 Copyright © 2020 Pearson Education, Inc.


65) Which of the following statements is TRUE about the Secure Sockets Layer (SSL)? A) It uses asymmetric encryption exclusively. B) It is used to send sensitive data such as credit card numbers. C) It uses one set of encryption keys for multiple sessions. D) It is a stronger version of https. E) It is used in wireless encryption suites. Answer: B Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 66) Layla is purchasing a new laptop from an online vendor. Which of the following will be displayed in the address bar of his browser that will let her know that the online retailer is using the Secure Sockets Layer (SSL) protocol? A) ftp B) www C) https D) .com E) smtp Answer: C Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Application 67) A ________ examines each part of a message and determines whether to let that part pass. A) packet-filtering firewall B) private key C) mail server D) wardriver E) nmap Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept

20 Copyright © 2020 Pearson Education, Inc.


68) Packet-filtering firewalls ________. A) can filter both inbound and outbound traffic B) examine the destination address but not the source address C) are the most complex type of firewall D) seldom examine the data or the addresses of the message E) can examine the contents of VPN packets Answer: A Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 69) ________ is a broad category of software that includes viruses, spyware, and adware. A) Malware B) Cookie C) Firewall D) Spam E) Crackers Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 70) In the context of malware protection, the program code that causes the unwanted actions is called the ________. A) payload B) kernel C) bot herder D) key escrow E) bundler Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept

21 Copyright © 2020 Pearson Education, Inc.


71) ________ are viruses that masquerade as useful programs or files. A) Adware programs B) Spyware programs C) Trojan horses D) Worms E) Hydras Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 72) A ________ is a type of virus that self-propagates using the Internet or other computer network. A) worm B) sniffer C) Trojan horse D) phisher E) mole Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 73) Sarah was browsing an online shopping site when a program got downloaded onto her system without her knowledge. The next day she found that her search engine had been changed, and she received pop-up advertisements of the shopping site she had visited the previous day. The program on Sarah's system is ________. A) a cookie B) adware C) a payload D) a Trojan horse E) a stack smasher Answer: B Diff: 3 AACSB: Reflective Thinking Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Application

22 Copyright © 2020 Pearson Education, Inc.


74) Which of the following is likely to be accepted by a poorly designed application thereby leading to improper disclosure of data? A) public key B) asymmetric encryption C) key escrow D) SQL injection E) SHA1 hash Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 75) Technical safeguards involve the hardware and software components of an information system. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 76) A magnetic strip holds far more data than a microchip. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 77) Biometric authentication uses physical characteristics such as retinal scans to authenticate users. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 78) Symmetric encryption is simpler and much faster than asymmetric encryption. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 23 Copyright © 2020 Pearson Education, Inc.


79) Secure Sockets Layer (SSL) is a protocol that is restricted to asymmetric encryption. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 80) A Trojan horse is a virus that masquerades as a useful program or file. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 81) Most spyware programs are benign in that they do not perform malicious acts or steal data. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 82) Improper data disclosure and data damage and loss are possible consequences of an SQL injection attack. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 83) Organizations normally use one strong firewall to protect the network. Answer: FALSE Diff: 1 AACSB: Ethical Understanding and Reasoning Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept

24 Copyright © 2020 Pearson Education, Inc.


84) Define encryption and explain symmetric and asymmetric encryption for computer systems. Answer: Encryption is the process of transforming clear text into coded, unintelligible text for secure storage or communication. To encrypt a message, a computer program uses the encryption method (say AES) combined with the key (say the word "key") to convert a plain text message (in this case the word "secret") into an encrypted message. The resulting coded message ("U2FsdGVkX1+b637aTP80u+y2WYlUbqUz2XtYcw4E8m4=") looks like gibberish. Decoding (decrypting) a message is similar; a key is applied to the coded message to recover the original text. In symmetric encryption, the same key is used to encode and to decode the message. With asymmetric encryption, two keys are used; one key encodes the message, and the other key decodes the message. Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 85) What is a virus? Differentiate between Trojan horses and worms. Answer: A virus is a computer program that replicates itself. • Trojan horses are viruses that masquerade as useful programs or files. • A worm is a virus that self-propagates using the Internet or other computer network. Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 86) What are spyware and adware programs? Answer: Spyware programs are installed on the user's computer without the user's knowledge or permission. Spyware resides in the background and, unknown to the user, observes the user's actions and keystrokes, monitors computer activity, and reports the user's activities to sponsoring organizations. Some malicious spyware, called key loggers, captures keystrokes to obtain user names, passwords, account numbers, and other sensitive information. Adware is similar to spyware in that it is installed without the user's permission and that it resides in the background and observes user behavior. Most adware is benign in that it does not perform malicious acts or steal data. It does, however, watch user activity and produce pop-up ads. Adware can also change the user's default window or modify search results and switch the user's search engine. Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept

25 Copyright © 2020 Pearson Education, Inc.


87) Describe six malware safeguards. Answer: It is possible for users to avoid most malware using the following malware safeguards: • Users should install antivirus and antispyware programs on the computer–The IS department will have a list of recommended programs for this purpose. When users choose a program for themselves, they should choose one from a reputable vendor. Reviews of antimalware software should be checked on the Web before purchasing. • Users should set up the antimalware programs to scan the computer frequently–Users should scan their computers at least once a week and possibly more often. When they detect malware code, they should use the antimalware software to remove it. If the code cannot be removed, users should contact the IS department or antimalware vendor. • Users should update malware definitions–Malware definitions are patterns that exist in malware code and should be downloaded frequently. Antimalware vendors update these definitions continuously, and users should install these updates as they become available. • Users should open email attachments only from known sources–also, even when opening attachments from known sources, users should do so with great care. Most antimalware programs check email attachments for malware code. However, all users should form the habit of never opening an email attachment from an unknown source. Also, if they receive unexpected emails from a known source or an email from a known source that has a suspicious subject, odd spelling, or poor grammar, users should not open the attachment without first verifying with the known source that the attachment is legitimate. • Users should promptly install software updates from legitimate sources–unfortunately, all programs are chock full of security holes; vendors are fixing them as rapidly as they are discovered, but the practice is inexact. Users should install patches to the operating system and application programs promptly. • Users should browse only reputable Web sites–It is possible for some malware to install itself when users do nothing more than open a Web page. Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept 88) Describe the difference between a perimeter firewall and an internal firewall? Answer: Organizations normally use multiple firewalls. A perimeter firewall sits outside the organizational network; it is the first device that Internet traffic encounters. In addition to perimeter firewalls, some organizations employ internal firewalls inside the organizational network. Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.5: How can technical safeguards protect against security threats? Classification: Concept

26 Copyright © 2020 Pearson Education, Inc.


89) ________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards. A) Data administration B) Authentication C) Usurpation D) Data encryption E) Access Control Answer: A Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.6: How can data safeguards protect against security threats? Classification: Concept 90) ________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database. A) Data encryption B) Database administration C) Data authentication D) Database normalization E) Data access control Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.6: How can data safeguards protect against security threats? Classification: Concept 91) Which of the following statements is TRUE about data administration? A) It is a line function to the chief information officer. B) It merely involves developing data policies. C) It applies to individuals and not to the entire organization. D) It is involved in establishing data safeguards. E) It defines standards for the use of cryptographic suites. Answer: D Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.6: How can data safeguards protect against security threats? Classification: Concept

27 Copyright © 2020 Pearson Education, Inc.


92) Key escrow is a(n) ________. A) protocol used to secure communication over the internet B) safety procedure that allows a trusted party to have a copy of the encryption key C) device that prevents unauthorized network access D) encryption algorithm that uses both public and private keys E) the creation of related public and private keys Answer: B Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.6: How can data safeguards protect against security threats? Classification: Concept 93) ________ protect databases and other organizational data. A) Cookies B) Payloads C) Data safeguards D) Data strings E) Data tunnels Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.6: How can data safeguards protect against security threats? Classification: Concept 94) The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________. A) stop SQL injection attacks B) prevent email spoofing C) prevent brute force attacks D) provide physical security E) prevent unauthorized encryption Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.6: How can data safeguards protect against security threats? Classification: Concept

28 Copyright © 2020 Pearson Education, Inc.


95) Which of the follow legal safeguards for data deals with the secure storage and processing of credit card data? A) The Gramm-Leach-Bliley (GLB) Act B) Payment Card Industry Data Security Standard (DCI DSS) C) Health Insurance Portability and Accountability Act (HIPAA) D) Privacy Principles E) Key Escrow Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.6: How can data safeguards protect against security threats? Classification: Concept 96) Which of the follow legal safeguards for data deals with the protection of consumer financial data stored by financial institutions. A) The Gramm-Leach-Bliley (GLB) Act B) Payment Card Industry Data Security Standard (DCI DSS) C) Health Insurance Portability and Accountability Act (HIPAA) D) Privacy Principles E) Key Escrow Answer: A Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.6: How can data safeguards protect against security threats? Classification: Concept 97) Which of the follow legal safeguards gives individuals the right to access health data created by doctors? A) The Gramm-Leach-Bliley (GLB) Act B) Payment Card Industry Data Security Standard (DCI DSS) C) Health Insurance Portability and Accountability Act (HIPAA) D) Privacy Principles E) Key Escrow Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.6: How can data safeguards protect against security threats? Classification: Concept

29 Copyright © 2020 Pearson Education, Inc.


98) Data protection laws may be stronger in other countries than in the United States. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.6: How can data safeguards protect against security threats? Classification: Concept 99) What is key escrow? Answer: An organization should protect sensitive data by storing it in encrypted form. Such encryption uses one or more keys. One potential problem with stored data, however, is that the key might be lost or that disgruntled or terminated employees might destroy it. Because of this possibility, when data are encrypted, a trusted party should have a copy of the encryption key. This safety procedure is sometimes called key escrow. Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.6: How can data safeguards protect against security threats? Classification: Concept 100) Which of the following statements is TRUE about the position definitions component of human safeguards? A) System administrators should retain user accounts after an employee has been terminated. B) All employees must be provided with uniform, general training on security regardless of the sensitivity of their positions. C) Documenting position sensitivity enables security personnel to prioritize their activities based on possible risk. D) Holding public users of Web sites accountable for security violations is easy and inexpensive. E) Security considerations should not be part of the hiring process. Answer: C Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.7: How can human safeguards protect against security threats? Classification: Concept

30 Copyright © 2020 Pearson Education, Inc.


101) ________ involve the people and procedure components of information systems. A) Firewalls B) Technical safeguards C) Human safeguards D) Payloads E) Port scanners Answer: C Diff: 1 AACSB: Ethical Understanding and Reasoning Course LO: Describe different methods of managing IS security LO: 10.7: How can human safeguards protect against security threats? Classification: Concept 102) Which of the following statements is TRUE about human safeguards for employees? A) Security screening in an organization is a one-time process and applies only to new employees. B) User accounts should be defined to give users the least possible privilege needed to perform their jobs. C) Companies should provide user accounts and passwords to employees prior to their security training. D) System administrators should retain user accounts after an employee has been terminated. E) There shouldn't be a separation of duty and authority. Answer: B Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.7: How can human safeguards protect against security threats? Classification: Concept 103) When an employee is terminated, IS administrators should receive advance notice so that they can ________. A) destroy the employee's records B) plan the recruitment of their positions C) disseminate information D) remove the user account and password E) clear the employee's browser history Answer: D Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.7: How can human safeguards protect against security threats? Classification: Concept

31 Copyright © 2020 Pearson Education, Inc.


104) ________ a Web site means to take extraordinary measures to reduce a system's vulnerability using special versions of the operating system. A) Pretexting B) Hardening C) Phishing D) Spoofing E) Spooling Answer: B Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.7: How can human safeguards protect against security threats? Classification: Concept 105) The process of hardening a Web site is a ________ safeguard. A) political B) financial C) technical D) physical E) virtual Answer: C Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.7: How can human safeguards protect against security threats? Classification: Concept 106) ________ are the primary means of authentication for a user's computer and other networks and servers to which the user may have access. A) Private keys B) User names C) Passwords D) Personal identification numbers E) CA key rings Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.7: How can human safeguards protect against security threats? Classification: Concept

32 Copyright © 2020 Pearson Education, Inc.


107) John has been appointed as an operations manager at a software company. Which of the following systems procedures will be John's responsibility? A) writing software program codes B) using systems to perform job tasks C) creating a backup of system databases D) knowing whom to contact when a security breach occurs E) prepare for loss of system functionality Answer: C Diff: 2 AACSB: Reflective Thinking Course LO: Describe different methods of managing IS security LO: 10.7: How can human safeguards protect against security threats? Classification: Application 108) PL Technologies suffered considerable data loss when its database was infected by a virus. George, an operations personnel, attempts to fix the damage by retrieving information from backed up data. George is involved in the process of ________. A) authentication B) hardening C) usurpation D) recovery E) systems hardening Answer: D Diff: 2 AACSB: Reflective Thinking Course LO: Describe different methods of managing IS security LO: 10.7: How can human safeguards protect against security threats? Classification: Application 109) Firewalls produce ________ that include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall. A) honeypots B) blogs C) activity logs D) Rich Site Summary (RSS) feeds E) blackboxes Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.7: How can human safeguards protect against security threats? Classification: Concept

33 Copyright © 2020 Pearson Education, Inc.


110) Jason attempts to hack into a banking site to steal customer information. He finds the security of the Web site lacking and is able to access the site with ease. Jason is arrested the next day and charged with computer crime. The banking site was able to track Jason's IP address because he had unknowingly attacked a ________. A) botnet B) hot site C) honeypot D) Web beacon E) Trojan horse Answer: C Diff: 3 AACSB: Reflective Thinking Course LO: Describe different methods of managing IS security LO: 10.7: How can human safeguards protect against security threats? Classification: Application 111) If an organization turns an employee's access off to the building while they are at lunch as a means of termination, this would be considered ________. A) a hostile situation B) mean C) an unfriendly termination D) enforcement of company rules E) separation termination Answer: C Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.7: How can human safeguards protect against security threats? Classification: Concept 112) Many companies create ________, which are false targets for computer criminals to attack. A) security checkpoints B) operational procedures C) backups of company data D) honeypots E) hacker centers Answer: D Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.7: How can human safeguards protect against security threats? Classification: Concept

34 Copyright © 2020 Pearson Education, Inc.


113) Documenting position sensitivity enables security personnel to prioritize their activities in accordance with the possible risk and loss. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.7: How can human safeguards protect against security threats? Classification: Concept 114) Business requirements do not necessitate opening information systems to nonemployee personnel, such as temporary personnel, vendors, or partner personnel. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.7: How can human safeguards protect against security threats? Classification: Concept 115) Hardening a site means to take extraordinary measures to reduce a system's vulnerability. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.7: How can human safeguards protect against security threats? Classification: Concept

35 Copyright © 2020 Pearson Education, Inc.


116) Discuss some human safeguards for employees that can ensure the security of information systems. Answer: Human safeguards involve the people and procedure components of information systems. In general, human safeguards result when authorized users follow appropriate procedures for system use and recovery. Restricting access to authorized users requires effective authentication methods and careful user account management. In addition, appropriate security procedures must be designed as part of every information system, and users should be trained on the importance and use of those procedures. The various human safeguards for employees are: Position Definitions–It is impossible to have effective human safeguards unless job tasks and responsibilities are clearly defined for each employee position. In general, job descriptions should provide a separation of duties and authorities. Hiring and Screening–Security considerations should be part of the hiring process. When hiring for high-sensitivity positions, extensive interviews, references, and background investigations are appropriate. Dissemination and Enforcement–Employees need to be trained on security policies, procedures, and the responsibilities they will have. Employee security training begins during new-employee training, with the explanation of general security policies and procedures. That general training must be amplified in accordance with the position's sensitivity and responsibilities. Termination–Companies also must establish security policies and procedures for the termination of employees. Standard human resources policies should ensure that system administrators receive notification in advance of the employee's last day, so that they can remove accounts and passwords. Procedures for recovering keys for encrypted data and any other security assets must be part of the employee's out-processing. Diff: 3 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.7: How can human safeguards protect against security threats? Classification: Concept 117) All of the following should be in an incident-response plan except ________. A) the person who caused the incident B) how employees respond to security problems C) who should be contacted in case of an incident D) the reports that should be created because of the incident E) how to reduce further lose Answer: A Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.8: How should organizations respond to security incidents? Classification: Concept

36 Copyright © 2020 Pearson Education, Inc.


118) If the incident-response plan is not well-prepared, there is substantial risk that the actions of well-meaning people will make the problem worse. Answer: TRUE Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.8: How should organizations respond to security incidents? Classification: Concept 119) Every organization should have an incident-response plan as part of the security program. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.8: How should organizations respond to security incidents? Classification: Concept 120) How should organizations respond to security incidents? Answer: First, every organization should have an incident-response plan as part of the security program. No organization should wait until some asset has been lost or compromised before deciding what to do. The plan should include how employees are to respond to security problems, whom they should contact, the reports they should make, and steps they can take to reduce further loss. An incident-response plan will stipulate what an employee should do when he or she notices the virus. It should specify whom to contact and what to do. It may stipulate that the employee should turn off his or her computer and physically disconnect from the network. The plan should also indicate what users with wireless computers should do. When an incident does occur, speed is of the essence. The longer the incident goes on, the greater the cost. Viruses and worms can spread very quickly across an organization's networks, and a fast response will help to mitigate the consequences. Because of the need for speed, preparation pays. The incident-response plan should identify critical personnel and their off-hours contact information. These personnel should be trained on where to go and what to do when they get there. Finally, organizations should periodically practice incident response. Without such practice, personnel will be poorly informed on the response plan, and the plan itself may have flaws that only become apparent during a drill. Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.8: How should organizations respond to security incidents? Classification: Concept

37 Copyright © 2020 Pearson Education, Inc.


121) Technology is moving faster than the public or elected officials can educate themselves making it more difficult to police electronic security. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.9: 2029? Classification: Concept 122) How will computer crime change in the coming years? Answer: Computer crime is a game of cat and mouse. Computer criminals find a vulnerability to exploit, and they exploit it. Computer security experts discover that vulnerability and create safeguards to thwart it. Computer criminals find a new vulnerability to exploit, computer security forces thwart it, and so it goes. The next major challenges will likely be those affecting mobile devices. However, security on these devices will be improved as threats emerge that exploit their vulnerabilities. This cat-and-mouse game is likely to continue for at least the next 10 years. No super-safeguard will be devised to prevent computer crime, nor will any particular computer crime be impossible to thwart. However, the skill level of this cat-and-mouse activity is likely to increase, and substantially so. Because of increased security in operating systems and other software, and because of improved security procedures and employee training, it will become harder and harder for the lone hacker to find some vulnerability to exploit–not impossible, but vastly more difficult. Diff: 2 AACSB: Information Technology Course LO: Describe different methods of managing IS security LO: 10.9: 2029? Classification: Concept

38 Copyright © 2020 Pearson Education, Inc.


Using MIS, 11e (Kroenke) Chapter 11 Information Systems Management 1) Developing, operating, and maintaining an organization's computing infrastructure is a major function of the ________ department. A) human resources B) information systems C) marketing D) manufacturing E) accounting Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 2) Which of the following statements is TRUE of the information systems (IS) department? A) If the IS primarily support accounting and finance activities, the chief financial officer (CFO) is appointed as the chief information officer (CIO). B) Programs used in all information systems are developed in-house by the maintenance group. C) The operations group monitors user experience and responds to user problems. D) Data administration is performed exclusively by the outsourcing relations group. E) Data backup is performed primarily by the marketing group. Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 3) Thompson is the chief information officer at a processed food manufacturing company. The information systems used in the company are manufacturing oriented and provide little support to accounting. In this case, Thompson will most likely report to the ________ of the company. A) chief financial officer B) chief executive officer C) director of information services D) chief technology officer E) chief information security officer Answer: B Diff: 2 AACSB: Reflective Thinking Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Application

1 Copyright © 2020 Pearson Education, Inc.


4) Which of the following is a responsibility of a chief information officer (CIO)? A) serving as the principal manager of the IS department B) heading the technology group C) evaluating new technologies that are relevant to the organization D) developing processes and information systems (IS) that implement business strategy E) overseeing the Chief Security Officer (CSO) Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 5) Which of the following is a function of the technology office in an organization's information systems (IS) department? A) managing computing infrastructure B) creating new information systems C) investigating new information systems D) maintaining existing information systems E) securing existing information systems Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 6) In an information systems (IS) department, the ________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media. A) operations B) technology C) development D) maintenance E) network Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept

2 Copyright © 2020 Pearson Education, Inc.


7) Which of the following statements is TRUE of the operations group in an organization's information system (IS) department? A) It establishes data standards and data management practices and policies. B) It monitors the user experience and responds to their problems. C) It manages all computing infrastructure except in-house server farms and communications media. D) It includes technical writers if the programs are developed in-house. E) It manages all outsourcing. Answer: B Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 8) In the information system (IS) department, the ________ group exists in organizations that have negotiated outsourcing agreements with other companies to provide equipment, applications, or other services. A) operations B) technology C) development D) outsourcing relations E) networking Answer: D Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 9) In the information system (IS) department, the ________ group manages the process of creating new information systems as well as maintaining existing information systems. A) operations B) technology C) development D) outsourcing relations E) networking Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept

3 Copyright © 2020 Pearson Education, Inc.


10) If an organization does not develop programs in-house, then the development group of the information system (IS) department will be staffed primarily by ________ who work with users, operations, and vendors to acquire and install licensed software and to set up the system components around that software. A) programmers and development personnel B) PQA test engineers C) business and systems analysts D) technical writers E) penetration testers Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 11) The purpose of a ________ group is to protect data and information assets by establishing data standards and data management practices and policies. A) data administration B) data warehousing C) data mining D) data communication E) data auditors Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 12) A ________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans. A) systems analyst B) business analyst C) user support representative D) network administrator E) server administrator Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept

4 Copyright © 2020 Pearson Education, Inc.


13) A ________ manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital. A) systems analyst B) chief information security officer C) chief security officer D) network administrator E) server administrator Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 14) A ________ manages security for the organization's information systems and information. A) systems analyst B) chief information security officer C) chief security officer D) network administrator E) server administrator Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 15) Jamie's company manufactures 3D printers, and his job is to prepare user manuals for the products. Jamie also prepares training material for the workers who are involved in the manufacturing process. With reference to his job profile, Jamie is a ________. A) systems analyst B) consultant C) programmer D) technical writer E) server administrator Answer: D Diff: 3 AACSB: Reflective Thinking Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Application

5 Copyright © 2020 Pearson Education, Inc.


16) The responsibilities of a tech support engineer include ________. A) helping users solve problems and providing training B) managing and protecting databases C) writing program documentation D) advising the chief information officer on emerging technologies E) design and write computer programs Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 17) A ________ monitors, maintains, fixes, and tunes computer networks. A) systems analyst B) chief information security officer C) chief security officer D) network administrator E) server administrator Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 18) The responsibilities of a person in the ________ group include selling software, network, communications, and consulting services. A) systems analyst B) consultant C) programmer D) technical sales E) server administrator Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept

6 Copyright © 2020 Pearson Education, Inc.


19) The responsibilities of a ________ include collaborating with cross-functional teams on projects and analyzing organizational data. A) systems analyst B) consultant C) business intelligence analyst D) technical sales E) server administrator Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 20) The responsibilities of a ________ include advising the chief information officer, executive group, and project managers on emerging technologies. A) technical writer B) chief financial officer C) systems analyst D) chief technology officer E) programmer Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 21) Which of the following statements is TRUE about a data administration staff function? A) The chief technology officer (CTO) heads the data administration staff function. B) The group establishes standards to protect information assets. C) This group includes system and network administrators exclusively. D) This group manages the process of creating new information systems. E) This is a subgroup under technical sales. Answer: B Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept

7 Copyright © 2020 Pearson Education, Inc.


22) Why did Target Corp. create a new C-level security position? A) Because it is required by the government to have a top-level security position. B) Because they lost 98 million customer accounts. C) Target did not create a C-level security position. D) Because the CEO has too much work to do. E) Because all the corporations were creating C-level security positions. Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 23) Who does the CSO report to in the organization? A) The Chief Information Security Office (CISO) B) The Chief Information Officer (CIO) C) The Chief Information Officer (CEO). D) The Board of Directors E) Directly to the consumer Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 24) One of the major functions of the information systems (IS) department is to develop, operate, and maintain applications. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 25) The structure of the information systems (IS) department remains constant across organizations. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept

8 Copyright © 2020 Pearson Education, Inc.


26) In all companies, the chief information officer (CIO) reports directly to the chief financial officer. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 27) The chief technology officer (CTO) manages the IS security program, protects the organization's information systems and information, and manages IS security personnel. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 28) If an organization does not develop programs in-house, then the development group of the information systems (IS) department will include programmers, test engineers, and technical writers. Answer: FALSE Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 29) The purpose of the data administration group is to protect data and information assets by establishing data standards and data management practices and policies. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 30) The terms "information systems" and "information technology" can be used interchangeably. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept

9 Copyright © 2020 Pearson Education, Inc.


31) Information technology (IT) must be placed into the structure of information systems (IS) before an organization can use it. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 32) With the exception of systems analysts, all the major job positions in the information systems (IS) industry require business knowledge. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 33) In the information systems (IS) industry, a business analyst works with business leaders to develop systems that implement business strategy and goals. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 34) In the information systems (IS) industry, a technical writer develops test plans, and designs and writes automated test scripts. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 35) To work in the information systems (IS) industry, a consultant should have an entrepreneurial attitude and communications and people skills. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept

10 Copyright © 2020 Pearson Education, Inc.


36) To work in the information systems (IS) industry, a network administrator should have good diagnostic skills, in-depth knowledge of communications technologies and products. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 37) All information systems positions deal with programming. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 38) List the major functions of the information systems (IS) department. Answer: The major functions of the IS department are as follows: • Plan the use of IS to accomplish organizational goals and strategy. • Develop, operate, and maintain the organization's computing infrastructure. • Develop, operate, and maintain applications. • Protect information assets. • Manage outsourcing relationships. Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 39) Describe the chief information officers, or CIO's typical reporting relationships. Answer: The title of the principal manager of the IS department varies from organization to organization. A common title is chief information officer, or CIO. The CIO, like other senior executives, reports to the chief executive officer (CEO), though sometimes these executives report to the chief operating officer (COO), who, in turn, reports to the CEO. This is typically the case in organizations such as manufacturers that operate significant nonaccounting information systems. In some companies, the CIO reports to the chief financial officer (CFO). This reporting arrangement might make sense if the primary information systems support only accounting and finance activities. Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


40) Describe the typical responsibilities of a chief technology officer (CTO). Answer: The chief technology officer, or CTO, often heads the technology group in an IS department. The CTO evaluates new technologies, new ideas, and new capabilities and identifies those that are most relevant to the organization. The CTO's job requires deep knowledge of information technology and the ability to envision and innovate applications for the organization. Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 41) Name the four groups found in typical information systems (IS) department, and explain the major responsibilities of each. Answer: • The IS departments include a technology office that investigates new information systems technologies and determines how the organization can benefit from them. The chief technology officer, or CTO, often heads the technology group. • The operations group manages the computing infrastructure, including individual computers, in-house server farms, networks, and communications media. This group includes system and network administrators. An important function for this group is to monitor the user experience and respond to user problems. • The development group manages the process of creating new information systems as well as maintaining existing information systems. • The outsourcing relations group exists in organizations that have negotiated outsourcing agreements with other companies to provide equipment, applications, or other services. Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.1: What are the functions and organization of the IS department? Classification: Concept 42) Which of the following is a limitation of aligning information systems (IS) with organizational strategy? A) Adapting the IS to new versions of business processes is complex and time-consuming. B) Aligning the IS direction with the organizational strategy occurs only when organizations merge. C) Aligning the IS direction with the organizational strategy occurs only when the divisions are sold. D) The steering committee provides a forum for the IS department to voice its complaints about the users. E) The steering committee provides a strong technical support base for users. Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept 12 Copyright © 2020 Pearson Education, Inc.


43) The ________ is the representative for information systems (IS) and information technology (IT) issues within the executive staff who provides the IS perspective during discussions of problem solutions, proposals, and new initiatives. A) chief operating officer B) chief technology officer C) chief information officer D) chief executive officer E) chief information security officer Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept 44) A(n) ________ is a group of senior managers from the major business functions that works with the chief information officer (CIO) to set the information systems (IS) priorities and decide among major IS projects and alternatives. A) steering committee B) discussion forum C) IS department D) directors committee E) tiger team Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept 45) Which of the following is a function of the steering committee for the information systems (IS) department? A) writing program code B) imparting training C) adapting software D) setting IS priorities E) performance testing Answer: D Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept

13 Copyright © 2020 Pearson Education, Inc.


46) Which of the following statements is TRUE about the steering committee of the information systems (IS) department? A) The steering committee is comprised of employees from the IS department in an organization. B) The steering committee's membership is determined by the IS department. C) The steering committee's schedule and agenda are typically set by the chief executive officer (CEO) and other members of the executive staff. D) The steering committee's meetings are conducted by the IS department. E) The steering committee is composed of developers and auditors. Answer: D Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept 47) Which of the following statements is TRUE about information systems (IS) planning functions? A) The chief operating officer (COO) is the sole representative for IS and IT issues within the executive staff. B) The steering committee represents the IS department exclusively in high-level discussions. C) The information systems (IS) department's priorities are developed by the chief executive officer (CEO). D) The chief executive officer (CEO) and other executive staff decide the membership of the steering committee. E) The CISO determines the composition of the steering committee. Answer: D Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept 48) All of the following are major IS planning functions except ________. A) choose the project team. B) align information systems with organizational strategy. C) communicate IS/IT issues to the executive group. D) develop IS priorities within the IS department. E) sponsor steering committee. Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept

14 Copyright © 2020 Pearson Education, Inc.


49) All of the following are loss of control risks except ________. A) high unit cost forever B) vendor in driver's seat C) identity changes D) technology direction E) enhancements in wrong priority Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept 50) Maintaining alignment between information systems direction with organizational strategy is a continuing process. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept 51) Information systems (IS) must evolve as the organization merges with other organizations or as divisions are sold. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept 52) Adapting information systems (IS) to new versions of business processes is a quick process. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept 53) The chief information officer (CIO) is the representative for information systems (IS) and information technology (IT) issues within the executive staff. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept 15 Copyright © 2020 Pearson Education, Inc.


54) The chief information officer (CIO) provides the information systems (IS) perspective during discussions of problem solutions, proposals, and new initiatives. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept 55) It is the chief information officer's responsibility to establish and communicate the information systems (IS) priorities to the executive group. Answer: TRUE Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept 56) A steering committee is a group of senior managers from the major business functions that works with the chief information officer (CIO) to set the information systems (IS) priorities. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept 57) The steering committee serves an important communication function between the executive group and the users of the information systems (IS). Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept 58) The steering committee provides a forum for users to express their needs, frustrations, and other issues they have with the information systems (IS) department. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


59) The chief executive officer (CEO) and other members of the executive staff usually set up the steering committee's schedule and agenda. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept 60) The information systems (IS) department determines the membership of a steering committee. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept 61) Adapting IS to new versions of business processes is easy and quick. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept

17 Copyright © 2020 Pearson Education, Inc.


62) Explain the major information systems (IS) planning functions. Answer: The major IS planning functions are: • Align information systems with organizational strategy–The purpose of an information system is to help the organization accomplish its goals and objectives. In order to do so, all information systems must be aligned with the organization's competitive strategy. Maintaining alignment between IS direction and organizational strategy is a continuing process. As strategies change, as the organization merges with other organizations, as divisions are sold, IS must evolve along with the organization. • Communicate IS/IT issues to executive group–The chief information officer (CIO) is the representative for IS and information technology (IT) issues within the executive staff. The CIO provides the IS perspective during discussions of problem solutions, proposals, and new initiatives. • Develop IS priorities and enforce them within the IS department–The CIO must ensure that priorities consistent with the overall organizational strategy are developed, and then communicated to the IS department. At the same time, the CIO must also ensure that the department evaluates proposals and projects for using new technology in light of those communicated priorities. • Sponsor the steering committee–A steering committee is a group of senior managers from the major business functions that works with the CIO to set the IS priorities and decide among major IS projects and alternatives. Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept 63) Describe a steering committee and explain the role of the chief information officer (CIO) in the steering committee. Answer: A steering committee is a group of senior managers from the major business functions that works with the CIO to set the IS priorities and decide among major IS projects and alternatives. The steering committee serves an important communication function between IS and the users. In the steering committee, information systems personnel can discuss potential IS initiatives and directions with the user community. At the same time, the steering committee provides a forum for users to express their needs, frustrations, and other issues they have with the IS department. Typically, the IS department sets up the steering committee's schedule and agenda and conducts the meetings. The chief executive officer (CEO) and other members of the executive staff determine the membership of the steering committee. Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.2: How do organizations plan the use of IS? Classification: Concept

18 Copyright © 2020 Pearson Education, Inc.


64) Linela Insurance needs to hire twenty accountants immediately to support its accounts receivable process. The hiring and training of the accountants requires a significant investment of funds and time, which the company cannot afford. Linela decides to hire another accounting firm to manage its accounts receivable process and thereby save time and money. This process is known as ________. A) merging B) outsourcing C) headhunting D) diversifying E) specializing Answer: B Diff: 3 AACSB: Reflective Thinking Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Application 65) Outsourcing is done to ________. A) diversify the business portfolio B) increase costs for outsourcing vendors C) cap an organization's financial exposure D) enhance management's focus on nonessential functions E) increase systems integrity Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 66) Which of the following statements is TRUE about outsourcing? A) It increases budgetary instability due to the level of risk involved. B) It saves both direct and indirect management time. C) It invariably leads to diseconomies of scale. D) It guarantees a higher level of quality than that provided in-house. E) It increases implementation risk. Answer: B Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept

19 Copyright © 2020 Pearson Education, Inc.


67) KPL Inc. is an outsource vendor. It handles the recruiting process for Numero Uno Computers. KPL recently changed its business strategy to a more profit-oriented one. This modification would require the company to charge more for its services. This change will be a ________ risk for Numero Uno Computers. A) de facto sole source B) benefits outweighed by long-term costs C) no easy exit D) loss of control E) high unit cost Answer: D Diff: 3 AACSB: Reflective Thinking Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Application 68) Which of the following statements is TRUE of outsourcing? A) Management should have expertise on a subject before it can decide to outsource. B) An outsource vendor transfers the responsibility of risk management to the development group. C) To achieve quality, it is easier to hire another vendor than it is to fire and rehire internal staff. D) Outsourcing leads to increased financial risk. E) There is little risk of losing intellectual capital. Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 69) Which of the following is a form of outsourcing? A) ANP Infotech buying off-the-shelf software from a vendor B) ANP Infotech customizing its information systems C) ANP Infotech acquiring licensed manufacturing software from a vendor D) ANP Infotech updating its data standards to protect its information assets E) ANP Infotech retraining internal employees Answer: C Diff: 3 AACSB: Reflective Thinking Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Application

20 Copyright © 2020 Pearson Education, Inc.


70) Which of the following is a form of outsourcing hardware infrastructure? A) acquiring licensed products B) Infrastructure as a service (IaaS) cloud hosting C) Software as a Service (SaaS) D) business function E) PBaaS (Business Process as a Service) Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 71) Which of the following is an outsourcing alternative in which hardware and both operating system and application software are leased? A) licensed software B) Infrastructure as a Service (IaaS) cloud hosting C) Software as a Service (SaaS) D) virtualization E) a bare metal installation Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 72) Which of the following is an example of outsourcing an entire business function? A) acquiring licensed security software instead of developing it in-house B) making customizations to licensed software C) paying another organization to arrange for employee travel D) acquiring virtualization technologies E) buying new hardware the reduces internal labor costs Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept

21 Copyright © 2020 Pearson Education, Inc.


73) In 2005, Marrion International chose a human resources consulting agency to handle its human resource needs for the next 7 years. This is an example of ________ outsourcing. A) network B) software C) business function D) application E) information Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Application 74) Atlanta Technologies outsourced its information technology (IT) support department to a vendor in China. The vendor company, however, faced repeated instances of software failure and now needs to make some changes to the information systems. Who among the following has control over prioritizing issues related to such changes? A) the chief technology officer at Atlanta (CTO) B) the vendor C) a third-party technician D) the chief information officer at Atlanta (CIO) E) the chief information security officer at Atlanta (CISO) Answer: B Diff: 3 AACSB: Reflective Thinking Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Application 75) Which of the following is a risk of outsourcing information systems (IS)/information technology (IT) functions? A) It is easier to end an agreement between a vendor and an organization that hired the vendor. B) It provides the hiring organization with too many choices. C) It involves the potential loss of intellectual capital. D) It invariably results in diseconomies of scale. E) the vendor and organization will share the same goals. Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept

22 Copyright © 2020 Pearson Education, Inc.


76) All of the following are reasons to outsource except to ________. A) obtain expertise B) obtain full-time services C) avoid management problems D) cap financial exposure E) reduce implementation risk Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 77) The process of hiring another organization to perform a service is known as outsourcing. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 78) Outsourcing neither saves time for direct management, nor for indirect management. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 79) It is impossible to cap financial risk by outsourcing. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 80) An organization reduces implementation risk by outsourcing information systems (IS). Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept

23 Copyright © 2020 Pearson Education, Inc.


81) In the context of outsourcing, once a company has chosen a vendor, further risk management is up to that vendor. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 82) The acquisition and operation of hardware infrastructure can be outsourced. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 83) Acquiring licensed software is a form of outsourcing. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 84) There is seldom any concern about the loss of intellectual capital with outsourcing. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 85) Outsourcing does not present any risks related to ending an agreement. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept

24 Copyright © 2020 Pearson Education, Inc.


86) If the outsource vendor's employees have gained significant knowledge of the company, ending the agreement is a major risk. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 87) Replacing an outsource vendor, who is integrated into the business, can be done without a lot of expenditure or duplication of effort. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 88) Freeing up management time is a reason that some companies choose to outsource. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 89) Once the contract for outsourcing ends, it is very easy to exit from the vendor. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept

25 Copyright © 2020 Pearson Education, Inc.


90) What is outsourcing? Explain the management advantages of outsourcing. Answer: Outsourcing is the process of hiring another organization to perform a service. Its management advantages are: • Obtain expertise–Outsourcing can be an easy way to gain expertise. Developing expertise is often expensive, and may not be in the company's strategic direction. The organization might choose to hire a specialist company to perform this service. • Avoid management problems–Outsourcing helps in avoiding the management problems that arise due to hiring and allotting tasks that require specific skills. • Free management time–Some companies choose to outsource to save management time and attention. Outsourcing saves both direct and indirect management time. Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 91) How does outsourcing help reduce costs? Answer: With outsourcing, organizations can obtain part-time services. Another benefit of outsourcing is to gain economies of scale. If a number of organizations outsource to the same vendor, then that vendor can make all of the adjustments once, and the cost of the change can be amortized over all of them (thus lowering the cost that the vendor must charge). Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 92) How does outsourcing facilitate risk reduction? Answer: Outsourcing caps financial risk and leads to greater budgetary stability. It can reduce risk by ensuring a certain level of quality, or avoiding the risk of having substandard quality. Hiring an outside cloud vendor reduces the risk of picking the wrong hardware or the wrong software, or implementing tax law changes incorrectly. Outsourcing gathers all of these risks into the risk of choosing the right vendor. Once the company has chosen the vendor, further risk management is up to that vendor. Diff: 3 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept

26 Copyright © 2020 Pearson Education, Inc.


93) Describe some of the advantages of outsourcing internationally. Answer: Many firms headquartered in the United States have chosen to outsource overseas. Microsoft and Dell, for example, have outsourced major portions of their customer support activities to companies outside the United States. India is a popular source because it has a large, well-educated, English-speaking population that will work for 20 to 30 percent of the labor cost in the United States. China and other countries are used as well. International outsourcing is particularly advantageous for customer support and other functions that must be operational 24/7. During the evening hours in the United States, customer service reps in India, where it is daytime, can handle the calls. When night falls in India, customer service reps in Ireland or Scotland can handle the early morning calls from the east coast of the United States. In this way, companies can provide 24/7 service without requiring employees to work night shifts. Diff: 3 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 94) Describe the different outsourcing alternatives for hardware, software, data, and procedures. Answer: Organizations have found hundreds of different ways to outsource information systems and portions of information systems. Some organizations outsource the acquisition and operation of computer hardware. Electronic Data Systems (EDS) has been successful for more than 30 years as an outsource vendor of hardware infrastructure. Acquiring licensed software is another form of outsourcing. Rather than develop the software inhouse, an organization licenses it from another vendor. Such licensing allows the software vendor to amortize the cost of software maintenance over all of the users, thus reducing that cost for all users. Software as a service (SaaS) is another outsourcing alternative, in which hardware and both operating system and application software are leased. Salesforce.com is a typical example of a company that offers SaaS. Another outsourcing alternative is to outsource an entire system. PeopleSoft (now owned by Oracle) attained prominence by providing the entire payroll function as an outsourced service. In such a solution, the vendor provides hardware, software, data, and some procedures. The company need provide only employee and work information; the payroll outsource vendor does the rest. Finally, some organizations choose to outsource an entire business function. For years, many companies have outsourced to travel agencies the function of arranging for employee travel. Diff: 3 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept

27 Copyright © 2020 Pearson Education, Inc.


95) Describe the loss of control associated with outsourcing. Answer: • Vendor in driver's seat–Each outsource vendor has methods and procedures for its service. The hiring organization and its employees will have to conform to those procedures. • Technology direction–Unless the contract requires otherwise, the outsource vendor chooses the technology that it wants to implement. If the vendor, for some reason, is slow to pick up on a significant new technology, then the hiring organization will be slow to attain benefits from that technology. An organization can find itself at a competitive disadvantage because it cannot offer the same information systems (IS) services as its competitors. • Potential loss of intellectual capital–The company may need to reveal proprietary trade secrets, methods, or procedures to the outsource vendor's employees. • Product fixes, enhancements in wrong priority–Quality vendors track software failures and problems and fix them according to a set of priorities. When a company outsources a system, it no longer has control over prioritizing those fixes. Such control belongs to the vendor. A fix that might be critical to the organization might be of low priority to the outsource vendor. • Vendor management, direction, or identity changes–The outsource vendor may change management, adopt a different strategic direction, or be acquired. When any of those changes occur, priorities may change, and an outsource vendor that was a good choice at one time might be a bad fit after it changes direction. It can be difficult and expensive to change an outsource vendor when this occurs. • Chief information officer (CIO) may become superfluous–When users need a critical service that is outsourced, the CIO must turn to the vendor for a response. In time, users learn that it is quicker to deal directly with the outsource vendor, and soon the CIO is out of the communication loop. At that point, the vendor has essentially replaced the CIO, who has become a figurehead. Diff: 3 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept

28 Copyright © 2020 Pearson Education, Inc.


96) Explain how the benefits of outsourcing are outweighed by its long-term costs. Answer: Outsourcing can appear too good to be true. Some of the benefits of outsourcing that are outweighed by its long-term costs are: • High unit cost, forever–Although a fixed cost does indeed cap exposure, it also removes the benefits of economies of scale. • Paying for someone else's mismanagement–An organization can find itself paying for another organization's mismanagement or may suffer the consequences of poor management, such as lost data. • In time, outsource vendor is de facto sole source–The outsource vendor may change its pricing strategy over time. Initially, an organization obtains a competitive bid from several outsource vendors. However, as the winning vendor learns more about the business and as relationships develop between the organization's employees and those of the vendor, it becomes difficult for other firms to compete for subsequent contracts. The vendor becomes the de facto sole source and, with little competitive pressure, might increase its prices. Diff: 3 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 97) Explain the risks associated with ending an outsourcing agreement. Answer: The risks associated with ending an outsourcing agreement are as follows: • Critical knowledge in minds of vendors, not employees–The outsource vendor's employees have gained significant knowledge of the company. They know the server requirements in customer support, they know the patterns of usage, and they know the best procedures for downloading operational data into the data warehouse. Consequently, lack of knowledge will make it difficult to bring the outsourced service back in-house. • Expensive and risky to change vendors–Because the vendor has become so tightly integrated into the business, parting company can be exceedingly risky. Because of such risk, the company must invest considerable work, duplication of effort, management time, and expense to change to another vendor. Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept

29 Copyright © 2020 Pearson Education, Inc.


98) Every information systems (IS) user has the right to a secure computing environment. This means that the ________. A) organization should protect his/her computer and its files B) user should solely be in charge of protecting the organization's computers and files C) user should inform the IS about software upgrades D) user will never face a network problem E) user should be in charge of applying system patches Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.4: What are your user rights and responsibilities? Classification: Concept 99) Which of the following is a right of users of information systems? A) right to install programs and applications of their choice B) right to make hardware modifications when desired C) right to receive effective training D) right to obtain the configuration of their choice E) right to use the operating system of your choice Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.4: What are your user rights and responsibilities? Classification: Concept 100) Which of the following is generally a responsibility of users of information systems (IS)? A) reporting trivial problems B) replacing legacy systems with improved ones C) installing unauthorized programs D) following security and backup procedures E) installing unauthorized hardware Answer: D Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.4: What are your user rights and responsibilities? Classification: Concept

30 Copyright © 2020 Pearson Education, Inc.


101) Which of the following statements is TRUE about users of information systems? A) They have a responsibility to protect their computers from viruses by installing their choice of antivirus software. B) They can avoid security and backup procedures. C) They should learn standard techniques and procedures for the applications they use. D) They should learn to install hardware and software on their own. E) They should learn how to recover the data and systems they use. Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.4: What are your user rights and responsibilities? Classification: Concept 102) SFA Inc. has a team of ten information systems (IS) personnel. The personnel are kept busy throughout the day as they help employees solve even the most trivial issues. In which of the following ways can the employees assist the IS personnel in this scenario? A) by learning basic computer skills B) by sharing their passwords with others to use their help in solving those trivial issues C) by installing security programs by themselves D) by making hardware modifications E) by setting up their own data backup schedules Answer: A Diff: 2 AACSB: Reflective Thinking Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.4: What are your user rights and responsibilities? Classification: Application 103) The information technology department is frustrated because they are constantly training one group on the same issue. The department manager reports it is the ________ to learn the system and not expect repetitive training. A) users' right B) common courtesy C) a network problem D) vendor's responsibility E) users' responsibility Answer: E Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.4: What are your user rights and responsibilities? Classification: Concept

31 Copyright © 2020 Pearson Education, Inc.


104) An organization should protect a user's computer and its files. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.4: What are your user rights and responsibilities? Classification: Concept 105) It is reasonable for information systems (IS) users to expect to receive repetitive training and support for the same issue. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.4: What are your user rights and responsibilities? Classification: Concept 106) Information systems (IS) users have a responsibility to follow security and backup procedures. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.4: What are your user rights and responsibilities? Classification: Concept 107) Installation of unauthorized hardware and programs may interfere with automated maintenance programs used for upgrading a user's computer. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.4: What are your user rights and responsibilities? Classification: Concept 108) If your employer has a policy concerning use of personal mobile devices at work, you are responsible for following it. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.4: What are your user rights and responsibilities? Classification: Concept

32 Copyright © 2020 Pearson Education, Inc.


109) List any four rights of users of information systems. Answer: Users of information systems have a right to: • Computer hardware and programs that allow them to perform their jobs proficiently • Reliable network and Internet services • A secure computing environment • Protection from viruses, worms, and other threats • Contribute to requirements for new system features and functions • Reliable systems development and maintenance • Prompt attention to problems, concerns, and complaints • Properly prioritized problem fixes and resolutions • Effective training Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.4: What are your user rights and responsibilities? Classification: Concept 110) List any four responsibilities of users of information systems (IS). Answer: Users of information systems have a responsibility to: • Learn basic computer skills • Learn standard techniques and procedures for the applications they use • Follow security and backup procedures • Protect their password(s) • Use computers and mobile devices according to the employer's computer-use policy • Make no unauthorized hardware modifications • Install only authorized programs • Apply software patches and fixes when directed to do so • When asked, devote the time required to respond carefully and completely to requests for requirements for new system features and functions • Avoid reporting trivial problems Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.4: What are your user rights and responsibilities? Classification: Concept

33 Copyright © 2020 Pearson Education, Inc.


111) Which of the following statements is TRUE about the changes and developments foreseen by the year 2029? A) Running a computer center will be the most promising career in each one's life. B) Most organizations will move their internal hardware infrastructure into the cloud. C) Software development lifecycle (SDLC) will be typically used for systems development. D) Small computing devices will lose their popularity and become more expensive. E) Nearly all information security problems will be solved by using more powerful AI. Answer: B Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.5: 2029? Classification: Concept 112) In the year 2019, what will organizations need to do to effectively engage their employees? A) Use social media B) Fight to keep a competitive advantage C) Employ only robots D) Provide all of their employees with mobile devices E) Create more technology related strategies Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.5: 2029? Classification: Concept 113) Most organizations will move their internal hardware infrastructure to the cloud in the next decade. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.5: 2029? Classification: Concept 114) By 2029, companies will no longer be concerned about security and therefore, will opt to keep data on their own, privately controlled servers. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.5: 2029? Classification: Concept

34 Copyright © 2020 Pearson Education, Inc.


115) In the next decade, running a computer center for anyone other than a cloud vendor will not be a promising career. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.5: 2029? Classification: Concept 116) There will most likely be a decline in the use of mobile devices at work in the next 10 years. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.5: 2029? Classification: Concept 117) In 2029 sharing and stealing confidential data will be much easier. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.5: 2029? Classification: Concept 118) By the year 2029, your co-worker may be a robot. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the key issues involved in managing the components of IT infrastructure LO: 11.5: 2029? Classification: Concept

35 Copyright © 2020 Pearson Education, Inc.


Using MIS, 11e (Kroenke) Chapter 12 Information Systems Development 1) Which of the following statements is TRUE of information systems? A) Information systems include all business process activities. B) Every information system has at least one application. C) Information systems should be bought entirely off-the-shelf. D) Every business process should include at least one information system. E) Information systems should consist of only one application. Answer: B Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.1: How are business processes, IS, and applications developed? Classification: Concept 2) Which of the following statements is TRUE about the relationship between business processes and information systems? A) A business process need not relate to any information system, but an information system relates to at least one business process. B) Information systems incorporate all business process activities and hence, should be developed before business processes. C) The relationship between business processes and information systems is one-to-one. D) Developing information systems before business processes ensures that all activities are considered in the development process. E) Developing information systems before business processes ensures that all systems are inherently secure. Answer: A Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.1: How are business processes, IS, and applications developed? Classification: Concept

1 Copyright © 2020 Pearson Education, Inc.


3) Which of the following is TRUE of scrum? A) It was developed to overcome the problems that occur when using the Business Process Modeling Notation (BPMN). B) It does not adapt to change easily. C) It is generic enough to be used for the development of business processes, information systems, and applications. D) Its work periods are usually three months or longer. E) It produces error free systems. Answer: C Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.1: How are business processes, IS, and applications developed? Classification: Concept 4) A ________ is a person who is well versed in an organization's strategy and focuses on ensuring that business processes and information systems meet the organization's competitive strategies. A) business analyst B) business application programmer C) business administrator D) business supervisor E) business developer Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.1: How are business processes, IS, and applications developed? Classification: Concept 5) ________ are information system (IS) professionals who understand both business and information technology. A) Development analysts B) Systems analysts C) Network administrators D) Database designers E) Systems administrators Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.1: How are business processes, IS, and applications developed? Classification: Concept

2 Copyright © 2020 Pearson Education, Inc.


6) ________ play a key role in moving development projects through the SDLC or scrum development process. A) Business analysts B) Programmers C) Systems analysts D) Database designers E) Technical managers Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.1: How are business processes, IS, and applications developed? Classification: Concept 7) A(n) ________is a combination of hardware, software, and data components that accomplishes a set of requirements. A) application B) process C) information system D) activity E) procedure Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.1: How are business processes, IS, and applications developed? Classification: Concept 8) Information systems and business processes are synonymous terms. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.1: How are business processes, IS, and applications developed? Classification: Concept 9) The activities in a business process often involve information systems. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.1: How are business processes, IS, and applications developed? Classification: Concept

3 Copyright © 2020 Pearson Education, Inc.


10) The actors or participants in a business process are the users of information systems. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.1: How are business processes, IS, and applications developed? Classification: Concept 11) Business processes, information systems, and applications have the same characteristics and components. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.1: How are business processes, IS, and applications developed? Classification: Concept 12) Not all information systems have applications or software components. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.1: How are business processes, IS, and applications developed? Classification: Concept 13) The relationship of business processes and information systems is many-to-many. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.1: How are business processes, IS, and applications developed? Classification: Concept

4 Copyright © 2020 Pearson Education, Inc.


14) Describe the composition of a development team for an information system (IS). Answer: Typical personnel on a development team are a manager (or managers for larger projects), business analysts, systems analysts, programmers, software testers, and users. A business analyst is someone who is well versed in Porter's models and organizational strategy, and who focuses, primarily, on ensuring that business processes and information systems meet the organization's competitive strategies. The primary focus of a business analyst is business processes. Systems analysts are IS professionals who understand both business and information technology. They focus primarily on IS development, but are involved with business analysts on the management of business processes as well. Systems analysts play a key role in moving development projects through the systems development life cycle (SDLC) or scrum development process. Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.1: How are business processes, IS, and applications developed? Classification: Concept 15) A ________ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function. A) business stature B) business analysis C) business process D) business policy E) business diagram Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept 16) In a business process, ________ are defined as collections of related tasks that receive inputs and produce outputs. A) activities B) databases C) resources D) presentations E) data stores Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept

5 Copyright © 2020 Pearson Education, Inc.


17) In a business process, a(n) ________ is defined as a collection of something. A) activity B) repository C) resource D) presentation E) application Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept 18) In a business process, a(n) ________ is defined as a collection of activities. A) activity B) repository C) data flow D) control flow E) role Answer: E Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept 19) In a business process, a(n) ________ directs the order of activities. A) activity B) repository C) data flow D) control flow E) role Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept

6 Copyright © 2020 Pearson Education, Inc.


20) In a business process, a(n) ________ shows the movement of data among activities and repositories. A) activity B) repository C) data flow D) control flow E) role Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept 21) Tranware Inc., an apparel manufacturer, receives cotton and other raw materials from its suppliers at the beginning of every quarter. With reference to this information, Tranware receives its ________ at the beginning of every quarter. A) deliverables B) physical repository C) data repository D) resources E) receivables Answer: B Diff: 2 AACSB: Reflective Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Application 22) In a business process, a role refers to ________. A) a physical repository B) the movement of data C) a collection of data D) a collection of activities E) a collection of systems Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept

7 Copyright © 2020 Pearson Education, Inc.


23) In a business process, resources are ________. A) people or computer applications that are assigned to roles B) collections of procedures and activities C) the total number of points of work that can be accomplished in each scrum period D) collections of related tasks that receive inputs and produce outputs E) data stores within the system Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept 24) In business process management (BPM), an as-is model ________. A) documents the existing business process B) contrasts the former and current states of a business process C) represents the desired state of a business process D) represents the ideal state of a business process E) predicts the likely future state of a business process Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept 25) In business process management (BPM), once the as-is model is created, the very next step that a team must take is to ________. A) obtain feedback about implementation B) assess the results of the changes C) look for improvement opportunities D) implement changes in the organization E) test implemented changes Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept

8 Copyright © 2020 Pearson Education, Inc.


26) Which of the following are the steps in the business process management (BPM) cycle? A) model processes; implement processes; assess results; create components B) create components; model processes; implement processes; assess results C) implement processes; create components; model processes; assess results D) model processes; create components; implement processes; assess results E) create components; implement processes; model processes; assess results Answer: D Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept 27) Control Objectives for Information and related Technology (COBIT) is often used in the ________ stage of the business process management (BPM) cycle. A) component creation B) implementation C) assessment D) process modeling E) maintenance Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept 28) XYZ Corp. has to change their online ordering system to compete with ABC Corp. They are changing their business process with a ________. A) change in technology B) change in product line C) change in business fundamentals D) company reorganization E) request to improve process quality Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept

9 Copyright © 2020 Pearson Education, Inc.


29) An inventory is an example of a physical repository. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept 30) In a business process, roles are collections of activities. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept 31) In a business process, only a single resource is assigned to a role. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept 32) Dimensions of process quality are effectiveness and efficiency. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept 33) The business process management cycle begins by creating a model of the existing business processes. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept

10 Copyright © 2020 Pearson Education, Inc.


34) An as-is model documents the desired outcome of a business process. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept 35) Implementing the new or changed process is the third activity in business process management. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept 36) Business process management applies only to commercial, profit-making organizations. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept 37) Effective BPM enables organizations to attain continuous process improvement. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept 38) Business process management only applies to commercial organizations. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


39) Define business process, roles, resources, and data flows. Answer: A business process is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function. Roles are collections of activities. Resources are people or computer applications that are assigned to roles. A data flow shows the movement of data among activities and repositories. Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept 40) Explain why process management is necessary for an organization. Answer: Processes are dynamic and often need to be changed. This need can arise because the quality of a process requires improvement, because of a change in technology, or because of a change in some business fundamentals. Process management is necessary for the following reasons: • Improve process quality–The need to monitor process quality and adjust process design, as appropriate, is one reason that processes need to be managed. • Change in technology–When new technology changes any of a process's activities in a significant way, the entire process needs to be evaluated. That evaluation is another reason for managing processes. • Change in business fundamentals–A substantial change in any of the following factors might result in the need to modify business processes: – Market (e.g., new customer category, change in customer characteristics) – Product lines – Supply chain – Company policy – Company organization (e.g., merger, acquisition) – Internationalization – Business environment Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept

12 Copyright © 2020 Pearson Education, Inc.


41) Name the stages of the business process management cycle and summarize the activities in each. Answer: Business process management (BPM) is a cyclical process for systematically creating, assessing, and altering business processes. This cycle begins by creating a model of the existing business process, called an as-is model. Then, business users who are involved in the process and business and systems analysts evaluate that model and make improvements. The next stage is to create system components. In this activity, the team designs changes to the business process at a depth sufficient for implementation. If the business process involves new information systems, or changes to existing information systems, then systems development projects are created and managed at this stage. In the third stage, new business processes or changes to existing business processes are implemented. Here, process actors are trained on the activities that they will perform and on the IS procedures that they will use. In the assessment stage, policy, procedures, and committees are created to continually assess business process effectiveness. The Information Systems Audit and Control Association has created a set of standard practices called COBIT (Control Objectives for Information and related Technology) that are often used in the assessment stage of the BPM cycle. When the assessment process indicates that a significant need for change has arisen, the BPM cycle is repeated and adjusted. New process models are developed, and components are created, implemented, and assessed. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.2: How do organizations use business process management (BPM)? Classification: Concept 42) ________ set the stage for the requirements for any information systems and applications that need to be created or adapted. A) Business repositories B) Business policies C) Business reports D) Business process models E) Business requirements Answer: D Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.3: How is business process modeling notation (BPMN) used to model processes? Classification: Concept

13 Copyright © 2020 Pearson Education, Inc.


43) Which of the following can be represented using the Business Process Modeling Notation (BPMN)? A) Gantt charts B) as-is models C) scatter plots D) PERT charts showing the critical path E) candle-stick charts Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.3: How is business process modeling notation (BPMN) used to model processes? Classification: Concept 44) ________ is a standard set of terms and graphical notations for documenting business processes. A) Business Process Modeling Notation (BPMN) B) Business Process Execution Language (BPEL) C) Component Object Model (COM) D) International Organization for Standardization (ISO) 9000 E) International Business Modeling Notation (IBMN) Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.3: How is business process modeling notation (BPMN) used to model processes? Classification: Concept 45) Which of the following statements is TRUE of the swim-lane layout used for modeling business processes? A) It complicates the process diagrams. B) It draws attention to the interactions among components of the diagram. C) Each role in the business process has to share the swim-lane with other roles. D) All activities for a given role are repeated in all the swim-lanes. E) It models knowledge flows Answer: B Diff: 2 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.3: How is business process modeling notation (BPMN) used to model processes? Classification: Concept

14 Copyright © 2020 Pearson Education, Inc.


46) Ryan is creating a Business Process Modeling Notation (BPMN) diagram for the manufacturing process of his organization. Which of the following should he use to represent the check inventory activity? A) a dotted arrow B) a rectangle C) a diamond D) a solid arrow E) a pentagon Answer: B Diff: 2 AACSB: Reflective Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 12.3: How is business process modeling notation (BPMN) used to model processes? Classification: Application 47) Melissa is in charge of creating a Business Process Modeling Notation (BPMN) diagram for the procurement department. The diagram will represent the separate paths to be followed for an old supplier and a new supplier. Which of the following shapes should Melissa use to represent the question "old supplier?" which can be answered with a yes or no as applicable? A) diamonds B) circles C) rectangles D) squares E) ovals Answer: A Diff: 3 AACSB: Reflective Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 12.3: How is business process modeling notation (BPMN) used to model processes? Classification: Application 48) In a Business Process Modeling Notation (BPMN) diagram, dotted arrows depict the flow of ________ in the process. A) resources B) messages and data C) tasks and activities D) control E) applications Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.3: How is business process modeling notation (BPMN) used to model processes? Classification: Concept

15 Copyright © 2020 Pearson Education, Inc.


49) In a Business Process Modeling Notation (BPMN) diagram, ________ depict the flow or sequence of activities in a process. A) dotted arrows B) diamonds C) solid arrows D) circles E) ovals Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.3: How is business process modeling notation (BPMN) used to model processes? Classification: Concept 50) In Business Process Modeling Notation (BPMN) diagrams, a square with a plus sign means that ________. A) a question can be answered with no B) it is the end of the process C) a question can be answered with yes D) an activity is considered to be a subprocess of a process E) it is the beginning of the process Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.3: How is business process modeling notation (BPMN) used to model processes? Classification: Concept 51) ________ created a standard of terms and graphical notations for document businesses processes. A) Business Process Modeling Notation (BPMN) B) Business Process Execution Language (BPEL) C) Component Object Model (COM) D) Object Management Group (OMG) E) International Business Modeling Notation (IBMN) Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.3: How is business process modeling notation (BPMN) used to model processes? Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


52) ________ depict(s) the flow of messages and data flows. A) Data B) An activity C) Solid arrows D) Dotted arrows E) A diamond Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.3: How is business process modeling notation (BPMN) used to model processes? Classification: Concept 53) In the swim-lane layout for modeling business processes, each role is given its own swim lane. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.3: How is business process modeling notation (BPMN) used to model processes? Classification: Concept 54) In Business Process Modeling Notation (BPMN), solid arrows depict the flow of messages and data. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.3: How is business process modeling notation (BPMN) used to model processes? Classification: Concept 55) Once the as-is model has been documented, that model can then be analyzed for problems or for improvement opportunities. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.3: How is business process modeling notation (BPMN) used to model processes? Classification: Concept

17 Copyright © 2020 Pearson Education, Inc.


56) What are the types of arrows used in the swim-lane layout of Business Process Modeling Notation (BPMN)? Answer: Dotted arrows and solid arrows are two kinds of arrows used in the swim-lane layout. Dotted arrows depict the flow of messages and data flows. Solid arrows depict the flow or sequence of the activities in the process. Some sequence flows have data associated with them as well. Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.3: How is business process modeling notation (BPMN) used to model processes? Classification: Concept 57) The traditional process for developing information systems is ________. A) the software testing life cycle B) the systems development life cycle C) the software defect life cycle D) product life cycle E) the rapid prototyping cycle Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 58) The first phase of the systems development life cycle (SDLC) is ________. A) defining the system B) implementing the system C) determining the requirements D) maintaining the system E) design system components Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept

18 Copyright © 2020 Pearson Education, Inc.


59) The second phase of the systems development life cycle (SDLC) is ________. A) defining the system B) implementing the system C) determining the requirements D) maintaining the system E) design system components Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 60) The third phase of the systems development life cycle (SDLC) is ________. A) defining the system B) implementing the system C) determining the requirements D) maintaining the system E) design system components Answer: E Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 61) The final phase of the systems development life cycle (SDLC) is ________. A) implementing the system B) determining the requirements C) maintaining the system D) designing system components E) define the system Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept

19 Copyright © 2020 Pearson Education, Inc.


62) The project plan which results from defining the system is the input to the ________ phase of the SDLC. A) system design B) requirement collection C) requirements analysis D) system maintenance E) systems implementation Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 63) The first step in the system definition phase of the systems development life cycle (SDLC) is to ________. A) plan the project B) conduct a feasibility study C) define the goals and scope D) form the project team E) conduct user interviews Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 64) Once the project's goals and scope have been defined, the next step in the system definition phase of the systems development life cycle (SDLC) is to ________. A) plan the project B) assess feasibility C) determine system requirements D) form a project team E) conduct user interviews Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept

20 Copyright © 2020 Pearson Education, Inc.


65) Which of the following are the dimensions of feasibility? A) planning, process, technical, and schedule feasibility B) operational, strategic, technical, and tactical feasibility C) cost, schedule, technical, and organizational feasibility D) schedule, process, technical, and competitive feasibility E) technical, process, procedural, and operational feasibility Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 66) Organizational feasibility concerns ________. A) the organization's budget and schedule requirements B) the competitor's business process model C) whether the organization has the technical infrastructure to implement the new system D) whether the new system fits within the organization's customs or legal requirements E) whether the organization has adequate financial funding Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 67) If a defined project is determined to be feasible in the systems development life cycle (SDLC), the next step is to ________. A) create and test components B) form the project team C) maintain the system D) assess process results E) conduct user interviews Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept

21 Copyright © 2020 Pearson Education, Inc.


68) During the requirements definition stage of developing an information system, the project team will consist mostly of ________. A) finance and account managers B) test engineers and business users C) business and systems analysts D) database designers and administrators E) systems engineers Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 69) Dentoin Pharmaceuticals requires an information system to support its new assembly line. The management has assigned a team of ten members to plan this project. Which of the following will be the first major task for this team? A) designing the system components B) assessing the project's feasibility C) planning the project D) defining the system goals and scope E) conduct user interviews Answer: D Diff: 2 AACSB: Reflective Thinking Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Application 70) ACES is a quality auditing firm. It has dedicated a team of managers, business analysts, and systems analysts to develop an information system that receives data and produces quarterly reports that grade companies on their quality rating. The team is using the five-phase systems development life cycle (SDLC) to develop this information system. During which of the following phases will the team identify what kind of reports need to be produced and how frequently? A) requirements analysis B) system implementation C) component design D) system definition E) system maintenance Answer: A Diff: 3 AACSB: Reflective Thinking Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Application 22 Copyright © 2020 Pearson Education, Inc.


71) The ________ phase of the systems development life cycle (SDLC) involves determining hardware and program specifications, designing the database and procedures, and creating job definitions. A) requirements analysis B) system implementation C) component design D) system definition E) system maintenance Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 72) Tasks in the ________ phase of the systems development life cycle (SDLC) are to build and test system components, and to convert users to the new system. A) system definition B) component design C) system maintenance D) system implementation E) requirements analysis Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 73) A(n) ________ is a formal description of a system's response to use and misuse scenarios. A) activity log B) work breakdown structure C) test plan D) defect report E) test scenario Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept

23 Copyright © 2020 Pearson Education, Inc.


74) During the system implementation phase of the systems development life cycle (SDLC), once a system has passed testing, the organization installs the new system. Which of the following terms is used to refer to this activity? A) system configuration B) system conversion C) system development D) system control E) system overlay Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 75) In the system implementation phase of the systems development life cycle (SDLC), with ________ installation, the organization implements the entire new system/business processes on a limited portion of the business. A) parallel B) phased C) pilot D) plunge E) immersion Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 76) In the system implementation phase of the systems development life cycle (SDLC), with ________ installation, the new system runs alongside the old one until it has been tested and is fully operational. A) pilot B) phased C) parallel D) plunge E) immersion Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept

24 Copyright © 2020 Pearson Education, Inc.


77) In the context of system implementation phase of the systems development life cycle (SDLC), a(n) ________ installation is the riskiest because the old system is shut down and the new system is introduced. A) pilot B) phased C) parallel D) plunge E) immersion Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 78) In the system implementation phase of the systems development life cycle (SDLC), with the ________ installation, the organization installs the next piece of the system only after the previous piece works. A) phased B) pilot C) parallel D) plunge E) immersion Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 79) The work done during the ________ phase is either to fix the system so that it works correctly or to adapt it to changes in requirements. A) implementation B) maintenance C) requirements analysis D) component design E) systems definition Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept

25 Copyright © 2020 Pearson Education, Inc.


80) Crispies is a breakfast cereal manufacturing company. It is shifting its manufacturing process from batch processing to assembly line production. The information system for the assembly line is ready to be installed. Crispies decides to completely shut down the batch processing system and install the new assembly line. This style of conversion is known as ________. A) parallel installation B) pilot installation C) plunge installation D) phased installation E) preemptive installation Answer: C Diff: 3 AACSB: Reflective Thinking Course LO: Discuss the role of information systems in supporting business processes LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Application 81) All of these are steps in the system definition except ________. A) define system goals and scope B) assess feasibility C) requirements analysis D) form the project team E) plan the project Answer: C Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 82) The systems development life cycle is the traditional process used to develop information systems and applications. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 83) The process of assessing a project's feasibility occurs during the component design phase of the systems development life cycle (SDLC). Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 26 Copyright © 2020 Pearson Education, Inc.


84) Unlike business analysts, systems analysts work more with managers and executives. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 85) Systems analysts facilitate the work of programmers, testers, and users. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 86) A project team that develops an information system (IS) will comprise business and systems analysts during the requirements definition phase. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 87) User involvement is critical throughout the system development process. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 88) SDLC rose to prominence when the U.S. Department of Defense required it on government contracts. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept

27 Copyright © 2020 Pearson Education, Inc.


89) The important point in systems analysis is for users to stay out of the process until the end. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 90) What events led to the development of the Systems Development Life Cycle (SDLC)? Answer: The systems development life cycle (SDLC) is the traditional process used to develop information systems and applications. Many early projects met with disaster, and companies and systems developers sifted through the ashes of those disasters to determine what went wrong. By the 1970s, most seasoned project managers agreed on the basic tasks that need to be performed to successfully build and maintain information systems. These basic tasks are combined into phases of systems development. SDLC rose to prominence when the U.S. Department of Defense required it on government contracts. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Concept 91) What are the phases of the systems development life cycle (SDLC)? Answer: The phases of the systems development life cycle are: • Define the system • Determine the requirements • Design system components • Implement the system • Maintain the system Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Synthesis 92) Define technical feasibility and organizational feasibility. Answer: Technical feasibility refers to whether existing information technology is likely to be able to meet the needs of the new system. Organizational feasibility concerns whether the new system fits within the organization's customs, culture, charter, or legal requirements. Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Synthesis

28 Copyright © 2020 Pearson Education, Inc.


93) Define cost feasibility and schedule feasibility. Answer: Cost feasibility is an assessment of whether the anticipated benefits of the system are likely to justify the estimated development and operational costs. In some cases, it also means whether the project can realistically be done within the budget provided. Schedule feasibility is an estimate of the time it will take to build the system. Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.4: What are the phases in the systems development life cycle (SDLC)? Classification: Synthesis 94) In systems development, documents, designs, prototypes, data models, database designs, and working data entry screens are examples of ________. A) reports B) resources C) components D) deliverables E) inputs Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.5: What are the keys for successful SDLC projects? Classification: Concept 95) Which of the following is one of the keys to successful systems development life cycle (SDLC) projects? A) critical path template B) work breakdown structure C) scatter plot D) control chart E) internal process auditing Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.5: What are the keys for successful SDLC projects? Classification: Concept

29 Copyright © 2020 Pearson Education, Inc.


96) A ________ shows the tasks, dates, and dependencies for the tasks of a project. A) fusion chart B) Gantt chart C) Pareto chart D) control chart E) hegemon chart Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.5: What are the keys for successful SDLC projects? Classification: Concept 97) The ________ is a sequence of activities that determine the earliest date by which a project can be completed. A) exit path B) cycle route C) critical path D) scatter route E) b-tree path Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.5: What are the keys for successful SDLC projects? Classification: Concept 98) A ________ involves balancing three critical factors: requirements, cost, and time. A) work breakdown structure (WBS) B) trade-off C) test plan D) critical path E) diagnostic plan Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.5: What are the keys for successful SDLC projects? Classification: Concept

30 Copyright © 2020 Pearson Education, Inc.


99) According to Brooks' Law, adding more people to a late project will ________. A) guarantee efficiencies B) speed up the project C) create diseconomies of scale D) reduce the need for coordination E) reduce managerial overhead Answer: C Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.5: What are the keys for successful SDLC projects? Classification: Concept 100) The situation that occurs when the addition of resources creates inefficiencies is known as ________. A) diseconomies of scale B) marginal utility C) marginal returns D) break-even E) inverse efficacy Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.5: What are the keys for successful SDLC projects? Classification: Concept 101) The final work breakdown structure (WBS) plan shows planned tasks, dependencies, durations, and resource assignments. It is denoted as ________ WBS. A) test B) baseline C) standard D) benchmark E) path Answer: B Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.5: What are the keys for successful SDLC projects? Classification: Concept

31 Copyright © 2020 Pearson Education, Inc.


102) The term ________ refers to a set of management policies, practices, and tools that developers use to maintain control over the systems development life cycle (SDLC) project's resources. A) swim-lane layout B) trade-off C) transmission control protocol D) configuration control E) seven-phase Answer: D Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.5: What are the keys for successful SDLC projects? Classification: Concept 103) All of the following are keys to success when managing a SDLC project except ________. A) create a prototype B) adjust the plan via trade-offs C) manage development challenges D) create a work breakdown structure E) estimate time and costs Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.5: What are the keys for successful SDLC projects? Classification: Concept 104) A work breakdown structure (WBS) is a hierarchy of the tasks required to complete a project. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.5: What are the keys for successful SDLC projects? Classification: Concept 105) A work breakdown structure (WBS) shows tasks, dates, and dependencies. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.5: What are the keys for successful SDLC projects? Classification: Concept

32 Copyright © 2020 Pearson Education, Inc.


106) The critical path is the sequence of activities that determine the earliest date by which the project can be completed. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.5: What are the keys for successful SDLC projects? Classification: Concept 107) Brooks' Law states that adding more people to a late project reduces the need for coordination. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.5: What are the keys for successful SDLC projects? Classification: Concept

33 Copyright © 2020 Pearson Education, Inc.


108) Discuss some of the key aspects to developing successful process and systems development projects. Answer: The key aspects to developing successful systems development life cycle (SDLC) include: • Create a work breakdown structure–Successful project managers break large projects into smaller tasks until each task is small enough to estimate and to manage. Every task should culminate in one or more results called deliverables. Tasks are interrelated, and to prevent them from becoming confusing, project teams create a work breakdown structure (WBS), which is a hierarchy of the tasks required to complete a project. • Estimate time and costs–It is exceedingly difficult to determine duration and labor requirements for many development tasks. Organizations take a variety of approaches to this challenge. One is to avoid scheduling problems altogether and never develop systems and software in-house. Instead, they license packages, such as ERP systems, that include both business processes and information systems components. If no suitable package exists, companies can admit the impossibility of scheduling a date for the completion of the entire system and take the best result they can get. The third approach is to attempt to schedule the development project in spite of all the difficulties. • Create a project plan–A project plan is a list of WBS tasks, arranged to account for task dependencies, with durations and resources applied. Some tasks cannot be started or finished until other tasks are completed. Given dependencies, estimates for task duration and resource requirements are then applied to the WBS to form a project plan. The critical path is the sequence of activities that determine the earliest date by which the project can be completed. The earliest date is the date determined by considering the longest path through the network of activities. Paying attention to task dependencies, the planner will compress the tasks as much as possible. Those tasks that cannot be further compressed lie on the critical path. • Adjust the plan via trade-offs–The project plan for the entire project results in a finish date and a total cost. Schedules and costs can be responsibly reduced by considering trade-offs. A tradeoff is a balancing of three critical factors: requirements, cost, and time. • Manage development challenges–Nothing ever goes according to plan, and the larger the project and the longer the development interval, the more things will violate the plan. Four critical factors need to be considered: – Coordination – Diseconomies of scale – Configuration control – Unexpected events Diff: 3 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.5: What are the keys for successful SDLC projects? Classification: Concept

34 Copyright © 2020 Pearson Education, Inc.


109) What are the tools used when planning information systems (IS) projects? Answer: The various tools used to meet the complexities of planning IS projects are work breakdown structures, Gantt charts, and critical paths. Tasks are interrelated, and to prevent them from becoming confusing, project teams create a work breakdown structure (WBS), which is a hierarchy of the tasks required to complete a project. The WBS for a large project is huge; it might entail hundreds or even thousands of tasks. Once the project is decomposed into small tasks, the next step is to define task dependencies and to estimate task durations. Task dependencies are normally input to planning software such as Microsoft Project. One of the tools used is a Gantt chart, which shows tasks, dates, and dependencies. Another tool used is a critical path, which is the sequence of activities that determines the earliest date by which the project can be completed. Critical path analysis is the process by which project managers compress the schedule by moving resources, typically people, from noncritical path tasks onto critical path tasks. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.5: What are the keys for successful SDLC projects? Classification: Concept

35 Copyright © 2020 Pearson Education, Inc.


110) List and explain four critical factors for development project management. Answer: Nothing ever goes according to plan; the larger the project and the longer the development interval, the more things will violate the plan. Four critical factors need to be considered: 1. Coordination 2. Diseconomies of scale 3. Configuration control 4. Unexpected events Coordination–Development projects, especially large-scale projects, are usually organized into a variety of development groups that work independently. Coordinating the work of these independent groups can be difficult, particularly if the groups reside in different geographic locations or different countries. An accurate and complete WBS facilitates coordination, but no project ever proceeds exactly in accordance with the WBS. Delays occur, and unknown or unexpected dependencies develop among tasks. Diseconomies of scale–The number of possible interactions among team members rises exponentially with the number of team members. Ultimately, no matter how well managed a project is, diseconomies of scale will set in. Configuration control–As the project proceeds, controlling the configuration of the work product becomes difficult. The development team produces an initial statement of requirements. Meetings with users produce an adjusted set of requirements. An event could occur necessitating a change to requirements. Similar problems occur with designs, program code, database data, and other system components. The term configuration control refers to a set of management policies, practices, and tools that developers use to maintain control over the project's resources. Such resources include documents, schedules, designs, program code, test suites, and any other shared resource needed to complete the project. Unexpected events–The last major challenge to large-scale project management is unexpected events. The larger and longer the project, the greater the chance of disruption due to an unanticipated event. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.5: What are the keys for successful SDLC projects? Classification: Concept

36 Copyright © 2020 Pearson Education, Inc.


111) The systems development life cycle (SDLC) process follows a linear sequence from requirements to design to implementation. Therefore, the systems development life cycle (SDLC) process is also known as the ________. A) waterfall method B) swim-lane method C) scrum process D) agile development method E) rainbow method Answer: A Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.6: How can scrum overcome the problems of the SDLC? Classification: Concept 112) Rapid application development, the unified process, extreme programming, and scrum have come to be known as ________. A) joint application development B) dynamic systems development model C) agile development D) systems development life cycle (SDLC) E) coalesced development Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.6: How can scrum overcome the problems of the SDLC? Classification: Concept 113) Which of the following is TRUE of paired programming? A) Two team members write the same program by coordinating from different locations. B) Two programs are run simultaneously on one device. C) Two processors are required to run one program. D) Two programmers share the same computer to write a computer program together. E) Two multihomed systems process data simultaneously. Answer: D Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.6: How can scrum overcome the problems of the SDLC? Classification: Concept

37 Copyright © 2020 Pearson Education, Inc.


114) According to the scrum process, once the tasks are known for a given set of requirements, the next step is to assign each task a difficulty score, called ________. A) scrums B) points C) grades D) tallies E) marks Answer: B Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.6: How can scrum overcome the problems of the SDLC? Classification: Concept 115) The total number of points of work a team can accomplish in each scrum period is called ________. A) score B) speed C) velocity D) degree E) intensity Answer: C Diff: 1 AACSB: Information Technology Course LO: Discuss the role of information systems in supporting business processes LO: 12.6: How can scrum overcome the problems of the SDLC? Classification: Concept 116) What is a reason the waterfall method is falling out of favor? A) Because every time a phase is completed, the project goes back to the previous phase. B) It is too safe for newer development. C) SDLC assumes requirements do not change. D) All organizations want to prototype. E) Organizations cannot see what they have until the very end. Answer: C Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.6: How can scrum overcome the problems of the SDLC? Classification: Concept

38 Copyright © 2020 Pearson Education, Inc.


117) All of the following are principles of scrum development except ________. A) welcoming a change in requirements B) designing as you go C) working closely with the customers D) frequently delivering a working version of the product E) testing the project once during development Answer: E Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.6: How can scrum overcome the problems of the SDLC? Classification: Concept 118) Each workday in the scrum process begins with a ________. A) stand-up B) an inspirational message C) updates by the Scrum master D) a new team E) coalesced development Answer: A Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.6: How can scrum overcome the problems of the SDLC? Classification: Concept 119) If a scrum project terminates because of budget or time limitations, the customer will not receive any result for the time and money expended. Answer: FALSE Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.6: How can scrum overcome the problems of the SDLC? Classification: Concept 120) Using the scrum method overcomes the issues of the traditional SDLC and guarantees that a project will produce a high-quality product. Answer: FALSE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.6: How can scrum overcome the problems of the SDLC? Classification: Concept

39 Copyright © 2020 Pearson Education, Inc.


121) What are the principles of agile development? Answer: First, scrum and the other agile techniques expect and even welcome change. Because systems are created to help organizations and people achieve their strategies, and the more the requirements change, the closer they come to facilitating strategies. The result is better and more satisfying for both the users and the development team. Second, scrum and other agile development processes are designed to frequently deliver a working version of some part of the product. Frequently means one to eight weeks, not longer. This frequency means that management is at risk only for whatever costs and time have been consumed in that period. And, at the end of the period, they will have some usable product piece that has at least some value to the business. The third principle is that the development team will work closely with the customer, until the project ends. Someone who knows the business requirements must be available to the development team and must be able and willing to clearly express, clarify, and elaborate on requirements. Also, customers need to be available to test the evolving work product and provide guidance on how well new features work. The fourth principle is a tough one for many developers to accept. Rather than design the complete, overall system at the beginning, only those portions of the design that are needed to complete the current work are done. Sometimes this is called just-in-time design. Finally, agile development methodologies are generic. They can be applied to the creation of business processes, information systems, and applications. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.6: How can scrum overcome the problems of the SDLC? Classification: Concept

40 Copyright © 2020 Pearson Education, Inc.


122) How are tasks scheduled in scrum methodology? Answer: Scrum is particularly innovative because of the way tasks are scheduled in it. Scrum methodology recognizes that developers are terrible, even wretched, at determining how long a task will take. However, developers are quite good at determining how long something will take in comparison to something else. So, while a developer may be poor at estimating the time required to do, say, some Task 2, he or she will likely be accurate when saying that Task 2 will take twice as long as Task 1, or some other ratio. So, according to the scrum process, once the tasks are known for a given set of requirements, the next step is to assign each task a difficulty score, called points. The easiest task has a point score of 1. A task that will take five times longer is given a point score of 5, etc. Points are expressed in values from a sequence of integers known as the Fibonacci sequence: {1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144, and ?}. The question mark is used because any number larger than 144 is meaningless. Most likely 89 and 144 are meaningless as well. Tasks with such point scores need to be subdivided into multiple requirements. When all tasks have received points, the points are summed to a total for the requirement. As teams work together, they will learn the total number of points of work they can accomplish each scrum period. That term is called the team's velocity. The team uses its velocity to determine how many requirements it can commit to accomplishing in the next scrum period. The team uses its estimates of points per scrum period for scheduling. Diff: 2 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.6: How can scrum overcome the problems of the SDLC? Classification: Concept 123) Deep neural networks are reshaping the way enterprise systems are developed. Answer: TRUE Diff: 1 AACSB: Information Technology Course LO: Compare and contrast different methods for developing information systems LO: 12.7: 2029? Classification: Concept

41 Copyright © 2020 Pearson Education, Inc.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.