Introduction to Information Systems, 5th edition Patricia Wallace Test Bank

Page 1

Introduction to Information Systems, 5th edition By Patricia Wallace

Email: richard@qwconsultancy.com


Introduction to Information Systems, 5e (Wallace) Chapter 1 Information Systems and People 1) Information systems should meet compliance standards set by governments and other regulatory agencies, which may change from time to time and also vary by country or state. Answer: TRUE AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Easy 2) Commercially produced information systems are inept at handling back-office information needs. Answer: FALSE AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Easy 3) Information systems support data-driven decision making which draws on a large amount of data to reveal important trends and patterns. Answer: TRUE AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Easy 4) Business intelligence refers to all the information available to managers, including information from sources beyond the organization's own information systems. Answer: TRUE AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Easy 5) The development and application of innovative information systems improve the operations of an organization; however, they do not lead to any competitive advantage. Answer: FALSE AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Easy 6) Binary code for SOS is an example of knowledge. Answer: FALSE AACSB: Information Technology Chapter LO: 1.2 Compare the terms data, information, and knowledge, and describe three characteristics that make information valuable. Difficulty: Moderate

1 ..


7) Social network usage has exploded in the number of users. Answer: TRUE Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Easy 8) Social network sites are for personal use and are not used in organizations. Answer: FALSE Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Easy 9) The binary code for SOS (01010011 01001111 01010011) can be considered data, while the code's meaning, interpreted as "HELP!" is knowledge. Answer: TRUE AACSB: Information Technology Chapter LO: 1.2 Compare the terms data, information, and knowledge, and describe three characteristics that make information valuable. Difficulty: Easy 10) A news agency requires an immediate account of the casualties in an airplane accident for a news alert. In this situation, a quick, approximate report is preferred rather than a detailed, accurate report that requires considerable time to prepare. Answer: TRUE AACSB: Information Technology; Analytical Thinking Chapter LO: 1.2 Compare the terms data, information, and knowledge, and describe three characteristics that make information valuable. Difficulty: Moderate 11) Timeliness adds value to information as a means of avoiding bias. Answer: FALSE AACSB: Information Technology; Analytical Thinking Chapter LO: 1.2 Compare the terms data, information, and knowledge, and describe three characteristics that make information valuable. Difficulty: Easy 12) Systems such as Wikipedia, eBay, Craigslist, YouTube, Facebook, and Twitter would not exist without extensive user-generated content from the community. Answer: TRUE AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate

2 ..


13) Organizations implement information systems to support and streamline business processes, but never to eliminate them. Answer: FALSE AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate 14) If there is a pending legal case, businesses have a duty to destroy electronic files that might be relevant, including email. Answer: FALSE AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate 15) Analysts can use software to simulate business processes and conduct "what if" experiments to assist with the analysis. Answer: TRUE AACSB: Information Technology; Analytical Thinking Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Easy 16) The study of information systems—how people, technology, processes, and data work together—is referred to as management information systems (MIS). Answer: TRUE AACSB: Information Technology Chapter LO: 1.4 Identify several research areas in the discipline of management information systems (MIS). Difficulty: Easy 17) The psychology of group dynamics invariably shifts positively when team members use online tools to communicate. Answer: FALSE AACSB: Information Technology Chapter LO: 1.4 Identify several research areas in the discipline of management information systems (MIS). Difficulty: Easy 18) In certain situations, such as fund-raising for an NGO, information systems are not useful. Answer: FALSE AACSB: Information Technology Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Easy 3 ..


19) The chief information officer (CIO) heads the IT department in most organizations. Answer: TRUE AACSB: Information Technology Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Easy 20) Disconnects in communication between IT staff and others in the organization often arise because of the jargon barrier. Answer: TRUE AACSB: Information Technology Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Easy 21) The close integration of information technology and strategy with every aspect of business means that every employee could be considered an "information officer." Answer: TRUE AACSB: Information Technology Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Moderate 22) Compared to older information systems, privacy breaches in modern information systems involve less risk and affect fewer people. Answer: FALSE AACSB: Information Technology Chapter LO: 1.6 Explain how information systems present both promises and perils, and also pose ethical questions. Difficulty: Easy 23) Which of the following is a function of accounting information systems? A) tracking accounts receivable B) designing service delivery systems C) developing induction processes for new hires D) creating business diversification strategies Answer: A AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Easy

4 ..


24) Which of the following events led to tighter standards for accounting practices and a demand for more transparency in reporting? A) the global financial crisis of 2009 B) the decreasing popularity of net-banking C) the Great Depression D) the increasing nationalization of private assets Answer: A AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Easy 25) Which of the following is a function of operations management? A) building and maintaining customer relationships and supporting the processes that underlie them B) improvement of systems and processes which the organization uses to deliver its goods and services C) formulating a strategy for business diversification D) introducing a new product Answer: B AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Moderate 26) Which of the following statements is true of information systems? A) Information systems are involved in tracking employee payroll, taxes, benefits, and timesheets. B) Information systems are inadequate at tracking movable assets, off-site resources, and inventories. C) Most organizations don't require information systems to handle their back-office information needs. D) Organizations avoid moving information system functions to service providers or outsourcing them. Answer: A AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Moderate 27) The use of information systems in achieving excellence in operations can result in ________. A) higher cost savings B) improved organizational justice C) increased brand dilution D) increased employee turnover Answer: A AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Easy 5 ..


28) Customer relationship management systems ________. A) build customer relationships, enhance loyalty, and manage interactions with customers. B) need a sales system that identifies each product in the shopper's basket, tallies the total, feeds the data to the inventory system, and accepts various kinds of payment C) focus mainly on supply chain issues. D) offer an alternative to brick-and-mortar retail stores Answer: A AACSB: Information Technology; Analytical Thinking Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Easy 29) The success of web-based shopping hinges on ________. A) building stronger customer relationships and identifying the unique needs of each customer B) building a reputation for exclusivity by offering a limited number and smaller variety of goods C) denying customers the opportunity to return goods. D) reducing security and identification checks and increasing the modes of payment available Answer: A AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Moderate 30) How do web-based online self-service applications transform an organization's relationships with its customers? A) They reduce customer-service facilities available to a customer but increase the quality of available facilities. B) They help educate customers on the business processes of the company. C) They ensure that no customers ever have to phone the company. D) They free customers from many time-consuming phone calls. Answer: D AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Moderate 31) The information managers use to make decisions, which can come from many sources beyond the organization's own information systems, is called ________. A) intuitive decision making B) social networking C) data-driven decision making D) business intelligence Answer: D AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Easy

6 ..


32) Decision making that draws on billions of pieces of aggregated information to reveal important trends and patterns is called ________. A) intuitive decision making B) uninformed decision making C) unstructured decision making D) data-driven decision making Answer: D AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Easy 33) Walking Together, an NGO, uses historical trends to determine in which month the amount given as donations is the highest, and then sets the dates for its donation drives based on the trends. This is an example of ________. A) data-driven decision making B) intuitive decision making C) customer relationship management D) business process reengineering Answer: A AACSB: Information Technology; Analytical Thinking Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Difficult 34) ________ refers to the information that managers draw from both the company's own information systems and external sources to make decisions. A) Business intelligence B) Entrepreneurship C) Corporate governance D) Artificial intelligence Answer: A AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Easy 35) Play-e-ball, a company that creates games for gaming consoles, gathers data from the information systems of its partners, suppliers, and distributors. It uses this data along with internal data to develop different games for different consumer demographics, and it targets the most profitable segments. Which of the following is illustrated in this scenario? A) user-generated content B) business intelligence C) inventory management D) virtual collaboration Answer: B AACSB: Information Technology; Analytical Thinking Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Difficult 7 ..


36) Which of the following reasons led to the popularity of social networking sites? A) These sites could be used without the internet or WiFi connections. B) These sites only supported asynchronous communication. C) These sites did not require any security. D) These sites enabled the sharing of news, photos, videos, and tidbits easily. Answer: D AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Moderate 37) Which of the following is a concern regarding information systems that support virtual teamwork? A) the lack of social networking capabilities B) the restriction of simultaneous users C) the relative stage of infancy of such systems D) the inability to use video conferencing Answer: C AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Moderate 38) Which of the following statements is true of information systems that support collaborative human activities? A) These information systems do not yet have tools for document management, project updates, issue tracking, and shared calendars. B) These systems, besides being complex and difficult to implement, offer minimal returns on investment. C) These systems, being in their early stages, offer a framework for more improvements and features to be included. D) These systems are equipped with enough sophisticated technology to replace mature and complex systems such as decision support systems. Answer: C AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Moderate 39) Cadmia University is planning to start an online course called "Cultural diversities." The university wants to develop an information system to support virtual, collaborative education. Which of the following factors should be taken into account when developing the new system? A) the way students interact in an actual classroom setting B) the average time spent online by students C) the negative impact of social networking sites D) the religious sentiments of the students Answer: A AACSB: Information Technology; Analytical Thinking Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Difficult 8 ..


40) Anything that gives a firm a lead over its rivals is called ________. A) economies of scale B) business growth C) break-even D) competitive advantage Answer: D AACSB: Analytic Thinking Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Easy 41) Which of the following statements is true of information systems (IS)? A) Despite the success of social networking, information systems have failed at improving virtual collaboration. B) The ability to provide companies with a competitive advantage makes IS a core feature of a company's strategic vision. C) IS, although versatile, is not beneficial for government agencies or voluntary organizations. D) Information systems are not a fundamental part of a company's strategic vision. Answer: B AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Moderate 42) Navi-devices Inc., a manufacturer of portable navigation devices, provides free traffic updates and identifies the nearest parking spaces available with its latest device. It accomplishes this unique innovation by using GPS coordinates of subscribers and traffic data from radio stations. Which of the following is the most likely impact of this strategy? A) It will improve the company's operations management. B) It will improve their customer relationship management. C) It will lower their total revenue. D) It will provide the company with a competitive advantage. Answer: D AACSB: Information Technology; Analytical Thinking Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Difficult 43) In Kansas, an athletics association is partnered with a university to identify talented youth across the state. They use an online test to ensure easy accessibility to students across the state. This is an illustration of ________. A) data-driven decision making B) strategic use of information systems C) use of business intelligence D) use of information systems for revenue generation Answer: B AACSB: Information Technology; Analytical Thinking Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Difficult 9 ..


44) Many students automate their email inboxes such that incoming emails are filtered with all junk emails sent directly to the spam folder. This saves time because they do not have to sort through the emails to find work-related emails. They also create a group mailing list for teams that makes it easier to send emails to the entire team instead of including their email addresses individually. In this scenario, the students are using information systems tools to ________. A) improve individual productivity B) keep his information secure C) transform his information D) make data-driven decisions Answer: A AACSB: Information Technology; Analytical Thinking Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Difficult 45) Which of the following refers to individual facts or pieces of information? A) data B) bytes C) insights D) knowledge Answer: A AACSB: Information Technology Chapter LO: 1.2 Compare the terms data, information, and knowledge, and describe three characteristics that make information valuable. Difficulty: Easy 46) Which of the following refers to facts that are assembled and analyzed to add meaning and usefulness? A) insights B) information C) content D) systems Answer: B AACSB: Information Technology Chapter LO: 1.2 Compare the terms data, information, and knowledge, and describe three characteristics that make information valuable. Difficulty: Easy

10 ..


47) On the continuum from data to information to knowledge, a single high-temperature reading of a patient at Patient First, a 24-hour walk-in clinic in Florida, is a piece of ________. A) knowledge B) intuition C) evidence D) data Answer: D AACSB: Information Technology Chapter LO: 1.2 Compare the terms data, information, and knowledge, and describe three characteristics that make information valuable. Difficulty: Moderate 48) Mark, a 22-year-old with a viral infection, is admitted to a hospital. On the second day postadmission, a nurse takes a single high-temperature reading and enters it into the patient records information system. This single reading, when combined with Mark's other symptoms and previous medical records, becomes ________. A) business intelligence B) data C) information D) analysis Answer: C AACSB: Information Technology; Analytical Thinking Chapter LO: 1.2 Compare the terms data, information, and knowledge, and describe three characteristics that make information valuable. Difficulty: Difficult 49) An information system is used to centralize information related to voting behavior in Texas. One of the indicators measured by the system is the average waiting time to vote. The time people spend waiting in line to vote at each polling booth is aggregated for each region. This is then used to create a graph that depicts the average waiting times by location. According to this scenario, which of the following refers to information on the continuum of data to information to knowledge? A) the waiting time of each voter B) a single cell in the information system's database C) the waiting time of a specific polling booth D) the graph with average waiting times Answer: D AACSB: Information Technology; Analytical Thinking Chapter LO: 1.2 Compare the terms data, information, and knowledge, and describe three characteristics that make information valuable. Difficulty: Moderate

11 ..


50) Robert, a stockbroker, recommends that his clients buy and hold stock of Andersonz Corp. for a minimum period of six months and then sell them. His recommendation is based on a graph of the firm's fluctuating performance for the past three quarters and an analysis of other information. The basis of Robert's recommendations can be termed as ________. A) instinct B) facts C) knowledge D) assumptions Answer: C AACSB: Information Technology; Analytical Thinking Chapter LO: 1.2 Compare the terms data, information, and knowledge, and describe three characteristics that make information valuable. Difficulty: Difficult 51) Which of the following statements is true of data, information, and knowledge? A) They blend together and form a continuum. B) They are mutually exclusive categories. C) They fail to help in understanding how information systems work. D) They are diverse terms and may not be used interchangeably. Answer: A AACSB: Information Technology Chapter LO: 1.2 Compare the terms data, information, and knowledge, and describe three characteristics that make information valuable. Difficulty: Moderate 52) People pay a monthly subscription fee to financial service companies to get current stock prices that are updated every second. Which of the following characteristics of information does this highlight? A) timeliness B) accuracy C) completeness D) relevance Answer: A AACSB: Information Technology Chapter LO: 1.2 Compare the terms data, information, and knowledge, and describe three characteristics that make information valuable. Difficulty: Easy

12 ..


53) Chloe's, a chain of supermarkets, is conducting a customer survey in its largest store, which is in California. Customers are asked to fill out questionnaires as they enter the store. The questionnaire is divided into sections that poll customers on the store's products and the ecommerce website. Which of the following is a drawback of the data collected through this poll? A) It is not authentic. B) It is incomplete because it does not poll e-commerce customers. C) It is not timely. D) It is an unscientific method of collecting data. Answer: B AACSB: Information Technology; Analytical Thinking Chapter LO: 1.2 Compare the terms data, information, and knowledge, and describe three characteristics that make information valuable. Difficulty: Difficult 54) ________ adds considerable value to information, particularly to avoid bias or spin. A) Timeliness B) Accuracy C) Relevance D) Completeness Answer: D AACSB: Information Technology Chapter LO: 1.2 Compare the terms data, information, and knowledge, and describe three characteristics that make information valuable. Difficulty: Easy 55) Which of the following is a critical component of an information system? A) culture B) demographics C) processes D) ideas Answer: C AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Easy 56) In an organization that is open to ideas from all employees, ________. A) it becomes tougher to implement new information systems B) user-generated content is strictly restricted C) information systems based on ideas from employees will fail D) innovative concepts for information systems can come from any level Answer: D AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate 13 ..


57) Which of the following statements is true of a successful information technology team in an organization? A) It uses focus groups exclusively to generate ideas rather than relying on other employees. B) It works closely with the staff from other functional areas of the organization. C) It discourages contributions and feedback from the users. D) It uses specialized jargon in its communications with other employees. Answer: B AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate 58) Purple Stones, an interior decorator, has an online store to enable the quicker purchase of its products. The website allows users to post reviews of products. This helps other customers evaluate the quality of a product before buying it. Which of the following is illustrated in this scenario? A) competitive advantage B) artificial intelligence C) user-generated content D) economies of scale Answer: C AACSB: Information Technology; Analytical Thinking Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Difficult 59) Which of the following websites predominantly features user-generated content? A) Flavors, an online shopping store that allows users to edit their profiles after registration B) WritingTips, a website that offers tips to amateur writers C) PlayPen, an online store that sells kids' toys D) Foodmania, a website that allows its users to post their own food recipes and upload photos Answer: D AACSB: Information Technology; Analytical Thinking Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Difficult 60) Which of the following statements is true about user-generated content? A) It is driven by people and technology and does not require processes and data. B) It powers the generation of content in what has come to be known as Web 1.0. C) It makes up most of the information in systems such as eBay, Craigslist, and Wikipedia. D) It is often produced by professionals with the expectation of profit or remuneration. Answer: C AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate 14 ..


61) Which of the following statements is true about information and communications technology? A) Increasingly, wireless transmission is favored because of its speed and flexibility although extra costs are incurred. B) Information and communications technology is a separate category and does not come under the IT component. C) Many developing countries that can't afford to install wireless transmissions are transforming their communications and expanding internet access by building copper-wired networks. D) The main role of the telecommunications component involves moving electronic signals from one place to another. Answer: D AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate 62) Which of the following statements is true of information technology (IT)? A) Information technology includes hardware and software but excludes telecommunications. B) Anything capable of collecting, processing, storing, or displaying electronic data is potentially part of an information system. C) Telecommunications and networks should not be confused as a part of IT. D) The internet and the World Wide Web have hampered software creativity. Answer: B AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate 63) The multitude of servers in Google's windowless data centers serves as an example that represents ________. A) business processes B) business intelligence C) information technology D) user-generated content Answer: C AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Easy

15 ..


64) ________ is a set of activities designed to achieve a task. A) Information technology B) Competitive advantage C) User-generated content D) Business process Answer: D AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Easy 65) The function of which of the following components of an information system is to oversee if every data transaction made by an employee is logged in the information system? A) strategy B) technology C) process D) data Answer: C AACSB: Information Technology; Analytical Thinking Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Easy 66) Which of the following questions pertains to maintaining security in an information system? A) Should the information system require passwords to meet certain standards? B) Should the information system authenticate users? C) Should the information system authorize access rights for users? D) All of the above. Answer: D AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate 67) How are policies enforced in information systems? A) Each user can select the policies to be enforced on the individual's account. B) Information systems come with built-in policies that are installed into the system. C) The operational-level employees decide the policies that need to be enforced in an information system. D) Managers develop policies that are enforced by the information systems. Answer: D AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate

16 ..


68) Which of the following is a function of the telecommunications component? A) protecting the anonymity of users B) routing traffic to different locations C) enabling client-side processing of data D) providing better systems to store electronic data Answer: B AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate 69) Which of the following best describes a business process? A) It is a set of activities designed to achieve a task. B) It is an algorithm in an information system. C) It is a set of security policies that governs a business. D) It refers to an idea that guarantees a firm a lead over its rivals. Answer: A AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Easy 70) How does implementing information systems impact business processes? A) It eliminates the need for human intervention in a business process. B) It promotes a decentralized approach to information management. C) It helps streamline business processes or eliminate ones that aren't necessary. D) It eliminates the need for organizations to invest in data security. Answer: C AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate 71) ________ focuses on designing, optimizing, and streamlining business processes throughout the organization, taking into account the human element. A) Business intelligence B) Business process management C) Database warehousing D) Enterprise resource management Answer: B AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Easy

17 ..


72) In order to safeguard individuals' sensitive information, which of the following organizations would typically restrict its employees' internet usage? A) a hospital B) a start-up IT company C) a travel agency D) a child development NGO Answer: A AACSB: Information Technology; Analytical Thinking Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate 73) A quantitative analyst working in an investment bank will likely be able to ________. A) share personal pictures and videos on the bank's servers B) access some information on the bank's servers C) use the internet freely and access any website D) take files home on portable USB flash drives Answer: B AACSB: Information Technology; Analytical Thinking Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Easy 74) Which of the following is a method employed by some organizations to prevent access to USB ports in order to keep employees from copying data? A) using epoxy glue B) using a captcha C) performing a warm boot D) upgrading middleware Answer: A AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Easy 75) Which of the following has led to strict laws about retaining electronic documents? A) increasing corporate scandals B) a need for elaborate reporting C) a need to improve brand image of products D) decreasing enterprise workforce effectiveness Answer: A AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Easy

18 ..


76) Data from ________ will quickly outpace virtually every other source, introducing many novel applications that rely on networked sensors. A) social media B) the Internet of Things C) institutional databases D) raw facts Answer: B AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Easy 77) Letters, numbers, money, colors, the tiny dots on an X-ray, air pollution levels, musical notes, vocal frequencies, time intervals, and much more can all be represented in ________which allows it to be integrated into information systems, read by computer programs, and shared across systems. A) tables and charts B) digital format C) insights D) raw facts Answer: B AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Easy 78) Raw facts that are available in different formats and sizes are called ________. A) information B) data C) insights D) knowledge Answer: B AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Easy

19 ..


79) Which of the following factors is the most important reason why data can be shared across different systems? A) the ability to convert data into digital format B) the creation of wireless communication technologies C) the use of cloud storage to store off-site data D) the presence of different formats of data Answer: A AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate 80) Sensors that pick up geographic location, temperature, motion, wind speed, heart rate, and much more are combining to form what? A) User-generated content B) Internet 2.0 C) Cloud storage D) The Internet of Things Answer: D AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate 81) The three social media sites with the highest user counts include ________. A) Facebook, WhatsApp, YouTube B) Instagram, TikTok, Facebook C) WeChat, YouTube, LinkedIn D) Slack, SnapChat, YouTube Answer: A Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Easy 82) Management of Information systems areas of research include ________. A) IT and ethics B) Data analytics C) Internet of Things D) All of the above Answer: D Chapter LO: 1.4 Identify several research areas in the discipline of management information systems (MIS). Difficulty: Easy

20 ..


83) A question such as "How can we draw on the immense amount of data available to develop better health outcomes?" is an example of what area of MIS research? A) IT and ethics B) artificial intelligence and machine learning C) data analytics D) Internet of Things Answer: C Chapter LO: 1.4 Identify several research areas in the discipline of management information systems (MIS). Difficulty: Moderate 84) What area is an example of MIS research in a distribution company such as UPS that would be more important to pursue? A) privacy and security B) Internet of Things C) artificial intelligence and machine learning D) none of the Above Answer: B Chapter LO: 1.4 Identify several research areas in the discipline of management information systems (MIS). Difficulty: Moderate 85) Research in MIS in business and organizations strives to answer questions such as ________. A) How can information systems be protected against threats? B) How can information systems enhance ethical decision making? C) How do e-markets affect business competition? D) All of the above Answer: D Chapter LO: 1.4 Identify several research areas in the discipline of management information systems (MIS). Difficulty: Moderate 86) The pandemic drove new information systems such as ________. A) restaurants launched online ordering and curbside pick up B) retailers such as grocery stores creating contactless payment through apps C) neither D) both Answer: D Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Easy

21 ..


87) Retailers creating apps and curbside pickup for groceries is an example of ________. A) information systems response to the pandemic B) normal business operations C) operations management D) customer relationship management system Answer: A Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Moderate 88) An example of the web's growing decentralization would be the growth of ________. A) the Internet of Things B) cryptocurrencies C) customer relationship management systems D) supporting technology that improves collaboration for teams Answer: B Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Easy 89) The sensors can pick up geographic location, temperature, motion, wind speed, pollution indicators, heart rate, and much more are examples of ________. A) the web's decentralization B) information and communications technology C) The Internet of Things D) business process management Answer: C Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate 90) Which of the following statements is true of management information systems? A) This discipline draws interest from researchers and practitioners from the computer science field exclusively. B) This field has been in existence for the last fifty years. C) They seldom change and hence require no upgrades. D) They support tactical decision making at the managerial level. Answer: D AACSB: Information Technology Chapter LO: 1.4 Identify several research areas in the discipline of management information systems (MIS). Difficulty: Moderate

22 ..


91) Which of the following statements is true of management information systems? A) The management information systems discipline had been in existence prior to the invention of the first generation computer. B) Management information systems lack the ability to support tactical decision making at the managerial level. C) The management information systems discipline draws interest from researchers and practitioners only from the computer science field. D) The study of information systems that includes how people, technology, processes, and data work together is called management information systems. Answer: D AACSB: Information Technology Chapter LO: 1.4 Identify several research areas in the discipline of management information systems (MIS). Difficulty: Moderate 92) Which of the following is an example of volunteering with the help of an information system? A) A volunteer uses his cell phone to translate books into Spanish while commuting by train. B) A volunteer visits a branch of the CRY organization in his city to donate money. C) A volunteer spends every summer teaching English in schools in Africa. D) A volunteer donates his old clothes to an orphanage in his neighborhood. Answer: A AACSB: Information Technology; Analytical Thinking Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Moderate 93) Which of the following poses a hindrance to the adoption of information systems in nonprofit organizations and government? A) the complexity of information systems B) the absence of tech-savvy employees in the market C) the lack of sufficient funding D) the weak security of information systems Answer: C AACSB: Information Technology Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Easy

23 ..


94) A ________ is the person who heads the department responsible for managing and maintaining information systems, and ensuring they support the organization's strategic goals. A) Chief Information Officer B) Chief Finance Officer C) Chief Knowledge Officer D) Chief Privacy Officer Answer: A AACSB: Information Technology Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Easy 95) Which of the following statements is true of the IT department areas? A) The help desk department maintains the environmentally controlled areas in which servers and communications equipment are located. B) The systems administration department installs, manages, and updates servers. C) The enterprise systems and applications department handle backups and archiving. D) The data center operations department provides services to internal and external customers on technology issues. Answer: B AACSB: Information Technology Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Moderate 96) Harry, an employee of Bennett-Techno Inc., is responsible for ensuring that the technological setup in the organization supports the organization goals. Which of the following positions does Harry hold in the organization? A) Human Resource Director B) Chief Executive Officer C) Vice President of Sales D) Chief Information Officer Answer: D AACSB: Information Technology Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Difficult

24 ..


97) Which of the following is a common source of misunderstanding between IT and other departments? A) different levels of organization goals B) bad infrastructure C) different levels of communication skills D) technical jargon Answer: D AACSB: Information Technology Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Easy 98) Marsha, a sales executive, faces issues while copying data from one spreadsheet to another. The formatting of the copied data is not the same as that of the data that is pasted. She started facing this problem only after her older spreadsheet application was upgraded to a newer version. She raises a ticket stating "Request older system. New system not working as desired." The IT technician misconstrues this as a request to replace the computer with an older version. When Marsha returns the next morning, she finds that her computer has been replaced with an older version. Which of the following is the reason why her request had been misunderstood? A) absence of a proper IT-support structure B) the lack of a dedicated help desk C) different levels of communication skills D) the jargon barrier Answer: D AACSB: Information Technology; Analytical Thinking Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Difficult 99) Which of the following functional areas in an information systems department maintains the location of servers and communications equipment? A) data center operations B) end-user support C) services administration D) systems Answer: A AACSB: Information Technology Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Easy

25 ..


100) In an information systems department, the enterprise systems and applications subunit is responsible for ________. A) installing, managing, and updating servers B) providing services to internal and external customers on technology issues C) developing, installing, maintaining, and overseeing the organization's mission-critical software applications D) maintaining the environmentally controlled areas in which servers and communications equipment are located Answer: C AACSB: Information Technology Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Easy 101) In an information system department, the data center operations department is responsible for ________. A) installing and managing communications technologies and networks B) providing services to internal and external customers on technology issues C) installing and updating servers D) handling backups and archiving Answer: D AACSB: Information Technology Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Easy 102) Which of the following individuals is responsible for ensuring that a company's confidential information is well-protected? A) the Chief Information Security Officer B) the Chief Executive Officer C) the Chief Technology Officer D) the Chief Knowledge Officer Answer: A AACSB: Information Technology Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Easy

26 ..


103) ________ plays a leading role in managing efforts to improve an organization's ability to capture, nurture, and disseminate expertise. A) Chief Technology Officer B) Chief Knowledge Officer C) Chief Privacy Officer D) Chief Information Security Officer Answer: B AACSB: Information Technology Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Easy 104) A patient lodges a complaint with the management of a hospital because he is unsatisfied with their policies on safeguarding patient information. In this situation, which of the following individuals is most responsible for ensuring that the hospital policies safeguard the information of the patients? A) the Chief Wisdom Officer B) the Chief Technology Officer C) the Chief Knowledge Officer D) the Chief Privacy Officer Answer: D AACSB: Information Technology; Analytical Thinking Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Moderate 105) Unknown hackers hack into the network security of a bank and steal the personal identification information of approximately 200,000 clients. Which of the following persons will be responsible for handling this situation? A) the Chief Technology Officer B) the Chief Knowledge Officer C) the Chief Procurement Officer D) the Chief Information Security Officer Answer: D AACSB: Information Technology; Analytical Thinking Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Moderate

27 ..


106) Which of the following techniques helps IT staff collaborate with people in other functional areas? A) focusing on technical issues and ignoring the business goals B) avoiding the use of technical terms while speaking to employees in other areas C) learning human resource terminologies and strategies D) educating internal customers about technical jargon Answer: B AACSB: Information Technology Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Moderate 107) The facilities manager at Symphony Systems, an IT services company, wants the information systems department to set up a virtual collaboration team. Which of the following ways would enable him to communicate more effectively with the IT staff? A) avoiding IT jargon B) emphasizing the returns on investment C) highlighting the value of IT D) describing his end goal and not the means to get there Answer: D AACSB: Information Technology; Analytical Thinking Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Moderate 108) InfoTech Horizons, an IT company, is seeking to hire an experienced IT professional to assist the Chief Information Officer in his role. The new hire will be groomed to take on the role of the Chief Information Officer. Which of the following candidates, all of whom have good technical skills, will prove to be the best choice? A) a computer professional with good knowledge of business B) a computer professional who uses jargon very often while interacting with internal customers C) a computer professional who is of the opinion that people without technical knowledge should be laid-off D) a computer professional who discourages ideas from employees about changing the information systems Answer: A AACSB: Information Technology Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Moderate

28 ..


109) Which of the following is a key component of the role of a Chief Privacy Officer in an organization? A) overseeing the use of technology and innovation in the organization B) ensuring that private information of customers is protected from natural disasters C) helping shape the policies that govern the protection of confidential information D) improving the organization's ability to capture, nurture, and disseminate knowledge Answer: C AACSB: Information Technology Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Moderate 110) Examples of business processes that span Departments include ________. A) online ordering and same day delivery B) student portals that include grades, student activities and organizations, and course registration C) both A and B D) neither A nor B Answer: C Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Easy 111) What is NOT an example of normal information system business processes? A) emailing timesheets for approval monthly B) streamlining purchase approvals by auto-approving small dollar purchases C) automation of fast food ordering D) eliminating cash toll pay stations for toll roads Answer: A Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Easy 112) When automating a process for mailing end of year newsletters to your stakeholders, what is a tradeoff you may encounter? A) Auto filled names may feel impersonal to stakeholders. B) Even if you type a bulk newsletter, you still must print it. C) Posting mail is less reliable than emailing. D) You may leave someone off the list who needs the information. Answer: A Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate

29 ..


113) Business processes and policies should also be reviewed occasionally because business circumstances change at regular intervals. Answer: FALSE Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate 114) Business processes and policies must also be reviewed because they often span departments and limited communication between silos can hinder success. Answer: TRUE Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate 115) The field of Business Process Management is focused on ________. A) connecting to customers through an effective information system B) optimizing and streamlining processes in an organization C) limiting errors in product production D) organizing human capital Answer: B Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate 116) The risk of privacy breaches in information systems has increased because ________. A) information systems have become more powerful and interconnected B) information systems seldom need to be upgraded C) there are no regulations and standards for developing information systems D) information systems have become increasingly isolated Answer: A AACSB: Information Technology Chapter LO: 1.6 Explain how information systems present both promises and perils, and also pose ethical questions. Difficulty: Moderate 117) A key reason why it is important to appreciate the ethical issues involved in the development and use of information systems is because ________. A) the data they contain is vast and personal B) the revenue of organizations is closely tied to their use C) they are not regulated by any governmental bodies D) they can be mass-produced by organizations with limited technical expertise Answer: A AACSB: Information Technology Chapter LO: 1.6 Explain how information systems present both promises and perils, and also pose ethical questions. Difficulty: Moderate 30 ..


118) ________ is responsible for identifying, assessing, and addressing threats to an organization from unforeseen circumstances. A) The crisis management team B) The customer relationship management team C) The supply chain management team D) The operations management team Answer: A AACSB: Information Technology Chapter LO: 1.6 Explain how information systems present both promises and perils, and also pose ethical questions. Difficulty: Easy 119) Which of the following is an example of an amplification effect related to information systems? A) Information stored on the internet can be hacked and stolen by anyone, irrespective of their geographic location. B) Data on email services can be hacked leading to privacy breaches and exposing of private communication. C) Information on a person's social networking account can easily be distributed to an extremely large and unintended audience. D) Data from email or photo uploads to the internet can be secured by choosing the appropriate privacy settings. Answer: C AACSB: Information Technology Chapter LO: 1.6 Explain how information systems present both promises and perils, and also pose ethical questions. Difficulty: Difficult 120) Which of the following statements is true about the ethical issues surrounding information systems? A) It is easy to determine who is responsible for the damage caused by accidental leaks of private information. B) People tend to judge the severity of ethical violations in information systems partly on the basis of the number of people affected. C) Information systems are powerful and contain vast amounts of personal data making the ethicality of its use a tertiary concern. D) The amplification effect of information systems minimizes the harm caused by ethical violations of information systems. Answer: B AACSB: Information Technology Chapter LO: 1.6 Explain how information systems present both promises and perils, and also pose ethical questions. Difficulty: Moderate

31 ..


121) Which of the following is the reason why privacy breaches present major risks in this era of information system computing? A) The amount of information that is stored in information systems is vast and very private. B) It is not possible to identify the source of a security breach. C) The information systems are isolated from each other. D) Cheaper storage devices offer faster transport of confidential information from one geographical location to another. Answer: A AACSB: Information Technology Chapter LO: 1.6 Explain how information systems present both promises and perils, and also pose ethical questions. Difficulty: Moderate 122) Twitter, the microblogging service best known for trivial updates on everyday events and brutal political jibes, has a growing role in what organizational area? A) customer relationship management B) emergency response C) sports reporting D) war correspondence Answer: B Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Moderate 123) Which of the following is a constraint on crisis management teams? A) They lack backup systems. B) They have very little time to react and take action. C) They lack tools to identify the source of security breaches. D) They have limited organizational policies to guide them in such situations. Answer: B AACSB: Information Technology Chapter LO: 1.6 Explain how information systems present both promises and perils, and also pose ethical questions. Difficulty: Moderate

32 ..


124) What role do information systems play in organizations? Illustrate your answer with examples. Answer: Multinational firms, small businesses, nonprofits, governments, volunteer organizations, self-employed entrepreneurs, universities, and other organizations rely on information systems for a host of reasons, and they continue to adapt, expand, and interconnect them to achieve their strategic objectives. These systems play critical roles in several contexts: operations management, customer interactions, decision making, collaboration and teamwork, strategic initiatives and competitive advantage, and individual productivity. Depending on their missions, organizations also need information systems to manage industry-specific operations. For example, manufacturers need systems to manage assembly lines, product quality, production schedules, and just-in-time supply deliveries. Colleges and universities need systems to manage student academic records, class scheduling, faculty assignments, and student financial aid. Transportation companies rely on information systems equipped with GPS to track their fleets, optimize routes, and conserve gas. Companies that buy products from suppliers around the globe need real-time updates on their global supply chains to manage inventories and reduce costs. AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Moderate 125) Explain how web-based shopping and online self-service improves customer relationships. Answer: Web-based shopping and self-service transform relationships with customers, freeing them from time-consuming phone calls. These web-based processes often mimic the brick-andmortar versions, with "shopping carts" and "checkouts" clearly labeled. A web application offers many opportunities to build stronger relationships and better understand the motives and desires of each person who visits. AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Easy 126) Explain how information systems can contribute to gaining a competitive advantage. Answer: Information systems play what could be their most valuable role when they are tied closely to strategy and to the major initiatives that will help achieve competitive advantage. Information systems are a fundamental part of a company's strategic vision. The vision itself is often shaped by what these systems can achieve today and what is possible for the future. Strategy is equally important to nonprofit organizations and government agencies, and their information systems break new ground by offering new services to the public, increasing access for all citizens, streamlining operations, reducing costs, and improving decision making. AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Moderate

33 ..


127) Explain how information systems can help in improving personal productivity. Answer: There is a wide range of information system tools that help people improve their own productivity on the job and in life such as smartphones that combine voice calls with web browsing, contact databases, email, music, and games, as well as the many software applications that eliminate tedious work. Even word processing has transformed work in every organization, and many students aren't aware of all the ways that software can make them more productive. You can, for example, automatically create and properly format your term paper references by integrating a bibliographic manager such as Zotero, which captures the citation from a web page. To improve productivity at work, people can choose from a wide variety of computer software and electronic devices. AACSB: Information Technology Chapter LO: 1.1 Describe the main roles that information systems play in organizations. Difficulty: Moderate 128) Explain, with an example, how data might be aggregated and analyzed to create information and knowledge. Answer: The term data refers to individual facts or pieces of information and information refers to data or facts that are assembled and analyzed to add meaning and usefulness. For example, a single high-temperature reading of an incoming patient at Patient First, a 24-hour walk-in clinic in Laurel, Maryland, is one piece of data. But entered into the patient records information system and combined with the patient's other symptoms and previous medical records, it becomes far more valuable as a diagnostic tool. Even more value can be obtained from this one temperature reading by aggregating it with the data from other patients entering the clinic that week. Tables and charts constructed from these data, analyzed by geographic region, may indicate a flu epidemic or the first signs of a pandemic emergency. As information from many clinics, emergency rooms, and doctors' offices pours in and the public health staff at the Centers for Disease Control in Atlanta analyzes maps, patient diagnoses, and many other facts, a pattern may emerge that warrants swift action. Information can be further refined, analyzed, and combined to make it even more useful, and extremely valuable as knowledge. No clear dividing lines separate these categories, and people often use the terms interchangeably. They blend together and form a continuum as more meaning and usefulness are created through analysis and skillful combination of many sources of data and human insight. AACSB: Information Technology Chapter LO: 1.2 Compare the terms data, information, and knowledge, and describe three characteristics that make information valuable. Difficulty: Moderate

34 ..


129) Describe, with examples, the characteristics that make information valuable. Answer: Three characteristics that contribute to making information valuable are: timeliness, accuracy, and completeness. Timeliness matters a great deal in some settings, and near real-time information often costs more. For example, people pay monthly subscription fees to financial service companies to get up-tothe minute stock prices, rather than the delayed price reports shown on free stock tickers one can add to their browser. Accuracy may seem like an obvious attribute for valuable information, but there actually are degrees of accuracy. The more accurate the information required, the longer it may take to obtain, making extreme accuracy a trade-off to timeliness. A CEO who wants to know how much competitors charge for a rival product, for example, would have to wait quite a while for staff to scour all the distribution channels and assemble the data. An approximate but timely answer is more valuable. Completeness adds considerable value, particularly as a means to avoid bias or spin. A marketing survey that polls customers as they enter a store will completely miss those who shop online, for example. The survey results would be incomplete without taking greater care to assess the interests of all the customers. Striving for complete information, however, may also introduce delays that affect timeliness. AACSB: Information Technology Chapter LO: 1.2 Compare the terms data, information, and knowledge, and describe three characteristics that make information valuable. Difficulty: Moderate 130) What role do people play as a component of an information system? Answer: The design, development, launch, and maintenance of any information system involves teams of people. They play several different roles-as visionaries, developers, and managers of information systems, and also as analysts, liaisons, users, customers, contributors, and sometimes opponents or roadblocks. Leaders may be first to propose a system that will accomplish an important strategic objective for the company. However, innovative ideas for such systems come from every level. Managers and staff from many departments participate on teams with technologists to design a new system or evaluate commercial systems that might be purchased. The information technology team usually works closely with staff in marketing, finance, human resources, and other functional areas to launch user-friendly, people-oriented systems. AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate

35 ..


131) Why are wireless transmission systems favored over wired transmission systems? Answer: The main role of the telecommunications component is to move electronic signals from one place to another, route traffic, and provide various services to improve transmission speeds, eliminate noise, increase security, or analyze traffic patterns. Increasingly, people favor wireless transmission because of its flexibility and reduced cost, and promising developments to increase speed and capacity are well underway. Many developing countries that can't afford to build wired networks are transforming their communications and expanding internet access through wireless transmission. In parts of sub-Saharan Africa, for example, copper wiring may never be deployed at all. Wireless is also more likely to stay up and running during storms that bring down utility poles and wires. AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate 132) How do information systems improve business processes? Answer: Organizations implement information systems to support, streamline, and sometimes eliminate business processes. Countless decisions are made about how each process should operate, what rules it should follow, how information should be handled from input to output, and especially how the information system will support the process. Managers develop policies that affect information system processes and the systems can enforce those policies. A major policy category involves security. The steps in any process are affected by thousands of decisions people make, and these are influenced by the way people look at process improvements. Information systems help bring in these improvements. AACSB: Information Technology Chapter LO: 1.3 Describe the four main components of an information system and the role that each component plays. Difficulty: Moderate 133) Describe the field of management information systems. List some of the areas that attract much of the interest in this field. Answer: The study of information systems, how people, technology, processes, and data work together, is a lively discipline involving university faculty, private-sector analysts, government agencies, and more. Many refer to the field as management information systems (MIS), and academic departments in colleges and universities often bear that name. The field draws researchers and practitioners from business, computer science, psychology, sociology, public administration, and many other subjects, all of whom have an interest in learning more about how the systems that can be created to help organizations do more with less, make companies more competitive, increase productivity, and improve the lot of people around the world. AACSB: Information Technology Chapter LO: 1.4 Identify several research areas in the discipline of management information systems (MIS). Difficulty: Easy

36 ..


134) Describe the trends in research in the field of management information systems. Answer: MIS is a young discipline, and researchers strive to keep up with the rapid changes. The Internet of Things, for example, offers tremendous opportunities, as do the analytical tools that enable organizations to capitalize on the big data that those things generate. Another important trend involves the study of e-marketplaces, the kind that are transforming entire industries and threatening traditional players. For instance, Airbnb is a global e-marketplace in which travelers can book a room offered by private individuals, competing fiercely with hotels and motels. The internet offers remarkable opportunities to invent e-marketplaces for stocks, real estate, music, vacation rentals, used books, rare antiques, and even future spouses. How organizations build trust and make a profit in these worldwide e-markets are very hot topics. Research on group collaboration, especially when team members are dispersed around the world, is far more important now because of virtual teams and globalization. The psychology of group dynamics subtly changes when team members use online tools, and the shifts are not always positive. Investigations of successful and unsuccessful teams shed light on strategies people can use to make virtual teams more successful. Most students engage in some virtual teamwork, especially those who take some or all their courses online. Virtual teamwork and collaboration skills are critical. AACSB: Information Technology Chapter LO: 1.4 Identify several research areas in the discipline of management information systems (MIS). Difficulty: Difficult 135) Explain, with an example, how information systems can make an enormous contribution to nonprofit organizations. Answer: Knowledge of information systems can make an enormous contribution to a nonprofit organization. For example, relief workers who know how to create inexpensive podcasts and videos can relay the plight of children from war or disasters in troubled parts of the world. Rather than spending money on radio or TV broadcasts, they can freely distribute the short, timely, and compelling video messages worldwide through the net. Because they can contribute significant value, nonprofit organizations can benefit by thoughtful use of information systems. AACSB: Information Technology Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Easy

37 ..


136) Who are the individuals involved in information systems that take on leadership roles? List some of the common functional areas in an information system. Answer: The functional business unit responsible for planning, managing, and supporting information systems is often called "Information Technology." Heading the department is the chief information officer (CIO). The CIO might report directly to the CEO or to another vice president, often the one responsible for finance and administration. Working with the CIO, especially in larger organizations and major companies, are more staff positions with "chief" in their titles, such as Chief Information Security Officer, Chief Technology Officer, and Chief Knowledge Officer. The common functional areas in an information systems department include end-user support and help desk, systems administration, data center operations, enterprise systems, and telecommunications and network services. AACSB: Information Technology Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Moderate 137) Why is the IT department often perceived as impenetrable to people from other areas of an organization? Answer: Disconnects in communication between IT staff and others in the organization often arise due to the jargon barrier. People often get frustrated when IT doesn't respond immediately to their ideas or suggestions. Like all functional business units, IT has a full plate of ongoing projects, prioritized by the CIO working with the CEO and other top executives to ensure that resources are wisely spent with a solid return on investment. Because of this, technicians are forced to move onto the next trouble ticket, and are unable to spend a long time on each ticket. Communication barriers, often due to the use of technical jargon, make the IT department seem impenetrable. AACSB: Information Technology Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Easy 138) Explain, with examples, how modern information systems can easily amplify any communication. Answer: Modern information systems are very powerful and interconnected. Also, the data they contain is vast and personal. Modern information systems can easily amplify any communication, putting people's reputations and livelihoods at risk. For example, any email one sends or photo one uploads can be forwarded or posted online for millions to view. Text, photos, and videos uploaded to a person's social networking site can easily be distributed to a far wider audience beyond his or her own network. AACSB: Information Technology Chapter LO: 1.6 Explain how information systems present both promises and perils, and also pose ethical questions. Difficulty: Easy

38 ..


139) What at the benefits of using Twitter in emergencies? What are potential hurdles these groups face during emergencies? Answer: The service empowers people with the ability to gather and disseminate information about emergencies and disasters, and this information can be far timelier than anything government authorities or organizations such as the Red Cross can provide. In an earthquake situation, people can report whether they feel the jolt or shaking and how strong it is. The short messages offer on-the-ground observations of conditions, along with the worry and fear for missing family members. One important advantage of Twitter messages during natural disasters is that they can provide first-hand accounts and real-time updates about conditions in each neighborhood, often calling for immediate rescue for individuals in peril. Researchers are also working on strategies to deploy machine learning and artificial intelligence to sift through millions of tweets in a way that will uncover detailed information about people in need or collapsing buildings during disasters. Restructured tweets, however, require Twitter users to know more than most users do and to use that knowledge when they are under considerable stress. more than a quarter of the respondents said they would send a direct Twitter message to emergency responders, not realizing that aid organizations are still not well prepared to monitor Twitter and other social media services. It is hard for organizations to assess the value of information received in this way. It may be timely, but is it accurate? Chapter LO: 1.6 Explain how information systems present both promises and perils, and also pose ethical questions. Difficulty: Difficult 140) Explain how having information systems impacted the Nasdaq in competing with the New York Stock Exchange. Answer: Speed matters, and Nasdaq technology can handle one million messages per second. It matters so much that some heavy traders–Goldman Sachs, for example–paid Nasdaq for the privilege of locating their own server in Nasdaq's data center, just to avoid the tiny communication delay from Goldman offices. As Nasdaq moves its servers to the cloud, traders like Goldman Sachs can move their servers to the cloud provider's data center. This new technology allows each computer to add a timestamp to each order as it is placed, so even if orders arrive out of sequence due to distance, they can be reorganized into the correct sequence. Another looming issue for Nasdaq is computer trading based on algorithms, or "algo-trading," a trend that may only grow with ever-faster trading. Since the "flash crash," Nasdaq and the other exchanges have strengthened the guardrails to better safeguard against such events affecting stocks. For instance, in addition to the "circuit breakers" that stop trading then prices fall below a certain level, exchanges prevent high-frequency traders from moving stock shares too quickly if prices go outside previously set "bands." Chapter LO: 1.5 Provide examples of how various organizations and their information technology departments depend on information systems knowledge. Difficulty: Difficult

39 ..


Introduction to Information Systems, 5e (Wallace) Chapter 2 Information Systems and Strategy 1) According to Porter's model, cost of transportation is one of the five forces that influence industry competition. Answer: FALSE AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy 2) The threat of new entrants in an industry is very high when start-ups can open a business with little capital and few employees. Answer: TRUE AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Moderate 3) Network effects refer to the ability of a product to fit into a new system. Answer: FALSE AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy 4) The presence of loyalty programs reduces the customer's switching costs of a product or service. Answer: FALSE AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Moderate 5) The power of suppliers is high when there are many suppliers in a market. Answer: FALSE AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Moderate 6) The threat of substitutes is high when alternative products are available. Answer: TRUE AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy 7) Rivalry within an industry will be high if firms compete mainly on price. Answer: TRUE AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Moderate 1 ..


8) Sustaining technologies are radical and unexpected breakthroughs that replace lower-end products and rapidly overtake high end products of the market. Answer: FALSE AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Easy 9) Creative destruction refers to an innovation that fails miserably and leads to huge losses within the industry. Answer: FALSE AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Easy 10) Government action can influence how Porter's five forces operate in industries. Answer: TRUE AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Easy 11) Companies are embedded in a complex ecosystem where events in one arena can affect the whole community. Answer: TRUE AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Easy 12) Procurement and technology support are primary activities of a value chain. Answer: FALSE AACSB: Analytic Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Easy 13) A value chain can be extended by incorporating feedback from customers. Answer: TRUE AACSB: Analytic Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Easy

2 ..


14) A benchmark is a baseline measurement considered as optimal, though it is sometimes simply an industry average. Answer: TRUE AACSB: Analytic Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Easy 15) A low-cost leadership strategy means offering a highly differentiated product at a price that is lower than the market price. Answer: FALSE AACSB: Analytic Thinking Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Easy 16) Differentiating the product or service for a particular market niche is called a product differentiation strategy. Answer: FALSE AACSB: Analytic Thinking Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Easy 17) All types of organizational strategies leverage information systems to succeed. Answer: TRUE AACSB: Information Technology Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Easy 18) Since the operational requirements for nonprofits are completely different from businesses, information systems do not offer any strategic uses to nonprofits. Answer: FALSE AACSB: Information Technology Chapter LO: 2.5 Explain how information systems apply to strategy for nonprofit organizations and governments. Difficulty: Easy 19) One area of e-government involves efforts to make unclassified information available to citizens via the internet. Answer: TRUE AACSB: Information Technology Chapter LO: 2.5 Explain how information systems apply to strategy for nonprofit organizations and governments. Difficulty: Easy

3 ..


20) As the extended value chain lengthens, responsibility for harmful consequences becomes more diffuse. Answer: TRUE Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Moderate 21) The drive to reduce costs due in Information Systems and Technology, particularly for firms that compete for low-cost leadership, can lead to ethically questionable decisions. Answer: TRUE Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Easy 22) Net neutrality is the concept that all internet traffic should be routed equally regardless of service provider. Answer: TRUE Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Easy 23) Information system and technology industries like software and semiconductors tend to have higher Net profit margins than traditional industries like transportation, restaurants, and apparel. Answer: TRUE Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy 24) Total Government IT spending is highest in what state? A) New York B) Florida C) California D) None of the above Answer: C Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Easy 25) What is the best way to compare government spending by state? A) compare total dollars spent B) calculate a return on investment per service used C) compare state spending based on individual state's population D) none of the above Answer: C Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Easy

4 ..


26) What states have the highest IT spend per capita? A) Massachusetts, Illinois, Virginia, B) Pennsylvania, Ohio, Texas C) California, New York, North Carolina D) none of the above Answer: A Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Moderate 27) While IT consumes a significant amount of the funds required for running a business, the funds for growing an organization are closely tied to strategy, innovation, and competitive advantage. Answer: TRUE AACSB: Information Technology Chapter LO: 2.6 Explain how information systems are deployed to run, grow, or transform the business. Difficulty: Easy 28) Which of the following is true according to Porter's model? A) When start-up costs are low, the threat of new entrants to existing businesses is high. B) The power of buyers reduces when deep discounts can be demanded of suppliers. C) The power of suppliers is high when constant competition forces them to innovate. D) The threat of substitutes is high when there are very few or no alternative products. Answer: A AACSB: Information Technology Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy 29) Durall is a leading manufacturer of decorative crafts in Canada. Which of the following, if true, indicates the threat of new entrants is high for Durall? A) Durall has a patent for its manufacturing process. B) The crafts that Durall manufactures are low-priced. C) The process of manufacturing the crafts is labor intensive. D) The decorative crafts industry is capital intensive. Answer: B AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Moderate

5 ..


30) Orange, an online-gaming site, has millions of users. The site has many games which pit users against each other. The relative standing of each user is presented in the form of an elaborate ranking system for each game. Users pride themselves on gaining the highest points and the highest rank possible. This rise in user participation has increased the value of Orange significantly. This is an example of ________. A) monopolistic competition B) internal marketing C) network effects D) guerilla marketing Answer: C AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Moderate 31) Network effects refer to the ________. A) increased value of a product or service because there are more people using it B) additional costs incurred by customers when they change suppliers C) leveraging influence of customers over suppliers D) ability of suppliers to charge more due to a lack of competition Answer: A AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy 32) Which of the following best illustrates a network effect? A) A fashion apparel outlet introduces a loyalty program for its customers. B) A retailer provides discounts on bulk purchases. C) A kitchenware manufacturer introduces a differentiated range of products. D) A telecom service provider introduces a family plan that provides free calls within the family. Answer: D AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Moderate 33) ________ are the costs that customers incur when they change suppliers. A) Network costs B) Switching costs C) Overhead costs D) Opportunity costs Answer: B AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy

6 ..


34) Which of the following strategies is devised to raise switching costs? A) A supermarket chain offers higher discounts to its regular customers. B) A vendor reduces the range of products that it distributes to retailers. C) An automotive company conducts a trade contest. D) A company offers commission to its employees for pushing the company's products. Answer: A AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Moderate 35) Which of the following organizations face higher switching costs with respect to its information systems? A) an organization that wants to automate its processes B) an organization that moves its data center to cloud storage C) an organization that spends considerable money and time implementing a commercial information system to manage its records D) an organization that plans to implement open-source software Answer: C AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Moderate 36) Which of the following companies will have the highest buying power? A) a company that sells agricultural products procured from numerous farmers B) a firm that is an exclusive dealer for an automotive company C) a bank that borrows from the Federal Reserve D) a company that procures IT services from a large software company Answer: A AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Moderate 37) Melloc is one of many suppliers selling milk to retail customers. Since there are many sellers, price is a major determinant of market success. Which of the following statements about Melloc is true? A) Melloc's customers must deal with higher switching costs. B) Melloc will be able to dictate terms with its customers. C) Melloc faces powerful buyers in the retail market. D) Melloc has a strong control over the market. Answer: C AACSB: Reflective Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Moderate

7 ..


38) If a supplier has a limited number of buyers, then the ________. A) threat of substitutes is low B) network effects are greater C) buyers must deal with greater switching costs D) buyers will have more power Answer: D AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy 39) How did online markets affect the dynamics between buyers and suppliers? A) It decreased the threat of new entrants in many industries. B) It reduced the network effects of many products. C) It increased the costs of switching. D) It granted more power to the buyers. Answer: D AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Moderate 40) Which of the following factors increases the power of suppliers? A) disruptive innovation B) high switching costs C) low-scale operations D) lack of competitive advantage Answer: B AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Moderate 41) Carbon Automotive manufactures engines for different cars. The company supplies its products to leading car manufacturers in Europe and America. Which of the following statements indicates that Carbon has high bargaining power? A) Carbon has only four customers and all of them are large companies. B) Carbon's customers do not expect differentiation in its engines from one vehicle to another. C) The selling point of many cars is that they contain Carbon engines. D) The automobile industry in the United States is characterized by low levels of competition. Answer: C AACSB: Reflective Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Difficult

8 ..


42) ________ is high in an industry when alternative products that offer attractive savings are available. A) The power of suppliers B) The threat of substitutes C) Network effects D) The switching cost Answer: B AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy 43) Videoconferencing has evolved as an alternative for business travel. This best illustrates ________. A) the threat of substitutes in a market B) the absence of network effects C) monopolistic competition in markets D) increased power of suppliers Answer: A AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy 44) A substitute poses a greater threat when it ________. A) operates in a different market in comparison with the focal product B) has a similar nature to the focal product but operates in a different target market C) provides the same focal product or service through different means D) does not directly impact the profitability of another product or service Answer: C AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy 45) Which of the following results in decreased market profitability? A) the absence of the threat of new entrants B) intense rivalry among competitors, based on price C) lack of competition among suppliers in an industry D) a lack of leveraging power over suppliers Answer: B AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Moderate

9 ..


46) Rivalry in an industry is high when the ________. A) industry is characterized by differentiation B) market is in the development stage C) purchasing power of buyers is low D) companies mainly compete on price Answer: D AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy 47) Which of the following is a valid observation on price-based rivalry among existing competitors? A) It is damaging for the competitors and the industry in which they operate. B) It leads to quality-based competition and innovation. C) It results in hidden losses for the customers. D) It decreases the price sensitivity of customers. Answer: A AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy 48) Competition is not severe in the telecommunications industry in Brazil. More than ninety percent of the market is dominated by four large players. Which of the following will increase the rivalry among these four players? A) a government regulation hindering the entry of new players B) a significant slowdown in market growth C) a decision by one of the dominant players to launch its products in Argentina D) a ban on internet telephony Answer: B AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy 49) A disruptive innovation is ________. A) a new product or service that is harmful to society B) a method used in production that raises environmental concerns C) a new product or service that has the potential to reshape an industry D) a technology that increases switching costs and entry barriers for newcomers Answer: C AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Easy

10 ..


50) Which of the following is an example of a disruptive innovation? A) Kodak launched a digital camera that did not need film. B) Apple launched iPhone 4 replacing iPhone 3. C) Ford introduced small cars for the middle class. D) Land Rover markets most of its four-wheel drives in high-altitude regions. Answer: A AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Moderate 51) Which of the following illustrates a sustaining technology? A) Digital cameras replaced cameras that required film. B) Digital music sold over the internet replaced CDs. C) LCD monitors were introduced to replace analog monitors. D) Car manufacturers streamlined manufacturing processes with more automation. Answer: D AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Moderate 52) Which of the following is most closely associated with sustaining technologies? A) improvements that streamline existing processes B) radical breakthrough that replaces low-end products C) potential to reshape and reform an industry D) association with a new product or service, led by technology Answer: A AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Easy 53) Which of the following is an accurate justification for the view that the internet is the most important disruptive innovation of the twentieth century? A) The internet rejigged existing business processes and streamlined them, giving many companies marginal advantages. B) Switching costs have increased after the advent of the internet as a medium of trade. C) The internet reduced entry barriers for newcomers and empowered buyers with more information. D) Competition became oligopolistic with only a few companies investing in technology. Answer: C AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Moderate 11 ..


54) Creative destruction occurs when ________. A) disruptive innovations threaten established players B) sustaining technologies replace old procedures and processes C) bad industrial practices are eradicated through government regulations D) new products or services are introduced by underperforming players Answer: A AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Easy 55) Which of the following is true of creative destruction? A) It makes use of illegal innovations and techniques to displace established businesses. B) It presents newcomers with an opportunity to succeed against incumbents in an industry. C) It happens when technologies that provide process-streamlining advantages come to the fore. D) It increases the operational costs of the entire industry and reduces profits. Answer: B AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Easy 56) In the context of Porter's five forces, what impact will patents have on a business? A) Patents will increase market competition. B) Patents will increase the number of substitutes for a given product. C) Patents will reduce the threat of new entrants in an industry. D) Patents will reduce the bargaining power of suppliers. Answer: C AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Moderate 57) Which of the following governmental actions increase the threat of new entrants in a market? A) The Federal Reserve reduces the interest rates on credit for small businesses. B) The Department of Commerce offers a patent to an existing player. C) The government squeezes money from the market through open-market operations. D) The Federal Reserve increases the cash reserve ratio to tackle inflation. Answer: A AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Moderate

12 ..


58) Which of the following is commonly used by organizations to influence the operation of Porter's five forces? A) evasion of taxes B) selling at prices below the existing market price C) lobbying for governmental action D) selling at prices above the existing market price Answer: C AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Easy 59) Which of the following pairs of products are complementary to each other? A) computer and software B) tea and coffee C) petroleum and natural gas D) gold and silver Answer: A AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Moderate 60) Which of the following is true of an ecosystem? A) An ecosystem insulates Porter's five forces against disruptive innovations. B) Events in one arena of an ecosystem can affect an entire community. C) The power of suppliers and the threat of new entrants are reduced in an ecosystem. D) An ecosystem can reduce the complementary effect between products and services. Answer: B AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Moderate 61) The ecosystem in which a company is embedded is a(n) ________. A) natural community that is restricted to the members of its value chain B) economic community that includes related industries C) community focused entirely on the immediate competitors of a company D) community constituted by markets that are not related to the company Answer: B AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Easy

13 ..


62) In cloud computing, employees use information systems that are ________. A) designed to perform without an internet connection B) installed locally within an organization C) hosted by a vendor in a data center shared by many other businesses D) more expensive than locally-hosted versions Answer: C AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Easy 63) Which of the following is based on the cloud computing concept? A) an email system hosted locally in an organization's data center B) an information system shared by two or more businesses and accessed via the internet C) a standard operating system that can be installed on many computers D) a mobile connection that supports voice and video calls Answer: B AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Moderate 64) Which of the following is a fundamental characteristic of an ecosystem? A) It opposes any moves to make fundamental changes in an industry. B) It decreases the impact of the five forces on an industry. C) It includes the related industries making complementary products and services, the competitors themselves, the suppliers, and the consumers. D) It groups together multiple unrelated industries to reduce a domino effect or ripple effect. Answer: C AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Moderate 65) The activities in the value chain that are directly related to the process by which products and services are created, marketed, sold, and delivered are called ________ activities. A) composite B) supporting C) compound D) primary Answer: D AACSB: Analytic Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Easy

14 ..


66) Which of the following best describes support activities? A) It refers to activities directly related to the process by which products and services are created, marketed, sold, and delivered. B) It refers to activities that help the transformation of raw materials into finished products. C) It refers to processes including administration and management, human resources, procurement, and technology assistance. D) It refers to activities that comprise multiple tasks and are performed by one person or department. Answer: C AACSB: Analytic Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Easy 67) Which of the following is a primary activity of an automobile manufacturer? A) assembling automobile parts B) administration and management of infrastructure C) human resource management D) inventory tracking Answer: A AACSB: Analytic Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Moderate 68) Which of the following is a support activity of a consumer goods manufacturer? A) outbound logistics B) marketing C) customer service D) procurement Answer: D AACSB: Analytic Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Moderate 69) Which of the following statements is true of the value chain? A) The value chain ends when the customer buys a product. B) The value chain includes primary and support activities used to produce a product. C) The value chain's extended activities neither offer strategic opportunities nor risks. D) The value chain does not involve the intermediaries that a company maintains. Answer: B AACSB: Analytic Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Moderate

15 ..


70) Which of the following statements is true of the value chain? A) Understanding a customer's own value chain does not offer strategic advantages to a company. B) As the extended value chain lengthens, responsibility for harmful consequences becomes more diffuse. C) The value chain ends at product delivery and any extension to it has no bearing on strategic advantages. D) A company's value chain is limited to the internal activities of the company and does not depend on external factors. Answer: B AACSB: Analytic Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Easy 71) Which of the following actions of a sugar manufacturing company is an extension of its value chain beyond its own primary and support activities? A) The company intensifies its marketing activities to cater to new customers. B) The company buys a large sugarcane plantation in another country. C) The company makes agreements with a few more distributors to extend the reach of its products. D) The company launches a new promotional campaign to attract more buyers. Answer: B AACSB: Analytic Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Moderate 72) "Total value transfer of tangible goods happens at the point of sale." Which of the following statements contradicts this judgment? A) The drive to reduce costs can lead to ethically questionable decisions. B) Events in the external parts of the chain can also offer strategic opportunities. C) The value chain does not end when the buyer pays for the product or service. D) As the extended value chain lengthens, responsibility for harmful consequences becomes more diffuse. Answer: C AACSB: Reflective Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Moderate

16 ..


73) Alduro Plastics, a utensils manufacturing company, decides to extend its value chain by acquiring a manufacturer of raw materials. Which of the following, if true, would most support Alduro's decision? A) The company's major supplier displays a sloppy attitude while supplying materials. B) The company's production schedule is seasonal. C) The company has projected a growth of 8 percent for the current financial year. D) The company's managing director has resigned recently. Answer: A AACSB: Analytic Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Moderate 74) A company incorporates contributions from buyers who help add value to the company's products and services. Which of the following best describes this action? A) creation of a supply chain B) performing a promotional activity C) creation of a value chain D) extension of the value chain Answer: D AACSB: Analytic Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Easy 75) eBay's customers enrich the website by reviewing products that they purchase. These reviews are used by buyers to evaluate sellers on eBay. eBay also provides special privileges to sellers who have higher ratings. This is an example of ________. A) reverse engineering B) value chain extension C) focused strategy D) niche marketing Answer: B AACSB: Analytic Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Moderate 76) Which of the following is a major ethical issue arising out of value chain extension? A) Who is responsible when there is damage? B) How many members should there be in the chain? C) What should be the marketing strategy? D) Should the company make revenue by expansion? Answer: A AACSB: Analytic Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Easy

17 ..


77) What functional area is where organizations spend the majority of their IT dollars? A) transforming the organization B) growing revenues C) running essential functions D) none of the above Answer: C Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Easy 78) The pandemic drastically long-term impacted businesses in what cost saving way? A) reducing operations costs through cutting utilities B) video conferencing to reduce travel expenses C) leveraging the workforce to be more efficient D) indicating what jobs could be worked remotely Answer: B Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy 79) Carriers selling internet access need incentives to encourage investment in their network infrastructure and keep service at reasonable costs is an example of the ________. A) case for net neutrality B) case against net neutrality C) case for subsidized internet D) none of the above Answer: B Chapter LO: 2.6 Explain how information systems are deployed to run, grow, or transform the business. Difficulty: Moderate 80) The case for Net neutrality primarily benefits businesses and consumers in what way? A) less costs for companies providing services over the internet allowing a level competitive field B) openness of information availability advocated for by non-profits C) more competition between internet providers reducing costs for consumers D) all of the above Answer: D Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Moderate

18 ..


81) The Global Value Chain's role in vaccine development included ________. A) collaboration through 19 countries for components and suppliers B) widespread coordination for production in multiple countries and delivery C) online webtools for appointments and monitoring D) all of the Above Answer: D Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Easy 82) What is an example of the extended value chain in information systems? A) Amazon customers writing reviews of products B) TurboTax user forum that links to their software for tax questions C) both A and B D) neither A nor B Answer: C Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Easy 83) Which of the following is a shortcoming of the extended value chain? A) It is difficult to allocate responsibility in the event of a mishap. B) It reduces the strategic advantages offered by a shorter chain. C) It alienates customers by not taking their opinions into account. D) It cannot be expanded beyond the support activities of a company. Answer: A AACSB: Analytic Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Easy 84) ________ is a reference point used as a baseline measurement. A) A focused niche strategy B) A value chain model C) A benchmark D) A strategic enabler Answer: C AACSB: Analytic Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Easy

19 ..


85) An IT company uses the industry average as a standard for measuring its financial performance. Here, the industry standard is used as a(n) ________. A) scheme B) outline C) benchmark D) objective Answer: C AACSB: Analytic Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Moderate 86) Which of the following is a useful benchmark for information systems? A) the amount of IT spending per employee in an organization B) the number of temporary employees in an organization C) the number of unused computers in an organization D) the number of monthly employee promotions in an organization Answer: A AACSB: Analytic Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Easy 87) Roland Inc. is a fashion apparel retailer in the United States. It wants to measure how its investment is helping create value in comparison with its competitors. Which of the following metrics used by Roland can be classified as a benchmark in this scenario? A) the number of leaves taken by employees B) the total number of brand outlets C) the average number of sales made per day D) the number of customers on a sales promotion list Answer: C AACSB: Analytic Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Easy 88) Which of the following is a key attribute of the low-cost leadership strategy? A) providing unique add-ons to supplement the products or services B) focusing on a specific market segment C) optimizing the value chain by eliminating unwanted expenditures D) offering products and services with superior qualities Answer: C AACSB: Analytic Thinking Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Easy

20 ..


89) Which of the following illustrates a low-cost leadership strategy? A) CGlass sells inexpensive, fashionable eyewear in comparison with its competitors. B) Brown Valley offers huge discounts on bulk purchases from its retail outlets. C) Clay Mansion imports ceramic vases from Europe and Asia. D) Felt sells consumer durables through franchise outlets. Answer: A AACSB: Analytic Thinking Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Easy 90) Southwest Airlines offers better fares compared to most of its competitors. This helps the company attract customers. Which of the following strategies is being used by Southwest Airlines? A) product differentiation B) focused strategy C) focused differentiation D) low-cost leadership strategy Answer: D AACSB: Analytic Thinking Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Moderate 91) Which of the following is essential if an organization is to follow a low-cost leadership strategy? A) market leadership on product quality B) relentless search for ways to reduce operating expenses C) product differentiation to distinguish itself from competitors D) focus on a segment or sector of the market Answer: B AACSB: Analytic Thinking Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Easy 92) Which of the following statements describes the product differentiation strategy? A) adding special features to a product for which customers are willing to pay more B) selling the same product in more than one market at different price levels C) pricing of products or services at moderate levels D) selling a range of products across different geographical locations Answer: A AACSB: Analytic Thinking Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Easy 21 ..


93) How can a company avoid the trap of competing only on price? A) by keeping the price at a level higher than the competitors B) by following a pricing strategy inconsistent with the market equilibrium C) by differentiating the products or services that it offers D) by selling at a price much lower than the competition Answer: C AACSB: Analytic Thinking Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Easy 94) Element Inc. manufactures a new range of smartphones to take on incumbent competitors. Element grabs a huge chunk of the market share in its first year because of its feature-rich smartphones. Element's smartphones come with bigger screen sizes, greater memory capacities, and a free online music subscription for two years. The competitors fail to lure customers despite massive price reductions. Which of the following strategies is being used by Element? A) focused niche strategy B) loss leader strategy C) cost leadership strategy D) product differentiation Answer: D AACSB: Analytic Thinking Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Moderate 95) Differentiating the product or service for a particular segment of the market is called a ________. A) market leadership strategy B) focused niche strategy C) market penetration strategy D) cost leadership strategy Answer: B AACSB: Analytic Thinking Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Easy

22 ..


96) Lifetime Television, an American cable television company, specifically targets female viewers. The channel is devoted to movies, sitcoms, and dramas that are either geared toward women or feature women in lead roles. This is an example of a ________ strategy. A) market leadership B) cost leadership C) focused niche D) price leadership Answer: C AACSB: Analytic Thinking Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Moderate 97) Which of the following best describes the primary goal of a focused niche strategy? A) adding special features or unique add-ons to a product for which customers agree to pay more B) tailoring products and services based on the special preferences of a small group of customers C) offering similar products at lower prices than competitors in a market D) developing innovative products that threaten the survival of competitors' products Answer: B AACSB: Analytic Thinking Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Moderate 98) Which of the following companies has a focused niche strategy? A) Playball, a merchandise company, customizes T-shirts based on customer requests. B) Complus, a computer hardware manufacturer, offers discounts on bulk purchases. C) Table Top, a clothing retailer, offers end-of-season sales. D) Tracer, a fountain pen manufacturer, launches a new brand of pens. Answer: A AACSB: Analytic Thinking Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Moderate 99) "The information and communications technology (ICT) component is at the very heart of the company's competitive advantage." Which of the following statements is the most accurate justification of this claim? A) Companies benefit from cost savings made possible through information systems. B) Cost of implementing technology has increased over a period of time. C) Most businesses are involved in the sale of technical or technological services. D) Established players in a market favor creative destruction over sustaining technologies. Answer: A AACSB: Information Technology Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Easy 23 ..


100) "Low-cost leaders must automate their processes." Which of the following is the most compelling reason to support this argument? A) Automation will help them differentiate their products. B) Automation will help them reach a wider target audience. C) Automation will help them eliminate costly human labor in certain activities. D) Automation will help them improve their brand image. Answer: C AACSB: Information Technology Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Moderate 101) Which of the following is typically the biggest cost component in an organization's IT spending? A) cost of keeping the IT services running B) cost of buying computer hardware C) cost of buying new software D) cost of building IT infrastructure other than computers Answer: A AACSB: Information Technology Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Easy 102) Which of the following is a common way to decrease the IT spending of a company? A) shifting to proprietary software B) moving to cloud computing C) increasing in-house IT personnel D) reducing outsourcing operations Answer: B AACSB: Information Technology Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Easy 103) Which of the following best illustrates the strategic use of IT? A) maintaining the IT systems of a company B) establishing a data center to store key information C) transforming the business model of an organization D) licensing the software that a company will use Answer: C AACSB: Information Technology Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Easy 24 ..


104) IT acts as a strategic enabler when ________. A) a company's average IT spending per employee is very low B) it focuses on the growth of an organization C) it is used to create work schedules D) employees learn to use IT services Answer: B AACSB: Information Technology Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Easy 105) Which of the following is a tool used to reduce health care costs by digitizing patient history? A) magnetic resonance imaging B) ultrasonography C) CT-scan D) electronic medical record Answer: D AACSB: Information Technology Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Easy 106) Which of the following statements is true of a strategic enabler? A) It supports the running of the business. B) It reduces expenses in the day-to-day operations of a business. C) It transforms a business or helps build a new business model. D) It differentiates a product or services from a competitor's offerings. Answer: C AACSB: Information Technology Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Easy 107) Which of the following is a feature of nonprofit organizations that differentiates them from for-profit organizations? A) lack of shareholders B) lack of target customers C) lack of stakeholders D) lack of products or services Answer: A AACSB: Analytic Thinking Chapter LO: 2.5 Explain how information systems apply to strategy for nonprofit organizations and governments. Difficulty: Easy

25 ..


108) Why do nonprofit organizations stand to gain from using information systems, just like a business? A) Nonprofits, like businesses, spend huge amounts on IT maintenance. B) Nonprofits and businesses have the same set of primary activities and secondary activities. C) Like businesses, nonprofits are answerable to shareholders and stakeholders. D) The operational requirements to run nonprofits are similar to the operational requirements for businesses. Answer: D AACSB: Information Technology Chapter LO: 2.5 Explain how information systems apply to strategy for nonprofit organizations and governments. Difficulty: Easy 109) Which of the following statements is true about the use of IT in nonprofit organizations? A) Nonprofit organizations have no shareholders and do not require a dedicated IT strategy. B) Nonprofit organizations do not require significant IT support unless they are transformational in nature. C) Nonprofit organizations need IT support and strategy to achieve their objectives. D) Nonprofit organizations need not invest in IT if their organizational objectives are not directly related to IT. Answer: C AACSB: Information Technology Chapter LO: 2.5 Explain how information systems apply to strategy for nonprofit organizations and governments. Difficulty: Easy 110) Which of the following is a strong reason to believe that IT is essential to manage nonprofits? A) Nonprofit organizations are generally bigger than for-profit businesses. B) Operational requirements for nonprofits are similar to for-profit businesses. C) Most nonprofit organizations have a concealed profit motive. D) Many nonprofit organizations are supported and funded by for-profit businesses. Answer: B AACSB: Information Technology Chapter LO: 2.5 Explain how information systems apply to strategy for nonprofit organizations and governments. Difficulty: Moderate

26 ..


111) Why are the operational requirements to run nonprofits considered similar to businesses? A) Operations such as payroll, accounting and finance, and human resources are essential for nonprofits. B) Most nonprofit organizations generate profit in some way, and operations are essential for tax planning. C) The objectives of for-profit organizations and nonprofit organizations are the same. D) The branding requirements for for-profit organizations and nonprofit organizations are the same. Answer: A AACSB: Information Technology Chapter LO: 2.5 Explain how information systems apply to strategy for nonprofit organizations and governments. Difficulty: Easy 112) E-government involves ________. A) a supply chain system specifically designed for foreign governments B) governmental regulations concerning e-commerce C) government activities targeting fraud D) efforts to make unclassified information and services available to citizens online Answer: D AACSB: Information Technology Chapter LO: 2.5 Explain how information systems apply to strategy for nonprofit organizations and governments. Difficulty: Easy 113) Which of the following statements is true of e-government? A) It includes efforts to disclose classified information to the general public. B) It saves people the time spent in commuting to and waiting at government offices. C) It is limited to issues such as e-governance and tax collection, whereas nonprofits involve a larger variety of issues. D) It addresses issues that are strategic in nature, whereas nonprofits use IT to address issues that are operational in nature. Answer: B AACSB: Information Technology Chapter LO: 2.5 Explain how information systems apply to strategy for nonprofit organizations and governments. Difficulty: Moderate

27 ..


114) Identify the project for which governmental funding is most critical. A) a project to launch a new, low-cost car B) a scheme to improve the financial status of a company C) a research project on alternative energy sources D) an infrastructure project that should be completed in one year Answer: C AACSB: Analytic Thinking Chapter LO: 2.5 Explain how information systems apply to strategy for nonprofit organizations and governments. Difficulty: Moderate 115) New information systems will enable the creation of electric meters that run "backwards". Which of the following best explains this statement? A) IT will allow customers to see their electricity bills online. B) IT has been instrumental in reducing the global power consumption. C) IT has not made any significant contribution to the field of electricity distribution and measurement. D) IT will allow customers to contribute power from their own sources to the grid. Answer: D AACSB: Information Technology Chapter LO: 2.5 Explain how information systems apply to strategy for nonprofit organizations and governments. Difficulty: Moderate 116) Which of the following is true of IT spending in an organization? A) Increased IT spending is usually associated with investor dissatisfaction and reduces companies' market value. B) The funds used to run a business are mainly for the kinds of IT resources that now fall into the commodity category. C) Since IT is only an operational requirement and not a strategic enabler, companies should seek to reduce IT spending. D) Organizations should spend money on things that create a comparative advantage rather than on IT. Answer: B AACSB: Information Technology Chapter LO: 2.6 Explain how information systems are deployed to run, grow, or transform the business. Difficulty: Moderate

28 ..


117) "IT resources have become a commodity." Which of the following statements best supports this claim? A) IT resources to support operations are available to all the players in a market. B) Implementation of IT resources increases employee productivity. C) Technology helps organizations perform better than their competitors. D) Most IT investments are applied to growing and transforming an organization. Answer: A AACSB: Information Technology Chapter LO: 2.6 Explain how information systems are deployed to run, grow, or transform the business. Difficulty: Moderate 118) CopyIT, a copy machine manufacturing company, sustains its investment in technological innovation, particularly in areas such as color science, digital imaging, and nanotechnology. These strategic investments, made only in specific areas, keep the company ahead of the competition. Which of the following messages does this example convey? A) Large IT investments are essential for the success of a company in today's business environment. B) Although many technologies are commodities, careful application of IT resources for innovation can add to competitive advantage. C) Very little of the IT spending in today's business environment is concentrated on running a business. D) IT investments on new technological advances are not necessary. Answer: B AACSB: Analytic Thinking Chapter LO: 2.6 Explain how information systems are deployed to run, grow, or transform the business. Difficulty: Moderate 119) List Porter's five forces. Answer: Porter's model includes five interrelated forces that influence industry competition. The five forces are threat of new entrants, power of buyers, power of suppliers, threat of substitutes, and rivalry among existing competitors. AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy 120) Explain the threat of new entrants to businesses. Answer: The threat of new entrants in an industry is very high when startups open shop with little capital, few employees, and next to no experience. Incumbents in the industry must keep their prices low to ward off newcomers, so profitability suffers. New entrants might also come from established companies in other industries, whose leaders decide to diversify and encroach on another. AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy 29 ..


121) What are network effects? Provide an example. Answer: Network effects refer to the increased value of a product or service that results simply because there are more people using it. A large customer base can be significant because of network effects. The value of Facebook, for example, is low if you can only connect a few people. However, the more people who use that social network, the more valuable it becomes to everyone. AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy 122) What are switching costs? Answer: Switching costs are the costs customers incur when they change suppliers. Loyalty programs and initial costs, among other strategies, increase the costs of switching. For example, switching costs are high in the business software industry because it is costly for companies to switch software vendors which would require changing processes, training programs, and new licensing fees. AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy 123) Explain the power of buyers. Answer: The power of buyers increases when they have leverage over suppliers and can demand deep discounts and special services. If a supplier has a small number of buyers, the supplier is at a disadvantage since losing even one buyer could be devastating. Buyer power also rises when many suppliers offer similar, undifferentiated products and the buyer can deal with any of them to get about the same product, with negligible switching costs. AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy 124) Explain the power of suppliers with an example. Answer: The power of suppliers is the advantage sellers have when there is a lack of competition and they can charge more for their products and services. This is one of Porter's five competitive forces. Microsoft is an example. Given the dominance of its Windows operating system, PC assemblers around the world risk losing customers if they don't install it. AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy

30 ..


125) Explain how rivalry among competitors affects businesses. Answer: The profitability of an industry and its competitive structure is affected by the intensity of rivalry among existing competitors, particularly with respect to how they are competing, and what they compete on. If firms compete mainly on price, rivalry is high, and the industry as a whole becomes less profitable because price cutting triggers rounds of retaliation and damaging price wars. AACSB: Analytic Thinking Chapter LO: 2.1 Describe Porter's five competitive forces that shape industry competition. Difficulty: Easy 126) What is a disruptive innovation? How is it different from sustaining technologies? Answer: A disruptive innovation is a new product or service, often springing from technological advances, that has the potential to reshape an industry. For example, Kodak, Casio, Olympus, and other companies began offering digital cameras that needed no film in the 1990s, transforming the industry within a few short years. Sustaining technologies, on the other hand, offer important improvements to streamline existing processes and give companies marginal advantages. AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Easy 127) What impact do government policies have on business? How do businesses try to influence government policies? Answer: Government policies and funding priorities can have dramatic effects on how industries operate and how they evolve. Patents reduce the threat of new entrants. Organizations lobby heavily for government action to influence how the five forces operate. For instance, the government updates its dietary guidelines every five years, triggering intense lobbying efforts by food industries. Beef producers, for example, lobbied against any recommendation to reduce the amount of red meat. And ranchers are lobbying lawmakers to prevent the "meat" label from being applied to plant-based meat substitutes or lab-grown burgers. AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Easy 128) What impact does the ecosystem have on businesses? Answer: Companies are embedded in a complex ecosystem, an economic community that includes the related industries making complementary products and services, the competitors, the suppliers, and the consumers. Events in one arena, particularly a disruptive innovation, ripple through the whole community, affecting all the players and the five forces for the industries involved. AACSB: Analytic Thinking Chapter LO: 2.2 Explain how disruptive innovations, government policies, and other factors affect how the competitive forces operate. Difficulty: Easy 31 ..


129) Explain Porter's value chain model and the types of activities involved in it. Answer: Porter's value chain model describes the activities a company performs to create value as it brings in raw resources from suppliers, transforms them in some way, and then markets the product or service to buyers. In the model, the company performs primary activities directly related to the process by which products and services are created, marketed, sold, and delivered. Support activities encompass all the other processes and offices the company needs, including administration and management, human resources, procurement, and technology support. AACSB: Analytic Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Easy 130) What is a benchmark? Provide an example. Answer: A benchmark is a reference point used as a baseline measurement. Often it indicates a measurement that would be considered optimal or best practices within the industry, though it is sometimes simply an industry average. For the value chain, one benchmark might be the percent of total budget allocated to each of the primary and support activities. AACSB: Analytic Thinking Chapter LO: 2.3 Identify the components of the value chain, and explain its extended version. Difficulty: Easy 131) Explain various competitive strategies in business, with examples. Answer: The low-cost leadership strategy means offering a similar product at a lower price compared to competitors. A relentless search for ways to reduce operating expenses and achieve efficiencies pervades this strategy. An example is Walmart. Another approach is product differentiation, adding special features or unique add-ons for which customers are willing to pay more. The strategy tends to reduce threats from substitute products and also erects barriers to new entrants. An example is Apple. Differentiating the product or service for a particular market niche is called a focused niche strategy. Toyota, for instance, uses this strategy for some of its products, such as its line of electric vehicles that targets environment-friendly customers. AACSB: Analytic Thinking Chapter LO: 2.4 Describe how information systems apply to competitive strategies for business. Difficulty: Easy

32 ..


132) Explain the importance of IT for nonprofit organizations. Answer: While nonprofit organizations have no shareholders, they do have objectives that need strategic planning and benefit from strategic use of information systems. Running, growing, and transforming the organization are all very relevant to nonprofits, just as they are to the for-profit world, and information systems play a key role. Nonprofit organizations use IT for various operational requirements; they use information systems for payroll, accounting and finance, human resources, asset management, and related tasks. Many nonprofits also need information systems to track sales and customer transactions, since they may sell products and services, either as part of their mission or as ancillary activities. AACSB: Information Technology Chapter LO: 2.5 Explain how information systems apply to strategy for nonprofit organizations and governments. Difficulty: Easy 133) Do you think the strategic importance of IT has been reduced? Explain your answer. Answer: Some think that IT resources have become so commonplace that their strategic importance has diminished, and they have become a commodity-a widely available staple, much like electricity or rail transport. Although many technologies are indeed commodities, this view may not be true as it requires human innovation for sustainable advantage from technology. Innovative information systems in which creative people leverage technology to grow and transform the organization are critical for effective strategy. Student answers will vary. AACSB: Information Technology Chapter LO: 2.6 Explain how information systems are deployed to run, grow, or transform the business. Difficulty: Moderate

33 ..


Introduction to Information Systems, 5e (Wallace) Chapter 3 Information and Communications Technologies: The Enterprise Architecture 1) ASCII code determines how characters are encoded into digital strings. Answer: TRUE AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy 2) A Joystick is an example of an output device. Answer: FALSE AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy 3) Speech input devices have overtaken all other input devices. Answer: FALSE AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy 4) In a computer, the central processing unit handles information processing, calculations, and control tasks. Answer: TRUE AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Moderate 5) Optical disks are considered high-cost primary storage devices. Answer: FALSE AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Moderate 6) A database is an example of system software. Answer: FALSE AACSB: Information Technology Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Easy

1 ..


7) Application software includes operating system software and utilities. Answer: FALSE AACSB: Information Technology Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Easy 8) COBOL programming language is neither used in present systems nor in legacy business applications. Answer: FALSE AACSB: Information Technology Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Moderate 9) Java is often used to provide instructions for set-top cable boxes and car navigation systems. Answer: TRUE AACSB: Information Technology Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Easy 10) Commercial off-the-shelf software requires permission from the software developers before it can be installed and used. Answer: FALSE AACSB: Information Technology Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Moderate 11) In the context of telecommunications, a network is a group of interconnected devices. Answer: TRUE AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 12) The thin, flexible shape of coaxial cables allows them to wind easily through ceilings, walls, and cubicles. Answer: FALSE AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Moderate

2 ..


13) A wireless router has a wired connection to the network and sends radio signals from the antennae. Answer: TRUE AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 14) As a result of the rising demand for wireless bandwidth, there is not a single part of the wireless spectrum that remains unlicensed. Answer: FALSE AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Moderate 15) Digital subscriber lines significantly improve transmission speed over twisted pair wires. Answer: TRUE AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 16) Voice calls that require circuit-switching cannot be configured to a packet-switching network. Answer: FALSE AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Moderate 17) Peer-to-peer networks support file sharing on the Internet. Answer: TRUE AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 18) Virtualization is an important element in the drive toward eco-friendly information systems. Answer: TRUE AACSB: Information Technology Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Moderate

3 ..


19) A drawback of cloud computing is that an extremely reliable Internet connection is a must. Answer: TRUE AACSB: Information Technology Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Easy 20) The drive to rebrand some familiar services as "cloud computing" is solely about building a brand new architecture rather than about the marketing hype created. Answer: FALSE AACSB: Information Technology Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Easy 21) Which of the following is a feature of the devices that form the physical basis of information and systems? A) They are considered computers or computer components. B) They consist of analog devices. C) They process information using the hexadecimal numerical system. D) They are all devices whose computing capacities match those of mainframe computers. Answer: A AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Moderate 22) Which of the following computer component accepts signals and converts them to a digital format that matches the signal's meaning? A) a monitor B) a hard disk C) a keyboard D) a printer Answer: C AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy

4 ..


23) The ________ code defines how keyboard characters are encoded into digital strings of ones and zeros. A) T.61 B) ASCII C) ANSEL D) MARC-8 Answer: B AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy 24) Which of the following is an important reason why the United States adopted computing much earlier than countries such as China and Japan? A) Unlike education in China or Japan, education in the United States has been historically based on logic and reasoning. B) Mathematics, as a subject, was initially developed in the United States, while China and Japan adopted mathematics much later. C) The Chinese and other cultures were reluctant to abandon traditional computing methods, such as the abacus, in favor of modern computing. D) The English alphabet is easier to accommodate on the ASCII keyboard than the Chinese or Japanese alphabets. Answer: D AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Moderate 25) Which of the following terms describes a roadmap created by an organization to describe its current situation and where it should head to achieve its mission, focusing especially on business strategy and the technology infrastructure required to achieve it? A) programming paradigm B) enterprise architecture C) grid computing D) software archaeology Answer: B AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy

5 ..


26) ________ is a technology placed on tags that consist of small chips equipped with a microprocessor, a tiny antenna to receive and transmit data, and sometimes a battery that stores information on the tagged object's history. A) GPS B) RFID C) GPRS D) CDMA Answer: B AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy 27) ________ capture text or images and convert them to digital format in thousands of settings. A) Optical scanners B) RFID tags C) Touchscreens D) Mainframes Answer: A AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy 28) Which of the following is true of a byte? A) It holds eight zeros and ones and represents a single character. B) It holds twelve bits and represents a nibble. C) It is the equivalent of two key presses for text. D) It is the equivalent of a short, text-only email message. Answer: A AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Moderate 29) Which of the following is referred to as the brain of a computer? A) cache memory B) operating system C) central processing unit D) random access memory Answer: C AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy

6 ..


30) Which of the following best describes a transistor? A) a cable that transmits bits by means of light pulses along a glass or plastic fiber instead of electrical signals over a conductor B) an electronic device that can accept, manipulate, store, and output data, and whose instructions can be programmed C) an older information system that remains in use because it still functions and is costly to replace D) a small electrical circuit made from a semiconductor material such as silicon Answer: D AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy 31) Which of the following is an accurate description of "Moore's Law"? A) The cost of microprocessor chips is halved about every eighteen months. B) The amount of data that can be transmitted over an optical fiber cable doubles about every nine months. C) The number of transistors fitting on a chip doubles about every two years. D) The cost of a semiconductor fabrication plant doubles about every four years. Answer: C AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Moderate 32) Which of the following is a type of volatile memory typically consisting of integrated circuits located close to the central processing unit (CPU)? A) random access memory B) flash memory C) read-only memory D) bubble memory Answer: A AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy

7 ..


33) Which of the following is a characteristic of random access memory (RAM)? A) RAM is more easily accessed and searched than hard disk memory. B) RAM stores memory permanently for use by the central processing unit. C) RAM refers to a computer's secondary storage area. D) RAM is volatile storage that is erased when power is turned off or lost. Answer: D AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Moderate 34) Which of the following input devices is capable of transmitting motion and location information? A) a hard drive B) a keyboard C) a mouse D) an optical drive Answer: C AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy 35) Vast improvements in speech recognition software has exponentially grown the popularity of ________. A) lengthy voicemails B) voice to text software C) virtual personal assistants D) optical character recognition Answer: C AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy 36) Optical scanners are used to ________. A) track and interpret body movement B) monitor traffic patterns C) decipher barcodes and other symbols D) read information embedded in RFID tags Answer: C AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy

8 ..


37) Scanners combined with optical character recognition (OCR) software were first used by ________. A) banks for processing checks B) the military for guarding army outposts C) supermarkets to monitor shipments D) universities to evaluate answer sheets Answer: A AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Moderate 38) RFID tags are typically used for ________. A) capturing data on weather conditions B) processing checks in banks C) surveillance of ATM machines D) tracking shipments of physical goods Answer: D AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy 39) Which of the following statements is true about netbooks? A) They are a class of computers that are still typically used for massive bulk processing tasks and financial transactions. B) They are smaller laptops that provide a cost-effective means to wirelessly connect to the Internet. C) They are networks in which there are no central servers and computers can share files, printers, and an Internet connection with one another. D) They are high-end computers featuring the fastest processors for calculation-intensive tasks. Answer: B AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy

9 ..


40) Which of the following classes of computers is still used for massive bulk processing tasks and financial transactions that require high reliability? A) mainframe computers B) minicomputers C) personal computers D) netbooks Answer: A AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy 41) Which of the following classes of computers is widely distributed in developing countries and typically used as a cost-effective means of wirelessly connecting to the Internet? A) microcomputers B) mainframe computers C) netbooks D) minicomputers Answer: C AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy 42) A mobile device with a large touchscreen and virtual keyboard, which is smaller and thinner than a laptop but larger than a smartphone, is known as a ________. A) microcomputer B) minicomputer C) mainframe D) tablet Answer: D AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy 43) Which of the following statements is true about in-memory computing? A) It refers to the use of secondary storage as the main place information is stored. B) It is used for applications that benefit from high speed, real-time access. C) It is mainly used for backup and recovery. D) It slows down processes to a great extent. Answer: B AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Moderate 10 ..


44) In comparison with primary storage, hard drives are ________. A) more expensive B) slower in processing information C) more volatile and lose data when power is turned off D) smaller in storage capacity Answer: B AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Moderate 45) Which of the following has raised questions regarding the ethical implications of companies collecting and analyzing enormous amounts of customer data? A) use of commercial off-the-shelf software B) use of cloud computing C) use of target advertising D) use of open source software Answer: C AACSB: Ethical Understanding and Reasoning Abilities Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy 46) Which type of software supports several kinds of individual and business activities, such as email, web browsing, and game playing? A) system software B) firmware C) utility software D) application software Answer: D AACSB: Information Technology Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Easy 47) Which of the following is an example of application software? A) MS Word B) iOS C) Windows 7 D) Android Answer: A AACSB: Information Technology Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Easy

11 ..


48) Which type of software controls basic operations such as file management, disk storage, and hardware interfaces? A) application software B) system software C) firmware D) programming software Answer: B AACSB: Information Technology Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Easy 49) Which of the following is the operating system developed by Apple for mobile devices? A) Linux B) Windows 10 C) Android D) iOS Answer: D AACSB: Analytic Thinking Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Easy 50) Which of the following tasks is performed by utility software? A) video editing and web browsing B) maintaining file structures C) allocating memory for the needs of application software D) logging events and backing up files Answer: D AACSB: Information Technology Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Moderate 51) Which of the following is an example of an operating system? A) Mozilla Firefox B) MS Access C) Linux D) Adobe Acrobat Reader Answer: C AACSB: Information Technology Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Easy

12 ..


52) Which of the following is a function of operating systems? A) scanning for viruses B) maintaining file structures C) compressing and backing up files D) performing cleanup routines Answer: B AACSB: Information Technology Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Moderate 53) Which of the following types of utility software makes deleted files completely unrecoverable? A) shredder software B) antivirus software C) disk defragmenter software D) compression software Answer: A AACSB: Information Technology Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Easy 54) Which of the following is Microsoft's proprietary language used in its development environment? A) .NET B) PHP C) C++ D) Java Answer: A AACSB: Information Technology Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Easy 55) Software products such as Microsoft Office, Adobe Premiere, and Quicken are also called ________. A) legacy software B) utility software C) open source software D) commercial off-the-shelf software Answer: D AACSB: Information Technology Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Easy 13 ..


56) Which of the following best describes software as a service (SaaS)? A) software which is ready to be installed and used immediately after purchase B) an information system that is owned, hosted, and managed remotely by a vendor C) an old information system that remains in use because it still functions and is costly to replace D) software that is available in source code form Answer: B AACSB: Information Technology Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Easy 57) Software that is freely distributed, along with the code underlying the program, so that people can access the code to improve it is known as ________. A) legacy software B) proprietary software C) open source software D) firmware Answer: C AACSB: Information Technology Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Easy 58) Which of the following is an open source software product? A) McAfee Antivirus B) Mozilla Firefox C) Adobe Photoshop D) Microsoft Office Answer: B AACSB: Information Technology Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Easy 59) The maximum amount of information measured in bits per second, which a particular channel can transmit, is called its ________. A) frequency B) amplitude C) wavelength D) bandwidth Answer: D AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy

14 ..


60) Which of the following transmission media is most commonly used in ordinary telephones? A) coaxial cables B) twisted pair wires C) optical fiber D) ribbon cables Answer: B AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 61) Which of the following is an advantage of using twisted pair wires for transmission? A) Their thin, flexible shape lets them wind easily through ceilings, walls, and cubicles. B) They carry light pulses rather than electrical signals. C) They are more sturdy and durable compared to optical fiber cables. D) They offer the highest rates of data transmission. Answer: A AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Moderate 62) Single inner conductor wires (typically copper) surrounded by insulation, which are then surrounded by a mesh-like conductor are called ________. A) twisted pair wires B) coaxial cables C) optical fiber cables D) resistance wires Answer: B AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 63) Which of the following wired media is typically used to carry television signals? A) coaxial cables B) optical fibers C) twisted pair wires D) shielded cables Answer: A AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy

15 ..


64) Optical fiber cables are ideal for long distance transmission because ________. A) they are cheap and easily available B) they transmit electrical signals over a conductor C) they do not require special hardware to interface with another transmission media D) light signals do not degrade Answer: D AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Moderate 65) Which of the following best describes wavelength? A) It is the maximum transmission, in bit rate, across a channel. B) It is the number of cycles that a wave repeats per second. C) It is the distance between one peak of an electromagnetic wave to the next. D) It is the speed at which a wave travels through a physical medium or through a vacuum. Answer: C AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 66) The frequency of electromagnetic waves is measured in ________. A) hertz (Hz) B) decibels (dB) C) ampere (A) D) kelvin (K) Answer: A AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 67) Which of the following statements is true of microwave transmissions? A) They consist of waves shorter than visible light. B) They send signals in the gigahertz range to relays in the line of sight. C) They cannot traverse more than 20 kilometers when earthbound. D) They cannot be transmitted to satellites. Answer: B AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Moderate

16 ..


68) Which of the following is a computer network in which connections rely on radio waves at frequencies of 2.4 GHz or 5 GHz for transmission? A) CDMA B) GPRS C) Ethernet D) Wifi Answer: D AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 69) A wireless ________ is a device connected to a computer network that emits signals from its antenna and enables wireless connectivity to the network. A) router B) bridge C) firewall D) scrambler Answer: A AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 70) ________ refers to a technology that uses radio waves for connectivity and is commonly used for wireless connections over very short distances. A) WiMax B) IPv6 C) Ethernet D) Bluetooth Answer: D AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy

17 ..


71) Which of the following situations is representative of the last mile issue in telecommunications? A) An e-commerce site is available in only two language versions and customers speaking neither language cannot browse through the site while shopping. B) Subscribers of an Internet service provider that uses optical fiber for Internet connectivity complain of poor Internet speeds as DSL lines have been used as wiring to their homes. C) Asian buyers of a certain smartphone brand are unable to use features such as 3G and wifi because those countries do not yet have the relevant infrastructure. D) Students find that the farther they are from their university building, the harder it is to connect to the Internet with their laptops. Answer: B AACSB: Analytic Thinking Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Difficult 72) Which of the following was a disadvantage of VoIP communication in its initial stages? A) high cost of communication B) increased rate of dropped calls or bad audio C) greater inefficiency due to wasted capacity D) communication by establishing a channel between the nodes Answer: B AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Moderate 73) Which of the following factors makes VoIP technology preferable to customers over a circuit-switched network? A) communication by establishing a dedicated channel B) installing separate systems for voice and data communications C) enabling the use of desk phones services exclusively D) greater range of supplementary services Answer: D AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Moderate

18 ..


74) A network that connects computers, printers, scanners, and other devices in a single building or home is called a ________. A) wide area network B) personal area network C) local area network D) global area network Answer: C AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 75) ________ refers to the technologies that make voice communications across networks using packet switching feasible, including over the Internet. A) COBOL B) VoIP C) Java D) RFID Answer: B AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 76) Which of the following is a benefit of using a packet-switched network? A) They travel singular, predetermined paths. B) They are more survivable against natural or manmade disasters. C) They typically connect computers, printers, scanners, and other devices. D) They consolidate data to transmit in bulk. Answer: B AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 77) Voice over IP (VoIP) is increasingly being used by businesses to ________. A) centralize their workload and provide services B) integrate their voice and data communications C) eliminate dropped calls and bad audio D) support packet-switching technologies Answer: B AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy

19 ..


78) Mary connects to the Internet and types the address of a web page on her browser. The browser sends a request to the system hosting the web page, which then sends back the instructions to display the page requested. Which network is being used in this process? A) circuit-switched network B) client-server network C) peer-to-peer network D) VoIP network Answer: B AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 79) Which of the following types of networks has one or more high-performance hosts running programs and storing data that different users can access? A) client-server network B) circuit-switched network C) peer-to-peer network D) voice over IP network Answer: A AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 80) Which of the following architectures refers to a client-server network in which any particular request by a client involves one or more servers? A) circuit-switched B) IPv6 C) n-tier D) peer-to-peer Answer: C AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy

20 ..


81) Which of the following networks refers to a decentralized network in which there is no central server? A) circuit-switched network B) star network C) peer-to-peer network D) client-server network Answer: C AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 82) Which of the following is an example of a peer-to-peer network? A) Mozilla Firefox B) BitTorrent C) Microsoft Office D) Google Docs Answer: B AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Moderate 83) Kazaa software is commonly used to share audio and video files and documents over the Internet. These files are located in users' computers and not on a centralized server. Kazaa is an example of ________. A) a peer-to-peer application B) utility software C) software as a service D) open source software Answer: A AACSB: Analytic Thinking Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Difficult 84) Which network protocol is most widely used for local area networks? A) WiMax B) HTTP C) Ethernet D) IPv4 Answer: C AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 21 ..


85) Which of the following is a part of the suite of protocols used for Internet communications that connect Ethernet and other networks together? A) File Transfer Protocol B) Transmission Control Protocol C) Hypertext Transfer Protocol D) Routing Information Protocol Answer: B AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 86) Which of the following is the main benefit offered by IPv6 compared to the previous protocol? A) It supports a greater number of IP addresses. B) It communicates by first establishing a channel between the nodes. C) It supports peer-to-peer networks. D) It has more efficient n-tier architecture. Answer: A AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Moderate 87) Which of the following families of standards is widely used for Wifi connections? A) IS-95 B) CDMA2000 C) GPRS D) 802.11 Answer: D AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 88) ________ expands the number of unique IP addresses on the Internet available for the dramatic expansion of devices as part of the Internet of Things. A) Wifi B) 802.11 C) IPv6 D) CDMA2000 Answer: C AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Moderate 22 ..


89) Steve, an entrepreneur, is setting up his Internet startup company on a small farm in a rural area to take advantage of the low power costs. The office building is a rectangular area that diagonally measures 60 meters. Steve plans to install a central wireless router that can provide Internet access from any point inside the office. The business operation requires high Internet speeds up to 1 Gb/s and security protocols. Which of the following wireless standards would best serve Steve's requirements? A) 802.11a B) 802.11ac C) 802.11b D) 802.11g Answer: B AACSB: Analytic Thinking Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Difficult 90) Which of the following statements is true of ICT architectures in the 1960s? A) Mainframe computers formed the foundation of the ICT architecture. B) Microcomputers were used for word processing applications. C) Personal computer operating systems were developed. D) Multiple suppliers of PC hardware offered more options to businesses. Answer: A AACSB: Information Technology Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Moderate 91) Which of the following factors opened the path for development of the client-server architecture? A) use of mainframes as the basis of ICT architecture B) development of PC operating systems C) evolution of virtualization software D) introduction of cloud computing Answer: B AACSB: Information Technology Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Moderate

23 ..


92) Which of the following is the term referring to the increase in power and numbers of servers which changed the focus of software development from the desktop to the web browser? A) virtualization B) client-server architecture C) thin client D) Ethernet Answer: C AACSB: Information Technology Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Moderate 93) ________ is a cost-cutting approach to servers in which multiple operating systems run concurrently on a single physical PC server. A) Virtualization B) Software licensing C) Distributed computing D) Grid computing Answer: A AACSB: Information Technology Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Easy 94) Dave heads the information technology department of a small company based in Atlanta that sells customized T-shirts over the Internet. The company has seen a surge in popularity and is planning to expand its operational base to four more cities. However, Dave has now been asked to come up with a strategy to cut down on the costs incurred in maintaining multiple servers in different cities to host the marketing and e-commerce sites. Which of the following measures will help Dave achieve his objective? A) procuring server hardware from multiple vendors, instead of just one B) isolating each of the cities' servers and running dedicated operating systems on them C) using virtualization to run multiple operating systems on a single server system D) leasing private lines to transmit information between the corporate sites Answer: C AACSB: Analytic Thinking Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Difficult

24 ..


95) Companies felt the need for virtualization because mainframe computers ________. A) required too many specialized professionals B) were very unstable C) often wasted resources D) required expensive software Answer: C AACSB: Information Technology Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Easy 96) How does virtualization impact businesses? A) It increases the software maintenance needed. B) It wastes resources. C) It increases the security risks. D) It lowers hardware expenses. Answer: D AACSB: Information Technology Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Moderate 97) Which of the following is a change brought about by virtualization? A) lowered electricity consumption and hardware expenses B) increased costs of maintaining multiple operating systems C) greater requirement of manpower to maintain the system D) environmentally damaging information systems Answer: A AACSB: Information Technology Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Moderate 98) ________ refers to technology that manages all the office phone lines, voice mail, internal billing, call transfers, forwarding, conferencing, and other voice services. A) Private branch exchange (PBX) B) Radio frequency identification (RFID) C) Post office protocol (POP) D) Internet message access protocol (IMAP) Answer: A AACSB: Information Technology Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Easy

25 ..


99) Which of the following is a technology that integrates voice communications with data by using a packet-switched network? A) n-tier B) IMAP C) RFID D) VoIP Answer: D AACSB: Information Technology Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Easy 100) What advantage does VoIP offer over PBX? A) establishment of a channel between nodes prior to communication B) voice communications across networks without using packets C) easy accessibility over the cloud D) integration of voice with data Answer: D AACSB: Information Technology Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Moderate 101) Voice communications can be integrated with data communication through ________. A) grid computing B) cloud computing C) VoIP D) PBX Answer: C AACSB: Information Technology Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Easy 102) ________ refers to ICT architecture in which users access software applications and information systems remotely over the Internet, rather than locally on an individual PC or from servers in the organization's data center. A) Multiprocessing B) Parallel processing C) Super threading D) Cloud computing Answer: D AACSB: Information Technology Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Easy 26 ..


103) Which of the following is an advantage of cloud computing? A) It seldom requires an Internet connection to access virtual servers. B) It enables better accessibility to data in terms of place and time. C) It provides improved compatibility with old legacy applications. D) It enables users to access software applications locally on an individual PC. Answer: B AACSB: Information Technology Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Moderate 104) Which of the following is a common style of cloud computing wherein the vendor provides access to its full-featured software product, owned and managed by the vendor? A) SaaS B) PaaS C) IaaS D) VoIP Answer: A AACSB: Information Technology Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Easy 105) Which of the following is a drawback of cloud computing? A) It requires an extremely reliable Internet connection. B) It requires users to access software applications locally on an individual PC. C) It requires users to access information systems locally from servers in the organization's data centers. D) It restricts employees from accessing virtual servers using the Internet. Answer: A AACSB: Information Technology Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Moderate 106) 5G will likely become a major disruptive technology that will open up many possibilities for new services, not just for people and businesses but also for the Internet of Things. Answer: TRUE Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy

27 ..


107) Airtags popularized buy Apple for consumers who need to locate missing or misplaced items take advantage of what new technology? A) ultra-wideband (UWB) B) Bluetooth C) Internet of Things D) local area network (LAN) Answer: A Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 108) Ultra-wideband (UWB) is what technology? A) a technology that uses radio waves for connectivity, commonly used for wireless connections over very short distances B) a network that connects devices such as computers, printers, and scanners in a single building or home C) a technology used by networks in which data is broken into segments, called packets, for transmission D) a wireless technology that broadcasts digital pulses over a wide bandwidth to avoid interference with other wireless signals and that is especially useful for locating objects Answer: D Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 109) A primary benefit of UWB is that it ________. A) makes it especially easy to facilitate hands-free cell phone use B) information may travel different routes, weaving around offline servers or taking longer paths if they hit traffic congestion C) takes advantage of a wider bandwidth (>500 MHz) that prevents interference with wifi or Bluetooth D) none of the above Answer: C Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 110) Over the last 25 years the cost of storage has ________. A) dramatically increased B) dramatically decreased C) maintained its cost per unit D) none of the above Answer: B Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Easy 28 ..


111) Data storage amounts are measured in ________. A) gigabytes B) terabytes C) petabytes D) all of the above Answer: D Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Easy 112) Why should businesspeople be concerned about operating systems and their market shares? A) Larger market share means larger capacity profits. B) Operating systems are difficult to design supporting software for individual businesses. C) Security of supporting employee-owned devices is difficult for IT departments. D) Companies want to choose an OS that already has a wide selection of business-oriented software available. Answer: D Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Moderate 113) Satellite internet systems, such as Starlink, provide what significant benefit through their services? A) transmission speeds that are more comparable to what people experience with wired internet access B) transmission speeds that keep increasing with improved technology C) both A and B D) neither A nor B Answer: A Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Moderate 114) Shorter millimeter waves (mm waves), which run from about 30 to 300 gigahertz. This bandwidth supports much faster transmission with greater capacity, but the signals are easily obstructed by buildings and other obstacles. A) 5G high-band B) 5G middle-band C) 5G low-band D) 6G Answer: A Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy

29 ..


115) 6G's likely applications include ________. A) virtual and augmented reality B) advanced artificial intelligence C) both A and B D) neither A nor B Answer: C Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 116) Infrastructure as a service (IaaS), Platform as a service (PaaS), Software as a service (SaaS)A) are all examples of ________. A) digital subscriber lines (DSL) B) cloud computing C) private branch exchange (PBX) D) none of the above Answer: B Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Moderate 117) What are reasons a company would prefer a private cloud computing resource? A) costs decrease with a private cloud computing resource B) compliance with regulations or privacy concerns C) companies can purchase only what they need D) none of the above Answer: B Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Moderate 118) Detriments of cloud computing infrastructure as a service (IaaS) include ________. A) managers must slowly scale up the resources if demand increases B) compliance with regulations or privacy, some companies prefer a private cloud approach C) cloud services that support many businesses may not be able to quickly customize service for specific configurations D) providing flexibility but can also introduce the possibility of data fragmentation Answer: C Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Moderate

30 ..


119) Benefits of cloud computing include ________. A) managers can quickly scale up the resources if demand explodes, perhaps for additional processing power to handle big data B) cloud computing requires reliable and fast internet access C) costs are generally cheaper D) none of the above Answer: A Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Moderate 120) The first mover in cloud-based storage was ________. A) Google Drive B) Microsoft OneDrive C) Dropbox D) None of the above Answer: C Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Easy 121) 5G is necessary for advances in medicine because it will improve ________. A) remote surgery since robotic arms cannot tolerate connection delays B) processing times for reaching medical records C) security protocols for medical information D) All of the above Answer: A Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Moderate 122) What wireless network do fully autonomous vehicles rely on? A) 5G B) 6G C) AI D) 4G LTE Answer: A Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy

31 ..


123) Virtual Personal Assistants primarily operate in what languages? A) English and Spanish B) English and Chinese C) English D) Chinese Answer: A Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy 124) What are the four hardware components of a computer? Give an example of each component. Answer: The four hardware components of a computer are input, output, the central processing unit, and storage. Input devices, such as a keyboard, mouse, and joystick, accept signals and convert them to a digital format that matches the signal's meaning. The most common output device is the flat panel display. Other common output devices include computer printers and speakers, as well as a variety of controllers that operate machinery, from lawn sprinklers and lights to an aircraft's landing gear. The central processing unit (CPU) handles information processing, calculations, and control tasks. Information is stored in the computer in primary storage areas such as random access memory (RAM) and secondary storage devices such as computer hard drives, magnetic tapes, etc. AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Easy 125) The keyboard layout evolved from the typewriter. Why did this turn out to be a disadvantage? Answer: The QWERTY layout popularly used in typewriters was originally designed to slow down data entry to prevent collisions of the hammers striking the paper. Since the first keyboard layouts were based on the QWERTY layout used in typewriters, they were not designed to maximize typing speed. Attempts to introduce a better design failed because many people already knew the QWERTY layout. AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Moderate

32 ..


126) What are RFID tags? Explain why privacy concerns are connected to them. Answer: Radio frequency identification (RFID) tags are small chips equipped with a microprocessor, a tiny antenna to receive and transmit data, and sometimes a battery. They can store information on the object's history and whereabouts, and can be embedded in anything, including pets, livestock, and human beings. RFID tags can easily be hidden, and people might even be unaware that a particular device is carrying one. Therefore, privacy advocates have voiced concerns over the use of such devices. AACSB: Information Technology Chapter LO: 3.1 Describe the four hardware components of a computer, giving examples of each component. Difficulty: Moderate 127) What are the various functions of the operating system (OS)? Answer: The operating system (OS) performs a variety of basic tasks that are essential to the functioning of a computer. It handles input and output to devices such as keyboards and monitors, maintains file structures, and allocates memory for its own activities and the needs of application software. It may support multiple processors, multiple users, and multiple applications running simultaneously. The OS also provides a software platform for application developers. AACSB: Information Technology Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Easy 128) What is object-oriented programming? Answer: In object-oriented programming, programmers define the nature of the data each object contains and also the kinds of operations or behaviors it can do. The modular, reusable objects often simulate real-world objects along with the various states and behaviors they display. A "counter object," for instance, might be used to count visitors to a web page. Its behaviors could include resetting to zero or displaying its current value. An important benefit of objectoriented programming is modularity, so that an object can be independently maintained, reused, or replaced if it breaks down or causes problems. Also, programmers have no need to understand the object's inner workings-only the rules that determine how other objects can interact with it. AACSB: Information Technology Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Moderate

33 ..


129) What are the different varieties of COTS software? Give an example for each variety. Answer: Commercial off-the-shelf (COTS) software is software that is ready to be bought, installed, and used. Some COTS software is designed for the mass market, such as Microsoft Office. Others are specialized for a particular business process. For example, SAS offers software for statistical analysis. Much of COTS software is also produced for particular industries with features they need. Practice-web, for example, develops specialty software for dentists. Software as a service, which is also a popular form of COTS software, is an information system that is owned, hosted, and managed remotely by a vendor. Organizations pay subscription fees to access it via the web, based on their own volumes. AACSB: Information Technology Chapter LO: 3.2 Identify and provide examples of the two major types of software, and describe how software is created. Difficulty: Moderate 130) Why is optical fiber an essential part of worldwide telecommunications? Answer: Optical fiber cables transmit bits by means of light pulses along a glass or plastic fiber, rather than electrical signals over a conductor. It can carry signals over very long distances and has a high bandwidth. Large fiber-optic cables, approximately the size of a garden hose, span all the planet's oceans. This network of fiber-optic cables is very durable and forms the arteries for worldwide telecommunications. AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Moderate 131) Describe the infrastructure of cell phone networks. Answer: The cell phone infrastructure relies on radio waves in the 0.8 to 1.9 gigahertz range. Different cell-phone networks use different bands within this range. Companies like Verizon and AT&T also use different technologies to take best advantage of the frequencies available. Carriers usually negotiate agreements to share the towers and install their own equipment at the tower's base. AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy 132) What is Bluetooth? Answer: Bluetooth is a wireless technology for exchanging information over short distances, which also uses radio waves in the same range as wifi. Devices equipped with Bluetooth adapters, such as a printer and computer, or a cell phone and earpiece, can detect one another and communicate. AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Easy

34 ..


133) Why is the wireless spectrum compared to oceanfront property? Answer: The wireless spectrum is regulated by governments since it is a limited public good. Most of the spectrum usable for wireless transmission is already reserved for TV, cell phones, radio, law enforcement, emergency services, defense, and various government agencies. Some of the remaining bandwidth is left unlicensed and available for any devices to use, such as the bandwidth used for wifi. Since no carrier has control, no fees are charged to use that bandwidth, though some router owners, such as hotels, might want some payment for using their Internet connection. Thus the spectrum, short in supply and high in demand, is available for sale like oceanfront property. AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Difficult 134) Identify the criteria on which the network types are categorized. Give an example of each category. Answer: The industry categorizes network types based on their scale and scope, and how much geographic area they encompass. For example, personal area network (PAN) covers 20 to 30 feet, while global area network (GAN) supports mobile communications across the globe. The approach used to transmit data between computers is another characteristic that distinguishes networks, such as circuit-switched network that communicates by establishing a channel and packet-switched network in which data is broken into segments, called packets, for transmission. Networks are also grouped based on how centralized they are and how the devices on the network share the workload and provide services to others. For example, client-server network is a type of network in which the workload for running applications is shared between the server and the client devices, such as desktop computers, laptops, or smartphones. In peer-to-peer network, there is no central server and computers can share files, printers, and an Internet connection with one another. AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Moderate 135) How are Voice over IP technologies useful to businesses? Answer: Voice over IP (VoIP) technologies makes voice communications across packetswitched networks feasible, including over the Internet. For example, through VoIP it is possible to make free phone calls to anyone in the world who has a computer and Internet connection. Businesses prefer to use VoIP as it allows them to integrate their voice and data communications, saving them the trouble of installing separate systems. AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Moderate

35 ..


136) How does the hourglass structure of the Internet allow for innovations and technological advances? Illustrate with an example. Answer: The core design principle of the Internet is its hourglass structure. As long as bits are transmitted using the Internet's suite of standardized protocols, new applications for the top end and new communications technologies for the bottom can be easily incorporated. For example, the Internet was first launched using phone lines. Over time, new wiring and wireless inventions have led to increased speed, better connectivity, and larger coverage of the Internet. At the top of the hourglass, the Internet's open architecture has led to new applications such as the World Wide Web, streaming video, e-commerce, VoIP, multiuser 3D games, and the Internet of Things. AACSB: Information Technology Chapter LO: 3.3 Describe the major types of networks and the transmission media they use, and give examples of network protocols. Difficulty: Moderate 137) Explain why enterprise architecture is important for organizations. Answer: The enterprise architecture (EA) is the big picture for organizations, the blueprint that describes the current environment and the target environment organizations hope to reach to achieve their missions. It also includes a roadmap for moving from the baseline to the target, to help managers make better decisions that focus on long-term benefits and not just short-term gains. The architecture is not just about hardware, software, and telecommunications assets, though that is a key component. It encompasses the people, technology, processes, and data that make up information systems, and it should be driven by business requirements and the organization's mission. The enterprise architecture can be illustrated as layers, in which the business mission at the top drives decisions about data and applications architectures. These should then shape the ICT architecture, to include hardware, software, and communications. AACSB: Information Technology Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Moderate 138) What is cloud computing? Explain with an example. Answer: The emerging ICT architecture called cloud computing draws on IT resources outside of the corporation's own data centers or local desktops. With an Internet connection, employees can access virtual servers, storage space, video streaming, specialized software, and other cloudbased services from any location, using many different devices. The services are not in a cloud. The physical hardware that supports them is located in very large data centers operated by Amazon, eBay, Google, and other providers. Google, for example, cuts hardware costs to the bone by building its own servers from inexpensive parts, and distributing the applications over a large number of them. They share the load, and if one goes down, another just takes over. AACSB: Information Technology Chapter LO: 3.4 Explain the importance of the enterprise architecture, describing trends in ICT architecture over time. Difficulty: Easy

36 ..


Introduction to Information Systems, 5e (Wallace) Chapter 4 Databases and Data Warehouses 1) A blog with a title, subtitle, content with date of creation, and a few images exemplifies semistructured information. Answer: TRUE AACSB: Information Technology Chapter LO: 4.1 Explain the nature of information resources in terms of structure and quality, and show how metadata can be used to describe these resources. Difficulty: Moderate 2) A marketing representative who wants to put a positive spin on a tally of recent orders chooses to include orders that have been canceled in his report. This report exemplifies highquality data. Answer: FALSE AACSB: Information Technology Chapter LO: 4.1 Explain the nature of information resources in terms of structure and quality, and show how metadata can be used to describe these resources. Difficulty: Easy 3) Data collected by online pop-up surveys are considered high-quality data. Answer: FALSE AACSB: Information Technology Chapter LO: 4.1 Explain the nature of information resources in terms of structure and quality, and show how metadata can be used to describe these resources. Difficulty: Easy 4) In a table, a field can contain either numeric data or text but not a combination of both. Answer: FALSE AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy 5) The process of sequentially executing operations on each record in a large batch is called data integration. Answer: FALSE AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy

1 ..


6) A network database supports many-to-many relationships. Answer: TRUE AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy 7) A relational database is less dependent on the hardware and its particular operating system. Answer: TRUE AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy 8) While creating a relational database for an organization, "Employees" would constitute one attribute with employee ID number, last name, first name, birth date, email address, and phone number as entities. Answer: FALSE AACSB: Information Technology; Analytical Thinking Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Moderate 9) Database developers should use meaningful information for primary keys. Answer: FALSE AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 10) The process of autonumbering randomly assigns numbers to records as they are created to ensure that each record has a unique primary key. Answer: FALSE AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 11) Without much training, end users can create simple queries using the standard query language, SQL. Answer: TRUE AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy

2 ..


12) One disadvantage of interactive voice response (IVR) is that it cannot handle massive call volumes. Answer: FALSE AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 13) Shards or slices of a database should be accessed from the same computer for improved performance. Answer: FALSE AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 14) Companies often use different relational DBMSs for their data warehouse and operational database. Answer: FALSE AACSB: Information Technology Chapter LO: 4.4 Describe how a data warehouse is created, and explain the challenges and value of big data. Difficulty: Moderate 15) An organization's data warehouse contains information drawn from multiple sources that can be used for analysis, intelligence gathering, and strategic planning. Answer: TRUE AACSB: Information Technology Chapter LO: 4.4 Describe how a data warehouse is created, and explain the challenges and value of big data. Difficulty: Easy 16) Due to the limitations of supercomputers, distributed databases involve sharing all or portions of the database on separate servers to distribute the processing loads and improve performance. Answer: TRUE AACSB: Information Technology Chapter LO: 4.5 Describe distributed databases and their uses, and explain how blockchain works. Difficulty: Easy

3 ..


17) Data stewards ensure that people adhere to the definitions for the master data in their organizational units. Answer: TRUE AACSB: Information Technology Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Easy 18) Master data management has more to do with technology than people, processes, and governance. Answer: FALSE AACSB: Information Technology Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Easy 19) Shadow systems are smaller databases developed by individuals or departments as a quick solution to increase efficiency. Answer: TRUE AACSB: Information Technology Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Easy 20) To balance the information needs of multiple stakeholders, top-level managers need clear, consistent, and accurate reports that summarize information from across the enterprise. Answer: TRUE AACSB: Information Technology Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Easy 21) During mergers, integration of multiple databases becomes a major challenge. Answer: TRUE AACSB: Information Technology Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Moderate 22) Shadow systems are managed by individuals or departments and not by the central IT staff in an organization. Answer: TRUE AACSB: Information Technology Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Easy 4 ..


23) Structured information can be defined as data ________. A) that can be organized into hierarchies B) that cannot be linked together C) about data that clarifies the nature of the information D) that is difficult to break down Answer: A AACSB: Information Technology Chapter LO: 4.1 Explain the nature of information resources in terms of structure and quality, and show how metadata can be used to describe these resources. Difficulty: Easy 24) Which of the following is a characteristic of structured information? A) It cannot be linked together to enable searching and sorting. B) It can be broken down into component parts and organized in hierarchies. C) It is contained in physical data storage such as printouts. D) It only includes homogenous data types in one set of information. Answer: B AACSB: Information Technology Chapter LO: 4.1 Explain the nature of information resources in terms of structure and quality, and show how metadata can be used to describe these resources. Difficulty: Easy 25) Flippy, an online shoe store, uses an information system to store sales transactions with clearly defined fields for date, customer number, item number, invoice number, and amount. What type of information resource does Flippy use? A) unstructured information B) semistructured information C) structured information D) shard information Answer: C AACSB: Information Technology Chapter LO: 4.1 Explain the nature of information resources in terms of structure and quality, and show how metadata can be used to describe these resources. Difficulty: Moderate 26) Pieces of information that cannot be linked together are called ________. A) unstructured information B) semistructured information C) structured information D) secure information Answer: A AACSB: Information Technology Chapter LO: 4.1 Explain the nature of information resources in terms of structure and quality, and show how metadata can be used to describe these resources. Difficulty: Easy

5 ..


27) White and Brown, a legal firm, stores details of each case in physical files and folders. The firm has a back room stacked with boxes containing hundreds of files. White and Brown's storage structure resembles ________. A) semistructured information B) unstructured information C) metadata D) relational data Answer: B AACSB: Analytic Thinking Chapter LO: 4.1 Explain the nature of information resources in terms of structure and quality, and show how metadata can be used to describe these resources. Difficulty: Moderate 28) In comparison with unstructured information, semistructured information ________. A) is more difficult to break down B) has no inherent order C) is easier to query and aggregate D) is more difficult to link together Answer: C AACSB: Information Technology Chapter LO: 4.1 Explain the nature of information resources in terms of structure and quality, and show how metadata can be used to describe these resources. Difficulty: Easy 29) What is the main drawback of using unstructured information? A) It hinders creativity. B) It is expensive to maintain. C) It cannot be used to store numerical data. D) It makes retrieving data very difficult. Answer: D AACSB: Information Technology Chapter LO: 4.1 Explain the nature of information resources in terms of structure and quality, and show how metadata can be used to describe these resources. Difficulty: Easy

6 ..


30) In Robin Dave Hospital, visiting physicians use different spreadsheets to record the name, address, mobile number, and email of clients. These individual spreadsheets are then compiled by a data-entry operator into one spreadsheet. What type of information does the compiled spreadsheet represent? A) unstructured information B) semistructured information C) structured information D) secure information Answer: B AACSB: Information Technology; Analytical Thinking Chapter LO: 4.1 Explain the nature of information resources in terms of structure and quality, and show how metadata can be used to describe these resources. Difficulty: Moderate 31) How is metadata related to information? A) It helps clarify the nature of the information. B) It helps gather unstructured information. C) It organizes unstructured information to form structured information. D) It removes redundant data from unstructured information. Answer: A AACSB: Information Technology Chapter LO: 4.1 Explain the nature of information resources in terms of structure and quality, and show how metadata can be used to describe these resources. Difficulty: Easy 32) While using a word processor to create a project report, Ashley includes the subject, title, and the author's name in the report's properties. What type of information is Ashley adding to her report? A) metadata B) count data C) boolean data D) binary data Answer: A AACSB: Information Technology; Analytical Thinking Chapter LO: 4.1 Explain the nature of information resources in terms of structure and quality, and show how metadata can be used to describe these resources. Difficulty: Moderate

7 ..


33) A representation of an entity in a meaningful way, which includes the attributes of the entity, is called a ________. A) field B) primary key C) data definition D) record Answer: D AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy 34) ________ specifies the characteristics of a field, such as the type of data it will hold. A) Data definition B) A record C) Database architecture D) An entity Answer: A AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy 35) An attribute of an entity in a table is called a ________. A) record B) subset C) field D) character Answer: C AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy 36) Batch processing is defined as ________. A) the sequential execution of operations on each record in a large set B) the arrangement of data in a table as records and fields C) the removal of duplicates from a set of data D) the strategy of defining and linking records Answer: A AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy

8 ..


37) A separate file processing system leads to the creation of redundant information because ________. A) it does not allow changes to be made to existing file structures B) computer programs create a fresh record for each task C) each set of computer programs operates on its own records D) different sets of computer programs process files in a similar manner Answer: C AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy 38) Early file processing systems were very difficult to maintain because of ________. A) complicated tables and fields with no metadata B) data dependency between the programs and files C) frequent software upgrades D) lack of database administrators and IT personnel Answer: B AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy 39) An integrated collection of information that is logically related and stored to minimize duplication and facilitate rapid retrieval is called a ________. A) dataset B) data dictionary C) data definition D) database Answer: D AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy 40) Databases are created and handled using ________. A) database management software B) database architecture software C) data modeling software D) data definition software Answer: A AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy

9 ..


41) Roman Jade, an interior decorations company, stores employee details in its employee information system. The birth date of each employee is stored along with other details, including employee names. The relationship between the employee names and employee birth dates is a ________. A) one-to-many relationship B) many-to-one relationship C) many-to-many relationship D) one-to-one relationship Answer: D AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy 42) Kris, an IT manager at Park Infosystems, is handling four projects simultaneously. Each project has loaned and shared resources from other teams. The relationship between Kris and the projects he is working on represents a ________. A) one-to-many relationship B) many-to-one relationship C) many-to-many relationship D) one-to-one relationship Answer: C AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Moderate 43) Which of the following databases resembles an organizational chart? A) network database B) hierarchical database C) stratified database D) cluster database Answer: B AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy

10 ..


44) A drawback of the hierarchical database was that ________. A) it was ineffective at handling many-to-many relationships B) it did not mimic every detail of an organizational chart C) it worked only for one-to-one relationships D) it failed to reduce redundancies introduced by file systems Answer: A AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy 45) Which of the following is an early database approach that allowed flexible links to support many-to-many relationships? A) hierarchical database B) stratified database C) lean database D) network database Answer: D AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy 46) Which of the following database architectures works well for one-to-many relationships, but is not effective with many-to-many relationships? A) network database B) hierarchical database C) object-oriented database D) cluster database Answer: B AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy 47) Which of the following revolutionized payroll generation, streamlining the formerly tedious and slow process in which deductions and taxes were computed by hand and checks typed individually? A) data redundancy B) computer-generated checks C) payroll stubs D) batch processing Answer: D AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy 11 ..


48) Which of the following is one of the advantages of database systems over file processing systems? A) increased redundancy B) improved information integrity and accuracy C) consistency in times of change D) uniformity of scale Answer: B AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy 49) Which of the following is the most widely used database architecture? A) stratified database B) object-oriented database C) network database D) relational database Answer: D AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy 50) The database model that organizes information into tables of records that are connected to one another by linking a field in one table to a field in another table is called ________. A) hierarchical database B) relational database C) network database D) object-oriented database Answer: B AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy

12 ..


51) Aban Constructions Limited, a construction company, maintains data in the form of records within tables, and the tables are interconnected by linking matching fields. Which type of database architecture does Aban Constructions Limited use? A) hierarchical database B) network database C) relational database D) object-oriented database Answer: C AACSB: Information Technology; Analytical Thinking Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Moderate 52) Which type of database architecture does Oracle use? A) network database B) relational database C) hierarchical database D) object-oriented database Answer: B AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy 53) In a relational database, information is organized into tables in which each row represents a(n) ________. A) record B) field C) attribute D) primary key Answer: A AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Moderate

13 ..


54) A model used for planning the organization's database that identifies what kind of information is needed, what entities will be created, and how they are related to one another is called a(n) ________. A) archiving model B) functional model C) data model D) hierarchical model Answer: C AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 55) A field or a group of fields that make a record unique in a table is called a(n) ________. A) primary key B) autonumber C) central entity D) attribute record Answer: A AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 56) Which process assigns incremental numbers to records as they are created to ensure that each record has a unique primary key? A) normalization B) scaling C) standardization D) autonumbering Answer: D AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 57) What is a drawback of using Social Security Numbers (SSN) as the primary key for tables of employees, hospital patients, students, or cable TV customers? A) Typing the nine digit SSN numbers is laborious and time consuming. B) Non-US citizens may not have an SSN. C) It is not a confidential identification number. D) It is not a unique identification number. Answer: B AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 14 ..


58) ________ is a process that refines entities and their relationships to help minimize duplication of information in tables. A) Normalization B) Autonumbering C) Querying D) Data modeling Answer: A AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 59) Which of the following is a function of normalization? A) assigning primary keys B) assigning incremental numbers to records C) minimizing duplication of information D) decreasing the functional dependency of data Answer: C AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Moderate 60) Which of the following do database developers use to avoid anomalies that result when users try to insert, edit, or delete data? A) autonumbering B) accuracy checks C) normalization D) referential integrity Answer: C AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Moderate 61) One goal of normalization is to ________. A) duplicate essential information B) assign primary keys to every table C) reduce the number of foreign keys D) make data functionally dependent Answer: D AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 15 ..


62) A foreign key is ________. A) an attribute that is present in only one table B) a primary key which appears as an attribute in a different table C) a unique value or attribute that determines a primary key D) a field, or a group of fields, that makes each record unique in a table Answer: B AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 63) In a university database, the student table, with student ID as a primary key, is linked to the university department table through its primary key, department ID. In the student table, department ID is a ________. A) foreign key B) primary key C) complex key D) functional key Answer: A AACSB: Information Technology; Analytical Thinking Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Moderate 64) Which of the following ensures that there will be minimum redundancy in a relational database? A) foreign keys B) autonumbers C) functionally independent attributes D) one-to-one relationships Answer: A AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy

16 ..


65) Which of the following is the best way to handle complex relationships, such as the data for a company where employees can be assigned to more than one project, and each project can have more than one employee assigned to it? A) creating two or more records for the employee, each of which lists a different project B) including multiple project fields, such as project 1, project 2, and so on, for the employee C) normalizing the relationship between "employees" records and "projects" records D) making the relationship between "employees" records and "projects" records hierarchically dependent Answer: C AACSB: Information Technology; Analytical Thinking Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Moderate 66) Structured query language is a standard query language ________. A) used to manipulate information in relational databases B) that uses the signals transmitted via the phone to access databases C) that offers voice commands to access a database D) used to enhance security, plan capacity requirements, and design backup Answer: A AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 67) SQL links tables together by ________. A) using primary keys and foreign keys B) using data stored in cloud computers C) assigning incremental numbers to records D) assigning XML tags to the tables Answer: A AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 68) ________ takes advantage of signals transmitted via the phone to access a database, retrieve account information, and enter data. A) Structured query language B) Interactive voice response C) Electronic reported outcome D) Dialog system Answer: B AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 17 ..


69) Which product allows voice commands, sequenced like a natural conversation, to access a database? A) Yelp B) MySQL C) Oracle D) Siri Answer: D AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 70) The database performance tuning process takes into account ________. A) the system's capacity of scaling B) how data is accessed by the end users C) the language used by users to access the database D) the security permissions accorded to different users Answer: B AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 71) A system's ability to handle rapidly increasing demand is called ________. A) load balancing B) parallelism C) scalability D) caching Answer: C AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 72) ________ ensures that every foreign key entry actually exists as a primary key entry in its main table. A) Scalability B) Database schema C) Referential integrity D) Database integration Answer: C AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 18 ..


73) The process by which users are directed to a copy of the database when the main one fails is called ________. A) mirroring B) threading C) tuning D) scaling Answer: A AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 74) A data model that graphically shows the tables, attributes, keys, and logical relationships for a database is called a ________. A) data graph B) shadow schema C) database schema D) referential schema Answer: C AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 75) A database schema is used to ________. A) graphically document a data model B) record details of the fields in a table C) create a backup of a database D) identify redundant information in a database Answer: A AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 76) Documentation that contains the details of each field in every table, including user-friendly descriptions of the field's meaning, is known as a ________. A) database schema B) data dictionary C) data model D) data definition Answer: B AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 19 ..


77) A central data repository containing information drawn from multiple sources that can be used for analysis, intelligence gathering, and strategic planning is called a ________. A) data warehouse B) data dictionary C) data model D) database shard Answer: A AACSB: Information Technology Chapter LO: 4.4 Describe how a data warehouse is created, and explain the challenges and value of big data. Difficulty: Easy 78) An operational database is not a good candidate for high-level management reporting because it is not equipped to ________. A) handle complex queries for strategic planning B) support what-if type questioning C) manipulate information related to business performance D) return high-quality information Answer: A AACSB: Information Technology Chapter LO: 4.4 Describe how a data warehouse is created, and explain the challenges and value of big data. Difficulty: Easy 79) A company maintains a centralized repository of information from internal sources, competitor information, census reports, and metadata from documents and multimedia. This is known as a ________. A) data dictionary B) data model C) data warehouse D) database shard Answer: C AACSB: Information Technology; Analytical Thinking Chapter LO: 4.4 Describe how a data warehouse is created, and explain the challenges and value of big data. Difficulty: Moderate

20 ..


80) Which of the following is used to spot trends, identify patterns, generate reports for compliance purposes, do research, and plan strategies? A) data warehouse B) operational database C) data dictionary D) transaction database Answer: A AACSB: Information Technology Chapter LO: 4.4 Describe how a data warehouse is created, and explain the challenges and value of big data. Difficulty: Easy 81) Julian, a database administrator, prepares data to be loaded to a data warehouse. He checks the zip code field against a reference database of zip codes to ensure that it conforms to standards. The zip codes that aren't in the standard format are reformatted. This process is called ________. A) extraction B) transformation C) loading D) normalization Answer: B AACSB: Information Technology Chapter LO: 4.4 Describe how a data warehouse is created, and explain the challenges and value of big data. Difficulty: Moderate 82) When building a warehouse, the process of reformatting data so that it conforms to set standards is called ________. A) extraction B) transformation C) loading D) normalization Answer: B AACSB: Information Technology Chapter LO: 4.4 Describe how a data warehouse is created, and explain the challenges and value of big data. Difficulty: Moderate

21 ..


83) Retrieval is very fast through data cubes because ________. A) data cubes use a separate server which is tuned for fast retrieval and reporting B) data cubes group data in logical dimensions, such as sales by product, city, region, and country C) data cubes represent information in the form of objects, using object-oriented programming languages to access them D) data cubes organize data by attaching XML tags to them Answer: B AACSB: Information Technology Chapter LO: 4.4 Describe how a data warehouse is created, and explain the challenges and value of big data. Difficulty: Easy 84) Database architecture that has multidimensional data grouped in logical dimensions, such as sales by product, city, region, and country, is called ________. A) data cubes B) operational database C) data warehouse appliance D) data mining Answer: A AACSB: Information Technology Chapter LO: 4.4 Describe how a data warehouse is created, and explain the challenges and value of big data. Difficulty: Easy 85) Which of the following database architectures relies on a cooperating collection of existing databases? A) data mining B) data cubes C) virtual federated warehouse D) data warehouse appliance Answer: C AACSB: Information Technology Chapter LO: 4.4 Describe how a data warehouse is created, and explain the challenges and value of big data. Difficulty: Easy

22 ..


86) ________ refers to collections of data that are so enormous in size, so varied in content, and so fast to accumulate that they are difficult to store and analyze using traditional approaches. A) Big data B) Data cube C) Metadata D) Shard Answer: A AACSB: Information Technology Chapter LO: 4.4 Describe how a data warehouse is created, and explain the challenges and value of big data. Difficulty: Easy 87) Which of the following technologies is better equipped than relational databases to handle big data? A) MySQL B) Hadoop C) ETL D) SQL Server Answer: B AACSB: Information Technology Chapter LO: 4.4 Describe how a data warehouse is created, and explain the challenges and value of big data. Difficulty: Easy 88) A ________ is a prepackaged data warehouse solution offered by vendors that includes the hardware and software, maintenance, and support. A) virtual federated appliance B) shadow system C) relational database D) data warehouse appliance Answer: D AACSB: Information Technology Chapter LO: 4.4 Describe how a data warehouse is created, and explain the challenges and value of big data. Difficulty: Easy 89) ________ is being used by Walmart as a transparent and trusted means of tracking fresh produce in its supply chain. A) Blockchain technology B) Virtual cryptocurrency C) Distributed database technology D) Bitcoin Answer: A AACSB: Information Technology Chapter LO: 4.5 Describe distributed databases and their uses, and explain how blockchain works. Difficulty: Easy 23 ..


90) A type of architecture in which all or portions of the database are located on separate servers to share the load and improve performance is called a ________. A) data warehouse B) distributed database C) relational database D) virtual federated warehouse Answer: B AACSB: Information Technology Chapter LO: 4.5 Describe distributed databases and their uses, and explain how blockchain works. Difficulty: Easy 91) A large company uses a distributed database architecture that replicates their data to several different servers. When changes to the data need to be made, the rest of the system receives this update from the one location where it is changed, called the ________. A) master database B) primary server C) database mainframe D) global database Answer: A AACSB: Information Technology Chapter LO: 4.5 Describe distributed databases and their uses, and explain how blockchain works. Difficulty: Moderate 92) Bitcoin is the online cryptocurrency that is not issued by a government and instead is valued based on ________. A) black market exchange B) consumer spending C) market demand D) banks and credit card companies Answer: C AACSB: Information Technology Chapter LO: 4.5 Describe distributed databases and their uses, and explain how blockchain works. Difficulty: Easy

24 ..


93) A type of open, distributed ledger in which individual records contain a time stamp and reference links to previous transactions to prevent tampering and ensure transparency is called ________. A) blockchain B) cryptocurrency C) bitcoin D) online banking Answer: A AACSB: Information Technology Chapter LO: 4.5 Describe distributed databases and their uses, and explain how blockchain works. Difficulty: Moderate 94) Databases in which people outside the enterprise enter and manage most of the records are termed as ________. A) outsourced databases B) external databases C) data warehouses D) databases without boundaries Answer: D AACSB: Information Technology Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Easy 95) Which of the following uses databases without boundaries? A) a government website offering information to visitors B) a social networking website C) a bank website D) a management information system Answer: B AACSB: Information Technology Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Easy 96) One of the uses of databases without boundaries is in ________. A) handling online transactions of e-commerce websites B) hunting for hidden patterns and relationships in large amounts of data C) handling unstructured data during emergency disaster relief situations D) forming bridging databases between data warehouses and operational databases Answer: C AACSB: Information Technology Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Easy 25 ..


97) Shadow systems are smaller databases developed by individuals outside the IT department that create efficiencies in specific tasks by focusing on ________. A) department security B) ensuring that the whole department is trained C) consistency with the corporate database D) the specific information requirements of the creator Answer: D AACSB: Information Technology Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Easy 98) When using databases without boundaries ________. A) data is not shared by stakeholders B) information is secure and cannot be accessed by people outside the enterprise C) enterprises control the distribution of data D) contributors feel strong ownership over their records Answer: D AACSB: Information Technology Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Easy 99) To collate innovative ideas for an important business project, a manager creates a database which is not integrated into the enterprise database. The new database is an example of a(n) ________. A) mirror database B) shadow system C) information system D) data warehouse Answer: B AACSB: Information Technology; Analytical Thinking Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Moderate 100) Shadow systems focus on ________. A) specific information requirements of an individual or department B) improving the scalability of relational databases C) intelligence gathering and strategic planning D) reducing redundancies in relational data Answer: A AACSB: Information Technology Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Moderate 26 ..


101) Databases that are smaller than enterprise databases and focus on their creators' specific information requirements are known as ________. A) shadow systems B) data warehouses C) data stewards D) referential schemas Answer: A AACSB: Information Technology Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Easy 102) Which of the following is a disadvantage of using shadow systems? A) longer time to retrieve information B) lack of stability and security C) requirement of tools that are not easily available D) lack of documentation and support Answer: D AACSB: Information Technology Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Easy 103) Which of the following is a disadvantage of using shadow systems? A) Shadow systems are difficult to create, deploy, and maintain. B) Shadow systems cannot be developed by individuals or departments to handle specific information requirements. C) Shadow systems contain information that is not consistent with the corporate database. D) Shadow systems require extensive IT support and documentation. Answer: C AACSB: Information Technology Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Easy 104) In Aster Limited, the HR department did not include interns as employees in their database, while the finance department included them. Such inconsistencies can be avoided through ________. A) shadow system B) normalization C) database schema D) master data management Answer: D AACSB: Information Technology; Analytical Thinking Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Moderate 27 ..


105) An approach that attempts to achieve consistent and uniform definitions for entities and their attributes across all business units is called ________. A) normalization B) master data management C) data modeling D) database mirroring Answer: B AACSB: Information Technology Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Easy 106) A person who ensures that people adhere to the definitions for the master data in their organizational units is called a(n) ________. A) data steward B) database administrator C) information systems educator D) management analyst Answer: A AACSB: Information Technology Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Easy 107) Which of the following is a good master data management strategy? A) upgrading technology B) creating shadow systems C) creating a database schema D) focusing on key areas Answer: D AACSB: Information Technology; Analytical Thinking Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Moderate 108) Government agencies, nonprofits, corporations, and other organizations create global databases to gather and distribute comparative information by country on many different topic behind a paid firewall allowed only to researchers. Answer: FALSE Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Easy

28 ..


109) A distributed architecture that is gaining considerable attention is the ________, which can be described as a type of open, distributed ledger in which individual records contain a time stamp and reference links to previous transactions in order to prevent tampering and ensure transparency. A) relational database B) data model C) NoSQL DBMS D) Blockchain Answer: D Chapter LO: 4.5 Describe distributed databases and their uses, and explain how blockchain works. Difficulty: Easy 110) Police dependence on technology leads to what kinds of ethical concerns? A) knowledge of a person's travels can reveal much information that might violate the person's privacy B) flawed facial recognition software leading to false convictions C) lack of training in traditional policing and modern escalation practices because of a reliance on technology D) all of the above Answer: D Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Moderate 111) A reason for using blockchain technology is that ________. A) bitcoin use could outpace credit card transactions B) people could submit transactions anonymously C) criminals' financials are easier to track D) both B and C Answer: B Chapter LO: 4.5 Describe distributed databases and their uses, and explain how blockchain works. Difficulty: Easy 112) Walmart created a system to more transparently track fresh produce in the supply chain. The architecture they used was a ________. A) private blockchain B) distributed warehouse C) a relational database D) none of the above Answer: A Chapter LO: 4.5 Describe distributed databases and their uses, and explain how blockchain works. Difficulty: Easy

29 ..


113) A type of architecture in which all or portions of the database are located on separate servers to distribute the loads and improve performance is known as a ________. A) blockchain B) distributed database C) relational warehouse D) flexible database management Answer: B Chapter LO: 4.5 Describe distributed databases and their uses, and explain how blockchain works. Difficulty: Moderate 114) Bitcoin is an example of what type of data warehouse architecture? A) data cubes B) no SQL C) distributed database D) in-memory database Answer: C Chapter LO: 4.5 Describe distributed databases and their uses, and explain how blockchain works. Difficulty: Easy 115) Which example of the complication of database design emerged from the 2020 census? A) the ability to self-identify as one race or ethnicity B) the ability to self select multiple races or ethnic identities C) the mix of paper and digital surveys conducted for the census D) none of the above Answer: B Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 116) What are some of the ethical impacts of database management from the 2020 census? A) Data about race and ethnicity is important to policymakers, and the information is often used to make decisions about funding that can affect educational opportunities, employment practices, and health care. B) Collecting race and ethnicity questions had never been done before. C) Reporting demographics on race and ethnicity usually has errors. D) The increasing diversity in the country was easy to quantify. Answer: A Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Easy

30 ..


117) What are the ways in which information is classified in terms of structure? Explain with examples. Answer: Information is classified into three types, based on how ordered and organized it is. Facts and data that are reasonably ordered, can be broken down into component parts, and organized into hierarchies are called structured information. For example, a credit card company maintains customer records in a structured format with elements such as last name, first name, street address, phone number, and email address. Information that has no inherent structure or order is called unstructured information. For example, a manila folder in which educational certificates, employment records, bills, warranties, and medical prescriptions are stored. The information category that falls between structured and unstructured information is called semistructured information. It includes facts and data that show at least some structure, such as web pages and documents, which bear creation dates, titles, and authors. AACSB: Information Technology Chapter LO: 4.1 Explain the nature of information resources in terms of structure and quality, and show how metadata can be used to describe these resources. Difficulty: Easy 118) How does metadata differ for different types of information? Answer: Metadata is data about data, and it clarifies the nature of the information. For structured information, metadata describes the definitions of each of the fields, tables, and their relationships. For semistructured and unstructured information, metadata are used to describe properties of a document or other resource, and are especially useful because it layers some structure on information that is less easily categorized and classified. YouTube's database, for example, contains metadata about each of its videos that can be searched and sorted. AACSB: Information Technology Chapter LO: 4.1 Explain the nature of information resources in terms of structure and quality, and show how metadata can be used to describe these resources. Difficulty: Easy 119) What are the characteristics of high-quality information? Answer: High-quality information is accurate, precise, complete, and consistent. It does not have flaws such as spelling and grammatical mistakes, omissions of important numbers, addresses without zip codes, quotations without the author's name, inconsistent formatting, etc. High-quality information is also marked by up-to-date information. In stock trading, for example, information that is biased lacks objectivity, which reduces its value. Thus, high-quality information is objective. Such data is also free of repetitive information. AACSB: Information Technology Chapter LO: 4.1 Explain the nature of information resources in terms of structure and quality, and show how metadata can be used to describe these resources. Difficulty: Easy

31 ..


120) What is a database? Why is it a better system of information organization compared to a file processing system? Answer: A database is an integrated collection of information that is logically related and stored in such a way as to minimize duplication and facilitate rapid retrieval. Compared to a file processing system, it is more accurate and consistent. In addition, it also provides benefits such as reduced redundancy, improved information integrity, higher adaptability to changes, improved performance and scalability, and increased security. Therefore, it is preferred to a file processing system. AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy 121) What are the functions of database management software (DBMS)? Name some common database management software. Answer: Database management software (DBMS) is used to create and manage the database. It provides tools for ensuring security, replication, retrieval, and other administrative and housekeeping tasks. The DBMS serves as a kind of gateway to the database itself and as a manager for handling creation, performance tuning, transaction processing, general maintenance, access rights, deletion, and backups. Microsoft Access, Microsoft SQL Server, Oracle, and MySQL are some commonly used DBMS. AACSB: Information Technology Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy 122) Define relational database. Why are relational databases a standard in most organizations? Answer: Relational database is the most widely used database model that organizes information into tables of records. The records are related to one another by linking a field in one table to a field in another table with matching data. This approach separates the data from the paths to retrieve them, thus making the database less dependent on the hardware and its particular operating system. These relational databases continue to improve, each adding support for large files containing images, video, or audio. Relational systems now also support XML data types, as well as spatial information and mapping coordinates. This makes relational databases a standard in most organizations. AACSB: Information Technology; Analytical Thinking Chapter LO: 4.2 Compare file processing systems to the database, explaining the database's advantages. Difficulty: Easy

32 ..


123) What approach do database developers use while choosing primary keys for a data model? Answer: While choosing primary keys for a data model, database developers commonly use autonumbering to assign primary keys. In this method, the DBMS assigns incremental numbers to records as they are created. This approach ensures that each record has a unique primary key and that no one accidentally gives the same ID number to two different people. Also, because the autonumber has no other meaning, there would be no reason to ever change it. AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 124) What does functional dependence mean? Illustrate with an example. Answer: Functional dependence means that for each value of the table's primary key, there should be just one value for each of the attributes in the record, and that the primary key determines that value. The attribute should be functionally dependent on the value of the primary key. For example, if employee ID is a primary key, then for each value of employee ID, there is exactly one value for each of the attributes included in the record, and the employee ID determines that value. AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Easy 125) What is SQL? Answer: Structured Query Language (SQL) is a standard query language, widely used to manipulate information in relational databases. Without much training, end users can create simple queries to retrieve data based on a condition. More complex queries can insert and edit data, or delete records. To link tables together, SQL relies on their primary and foreign keys. AACSB: Information Technology; Analytical Thinking Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Moderate 126) Describe performance tuning and the trade-offs associated with it. Answer: The database needs tuning for optimal performance, and the tuning process considers the way the end users access the data. For example, fields that end users use to search for records should be indexed for maximum performance. Although the DBA might be tempted to index everything, that would slow the system down when records are added, so a balance is needed. DBAs make trade-offs to add speed to certain activities while slowing down others, yet always stay attentive to the needs of the employees, customers, and other stakeholders. Optimizing performance for speedy retrieval of information, for example, may require slowing down other tasks, such as data entry or editing. AACSB: Information Technology Chapter LO: 4.3 Describe how a relational database is planned, accessed, and managed and how the normalization process works. Difficulty: Moderate 33 ..


127) Describe the most common strategy for creating a data warehouse. Answer: The common strategy for drawing information from multiple sources is abbreviated as ETL, short for extract, transform, and load. The first step is to extract data from its home database, and then transform and cleanse it so that it adheres to common data definitions. After this step has been completed, data from external resources that will enrich the value of the data warehouse for intelligence gathering and marketing is combined with the data extracted from internal sources. The data is loaded into the data warehouse, typically another database. At frequent intervals, the load process repeats to keep it up to date. AACSB: Information Technology Chapter LO: 4.4 Describe how a data warehouse is created, and explain the challenges and value of big data. Difficulty: Moderate 128) What are the database ownership issues faced by management at a typical company? Answer: A company may set a policy that all information resources are company-owned. In practice, however, people often view these resources more protectively. Salespeople may feel protective about their customers' records, or departments might want to control who has access to records that they maintain. In situations where customers can enter and update their own records, companies face the dilemma of how much control customers have over their data. For example, if a customer insists his name should be entered in all lowercase, should the DBA change the database's rules for those fields? Thus, in an organizational setup, ownership issues have to be negotiated among many stakeholders. AACSB: Information Technology Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Easy 129) Describe two ways that distributed database architectures are used to accommodate increasing informational demands. Answer: One strategy is simply to replicate the database on several different servers on a frequent schedule so that user traffic can be directed to one of several different servers. The systems may be in the same data center, but they might also be located on different continents to better support users across the globe. In some settings, users can read information from all the instances of the database, but can only change data on one instance–the master database. That is the one that is copied to the others to keep their information up-to-date. In cases in which users must be able to change data on any instance, specialized software detects the change, verifies it, and replicates it to the others. If one instance crashes, user traffic can easily be redirected to another instance. Another strategy used to accommodate increasing loads is to fragment the database so that portions are stored separately on different servers. This way, each server only needs to respond to queries that involve data stored on that server. For example, if the database is relational, groups of rows in particularly large tables could be stored separately. AACSB: Information Technology Chapter LO: 4.5 Describe distributed databases and their uses, and explain how blockchain works. Difficulty: Easy 34 ..


130) What are shadow systems? How do they hinder managers who are looking for companywide summaries? Answer: Shadow systems are smaller databases developed by individuals or departments that focus on their creator's specific information requirements. They are not managed by central IT staff, who may not even know they exist. Shadow systems are not integrated into the enterprise database, so when managers who are looking for company-wide summaries try to integrate it into the system, they are confronted with many "versions of the truth," since the information comes from multiple sources with inconsistent data definitions and data quality. AACSB: Information Technology; Analytical Thinking Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Moderate 131) What are the requirements for successful master data management? Answer: The most successful efforts at master data management focus on a limited number of entities that are most important, or on key areas, such as customers. Teams from different business units participate in master data management to negotiate and resolve differences. Select people, called data stewards, have to skillfully persuade people to reconcile different formats and meanings in the multiple databases, especially because the benefits may seem somewhat remote to those less concerned about summary reports that conflict. Master data management depends largely on people, processes, and governance. Good coordination among organizational units and persuasive stewards are essential to the integration process. AACSB: Information Technology Chapter LO: 4.6 Explain how the human element affects information management and why master data management is important. Difficulty: Easy

35 ..


Introduction to Information Systems, 5e (Wallace) Chapter 5 Information Systems for the Enterprise 1) Nonprofit and government agencies need additional modules for their financial systems. Answer: TRUE AACSB: Information Technology Chapter LO: 5.1 Explain the role that financial and asset management information systems play in an organization and the importance of financial reporting. Difficulty: Easy 2) Compliance reports can help identify events that fall outside accepted ranges. Answer: FALSE AACSB: Information Technology Chapter LO: 5.1 Explain the role that financial and asset management information systems play in an organization and the importance of financial reporting. Difficulty: Easy 3) In the United States, the Securities and Exchange Commission (SEC) mandates many aspects of compliance. Answer: TRUE AACSB: Information Technology Chapter LO: 5.1 Explain the role that financial and asset management information systems play in an organization and the importance of financial reporting. Difficulty: Easy 4) Human capital management encompasses some of the activities and information systems that support effective management of an organization's human capital. Answer: FALSE AACSB: Information Technology Chapter LO: 5.2 Define human capital management, identify its major components, and describe the metrics used to quantify aspects of human capital. Difficulty: Easy 5) Workforce management modules draw on information stored in sales records that shows when peak demand occurs. Answer: TRUE AACSB: Information Technology Chapter LO: 5.2 Define human capital management, identify its major components, and describe the metrics used to quantify aspects of human capital. Difficulty: Easy

1 ..


6) The corporate responsibility objectives of a company affect its decisions regarding sources and suppliers. Answer: TRUE AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Moderate 7) All valuable supply chain metrics stay visible even when no one collects them. Answer: FALSE AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Moderate 8) Identifying high-cost points along the supply chain is the first step toward reducing operational costs. Answer: TRUE AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 9) Long supply chains are less susceptible to disruption than short supply chains. Answer: FALSE AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 10) Fuel prices affect supply chains. Answer: TRUE AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Moderate 11) Companies have replaced sharing information through sensing technologies with electronic data interchange. Answer: FALSE AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy

2 ..


12) Locations communicated through GPS are accurate within no less than a few kilometers. Answer: FALSE AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 13) Attracting new customers is often more difficult and expensive than retaining existing ones. Answer: TRUE AACSB: Information Technology Chapter LO: 5.4 Define customer relationship management, and describe the metrics and information systems that support it. Difficulty: Easy 14) A good retention management strategy does not promise a fast return on investment. Answer: FALSE AACSB: Information Technology Chapter LO: 5.4 Define customer relationship management, and describe the metrics and information systems that support it. Difficulty: Easy 15) Proactive live chats on websites in the customer support context offer considerable savings. Answer: TRUE AACSB: Information Technology Chapter LO: 5.4 Define customer relationship management, and describe the metrics and information systems that support it. Difficulty: Easy 16) Spammers use "web beacons" routinely to verify that email addresses are valid. Answer: TRUE AACSB: Information Technology Chapter LO: 5.4 Define customer relationship management, and describe the metrics and information systems that support it. Difficulty: Easy 17) Twitter is growing as a way to provide customer support, largely because it can reach customers in near real-time. Answer: TRUE AACSB: Information Technology Chapter LO: 5.4 Define customer relationship management, and describe the metrics and information systems that support it. Difficulty: Moderate

3 ..


18) Engineered suites offer solid integration on the backend and consistent user interfaces throughout. Answer: FALSE AACSB: Information Technology Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Moderate 19) Implementing ERPs very often result in dismal success rates and runaway costs. Answer: TRUE AACSB: Information Technology Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Easy 20) SaaS ERP solutions are "instant on" products, which require minimal training and reengineering of workflows compared to on-premise versions. Answer: FALSE AACSB: Information Technology Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Easy 21) The trend towards fully robotic managed warehouses is underway. Answer: TRUE Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 22) Netflix's success in human capital comes from offering employees freedom and power to make their own decisions about everything from their problem-solving strategies to their vacation days. Answer: TRUE Chapter LO: 5.2 Define human capital management, identify its major components, and describe the metrics used to quantify aspects of human capital. Difficulty: Easy 23) Global supply chains benefit from worldwide connectivity and the global flow of data and are more resilient to pandemics, natural disasters, wars, and protectionism due to their interconnected information systems. Answer: FALSE Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy

4 ..


24) Robots in supply chains offer what benefits? A) Robots lower costs by reducing staffing needs, and requires far less warehouse space because shelves can be located closer together. B) Robots are also taking over the most difficult, dangerous, and tiring jobs for humans. C) Neither A nor B D) Both A and B Answer: D Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 25) Early on Salesforce successfully convinced customers to switch to a cloud-based CRM by ________. A) offering a "pay-as-you-go" subscription pricing model that allowed companies to identify a small number of users to try out the service B) deeply discounting services to acquire long term contracts C) spending a large chunk of its revenue on sales and marketing and also on technology acquisitions to improve and expand its product offerings D) none of the above Answer: A Chapter LO: 5.4 Define customer relationship management, and describe the metrics and information systems that support it. Difficulty: Moderate 26) Salesforce.com uses social networking most effectively for its products in what way? A) to increase sales B) to connect to customer complaints C) to draw on customer contribution for new features of innovative software D) to maintain an engaging alumni base Answer: C Chapter LO: 5.4 Define customer relationship management, and describe the metrics and information systems that support it. Difficulty: Moderate 27) Netflix's innovative information system to increase viewer experiences has its roots in ________. A) managing demographics effectively B) drawing on big data to create "taste clusters" for niche programming C) artificial intelligence and big data analytics to please customers in each country by offering dubbed and subtitled content and locally produced programming D) Both B and C Answer: D Chapter LO: 5.4 Define customer relationship management, and describe the metrics and information systems that support it. Difficulty: Moderate

5 ..


28) Netflix chose to focus on ________ in order to be the be a top streaming performer. A) human capital B) massive cloud-based storage capacities C) analytics D) none of the above Answer: A Chapter LO: 5.2 Define human capital management, identify its major components, and describe the metrics used to quantify aspects of human capital. Difficulty: Moderate 29) Netflix's success in human capital management through information systems depends on ________. A) Workday, a cloud-based ERP B) Salesforce, a cloud-based CRM C) in house IT and databasing D) electronic data interchange to communicate effectively with suppliers (EDI) Answer: A Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Moderate 30) Modules such as budget planning, debt management, travel and expense management, and contracts management are typically included in a ________ management system. A) supply chain B) financial C) human capital D) customer relationship Answer: B AACSB: Information Technology Chapter LO: 5.1 Explain the role that financial and asset management information systems play in an organization and the importance of financial reporting. Difficulty: Easy 31) Which of the following organizations requires the greatest number of modules for their financial systems? A) a nonprofit B) a private-sector bank C) a steel manufacturing company D) an IT consulting firm Answer: A AACSB: Information Technology Chapter LO: 5.1 Explain the role that financial and asset management information systems play in an organization and the importance of financial reporting. Difficulty: Moderate

6 ..


32) Which of the following activities is supported by financial management systems? A) mapping the employee life cycle, starting from recruitment to retirement B) deciding which suppliers to use for sourcing raw materials C) budget planning, assets, general ledger, and related activities D) creating and maintaining a repository of employee contact information Answer: C AACSB: Information Technology; Analytical Thinking Chapter LO: 5.1 Explain the role that financial and asset management information systems play in an organization and the importance of financial reporting. Difficulty: Moderate 33) Consistency in a company's financial management system is maintained by ________. A) supporting multiple finance-related activities and processes B) creating bridges and interfaces to other information systems C) generating exception reports regarding unusual financial events D) creating compliance reports that conform to international regulations Answer: B AACSB: Information Technology Chapter LO: 5.1 Explain the role that financial and asset management information systems play in an organization and the importance of financial reporting. Difficulty: Easy 34) The financial management system of a software company automatically updates the general ledger whenever there are any transactions in the company's accounts receivable and accounts payable. This is an example of the financial system's ________. A) compliance reporting B) exception reporting C) service delivery applications D) integration of components Answer: D AACSB: Information Technology Chapter LO: 5.1 Explain the role that financial and asset management information systems play in an organization and the importance of financial reporting. Difficulty: Moderate 35) The first targets of process improvements through the integration of modules and creation of workflows in companies were ________. A) financial analytics and financial reporting B) general ledger and asset management C) cash management and budget planning D) procurement and accounts payable Answer: D AACSB: Information Technology Chapter LO: 5.1 Explain the role that financial and asset management information systems play in an organization and the importance of financial reporting. Difficulty: Easy 7 ..


36) ________ involves the automatic tagging of unusual events in financial transactions and is used to spot mistakes and fraudulent activities. A) Exception reporting B) Compliance reporting C) Human capital management D) Electronic data interchange Answer: A AACSB: Information Technology Chapter LO: 5.1 Explain the role that financial and asset management information systems play in an organization and the importance of financial reporting. Difficulty: Easy 37) Carrie, the finance manager of an insurance company, suspects some of the sales representatives of submitting their travel expenses receipts twice. Which of the following would help her spot such fraudulent submissions? A) electronic data interchange B) exception reports C) noncompliance reports D) compliance reports Answer: B AACSB: Information Technology; Analytical Thinking Chapter LO: 5.1 Explain the role that financial and asset management information systems play in an organization and the importance of financial reporting. Difficulty: Moderate 38) Exception reports that are generated by financial information systems help organizations primarily in ________. A) conforming to local, national, and international financial regulations B) comparing financial results and strategies with competitor companies C) spotting fraudulent transactions and mistakes that require a manual review D) developing organization- and industry-specific accounting standards Answer: C AACSB: Information Technology Chapter LO: 5.1 Explain the role that financial and asset management information systems play in an organization and the importance of financial reporting. Difficulty: Easy

8 ..


39) The goal of using eXtensible Business Reporting Language (XBRL) in compliance reporting is to ________. A) develop a common language for all accounting and business reports B) avoid transparency so that financial data are kept confidential C) ensure that only computer programs know the meaning of tagged concepts in reports D) ensure that only humans know the meaning of tagged concepts in reports Answer: A AACSB: Information Technology Chapter LO: 5.1 Explain the role that financial and asset management information systems play in an organization and the importance of financial reporting. Difficulty: Easy 40) Which of the following is true of compliance reporting? A) Supply chain management systems carry the major burden of compliance reporting. B) Compliance reports primarily help in identifying events that fall outside accepted ranges. C) Compliance reports relying on XBRL are more advanced than electronic PDFs. D) In the United States, the South Eastern Conference (SEC) mandates all aspects of compliance. Answer: C AACSB: Information Technology Chapter LO: 5.1 Explain the role that financial and asset management information systems play in an organization and the importance of financial reporting. Difficulty: Moderate 41) Which of the following is true of the eXtensible Business Reporting Language (XBRL)? A) It reduces the transparency in a reporting process. B) It makes data computer-readable. C) It specializes only in financial reporting. D) It has failed to advance over electronically delivered PDFs. Answer: B AACSB: Information Technology Chapter LO: 5.1 Explain the role that financial and asset management information systems play in an organization and the importance of financial reporting. Difficulty: Moderate 42) Giving clear definitions and tags to financial terms using eXtensible Business Reporting Language (XBRL) makes data ________. A) less transparent B) manually manageable C) concise and error-free D) computer-readable Answer: D AACSB: Information Technology Chapter LO: 5.1 Explain the role that financial and asset management information systems play in an organization and the importance of financial reporting. Difficulty: Easy

9 ..


43) The goal of using XBRL in compliance reporting is to ________. A) identify events that fall outside accepted ranges B) develop a common language for financial reporting C) create streamlined, manual workflows D) encourage diversity in reporting practices Answer: B AACSB: Information Technology Chapter LO: 5.1 Explain the role that financial and asset management information systems play in an organization and the importance of financial reporting. Difficulty: Easy 44) Which of the following is the primary function of the International Accounting Standards Board (IASB)? A) representing accountants employed in public sector companies around the world B) representing accountants employed in public sector companies in developed countries C) developing and promoting a single worldwide set of financial reporting standards D) training professional accountants worldwide on ethical accounting practices Answer: C AACSB: Information Technology Chapter LO: 5.1 Explain the role that financial and asset management information systems play in an organization and the importance of financial reporting. Difficulty: Easy 45) Which of the following is the central element of the human capital management (HCM) information system? A) employee record B) customer service C) marketing campaigns D) transportation Answer: A AACSB: Information Technology Chapter LO: 5.2 Define human capital management, identify its major components, and describe the metrics used to quantify aspects of human capital. Difficulty: Moderate 46) Which of the following is a function of the human capital management system? A) optimizing labor schedules B) planning terrestrial transport rounds C) tracking all correspondence with customers D) creating a centralized repository of customer contact information Answer: A AACSB: Information Technology Chapter LO: 5.2 Define human capital management, identify its major components, and describe the metrics used to quantify aspects of human capital. Difficulty: Moderate

10 ..


47) Which of the following components of the HCM systems is responsible for tracking employees' demographic information? A) workforce management modules B) talent management applications C) human resources management modules D) service delivery modules Answer: C AACSB: Information Technology Chapter LO: 5.2 Define human capital management, identify its major components, and describe the metrics used to quantify aspects of human capital. Difficulty: Easy 48) Which of the following components of the HCM systems keep track of employee time and attendance, sick leave, vacation leave, and project assignments? A) talent management applications B) human resources management applications C) service delivery modules D) workforce management modules Answer: D AACSB: Information Technology Chapter LO: 5.2 Define human capital management, identify its major components, and describe the metrics used to quantify aspects of human capital. Difficulty: Easy 49) Which of the following components of the HCM systems would airport managers use for optimizing task schedules of ground personnel? A) talent management applications B) service delivery modules C) workforce management modules D) human resources management applications Answer: C AACSB: Information Technology; Analytical Thinking Chapter LO: 5.2 Define human capital management, identify its major components, and describe the metrics used to quantify aspects of human capital. Difficulty: Moderate 50) Which of the following components of the HCM systems focuses on employee life cycle and career development? A) workforce management modules B) social networking software C) service delivery modules D) talent management applications Answer: D AACSB: Information Technology Chapter LO: 5.2 Define human capital management, identify its major components, and describe the metrics used to quantify aspects of human capital. Difficulty: Easy 11 ..


51) Which of the following modules of the human capital management systems encourages interactions through wikis and blogs? A) human resources management applications B) service delivery modules C) workforce management modules D) social networking software Answer: D AACSB: Information Technology Chapter LO: 5.2 Define human capital management, identify its major components, and describe the metrics used to quantify aspects of human capital. Difficulty: Easy 52) The human capital metric that observes measures of job satisfaction, usually assessed through employee surveys or exit interviews is called ________. A) employee satisfaction B) human capital return on investment C) turnover costs D) cost per hire Answer: A AACSB: Information Technology Chapter LO: 5.2 Define human capital management, identify its major components, and describe the metrics used to quantify aspects of human capital. Difficulty: Easy 53) The percentage of workers who left an organization and were replaced during a time period is called employee ________. A) retention B) turnover C) attrition D) termination Answer: B AACSB: Information Technology Chapter LO: 5.2 Define human capital management, identify its major components, and describe the metrics used to quantify aspects of human capital. Difficulty: Easy

12 ..


54) The total of termination costs, hiring costs, training costs, and other costs related to replacing a worker is referred to as ________. A) cost per hire B) sunk cost C) turnover cost D) hidden cost Answer: C AACSB: Information Technology Chapter LO: 5.2 Define human capital management, identify its major components, and describe the metrics used to quantify aspects of human capital. Difficulty: Easy 55) Which of the following is calculated by adding the average advertising costs for job postings, agency fees, recruiter's salary and benefits, and relocation expenses for new employees? A) turnover cost B) cost per hire C) cost of attrition D) retention cost Answer: B AACSB: Information Technology Chapter LO: 5.2 Define human capital management, identify its major components, and describe the metrics used to quantify aspects of human capital. Difficulty: Easy 56) The monetary gains produced by an organization's expenditures on salaries, benefits, bonuses, and other costs for employee talent is called ________. A) turnover cost B) net profit C) human capital return on investment D) rate of earnings on invested capital Answer: C AACSB: Information Technology Chapter LO: 5.2 Define human capital management, identify its major components, and describe the metrics used to quantify aspects of human capital. Difficulty: Easy 57) Which of the following is the primary function of supply chain management in companies? A) optimizing the flow of products and services from their source to the customer B) restructuring the organizational hierarchy to facilitate effective communication C) improving the visibility of a product or service through effective promotional strategies D) identifying the optimum target market to increase the likelihood of the sale of a product Answer: A AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 13 ..


58) The first step in the successful management of a next-generation supply chain is ________. A) sourcing B) delivering C) making D) planning Answer: D AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 59) Which of the following is a factor that directly affects a company's choice of suppliers? A) demand forecast accuracy B) business strategy C) sunken costs D) turnover costs Answer: B AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 60) Which of the following is a part of a company's supply chain management? A) aligning supply with demand B) managing company workforce C) providing customer support D) managing customer retention Answer: A AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 61) A steel manufacturing company that follows a low-cost leadership strategy does not accept any product returns from its customers. The company's "no-return" policy aims to ________. A) effectively track inventories B) streamline financial workflows C) increase the sale of its products D) reduce supply chain costs Answer: D AACSB: Information Technology; Analytical Thinking Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Moderate

14 ..


62) ________ describes how easily managers can track timely and accurate supply chain metrics. A) Marketability B) Sustainability C) Flexibility D) Visibility Answer: D AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 63) Demand forecast accuracy is important because underestimating demand leads to ________. A) high inventory costs B) lost sales C) customer satisfaction D) discount blowouts Answer: B AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 64) Demand forecast accuracy is important because overestimating demand leads to ________. A) higher storage costs B) decreased inventory costs C) lost sales D) increased prices Answer: A AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Moderate 65) A company resorts to steep discounts to get rid of excess merchandise. Which of the following scenarios is most likely to have triggered this action? A) increase in inventory costs B) ineffective tracking of the inventory C) overestimation of demand D) increase in the price of raw materials Answer: C AACSB: Information Technology; Analytical Thinking Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Moderate

15 ..


66) The distortions in a supply chain caused by changes in customer demand, resulting in large swings in inventory levels as the orders ripple upstream from the retailer, to the distributor and manufacturer, is referred to as the ________. A) accelerator effect B) bullwhip effect C) loyalty effect D) local multiplier effect Answer: B AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 67) Which of the following illustrates a practice that can dramatically reduce supply chain costs? A) a supplier company depending on the sales of a market leader to supply products accordingly B) a company replacing its supplier with another larger and more competitive supplier C) a company supplying products directly to customers by omitting all middlemen D) a company closely monitoring and tracking each and every inventory in its supply chain Answer: C AACSB: Information Technology; Analytical Thinking Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 68) Which of the following will typically have a major impact on global supply chain costs? A) increasing attrition rate in companies B) decreasing focus on international business ethics C) restrictions on grants from governments for research and development D) restrictions on carbon emissions Answer: D AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Moderate 69) Which of the following is a function of a supply chain planning software? A) fleet routing B) predicting demand C) cross-docking D) optimizing shipping Answer: B AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy

16 ..


70) Which of the following is a function of warehouse management software? A) cross-docking B) predicting demand C) fleet routing and scheduling D) ensuring compliance for cross-border transactions Answer: A AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 71) Which of the following supply chain management software is used to manage and optimize inventories, space allocation, shipments, and cross-docking? A) supply chain planning software B) transportation management software C) warehouse management software D) global trade management software Answer: C AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 72) Which of the following is a function of transportation management software? A) fleet routing and scheduling B) predicting demand C) optimizing inventory D) cross-docking Answer: A AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 73) Which of the following supply chain management software is used to manage and optimize shipping, logistics, fleet routing, and scheduling? A) supply chain planning software B) warehouse management software C) transportation management software D) global trade management software Answer: C AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy

17 ..


74) A bag manufacturing company had suffered financial losses due to overestimation of demand, which led to overproduction. Which of the following software can help the company prevent such situations in the future? A) sales force optimization software B) supply chain planning software C) manufacturing execution system D) customer relationship management software Answer: B AACSB: Information Technology; Analytical Thinking Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Moderate 75) Which of the following software is used to ensure compliance for cross-border transactions for importers and exporters? A) warehouse management software B) supply chain planning software C) global trade management software D) manufacturing execution system Answer: C AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 76) The bullwhip effect can be reduced if ________. A) suppliers occasionally receive faxed purchase orders from the retailer B) suppliers are provided with warehouse management software C) suppliers have real-time access to up-to-date retail sales data D) suppliers are provided with global trade management software Answer: C AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy

18 ..


77) An electronic bridge between partner companies in a supply chain that is used to transmit real-time information about orders, inventories, invoices, and other data is called a(an) ________. A) electronic market B) financial network C) expense and cost recovery system D) electronic data interchange Answer: D AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 78) Which of the following is true regarding the use of electronic data interchange (EDI) between partner companies in a supply chain? A) EDI often relies on private networks and proprietary software. B) EDI takes very little time to set up. C) EDI enables companies to easily switch partners when required. D) EDI is more flexible than systems with machine-readable formats. Answer: A AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Moderate 79) An advantage of electronic data interchange (EDI) is that it ________. A) does not rely on any proprietary software B) takes very little time to be set up in a company C) enables a company to easily switch partners when required D) improves supply chain performance Answer: D AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Moderate 80) A disadvantage of electronic data interchange (EDI) is that it ________. A) increases the time required for a product to reach the end customer B) fails to build trust among the partners in a supply chain C) tends to lock partners into their relationship D) is not always reliable and may result in the wastage of goods Answer: C AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Moderate 19 ..


81) A chemical company shipping high-risk materials closely monitors the location and status of their shipments using ________. A) RFID tracking B) sensors and tracking software C) global positioning systems D) satellite communications Answer: B AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Moderate 82) ________ help commercial shippers to read the barcodes on packages during transit and upload tracking number, date, time, and place to servers. A) RFID chips B) Wireless scanners C) GPS devices D) EDI systems Answer: B AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 83) ________ are attached to packages or crates and can transmit data as they pass by readers at seaports, railway stations, or warehouses. A) RFID chips B) Wireless scanners C) GPS devices D) EDI systems Answer: A AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 84) Which of the following devices receives signals from orbiting satellites that transmit time and location data? A) electronic data interchange system B) wireless scanner C) global positioning systems device D) RFID chip Answer: C AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 20 ..


85) ________ help drivers navigate while transporting materials and keep managers in touch with their transportation fleets. A) EDI systems B) Wireless scanners C) GPS devices D) RFID chips Answer: C AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 86) ________ encompasses the strategies, processes, and information systems that an organization uses to build and maintain relationships with the current and prospective users of its products or services. A) Enterprise resource planning B) Customer relationship management C) Human capital management D) Supply chain management Answer: B AACSB: Information Technology Chapter LO: 5.4 Define customer relationship management, and describe the metrics and information systems that support it. Difficulty: Easy 87) Which of the following is true regarding customer retention? A) Research has proved that existing customers tend to be less profitable than new customers. B) The only accurate metric that calculates customer retention is the number of repeat customers. C) A retention strategy increases the number of loyal customers but provides no return on investment. D) Attracting new customers is often more difficult and expensive than retaining existing ones. Answer: D AACSB: Information Technology Chapter LO: 5.4 Define customer relationship management, and describe the metrics and information systems that support it. Difficulty: Easy

21 ..


88) Which of the following is a metric commonly used in CRM? A) customer satisfaction index B) human capital return on investment C) turnover costs D) demand forecast accuracy Answer: A AACSB: Information Technology Chapter LO: 5.4 Define customer relationship management, and describe the metrics and information systems that support it. Difficulty: Moderate 89) An online retail website has a low rate of customer retention. Which of the following would be the most effective way to help the company increase its retention rate? A) using uninvited pop-up chat to encourage customers to buy products B) using a CRM system to track customer behavior when they visit the site C) promoting the website through conventional advertising to gain visibility D) building seamless financial workflows Answer: B AACSB: Information Technology; Analytical Thinking Chapter LO: 5.4 Define customer relationship management, and describe the metrics and information systems that support it. Difficulty: Moderate 90) Which of the following is a CRM strategy used to earn more revenue from existing customers? A) cross-selling B) permission marketing C) predictive analytics D) foot-in-the-door technique Answer: A AACSB: Information Technology Chapter LO: 5.4 Define customer relationship management, and describe the metrics and information systems that support it. Difficulty: Easy 91) The use of live chats as a CRM strategy in the context of customer support will most likely result in ________. A) high employee turnover costs B) decreasing profitability C) considerable savings D) decreasing retention rates Answer: C AACSB: Information Technology Chapter LO: 5.4 Define customer relationship management, and describe the metrics and information systems that support it. Difficulty: Easy 22 ..


92) ________ helps organizations classify user-generated content as pro, con, or neutral toward the company or product. A) Predictive analytics B) Affective computing C) Polarity item-analysis D) Sentiment analysis Answer: D AACSB: Information Technology Chapter LO: 5.4 Define customer relationship management, and describe the metrics and information systems that support it. Difficulty: Easy 93) The information systems used by customer relationship management (CRM) are often ________. A) outdated B) unified C) fragmented D) redundant Answer: C AACSB: Information Technology Chapter LO: 5.4 Define customer relationship management, and describe the metrics and information systems that support it. Difficulty: Easy 94) E-marketing information systems provide extensive tracking capabilities by embedding a ________ in the HTML email. A) web trojan B) web beacon C) server log D) web log Answer: B AACSB: Information Technology Chapter LO: 5.4 Define customer relationship management, and describe the metrics and information systems that support it. Difficulty: Easy 95) ________ boosts the performance of an organization's sales reps by helping them track and manage their accounts, contacts, leads, and to-do lists. A) Sales outsourcing B) Sales force automation C) Sentiment analysis D) Email marketing Answer: B AACSB: Information Technology Chapter LO: 5.4 Define customer relationship management, and describe the metrics and information systems that support it. Difficulty: Easy 23 ..


96) Sellers Forever Inc. makes use of a system that sends emails to all employees in the organization with requests to recognize and congratulate the top-performing sales reps at the end of every week to encourage and motivate the sales team. Which of the following has the company employed? A) sales outsourcing B) email marketing C) sentiment analysis D) sales force automation Answer: D AACSB: Information Technology Chapter LO: 5.4 Define customer relationship management, and describe the metrics and information systems that support it. Difficulty: Easy 97) Early integrated application suites evolved from systems that supported ________. A) supply chain management B) manufacturing resource planning C) customer relationship planning D) human capital management Answer: B AACSB: Information Technology Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Easy 98) An integrated application suite to support a whole establishment that includes modules to manage financials, human resources, supply chain, customer relationships, and other business processes is called ________. A) enterprise resource planning B) total quality management C) business process automation D) business process management Answer: A AACSB: Information Technology Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Easy

24 ..


99) In an ERP suite that includes modules specialized for higher education, which of the following would be used to track donations, pledges, gifts, and manage contacts and donor relationships? A) enrollment management B) institutional advancement C) e-learning D) human resources Answer: B AACSB: Information Technology Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Easy 100) Which of the following strategies for integrating ERP modules is built from the ground up with consistent user interfaces, integrated backend database, and a single architectural foundation? A) suite with synchronized modules B) global positioning system C) best-of-breed suites D) engineered suite Answer: D AACSB: Information Technology Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Easy 101) Which of the following approaches for integrating ERP modules has high switching costs? A) suite with synchronized modules B) engineered suite C) best-of-breed suite D) electronic data interchange Answer: B AACSB: Information Technology Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Easy 102) Which of the following is a disadvantage of the engineered suite? A) high switching costs B) independent modules C) high IT support costs D) multiple architectural foundations Answer: A AACSB: Information Technology Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Easy 25 ..


103) The advantage of using a suite with synchronized modules is that ________. A) the switching costs are far lower for ERP systems with interdependent modules B) a common architecture overlays the systems to improve consistency across the modules C) the introduction of changes in such systems to meet new business needs takes little time D) modules can have very rich functionality and can be implemented individually, reducing risk Answer: B AACSB: Information Technology Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Easy 104) In which of the following approaches for integrating ERP modules does the vendor provide middleware to connect systems that may be running on different platforms? A) best-of-breed suite B) engineered suite C) suite with synchronized modules D) global positioning system Answer: C AACSB: Information Technology Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Easy 105) Which of the following requires application suites with synchronized modules? A) building ERP products from the ground up B) creating platforms that match user requirements closely C) building modules that are highly interdependent D) enhancing ERPs through mergers or acquisitions Answer: D AACSB: Information Technology Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Moderate 106) A disadvantage of using a suite with synchronized modules is that ________. A) they have high switching costs B) the bridges between modules can be fragile C) there is no consistency across the modules D) required information will appear only in one system Answer: B AACSB: Information Technology Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Easy

26 ..


107) Software used as a bridge to integrate separate information systems and synchronize data across multiple systems is referred to as ________. A) malware B) web beacon software C) middleware D) bundled software Answer: C AACSB: Information Technology Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Easy 108) Which of the following is a characteristic of best-of-breed suites? A) They are built from the ground up. B) Processes, interfaces, and data are integrated and consistent across systems. C) They match user requirements closely. D) They have a single architectural foundation. Answer: C AACSB: Information Technology Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Easy 109) Which of the following is a disadvantage of best-of-breed suites? A) failure to meet changing business needs B) lack of features that users require C) error-prone synchronization between systems D) high switching costs due to module interdependence Answer: C AACSB: Information Technology Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Moderate 110) The "big bang" approach for implementing ERP involves ________. A) implementing software-as-a-service (SaaS) or on-demand software products B) going live with all the core modules in the engineered suite at the same time C) matching ERP modules to company needs D) using best-of-breed suites for enhancing ERPs through mergers Answer: B AACSB: Information Technology Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Easy

27 ..


111) Vendors are providing software-as-a-service (SaaS) products because of the need to ________. A) lower implementation costs B) standardize ERP services C) address security concerns D) lower turnover costs Answer: A AACSB: Information Technology Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Easy 112) In the case of ________, companies pay subscription fees to access a vendor's software in the cloud, via the web. A) software-as-a-service (SaaS) products B) remote web-application frameworks C) middleware D) web beacons Answer: A AACSB: Information Technology Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Easy 113) A company tried implementing an ERP system and failed. Which of the following is the most likely reason for its failure? A) lack of security B) lack of integration C) lack of preparatory training D) unsuitability for small or medium businesses Answer: C AACSB: Information Technology; Analytical Thinking Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Moderate

28 ..


114) Sam, the CEO of a product development company, is planning to implement an ERP system in his company. However, most of his colleagues advise him against implementing such a system saying that such systems have more weaknesses than strengths. Why should Sam still go ahead with the implementation? A) ERP systems are very easy to implement, especially in large organizations. B) Research shows that almost all ERP implementations have been a success. C) Once in place, the ERP can dramatically enhance operational efficiencies and reduce costs. D) ERP implementation rarely affects workflow and therefore requires very little usage training. Answer: C AACSB: Information Technology; Analytical Thinking Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Easy 115) How does integration of components in a financial management system lead to paperless workflows? Answer: Integration among the modules involves linking the various financial modules; for instance, the details from accounts receivable and accounts payable transactions should automatically update the general ledger. Such integration of the various components of the financial system allows all the staff to have real-time access to the same underlying information. For example, an employee can use online shopping carts to generate procurements from established vendors and route their requests to supervisors for approval, after which the electronic order goes directly to the supplier. The software builds online, interactive forms so staff can make corrections along the way, with customized workflow tables that determine the routes. This results in a streamlined and paperless workflow in an organization. AACSB: Information Technology Chapter LO: 5.1 Explain the role that financial and asset management information systems play in an organization and the importance of financial reporting. Difficulty: Moderate 116) How does exception reporting differ from compliance reporting? Answer: Exception reports can help identify events that fall outside accepted ranges. Financial systems generate exception reports that automatically tag unusual events-ones that human beings must review. Such reports are used to spot mistakes and fraud. For example, average losses per incident may not be huge, but if the same mistake or fraud is repeated over and over, major losses can add up. For example, if sales reps exaggerate mileage for trips, or travelers submit receipts twice, exception reports would spot the fraud. Financial systems also carry the major burden of compliance reporting, and in doing so they must conform to local, national, and international regulations that grow increasingly strict. In the United States, the Security and Exchange Commission (SEC) mandates many aspects of compliance, and electronic reporting is required, relying on eXtensible Business Reporting Language. AACSB: Information Technology Chapter LO: 5.1 Explain the role that financial and asset management information systems play in an organization and the importance of financial reporting. Difficulty: Moderate 29 ..


117) List the components of human capital management systems. Answer: Human capital management (HCM) encompasses all the activities and information systems that support effective management of an organization's human capital. The HCM information system includes a growing suite of applications with the employee record as the central element. Together, these applications support recruitment, hiring, payroll, benefits, taxes, career development, training programs, employment histories, employee self-service, and more. The components of human capital management systems include workforce management applications, talent management applications, service delivery applications, and core human resources management application. AACSB: Information Technology Chapter LO: 5.2 Define human capital management, identify its major components, and describe the metrics used to quantify aspects of human capital. Difficulty: Easy 118) How does social networking affect human capital management systems? Explain with an example. Answer: HCM systems often add social networking software, and organizations are finding innovative ways to use it. Dow, for instance, wanted to tap the extensive knowledge and skills of its retirees, employees on maternity leave, and others who were loyal to the company but not currently working. It launched a social "alumni" network for this population—well over 40,000 people—and invited them to reconnect with colleagues, search for job opportunities, share news, and mentor less-experienced workers. Part of the company's motivation was the looming skills shortage; therefore, Dow encourages their own scientists to interact with young people who might want to pursue scientific careers. Dow also invited employees who had been laid off during a business downturn. Some managers feared these members might just vent on the alumni network, but most did not. In fact, some laid-off workers-called were hired back when business recovered based on their positive attitudes and networking capabilities. AACSB: Information Technology Chapter LO: 5.2 Define human capital management, identify its major components, and describe the metrics used to quantify aspects of human capital. Difficulty: Easy

30 ..


119) List some of the common metrics used in HCM systems. Answer: Some common HCM metrics include: 1. Turnover: The percentage of workers who left and were replaced during a time period 2. Turnover costs: The total of termination costs, hiring costs, training costs, and other costs related to replacing a worker 3. Cost per hire: Average advertising costs + agency fees + recruiter's salary and benefits + relocation expenses for new employees 4. Human capital return on investment: The return on investment produced by an organization's expenditures on salaries, benefits, bonuses, and other costs for human talent 5. Employee satisfaction: Measures of job satisfaction, usually assessed through employee surveys or exit interviews AACSB: Information Technology Chapter LO: 5.2 Define human capital management, identify its major components, and describe the metrics used to quantify aspects of human capital. Difficulty: Easy 120) What are the different steps that underlie the successful management of a next-generation supply chain? Answer: The different steps are (1) plan, (2) source, (3) make, (4) deliver, and (5) return. Supply chain management (SCM) starts with planning, with the goal of building a nimble supply chain that aligns with actual business goals. If the corporate strategy calls for low-cost leadership, for example, a company will strive to reduce costs for transportation and inventory storage. In step 2, managers make decisions about sources, and which suppliers to use. Again, the business strategy should guide many choices, such as whether to commit to long-term contracts or encourage frequent and fierce competition among potential suppliers. The "make" step transforms the resources into something with more value. Supply chain managers track inventory at each stage, fine-tuning the flow so that some parts don't run short while others are overstocked. Managers' keen interest in inventory levels continues through the delivery step, as products are transported to distribution centers and retailers. Finally, SCM includes returns. AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Moderate 121) What are some of the causes for the lack of visibility of supply chain metrics? Answer: Visibility describes how easily managers can track timely and accurate supply chain metrics. Some metrics, such as total sales by product, are easy to get, but a lack of transparency plagues many others. This is because the data might be housed in a supplier's or customer's database with no real-time access, and only slow-moving paper reports transmit critical information. Valuable metrics may also be invisible simply because no one is collecting them. For example, many matrices are fleeting time durations that are too costly and cumbersome to collect. AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 31 ..


122) What is the bullwhip effect in the context of supply chain management? Answer: The bullwhip effect describes the distortions in a supply chain caused by changes in customer demand, resulting in large swings in inventory levels as the orders ripple upstream from the retailer to the distributor and manufacturer. Small fluctuations in retail sales trigger large swings in inventory levels, as the retailer sends orders to the distributor to replenish the stock, and the distributor follows up with orders to the manufacturer. As orders are filled and products shipped, inventory builds up in some places, but shortages occur in others. AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 123) Describe, with the help of an example, how a company can reduce its operating costs by omitting middlemen. Answer: Dell reduced its operating costs by bypassing the distributors and retailers in its supply chain. At dell.com, the customer selects a computer online, customizes it, and then tracks the order until it arrives at the front door, shipped directly from the manufacturer. The monitor, shipped in a separate box, may come from a different manufacturer, but Dell synchronizes the delivery, so all the hardware arrives at the same time. This low-cost strategy helped Dell dominate the PC market for a while. AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Moderate 124) Why do companies use electronic data interchange? What are its advantages and disadvantages? Answer: Since the 1970s, companies have been using electronic data interchange (EDI) to transmit information about orders, inventories, invoices, and other data electronically between partners in a supply chain. This approach to bridge building, which predates the Internet, often relies on private networks and proprietary software and is time-consuming to set up. It improves supply chain performance, but it also tends to lock the partners into their relationship. Having spent so much time and energy building that data bridge, they are less likely to switch partners. AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy

32 ..


125) How do supply chains benefit from sensing technologies? Answer: Supply chains benefit from sensing technologies that improve visibility during transit and in storage. RFID chips are especially useful in supply chains. Attached to packages or crates, they can transmit data as they pass by readers at seaports, railway stations, or warehouses. For high-risk supply chains, organizations use a combination of sensors and tracking software. Global positioning systems (GPS) are a critical feature of navigation and transportation systems. These devices receive signals from 32 orbiting satellites that transmit time and location data, and the GPS receiver computes its own 3-dimensional location based on distances from the three or four closest satellites. Location is accurate within a few meters. GPS devices help drivers navigate to their destinations and keep managers apprised of their fleets. Live GPS tracking software shows the speed and location of every vehicle overlaid against live traffic maps. AACSB: Information Technology Chapter LO: 5.3 Define supply chain management, and describe the metrics and the information systems that support supply chains. Difficulty: Easy 126) What is sentiment analysis? Explain, with an example, how it can help businesses. Answer: Sentiment analysis is the capability of specialized software to scan text input surveys, blogs, or other user-generated content and classify the opinions as pro, con, or neutral towards a company or product. For example, an online ticketing company called StubHub used sentiment analysis software from Scout Labs to spot a surge in complaints from baseball fans on social media. The stadium mistakenly announced to some ticket holders that a Yankees-Red Sox game was rained out, so the ticket holders requested refunds. The game was only delayed, however, and StubHub initially denied fans' requests. The company quickly reversed that policy when sentiment analysis caught the growing tide of negative posts about StubHub on sports blogs. AACSB: Information Technology Chapter LO: 5.4 Define customer relationship management, and describe the metrics and information systems that support it. Difficulty: Easy 127) Explain how e-marketing information systems track customer behavior. Answer: Technically, e-marketing software tracks customer behavior by embedding in the HTML email a web beacon or web bug, which is a tiny, invisible image, typically a single pixel with a unique identifier. The image is actually located on the e-marketing server, and when the customer opens the message, a request is sent from the recipient's computer to retrieve the invisible image and download it. The request includes the date, time, and IP address of the computer making the request, and the unique identifier links the request to the customer's email address as well. AACSB: Information Technology Chapter LO: 5.4 Define customer relationship management, and describe the metrics and information systems that support it. Difficulty: Easy

33 ..


128) What are the advantages and disadvantages of the different integration strategies of ERP modules? Answer: The engineered suite offers solid integration on the back end and consistent user interfaces throughout. Its single architectural foundation can translate to lower IT support costs because staff can focus on just one platform. However, the individual modules may lack all the rich features users want. Also, switching costs are far higher for ERPs in which all the modules are so interdependent. Another drawback is that tightly integrated ERP systems can be more difficult to modify to meet changing business needs, compared to more loosely linked best-of-breed systems. What seems like a simple change in the structure of a field will ripple throughout the organization with unintended consequences. Making changes in such systems to meet new business needs can often take longer than expected. Organizations that use either the synchronized or best-of-breed approach must pay close attention to master data management since the same information will appear in more than one system. Avoiding the fate in which the different systems report inconsistent versions of the "truth" is a constant challenge. AACSB: Information Technology Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Easy 129) What are the strengths of ERP systems? Answer: Despite implementation hurdles, the ERP, at least to integrate finance and human resources, is becoming a near necessity for most organizations. Once in place, it can dramatically enhance operational efficiencies and reduce costs. A key ingredient, of course, is that the organization's employees actually change the way they work to take best advantage of the integrated back-end and paperless workflows. If used properly, ERP systems can standardize and streamline business processes across the whole enterprise, eliminating the waste and redundancy that creep in when everyone's work is so focused on a single department. An ERP helps people appreciate the full process, spanning departments, not just the part that touches their unit. AACSB: Information Technology Chapter LO: 5.5 Explain the importance of enterprise resource planning (ERP) systems, and describe how they are created, integrated, and implemented. Difficulty: Easy

34 ..


Introduction to Information Systems, 5e (Wallace) Chapter 6 Developing a Digital Presence: Websites, Social Media, and Mobile Apps 1) Online magazines usually have the primary goal of informing or entertaining the audience. Answer: TRUE AACSB: Information Technology Chapter LO: 6.1 Identify and provide examples of four goals an organization might choose as it develops a strategy for its digital presence. Difficulty: Easy 2) Addictinggames.com is a website that offers casual amusement such as shooting games and celebrity spoofs. The games are free, but the site's ads target the likely players based on their demographic information. The primary web goal of this organization is to sell products or services. Answer: FALSE AACSB: Information Technology Chapter LO: 6.1 Identify and provide examples of four goals an organization might choose as it develops a strategy for its digital presence. Difficulty: Easy 3) Electronic filing of tax forms on government websites is an example of a government-to consumer-relationship (G2C). Answer: FALSE AACSB: Information Technology Chapter LO: 6.1 Identify and provide examples of four goals an organization might choose as it develops a strategy for its digital presence. Difficulty: Easy 4) An organization that has the primary goal of selling products and services needs to have a smooth and convenient checkout process to maintain customer satisfaction. Answer: TRUE AACSB: Information Technology Chapter LO: 6.1 Identify and provide examples of four goals an organization might choose as it develops a strategy for its digital presence. Difficulty: Easy 5) Not all devices connected to the Internet have a unique IP address. Answer: FALSE AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy

1 ..


6) File transfer protocol (ftp://) is a transmission protocol that indicates that the resource is a file to be transferred. Answer: TRUE AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 7) The website of an international human rights organization stores a large database of information and provides search functionality to make it easier for their visitors to locate desired information. However, this approach fails to be effective since the search functionality is limited to the website rather than the whole web. Answer: FALSE AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 8) To assess the usability of a site, the designers of the site can ask visitors to perform a sequence of tasks and observe the problems they encounter. Answer: TRUE AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 9) For using the web, mouse foot pedals, screen readers, Braille displays, head-mounted pointers, joysticks, and speech-to-text translators for the deaf can all improve access. Answer: TRUE AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 10) Creating text-only alternative versions for devices such as a PDA or mobile phone reduces the web accessibility of a site. Answer: FALSE AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy

2 ..


11) AJAX is a mix of technologies that builds on Javascript and draws on live data to create interactive online displays. Answer: TRUE AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 12) E-commerce involves the buying and selling of goods and services over the Internet or other networks, encompassing financial transactions between all entities except governments. Answer: FALSE AACSB: Information Technology Chapter LO: 6.3 Explain how e-commerce works and why security and trust are critical components. Difficulty: Easy 13) The success of e-commerce depends heavily on its security and the perceptions people have about its trustworthiness. Answer: TRUE AACSB: Information Technology Chapter LO: 6.3 Explain how e-commerce works and why security and trust are critical components. Difficulty: Easy 14) Mobile developers must make the best possible use of screen real estate in order to take advantage of m-commerce. Answer: TRUE AACSB: Information Technology Chapter LO: 6.4 Describe the importance of mobility and mobile apps, define m-commerce, and explain how mobile payments work. Difficulty: Easy 15) Web marketers launch link-building campaigns to improve their brand image. Answer: FALSE AACSB: Information Technology Chapter LO: 6.5 Explain how organizations manage digital marketing for their website, their social media presence, and their mobile apps. Difficulty: Easy 16) Overall spending for online ad campaigns worldwide is lower than for television. Answer: FALSE AACSB: Information Technology Chapter LO: 6.5 Explain how organizations manage digital marketing for their website, their social media presence, and their mobile apps. Difficulty: Easy

3 ..


17) AJAX is used by ad networks to track customer behavior across all their client websites. Answer: FALSE AACSB: Information Technology Chapter LO: 6.5 Explain how organizations manage digital marketing for their website, their social media presence, and their mobile apps. Difficulty: Easy 18) Search engine marketing accounts for the vast majority of Google's revenue. Answer: TRUE AACSB: Information Technology Chapter LO: 6.5 Explain how organizations manage digital marketing for their website, their social media presence, and their mobile apps. Difficulty: Easy 19) Web 2.0 is less about the ways in which people and organizations are using the web than about the technologies. Answer: FALSE AACSB: Information Technology Chapter LO: 6.6 Explain how the digital environment is evolving, incorporating attributes such as crowdsourcing, the Internet of Things, artificial intelligence, and others. Difficulty: Easy 20) One advantage that NFC systems have over credit and debit cards is that the smartphone can carry many other kinds of information, such as loyalty points, coupons, and customer preferences. Answer: TRUE Chapter LO: 6.4 Describe the importance of mobility and mobile apps, define m-commerce, and explain how mobile payments work. Difficulty: Easy 21) Mobile payments in the United States have been slower to take off than around the world. Answer: TRUE Chapter LO: 6.3 Explain how e-commerce works and why security and trust are critical components. Difficulty: Easy 22) For mobile payments to grow further, consumers may need more incentives than just convenience. Answer: TRUE Chapter LO: 6.3 Explain how e-commerce works and why security and trust are critical components. Difficulty: Easy

4 ..


23) Information collected about the browser and computing device an individual is using for purposes such as authentication, fraud detection, and targeted advertising is known as ________. A) third party cookies B) browser fingerprinting C) search engine optimization (SEO) D) Bluetooth low energy (BLE) beacons Answer: B Chapter LO: 6.5 Explain how organizations manage digital marketing for their website, their social media presence, and their mobile apps. Difficulty: Easy 24) When users disable to opt out of third-party cookies, another tool developers have to learn about users' habits, authenticate users, and target ads are through ________. A) browser fingerprinting B) Bluetooth low energy (BLE) beacons C) search engine optimization (SEO). D) none of the above Answer: A Chapter LO: 6.5 Explain how organizations manage digital marketing for their website, their social media presence, and their mobile apps. Difficulty: Easy 25) Of the most popular browsers, what has the largest market share on desktop and laptop computers? A) Chrome B) Safari C) Edge D) Firefox Answer: A Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 26) The search engine that pioneered simple advertising based on search terms rather than cookies was ________. A) Ask Jeeves B) Google C) Yahoo D) DuckDuckGo Answer: B Chapter LO: 6.5 Explain how organizations manage digital marketing for their website, their social media presence, and their mobile apps. Difficulty: Easy

5 ..


27) The largest search engines other than Google are ________. A) Ask Jeeves, DuckDuckGo B) Bing, Baidu C) Yahoo, Altavista D) DuckDuckGo, Yandex Answer: B Chapter LO: 6.5 Explain how organizations manage digital marketing for their website, their social media presence, and their mobile apps. Difficulty: Easy 28) M-commerce depends greatly on ________. A) easy credit B) super apps C) mobile payment systems D) location tracking Answer: C Chapter LO: 6.4 Describe the importance of mobility and mobile apps, define m-commerce, and explain how mobile payments work. Difficulty: Easy 29) How do mobile payment systems work? A) near field communication (NFC), which is a set of standards for technology that supports contactless communication between mobile devices when the two are very near one another B) charges are added to the customer's cell phone bill C) Apple iPhone can accept tap-to-pay and retailers would not need a special scanning terminal D) all of the above Answer: D Chapter LO: 6.4 Describe the importance of mobility and mobile apps, define m-commerce, and explain how mobile payments work. Difficulty: Easy 30) Which of the following is not an example of how some countries use mobile payments? A) Merchants display QR codes at the point of sale which purchasers scan with their mobile phones. Purchasers enter and authorize the amount, which then appear on their accounts. B) Charges the user authorizes on the phone are added to the cell phone bill, which can be paid in cash. C) Users scan their own credit cards so when the user makes a mobile payment, the charges actually go on the credit card, not on the cell phone bill. D) All of the above Answer: D Chapter LO: 6.3 Explain how e-commerce works and why security and trust are critical components. Difficulty: Easy

6 ..


31) HTML standards are managed by who? A) Mozilla Foundation B) Apple C) World Wide Web Consortium (W3C) D) All of the above Answer: D Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Moderate 32) What is the purpose of the World Wide Web Consortium (W3C)? A) ensure that HTML meets the needs of developers and also supports communication and commerce for all, regardless of their hardware, software, native languages, or geographic location B) specifies the web page's format and helps put it into a reader-friendly output C) create pages that a visitor can access with a web browser–the software application that retrieves, interprets, and displays web resources D) none of the above Answer: A Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Moderate 33) Waze, purchased by Google, is an excellent example of what type of innovative information system for their maps? A) Bluetooth low energy (BLE) beacons B) Internet of Things C) artificial intelligence D) crowdsourcing Answer: D Chapter LO: 6.6 Explain how the digital environment is evolving, incorporating attributes such as crowdsourcing, the Internet of Things, artificial intelligence, and others. Difficulty: Easy 34) Countries other than the USA have led to what innovations in "FinTech"? A) China introduced enormously popular smartphone apps that handle financial transactions. B) Kenya carrier Safaricom, for instance, stores purchase balances, and customers can visit the stores in person to pay. C) Australia and New Zealand widespread mobile phone adoption in the rural areas connects users with banking access. D) Both A and B Answer: D Chapter LO: 6.4 Describe the importance of mobility and mobile apps, define m-commerce, and explain how mobile payments work. Difficulty: Easy

7 ..


35) An important trend for Web 2.0 and beyond is the exponential growth of data through new sensors, such as information added through RFID technology, smartphones, cameras, camcorders, GPS devices, and other sensory input, which are adding far more information than crowdsourcing and social media. Answer: TRUE AACSB: Information Technology Chapter LO: 6.6 Explain how the digital environment is evolving, incorporating attributes such as crowdsourcing, the Internet of Things, artificial intelligence, and others. Difficulty: Easy 36) The online book review magazine, bookreviewusa.com, offers free access to all their reviews and author interviews; however, only those who have purchased premium access can read book extracts from recently published books. What is the primary web goal of this organization? A) inform or entertain the audience B) influence the audience C) sell products and commodities D) facilitate offline relationships Answer: A AACSB: Information Technology Chapter LO: 6.1 Identify and provide examples of four goals an organization might choose as it develops a strategy for its digital presence. Difficulty: Moderate 37) After a discussion with his investors, the owner of a newly launched online video site decides that entertaining his audience will be the primary web goal of the website. Which of the following actions will best support his decision? A) offering online purchase of products with in-store pickup B) publishing videos on the website that favor only American celebrities over celebrities from other countries C) providing facilities on the website that allow visitors to make wish lists and buy videos, movies, and other products online D) providing free access to quality content and selling advertising space on the website Answer: D AACSB: Information Technology Chapter LO: 6.1 Identify and provide examples of four goals an organization might choose as it develops a strategy for its digital presence. Difficulty: Moderate

8 ..


38) A(n) ________ focuses on informing visitors and empowering them with aggregated information about products from different suppliers. A) dashboard B) intranet portal C) infomediary D) flat network Answer: C AACSB: Information Technology Chapter LO: 6.1 Identify and provide examples of four goals an organization might choose as it develops a strategy for its digital presence. Difficulty: Easy 39) A website that facilitates transactions by bringing together buyers and sellers from all over the world is called a(n) ________. A) intranet B) e-marketplace C) wide area network D) virtual market Answer: B AACSB: Information Technology Chapter LO: 6.1 Identify and provide examples of four goals an organization might choose as it develops a strategy for its digital presence. Difficulty: Easy 40) Consumer Reports is a magazine that tests consumer products in its labs and disseminates information on the results so consumers can compare brands. Hence, Consumer Reports is an example of a(n) ________. A) e-marketplace B) virtual market C) infomediary D) intranet Answer: C AACSB: Information Technology Chapter LO: 6.1 Identify and provide examples of four goals an organization might choose as it develops a strategy for its digital presence. Difficulty: Easy

9 ..


41) BusinessUSA.com allows small-scale producers to post information about their products on the site where prospective buyers compare prices and features of competing products before purchasing them. Which of the following types of e-marketplaces does BusinessUSA.com represent? A) business-to-consumer (B2C) B) business-to-business (B2B) C) consumer-to-consumer (C2C) D) consumer-to-business (C2B) Answer: A AACSB: Information Technology Chapter LO: 6.1 Identify and provide examples of four goals an organization might choose as it develops a strategy for its digital presence. Difficulty: Easy 42) A ________ relationship is a(n) e-commerce relationship in which organizations buy and sell products or services online from or to one another. A) consumer-to-business (C2B) B) consumer-to-consumer (C2C) C) business-to-business (B2B) D) business-to-consumer (B2C) Answer: C AACSB: Information Technology Chapter LO: 6.1 Identify and provide examples of four goals an organization might choose as it develops a strategy for its digital presence. Difficulty: Easy 43) Which of the following is an example of a consumer-to-business (C2B) e-marketplace? A) a virtual platform where individual sellers can post their wares and shoppers use the search tools to find what they want B) a blog featuring a link to a product sold by an e-commerce firm, added by the blogger, who gets paid by the firm when a visitor to the blog clicks on the link and buys the product C) a website that allows businesses to buy and sell products or services online to one another D) an e-marketplace where many suppliers post their wares and consumers can compare them on pricing and features before making the final purchase decision based on the comparison Answer: B AACSB: Information Technology Chapter LO: 6.1 Identify and provide examples of four goals an organization might choose as it develops a strategy for its digital presence. Difficulty: Easy

10 ..


44) Which of the following is an example of a consumer-to-consumer (C2C) e-marketplace? A) An airline gives a traveler the best travel and ticket offers in response to the traveler's post on the airline's website that she wants to fly from New York to San Francisco. B) An author who writes book reviews, posts links to books on Amazon.com on her website, and receives revenues from successful sales to her blog subscribers. C) A person posts information about furniture he wishes to sell on eBay and sells it to another individual who views that eBay page. D) A business owner calculates the tax he has to pay to the IRS through an interactive tool on its website and makes the payment via wire transfer from the same site. Answer: C AACSB: Information Technology Chapter LO: 6.1 Identify and provide examples of four goals an organization might choose as it develops a strategy for its digital presence. Difficulty: Moderate 45) The website of Vogue, a hair and beauty salon chain, allows visitors to upload their photographs and try virtual hairstyles and virtual makeovers. In this example, the primary web goal of the salon is to ________. A) inform or entertain the audience B) influence the audience C) sell products or services D) facilitate product comparison Answer: B AACSB: Analytic Thinking Chapter LO: 6.1 Identify and provide examples of four goals an organization might choose as it develops a strategy for its digital presence. Difficulty: Moderate 46) The website of an organization that has the main web goal of selling products and services must include ________. A) tools to find a local dealership B) new and captivating content C) easy shipping solutions D) in-store pickup options along with online buying Answer: C AACSB: Information Technology Chapter LO: 6.1 Identify and provide examples of four goals an organization might choose as it develops a strategy for its digital presence. Difficulty: Easy

11 ..


47) The official website of Realtor USA, an independent real estate company in New York, allows visitors to view virtual tours of apartments, print a colorful flyer, view a map, contact an agent, and email a friend, all from one inclusive viewer. The primary web goal of this organization falls into the category of ________. A) informing or entertaining the audience B) facilitating offline relationships C) influencing the audience D) selling products or services Answer: B AACSB: Information Technology Chapter LO: 6.1 Identify and provide examples of four goals an organization might choose as it develops a strategy for its digital presence. Difficulty: Easy 48) The IT department of Detroit University decides to create a website with the primary goal of facilitating offline relationships with students. Which of the following would best help the university to reach this goal? A) The website should offer premium access to specialized content for fee-paying students. B) The website should offer Detroit University apparel, such as university logo T-shirts, college sweatshirts, hats and jackets, and replica football jerseys for sale. C) The website should allow prospective students to access virtual tours of the campus. D) The website should allow students to create free blogs. Answer: C AACSB: Information Technology Chapter LO: 6.1 Identify and provide examples of four goals an organization might choose as it develops a strategy for its digital presence. Difficulty: Moderate 49) The unique global address for a web page or other resource on the Internet is called the ________. A) extensible resource identifier (ESI) B) uniform resource locator (URL) C) solution deployment descriptor (SDD) D) internationalized resource identifier (IRI) Answer: B AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy

12 ..


50) ________ is the hierarchical naming system that maps a more memorable URL to the actual IP address. A) Internet imaging protocol B) Asynchronous layered coding C) Domain name system D) Hypertext transfer protocol Answer: C AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 51) Though every device connected to the net has an IP address, the Internet's designers added the Domain Name System (DNS) because ________. A) the enormous growth of the Internet led to the depletion of available IP addresses B) IP addresses are not displayed in human-readable notations C) IP addresses are numerical and cannot be easily remembered by users D) the IP addresses change each time the device is connected to the net Answer: C AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Moderate 52) A group of musicians buy a URL, Musik4Change.org for their website, which has a unique, numerical IP address assigned to it. After a year, they move their website to a new server with a different IP address. In this situation what happens to the URL of their website? A) It becomes fragmented. B) It remains the same. C) It needs to be renamed. D) It needs to be registered with the DNS again. Answer: B AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Moderate

13 ..


53) Which of the following is a transmission protocol which specifies that the resource is a web page containing code the web browser can interpret and display? A) file transfer protocol B) file exchange protocol C) hypertext transfer protocol D) simple text transfer protocol Answer: C AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 54) The last string of letters in the name of a website indicates ________. A) the name of the individual or organization that owns the site B) the security classification of the web page C) the programming language used to create the web page D) the type of organization or country code Answer: D AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 55) Which of the following parts of the URL "http:// www.timesonline.co.uk" represents the toplevel domain? A) http:// B) .uk C) www. D) timesonline Answer: B AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 56) The last string of letters in a URL that indicates the type of organization or country code is called the ________. A) IP address B) top-level domain C) hashtag D) fragment identifier Answer: B AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 14 ..


57) Alzheimer's Society, a private, Chicago-based nonprofit organization, decides to create a social networking forum for caregivers of people with Alzheimer's disease. While selecting a domain name, which of the following top-level domains would best suit their goals? A) .gov B) .com C) .edu D) .org Answer: D AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Moderate 58) A ________ is a component of a web address that maps to the unique IP address of the destination location. A) protocol identifier B) file protocol C) registered domain name D) fragment identifier Answer: C AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 59) Which of the following is true about Internet Corporation for Assigned Names and Numbers (ICANN)? A) It is a nonprofit organization. B) It accepts domain names written only with the Roman alphabet. C) It does not accept applications from organizations that want to use brand names as top-level domains. D) It develops assistive technology products and services free of charge. Answer: A AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy

15 ..


60) Which of the following is a function of the Internet Corporation for Assigned Names and Numbers (ICANN)? A) developing guidelines for web accessibility B) settling disputes over domain names C) developing free assistive technology products and services D) enforcing international anti-cybersquatting laws Answer: B AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 61) When someone registers a domain name that is a company's trademark, hoping to resell it to the company at an exorbitant profit, it is called ________. A) phishing B) cybersquatting C) domain testing D) online identity-theft Answer: B AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 62) Which of the following is an example of typosquatting? A) A start-up investment company assumes the online identity of Arman & Company, a wellestablished investment company, in social networking platforms for the purposes of acquiring its brand equity. B) An environmental support group creates a spoof of the advertisement of a popular beverage company, highlighting its degradation of the environment by releasing waste products into the water bodies near its bottling plant. C) A person registers a domain name, Tucson Multispecialty Clinic, which is the name of a popular multispecialty clinic hoping to resell it to the clinic at an exorbitant profit. D) A person registers the domain name "currentaffairs.net" to take advantage of the huge popularity of the e-newspaper currentaffairs.org to divert traffic to his webpage and make money by selling advertising space. Answer: D AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Moderate

16 ..


63) Registering a replica site with a misspelling in the trademark name that users might easily mistake for the real thing and displaying negative information about the actual company on the replica site is called ________. A) cybersquatting B) online identity-theft C) typosquatting D) phishing Answer: C AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 64) A newly opened law firm in Kirkland decides to create a small website that provides a brief introduction of the firm, its mission, the contact information and address of the firm, and a client list. Which of the following information architectures would be most suitable for its website? A) flat website architecture B) hierarchical website architecture C) multidimensional website architecture D) sequential architecture Answer: A AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Moderate 65) ________ is a website structure in which the top-level homepage contains links to secondlevel pages, which then link to further relevant pages. A) Flat website architecture B) Multidimensional website architecture C) Hierarchical website architecture D) Sequential architecture Answer: C AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy

17 ..


66) Which of the following is a drawback of the hierarchical website architecture? A) Four or five web pages are not enough to provide complete information to visitors. B) Visitors may become frustrated at having to move through fixed steps. C) It is difficult to locate information that does not easily fit into, or that spans across, categories. D) Creating multiple paths that link to each other through the site is expensive. Answer: C AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Moderate 67) ________ is a website structure with several links to pages at all levels, allowing visitors numerous paths through the site. A) Multidimensional website architecture B) Integrated website architecture C) Sequential architecture D) Hierarchical website architecture Answer: A AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 68) Which of the following websites uses a sequential architecture? A) The website of a computer manufacturing firm provides the categories of computers and services provided on the top of the page, while along the left navigation bar it provides links to specific models. B) A website that provides online counseling requires a visitor to enter certain information on the home page, which would then lead him to the subsequent page, until he is matched with a suitable counselor. C) An e-magazine lists the links to the genres on the home page, and under each genre it lists the links that categorize articles by different authors, which leads to a webpage with the writings by each author. D) The website of a restaurant provides an image of the restaurant on the home page and links to three pages that provide the story of the restaurant, its location and timings, and its specialties. Answer: B AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Moderate

18 ..


69) ________ is a website structure that guides visitors, step by step, through a transaction, survey, or learning module. A) Integrated website architecture B) Multidimensional website architecture C) Sequential architecture D) Hierarchical website architecture Answer: C AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 70) ________ refers to the ease with which a person can accomplish a goal using some tool, such as a website, a mobile phone, or a kiosk. A) Usability B) Media richness C) Crowdsourcing D) Backward compatibility Answer: A AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 71) Which of the following would be the least effective option for a user interface design? A) letting users easily undo their actions or return to previous states B) making the common tasks very simple to do, so users can accomplish them on the first try without frustration C) letting users know in an indirect way when something on the website changes, or the user has completed an action D) avoiding the addition of unnecessary links or options especially when the user is engaged in a sequential task Answer: C AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy

19 ..


72) Which of the following would be the most effective option for a user interface design? A) avoiding the addition of unnecessary links or options especially when the user is engaged in a sequential task B) making sure that users buy all the items kept in their shopping carts C) mixing the design and layout for the website in order to keep a balance of all the available designs D) letting users know in an indirect way when something on the website changes, or the user has completed an action Answer: A AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 73) Which of the following elements of website usability describes how quickly a user performs tasks after learning a website's basic design measures? A) ease of learning B) efficiency C) memorability D) error rates Answer: B AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 74) Which of the following elements of website usability refers to the effort it takes to regain the same level of proficiency when a user returns to a website after a period of time? A) efficiency B) satisfaction level C) memorability D) stickiness Answer: C AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy

20 ..


75) Which of the following elements of website usability refers to the mistakes made by users when they attempt to accomplish a task and how easy it is to recover from those mistakes? A) trial rate B) error rate C) attrition rate D) churn rate Answer: B AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 76) Which of the following is a measure of the satisfaction level of website usability? A) the extent to which a user can accomplish simple tasks on the first visit to the site B) how quickly and efficiently a user performs tasks after learning the site's basic design C) the number of mistakes users make when they attempt to accomplish a task and how easily they can recover from those mistakes D) the ratings of individual experiences on the website by the users ranging from pleasant to frustrating Answer: D AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 77) Which of the following elements of website usability measures the extent to which a user can accomplish simple tasks on the first visit to the website? A) memorability B) error rates C) ease of learning D) efficiency Answer: C AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 78) ________ refers to how easily people with disabilities can access and use web resources. A) Web accessibility B) Usability C) Crowdsourcing D) Media richness Answer: A AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 21 ..


79) Which of the following websites would have the highest web accessibility? A) a website which is designed in the classic gray-white-blue color scheme that is pleasant to the eye and allows visitors to focus on texts and information B) a website that has a search functionality which confines the search to the website rather than the whole web, to make it easy for visitors to locate relevant information C) a website which uses search engine optimization, which is linking certain keywords to the website so that anybody searching for these words on a search engine will be directed to the site D) a website in which text and images are large and/or enlargeable, to make it easier for users with poor sight to read and understand the content Answer: D AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Moderate 80) Which of the following is a function of the Web Accessibility Initiative (WAI)? A) settling disputes over domain names B) offering tutorials and tips to help organizations improve their sites C) developing free assistive technology products and services D) enforcing international anti-cybersquatting laws Answer: B AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 81) Which of the following is true about assistive technologies? A) Designers should address accessibility issues in the site's information architecture, with design elements that work well with assistive technologies such as optical scanners. B) Making accessibility changes after completing the entire website broadens the potential base of customers and thus makes good business sense. C) Offering tutorials to help organizations improve their sites and understand how design techniques can radically alter a site's accessibility. D) Assistive technologies, such as screen readers for the visually impaired, are high-tech devices and software that help people with disabilities. Answer: C AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy

22 ..


82) Devices and software that help people with disabilities, such as screen readers for the visually impaired, are called ________. A) assistive technologies B) alternative technologies C) human performance technologies D) appropriate technologies Answer: A AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 83) Which of the following would improve a website's accessibility? A) using fixed text sizes B) creating very tiny clickable areas C) using "click here for more" rather than "More on cosmetic dentistry" D) making bold headings, short paragraphs, and orderly paragraph arrangements Answer: D AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 84) Which of the following factors would improve the web accessibility of a site? A) using fixed text sizes B) creating text-only alternative versions for devices such as a tablet C) creating very tiny clickable areas D) implementing forms that require a mouse click Answer: B AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 85) Which of the following would NOT improve a website's accessibility? A) using fixed text sizes B) using self-explanatory links C) adding alternative text tags for every image D) creating text-only alternative versions for devices such as a tablet Answer: A AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy

23 ..


86) Which of the following will NOT improve the web accessibility of a site? A) adding alternative text tags for every image B) implementing forms that require a mouse click C) using self-explanatory links D) making bold headings, short paragraphs, and orderly paragraph arrangements Answer: B AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 87) A ________ is a software application that retrieves, interprets, and displays web resources. A) communications protocol B) search engine C) web browser D) uniform resource identifier Answer: C AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 88) Which of the following web browsers is the dominant browser for Macintosh computers? A) Google Chrome B) Mozilla Firefox C) Apple Safari D) Opera Answer: C AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 89) The original language used to create web pages is called ________. A) Javascript B) AJAX C) hypertext markup language D) Basic Answer: C AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy

24 ..


90) Software developers must test their code in one browser after another because ________. A) browser developers add special features and proprietary tags that work only with their own browser B) it is made mandatory as per the Web Accessibility Initiative C) most browser developers use hypertext markup language to specify the format of web pages D) users prefer using different browsers for different purposes Answer: A AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 91) Which of the following are design tips for improving website accessibility? A) Use fixed text sizes. B) Make bold headings, short paragraphs, and orderly paragraph arrangements. C) Implement forms that require a mouse click. D) Use complicated designs. Answer: B AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 92) Which of the following is true of the Web Accessibility Initiative? A) It offers design elements that meet the needs of a wider range of users and work well with assistive technologies such as screen readers. B) It facilitates lawsuits against organizations that are not making their websites and apps accessible. C) It is the primary developer of assistive technologies for improving web access. D) It develops guidelines for web accessibility that are widely regarded as international standards. Answer: D AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy

25 ..


93) Which of the following is a benefit that some companies are finding as they make their websites and apps accessible? A) Accessibility adds strategic benefits in the form of heightened corporate social responsibility and internet visibility. B) Making their site more accessible limits the potential base of customers to their target audience. C) Web developers find that bypassing many of the rich features and graphical elements makes their website simpler. D) They are less prone to accessibility lawsuits. Answer: A AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 94) Which of the following is true of HTML 5? A) It requires developers to import fancier graphics and word art from software like Photoshop. B) It increased the need for web developers to ask customers to download special browser plugin software for videos. C) It will reduce problems for web developers struggling to support different browsers running on different devices. D) It was the first version of HTML that was used to create web pages. Answer: C AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 95) ________ is a language used to add interactivity to web pages. A) XML B) AJAX C) HTTP D) Javascript Answer: D AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy

26 ..


96) ________ is a mix of technologies that builds on Javascript and draws on live data to create interactive online displays. A) HTML B) PHP C) AJAX D) OLAP Answer: C AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 97) The ________ is an international body that establishes and publishes standards for programming languages used to create software for the web. A) Internet Corporation for Assigned Names and Numbers (ICA2N) B) Web Accessibility Initiative (WAI) C) International Software Developers Association (ISDA) D) World Wide Web Consortium (W3C) Answer: D AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 98) A(n) ________ is a large group of software products that helps manage digital content in collaborative environments. A) content management system B) web hosting service C) digital dashboard D) enterprise information system Answer: A AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy

27 ..


99) Which of the following statements is true of content management systems? A) Web content management systems support website development and maintenance for smaller teams. B) Web content management systems enable people with limited web development skills to contribute to a website from anywhere in the world. C) Web content management systems allow people to match their site's overall look and feel to the single available template with fonts, colors, and layout. D) Web content management systems create personalized development environments for designers such that two people trying can edit the same page at the same time. Answer: B AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 100) ________ refer to the part of a website template that controls the fonts and colors which appear when an editor identifies some text as a page heading, a paragraph title, or some other style. A) Cascading style sheets B) File transfer protocols C) Scalable vector graphics D) Cookies Answer: A AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Easy 101) The buying and selling of goods and services over the Internet or other networks, encompassing financial transactions between businesses, consumers, governments, or nonprofits is called ________. A) online management B) online transaction processing C) e-commerce D) inventory management Answer: C AACSB: Information Technology Chapter LO: 6.3 Explain how e-commerce works and why security and trust are critical components. Difficulty: Easy

28 ..


102) The web address originating an e-commerce transaction should show the ________ protocol, indicating that the transmission to that server is encrypted and secure. A) tls:// B) smtp:// C) https:// D) ssl:// Answer: C AACSB: Information Technology Chapter LO: 6.3 Explain how e-commerce works and why security and trust are critical components. Difficulty: Easy 103) A ________ is an e-commerce application that facilitates online shopping by mediating the interconnections to the merchant's bank, the bank or other entity that issued the card, and then back to the original website to approve or decline the purchase. A) tag cloud B) shopping cart C) cascading style sheet D) payment gateway Answer: D AACSB: Information Technology Chapter LO: 6.3 Explain how e-commerce works and why security and trust are critical components. Difficulty: Easy 104) Which of the following factors best explains why it was tougher for Amazon.com to build trust in its e-commerce website when compared to Walmart? A) Amazon.com did not have a smooth online checkout process compared to Walmart. B) Amazon.com was a privately-owned firm compared to Walmart, which was publicly traded on the stock exchange. C) Unlike Walmart, Amazon.com did not operate out of physical retail locations. D) Amazon.com relied mostly on advertising and word-of-mouth publicity to promote itself. Answer: C AACSB: Information Technology Chapter LO: 6.3 Explain how e-commerce works and why security and trust are critical components. Difficulty: Moderate

29 ..


105) ________ gives its approval to US e-commerce websites that follow strict privacy standards, such as explaining to visitors how personal data is collected. A) Sure Seal B) The World Wide Web Consortium C) TRUSTe D) Web Accessibility Initiative Answer: C AACSB: Information Technology Chapter LO: 6.3 Explain how e-commerce works and why security and trust are critical components. Difficulty: Easy 106) Which of the following would NOT be considered a benefit of mobile devices? A) Small size and lighter weight B) Social seclusion C) Personalization D) Virtual personal assistant technology Answer: B AACSB: Information Technology Chapter LO: 6.4 Describe the importance of mobility and mobile apps, define m-commerce, and explain how mobile payments work. Difficulty: Easy 107) ________ is an Internet marketing strategy used to increase the quantity and quality of traffic from search engines, often by improving the site's position in result lists. A) Search engine marketing B) Search engine optimization C) Geotargeting D) Content farming Answer: B AACSB: Information Technology Chapter LO: 6.5 Explain how organizations manage digital marketing for their website, their social media presence, and their mobile apps. Difficulty: Easy 108) Software programs used by search engines which crawl the web visiting sites to analyze the keywords, headers, content, and links to other sites are called ________. A) search aggregators B) lexical analyzers C) spiders D) data harvesters Answer: C AACSB: Information Technology Chapter LO: 6.5 Explain how organizations manage digital marketing for their website, their social media presence, and their mobile apps. Difficulty: Easy 30 ..


109) A ________ is a visual depiction of keywords related to the search, with font size and position indicating relevance. A) concordance B) mashup C) tag cloud D) folksonomy Answer: C AACSB: Information Technology Chapter LO: 6.5 Explain how organizations manage digital marketing for their website, their social media presence, and their mobile apps. Difficulty: Easy 110) Which of the following factors is considered by search engines while determining the relevance of a website? A) user interface design of the website B) media richness of the website C) web accessibility score of the website D) quality of external links to the site from other websites Answer: D AACSB: Information Technology Chapter LO: 6.5 Explain how organizations manage digital marketing for their website, their social media presence, and their mobile apps. Difficulty: Easy 111) ________ is a metric used to assess the impact of an online ad. A) Error rate B) Churn rate C) Click-through rate D) PageRank Answer: C AACSB: Information Technology Chapter LO: 6.5 Explain how organizations manage digital marketing for their website, their social media presence, and their mobile apps. Difficulty: Easy 112) The click-through rate (CTR) is computed as ________. A) the number of visitors who click on the ad divided by the number of impressions B) the number of impressions viewed during the advertising campaign C) the number of visitors who click through the ad divided by the number of websites on which the ad is placed D) the number of ad impressions delivered to viewers divided by the number of sales made through clicks on the ads Answer: A AACSB: Information Technology Chapter LO: 6.5 Explain how organizations manage digital marketing for their website, their social media presence, and their mobile apps. Difficulty: Easy 31 ..


113) A ________ is a small text file left on a website visitor's hard drive that is used to personalize the site for the visitor, or track web activities. A) plug-in B) tag cloud C) spider D) cookie Answer: D AACSB: Information Technology Chapter LO: 6.5 Explain how organizations manage digital marketing for their website, their social media presence, and their mobile apps. Difficulty: Easy 114) Which of the following is true about third-party cookies? A) Click-through rates are lower when third-party cookies are used. B) They are not tied just to the site a person is visiting. C) Third-party cookies do not track users' web activities or browsing habits. D) Third-party cookies are non-retrievable. Answer: B AACSB: Information Technology Chapter LO: 6.5 Explain how organizations manage digital marketing for their website, their social media presence, and their mobile apps. Difficulty: Moderate 115) A person clicks on an ad of a fitness club in a blog on nutrition. The person conducts a search on yoga and moves to another webpage, which is also a network client. The stored information about the person is retrieved, and he sees more ads about health clubs and gyms. Which of the following web advertising tools is being used in this example? A) spiders B) search engine optimization C) mashup D) third-party cookies Answer: D AACSB: Analytic Thinking Chapter LO: 6.5 Explain how organizations manage digital marketing for their website, their social media presence, and their mobile apps. Difficulty: Moderate

32 ..


116) Search engine marketing accounts for the vast majority of revenue for ________. A) Baidu B) Bing C) Google D) Facebook Answer: C AACSB: Information Technology Chapter LO: 6.5 Explain how organizations manage digital marketing for their website, their social media presence, and their mobile apps. Difficulty: Moderate 117) Delegating tasks to large diffuse groups or communities who often volunteer their contributions is called ________. A) third-party marketing B) viral networking C) crowdsourcing D) online analytical processing Answer: C AACSB: Information Technology Chapter LO: 6.6 Explain how the digital environment is evolving, incorporating attributes such as crowdsourcing, the Internet of Things, artificial intelligence, and others. Difficulty: Easy 118) Which of the following is an example of crowdsourcing? A) An advertising agency contracts a group of bloggers to write and publish articles about their client's products. B) Electrogadgets.com, a site that provides information on a range of electronic gadgets, encourages members to publish their reviews and user guides. C) A publisher pays famous writers to provide short reviews of each other's newly published books for his e-magazine. D) An online financial services organization hires finance students as freelance workers to do routine tasks and write reports. Answer: B AACSB: Analytic Thinking Chapter LO: 6.6 Explain how the digital environment is evolving, incorporating attributes such as crowdsourcing, the Internet of Things, artificial intelligence, and others. Difficulty: Moderate

33 ..


119) Which of the following demonstrates a downside of crowdsourcing? A) Trying to drive up the operating expenses of a rival automobile company, employees at another automobile company click repeatedly on the competitor's sponsored link without intending to buy anything. B) An international funding organization for welfare programs in underdeveloped regions removes data from Wikipedia which described some of the allegations of corruption against the organization. C) An organization which hires freelance writers for its web-promotion campaigns finds that the quality of work is often substandard. D) A market survey conducted by a home improvement firm revealed that the firm's policy of lowered advertising expenditure and greater focus on generating word-of-mouth publicity had not resulted in the sales targets being met. Answer: B AACSB: Analytic Thinking Chapter LO: 6.6 Explain how the digital environment is evolving, incorporating attributes such as crowdsourcing, the Internet of Things, artificial intelligence, and others. Difficulty: Difficult 120) Google developed a text translator that acquires its skills directly from the data and need not be programmed with any rules about semantics or syntax of the languages involved in the translation. This is an example of ________. A) over-engineering B) machine learning C) data harvesting D) search engine optimization Answer: B AACSB: Information Technology Chapter LO: 6.6 Explain how the digital environment is evolving, incorporating attributes such as crowdsourcing, the Internet of Things, artificial intelligence, and others. Difficulty: Easy

34 ..


121) Describe the different types of e-marketplaces. Answer: E-marketplaces are often classified based on the buyers and sellers they serve. Business-to-consumer (B2C) is an e-commerce relationship in which businesses offer products for online sale to consumers, such as Expedia. Business-to-business relationships (B2B) is an e-commerce relationship in which businesses can buy and sell products or services online to one another. For example, on AliBaba.com, a retailer who needs to restock the inventory for a product can compare wholesale prices, minimum orders, and payment terms from suppliers in dozens of countries. Consumer-to-consumer (C2C) is an e-commerce relationship in which individual consumers can buy and sell to one another over the Internet, such as eBay and Craigslist. Consumer to business (C2B) is an e-commerce relationship in which individual consumers can sell products or services to businesses. A blogger, for instance, might add a link on the blog to a product sold by an e-commerce company. If a blog visitor clicks on the link and buys the product, the company will pay the blogger a small fee. Government websites also support online interactions, so terms such as G2C, G2G, and C2G have appeared. For example, G2C encompasses services such as online payment for car registration renewals, and C2G might include electronic filing of tax forms. AACSB: Information Technology Chapter LO: 6.1 Identify and provide examples of four goals an organization might choose as it develops a strategy for its digital presence. Difficulty: Moderate 122) Describe some of the ways in which organizations can facilitate offline relationships through their websites. Answer: For many companies, such as Royal Bank of Scotland, Takashimaya Department Store in Japan, Abercrombie and Fitch, and Hyatt Hotels, the website's goal is to facilitate and extend offline relationships. To achieve this goal, the site should build customer awareness of the brand and encourage stronger and broader offline connections. For example, retail stores might offer online buying with in-store pickup, and restaurants provide directions and discount coupons. India's Taj Mahal Hotel website features special deals, event planning, virtual tours, reward programs, and food preference surveys, along with online reservations. Websites for colleges and universities typically create engaging tours for prospective students and portals for current students, faculty, alumni, and staff to facilitate their offline relationship with students. Along with many online self-service applications, the sites include college news, sports scores, access to digital libraries, and online learning support. AACSB: Information Technology Chapter LO: 6.1 Identify and provide examples of four goals an organization might choose as it develops a strategy for its digital presence. Difficulty: Moderate

35 ..


123) Describe the functions of the Internet Corporation for Assigned Names and Numbers (ICANN). Answer: The Internet Corporation for Assigned Names and Numbers (ICANN) is the nonprofit organization charged with overseeing the net's naming system. ICANN works out contracts with the organizations that manage URL assignments within each of the top-level domains, accredits the registrars who sell domain names, resolves disputes, and establishes policies. For instance, the net's naming system originally accepted only domain names written with the Roman alphabet. Recently, however, ICANN opened the door for other scripts. AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Moderate 124) What is multidimensional website architecture? Explain with the help of examples. Answer: A website structure with multiple links to pages at all levels, allowing visitors multiple paths through the site is called multidimensional website architecture. The multidimensional website architecture recognizes that information can be categorized in many ways, and that visitors need multiple paths through the site. Panasonic's website, for instance, offers links to different visitor categories in the top navigation bar, including consumers, business, and industrial. Along the right navigation bar, it offers links to product lines, such as printers, audio and video electronics, and others. AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Moderate 125) Why are organizations reluctant to make their websites accessible to people with disabilities? Answer: Even government websites in many countries fall very short, resulting in persons with disabilities having trouble obtaining critical online services. In the European Union, despite laws that require accessibility features, only a third of government websites are fully accessible. Some web developers are concerned that there is a conflict between usability and accessibility, and that an accessible website must bypass many of the rich features and graphical elements that make them pleasing and attention-getting. Although the challenge of creating accessible websites is not trivial, organizations can make tremendous progress by building in accessibility from the start. A common obstacle for visually impaired people, for instance, is a button that can only be accessed with the mouse. One university's new virtual student union had that flaw on its "Let's get started!" button, so blind students couldn't ever get started. But it is just as easy to program the button to also respond to a key press, if the designers keep that feature in mind. Though many organizations see efforts to improve accessibility for people with disabilities as additional costs, others are learning that accessibility adds strategic benefits in the form of heightened corporate social responsibility and Internet visibility. Making the site more accessible from the beginning also broadens the potential base of customers and thus makes good business sense. AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Moderate 36 ..


126) How does hypertext markup language (HTML) help in creating web pages? Answer: The original language used to create web pages is called hypertext markup language (HTML), which specifies the web page's format and helps put it into reader-friendly output. The language uses tags in angle brackets that browsers can interpret, such as <p>, to indicate the start of a new paragraph. Usually, the page will still appear even if the code includes many mistakes in the tags, though it may not be formatted quite the way the designer intended in all the browsers. AACSB: Information Technology Chapter LO: 6.2 Provide examples of different website information architectures, describe usability and accessibility, and explain how websites are created with software tools. Difficulty: Moderate 127) What are the uses of shopping cart software? Answer: E-commerce systems typically include shopping cart software that tracks purchases as customers navigate the site and click "add to cart" as they go. When the customer is ready to check out, the software tallies the purchase, calculates taxes, computes shipping costs, and posts a discount if the customer enters a valid promotional code. AACSB: Information Technology Chapter LO: 6.3 Explain how e-commerce works and why security and trust are critical components. Difficulty: Easy 128) How can a person check the authenticity of an e-commerce transaction? Answer: An e-commerce transaction must be secure from end to end, despite including several steps on different servers that can be geographically quite distant. The web address originating the transaction should show the https:// protocol, indicating the transmission to that server is encrypted and secure. The secure connection confirmed by the https:// protocol relies on a certificate issued by a recognized authority such as the VeriSign Trust Network. Most browsers offer buttons that can quickly display additional information about the certificate and the secure connection, including the level of encryption. These buttons will also show a warning if they detect security problems, such as an expired certificate. AACSB: Information Technology Chapter LO: 6.3 Explain how e-commerce works and why security and trust are critical components. Difficulty: Moderate

37 ..


129) Describe some of the factors relating to consumers' motivations and buying behavior that influence their level of trust in an e-commerce store. Answer: Building trust is a daunting task for less well-known organizations and requires close attention to consumers' motivations and buying behavior. Businesses can apply for a "seal of approval" from independent organizations that audit websites to verify their compliance with minimum trust requirements in different countries. TRUSTe gives its approval to US websites that follow strict privacy standards, such as explaining to visitors how personal data is collected. Another way companies attempt to build trust is by tapping customers' social networks, through social commerce or "s-commerce." Social networks can personalize the shopping experience, so that people learn about products from those they know and trust. That feedback is more valuable than the reviews posted by unknown customers, some of which might be fake. Social sites such as Facebook, Pinterest, and Instagram are adding shopping capabilities directly to their own platforms so users don't have to go to the retailer's site to buy a product. AACSB: Information Technology Chapter LO: 6.3 Explain how e-commerce works and why security and trust are critical components. Difficulty: Moderate 130) Describe some of the ways in which web developers can scam search engines. Answer: The drive to improve search results gets so heated that some unscrupulous developers launch devious strategies to outwit the engine's ranking system. For example, one technique to build valuable external links is to look for guest books on authoritative sites whose votes would be particularly valuable, such as those in the .gov or .edu domains, and then include a link to the scammer's site in an area that lets any visitor add comments. Scammers also build giant link farms out of servers whose only purpose is to increase the number of external links. Such techniques draw the ire of the search engine developers and often result in penalties or outright bans. Some scammers aim to get a competitor's site banned, or at least move its site lower in the results. They can inject code onto a competitor's site that repeats the same keyword over and over in a header, which spiders can easily spot and penalize as an unacceptable trick to make the page seem extremely relevant. Scammers might also invite raunchy adult-oriented or gambling sites to add links to the competitor, which can result in penalties and lower ranking. AACSB: Information Technology Chapter LO: 6.5 Explain how organizations manage digital marketing for their website, their social media presence, and their mobile apps. Difficulty: Moderate

38 ..


131) What is a cookie? How does it help e-commerce websites? Answer: A cookie is a small text file left on a website visitor's hard drive that is used to personalize the site for the visitor, or track web activities. The file typically contains a unique ID and information such as date and time, or the pages visited. The cookie can also store information the visitor provides, such as the zip code for a city the visitor intends to visit on a weather site. When the visitor returns, the site can immediately display that city's weather. E-commerce sites rely on cookies to keep track of the products a customer places in a shopping cart. As a customer collects items, the web server retrieves his or her unique ID and stores it with the item number in its own database. If the customer leaves the site and returns later, the software can retrieve the ID and refill his or her shopping cart. The site can also deliver targeted ads and recommendations, without asking the customer to log in, by retrieving the cookie and checking to see what that ID has viewed in the past. AACSB: Information Technology Chapter LO: 6.5 Explain how organizations manage digital marketing for their website, their social media presence, and their mobile apps. Difficulty: Moderate 132) What is the Adwords program? Answer: Based on the theory that the search terms a person enters reveals his or her current interests, Google developed the Adwords program, which serves small, text-only ads related to the search in a list of sponsored links. Type in "boots," for example, and you will see sponsored links offering relevant boot sales. Whether the ad actually appears to someone who submits a keyword the organization has chosen for its ad depends partly on how much the company is willing to spend each day. Unlike buyers of most banner-type ads, these advertisers pay only when someone actually clicks on the ad, not each time it appears. AACSB: Information Technology Chapter LO: 6.5 Explain how organizations manage digital marketing for their website, their social media presence, and their mobile apps. Difficulty: Moderate 133) Explain how designing for mobile devices is different than for computers and other larger devices. Answer: The lively websites designed for desktop computers and larger screens fall short on tiny smartphones. But organizations need to offer a mobile-friendly experience, given the rapid growth of these devices and the new possibilities they offer. Mobile devices differ from desktop computers in many ways, but two important differences are screen size and the presence (or absence) of the keyboard and mouse. Mobile developers must make the best possible use of screen real estate and ensure that humans can manage choices easily with a single swipe or tap. They must decide what information mobile users might be interested in, display it with fonts large enough to read without zooming, and do so without requiring any scrolling. Any buttons or links should be large enough for clumsy thumbs. The design should be a slimmer, leaner version of the organization's main website so that users recognize the brand. AACSB: Information Technology Chapter LO: 6.4 Describe the importance of mobility and mobile apps, define m-commerce, and explain how mobile payments work. Difficulty: Moderate 39 ..


134) What is crowdsourcing? Explain, with an example, some of the drawbacks of crowdsourcing. Answer: The term "crowdsourcing" describes how tasks can be delegated to large diffuse groups or communities who often volunteer their contributions. Unlike outsourcing, in which an organization contracts with a vendor to do work, crowdsourcing depends on engaging people in tasks they find interesting or rewarding, financially or otherwise. Wikipedia is a well-known site that amasses collective intelligence and volunteer labor, in this case to create a vast online encyclopedia. Most articles earn high marks for accuracy, but concerns about bias emerge for articles dealing with controversial and contemporary topics. AACSB: Information Technology Chapter LO: 6.6 Explain how the digital environment is evolving, incorporating attributes such as crowdsourcing, the Internet of Things, artificial intelligence, and others. Difficulty: Moderate 135) Describe the function of Wikipedia and why it may be considered a controversial reference source. Answer: Wikipedia is a well-known site that amasses collective intelligence and volunteer labor to create a vast online encyclopedia. Most articles earn high marks for accuracy, but there are concerns about bias for articles dealing with controversial and contemporary topics. Citing Wikipedia entries in your term papers as part of the bibliography is controversial. Many universities and faculty object, due to concerns about bias, reliability, accuracy, and the lack of identified authors. If you do use Wikipedia, include your evaluation of its quality as a source for your topic, just as you would for other web-based sources with unknown authorship. AACSB: Information Technology Chapter LO: 6.6 Explain how the digital environment is evolving, incorporating attributes such as crowdsourcing, the Internet of Things, artificial intelligence, and others. Difficulty: Moderate

40 ..


Introduction to Information Systems, 5e (Wallace) Chapter 7 Business Intelligence and Analytics 1) Decisions made at the operational level involve long-term strategy and are undertaken by the leaders of the organization. Answer: FALSE AACSB: Information Technology Chapter LO: 7.1 Define business intelligence, and describe the three levels of decision making that it supports. Difficulty: Easy 2) At the operational level, decision makers need more aggregated information, sorted and tallied in different ways, to monitor success and plan next steps compared to those at the strategic level. Answer: FALSE AACSB: Information Technology Chapter LO: 7.1 Define business intelligence, and describe the three levels of decision making that it supports. Difficulty: Easy 3) Mid-level decisions undertaken by managers by drawing upon business intelligence to implement marketing plans and product development are made at the tactical level. Answer: TRUE AACSB: Information Technology Chapter LO: 7.1 Define business intelligence, and describe the three levels of decision making that it supports. Difficulty: Moderate 4) Strategic-level decisions involve direct interactions with customers and have predetermined policies and procedures that spell out how to handle different situations. Answer: FALSE AACSB: Information Technology Chapter LO: 7.1 Define business intelligence, and describe the three levels of decision making that it supports. Difficulty: Easy 5) Building data warehouses often slows down operational systems. Answer: FALSE AACSB: Information Technology Chapter LO: 7.2 Describe the major sources of business intelligence, and provide examples of their usefulness. Difficulty: Difficult

1 ..


6) Select data about a company's customers, employees, suppliers, and every financial transaction can be cleansed and loaded to a separate data warehouse, making it readily accessible for transactional needs. Answer: TRUE AACSB: Information Technology Chapter LO: 7.2 Describe the major sources of business intelligence, and provide examples of their usefulness. Difficulty: Difficult 7) External databases that are either purchased or publicly accessible are not considered reliable sources of business intelligence. Answer: FALSE AACSB: Information Technology Chapter LO: 7.2 Describe the major sources of business intelligence, and provide examples of their usefulness. Difficulty: Easy 8) Companies use intelligent agents to extract useful business intelligence from private, inaccessible websites. Answer: FALSE AACSB: Information Technology Chapter LO: 7.2 Describe the major sources of business intelligence, and provide examples of their usefulness. Difficulty: Easy 9) An online analytical processing system allows users to slice and dice massive amounts of data stored in data warehouses to reveal significant patterns and trends. Answer: TRUE AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 10) OLAP systems achieve their speed and slice-and-dice capabilities by building multidimensional data cubes. Answer: TRUE AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy

2 ..


11) A market basket analysis examines relationships to reveal customer behavior patterns as they purchase multiple items. Answer: TRUE AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 12) Text mining is a discovery process in which unstructured text information is the source of business intelligence. Answer: TRUE AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 13) Text mining, which monitors social media chatter, helps in managing customer relationships and spotting crises early. Answer: TRUE AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate 14) What-if analysis allows a user to set a target value for a particular metric and tells the program which variable to change to try to reach the goal. Answer: FALSE AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 15) What-if analysis is also known as goal seeking because of the similarities between these two tools. Answer: FALSE AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy

3 ..


16) Optimization is an extension of goal seeking in which a user can change many variables to reach some maximum or minimum target, as long as the changes stay within the constraints the user identifies. Answer: TRUE AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 17) Clickstream data refers to every click by every visitor on a website, along with associated data revealing customer behavior patterns. Answer: TRUE AACSB: Information Technology Chapter LO: 7.4 Explain how digital analytics are used as a source of business intelligence and why they are so valuable for understanding customers. Difficulty: Easy 18) Social media metrics are rarely seen as an effective measure of audience engagement. Answer: FALSE AACSB: Information Technology Chapter LO: 7.4 Explain how digital analytics are used as a source of business intelligence and why they are so valuable for understanding customers. Difficulty: Moderate 19) A dashboard is a gateway that provides access to a variety of relevant information from many different sources on one screen. Answer: FALSE AACSB: Information Technology Chapter LO: 7.5 Describe how dashboards and portals help visualize business intelligence, and explain the role that the human element plays in business intelligence initiatives. Difficulty: Easy 20) A Mashup is an approach to aggregating content from multiple internal and external sources on customizable web pages. Answer: TRUE AACSB: Information Technology Chapter LO: 7.5 Describe how dashboards and portals help visualize business intelligence, and explain the role that the human element plays in business intelligence initiatives. Difficulty: Easy

4 ..


21) Employees working primarily at the ________ decision level interact directly with customers and handle all the routine transactions where their decisions follow predetermined policies and procedures that spell out how to handle different situations. A) strategic B) tactical C) operational D) directional Answer: C AACSB: Information Technology Chapter LO: 7.1 Define business intelligence, and describe the three levels of decision making that it supports. Difficulty: Easy 22) Which of the following best describes an operational-level decision? A) decisions undertaken at the highest level by leaders of an organization B) mid-level decisions undertaken by managers C) programmed decisions that deal directly with customers D) decisions that impact the entire organization and beyond Answer: C AACSB: Information Technology Chapter LO: 7.1 Define business intelligence, and describe the three levels of decision making that it supports. Difficulty: Easy 23) Clara Thomas is an employee at the Citizens Trade Bank. What type of decisions will she undertake if her responsibilities include receiving customer queries, fixing appointments for sales representatives of the bank, and tracking potential clients through call records? A) operational decisions B) tactical decisions C) strategic decisions D) directional decisions Answer: A AACSB: Analytic Thinking Chapter LO: 7.1 Define business intelligence, and describe the three levels of decision making that it supports. Difficulty: Moderate

5 ..


24) Business intelligence is said to be used at the ________ if companies use it to bring meaningful, performance-related information to all employees. A) operational level B) directional level C) strategic level D) tactical level Answer: A AACSB: Information Technology Chapter LO: 7.1 Define business intelligence, and describe the three levels of decision making that it supports. Difficulty: Easy 25) Which of the following is a difference between operational-level and tactical-level decision making? A) Operational decisions are undertaken by managers, whereas tactical decisions are made by junior executives. B) Operational decisions impact the organization and its industry, whereas tactical decisions deal with routine transactions. C) Operational decisions mostly address issues like product development and marketing plans, whereas tactical decisions address issues such as investment and hiring policies. D) Operational decisions require detailed, structured information about actual transactions by customers, whereas tactical decisions need more aggregated information to monitor success and plan next steps. Answer: D AACSB: Information Technology Chapter LO: 7.1 Define business intelligence, and describe the three levels of decision making that it supports. Difficulty: Moderate 26) People at ________ levels in an organization draw on business intelligence to make decisions related to marketing plans, product development, and departmental budgets. A) operational B) tactical C) strategic D) top Answer: B AACSB: Information Technology Chapter LO: 7.1 Define business intelligence, and describe the three levels of decision making that it supports. Difficulty: Easy

6 ..


27) Which of the following best describes tactical-level decisions? A) decisions undertaken at the highest level by the leaders of an organization B) programmed decisions that involve routine transactions and deal directly with customers C) decisions that impact the entire organization and sometimes, even the industry D) mid-level decisions undertaken by managers on issues like product development and membership drives Answer: D AACSB: Information Technology Chapter LO: 7.1 Define business intelligence, and describe the three levels of decision making that it supports. Difficulty: Easy 28) Josh Lucas is a marketing manager at Grey Thompson, the largest advertising firm in Washington. What level of decision making would Josh be involved in if he undertakes decisions on promotional campaigns, guerilla marketing, and brand awareness? A) operational B) tactical C) strategic D) administrative Answer: B AACSB: Analytic Thinking Chapter LO: 7.1 Define business intelligence, and describe the three levels of decision making that it supports. Difficulty: Moderate 29) Which of the following is a characteristic of decisions made at an organization's strategic level? A) They involve predetermined policies and procedures that spell out how to handle different situations. B) They are mostly concerned with routine transactions directly involving customers. C) They make use of business intelligence to address issues such as product development and marketing plans. D) They have widespread effects which impact suppliers, customers, and the whole industry. Answer: D AACSB: Information Technology Chapter LO: 7.1 Define business intelligence, and describe the three levels of decision making that it supports. Difficulty: Easy

7 ..


30) ________ decisions affect the organization and beyond and are guided by the leadership of the organization toward a long-term strategy. A) Strategic B) Tactical C) Operational D) Specific Answer: A AACSB: Information Technology Chapter LO: 7.1 Define business intelligence, and describe the three levels of decision making that it supports. Difficulty: Easy 31) Which of the following is a difference between strategic-level and operational-level decision making? A) Strategic-level decisions involve regular interactions with customers, unlike operational-level decision making. B) Unlike operational-level decision making, strategic-level decision making mostly deals with routine transactions. C) Unlike operational-level decisions, strategic-level decisions follow predetermined policies and procedures and are programmed in nature. D) The business intelligence needed to make decisions is less structured at the strategic level than at the operational level. Answer: D AACSB: Information Technology Chapter LO: 7.1 Define business intelligence, and describe the three levels of decision making that it supports. Difficulty: Easy 32) Jane Adams is a director at Wilderness, a travel house in Manhattan. What type of decisions would she have to make if Wilderness decides to open a new branch of the company in Chicago? A) strategic-level decisions B) tactical-level decisions C) operational-level decisions D) mid-level decisions Answer: A AACSB: Analytic Thinking Chapter LO: 7.1 Define business intelligence, and describe the three levels of decision making that it supports. Difficulty: Moderate

8 ..


33) Intelligent agents that extract business intelligence from publicly accessible websites are also known as ________. A) mashups B) bots C) servers D) androids Answer: B AACSB: Information Technology Chapter LO: 7.2 Describe the major sources of business intelligence, and provide examples of their usefulness. Difficulty: Easy 34) Which of the following functions do intelligent agents undertake in business intelligence? A) extracting useful business information from publicly accessible websites B) tracking the performance of employees in an organization C) retrieving information from data warehouses whenever required and reducing information overload D) tracking fraudulent transactions conducted by the employees of an organization Answer: A AACSB: Information Technology Chapter LO: 7.2 Describe the major sources of business intelligence, and provide examples of their usefulness. Difficulty: Easy 35) Which of the following is a function of bots? A) They retrieve information from offline sources. B) They monitor the productivity of employees in an organization. C) They build teamwork and interpersonal skills of employees. D) They collect data from web pages on behalf of a user. Answer: D AACSB: Information Technology Chapter LO: 7.2 Describe the major sources of business intelligence, and provide examples of their usefulness. Difficulty: Easy 36) Which of the following functions does an intelligent agent perform? A) classifying and indexing web pages for search engines B) collecting and sorting a company's sales data C) tracking Internet usage patterns of a company's employees D) monitoring the Internet to screen out malicious software and viruses Answer: A AACSB: Information Technology Chapter LO: 7.2 Describe the major sources of business intelligence, and provide examples of their usefulness. Difficulty: Easy

9 ..


37) ________ are used by infomediaries to retrieve current product prices from different vendors. A) Neural nets B) Intelligent agents C) Expert systems D) Dashboards Answer: B AACSB: Information Technology Chapter LO: 7.2 Describe the major sources of business intelligence, and provide examples of their usefulness. Difficulty: Easy 38) iTicket, an online event-ticketing site, recently discovered that most of its good seats for a widely anticipated concert were preemptively booked in bulk by brokers. This resulted in a shortage of tickets that the public could have bought themselves. Which of the following would have best helped the brokers to book tickets in such large numbers? A) neural nets B) dashboards C) bots D) mashups Answer: C AACSB: Analytic Thinking Chapter LO: 7.2 Describe the major sources of business intelligence, and provide examples of their usefulness. Difficulty: Moderate 39) Which of the following functions do intelligent agents perform in the context of search engines? A) retrieving downloadable files from online sources B) screening out malicious codes and viruses C) distributing third-party cookies D) monitoring information overload Answer: A AACSB: Information Technology Chapter LO: 7.2 Describe the major sources of business intelligence, and provide examples of their usefulness. Difficulty: Easy

10 ..


40) Data mining approaches and statistical techniques used to predict future behavior, especially to unlock the value of business intelligence for strategy, are known as ________. A) optimization B) predictive analytics C) content management systems D) mashups Answer: B AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 41) Which of the following statements accurately defines the term predictive analytics? A) data mining approaches and statistical techniques used to predict future behavior, especially to unlock the value of business intelligence for strategy B) software programs or "bots" that are sent out to conduct a mission and collect data from web pages on behalf of a user C) a gateway that provides access to a variety of relevant information from many different sources on one screen D) a technique that analyzes features in order to predict people present in photos and tag them to other photos on its own Answer: A AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 42) Which of the following is a function of predictive analytics? A) to analyze people present in photos and tag them to other photos on its own B) to deal directly with customers and handle all routine transactions C) to unlock the value of business intelligence for strategy D) to follow predetermined policies and procedures Answer: C AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy

11 ..


43) Which of the following is an accurate definition of online analytical processing? A) creating and using offline data by multiple users B) mimicking the reasoning of a human expert to arrive at a decision C) retrieving, examining, and drilling data into specific groupings D) examining data from a single, consistent perspective Answer: C AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 44) Which of the following methods categorizes massive amounts of data stored in data warehouses to reveal significant patterns and trends in the data? A) online analytical processing B) what-if analysis C) multiprocessing D) goal-seeking analysis Answer: A AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 45) ________ systems allow users to interactively retrieve meaningful information from data, examining it from many different perspectives, and drilling it down into specific groupings. A) Forecasting B) Online analytical processing C) What-if analysis D) Goal-seeking Answer: B AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 46) Which of the following is a function of online analytical processing? A) mimicking the reasoning of a human expert to arrive at a decision B) organizing and summarizing information vital to an individual's role in an organization C) feeding vast amounts of information into data warehouses D) revealing significant patterns and trends from massive amounts of data Answer: D AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate

12 ..


47) Which among the following software tools is commonly used as the front end for data retrieval and analysis in most business intelligence tools? A) MS Outlook B) MS Excel C) MS Word D) MS PowerPoint Answer: B AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 48) James, who works in the marketing department of the Whistlewoods Hotel, has been given the responsibility of identifying patterns in the preferences of guests who have repeatedly visited the hotel in the past ten years. Which of the following would best help him categorize the massive amounts of data to reveal preferences of guests, such as type of suite, room service, etc.? A) online analytical processing B) goal-seeking analysis C) forecasting analysis D) what-if analysis Answer: A AACSB: Analytic Thinking Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate 49) Which of the following analyses is used by Amazon to show sections titled "Frequently Bought Together" in their product screens? A) risk analysis B) competitor analysis C) predictive analysis D) market basket analysis Answer: D AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy

13 ..


50) Danielle, searching online for a hair loss control shampoo, entered the HairCare website. She noticed that the HairCare web page for shampoos also showed conditioners, hair gels, and hair dryers in the "Customers Who Bought This Item Also Bought" section in its product screens. Which of the following techniques does HairCare use in order to cross-sell its products? A) market basket analysis B) predictive analysis C) what-if analysis D) goal-seeking analysis Answer: A AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 51) ________ is a statistical technique that reveals customer behavior patterns as they purchase multiple items. A) What-if analysis B) Competitor analysis C) Market basket analysis D) Goal-seeking analysis Answer: C AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 52) Which of the following is a function of market basket analysis? A) understanding behavior patterns of customers as they buy multiple items B) helping retailers group customers from a certain geographical area C) understanding strengths and weaknesses of competitors in the market D) improving quality of a product after analyzing a competitor's high-in-demand product Answer: A AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy

14 ..


53) Shirley Yearwood is an analyst at a retail outlet and is required to assess customer data to understand which items are more likely to be bought together. What analysis process will best help her to analyze purchasing habits of customers who bought gum boots along with umbrellas, ties along with shirts, and hair clips along with headbands among other related products? A) online analytical processing B) market basket analysis C) what-if analysis D) goal-seeking analysis Answer: B AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate 54) Which of the following is an accurate definition of text mining? A) a discovery process which derives low-quality data from text B) a discovery process in which unstructured text information is the source of business intelligence C) a discovery process in which users can change many variables to reach a maximum or minimum target D) a discovery process which relies heavily on sociograms, pie charts, and spin networks Answer: B AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 55) ________ is a discovery process which relies on semantic structures, linguistic relationships, and common phrases to extract meaningful information. A) Forecasting B) What-if analysis C) Text mining D) CAPTCHA Answer: C AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy

15 ..


56) Which of the following is a function of what-if analysis? A) establishing relationships between many variables and changing some of the variables to see how others are affected B) establishing relationships between different variables by keeping them constant C) collecting data from web pages on behalf of a user D) establishing a target value for a particular metric and telling the program which variable to change to try to reach the goal Answer: A AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 57) ________ is a simulation model, often constructed using Excel, which calculates the relationships between many variables; users can change some variables to see how others are affected. A) Goal-seeking analysis B) What-if analysis C) Market basket analysis D) Data aggregation Answer: B AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 58) Which of the following is a tool that supports decision making in organizations? A) goal-seeking analysis B) uniform resource locator C) AJAX D) bot Answer: A AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy

16 ..


59) Which of the following statements is true of goal-seeking analysis? A) It is a process of setting a target value for a particular variable and telling the program which variable to change to reach the goal. B) It is a process that analyzes historical and seasonal trends and then considers existing and predicted business conditions to estimate goals. C) It is a process that involves software tools that rely on keywords, semantic structures, linguistic relationships, and common phrases to extract meaningful information. D) It is a process that involves revealing customer behavior patterns by analyzing their purchase of multiple items. Answer: A AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 60) ________ is a decision support tool, often based on an Excel model, in which the user sets a target value for a particular variable, such as profit/ loss, and tells the program which variable to change to try to reach the objective. A) Goal-seeking analysis B) Goal harvesting C) Market basket analysis D) Data aggregation Answer: A AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 61) Which of the following is a distinctive feature of optimization? A) It enables a user to control the output of a process by changing only a single variable. B) It analyzes historical and seasonal trends to optimize productivity. C) It allows a user to change many variables to reach its maximum or minimum target. D) It allows a user to "slice and dice" or drill down massive amounts of data stored in data warehouses. Answer: C AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy

17 ..


62) ________ is an extension of goal-seeking analysis in which the user can change many variables to reach some maximum or minimum target, as long as the changes stay within the constraints the user identifies. A) What-if analysis B) Predictive analysis C) Forecasting D) Optimization Answer: D AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 63) ________ refers to analyzing historical and seasonal trends and then taking into account existing and predicted business conditions to estimate a particular variable of interest. A) Optimization B) What-if analysis C) Forecasting D) Goal-seeking analysis Answer: C AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 64) Which of the following is a function of forecasting? A) setting a target value and telling the program which variable to change to reach the goal B) using semantic structures and linguistic relationships to extract meaningful business intelligence C) calculating relationships between variables and allowing users to change some variables to see how others are impacted by it D) analyzing seasonal trends, using statistical decision support tools, to predict the future Answer: D AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy

18 ..


65) The analysts at Swirlees, a brand of ice cream, are asked to assess revenue generated over the past five years to observe seasonal and historical trends so that they can make a business estimate for the next year. After extensive analysis, they arrive at the conclusion that the sales were highest during the months of July and August, the summer months in the country, and an all-time low during January, the peak of winter. Which of the following tools would best help them in making an estimate for the upcoming year? A) goal-seeking analysis B) forecasting C) market basket analysis D) what-if analysis Answer: B AACSB: Analytic Thinking Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate 66) The term "artificial intelligence" describes the ________. A) capability of some machines to mimic human intelligence B) intellectual development synthetically induced in human infants C) ability of some humans to imitate machine-like actions D) level of pervasion of technologies in everyday human life Answer: A AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 67) ________ is a test created by software developers to thwart software bots that the visitor must pass before continuing to register or enter the site. A) HTML B) CAPTCHA C) OLAP D) SMTP Answer: B AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy

19 ..


68) Which of the following is an accurate definition of CAPTCHA? A) a tool that helps social bots mine user data B) a test that a visitor must pass before registering into a site C) a type of software that tracks user activity on the Internet D) a tool to assign internet addresses to various users Answer: B AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 69) Johanna wishes to enroll for TryMail's email service. Which of the following actions should TryMail ask Johanna to take in order to establish that she is not a software bot? A) enter a sequence of letters and numbers from an image B) provide her contact details and Social Security Number C) upload her photo and provide visible identification marks D) provide an alternative email address Answer: A AACSB: Analytic Thinking Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate 70) Which of the following demonstrates how CAPTCHA thwarts most software bots? A) The sequence of keystrokes required is too complicated for bots. B) The time required is more than most bot programming allows. C) The pictures and fonts are irregular and fuzzy, making them unreadable for bots. D) Humans have trouble reading the entry text. Answer: C AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate 71) Which of the following is a drawback of the growing power of artificial intelligence? A) It does not facilitate interaction with humans, and learning exchanges are not possible. B) Its contributions in areas of financial monitoring and customer behavior are inconsequential. C) Its techniques are used by scammers to gain access to sites. D) It does not operate with a built-in operating system but with automatic override options. Answer: C AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate

20 ..


72) Software applications that mimic the reasoning and decision making of human professionals, drawing from a base of knowledge about a particular subject area, are known as ________. A) neural networks B) emulator experts C) expert systems D) intelligent agents Answer: C AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 73) Which of the following statements is true of expert systems? A) They are built with OLAP as the foundational base. B) They mimic the reasoning of human professionals. C) They learn from training data selected by humans that contain cases defining the paths from input to output. D) They are widely used to detect patterns in data from massive data sets and report such patterns. Answer: B AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 74) Which of the following is a characteristic of neural networks? A) They imitate service robots on rescue missions. B) They imitate the reasoning of a robot in decision-making processes. C) They come to a decision by drawing from the knowledge base of the particular subject area. D) They mimic the way a human brain works. Answer: D AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 75) Which of the following is true of neural networks? A) They imitate service robots using neural networks. B) They aim to achieve higher productivity by imitating robots in domestic operations. C) They borrow a human's approach by using neural signals instead of digital ones. D) They work the same way as the human brain by reinforcing memory. Answer: D AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 21 ..


76) Which of the following holds true of neural networks? A) They borrow a human's approach by using neural signals instead of digital ones. B) They imitate service robots using neural networks. C) They borrow the brain's approach, using digital signals in place of neural ones. D) They aim to achieve higher productivity by imitating robots in domestic operations. Answer: C AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate 77) Which of the following is true about neural networks? A) They mimic the way a robot thinks. B) They are far simpler than the human brain. C) They borrow a human's approach by using neural signals instead of digital ones. D) Their success is inversely related to the number and quality of the cases they can learn from. Answer: B AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 78) Which of the following statements is true of clickstream data? A) It indicates clicks made by visitors who could not access the site. B) It indicates clicks made by every visitor in a site. C) It indicates the total number of links to a site shown in search engine results. D) It indicates the transfer of data from one website to another. Answer: B AACSB: Information Technology Chapter LO: 7.4 Explain how digital analytics are used as a source of business intelligence and why they are so valuable for understanding customers. Difficulty: Easy 79) The term ________ refers to data associated with revealing customer behavior patterns, such as time spent on the page, the URL the visitor just left, and the visitor's IP address. A) packet data B) Internet traffic C) keystroke log D) clickstream data Answer: D AACSB: Information Technology Chapter LO: 7.4 Explain how digital analytics are used as a source of business intelligence and why they are so valuable for understanding customers. Difficulty: Easy

22 ..


80) Escapade Holidays is a travel house in New Jersey that recently created a website to attract travel clientele for the company. It is vital that the company can track time spent on each page by visitors, which helps Escapade understand the destinations and offers that customers seek. Which of the following will best help the company understand customer behavior patterns as well as reveal the URLs left by visitors? A) real-time data B) keystroke logging C) clickstream data D) mangled packets Answer: C AACSB: Analytic Thinking Chapter LO: 7.4 Explain how digital analytics are used as a source of business intelligence and why they are so valuable for understanding customers. Difficulty: Moderate 81) Which of the following is an accurate definition of the web metric "unique visitors"? A) the number of first-time visitors to a site B) the number of repeat visitors to a site C) the number of visitors who could not access a site D) the expected number of visitors during a day Answer: A AACSB: Information Technology Chapter LO: 7.4 Explain how digital analytics are used as a source of business intelligence and why they are so valuable for understanding customers. Difficulty: Easy 82) In web metrics, which of the following best describes depth of visit? A) the forecasted number of page visits estimated around peak hours B) the number of page views at a competitor's website C) the comparison between page visits made in the past and current year D) the number of page views per visit Answer: D AACSB: Information Technology Chapter LO: 7.4 Explain how digital analytics are used as a source of business intelligence and why they are so valuable for understanding customers. Difficulty: Easy

23 ..


83) ________ is a web metric that refers to the percentage of visits in which the user left the site from the same page he or she entered it. A) Churn rate B) Attrition rate C) Bounce rate D) Attach rate Answer: C AACSB: Information Technology Chapter LO: 7.4 Explain how digital analytics are used as a source of business intelligence and why they are so valuable for understanding customers. Difficulty: Easy 84) What does bounce rate mean in the context of web metrics? A) percentage of visits in which a user stays on the homepage for longer than sixty seconds B) percentage of visits in which a user moves from a website's homepage to its subpage C) percentage of visits in which the user leaves the site from the same page he or she entered it D) percentage of visits in which a user moves from a website's subpage to its homepage Answer: C AACSB: Information Technology Chapter LO: 7.4 Explain how digital analytics are used as a source of business intelligence and why they are so valuable for understanding customers. Difficulty: Easy 85) Which of the following is an accurate definition of a top landing page? A) the number of links on a web page that directs a user into a related website B) the number of entrances to a site for each page C) the number of relevant results thrown up by a search engine D) the number of pages that sponsor ads Answer: B AACSB: Information Technology Chapter LO: 7.4 Explain how digital analytics are used as a source of business intelligence and why they are so valuable for understanding customers. Difficulty: Easy 86) Which of the following is an accurate definition of conversion rate? A) the ratio of visitors who complete some activity divided by the total number of visitors B) the ratio of clicks on an ad divided by the number of times the ad was delivered C) the ratio of people who have not revisited the site for over 30 days divided by the number of total visitors D) the ratio of clicks by advertisers divided by total number of visitors Answer: A AACSB: Information Technology Chapter LO: 7.4 Explain how digital analytics are used as a source of business intelligence and why they are so valuable for understanding customers. Difficulty: Easy

24 ..


87) The ratio of visitors who buy a product from a website divided by the total number of visitors can be referred to as the ________. A) churn rate B) conversion rate C) clickthrough rate D) attach rate Answer: B AACSB: Information Technology Chapter LO: 7.4 Explain how digital analytics are used as a source of business intelligence and why they are so valuable for understanding customers. Difficulty: Easy 88) In e-commerce metrics, ________ refers to the amount an advertiser pays each time a visitor clicks on the ad to navigate to the advertiser's site. A) cost per impression B) cost per clickthrough C) cost per conversion D) cost per acquisition Answer: B AACSB: Information Technology Chapter LO: 7.4 Explain how digital analytics are used as a source of business intelligence and why they are so valuable for understanding customers. Difficulty: Easy 89) ________ refers to business intelligence data that includes every click by every visitor on a website along with associated data such as time spent on the page and the visitor's IP address. A) Web content-related metrics B) Website metrics C) Social media metrics D) Clickstream data Answer: D AACSB: Information Technology Chapter LO: 7.4 Explain how digital analytics are used as a source of business intelligence and why they are so valuable for understanding customers. Difficulty: Easy 90) Which of the following do mobile metrics measure? A) the number of people who download and install the app and how often they use the app B) how relevant the app's content is C) how many other apps the user considered D) what other apps the user has on their device Answer: A AACSB: Information Technology Chapter LO: 7.4 Explain how digital analytics are used as a source of business intelligence and why they are so valuable for understanding customers. Difficulty: Easy 25 ..


91) Which of the following best describes the conversion rate metric? A) the position in which a sponsored link appears on a page in keyword advertising on search engines B) the ratio of clicks on an ad divided by the number of times the ad was delivered C) the cost the advertiser pays each time the ad loads onto a user's screen from any site on which it appears D) the ratio of visitors who complete some activity (such as buying a product) divided by the total number of visitors Answer: D AACSB: Information Technology Chapter LO: 7.4 Explain how digital analytics are used as a source of business intelligence and why they are so valuable for understanding customers. Difficulty: Easy 92) ________ refers to the cost the advertiser pays each time the ad loads onto a user's screen from any site on which it appears. A) Cost per clickthrough B) Cost per impression C) Clickthrough rate D) Banner advertising Answer: B AACSB: Information Technology Chapter LO: 7.4 Explain how digital analytics are used as a source of business intelligence and why they are so valuable for understanding customers. Difficulty: Easy 93) Just Cazuals, a brand of streetwear in California, recently developed an app for their changing fashion lines. The firm is especially interested in whether users who are using the app tend to be local to their brick and mortar stores. This is an example of the mobile metric called ________. A) user paths B) position on page C) geographic distribution D) conversion rate Answer: C AACSB: Analytic Thinking Chapter LO: 7.4 Explain how digital analytics are used as a source of business intelligence and why they are so valuable for understanding customers. Difficulty: Moderate

26 ..


94) A ________ is a graphical user interface that organizes and summarizes information vital to the user's role and the decisions that user makes. A) mashup B) tool bar C) dashboard D) portal Answer: C AACSB: Information Technology Chapter LO: 7.5 Describe how dashboards and portals help visualize business intelligence, and explain the role that the human element plays in business intelligence initiatives. Difficulty: Easy 95) Which of the following best describes an IT dashboard? A) an interface which monitors every click by visitors entering a site B) an interface which distinguishes and separates the key performance indicators C) a textual user interface that aggregates content from multiple sources on customizable web pages D) a graphical user interface that organizes information vital to a user's role and decisions that user makes Answer: D AACSB: Information Technology Chapter LO: 7.5 Describe how dashboards and portals help visualize business intelligence, and explain the role that the human element plays in business intelligence initiatives. Difficulty: Easy 96) Which of the following best describes the term key performance indicator? A) quantifiable metrics most important to an individual's role and an organization's success B) qualitative metrics to measure growth indicators of a country C) abstract qualitative metrics to measure an individual's role and an organization's success D) abstract qualitative metrics to measure and compare the success of industries Answer: A AACSB: Information Technology Chapter LO: 7.5 Describe how dashboards and portals help visualize business intelligence, and explain the role that the human element plays in business intelligence initiatives. Difficulty: Easy 97) The term ________ refers to quantifiable metrics used to evaluate an organization or an individual's success in a particular activity. A) dashboards B) key performance indicators C) mashups D) portal Answer: B AACSB: Information Technology Chapter LO: 7.5 Describe how dashboards and portals help visualize business intelligence, and explain the role that the human element plays in business intelligence initiatives. Difficulty: Easy 27 ..


98) Which of the following steps should be undertaken while designing a dashboard? A) using seven or fewer graphs, charts, maps, or tables on one dashboard B) avoiding the use of visual displays that combine real images with data C) using 3D animations and as many other animations as possible to make them interactive D) including intricate graphical tools such as pie charts for all available data Answer: A AACSB: Information Technology Chapter LO: 7.5 Describe how dashboards and portals help visualize business intelligence, and explain the role that the human element plays in business intelligence initiatives. Difficulty: Easy 99) The term ________ refers to gateways that provide access to a variety of relevant information from many different sources on one screen. A) dashboard B) portal C) mashup D) data cube Answer: B AACSB: Information Technology Chapter LO: 7.5 Describe how dashboards and portals help visualize business intelligence, and explain the role that the human element plays in business intelligence initiatives. Difficulty: Easy 100) Which of the following statements is true of portals? A) They are gateways that provide access to a variety of relevant information from many different sources on one screen. B) They are quantifiable metrics that measure an individual's contribution to his organization's success. C) They mimic the reasoning of a human expert, drawing from a base of knowledge about a particular subject area to come to a decision or recommendation. D) They are graphical user interfaces that organize and summarize information vital to a user's role and the decisions that user makes. Answer: A AACSB: Information Technology Chapter LO: 7.5 Describe how dashboards and portals help visualize business intelligence, and explain the role that the human element plays in business intelligence initiatives. Difficulty: Easy

28 ..


101) ________ refer to each portion of content or functionality that a user can customize and add to the display. A) Mashups B) Dashboards C) Portlets D) Pixels Answer: C AACSB: Information Technology Chapter LO: 7.5 Describe how dashboards and portals help visualize business intelligence, and explain the role that the human element plays in business intelligence initiatives. Difficulty: Easy 102) Sam Reid is a web designer at a publishing firm in Minnesota. He wants to use a process to aggregate a wide array of information like book reviews, customer feedback, awards won, and company details on the firm's public website. Which of the following should he use in order to bring together all this information from multiple internal and external sources onto the firm's customizable web pages? A) mashup B) portal C) dashboard D) pixel Answer: A AACSB: Analytic Thinking Chapter LO: 7.5 Describe how dashboards and portals help visualize business intelligence, and explain the role that the human element plays in business intelligence initiatives. Difficulty: Moderate 103) Which of the following is an accurate definition of a mashup? A) a software tool that allows users to feed information into a system using different view modes B) a measurement of how long visitors linger at a website C) an approach to aggregating content from multiple sources on customizable web pages D) a type of software that tracks user activity over the Internet Answer: C AACSB: Information Technology Chapter LO: 7.5 Describe how dashboards and portals help visualize business intelligence, and explain the role that the human element plays in business intelligence initiatives. Difficulty: Easy

29 ..


104) The term ________ refers to an approach to aggregating content from internal and external sources on customizable web pages that relies on Web 2.0 technologies. A) mashup B) neural network C) expert system D) portal Answer: A AACSB: Information Technology Chapter LO: 7.5 Describe how dashboards and portals help visualize business intelligence, and explain the role that the human element plays in business intelligence initiatives. Difficulty: Easy 105) A standardized and regularly updated output from a publisher that can be embedded in a customized mashup is known as a ________. A) dashboard B) pixel C) web feed D) portlet Answer: C AACSB: Information Technology Chapter LO: 7.5 Describe how dashboards and portals help visualize business intelligence, and explain the role that the human element plays in business intelligence initiatives. Difficulty: Easy 106) The OECD AI Principles cover issues such as human rights, accountability, cooperation, and the need for trust and transparency. The organization provides guidance that steers research and practice toward significantly more use of AI in policing countries, limiting the spread of cryptocurrencies, and controlling of economic factors of global trade. Answer: FALSE Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 107) Negative outcomes that could indicate bias in Artificial Intelligence in the US court systems include ________. A) bail recommendation software fares no better than people chosen at random to judge risk based on just a few pieces of data B) programing rules that the software uses to determine a risk score are proprietary, and judges may not fully understand them C) both A and B D) neither A nor B Answer: C Chapter LO: 7.2 Describe the major sources of business intelligence, and provide examples of their usefulness. Difficulty: Easy

30 ..


108) Software that attempts to recognize faces in moving images must learn and adapt as the person moves or the lighting changes is an example of ________. A) intelligent agents B) data mining C) optimization D) computer vision Answer: D Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate 109) Netflix experienced the pitfalls of AI through ________. A) complaints surfaced that Netflix might be targeting viewers by race because actors with only bit parts appeared in thumbnails for subscribers that matched their race B) finding the most engaging thumbnail images contain one to three people and often include a polarizing villain with expressive facial emotion C) relying just on each subscriber's viewing history on the streaming service D) none of the above Answer: A Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate 110) Examples of applications of computer vision include ________. A) self-driving capabilities in cars B) agricultural oversight to assess crop growth and disease outbreaks C) sports analytics D) all of the above Answer: D Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Easy 111) Which of the below is an example of Amazon's collaborative filtering artificial intelligence? A) users can list items they might want to buy to Alexa, and those items appear later on the app so that adjustments can be made B) attempting to predict what the shopper might want to buy by examining the shopping carts of similar customers C) a customer who just purchased a twin bedframe might see recommendations for twin bed sheets or mattresses D) all of the above Answer: C Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate

31 ..


112) Item to item collaborative filtering focuses on ________. A) predicting what the shopper might want to buy by examining the behavior of similar customers B) correlations between actual products C) other customers who made a similar purchase who purchased something else D) none of the above Answer: B Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate 113) Examples of fraud that detection systems can spot through AI include ________. A) sales tax fraud for vehicles purchased across state lines B) medical overcharges and fraudulent billing C) when a person enrolls in Medicaid in more than one state D) all of the above Answer: D Chapter LO: 7.4 Explain how digital analytics are used as a source of business intelligence and why they are so valuable for understanding customers. Difficulty: Easy 114) Privacy is a key concern with AI due to ________. A) concerns over the growing access to big data across government agencies B) disclosures about the extent of the government's electronic data gathering for national security C) analytics become more sophisticated, and ways are found to integrate the data to paint a meaningful and comprehensive picture of each person's financial transactions D) all of the above Answer: D Chapter LO: 7.4 Explain how digital analytics are used as a source of business intelligence and why they are so valuable for understanding customers. Difficulty: Easy

32 ..


115) What are the three key types of decision-making levels? Answer: Business intelligence supports three different types of decision-making levels. These are primarily decisions made at the operational level, tactical level, and strategic level. Operational-level decisions involve routine transactions and direct interaction with customers. These decisions may involve unprogrammed decision making but generally consist of programmed decisions. On the other hand, tactical-level decisions draw upon business intelligence to make mid-level decisions, the kind that may guide individual business units. Decisions about marketing plans, product development, membership drives, departmental budgets, and other initiatives are generally tactical. A management information system (MIS) supports this kind of decision making, combining data, software, and reporting tools that managers need to carry out their responsibilities. Decisions made at the strategic level have widespread effects throughout the organization and beyond, to suppliers, customers, and even the whole industry. Each decision could commit huge amounts of capital and people to major initiatives. AACSB: Information Technology Chapter LO: 7.1 Define business intelligence, and describe the three levels of decision making that it supports. Difficulty: Difficult 116) What are the major differences between the key levels of decision making? Answer: Operational-level decision making requires detailed, structured information about actual transactions by customers, so staff can follow up and track each transaction. However, at the tactical level, decision makers need more aggregated information to see trends and summaries, sorted and tallied in different ways, to monitor success and plan next steps. The business intelligence that executives need to make better decisions is often less structured in strategic levels than at the operational or even management level. Top-level executives certainly need summary and historical data from the company's own transactional systems and data warehouses. But they also need business intelligence that draws on big data, to learn more about their rivals, their industry's landscape, and overall economic trends. AACSB: Information Technology Chapter LO: 7.1 Define business intelligence, and describe the three levels of decision making that it supports. Difficulty: Moderate 117) What are the different functions performed by bots or intelligent agents? Answer: Companies use intelligent agents, also known as bots, to extract useful business intelligence from publicly accessible websites. These intelligent agents are sent out to conduct a mission and collect data from web pages on behalf of a user. With the help of the robot-building software, the operator can design an agent to interact with any number of websites, recording all the steps a human performs. Intelligent agents are useful for many tasks and are growing smarter and more capable each year. Search engines use them to classify and index web pages, and infomediaries deploy them to retrieve current product prices from different vendors. AACSB: Information Technology Chapter LO: 7.2 Describe the major sources of business intelligence, and provide examples of their usefulness. Difficulty: Moderate 33 ..


118) What is an online analytical processing system and how does it work? Answer: Online analytical processing (OLAP) systems allow users to interactively retrieve meaningful information from data, examining it from many different perspectives and drilling down into specific groupings. The software allows users to "slice and dice" massive amounts of data stored in data warehouses to reveal significant patterns and trends. Managers might check sales transactions by time of day and customer age group and find relationships that can guide marketing campaigns. OLAP systems achieve their speed and their slice-and-dice capabilities by building multidimensional cubes. These are data structures that contain detailed data and aggregated values for the dimensions, metrics, and hierarchies the users need. AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate 119) What are the different processes used to analyze patterns, trends, and relationships in data mining? Answer: The different types of processes used to analyze patterns, trends, and relationships are the market basket analysis, text mining, what-if analysis, goal-seeking analysis, optimization, and forecasting. The market basket analysis looks for relationships to reveal customer behavior patterns as they purchase multiple items. Text mining, on the other hand, is a variation of data mining and refers to a discovery process in which unstructured text information is the source of business intelligence, rather than structured data. A what-if analysis builds a model that establishes relationships between many variables and then changes some of the variables to see how others are affected. Goal-seeking analysis is similar to what-if analysis, but in reverse. It is a process which allows the user to set a target value for a particular metric and tell the program which variable to change to try to reach the goal. Optimization is an extension of goal seeking in which the user can change many variables to reach some maximum or minimum target, as long as the changes stay within the constraints the user identifies. Forecasting tools analyze historical and seasonal trends and then take into account existing and predicted business conditions to estimate some variable of interest, such as customer demand or projected revenue. AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate 120) What is text mining and how does it work? Answer: Text mining, a variation of data mining, is a discovery process in which unstructured text information is the source of business intelligence, rather than structured data. Text mining software tools rely on keywords, semantic structures, linguistic relationships, parts of speech, common phrases, emotion-laden words, and even misspellings to extract meaningful information. Companies are even more motivated to "actively listen" to web and social media chatter with text analytics because any anonymous complaint can spread so fast. These analyses can also help identify fake product reviews. AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate 34 ..


121) How is goal-seeking analysis different from what-if analysis and how do they function? Answer: A what-if analysis builds a model that establishes relationships between many variables and then changes some of the variables to see how others are affected. Goal seeking is similar to what-if analysis, but in reverse. Instead of estimating several variables and calculating the result, the user sets a target value for a particular metric, such as profit/loss, and tells the program which variable to change to try to reach the goal. AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate 122) What is optimization in the context of decision support systems and how does it function? Answer: Optimization is an extension of goal seeking and refers to a process where the user can change many variables to reach some maximum or minimum target, as long as the changes stay within the constraints the user identifies. Optimization is used in decision support in many settings in which the best solution must meet many constraints that are difficult to juggle. Airlines, for instance, try to optimize profit per flight, taking into account constraints such as fuel costs, ticket discounts, gate availability, airport congestion, and connections. The list grows ever longer and complex as the decision support tools try to balance many competing variables. AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate 123) What is forecasting and how does it work? Answer: Forecasting tools usually analyze historical and seasonal trends and then consider existing and predicted business conditions to estimate some variable of interest, such as customer demand or projected revenue. Forecasting tomorrow's demand, next month's sales, or next year's stock price relies especially on statistical decision support tools. For example, forecasting will depict the historical relationship between weekly snowfall and sales revenue from ski lift tickets. AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate 124) What is artificial intelligence and how is it an integral part of the decision support system? Answer: Artificial intelligence (AI) describes the capability of some machines that can mimic human intelligence, displaying characteristics such as learning, reasoning, judging, and drawing conclusions from incomplete information. For business, AI makes valuable contributions in areas such as financial monitoring, scheduling, diagnosing problems, and analyzing customer behavior. AI is enormously helpful in fast-moving emergency situations when the volume of incoming data could overwhelm human decision makers. AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate 35 ..


125) Discuss how expert systems function and the challenges faced by developers in building it. Answer: An expert system mimics the reasoning of a human expert, drawing from a base of knowledge about a particular subject area to come to a decision or recommendation. To build an expert system, developers work with experienced and specialized professionals as they provide answers to questions and explain their reasoning processes. The output is fine-tuned continually as the experts contribute more knowledge to the base, refine the rules, and add additional questions. The process is challenging, often because experts don't quite know exactly how they reach their conclusions. Formally identifying the actual steps is harder than it appears, but the results can be quite dramatic and enormously useful for decision support. AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate 126) Discuss the purpose of neural networks and their functions. Answer: Neural networks attempt to mimic the way the human brain works, with its vast network of interconnections. Each neuron constantly summarizes the input it receives, and the results determine its outgoing transmissions. When repeated input causes signals to travel the same pathway again and again, the connections grow stronger and the pathway becomes more permanent and easier to activate. Neural networks are widely used where massive data sets are available, such as in the finance industry where detecting fraud is an important application. Analyzing each card transaction in real-time, neural networks compare the specific purchase to the cardholder's regular spending habits and to fraudulent spending patterns. AACSB: Information Technology Chapter LO: 7.3 Explain several approaches to business intelligence and analytics used to analyze patterns, trends, and relationships to support data-driven decisions. Difficulty: Moderate 127) Describe clickstream data and its importance. Answer: Clickstream data includes every single click by every visitor along with associated data revealing customer behavior patterns, such as time spent on the page, the URL the visitor just left, and the visitor's IP address. With potentially millions of clicks per day, clickstream data adds up quickly. The variety of metrics that can be mined from this source is quite large. These web metrics come from server logs, and each entry contains detailed information about the date and time, the page, the source, and any clicks on the page itself. The logs also contain information about each user, including his or her IP address and browser. If the site uses cookies, it can collect more information about each user. AACSB: Information Technology Chapter LO: 7.4 Explain how digital analytics are used as a source of business intelligence and why they are so valuable for understanding customers. Difficulty: Moderate

36 ..


128) What are the six key design tips recommended for designing a dashboard? Answer: Choosing key performance indicators that are most important to the organization and the person using the dashboard is the most important success factor. Dashboards make data look good, but the charts and graphs are only as useful as the quality of the underlying data. Users should ask for warnings when data is stale or not altogether reliable. The dashboard should be updated as often as needed for the user's situation-daily, hourly, or minute by minute, if necessary. In order to avoid information overload, seven or fewer graphs, charts, maps, or tables should be used on one dashboard. Another key in designing a dashboard is to keep tables and charts simple, as well as to avoid 3D and unnecessary animations. When relevant, actual maps, seating plans, campus layouts, or other visual displays that combine real images with data should be populated. AACSB: Information Technology Chapter LO: 7.5 Describe how dashboards and portals help visualize business intelligence, and explain the role that the human element plays in business intelligence initiatives. Difficulty: Moderate 129) Discuss how dashboards, portals, and mashups support the decision-making process. Answer: The IT dashboard is a graphical user interface that organizes and summarizes information vital to the user's role and the decisions that the user makes. Portals are gateways that provide access to a variety of relevant information from many different sources on one screen. They are content aggregators, making it easier for users to view and drill down into company dashboards, weather announcements, news, traffic reports, stock reports, to-do lists, email, and discussion groups. A more flexible approach to aggregating content from multiple internal and external sources on customizable web pages is the mashup. This approach relies on Web 2.0 technologies and programming standards such as XML to blend content and updated feeds from various inside and outside sources in flexible ways. AACSB: Information Technology Chapter LO: 7.5 Describe how dashboards and portals help visualize business intelligence, and explain the role that the human element plays in business intelligence initiatives. Difficulty: Moderate

37 ..


Introduction to Information Systems, 5e (Wallace) Chapter 8 Collaborating with Technology 1) When IMAP is used, incoming mail is maintained and organized on a server. Answer: TRUE AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 2) IMAP is useful only for users who use a single device to access their mail. Answer: FALSE AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 3) The hCard is a microformat which is used to exchange business card information electronically. Answer: TRUE AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 4) Discussion forums are moderated for the purpose of nurturing discussions and blocking users who violate the rules. Answer: TRUE AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 5) Instant messaging is an open system in which anyone can send messages to anyone else regardless of which IM software they both are using. Answer: FALSE AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy

1 ..


6) Text messages allow cell phone users to immediately connect with one another via brief text messages to individuals or groups as well as transmission of photos and videos. Answer: TRUE AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 7) Group decision support systems were designed to get rid of anonymity. Answer: FALSE AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 8) Lower-end interactive video chat systems create a greater sense of telepresence than higherend ones. Answer: FALSE AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 9) A drawback of the centralized document library in a shared workspace is that it creates confusion and duplication when team members send revised versions back and forth over email. Answer: FALSE AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 10) Blogs help organizations market their products and create an intimate connection with suppliers and customers. Answer: TRUE AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Easy 11) Web logs, or "blogs," are used to facilitate collaboration and knowledge sharing. Answer: TRUE AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Easy

2 ..


12) Wiki software requires users to know HTML in order to add or edit web pages. Answer: FALSE AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Easy 13) A microblog is an example of photo software with which large photos can be reduced in size without blurring their resolution. Answer: FALSE AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Easy 14) The virtual world is a graphical, often 3D environment in which users can immerse themselves, interacting with virtual objects and with one another using avatars. Answer: TRUE AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Easy 15) The simple interfaces used in virtual worlds enable quick customer visits. Answer: FALSE AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Easy 16) The primary function of a context indicator is to display the exact geographical location of a user to his or her contacts through the GPS navigation system. Answer: FALSE AACSB: Information Technology Chapter LO: 8.3 Explain how unified communications contribute to collaboration. Difficulty: Moderate 17) Media richness measures how well a communication medium can generate revenues. Answer: FALSE AACSB: Information Technology Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Easy 18) Media richness is usually starkly lower online than during face-to-face. Answer: TRUE AACSB: Information Technology Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Easy

3 ..


19) Disinhibition is extremely high in relatively anonymous text-based online environments. Answer: TRUE AACSB: Information Technology Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Easy 20) The online world tends to flatten out hierarchies and equalize status. Answer: TRUE AACSB: Information Technology Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Easy 21) Which of the following is true of SMTP? A) It is a protocol for storing incoming mail. B) It is used for handling outgoing mail. C) It uses microformats to store metadata. D) It is used for exchanging contact management data. Answer: B AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 22) Which of the following is the function of an SMTP server? A) It handles and sends outgoing email. B) It translates metadata into microformats. C) It manages address books and business cards. D) It stores incoming mail received by users. Answer: A AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 23) Which of the following mail protocols is commonly used to handle outgoing mail from users? A) simple mail transfer protocol B) Internet message access protocol C) post office protocol D) quick mail queuing protocol Answer: A AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy

4 ..


24) Which of the following is true of IMAP? A) It is an outdated protocol for organizing outgoing mail. B) It allows access to mail only from a single device, thus ensuring privacy. C) It requires installation of client software and cannot work on web browsers. D) It maintains mail on a server instead of on a single machine. Answer: D AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 25) How does IMAP differ from SMTP? A) IMAP handles incoming messages while SMTP handles outgoing messages. B) IMAP handles outgoing messages while SMTP handles incoming messages. C) IMAP handles both incoming and outgoing messages while SMTP manages contacts. D) SMTP handles both incoming and outgoing messages while IMAP manages contacts. Answer: A AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 26) Which of the following is an advantage of IMAP? A) Mail can be accessed from several systems. B) Mail can be accessed only from a single system, ensuring information safety. C) Mail can be accessed only using installed client software and not from any browser. D) Mail is not saved on the server, which ensures privacy. Answer: A AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 27) An SMTP server is a server that handles outgoing email, where SMTP stands for ________. A) short mail transfer protocol B) simple mail transfer protocol C) social media transfer protocol D) short message transfer protocol Answer: B AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy

5 ..


28) Which of the following is considered the primary benefit of a war room? A) Team members have large digital displays. B) Team members share physical space to facilitate collaboration. C) Team members have many tools at their disposal. D) Team members collaborate online. Answer: B AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 29) Which of the following is a microformat used to exchange contact management data electronically? A) .ics B) iCalendar C) .exe D) hCard Answer: D AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 30) What is a hCard? A) a microformat used to exchange business card information electronically B) a microformat for purchasing products online through debit or credit cards C) a software tool that encrypts sensitive business information D) a microformat that helps make online money transfers using debit or credit cards Answer: A AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 31) Which of the following is true of a hCard? A) It must be scanned and saved in a contact management system before use. B) It requires the use of optical character recognition software for accessing business card details. C) It is used to exchange business card information electronically. D) It relies on the XML family of standards to represent metadata. Answer: C AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy

6 ..


32) The term ________ refers to a set of formats that rely on the XML family of standards to represent metadata in HTML code. A) hashtag B) microformat C) mashup D) HTML format Answer: B AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 33) Which of the following is true of microformats? A) They can store all types of data, except metadata. B) They cannot be emailed or exchanged over Bluetooth. C) They can be exchanged over wired networks, but not wireless. D) They rely on XML standards to represent metadata in HTML. Answer: D AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 34) What is the function of microformats like the hCard? A) the electronic exchange of business card information B) the creation of multimedia files and cards C) the storage and retrieval of incoming emails D) the maintenance of a database of a user's web history and business card details Answer: A AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 35) Microformats represent metadata in ________. A) HTML B) IMAP C) SMTP D) HTTP Answer: A AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy

7 ..


36) The .ics extension indicates that a plain text file contains ________ code. A) HTTP B) SMTP C) iCalendar D) hashtag Answer: C AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 37) Which of the following is true of iCalendars? A) They analyze the success rate of events. B) They flag events that stretch over months or years. C) They create advertising tools for events. D) They help budget and maintain the costs of large-scale events. Answer: B AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 38) Which of the following is true of asynchronous discussion forums? A) They help users to communicate via interactive video chat. B) They do not allow users to post anonymously, thus enhancing safety for users. C) They are never moderated, thus enabling users to post freely. D) They allow users to post text messages and reply to others at any time. Answer: D AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 39) Which of the following types of websites allows users to undertake many of the same activities as bulletin boards? A) discussion forums B) iCalendars C) blogs D) instant messaging Answer: A AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy

8 ..


40) Which of the following is an advantage of asynchronous discussion forums? A) They are not moderated and hence allow users to speak freely. B) They do not allow "lurkers" to participate in the activities of the forum. C) They do not allow users to use pseudonyms and require real-world contact details. D) They allow users to reply to topics at any time. Answer: D AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 41) BTC, a consulting company with offices across the United States, began an employee discussion forum on its website. A few employees began criticizing the company on the forum and undermining its morale. BTC does not want to limit employee interaction, but at the same time, it would like to limit what employees can write. Which of the following features of a discussion forum will help them achieve this? A) anonymity B) telepresence C) version control D) moderators Answer: D AACSB: Information Technology; Analytical Thinking Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Moderate 42) Athena Jolene, a human resources executive at Thomas Griffith, wants to collect ideas from the company's employees for an upcoming company-wide event. The company has offices spread across the country. Which of the following techniques will best help Athena receive suggestions from employees, while also allowing employees to share their ideas with one another? A) instant messaging B) discussion forums C) texting D) emailing Answer: B AACSB: Information Technology; Analytical Thinking Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Difficult

9 ..


43) ________, also known as "chat," consists of real-time text-based interactions over a network. A) Microblogging B) Emailing C) Instant messaging D) Blogging Answer: C AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 44) Which of the following is an example of a free IM software client? A) Skype B) Excel C) WordPress D) Linux Answer: A AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 45) Which of the following is a difference between IM and email? A) Unlike emailing, IM allows people to send messages to anyone regardless of the IM software being used. B) The switching costs for emails are much higher than those for IM. C) Email providers allow more interoperability than IM providers. D) Each email product uses different protocols, while all IM products operate using a single protocol. Answer: C AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 46) Which of the following is true of instant messaging? A) It helps users add and edit interlinked web pages. B) It allows people to use simple text editing tools to create knowledge databases. C) It allows greater telepresence than discussion forums and video conferences. D) It allows users to display their current status to their contacts. Answer: D AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy

10 ..


47) What is the purpose of the "presence awareness" feature on instant messaging software? A) It allows users to upload photos and videos that help them increase their online presence. B) It allows users to display their current status to their contacts, colleagues, or buddy list. C) It allows users to search for common friends by browsing their buddy lists. D) It allows users to view the real-world contact details of everyone on their buddy lists. Answer: B AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 48) The ________ feature introduced by instant messaging shows whether a person is logged in and available to answer a question, pick up the phone, or stop by for a brief meeting. A) presence awareness B) telepresence C) media richness D) telecommute Answer: A AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Moderate 49) Which of the following functions is performed by texting? A) synchronous collaboration among users B) telepresence between users C) transfer of photos and videos D) creation and maintenance of databases Answer: C AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 50) What advantage does instant messaging have over phone and conference calls? A) It is more informal and saves time by reducing social courtesies during interactions. B) It offers users a greater sense of telepresence than phones or conference calls do. C) It is more personal than phone calls and conference calls and offers greater media richness. D) It is a collaborative technology that allows several people to participate at the same time. Answer: A AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Moderate

11 ..


51) The term "war room" refers to a(n) ________. A) area in which members of a project work together, surrounded by tools to facilitate smooth collaboration B) room in which a company's management interacts with representatives of labor unions C) online space in which brainstorming sessions between interdepartmental teams take place D) online room in which new employees undertake orientation programs before getting on board Answer: A AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 52) What is a group decision support system? A) a collaborative technology that reaches out to large groups of customers and is used to market products B) a software that supports employee-customer interaction to help a firm collect feedback on product performance C) a collaborative technology that helps teams brainstorm and exchange views about a topic to come to an agreement D) a technology that allows the top management to interact with customers from various segments of their markets Answer: C AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 53) Which of the following is true of group decision support systems? A) They allow users to collaborate with each other asynchronously, saving time and effort in coordination. B) They allow users to express independent viewpoints that may differ from those of others in a group. C) They do not support anonymity and require users to use their real names, to increase accountability. D) They give high-status individuals within a group a disproportionate influence on decisions. Answer: B AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Moderate

12 ..


54) Which of the following is a software tool that allows synchronous collaboration and allows online meetings via the Internet? A) microblogging B) emailing C) web conferencing D) instant messaging Answer: C AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 55) Which of the following is an example of a browser-based software tool that allows web conferences and webinars? A) Excel B) Tumblr C) WebEx D) Wordweb Answer: C AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 56) The impression created when remote participants in an interactive video meeting are almost life-sized and images are vividly clear is known as ________. A) virtual reality B) telepresence C) augmented reality D) disinhibition Answer: B AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 57) A ________ is an area on a server in which team members can post documents, maintain membership lists, feature news and announcements, and collaborate on edits and updates. A) shared workspace B) command center C) war room D) tag cloud Answer: A AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 13 ..


58) Colin Mackay Inc., a software company with its head office in Amsterdam, has employees across three continents. The company's project teams across different countries frequently exchange documents over email, with multiple users making changes to a particular document. As a result, there are often multiple copies of a particular document in existence. Which of the following will allow the teams to share documents in such a way that they can keep track of the changes made to a particular document and note the team members who make the changes? A) blogging B) shared workspace C) instant messaging D) cross-linking Answer: B AACSB: Information Technology; Analytical Thinking Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Moderate 59) Microsoft's Sharepoint includes features for ________, which ensures that older copies of documents are maintained, and no changes are lost. A) mashup B) cross-linking C) version control D) telepresence Answer: C AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 60) Which of the following is an example of a blogging tool? A) WebEx B) Gmail C) WordPress D) Groupon Answer: C AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Easy

14 ..


61) A ________ allows users to maintain a website with ongoing commentary, images, and links to other online resources in which posts are displayed in reverse chronological order so that the most recent appears on top. A) hashtag B) blog C) wiki D) tumblr Answer: B AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Easy 62) Which of the following is true of a blog? A) It allows synchronous discussions among participants. B) It displays posts in a chronological order. C) It can be accessed online as well as offline. D) It encourages cross-linking. Answer: D AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Easy 63) ________ simplifies the task of creating one's own website to review products, discuss hobbies, or express opinions about any subject. A) Instant messaging B) Emailing C) Blogging D) Web conferencing Answer: C AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Easy 64) For which of the following purposes can blogs be used? A) sending electronic mail B) communicating through interactive voice chatting C) creating connections with customers D) sending instant text messages Answer: C AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Easy

15 ..


65) Which of the following is a technology that facilitates end-user contributions and allows collaborative editing by allowing users to add and edit interlinked web pages? A) wiki B) hashtag C) blog D) instant messaging Answer: A AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Easy 66) ________ is a publicly accessible website that allows users to add and edit interlinked web pages and make contributions from their own personal experience to update existing articles with current information. A) Ebay B) Amazon C) Wikipedia D) Monster Answer: C AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Easy 67) Which of the following functions do wikis perform within an organization? A) creating a substantial base of knowledge B) creating interactive discussions between employees and clients C) establishing communication between members of a team through instant text messaging D) creating telepresence between employees working across the globe Answer: A AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Easy 68) Donald Garner Inc., a manufacturing company in California, recently recruited many employees for its new branch office in the city. The company wants to create knowledge storehouses that employees can edit as needed, adding contributions from their own personal experience or updating existing information. Which of the following can the company use to create such a substantial base of knowledge for its new employees? A) wiki B) blog C) hashtag D) tumblr Answer: A AACSB: Information Technology; Analytical Thinking Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Difficult 16 ..


69) Which of the following is the primary function of a wiki? A) It allows users to join online groups in order to buy a particular item. B) It allows users to add and edit interlinked web pages. C) It allows users to communicate through instant messaging and electronic mail. D) It allows users to interact synchronously and make decisions together. Answer: B AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Easy 70) Which of the following is a drawback of Wikipedia? A) It has an open structure which allows opportunity for inaccuracy and bias. B) It has a complicated navigation system that makes it difficult for users to operate. C) It cannot be accessed without an ID and a password. D) It features an overload of ads which takes focus away from credible content. Answer: A AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Moderate 71) A profile in a social networking site consists of ________. A) interactive video chatting and connection details B) photos, hobbies, and other details C) war rooms and virtual worlds D) shared workspaces Answer: B AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Moderate 72) Which of the following is a social networking site that allows users to post updates, adding commentary, links, or images about current happenings? A) Photoshop B) Wikipedia C) iTunes D) Pinterest Answer: D AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Moderate

17 ..


73) For which of the following reasons are companies most likely to use social networking sites? A) to encourage leisure activities like gaming at work B) to encourage friendly interaction between employees while at work C) to connect with customers and announce new products D) to formulate marketing and organizational plans Answer: C AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Moderate 74) Poise, a fashion apparel brand, intends to increase its online presence by creating online communities with its customers as members. The customers can interact with each other as well as the company. The generated information can then be used for developing future products. Which of the following is the company most likely to make use of? A) electronic mail system B) instant messaging system C) social networking system D) video conferencing system Answer: C AACSB: Information Technology; Analytical Thinking Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Difficult 75) ________ are a form of web logging in which posts are quite short, containing a brief sentence fragment, photo, or video, and perhaps a hyperlink. A) Mashups B) Microblogs C) Instant messages D) Hashtags Answer: B AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Easy 76) Which of the following is true of microblogging? A) Entries in microblogging sites must always be on business topics. B) Microblogging is rarely used by advertisers to promote their products. C) Users can reply to others' posts but cannot repeat them. D) Users can post hyperlinks. Answer: D AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Moderate

18 ..


77) Which of the following is true of microblogging? A) Entries in a microblogging site appear in chronological order. B) All posts on a similar topic include a keyword prefixed by a @, which is called a mashup. C) Entries in a microblogging site have no space constraints. D) Users themselves have added their own conventions to make microblogging more useful. Answer: D AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Moderate 78) ________ is the microblogging website with the largest number of users in the world. A) Tumblr B) Twitter C) Flickr D) Blogger Answer: B AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Easy 79) A ________ is a microblogging tool in which posts on a similar topic are indicated by a keyword prefixed by a certain special character on microblogging websites. A) mashup B) tag cloud C) hashtag D) wiki Answer: C AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Easy 80) On microblogging sites, a hashtag is used to indicate that ________. A) a set of posts are on a similar topic B) users are away from their systems C) a post links away from the site D) a user posts objectionable content Answer: A AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Easy

19 ..


81) ________ describes what people experience when some of their sensory input is not from the real world, but from a computer-generated one. A) Telepresence B) Disinhibition C) Presence awareness D) Virtual reality Answer: D AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Easy 82) A graphical, often 3D environment in which users can immerse themselves, interacting with virtual objects and one another using avatars is known as a(n) ________. A) virtual world B) intranet C) virtualization engine D) walled garden Answer: A AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Easy 83) ________ integrates multiple applications and interactive channels into a single interface, accessible from many different devices. A) Unified communications B) Integrated marketing communication C) Virtual reality D) Augmented reality Answer: A AACSB: Information Technology Chapter LO: 8.3 Explain how unified communications contribute to collaboration. Difficulty: Easy 84) Which of the following is a function of unified communications? A) enabling a company to communicate with all its customers at the same time B) collecting and storing data from multiple users and building a database C) integrating multiple applications and communications channels into a single interface D) maintaining a record of individual changes made on shared documents through version control Answer: C AACSB: Information Technology Chapter LO: 8.3 Explain how unified communications contribute to collaboration. Difficulty: Easy

20 ..


85) Jennifer, a client services manager in an advertising agency, is on vacation. Her smartphone lets her clients and subordinates know that she is available for hands-free cell-phone conversations at certain times of a day, and at other times communicates that she is available for IM or videoconferencing, depending on her activities at the vacation spot. Which of the following technologies is Jennifer's system using? A) integrated marketing communications B) unified communications C) enterprise resource planning D) customer relationship management Answer: B AACSB: Information Technology; Analytical Thinking Chapter LO: 8.3 Explain how unified communications contribute to collaboration. Difficulty: Difficult 86) What function does a context indicator perform? A) It indicates the changes that should be implemented in simulated business-context inputs. B) It provides quick access to email, secure instant messaging, and voice and video calling. C) It indicates the availability of data pertaining to certain contexts on a website. D) It displays whether an individual is available for communication at a certain time or not. Answer: D AACSB: Information Technology Chapter LO: 8.3 Explain how unified communications contribute to collaboration. Difficulty: Moderate 87) Which of the following pairs perform similar functions in the online world? A) virtual reality and hashtags B) hCards and HTML C) microblogging and hCards D) presence awareness and context indicators Answer: D AACSB: Information Technology Chapter LO: 8.3 Explain how unified communications contribute to collaboration. Difficulty: Easy 88) Which of the following performs functions similar to the presence awareness feature found in IM software? A) a hashtag B) a mashup C) a context indicator D) augmented reality Answer: C AACSB: Information Technology Chapter LO: 8.3 Explain how unified communications contribute to collaboration. Difficulty: Difficult

21 ..


89) A ________ provides quick access to context indicators, email, secure instant messaging, voice and video calling, conference calling, corporate RSS feeds, and more. A) universal dashboard B) group decision support system C) hashtag D) wiki Answer: A AACSB: Information Technology Chapter LO: 8.3 Explain how unified communications contribute to collaboration. Difficulty: Easy 90) Which of the following is a characteristic of a universal dashboard? A) It aggregates content from multiple internal and external sources on customizable web pages. B) It integrates multiple pages onto one single screen by resizing them. C) It provides a gateway to related sites through an index of links. D) It provides quick access to instant messaging and voice and video calling. Answer: D AACSB: Information Technology Chapter LO: 8.3 Explain how unified communications contribute to collaboration. Difficulty: Easy 91) Sarah Jones is a communications assistant at Sustainable Living Inc., a nonprofit organization in Las Vegas. Which of the following can give her quick access to emails, video calling, and corporate RSS feeds that help her be in constant touch with the campaigners for the organization? A) virtual world B) universal dashboard C) enterprise resource planning system D) social media information system Answer: B AACSB: Information Technology; Analytical Thinking Chapter LO: 8.3 Explain how unified communications contribute to collaboration. Difficulty: Difficult 92) When compared to a face-to-face setting, an online environment offers ________. A) greater anonymity B) a well-defined audience C) no context indicators D) greater media richness Answer: A AACSB: Information Technology Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Easy

22 ..


93) Which of the following is a characteristic of online communications? A) fewer nonverbal cues to clarify meaning B) a more well-defined audience than in-person interactions C) less anonymity than in-person interactions D) greater media richness than in-person interactions Answer: A AACSB: Information Technology Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Easy 94) ________ measures how well a communication medium can reproduce all the nuances and subtleties of the message it transmits. A) Virtual reality B) Presence awareness C) Telepresence D) Media richness Answer: D AACSB: Information Technology Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Easy 95) Which of the following is true of media richness? A) It is much higher online than during face-to-face interactions. B) It is higher in text-based online interactions than in voice or video interactions. C) It focuses on the richness and quality of message content, leaving out nonverbal cues. D) It measures how well a communication medium reproduces the nuances and subtleties of a message. Answer: D AACSB: Information Technology Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Easy 96) Which of the following collaborative technologies has the greatest amount of media richness as well as interactivity? A) face-to-face conversations B) shared workspaces C) social networking D) text messaging Answer: A AACSB: Information Technology Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Easy

23 ..


97) Which of the following is true of the psychological characteristics of online environments? A) The larger the physical distance between people, the fewer risks they take with their words. B) Anonymity can lead to problems because people feel less accountable for their actions. C) An advantage of online interactions is the existence of a well-defined audience group. D) As collaborative technologies add new capabilities, people find it easy to handle controls. Answer: B AACSB: Information Technology Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Easy 98) Which of the following is true of group dynamics in virtual teams? A) The online world creates a sense of hierarchy and inequality in status. B) Norms regarding the sharing of workload are difficult to enforce online. C) Disinhibition refers to a situation where people express themselves less bluntly while online. D) One important aspect of disinhibition is the avoidance of self-disclosure. Answer: B AACSB: Information Technology Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Moderate 99) Arthur, a salesperson in a leading apparel store, is very courteous and friendly with customers who visit the store. However, while interacting with customers through emails, he tends to be rather blunt and aggressive, which has led to a couple of complaints being lodged against him. Which of the following does the scenario illustrate? A) virtual reality B) telepresence C) augmented reality D) disinhibition Answer: D AACSB: Information Technology Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Easy 100) An initial face-to-face meeting between the members of a virtual team through interactive video can ________ among the team members. A) enhance trust B) reduce trust C) have no effect on the level of trust D) enhance anxiety and tension Answer: A AACSB: Information Technology Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Easy

24 ..


101) The future of the metaverse offers exciting possibilities of extending the life of humans by recreating any environment for people to explore. Answer: FALSE Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Easy 102) Includes a variety of graphical, computer-generated spaces in which users interact with elements of the environment and also other users. A) Metaverse B) telepresence C) unified communications D) augmented reality Answer: A Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Easy 103) The ________ is at the highest level of collaborative technologies. A) universal dashboards B) web conferencing C) Metaverse D) shared workspaces Answer: C Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 104) What would one be participating in if they were using wired goggles and gloves? A) virtual world B) augment reality C) virtual reality D) none of the above Answer: C Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Easy 105) How would a consumer expect to interact with a virtual world? A) through avatars B) through gloves and glasses C) through a training simulator D) none of the above Answer: A Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Easy

25 ..


106) Perhaps the best known example of a metaverse environment is the ________. A) virtual world B) augment reality C) shared workspace D) none of the above Answer: A Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Easy 107) What has virtual reality NOT been widely used in industry for? A) Fortnite B) training pilots C) creating battlefield scenarios D) medical education Answer: A Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Easy 108) Pokémon Go is an example of ________. A) augmented reality B) collaborative technology C) both A and B D) neither A nor B Answer: A Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Easy 109) ________ is on the lower end of media richness in corporate communications. A) Email B) Text messaging C) Face-to-Face meeting D) Video chat Answer: A Chapter LO: 8.5 Describe how online environments can affect human behavior, and identify strategies for successful virtual teams. Difficulty: Easy

26 ..


110) A benefit of using text messaging from business to communicate with customers is ________. A) texting can assist in emergency situations and disaster recovery B) valuable for customer relationships that need some synchronization, such as in hotels, airports, or restaurants C) most people will notice the buzz or vibration on their mobile device that signals an incoming text and view it immediately D) all of the above Answer: D Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 111) The pandemic led to many improvements in collaborative software. Which of the following is an example of these improvements? A) Medicine embraced telehealth and video meetings with doctors. B) Medicine created augmented reality to train nurses and doctors instead of the traditional classroom. C) Neither A nor B D) Both A and B Answer: A Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 112) What are examples of the benefits of remote work to the business? A) higher productivity, reduced real estate expenses, more competitive workforce B) higher IT costs, less pollution, higher productivity C) more innovation, smaller workforce, faster decision making D) none of the above Answer: A Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 113) What are examples of the cons remote work has to the business? A) productivity flatline, ease of managing remote workers technologically B) government regulation and taxes C) slower decision making, less innovation D) none of the above Answer: C Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Moderate

27 ..


114) What are examples of the benefits of remote work to the workers? A) flexibility, gas savings, work life balance B) ability to care for family, lower wages, increased tracking C) stress from workloads increasing, lower job satisfaction D) none of the above Answer: A Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Moderate 115) What will a common problem be for managers who have workers using telepresence robots? A) Where should the person pay taxes? B) If the remote worker is in another country, does the person need a visa to work? C) Neither A nor B D) Both A and B Answer: D Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Moderate 116) Industries where telepresence robots are already making a major contribution include ________. A) supply chain logistics B) medicine C) construction D) manufacturing Answer: B Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Easy 117) The interactive and immersive metaverse may be a solution to what problem in remote work? A) lacking spontaneity in virtual meetings B) the changes in productivity for remote workers C) the social disconnect when workers leave the office D) all of the above Answer: A Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Easy

28 ..


118) How do the iCalendar capabilities benefit users? Answer: Adding calendars and appointment scheduling capabilities to email clients allows users to receive alerts for upcoming events, synch with a smartphone, or flag recurring events that stretch out over months or years. Like contacts, calendar events can be transmitted and exchanged using standardized file formats. The iCalendar format is widely used to transmit calendar data. The .ics extension indicates that the plain text file contains iCalendar code so the programs can recognize it. The calendar's collaborative features eliminate much frustration for event managers. Consider, for example, the struggle to schedule a team meeting, even with the help of email. Asking people for the times and dates they have available can be fruitless and time-consuming, with many false starts and delayed responses. But if everyone is sharing calendars, "free" time for all is easier to identify. Personal preferences, cultural factors, and corporate norms all affect the use of calendaring software and how much it adds to overall productivity. AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Moderate 119) How do online discussion forums function? Answer: Discussion forums evolved from the earlier bulletin board as an online site in which people could post text messages, reply to others at any time, and discuss a topic of interest. Forums may be moderated, with someone nurturing the discussion, deleting unacceptable posts, and blocking users who violate the rules. The forum rules may allow people to post under a pseudonym, so members feel more anonymous and less identifiable during discussions. Posters and "lurkers" are both part of the forum community. Some people contribute the majority of posts while others just read them. Employee discussion forums can be unpredictable. Most are used productively, but occasional posts can tip in a negative direction. AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Moderate 120) What are the advantages of using instant messaging in a workplace? Answer: Instant messaging in a workplace can be useful when quick answers are needed. An IM is much faster than a phone call or conference call. It is especially useful for short questions, as it requires none of the social courtesies or dedicated attention that phone calls demand. People can also multitask during IM exchanges. It is a common collaborative tool for people in the same building, who may keep the IM client active all day long to receive brief text messages from coworkers in the next cubicle or around the world. IM software has introduced a critically important collaborative feature called presence awareness, which allows users to display their current status to their contacts, colleagues, or buddy list. The software shows whether a person is logged in. Arguably, this feature is the killer app of IM, since it shows whether the person is available to answer a question, pick up the phone, or stop by for a brief meeting. AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Moderate 29 ..


121) What is presence awareness? How does it aid collaboration within an organization? Answer: Presence awareness is a feature introduced by the IM software which allows users to display their current status to their contacts, colleagues, or buddy list. The software shows whether a person is logged in, and the user can elaborate by adding "working on the team project," "out to lunch," or "pretending to work." Presence awareness indicators add an important human element to online collaboration, and they are a key reason people adopt the tool within organizations. AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Moderate 122) What are the advantages of text messaging in emergency situations? Answer: Because people usually carry their cell phones, texting can assist in emergency situations and disaster recovery. In the aftermath of the 2013 Boston Marathon bombing, for instance, phone lines went down and cell phone calls could not get through. Many, however, could send text messages to let family and friends know they were safe. The Federal Emergency Management Agency also advises people to use texting to communicate at such times to avoid tying up voice lines needed for first responders. AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Moderate 123) What are the processes involved in group decision support systems? Answer: The group decision support system software allows each member to type his or her contributions anonymously as the group moves through the stages of identifying the problem to be solved, brainstorming possible solutions, rating the alternatives, and coming to some consensus about the best course of action. As the contributions, comments, and votes unfold, they appear on the screen with no names attached. AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Moderate

30 ..


124) Discuss web conferencing and the features offered by browser-based conferencing software. Answer: Web conferencing is a synchronous collaboration technology which supports online meetings, sometimes called "webinars," via the Internet. Browser-based conferencing software, such as WebEx or Zoom, include features such as real-time video support, support for PowerPoint or other slide presentations, interactive whiteboards, text-based chat, polling software, web-based clients for both desktop computers and mobile phones, desktop application sharing, in which the meeting participants or audience can see whatever application the host is running on the desktop, archiving recordings so participants who missed the event can play it back, and registration systems for fee-based enrollments. AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Moderate 125) What are shared workspaces? How do they enhance teamwork? Answer: A shared workspace is an area on a server in which team members can post documents, maintain membership lists, feature news and announcements, and collaborate on edits and updates. The core of a shared workspace is the document library, where members can store important information assets and keep track of all the edits. Some software for shared workspaces, such as Microsoft's Sharepoint, includes features for version control to ensure that older copies are maintained and no changes are lost. This centralized document library goes a long way toward eliminating the confusion and duplication that arise when team members are constantly sending revised versions back and forth over email. AACSB: Information Technology Chapter LO: 8.1 Describe the major collaborative technologies, and explain the features that each one offers for communications and productivity. Difficulty: Moderate 126) What are blogs and how can they benefit organizations? Answer: A blog, short for "web log," is used to facilitate collaboration and knowledge sharing. A blogger maintains a website composed mainly of ongoing commentary, images, and links to other online resources. The posts are displayed in reverse chronological order so that the most recent appears on top. Blogging software, such as the free versions available through WordPress and Blogger, simplifies the task of creating your own website to express opinions, review products, discuss hobbies, or just rant. Readers can add their own comments to the blogger's posts, joining in the asynchronous discussion. For organizations, blogs are a popular means of building knowledge bases. They are also used for marketing and communications, to create a more intimate connection with customers and suppliers. AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Moderate

31 ..


127) What are wikis? What functions do they perform? Answer: A significant Web 2.0 technology that facilitates end-user contributions and collaborative editing is the wiki, a website that allows users to add and edit interlinked web pages. Wiki software usually offers simple text editing tools, so users need not know HTML. It keeps track of versions and lets users view the history of changes to each page, along with discussions about the page's content. Users navigate within a wiki by doing a keyword search or by clicking on the many embedded links to related wiki pages. Wikis have also emerged as extremely valuable tools within organizations, especially to centralize documents and create knowledge storehouses that employees can edit as needed. The wiki makes it easy for people in any unit or any level of an organization to make contributions from their own personal experience or to update existing articles with current information. Such wikis can become a substantial base of knowledge for an organization, useful for training new employees and organizing all the how-to guides. AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Moderate 128) Which is the best-known publicly accessible wiki? How does it function? Answer: The online encyclopedia called Wikipedia is the best-known publicly accessible wiki. With millions of articles contributed by volunteers around the world, the nonprofit Wikipedia is the most popular general-purpose reference work on the net. People can update any of the existing articles with current information. In general, studies find that the encyclopedia's accuracy rivals more traditional competitors, but problems with bias have emerged, exacerbated by the site's open structure that allows anyone promoting an agenda to edit articles. Corporations and government agencies are known to quietly edit entries about themselves to put out the best spin wherever possible. Occasionally, the site blocks people from changing an article, especially when it deals with controversial current events. AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Moderate 129) What are the different purposes for which companies can use social networking sites? Answer: For companies, social networking sites offer a means to support knowledge sharing in the company and to reach people who may be interested in their products or services. Network interconnections help messages leap from one network of friends to the next. Companies also use ads which can be tailored to reach precise target groups based on their members' profiles. Beyond advertising, organizations create their own profiles to connect with their customers, recruit new employees, announce new products, and generally promote their brands. AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Moderate

32 ..


130) What is microblogging? Answer: Microblogging is a form of blogging in which the posts are quite short. Posts in microblogs contain a brief sentence fragment and perhaps a link to another web resource or video. The posts appear in reverse chronological order. Topics in a microblog range widely, from simple updates about what the poster is currently doing to informative links to resources about current events, companies, services, and more. Users in a microblog can "follow" other users, whose posts constantly appear on followers' computer screens or mobile devices. Microblog users can also add their own conventions to make blogging more useful. AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Moderate 131) How does microblogging contribute to social networking? Answer: Microblogging is a form of blogging in which the posts are quite short, containing a brief sentence fragment and perhaps a link to another web resource or video. As in a blog, the entries appear in reverse chronological order. The topics range widely, from simple updates about what the poster is currently doing to informative links to resources about current events, hobbies, companies, services, and more. The social media aspect exists because users are able to "follow" other users, whose posts constantly appear on followers' computer screens or mobile devices. Followers can reply to posts or repeat them for the benefit of their own followers. As simple as it sounds, the real-time updates enrich online group dynamics with a level of connectedness that many consider a significant leap for social media, especially since they extend the advantages of text messaging to interconnected social networks. AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Moderate 132) How do advertisers make use of Twitter? Answer: Of all microblogging sites, Twitter has the largest number of users, and its vocabulary terms "tweet" and "re-tweet" are widely used to describe the basic elements of this collaborative technology. As simple as it sounds, the real-time updates enrich online group dynamics with a level of connectedness that many consider a significant leap for social media, especially since they extend the advantages of text messaging to interconnected social networks. Advertisers promote products on Twitter by relying on the social networks. For example, SponsoredTweets.com is a marketplace that brings together people with large followings and advertisers who want them to tweet something nice about their products. Companies also use Twitter in creative ways to build stronger ties to customers. For example, Old Spice and Taco Bell engaged and amused their followers by poking fun at one another. AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Moderate

33 ..


133) Explain the concept of "virtual reality." Answer: The virtual world is a graphical, often 3D environment in which users can immerse themselves, interacting with virtual objects and with one another using avatars. These simulated environments create virtual reality, a term that describes what people experience when some of their sensory input is not from the real world, but from a computer-generated one. Advanced virtual reality systems enhance the illusion of physical immersion in a virtual world even further by adding other technologies. Stereoscopic goggles, for instance, can present aspects of the virtual world that match the user's actual body posture, movements, or head turns. Specially wired gloves can reproduce the sensations of actually touching and manipulating virtual objects. AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Moderate 134) How did hashtags originate and what is their purpose? Answer: Microbloggers began using the hashtag in which posts on a similar topic all include a keyword prefixed by a #. The practice caught on, especially because it made it easier to search for posts about particular subjects. Twitter encouraged the practice by hyperlinking the hashtags so that a single click would bring up a list of matches. Hashtags have become popular on other social networks as well, such as Facebook and YouTube. Hashtags are also used to identify trending topics in geographical areas. As users repeat a hashtag and retweet posts containing them, Twitter's information systems tally the results in real-time. The ones with the most posts become "Trending Topics" on the front page, and a topic can rise to the top quickly. Organizations watch this closely in case a public relations storm is brewing that involves them. AACSB: Information Technology Chapter LO: 8.2 Identify and describe Web 2.0 technologies that facilitate collaboration. Difficulty: Moderate 135) What are some of the common themes that affect the online behavior of Internet users? Answer: Some of the common themes that affect the online behavior of Internet users include: (1) unfamiliar tools that are used to interact online over which users stumble in their efforts to make interactions productive, for example, the QWERTY keyboard (2) media richness that measures how well a communication medium can reproduce all the nuances and subtleties of the message it transmits (3) physical distance and lack of physical presence, considering how online interactions typically take place between people who are geographically separate, not just from one another, but from other people as well (4) anonymity, which can considerably change the behavior of people (5) the audience, which is blurry and undefined in the online world. AACSB: Information Technology Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Moderate

34 ..


136) What is media richness? Answer: Media richness measures how well a communication medium can reproduce all the nuances and subtleties of the message it transmits. Media richness is usually starkly lower online than face-to-face. Many communications are text only, leaving out facial expression, eye contact, voice pitch and tempo, gestures, body posture, and hand gestures. Although words carry meaning, most of what people communicate is actually nonverbal. AACSB: Information Technology Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Moderate 137) How are group dynamics in virtual teams different from those in real-world teams? Answer: In the online world, group members cannot perceive nonverbal cues, and hence, group norms can be difficult to establish. Online environments also lead to disinhibition, in which people express themselves more bluntly, abruptly, or aggressively than they would in face-toface settings. Their messages lack the verbal softeners and nonverbal nuances that smooth interactions and make consensus easier to reach. Heightened self-disclosure also appears more often in online interactions. The online world tends to flatten out hierarchies and equalize status, partly because many of the cues used to establish status are less apparent. In addition to all this, trust is not easy for virtual teams to create. AACSB: Information Technology Chapter LO: 8.4 Define "metaverse" and explain different types. Difficulty: Difficult

35 ..


Introduction to Information Systems, 5e (Wallace) Chapter 9 Knowledge Management and E-Learning 1) Intellectual capital refers to tangible assets and resources of an enterprise that are captured by conventional accounting reports. Answer: FALSE AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Easy 2) Education plays a key role in building human capital. Answer: TRUE AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Easy 3) A person's network of contacts, including clients, suppliers, and prospective employees, is a part of the human capital that the person contributes toward the organization. Answer: FALSE AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Easy 4) Structural capital describes the number and quality of all the relationships an organization's employees maintain, not just with one another but with clients, customers, suppliers, and prospective employees. Answer: FALSE AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Easy 5) Structural capital contributed by a person to an organization is only valid as long as that person is employed by the organization. Answer: FALSE AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Easy

1 ..


6) Structural knowledge is in the minds of employees and is difficult to locate because employees may not realize that they possess it. Answer: FALSE AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Easy 7) Explicit knowledge can be documented and codified, whereas tacit knowledge encompasses insights, judgment, creative processes, and wisdom that come from learning through several trials and errors. Answer: TRUE AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Easy 8) A common problem in knowledge management is redundancy, which is worsened by the ease of copying and editing electronic files. Answer: TRUE AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Easy 9) Expert locator tools have the ability to crawl through databases, websites, and other electronic documents to refine their expertise ratings. Answer: TRUE AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Easy 10) Operational information should be systematically collected and organized to ensure wide availability throughout an organization. Answer: TRUE AACSB: Information Technology Chapter LO: 9.3 Explain how the human element can pose challenges for knowledge management projects and how managers can overcome them. Difficulty: Easy

2 ..


11) The semantic web makes it possible for agents to integrate information from many different databases and collections with different structures, terms, and entity names. Answer: TRUE AACSB: Information Technology Chapter LO: 9.3 Explain how the human element can pose challenges for knowledge management projects and how managers can overcome them. Difficulty: Easy 12) Self-paced e-learning involves students using online materials independently, with little or no instructor involvement. Answer: TRUE AACSB: Information Technology Chapter LO: 9.4 Describe several different approaches to e-learning. Difficulty: Easy 13) Self-paced learning programs are especially useful for gaining structural knowledge, such as how to use a company's enterprise resource planning software. Answer: TRUE AACSB: Information Technology Chapter LO: 9.4 Describe several different approaches to e-learning. Difficulty: Easy 14) Increasing internet bandwidth has led to synchronous e-learning events no longer being limited to specially constructed interactive video classrooms and networks. Answer: TRUE AACSB: Information Technology Chapter LO: 9.4 Describe several different approaches to e-learning. Difficulty: Easy 15) Hybrid e-learning programs consist exclusively of online activities in which students use online materials independently. Answer: FALSE AACSB: Information Technology Chapter LO: 9.4 Describe several different approaches to e-learning. Difficulty: Easy 16) The subject matter expert in an e-learning learning program is one who pays the project bills, coordinates activities of writers, programmers, technicians, videographers, and graphic artists, and tracks progress from kickoff to completion. Answer: FALSE AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Easy

3 ..


17) A learning object is larger, less self-contained, and less reusable than a classroom lecture. Answer: FALSE AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Easy 18) Instructional designers develop the course content of e-learning programs. Answer: FALSE AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Moderate 19) An advantage of simulations in e-learning programs is that they offer people a chance to practice skills without risk to themselves or to others. Answer: TRUE AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Easy 20) Asynchronous interaction in e-learning programs is achieved through virtual classrooms and chat sessions. Answer: FALSE AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Easy 21) In companies, e-learning is an essential building block in any effort to manage intellectual capital and for knowledge management. Answer: TRUE Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Easy 22) Research that compared student outcomes for e-learning and for classroom-based learning showed few differences. In many studies, online students actually did better in certain respects. Answer: TRUE Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Easy

4 ..


23) Many US based MOOCS serve students globally while learning in English to gain US based certificates. Answer: TRUE Chapter LO: 9.4 Describe several different approaches to e-learning. Difficulty: Easy 24) In academic remote learning a common means of limiting cheating became ________. A) requiring projects instead of tests for competency B) holding testing in person for remote classes C) using a remote proctor with a webcam during testing D) all the above Answer: C Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Easy 25) Asynchronous learning could be explained as ________. A) e-learning conducted at "different times, different places" B) e-learning conducted at "same time, different place" C) Neither A nor B D) Both A and B Answer: A Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Easy 26) What was a potential reason for students struggling in remote learning during the pandemic? A) The curricula that teachers used in in-person classes did not transition well to an e-learning model. B) Success in e-learning courses depends on students' ability to adapt and to have quality timemanagement skills. C) Home settings were not properly equipped to support remote teaching and learning. D) All of the above Answer: D Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Easy

5 ..


27) Intellectual capital refers to ________. A) the intangible assets and resources of an enterprise B) the assets that do not contribute to an organization's profitability C) the assets of an organization that can be sold to another organization D) the assets belonging to an enterprise that are freely available to the public Answer: A AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Moderate 28) LinkedIn Learning is an example of what type of e-learning? A) social network analysis B) MOOC C) learning management system D) asynchronous learning Answer: B Chapter LO: 9.4 Describe several different approaches to e-learning. Difficulty: Easy 29) What is an example of the benefits of MOOCs? A) Google developed courses on data analytics and awards a professional certificate for completion. B) It is a free way to earn college course credit. C) Most students fully complete MOOCs in a short time frame. D) None of the above Answer: A Chapter LO: 9.4 Describe several different approaches to e-learning. Difficulty: Easy 30) Common international-based MOOC platforms include ________. A) LinkedIn Learning, PUC, Google B) XuetangX, PUC, Edraak C) Edraak, Google, Coursera D) None of the above Answer: B Chapter LO: 9.4 Describe several different approaches to e-learning. Difficulty: Easy

6 ..


31) Which of the following statements is true of intellectual capital? A) The value of an organization's intellectual capital is best reflected in conventional accounting reports. B) Intellectual capital consists of all the intangible assets of an enterprise that contribute to its competitive advantage. C) Intellectual capital is hard to distinguish from other sources of capital owned by an organization. D) Intellectual capital does not include the knowledge stored as documentation about business processes, procedures, policies, contracts, and patents. Answer: B AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Moderate 32) Which of the following is a feature of human capital? A) It represents the knowledge that a company's customers have about its products. B) It refers to the knowledge stored as documentation about patents, contracts, and policies. C) It consists of competencies and knowledge possessed by an organization's employees. D) It refers to the number and quality of all the relationships an organization's employees maintain. Answer: C AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Moderate 33) Negotiating strategies, mentoring, and coaching are all part of the ________ that one adds to the company. A) human capital B) venture capital C) equity capital D) structural capital Answer: A AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Easy

7 ..


34) Which of the following assets is a part of human capital? A) business processes B) interview techniques C) patent documents D) contracts Answer: B AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Easy 35) Which of the following assets is a part of social capital? A) supplier contacts B) business processes C) trade secrets D) organizational policies Answer: A AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Easy 36) Which of the following assets is a part of structural capital? A) research documents B) mentoring strategies C) interview techniques D) client contacts Answer: A AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Easy 37) Jonathan Collins, a customer relations manager at a retail firm in Minnesota, has accumulated contacts with clients and suppliers throughout his years in the organization. Which of the following is a type of intellectual capital he is contributing to in this case? A) equity capital B) structural capital C) human capital D) social capital Answer: D AACSB: Analytic Thinking Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Moderate

8 ..


38) ________ describes the number and quality of relationships an organization's employees maintain with one another as well as with clients, customers, suppliers, and prospective employees. A) Structural capital B) Venture capital C) Equity capital D) Social capital Answer: D AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Easy 39) Which of the following is an accurate definition of social capital? A) the capital provided to early-stage, high-potential companies which contribute to developing societies B) the internal and external relationships that are maintained by an organization's employees C) the capital inherent in ecologies and protected by societies D) the aggregate body of government-owned assets that are used to promote public industry productivity Answer: B AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Easy 40) Sally Frost is a public engagement coordinator at Wildlife Foundation. What kind of capital does she contribute to the organization when she successfully interacts with volunteers, builds contacts with corporate houses and long-term relations with government bodies over the years? A) social capital B) structural capital C) equity capital D) venture capital Answer: A AACSB: Analytic Thinking Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Moderate

9 ..


41) Which of the following statements is true of structural capital? A) It consists of electronically documented knowledge of a company's operations. B) It consists of hierarchical relationships that an organization's employees maintain amongst one another. C) It consists of structured relationships that a company's employees maintain with their clients. D) It consists of the knowledge of an organization that cannot be documented. Answer: A AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Moderate 42) ________ comprises knowledge stored as documentation about business processes, patents, policies, and other aspects of an organization's operations, often stored electronically. A) Social capital B) Venture capital C) Equity capital D) Structural capital Answer: D AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Easy 43) ________ is often stored electronically and remains with an organization even when an employee is no longer with the organization. A) Structural capital B) Social capital C) Venture capital D) Human capital Answer: A AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Easy

10 ..


44) McCloy-Hill, a well-known law firm in California, adopts a regular practice of documenting its client-related data daily in an electronic database. The client-related data includes the nature of legal advice sought, revenue generated by each client, and progress on each case, among others. What type of intellectual capital does such data represent to the firm? A) venture capital B) social capital C) structural capital D) human capital Answer: C AACSB: Analytic Thinking Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Moderate 45) ________ knowledge refers to knowledge that can be documented and codified. A) Experiential B) Explicit C) Tacit D) Inert Answer: B AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Easy 46) Which of the following is true of explicit knowledge? A) It is ingrained in a person and is difficult to document. B) It includes structured and unstructured information, as well as multimedia content. C) It encompasses the number and quality of all the relationships an organization's employees maintain. D) It consists of information that is dispersed throughout the marketplace, and cannot be accumulated or referenced. Answer: B AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Moderate

11 ..


47) Pierce Bailey, a sales executive at a mobile service company, needs to document details of the sales calls he makes daily. What kind of knowledge is he documenting when he is inputting customer contact information, responses of customers, and follow-up that needs to be done? A) tacit knowledge B) experiential knowledge C) explicit knowledge D) common knowledge Answer: C AACSB: Analytic Thinking Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Moderate 48) Knowledge that is elusive in nature and encompasses insights, judgment, creative processes, and wisdom that come with long experience in a field, as well as many trials and errors is known as ________. A) inert knowledge B) tacit knowledge C) explicit knowledge D) metaknowledge Answer: B AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Easy 49) ________ knowledge tends to be ingrained in a person's mind, and often the person may not realize that he or she possesses it. A) Explicit B) Tacit C) Documented D) Procedural Answer: B AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Easy

12 ..


50) Known to be an integral part of Green Living Inc., Rhonda Lloyd worked as a renewable energy campaigner for nine years in a remote region of Indonesia. What kind of knowledge represents her understanding of the dynamics of village communities and the apprehensions of the locals? A) tacit B) documented C) explicit D) metaknowledge Answer: A AACSB: Analytic Thinking Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Moderate 51) Which of the following is an accurate definition of knowledge management? A) a field which analyzes public capital and its role in community development B) a field where researchers investigate roles that tangible assets play C) a field which studies how tangible assets contribute to competitive advantage D) a field which uses practices and strategies to manage intellectual capital Answer: D AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Easy 52) Knowledge management refers to ________. A) investigations that researchers make about roles that intangible assets play B) practices that customers use to understand products prior to purchasing C) strategies that organizations use to understand the responsibility they have toward society D) processes that experts use to categorize public assets Answer: A AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Moderate 53) The first step involved in knowledge management is ________. A) locating the sources of relevant knowledge B) identifying the goal of the project C) capturing the knowledge D) organizing and sharing knowledge Answer: B AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Easy 13 ..


54) Which of the following contributes to successful knowledge management? A) copying and editing electronic files with different versions B) saving and documenting redundant information C) understanding an organization's specific needs to identify goals D) identifying broadly defined, diverse goals and aims Answer: C AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Moderate 55) In knowledge management, the step that comes immediately after identifying the goal is ________. A) share the knowledge B) locate the sources of relevant knowledge C) capture the knowledge D) organize and value the knowledge Answer: B AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Easy 56) Projects focused on explicit knowledge and structural capital, much of which is in electronic form and scattered across different formats and media types, are worsened by the ease of copying and editing electronic files because different versions contain inconsistent information. This problem is referred to as ________. A) reliability B) accessibility C) exclusivity D) redundancy Answer: D AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Moderate

14 ..


57) A function of an expert locator tool is to ________. A) mimic the reasoning of a human expert, drawing from a base of knowledge about a particular subject area to come to a decision or recommendation B) analyze the popularity of products through market-basket analysis C) find people in an organization with specific types of skills D) locate a person's whereabouts through the geographic navigation system Answer: C AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Moderate 58) ________ crawl through databases, websites, emails, project summaries, and other electronic documents to refine their expertise ratings. A) Web crawlers B) Expert locator tools C) Connectionist expert systems D) Intelligent agents Answer: B AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Easy 59) Rowland Perry, a headhunter in Manhattan, is required to find a capable candidate for the position of creative director for an ad agency. The creative director is a highly specialized position which requires the selected candidate to guide individual advertising campaigns for a diverse set of clients. Which of the following tools would help Rowland most in his search for a creative director? A) expert locator B) neural network C) data warehouse D) dashboard Answer: A AACSB: Analytic Thinking Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Moderate

15 ..


60) Which of the following statements is true of social network analysis? A) It displays connections of an individual's actual position on a hierarchical organizational chart. B) It displays dense connections for people who are unwilling to provide assistance. C) It provides insights into clusters and the roles different people play as leaders. D) It treats individuals as discrete units of analysis, instead of focusing on how the structure of ties affects individuals and their relationships. Answer: C AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Easy 61) ________ analysis maps and measures the strength of relationships represented as nodes in clusters and uncovers those who play pivotal roles as bridges to other groups, both inside and outside an organization. A) Market basket B) Social network C) Goal-seeking D) What-if network Answer: B AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Easy 62) Dense connections in a social analysis map represent ________. A) people at the top management level in an organization B) people at the mid-level management level in an organization C) people's actual position on a hierarchical organizational chart D) people in informal networks who are willing to provide assistance Answer: D AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Easy 63) Which of the following is usually used as raw material for a social network analysis? A) employee surveys B) hierarchical charts of organizations C) human resource records D) previous employment records Answer: A AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Easy 16 ..


64) Which of the following is an accurate definition of communities of practice? A) project teams driven by specific goals and dissolved once their missions are accomplished B) team members whose team membership is defined by the task they are set to achieve C) project teams where members from distinctly diverse professions come together D) groups of individuals who come together to share knowledge about their professions Answer: D AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Moderate 65) An after-action review refers to ________. A) an online interaction between members of a project and prospective customers after a product has been launched B) a meeting where members of a team analyze the efficiency of an individual before he/she resigns C) a discussion forum in which members discuss and finalize goals for a project D) a meeting held after a project has been completed to document what worked well and what did not Answer: D AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Easy 66) Ravi is an account executive at the ad agency Rowland Clarkson. He organizes an afteraction review for a recent advertising campaign that the agency worked on. Which of the following is the most likely objective of the review? A) scheduling the production of the advertising campaign B) assigning resources for the advertising campaign C) addressing the billing and other accounting aspects for the advertising campaign D) assessing the advertising campaign to determine lessons and achievements for the agency Answer: D AACSB: Analytic Thinking Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Moderate

17 ..


67) A(n) ________ can be described as a meeting of people in the same field, or who contribute to the same business process, and share tips for techniques that have consistently shown superior results in accomplishing a goal. A) shadowing session B) best-practice session C) adversarial review D) after-action review Answer: B AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Easy 68) A ________ is a website in which users add and edit articles about specific topics and discuss the contents of each article with other editors. A) blog B) wiki C) portal D) mashup Answer: B AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Easy 69) Which of the following is an accurate definition of wikis? A) interactive systems which help people communicate through web conferencing B) mentoring strategies in which new employees work side-by-side for weeks with an incumbent employee C) websites in which users add and edit articles about specific topics and discuss contents of articles D) discussion forums which help improve coordination between teams in an organization Answer: C AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Easy

18 ..


70) Most retail companies in Arizona are increasingly using a certain strategy to capture tacit knowledge which is helping them to successfully handle knowledge management. Which of the following processes would help such users add and edit articles about specific topics and discuss the contents of each article with other editors? A) wikis B) portals C) blogs D) dashboards Answer: A AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Moderate 71) ________ is a mentoring strategy in which a new employee works side-by-side for a few weeks or months with one who is leaving, allowing the veteran to impart knowledge in the context of the actual work. A) Shadowing B) Frontal instruction C) Delegation D) Direct instruction Answer: A AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Easy 72) Kate Anderson is taking over from Barry Brown as the Regional Sales Manager for Florida state at 99, a large chain of retail stores in Florida. She is assigned to work side-by-side with Barry until he retires and to learn about procurement processes, supplier preferences, etc. through observation. Which of the following mentoring techniques is employed in this case? A) catalyzing B) after-action reviewing C) shadowing D) direct instruction Answer: C AACSB: Analytic Thinking Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Moderate

19 ..


73) A collection of online tools that organize and collect a variety of activities for a group of people working together, such as calendars, document and multimedia repositories, blogs, announcements, chat, and discussion boards, is known as a ________. A) team workspace B) dashboard C) wiki D) blog Answer: A AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Easy 74) The ________ refers to an organization's private web space that is password-protected and accessible only to authorized individuals through the organization's portal. A) intranet B) marketing website C) World Wide Web D) local area network Answer: A AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Easy 75) Halcyon is an information technology firm that uses its own private web space to organize and distribute employee forms and announcements. It has recently begun using the same web space to manage its knowledge-related initiatives as well. The private web space discussed in this case is an example of a(n) ________. A) intranet B) public blog C) local area network D) mashup Answer: A AACSB: Analytic Thinking Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Moderate

20 ..


76) Which of the following statements is true of intranets? A) Their functionality is restricted to organizing employee information and distributing announcements. B) They are accessible only to authorized individuals through an organization's portal. C) They are grids consisting of private, public, academic, business, and government networks. D) They are open systems and are accessible to all users surfing the web. Answer: B AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Easy 77) Which of the following is a difference between the internet and intranets? A) The internet relies on TCP/IP, while intranets are protocol-independent. B) The internet can be accessed through web browsers, but intranets need specialized software to access. C) The internet supports multimedia and document formats unlike intranets. D) The internet is publicly accessible, while access to intranets is protected with passwords known to authorized individuals. Answer: D AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Moderate 78) What function were intranets originally intended to serve? A) organizing and distributing employee forms and announcements B) screening organizational networks for potential security risks C) interacting with an organization's customers D) storing critical information relevant to an organization Answer: A AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Moderate

21 ..


79) Which of the following statements is true of document management systems? A) They offer extremely restricted search capabilities to users. B) They help find people in an organization with specific types of expertise based on their education, experience, and activities. C) They make electronic documents searchable and easily transmitted. D) They encrypt electronic documents to make them inaccessible to people outside an organization. Answer: C AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Moderate 80) Which of the following is an accurate definition of document management systems? A) systems that manage electronic records, often converted from paper sources, making them searchable and easily transmitted B) information systems that can find people in an organization with specific types of expertise based on their education, experience, and activities C) information systems used to deliver e-learning courses, track student progress, and manage educational records D) software tools that mimic the reasoning and decision making of a human expert, drawing from a base of knowledge about a particular subject area developed with the expert's assistance Answer: A AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Moderate 81) The process which reads typed text and helps document management systems index, tag, and decipher document identifiers quickly is known as ________. A) pattern recognition B) optical character recognition C) semantic mapping D) optical mark recognition Answer: B AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Easy

22 ..


82) ________ refers to software that can interpret handprinted text written on paper forms. A) Optical mark recognition B) Pattern recognition C) Intelligent character recognition D) Semantic mapping Answer: C AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Easy 83) With the help of ________, the digital version of a document is displayed on the screen for a human viewer to verify letters the software cannot read. A) pattern recognition B) intelligent character recognition C) semantic mapping D) web scraping Answer: B AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Moderate 84) A patent law firm based in New Jersey provides patent drafting and filing services to its clients. The company is planning to build an electronic database of patent applications it has filed for its clients over the years. However, most of its clients use handwritten notes and figures for their reference. Which of the following software tools would best help the firm convert the large number of paper-based notes from its clients into electronic records that can be easily searched and referenced? A) image recognition B) optical mark recognition C) semantic mapping D) intelligent character recognition Answer: D AACSB: Analytic Thinking Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Moderate

23 ..


85) Which of the following functions does optical character recognition perform? A) converting spoken words to text B) matching handwritten words to predictively input electronic text C) reading typed text to enable indexing and tagging for processing forms D) scanning rich image files and converting them to encoded text format Answer: C AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Easy 86) Which of the following is a characteristic of image recognition? A) converting images into text B) examining images and converting them into machine-readable code C) analyzing and enhancing photographic data D) scanning facial features and returning possible matches from a database Answer: D AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Easy 87) Which of the following knowledge management strategies should be used with strategically valuable information? A) develop strategies to experiment with and invest in this information B) systematically collect and organize, making it widely available throughout the organization C) create backup copies to be stored remotely and delete information from the system D) automate collection and archiving to achieve cost-effectiveness Answer: A AACSB: Information Technology Chapter LO: 9.3 Explain how the human element can pose challenges for knowledge management projects and how managers can overcome them. Difficulty: Moderate 88) Which of the following knowledge management strategies should be used with operational information? A) develop plans to experiment with and invest in this information B) systematically collect and organize, making it widely available throughout the organization C) create backup copies to be stored remotely and delete information from the system D) delete information from the system Answer: B AACSB: Information Technology Chapter LO: 9.3 Explain how the human element can pose challenges for knowledge management projects and how managers can overcome them. Difficulty: Easy

24 ..


89) Which of the following knowledge management strategies should be used with compliance information? A) delete information from the system B) develop plans to experiment with and invest in this information C) create backup copies to be stored remotely and delete information from the system D) automate collection and archiving to achieve cost-effectiveness Answer: D AACSB: Information Technology Chapter LO: 9.3 Explain how the human element can pose challenges for knowledge management projects and how managers can overcome them. Difficulty: Easy 90) Which of the following knowledge management strategies should be used with redundant information? A) develop plans to experiment with and invest in this information B) systematically collect and organize, making it widely available throughout the organization C) delete the information from the system D) automate collection and archiving to achieve cost-effectiveness Answer: C AACSB: Information Technology Chapter LO: 9.3 Explain how the human element can pose challenges for knowledge management projects and how managers can overcome them. Difficulty: Easy 91) Which of the following types of captured knowledge is ideal for developing strategies to experiment with and invest in? A) operational information B) compliance information C) redundant information D) strategically valuable information Answer: D AACSB: Information Technology Chapter LO: 9.3 Explain how the human element can pose challenges for knowledge management projects and how managers can overcome them. Difficulty: Easy 92) Which of the following types of captured knowledge should ideally be systematically collected and organized and made widely available throughout an organization? A) strategically valuable information B) compliance information C) redundant information D) operational information Answer: D AACSB: Information Technology Chapter LO: 9.3 Explain how the human element can pose challenges for knowledge management projects and how managers can overcome them. Difficulty: Easy 25 ..


93) The collection of ________ should be automated and such information should be archived to achieve cost-effectiveness. A) operational information B) strategically valuable information C) redundant information D) compliance information Answer: D AACSB: Information Technology Chapter LO: 9.3 Explain how the human element can pose challenges for knowledge management projects and how managers can overcome them. Difficulty: Easy 94) Which of the following types of captured knowledge should be deleted from the system? A) operational information B) compliance information C) strategically valuable information D) redundant information Answer: D AACSB: Information Technology Chapter LO: 9.3 Explain how the human element can pose challenges for knowledge management projects and how managers can overcome them. Difficulty: Easy 95) A ________ refers to a system in which online resources and their relationships can be read and understood by computers as well as human beings. A) semantic web B) walled garden C) mashup D) virtualization engine Answer: A AACSB: Information Technology Chapter LO: 9.3 Explain how the human element can pose challenges for knowledge management projects and how managers can overcome them. Difficulty: Easy 96) Which of the following is an accurate definition of resource description framework (RDF)? A) a specification written in XML and developed by the World Wide Web Consortium B) a specification for web pages written in HTML C) a specification to describe offline resources D) a specification used for representing documents independent of application software and hardware Answer: A AACSB: Information Technology Chapter LO: 9.3 Explain how the human element can pose challenges for knowledge management projects and how managers can overcome them. Difficulty: Easy 26 ..


97) ________ is a part of the XML family of standards that is used to describe online resources and their properties for the semantic web. A) RDF B) P3P C) OWL D) SRGS Answer: A AACSB: Information Technology Chapter LO: 9.3 Explain how the human element can pose challenges for knowledge management projects and how managers can overcome them. Difficulty: Easy 98) Which of the following languages is the resource description framework written in? A) HTML B) SGML C) VHML D) XML Answer: D AACSB: Information Technology Chapter LO: 9.3 Explain how the human element can pose challenges for knowledge management projects and how managers can overcome them. Difficulty: Easy 99) Which of the following is a style of e-learning that would be most appropriate for disseminating new technical knowledge to employees at a remote facility? A) hybrid e-learning B) instructor-led e-learning C) corporate e-learning D) self-paced e-learning Answer: D AACSB: Information Technology Chapter LO: 9.4 Describe several different approaches to e-learning. Difficulty: Moderate 100) A person in an e-learning program who knows just what should be included in the course and possesses the content expertise is known as a ________. A) semantic reasoner B) subject matter expert C) lexical analyzer D) knowledge engineer Answer: B AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Easy 27 ..


101) A(n) ________ is a person who brings together the knowledge and skills about what strategies work best for e-learning. A) instructional designer B) subject matter expert C) project sponsor D) semantic reasoner Answer: A AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Easy 102) Which of the following functions is performed by an instructional designer in an e-learning process? A) deciding the content of the course B) developing the best strategies for the e-learning program C) managing and tracking budgets for the process D) defining the goals and objectives of the project Answer: B AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Moderate 103) The manager in an e-learning program who pays the bills is called a(n) ________. A) instructional designer B) semantic reasoner C) subject matter expert D) project sponsor Answer: D AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Easy 104) Which of the following functions does a project sponsor perform in an e-learning program? A) deciding on the course content B) assessing the participants of the course C) developing best strategies for the success of the program D) defining project goals and paying the bills Answer: D AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Easy

28 ..


105) What role does a project manager in an e-learning program play? A) bringing content to life and making it accessible B) tracking progress from kickoff to completion C) developing knowledge for a course D) defining the objectives and goals of the course Answer: B AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Easy 106) A(n) ________ is a self-contained digital resource embedded in an e-learning course that can be edited and reused for other purposes. A) learning object B) learning applet C) mashup learning D) dashboard knowledge Answer: A AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Easy 107) A(n) ________ is an information system used to deliver e-learning courses, track student progress, manage educational records, and offer other features such as online registration, assessment tools, collaborative technologies, and payment processing. A) expert system B) learning management system C) online analytical processing system D) expert learning system Answer: B AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Easy 108) Which of the following best describes the Sharable Content Object Reference Model (SCORM)? A) guidelines that facilitate the use of multimedia files in learning objects B) guidelines that allow learning management systems to be delivered online over the Internet C) guidelines that govern how e-learning objects communicate with the LMS on a technical level D) guidelines that allow users to integrate social networks into learning management systems Answer: C AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Moderate 29 ..


109) Which of the following instructional technologies enables synchronous interaction in elearning? A) collaborative groupware B) video on demand C) webcasting D) video mail Answer: A AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Easy 110) Which of the following instructional techniques does not support asynchronous interaction? A) video mail B) webcasting C) whiteboard D) wiki Answer: C AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Easy 111) Videos on demand that are used as an instructional technology are based on ________. A) synchronous interaction B) classroom-based learning C) asynchronous interaction D) shared labs Answer: C AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Easy 112) Which of the following instructional technologies enables asynchronous interaction in elearning? A) virtual classrooms B) audio conferencing C) collaborative groupware D) webcasting Answer: D AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Easy 30 ..


113) Which of the following instructional technologies can be used only when the students and the instructor are in the same location at the same time? A) video conferences B) smartboards C) wikis D) webcasting Answer: B AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Moderate 114) Which of the following is a feature of massive open online courses? A) They rely on instructor-based testing and feedback. B) They always carry academic credit. C) They accept only select students. D) They are offered through a third party. Answer: D AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Easy 115) Discuss the three main types of intellectual capital. Answer: The three main types of intellectual capital are human capital, social capital, and structural capital. Human capital includes the competencies and knowledge possessed by an organization's employees. Social capital describes the number and quality of all the relationships an organization's employees maintain, not just with one another but with clients, customers, suppliers, and prospective employees. Structural capital consists of the knowledge stored as documentation about business processes, procedures, policies, contracts, transactions, patents, research, trade secrets, and other aspects of an organization's operations, often stored electronically. AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Moderate

31 ..


116) How is explicit knowledge different from tacit knowledge? Answer: Explicit knowledge refers to knowledge that can be documented and codified. It is stored in information systems, on websites, in spreadsheets, or in handbooks and manuals. Tacit knowledge, on the other hand, encompasses the insights, judgment, creative processes, and wisdom that come from learning and long experience in a field, as well as from many trials and errors. Tacit knowledge may be difficult to document as it is so ingrained in people's mind that they may not be consciously aware that they possess it, or that other people do not share it. AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Moderate 117) What is knowledge management? Answer: Knowledge management refers to a set of strategies and practices organizations use to become more systematic about managing intellectual capital. It is a field of study in which researchers investigate all the roles these intangible assets play, how they contribute to competitive advantage and productivity, and how human behavior interacts with efforts to capture and share knowledge. Knowledge management is a spirited field, drawing people from many different disciplines. Some focus heavily on the role technology plays in capturing and managing intellectual capital. Others stress the human and organizational elements, noting that the success of knowledge management efforts depends less on technology than on people's willingness to participate. AACSB: Information Technology Chapter LO: 9.1 Describe the three types of intellectual capital and show how both explicit and tacit knowledge contribute to intellectual capital. Difficulty: Moderate 118) Discuss the key steps involved in knowledge management. Answer: The key steps involved in knowledge management are identifying goals, locating sources, capturing knowledge, and lastly, organizing, sharing, and valuing knowledge. Identifying the precise goal of the project can be best determined by studying an organization's specific needs. Once the organization identifies its goal, it next locates the sources of relevant knowledge. The third step is to capture the knowledge. Before people can take advantage of intellectual capital, it must be captured. The best strategies for doing this depend on the kind of knowledge one seeks and how it can be stored. The fourth step is to organize, share, and value the knowledge. The technologies used to organize knowledge vary considerably; however, most companies use the intranet which consists of document management systems. These systems help add tags and metadata to the contents of a document management system, track document versions, and assign roles, amongst the many functions they perform. AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Moderate

32 ..


119) What are expert locator tools? Answer: Expert locator tools utilize technology to find people in an organization with specific types of expertise, based on their education, experience, and activities. Many expert locator tools draw on directories, in which each employee maintains an online profile that includes details about projects, publications, or other hints of expertise. These systems often include workflow tools so that if the first expert does not answer, the query is routed to the next. Expert locator tools can crawl through databases, websites, email, project summaries, and other electronic documents to find relevant expertise. AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Moderate 120) Discuss how social network analysis can help in locating sources of relevant knowledge. Answer: Social network analysis refers to the process of tracking down key individuals who are tightly integrated into informal networks through which information flows. This technique maps and measures the strength of relationships between individuals and groups represented as nodes in the network. The measures provide insights into network clusters and the roles different people play as leaders or connecting bridges to other networks. They pinpoint the loners who interact with few others. The technique also uncovers those who play pivotal roles as bridges to other groups, both inside and outside an organization. AACSB: Information Technology Chapter LO: 9.2 Describe the steps in launching a knowledge management program, providing examples of the applicable technologies. Difficulty: Moderate 121) What are some of the challenges faced while sharing knowledge in an organization? Answer: Some employees in an organization tend to actively hoard knowledge, perceiving that their value to the organization drops as they share expertise with others. Employees may also judge that time spent adding to any knowledge base means time away from their other productive activities. They may become free riders and actively use the knowledge base to achieve their own goals, but they do not add to it. Their free riding eventually causes others to drop out as well, as they observe the imbalance. People may also be reluctant to share their timesaving tips because employers might then require higher workloads. In addition, enthusiastic early contributors to the knowledge base may get turned off as their content is critiqued or corrected by others. AACSB: Information Technology Chapter LO: 9.3 Explain how the human element can pose challenges for knowledge management projects and how managers can overcome them. Difficulty: Moderate

33 ..


122) What are the various technology and content hurdles faced in knowledge management? Answer: Overly complicated technology with long learning curves and high price tags stalls many knowledge management projects. An intuitive, user-friendly interface encourages people to actually log in. If the technology is smoothly integrated into the system that people use every day anyway, it is more likely to be used. The quality of the content in the knowledge repository is another key element in its success. If it is stale or inaccurate, people will quickly learn to distrust the entries. Too little content can also cause people to abandon the project. If they repeatedly search the repository for answers that are not there, they will look elsewhere and the knowledge base will eventually wither. AACSB: Information Technology Chapter LO: 9.3 Explain how the human element can pose challenges for knowledge management projects and how managers can overcome them. Difficulty: Moderate 123) What is a semantic web? Answer: A semantic web is one in which online resources and their relationships can be read and understood by computers as well as human beings. This kind of a web makes relationships clear for software agents so that they can effectively perform complex tasks. The semantic web relies on the resource description framework (RDF) to describe resources and properties. It also makes it possible for agents to integrate information from many different databases and collections with different structures, terms, and entity names. AACSB: Information Technology Chapter LO: 9.3 Explain how the human element can pose challenges for knowledge management projects and how managers can overcome them. Difficulty: Moderate 124) What is self-paced e-learning? Answer: E-learning might be designed as self-paced e-learning, in which students use online materials independently, with little or no instructor involvement. They might read texts, watch narrated presentations, play videos, and then take quizzes. Their successful completion of the course demonstrates mastery of the material and readiness to move on to more advanced topics. These self-paced learning programs are especially useful for gaining structural knowledge about company policies or information systems. Self-paced learning is also widely used for technical training. AACSB: Information Technology Chapter LO: 9.4 Describe several different approaches to e-learning. Difficulty: Moderate

34 ..


125) What are the three different kinds of e-learning approaches? Answer: The three different kinds of e-learning approaches are self-paced e-learning, instructor-led e-learning, and hybrid e-learning. In self-paced e-learning, students use online materials independently, with little or no instructor involvement. On the other hand, instructorled e-learning consists of a teacher who guides students through the course, often using virtual classrooms, email, phone, discussion forums, and other collaborative technologies. Hybrid elearning blends online activities with in-class sessions to create a rich learning experience. AACSB: Information Technology Chapter LO: 9.4 Describe several different approaches to e-learning. Difficulty: Moderate 126) What are the components of a successful e-learning management team? Answer: A successful e-learning team consists of a subject matter expert, an instructional designer, a project sponsor, and a project manager. A subject matter expert is the person who knows what should be included in the course and possesses the content expertise. An instructional designer on the other hand, is the person who brings the knowledge and skills about what strategies work best for e-learning. The instructional designer helps bring the content to life, and also makes sure the content is accessible to people with disabilities. The project's sponsor defines the project's goals and pays the bills for the program. Finally, a project manager coordinates all these activities, tracking progress from kickoff to completion. AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Moderate 127) How do simulations help in making an e-learning program successful? Answer: Online activities that simulate a scenario and invite the learner to make choices that lead to different consequences help encourage active, experiential learning. A great advantage of simulations is that they offer people a chance to practice skills without risk to themselves or to others. Business students can practice budgeting without risk of bankruptcy. Medical simulations allow physicians to diagnose and prescribe for simulated patients, and military simulations let officers try out battle tactics in different settings. AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Moderate

35 ..


128) Discuss how collaboration tools contribute to the functioning of e-learning programs. Answer: E-learning takes advantage of a variety of collaboration tools to function. Discussion forums, shared workspaces, blogs, and wikis offer useful ways for instructors and students to interact asynchronously. Virtual worlds, web conferences, and interactive video systems support synchronous interaction. Web-conferencing systems features make them ideal for e-learning as participants can see what the meeting host selects to show-presentation slides, a software application, a website, or an interactive whiteboard. They can interact using webcams and microphones or submit comments and questions using text chat. Other features include file sharing, polling, and the ability to create "breakout rooms" so small groups can work together privately and then come together with the other groups later to report. The virtual classroom also offers features to accommodate the human element and gives students ways to express themselves nonverbally. They can also pass private "notes" to one another during a class. AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Moderate 129) What were the initial differences between corporate and educational e-learning that were observed? Answer: Initially, universities and corporations took different approaches to e-learning. Corporations built many self-paced e-learning modules that employees could take on their own time to improve their skills or achieve certifications. Instructor-led training was conducted mainly in classrooms, not online. In contrast, colleges and universities leaned toward simulating the learning experience of a face-to-face class led by a faculty member. The faculty pioneers who experimented with e-learning created their own courses. The learning management system for business emphasized integration with human resources, compliance training, and professional development tracking, while the educational products followed a course model, with syllabus, library access, gradebooks, test banks, and many collaborative tools-wikis, blogs, forums, profiles, and more. AACSB: Information Technology Chapter LO: 9.5 Explain how e-learning programs are created, including use of a learning management system and learning analytics. Difficulty: Moderate

36 ..


Introduction to Information Systems, 5e (Wallace) Chapter 10 Ethics, Privacy, and Security 1) When a person tries to judge what action would create the greatest good for the greatest number, he or she is using a utilitarian scheme. Answer: TRUE AACSB: Ethical Understanding and Reasoning Abilities Chapter LO: 10.1 Define ethics, describe two ethical frameworks, and explain the relationship between ethics and the law. Difficulty: Easy 2) Laws always result from the pushes and pulls of lobbying efforts, political pressures, and have nothing to do with ethics. Answer: FALSE AACSB: Information Technology Chapter LO: 10.1 Define ethics, describe two ethical frameworks, and explain the relationship between ethics and the law. Difficulty: Easy 3) Laws cover all ethical principles because they are grounded in ethical principles. Answer: FALSE AACSB: Information Technology Chapter LO: 10.1 Define ethics, describe two ethical frameworks, and explain the relationship between ethics and the law. Difficulty: Easy 4) All ethical actions are legal, but not all legal actions are ethical. Answer: FALSE AACSB: Ethical Understanding and Reasoning Abilities Chapter LO: 10.1 Define ethics, describe two ethical frameworks, and explain the relationship between ethics and the law. Difficulty: Easy 5) Digitization of intellectual property (IP) results in better enforcement of IP laws. Answer: FALSE AACSB: Information Technology Chapter LO: 10.2 Explain how intellectual property and plagiarism pose challenges for information ethics, and describe technologies that are used to deal with them. Difficulty: Easy 6) Trade secrets, software, patents, and copyrighted works comprise intellectual property. Answer: TRUE AACSB: Information Technology Chapter LO: 10.2 Explain how intellectual property and plagiarism pose challenges for information ethics, and describe technologies that are used to deal with them. Difficulty: Easy 1 ..


7) Plagiarism refers to borrowing the words of another and crediting the source. Answer: FALSE AACSB: Information Technology Chapter LO: 10.2 Explain how intellectual property and plagiarism pose challenges for information ethics, and describe technologies that are used to deal with them. Difficulty: Easy 8) Using fake names, nicknames, free email, and public computers ensures that one is perfectly anonymous on the internet. Answer: FALSE AACSB: Information Technology Chapter LO: 10.3 Describe information privacy and strategies to protect it, and explain why organizations may implement surveillance. Difficulty: Easy 9) A drawback of using proxy servers for online anonymity is the need to rely on the company that operates the proxy servers and its promise to protect its customers' identities. Answer: TRUE AACSB: Information Technology Chapter LO: 10.3 Describe information privacy and strategies to protect it, and explain why organizations may implement surveillance. Difficulty: Easy 10) Liability is a powerful driver for surveillance as employers are held responsible for employees' offensive emails or web-surfing habits. Answer: TRUE AACSB: Information Technology Chapter LO: 10.3 Describe information privacy and strategies to protect it, and explain why organizations may implement surveillance. Difficulty: Easy 11) The downside of using surveillance techniques at work is that it pits management against staff. Answer: TRUE AACSB: Information Technology Chapter LO: 10.3 Describe information privacy and strategies to protect it, and explain why organizations may implement surveillance. Difficulty: Easy 12) Honeypots are human-made threats that barrage servers and computers every day with automated attempts to install all types of malware. Answer: FALSE AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 2 ..


13) Botnets are computers configured with specific vulnerabilities to attract different varieties of malware in the wild, study their properties, and determine who started them. Answer: FALSE AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 14) A computer which is infected with malware and is added to a group's growing botnet is known as a zombie. Answer: TRUE AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 15) Phishing attacks tend to start with an email that lures users to click on a link. Answer: TRUE AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 16) The incident response plan is used by organizational staff to categorize threats, determine the cause, preserve evidence, and get the systems back online. Answer: TRUE AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 17) Biometric identifiers refer to something the user knows, such as a user ID, password, PIN, or answer to a security question. Answer: FALSE AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 18) A cognitive obstacle to strong passwords is the limited capacity of human memory. Answer: TRUE AACSB: Information Technology Chapter LO: 10.5 Explain why human behavior is often the weakest link for ethics, privacy, and security, and provide examples of strategies that can be used to counteract the weaknesses. Difficulty: Easy

3 ..


19) The single sign-on is a gateway service that permits users to log in once with a single user ID and password to gain access to multiple software applications. Answer: TRUE AACSB: Information Technology Chapter LO: 10.5 Explain why human behavior is often the weakest link for ethics, privacy, and security, and provide examples of strategies that can be used to counteract the weaknesses. Difficulty: Easy 20) Social engineering refers to extracting confidential information from information systems through legal procedures. Answer: FALSE AACSB: Information Technology Chapter LO: 10.5 Explain why human behavior is often the weakest link for ethics, privacy, and security, and provide examples of strategies that can be used to counteract the weaknesses. Difficulty: Easy 21) Equifax is a business that sells information to creditors on the status of the financial backgrounds of individuals. Answer: TRUE Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 22) When the Spamhaus website was hit with a massive distributed denial of service attack (DDOS), many wondered whether the whole internet might be in danger. Answer: TRUE Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 23) Ensuring network security against Cyber Threats is a global cooperation effort. Answer: TRUE Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 24) A collection of computers that have been compromised by malware and used to attack other computers is known as a ________. A) malware attack B) botnet C) distributed denial of service (DDoS) D) phishing attack Answer: B Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 4 ..


25) A DDoS botnet attack on major social media sites began with foreign entities trying to silence a single blogger posting about the conflict between Russia and Georgia. Answer: TRUE Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 26) What led to the take down of the largest botnet that launched attacks on Microsoft and scams on stock markets? A) Microsoft cooperated with the US government on providing server data. B) One of the members of the hacking gang turned in the rest of the hackers for asylum. C) 8 years of international cooperation from 35 nations D) None of the above Answer: C Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 27) What example below is not something botnets attempt to capture in their attacks? A) user IDs B) Social Security numbers C) classified data D) text message communications Answer: D Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 28) Ransomware attacks are the least common type of cybersecurity threat. Answer: FALSE Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 29) Why are ransomware criminals difficult to track? A) groups are in foreign countries where governments do not cooperate B) groups leave behind no traces of their hacking code C) groups shut down and rebrand themselves when law enforcement gets close to them D) none of the above Answer: C Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy

5 ..


30) What was the source of the Equifax data breach? A) open-source software B) compromised employee passwords C) malware bots D) down firewall Answer: A Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 31) How does Spamhaus help limit spam? A) by maintaining a "block list" containing the IP addresses believed to originate spam and malware B) by alerting organizations when hackers compromise their email systems C) both A and B D) neither A nor B Answer: C Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 32) What are the challenges Spamhaus and other entities fighting spam must contend with in the future? A) The internet is growing and many new top-level domains (TLDs) are approved. B) Community policing is not perfect and that block lists can contain false positives that harm legitimate businesses. C) It is time-consuming and expensive for companies to work through the process to clear spam. D) All of the above Answer: D Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 33) ________ refers to a system of moral principles that human beings use to judge right and wrong, and to develop rules of conduct. A) Religion B) Ethics C) Creativity D) Theology Answer: B AACSB: Ethical Understanding and Reasoning Abilities Chapter LO: 10.1 Define ethics, describe two ethical frameworks, and explain the relationship between ethics and the law. Difficulty: Moderate

6 ..


34) ________ is an ethical framework that judges the morality of an action based on how well it adheres to broadly accepted rules, regardless of the action's actual consequences. A) Utilitarianism B) Legal positivism C) Natural laws and rights D) Rationalism Answer: C AACSB: Ethical Understanding and Reasoning Abilities Chapter LO: 10.1 Define ethics, describe two ethical frameworks, and explain the relationship between ethics and the law. Difficulty: Easy 35) Which of the following statements is true of natural laws and rights? A) Natural laws and rights do not consider the actual consequences of an action when judging its morality. B) Natural laws and rights is an ethical framework that takes into account the effects of an action, weighing its good effects against its harmful ones. C) Natural laws and rights involve judging what action would create the greatest good for the greatest number of people. D) Natural laws and rights is a framework based on the central tenet that states, "The needs of the many outweigh the needs of the few." Answer: A AACSB: Ethical Understanding and Reasoning Abilities Chapter LO: 10.1 Define ethics, describe two ethical frameworks, and explain the relationship between ethics and the law. Difficulty: Moderate 36) Which of the following principles is consistent with the natural laws and rights ethical framework? A) First, do no harm. B) Thou shalt not kill. C) The greatest good for the greatest number. D) The needs of the many outweigh the needs of the few. Answer: B AACSB: Ethical Understanding and Reasoning Abilities Chapter LO: 10.1 Define ethics, describe two ethical frameworks, and explain the relationship between ethics and the law. Difficulty: Moderate

7 ..


37) ________ is a widely accepted ethical system that considers the greatest good for the greatest number and considers the consequences of an action, weighing its positive effects against its harmful ones. A) Structuralism B) Individualism C) Utilitarianism D) Libertarianism Answer: C AACSB: Ethical Understanding and Reasoning Abilities Chapter LO: 10.1 Define ethics, describe two ethical frameworks, and explain the relationship between ethics and the law. Difficulty: Easy 38) Which of the following principles is consistent with the utilitarian ethical framework? A) First, do no harm. B) Thou shalt not kill. C) Protect free speech. D) Liberté, égalité, fraternité. Answer: A AACSB: Ethical Understanding and Reasoning Abilities Chapter LO: 10.1 Define ethics, describe two ethical frameworks, and explain the relationship between ethics and the law. Difficulty: Moderate 39) ________ consists of intangible assets which are expressions of the human mind that give the creator of the property the right to its commercial value. A) Immovable property B) Freehold property C) Intellectual property D) Public property Answer: C AACSB: Information Technology Chapter LO: 10.2 Explain how intellectual property and plagiarism pose challenges for information ethics, and describe technologies that are used to deal with them. Difficulty: Easy 40) Which of the following is an example of intellectual property owned by an IT firm? A) software code B) real estate C) office stationery D) legal documents Answer: A AACSB: Information Technology Chapter LO: 10.2 Explain how intellectual property and plagiarism pose challenges for information ethics, and describe technologies that are used to deal with them. Difficulty: Easy 8 ..


41) Enforcing intellectual property laws becomes difficult when ________. A) it is used for commercial purposes B) the protection of intellectual property involves immovable assets C) it is digitized D) it comprises tangible assets Answer: C AACSB: Information Technology Chapter LO: 10.2 Explain how intellectual property and plagiarism pose challenges for information ethics, and describe technologies that are used to deal with them. Difficulty: Moderate 42) Which of the following is an accurate definition of digital rights management? A) It deals with provisions that protect the privacy and security of individually identifiable health information. B) It refers to technologies that intellectual property owners use to control access to their digital content. C) It prohibits businesses from sending misleading or deceptive commercial emails, but denies recipients any legal digital recourse on their own. D) It establishes privacy rights over educational records. Answer: B AACSB: Information Technology Chapter LO: 10.2 Explain how intellectual property and plagiarism pose challenges for information ethics, and describe technologies that are used to deal with them. Difficulty: Easy 43) Which of the following is a drawback of digital rights management encountered by users today? A) DRM systems prevent legitimate duplication of digital content in the event of hardware failure. B) DRM systems do not function efficiently across geographical borders. C) DRM systems often violate intellectual property rights of creators of IP. D) DRM systems do not consistently manage the different formats of digital content. Answer: A AACSB: Information Technology Chapter LO: 10.2 Explain how intellectual property and plagiarism pose challenges for information ethics, and describe technologies that are used to deal with them. Difficulty: Moderate

9 ..


44) Halcyon, an e-publisher, has recently decided to use an information system that administers the way its customers access its online publications. The system assigns each customer with a unique ID, maintains records of the books purchased by them, encrypts electronic documents for transmission, and includes options to order hard copies of the electronic documents they read online. Which of the following refers to the set of technologies used in this case? A) online identity management (OIM) B) digital rights management (DRM) C) Internet resource management (IRM) D) inventory management (IM) Answer: B AACSB: Analytic Thinking Chapter LO: 10.2 Explain how intellectual property and plagiarism pose challenges for information ethics, and describe technologies that are used to deal with them. Difficulty: Moderate 45) Digital rights management (DRM) offers IP holders the benefit of ________. A) preventing loss of critical organizational data B) collaborating online to create open source products C) adding visual appeal to their digital products D) offering technological protection for their products Answer: D AACSB: Information Technology Chapter LO: 10.2 Explain how intellectual property and plagiarism pose challenges for information ethics, and describe technologies that are used to deal with them. Difficulty: Moderate 46) ________ is a type of intellectual property theft that involves reproducing the words of another and passing them off as one's own original work, without crediting the source. A) Shadowing B) Plagiarism C) Incitement D) Embezzlement Answer: B AACSB: Ethical Understanding and Reasoning Abilities Chapter LO: 10.2 Explain how intellectual property and plagiarism pose challenges for information ethics, and describe technologies that are used to deal with them. Difficulty: Easy

10 ..


47) Margaret O'Connor is an upcoming poet from Georgia who recently updated her blog with her piece of writing titled, "Shadows." One of her readers copied her piece onto his own blog and passed it off as his original work. This is an example of ________. A) online identity theft B) embezzlement C) shadowing D) plagiarism Answer: D AACSB: Analytic Thinking Chapter LO: 10.2 Explain how intellectual property and plagiarism pose challenges for information ethics, and describe technologies that are used to deal with them. Difficulty: Moderate 48) Which of the following statements is true of information privacy? A) It is most easily achieved online and is impossible to maintain on paper. B) It is governed by laws that are universal in all countries. C) It refers to the protection of data about individuals. D) It emphasizes the importance of sharing data over protecting personally identifiable information. Answer: C AACSB: Ethical Understanding and Reasoning Abilities Chapter LO: 10.3 Describe information privacy and strategies to protect it, and explain why organizations may implement surveillance. Difficulty: Easy 49) Which of the following is an element of privacy? A) the right to be left alone B) the right to view, correct, and edit private, protected information C) the right to withhold taxes D) the right to demand information Answer: A AACSB: Ethical Understanding and Reasoning Abilities Chapter LO: 10.3 Describe information privacy and strategies to protect it, and explain why organizations may implement surveillance. Difficulty: Easy 50) Under which of the following circumstances is information privacy most difficult to achieve? A) when information is stored on highly interconnected systems B) when information is mainly on paper C) when information is maintained on isolated systems D) when information is converted to code form using mathematical equations Answer: A AACSB: Information Technology Chapter LO: 10.3 Describe information privacy and strategies to protect it, and explain why organizations may implement surveillance. Difficulty: Moderate 11 ..


51) Which of the following is an advantage of online anonymity? A) It increases individuals' accountability and makes them feel responsible for their own actions. B) It helps in the prosecution of spammers, and other cyber criminals. C) It helps people participate in face-to-face meetings where they reveal personal details without fear of disclosure. D) It protects corporate whistleblowers and political activists in oppressive regimes. Answer: D AACSB: Ethical Understanding and Reasoning Abilities Chapter LO: 10.3 Describe information privacy and strategies to protect it, and explain why organizations may implement surveillance. Difficulty: Moderate 52) A drawback of online anonymity is that it ________. A) protects whistleblowers and oppressive governments B) increases inhibitions in online communication C) increases accountability of users D) protects spammers and terrorists Answer: D AACSB: Ethical Understanding and Reasoning Abilities Chapter LO: 10.3 Describe information privacy and strategies to protect it, and explain why organizations may implement surveillance. Difficulty: Easy 53) A ________ is an intermediary server that receives and analyzes requests from clients and then directs them to their destinations. A) captive portal B) proxy C) firewall D) keylogger Answer: B AACSB: Information Technology Chapter LO: 10.3 Describe information privacy and strategies to protect it, and explain why organizations may implement surveillance. Difficulty: Easy

12 ..


54) Which of the following is a drawback of using a proxy server to ensure online anonymity? A) the parasitic and unauthorized use of hundreds of computer systems owned by individuals for masking online identity B) the lack of uniform and binding legislation across different countries that determines the legality of using proxy servers C) the need to rely on the promise of the company that operates the proxy to protect its customers' identities D) the inability to consistently ensure online anonymity, especially when government agencies are among the parties involved Answer: C AACSB: Information Technology Chapter LO: 10.3 Describe information privacy and strategies to protect it, and explain why organizations may implement surveillance. Difficulty: Moderate 55) Which of the following is a reason why employers adopt surveillance technologies to track online communications? A) to increase employee productivity B) to enable efficient data mining C) to prevent data redundancy D) to facilitate faster communication Answer: A AACSB: Information Technology Chapter LO: 10.3 Describe information privacy and strategies to protect it, and explain why organizations may implement surveillance. Difficulty: Easy 56) ________ are used to monitor email, web surfing, and other online communications in organizations. A) Proxy servers B) Surveillance technologies C) Trojan horses D) Subnetworks Answer: B AACSB: Information Technology Chapter LO: 10.3 Describe information privacy and strategies to protect it, and explain why organizations may implement surveillance. Difficulty: Moderate

13 ..


57) Which of the following is potentially a negative impact of surveillance in online communications? A) lowered productivity of employees B) compromised company security C) increased levels of confidentiality D) increased pressure on corporate email systems Answer: A AACSB: Information Technology Chapter LO: 10.3 Describe information privacy and strategies to protect it, and explain why organizations may implement surveillance. Difficulty: Moderate 58) What is the first step involved in risk management? A) determining the cause of damage B) evaluating controls and filling in security gaps C) understanding what information assets need protection D) recovering the system from damage Answer: C AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 59) Lora Jones is a security expert hired by a Manhattan-based law firm to perform a formal risk assessment of the firm's data assets. Which of the following steps should she undertake first in order to assess the firm's readiness to face any potential security breaches? A) understanding which information assets need protection B) evaluating controls and filling in security gaps C) predicting future risks and devising strategies to prevent them D) recovering existing assets from damage Answer: A AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate

14 ..


60) Which of the following statements is true of honeypots? A) They deny the entry or exit of specific IP addresses, products, internet domains, and enforce other communication restrictions. B) They are highly restrictive programs that permit communication only with approved entities and/or in an approved manner. C) They traverse available web links to discover documents for indexing and retrieval. D) They have specific vulnerabilities that attract different varieties of malware in the wild. Answer: D AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 61) Which of the following is an accurate definition of malware? A) software for end-user applications such as word processors and ERP software B) software used to test a hardware or software package C) software used to track and prevent malicious attacks on systems D) software designed to attack computer systems Answer: D AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 62) The term ________ refers to configured computers with specific vulnerabilities so they can attract different varieties of malware in the wild, study their properties, and find out who started them. A) expert systems B) web crawlers C) honeypots D) server farms Answer: C AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 63) Which of the following is an accurate definition of a computer virus? A) It is a software program that can damage files or other programs. B) It is a software program that attracts potentially malicious attacks to study their origin. C) It is a software program that masks the browsing history and preferences of internet users. D) It is a software program that inspects incoming or outgoing traffic to a computer network. Answer: A AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 15 ..


64) The term ________ refers to a seemingly harmless or useful program that installs malicious code allowing remote access to a computer, as for a botnet. A) honeypot B) Trojan horse C) firewall D) black swan Answer: B AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 65) Botnets function with the use of ________. A) malware B) middleware C) application software D) firmware Answer: A AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 66) The term ________ refers to a collection of computers that have been compromised by malware, often through some vulnerability in their software or operating system. A) honeypot B) botnet C) Trojan horse D) black swan Answer: B AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 67) For which of the following purposes are botnets most likely to be used? A) capturing Internet users' sensitive information B) attracting different types of malware to track their origins C) encrypting critical information to protect it from loss or corruption D) tracking and eliminating computer worms and viruses Answer: A AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 16 ..


68) When does a computer become a zombie? A) when it becomes immune to botnets B) when it enters a secure site C) when it is infected by malware D) when it is hidden behind a firewall Answer: C AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 69) The term ________ refers to software that monitors a user's activity on a computer and on the Internet, often installed without the user's knowledge. A) honeypot B) browser C) black swan D) spyware Answer: D AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 70) Evelyn Birch is a freelance content writer whose desktop computer has been infected with a software program that installed itself without her knowledge. The program monitors the websites she visits, her email communications, etc. Data gathered from the monitoring activity is sent to a remotely located hacker. Which of the following is most likely to have infected Evelyn's computer? A) spyware B) web crawler C) black swan D) firewall Answer: A AACSB: Analytic Thinking Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate

17 ..


71) Which of the following is an accurate definition of a keylogger? A) a process which helps a user increase productivity by deleting spam emails before they reach him B) monitoring software that records a user's keystrokes C) software that prevents fraudsters from hacking into email accounts D) a program that controls permissions for web traffic into and out of a computer network Answer: B AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 72) A ________ is a self-replicating program that sends copies to other nodes on a computer network and may contain malicious code intended to cause damage. A) honeypot B) worm C) Trojan horse D) cookie Answer: B AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 73) In Internet terminology, a worm refers to a(n) ________. A) email program created not for communication but to lure spam B) software program that attracts malicious attacks in order to study their properties and origins C) self-replicating program that sends copies to other nodes on a computer network D) software tool used to inspect incoming and outgoing traffic to a computer network Answer: C AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 74) ________ refers to an attack in which computers in a botnet are directed to flood a single website server with rapid-fire page requests, causing it to slow down or crash. A) Distributed denial of service B) Social engineering C) Keylogging D) Phishing Answer: A AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 18 ..


75) Which of the following is true of phishing? A) It is the process of stealing personal data from a victim by convincing him or her to disclose information. B) It is useful in monitoring the web traffic into and out of an unsecured computer network. C) It involves the use of several thousand computers to launch malicious attacks that can cripple websites. D) It uses small pieces of code inserted into a browser that track an internet user's activity and transmit the data to third parties. Answer: A AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 76) Janet received an email that contained a link to a website that imitated the authentic website of her bank. The email requested her to key in her credit card number, her Social Security number, and her date of birth. She later found that her credit card was fraudulently charged for transactions she never made. It is inferred from this case that Janet is a victim of ________. A) distributed denial of service B) keylogging C) phishing D) cache poisoning Answer: C AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 77) Which of the following methods is often used for phishing purposes? A) posting harmless videos on websites B) monitoring a user's keystrokes C) soliciting personal information through emails D) infecting computers with self-replicating programs that slow down the systems Answer: C AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate

19 ..


78) ________ refers to an attempt to steal passwords or other sensitive information by persuading the victim to enter the information into a fraudulent website that masquerades as the authentic version. A) Whitelisting B) Keylogging C) Egress filtering D) Phishing Answer: D AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 79) What is the step involved in risk management after vulnerabilities of an organization have been examined? A) determination of the source of threats B) assessment of threats C) evaluation of controls that fill in security gaps D) finalization of broadly defined goals Answer: C AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 80) A(n) ________ lists out and rates the vulnerabilities of an organization. A) risk matrix B) incident response plan C) public key encryption scheme D) social engineering plan Answer: A AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 81) Which of the following administrative security controls is most likely to be adopted by a company which handles high-level sensitive information? A) prohibiting downloading data to USB drives B) restricting employee access to official mail C) prohibiting public access to the company's website D) prohibiting entry of employees into shared workspaces Answer: A AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 20 ..


82) One way to identify a threat in an incident response plan is to ________. A) prosecute the offender for security risk B) improve system efficiency C) communicate with a crisis management team D) preserve evidence of security breach Answer: C AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 83) According to the incident response plan, which of the following would be most useful in containing any damage caused by a security threat? A) preserve evidence of damage done B) reevaluate risk matrix C) restrict system access D) investigate system logs for evidence Answer: C AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 84) ________ help(s) in determining the cause of a security threat in an incident response plan. A) Reevaluating the risk matrix B) Investigating system logs C) Taking systems offline D) Restricting system access Answer: B AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 85) ________ is one way of recovering systems in an incident response plan. A) Prosecuting the offender for a security risk B) Reevaluating the risk matrix C) Restricting system access D) Restoring from media known to be undamaged Answer: D AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy

21 ..


86) An incident response plan is created for the purpose of ________. A) managing discussion forums efficiently B) responding to customers' feedback C) avoiding chaos and missteps D) improving communication modes Answer: C AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 87) Organizations use a(n) ________ to categorize a security threat, determine its cause, preserve any evidence, and get systems back online so they can resume business. A) risk matrix B) incident response plan C) vulnerability assessment scheme D) total quality management program Answer: B AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 88) Which of the following technologies is most likely to be used by organizations as an authentication strategy? A) intelligent character recognition B) optical mark recognition C) voice pattern recognition D) blood group recognition Answer: C AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 89) Which of the following authentication strategies is the easiest to compromise or crack? A) iris configuration B) reliance on user knowledge C) fingerprint analysis D) voice pattern recognition Answer: B AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy

22 ..


90) Which of the following authentication strategies is the most difficult to forge, crack, or copy and is hence used for physical security? A) password B) RFID chip C) fingerprint scanner D) credit card Answer: C AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 91) Which of the following technologies serves as a biometric identifier for physical security? A) iris configuration B) RFID chip C) credit card D) user ID-password combination Answer: A AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 92) Which of the following is an accurate definition of multifactor authentication? A) the process of assessing authentication of reports and manuals to prevent duplication B) the process of combining two or more authentication strategies C) the process of assessing authentication of multiple groups using a single strategy D) the process of assigning unique authentication information to copyrighted content in order to prevent resale Answer: B AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 93) ________ is a process which transforms data using mathematical formulas, so that no one can read the data unless they know the key to unscrambling it. A) Wear leveling B) Write amplification C) Decipherment D) Encryption Answer: D AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 23 ..


94) Which of the following statements is true of encryption? A) It is a powerful technical control that protects sensitive data. B) It helps recover encoded files through an image processor even if the user forgets the password. C) It allows application of notification laws when an organization loses sensitive information. D) It increases the level of risk assessments when it is used for backup data. Answer: A AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 95) Which of the following is a feature of public key encryption? A) It uses a single point key to encrypt and decrypt data. B) It uses a pair of keys, one to encrypt the data and the other to decrypt data. C) It uses multiple numbers of keys accessible to all members of an organization. D) It uses a duplication process to replicate keys. Answer: B AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 96) Which of the following is a technical control that helps secure information flow in an organization? A) The information system enforces approved authorizations for access to the system. B) The information system enforces the organization's policy about human review. C) The information system automatically disables accounts after a time period defined by the organization. D) The information system defines the information to be encrypted or stored offline in a secure location. Answer: B AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate

24 ..


97) Which of the following administrative control actions helps enforce approved authorizations for access to systems in an organization? A) The organization requires appropriate approvals for requests to establish accounts. B) The organization defines the security policy that determines what events require human review. C) The organization defines the information to be encrypted or stored offline in a secure location. D) The organization separates duties of individuals as necessary to prevent malevolent activity without collusion. Answer: C AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 98) Which of the following is true of public key encryption? A) The encryption formulas used for creating the keys are simple in nature and identical at both ends. B) The encryption key is widely shared with everyone, while the decryption key is known only to the recipient. C) The private key is used for encryption and is known only to the sender, while the public key is freely distributed among everyone and is used for decryption. D) The public key encryption scheme uses a single key to encrypt data that can later be decrypted by using the encrypted data as the key. Answer: B AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 99) A ________ is a technical control that inspects a network's incoming and outgoing traffic and either blocks or permits it according to rules the organization establishes. A) botnet B) Trojan horse C) keylogger D) firewall Answer: D AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy

25 ..


100) Which of the following functions does a firewall perform? A) It ensures security by using multiple authentication strategies for employees. B) It attracts malicious attacks to study their properties and origins. C) It defines which IP addresses or domain names should be blocked. D) It encodes sensitive data to ensure safe transmission across unsecured networks. Answer: C AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 101) Which of the following systems are used to combat spam? A) conversational programming systems B) intrusion prevention systems C) executive information systems D) expert systems Answer: B AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Easy 102) What of the following is a drawback of cloud computing? A) It delivers computing as a product rather than a service. B) Data protection laws are not uniform across countries. C) Resources are difficult to share because information is maintained on a protected server. D) It provides computation that requires end-user knowledge of the physical location and configuration of the system that delivers services. Answer: B AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 103) ________ makes it more difficult for a hacker to break into passwords. A) Creating easy to remember passwords B) Reusing the same password in news and games sites through multiple systems C) Maintaining a single, secure password for all accounts D) Creating passwords with symbols, mixed cases, and characters Answer: D AACSB: Information Technology Chapter LO: 10.5 Explain why human behavior is often the weakest link for ethics, privacy, and security, and provide examples of strategies that can be used to counteract the weaknesses. Difficulty: Moderate

26 ..


104) A ________ is a gateway service that permits users to log in once, with one specific user ID and password, to gain access to multiple software applications. A) Single sign-on B) Canonical account C) Pre-shared key D) Shadow password Answer: A AACSB: Information Technology Chapter LO: 10.5 Explain why human behavior is often the weakest link for ethics, privacy, and security, and provide examples of strategies that can be used to counteract the weaknesses. Difficulty: Easy 105) Which of the following precautions need to be taken in order to create a secure password? A) Personal information should not be used in passwords. B) Consistently similar character types should be used. C) A single, memorable password should be used for all logins. D) Passwords should rarely be changed. Answer: A AACSB: Information Technology Chapter LO: 10.5 Explain why human behavior is often the weakest link for ethics, privacy, and security, and provide examples of strategies that can be used to counteract the weaknesses. Difficulty: Easy 106) A single sign-on is implemented by organizations for the purpose of ________. A) ensuring that unique passwords are used to securely access single software applications any number of times B) reducing the cognitive load associated with multiple passwords C) helping a user sign on through the process of fingerprint identification D) defining which IP addresses and domain names can be accessed from an organization's computers Answer: B AACSB: Information Technology Chapter LO: 10.5 Explain why human behavior is often the weakest link for ethics, privacy, and security, and provide examples of strategies that can be used to counteract the weaknesses. Difficulty: Moderate 107) ________ is the art of manipulating people into breaking normal security procedures or divulging confidential information. A) Password munging B) Shouldersurfing C) Social engineering D) Astroturfing Answer: C AACSB: Information Technology Chapter LO: 10.5 Explain why human behavior is often the weakest link for ethics, privacy, and security, and provide examples of strategies that can be used to counteract the weaknesses. Difficulty: Easy 27 ..


108) Which of the following is a reason why humans are soft targets for social engineering? A) need for anonymity B) respect for authority C) need for privacy D) desire to be disconnected from others Answer: B AACSB: Information Technology Chapter LO: 10.5 Explain why human behavior is often the weakest link for ethics, privacy, and security, and provide examples of strategies that can be used to counteract the weaknesses. Difficulty: Easy 109) Which of the following is an accurate definition of scareware? A) It is a kind of anti-spam process which relies on the human desire to use malware. B) It is a kind of social engineering used to persuade people that a computer is infected when it is not. C) It is a type of software that prevents users from downloading malware by displaying warnings. D) It is software which provides a shield against spam and mirrors it back into the network. Answer: B AACSB: Information Technology Chapter LO: 10.5 Explain why human behavior is often the weakest link for ethics, privacy, and security, and provide examples of strategies that can be used to counteract the weaknesses. Difficulty: Easy 110) Which of the following laws establishes requirements that govern how personally identifiable information on individuals is collected, used, and disseminated by federal agencies? A) the CAN-SPAM Act B) the Privacy Act of 1974 C) the State Security Breach Notification Laws D) the Gramm-Leach-Bliley Act Answer: B AACSB: Information Technology Chapter LO: 10.5 Explain why human behavior is often the weakest link for ethics, privacy, and security, and provide examples of strategies that can be used to counteract the weaknesses. Difficulty: Moderate

28 ..


111) Which of the following is an accurate description of the Privacy Act of 1974? A) It prohibits businesses from sending misleading or deceptive commercial emails but denies recipients any legal recourse on their own. B) It stipulates how financial institutions are required to protect the privacy of consumers' personal financial information and notify them of their privacy policies annually. C) It establishes requirements that govern how personally identifiable information on individuals is collected, used, and disseminated by federal agencies. D) It requires organizations to notify state residents if sensitive data are released. Answer: C AACSB: Information Technology Chapter LO: 10.5 Explain why human behavior is often the weakest link for ethics, privacy, and security, and provide examples of strategies that can be used to counteract the weaknesses. Difficulty: Moderate 112) What does the Family Educational Rights and Privacy Act (FERPA) stipulate? A) protecting privacy rights of European students outside the continent B) establishing privacy rights over educational records C) prohibiting educational institutes from sending misleading or deceptive commercial emails to prospective students D) permitting transfer of private data to third parties to contribute toward educational processes Answer: B AACSB: Information Technology Chapter LO: 10.5 Explain why human behavior is often the weakest link for ethics, privacy, and security, and provide examples of strategies that can be used to counteract the weaknesses. Difficulty: Easy 113) Which of the following laws prohibits businesses from sending misleading or deceptive commercial emails, but denies recipients any legal recourse on their own? A) CAN-SPAM Act B) Gramm-Leach-Bliley Act C) European Union's Data Protection Directive D) State Security Breach Notification Law Answer: A AACSB: Information Technology Chapter LO: 10.5 Explain why human behavior is often the weakest link for ethics, privacy, and security, and provide examples of strategies that can be used to counteract the weaknesses. Difficulty: Easy

29 ..


114) Which of the laws stipulates how financial institutions are required to protect the privacy of consumers' personal financial information and notify them of their privacy policies annually? A) the CAN-SPAM Act B) the State Security Breach Notification Laws C) the Privacy Act of 1974 D) the Gramm-Leach-Bliley Act Answer: D AACSB: Information Technology Chapter LO: 10.5 Explain why human behavior is often the weakest link for ethics, privacy, and security, and provide examples of strategies that can be used to counteract the weaknesses. Difficulty: Moderate 115) Which of the following provisions does the Gramm-Leach-Bliley Act make? A) limiting the disclosure of personally identifiable information that is maintained by state departments of motor vehicles B) stipulating how financial institutions are required to protect the privacy of consumers' financial information and notify them of their privacy policies C) prohibiting businesses from sending misleading or deceptive commercial emails but denying recipients any legal recourse on their own D) establishing provisions to protect the privacy and security of individually identifiable health information Answer: B AACSB: Information Technology Chapter LO: 10.5 Explain why human behavior is often the weakest link for ethics, privacy, and security, and provide examples of strategies that can be used to counteract the weaknesses. Difficulty: Easy 116) Which of the following is a provision of the State Security Breach Notification Laws? A) They require organizations to inform state residents if sensitive data are released. B) They require companies to provide "opt out" choices before transferring personal data to third parties. C) They prohibit businesses from sending misleading or deceptive commercial emails to representatives of the state. D) They include provisions to protect the privacy and security of individually identifiable health information. Answer: A AACSB: Information Technology Chapter LO: 10.5 Explain why human behavior is often the weakest link for ethics, privacy, and security, and provide examples of strategies that can be used to counteract the weaknesses. Difficulty: Easy

30 ..


117) Which of the following is true of the European Union's Data Protection Directive? A) It requires fraudulent companies working for the European Union to maintain a do-not-spam list. B) It prohibits businesses from sending misleading or deceptive commercial emails, but denies recipients any legal recourse on their own. C) It establishes privacy as a fundamental human right for EU citizens. D) The law is less restrictive than U.S. laws. Answer: C AACSB: Information Technology Chapter LO: 10.5 Explain why human behavior is often the weakest link for ethics, privacy, and security, and provide examples of strategies that can be used to counteract the weaknesses. Difficulty: Easy 118) What is utilitarianism and how is it different from natural laws and rights? Answer: Natural laws and rights judge the morality of an action based on how well it adheres to broadly accepted rules, regardless of the action's actual consequences. "Right to a free press" is an example of natural laws and rights. A second framework, called utilitarianism, considers the consequences of an action, weighing its good effects against its harmful ones. "First, do no harm" is an example of utilitarianism, and as such, it is a precept of medical ethics ensuring physicians will heavily weigh the possible harmful consequences of each remedy. In many situations, both ethical approaches will lead people to the same conclusion about the proper action. But ethical dilemmas tend to arise when the application of different systems leads to different judgments about what is the ethical thing to do. AACSB: Ethical Understanding and Reasoning Abilities Chapter LO: 10.1 Define ethics, describe two ethical frameworks, and explain the relationship between ethics and the law. Difficulty: Moderate 119) What is intellectual property and what significance does it hold in an organization? Answer: Intellectual property is a bedrock of an organization's intellectual capital and comprises intangible assets such as music, written works, software, art, designs, movies, creative ideas, discoveries, inventions, and other expressions of the human mind. Most societies have developed a maze of copyright laws, patents, and legal statutes to protect intellectual property rights. These give the creator of the property the right to its commercial value. However, enforcing all these laws is nearly impossible when the IP is digitized. Also, many think it is not a very serious ethical violation to break IP laws when the material is digitized. AACSB: Information Technology Chapter LO: 10.2 Explain how intellectual property and plagiarism pose challenges for information ethics, and describe technologies that are used to deal with them. Difficulty: Moderate

31 ..


120) What is digital rights management? Explain some challenges faced while using DRM schemes. Answer: Digital rights management (DRM) refers to technologies that software developers, publishers, media companies, and other intellectual property owners use to control access to their digital content. However, cumbersome DRM schemes tend to thwart legitimate users more than pirates. DRM often interferes with screen readers, frustrating the visually impaired who use them to turn on-screen text into speech. As the technologies mature, however, IP holders will be offered technological protection for their products without inconveniencing their customers. AACSB: Information Technology Chapter LO: 10.2 Explain how intellectual property and plagiarism pose challenges for information ethics, and describe technologies that are used to deal with them. Difficulty: Moderate 121) Discuss the pros and cons of anonymity in the online world. Answer: Anonymity in the online world has several advantages. First, it is crucial for corporate whistleblowers, police tipsters, news sources, and political activists in oppressive regimes. Second, it protects people who participate in online support groups where they reveal personal details without fear of disclosure. However, anonymity also protects terrorists, criminals, spammers, as well as vengeful posters who can do considerable damage to innocent victims. AACSB: Information Technology Chapter LO: 10.3 Describe information privacy and strategies to protect it, and explain why organizations may implement surveillance. Difficulty: Moderate 122) What is a proxy server? What function does it serve? Answer: A proxy is an intermediary server that receives and analyzes requests from clients and then directs them to their destinations. Any network connection requires a handshake between the device and the server, so that the device's IP address, along with its location, is exposed. Hiding that information usually requires handing off the transmission to a proxy. The transmission then appears to come from the proxy, not the actual sender. A drawback to using the proxy server to ensure anonymity is the need to rely on the company that operates the proxy and its promise to protect its customers' identities. Another approach depends instead on a distributed network of servers. The encrypted transmission is relayed from one server to the next, and no single server has access to all the addresses that relayed any particular message. AACSB: Information Technology Chapter LO: 10.3 Describe information privacy and strategies to protect it, and explain why organizations may implement surveillance. Difficulty: Moderate

32 ..


123) What is the purpose of using surveillance technologies in organizations? How do they help in protecting information and monitoring productivity? Answer: Surveillance technologies to monitor email, web surfing, and other online communications are readily available to all organizations. These techniques are used for a range of purposes like employer liability for allowing harassment or hostile work environments, the need to protect security and confidentiality, employee productivity, and concerns about bogging down corporate email systems with personal email. Security concerns about trade secrets also prompt employers to keep tabs on communications. Employers sometimes step up surveillance on employees who will soon be departing and who might decide to take confidential customer lists or other proprietary information with them. AACSB: Information Technology Chapter LO: 10.3 Describe information privacy and strategies to protect it, and explain why organizations may implement surveillance. Difficulty: Moderate 124) Discuss some of the possible drawbacks of implementing surveillance technologies at workplaces. Answer: Though adopting surveillance at workplaces has quite a few benefits, it also has its disadvantages. Despite concerns about "cyberslacking," surveillance itself can sometimes cause a drop in productivity. It may lead to employees feeling that the employer does not trust them. Pitting management against staff, surveillance can undermine the bond of loyalty that might otherwise develop and that can help an organization succeed. Monitored employees may also suffer more stress, depression, and anxiety, resulting in increased absenteeism and lower productivity. It is essential that whatever policies the company chooses to implement, managers should make sure everyone understands what those policies are, and the reasons for adopting them. AACSB: Information Technology Chapter LO: 10.3 Describe information privacy and strategies to protect it, and explain why organizations may implement surveillance. Difficulty: Moderate 125) Discuss how malware and botnets threaten the security of intellectual property. Answer: Malware refers to malicious software designed to attack computer systems. Botnets refer to a collection of computers that have been compromised by malware, often through some vulnerability in their software or operating system. Criminal gangs activate their botnets to capture user IDs, passwords, credit card numbers, Social Security numbers, and other sensitive information. It gives them access to transfer funds, steal identities, and purchase products, or they might just sell the information to other criminals. They also rent out their zombie armies to various customers, such as spammers who use them to relay the millions of unsolicited messages that now comprise the vast majority of Internet email traffic. Malware often gets installed when an innocent user downloads a screen saver or other seemingly benign freebie. Without the user's knowledge, the infected computer becomes a zombie added to the gang's growing botnet. AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 33 ..


126) What is the purpose of a risk matrix in an organization? Answer: An organization's risk assessment examines its vulnerabilities to determine how effective its existing security measures are. The risk matrix lists the vulnerabilities in a table, and managers rate the level of risk each one presents in areas such as confidentiality, company reputation, finances, or downtime. The matrix also includes an estimate of how likely that event might be, and managers may add other metrics to further refine the analysis for their own organizations. The matrix helps focus attention on the vulnerabilities that pose the greatest potential dangers. AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 127) What is an incident response plan and what are the steps involved in it? Answer: An incident response plan is used to avoid chaos and missteps when something happens, and helps staff categorize the threat, determine the cause, preserve any evidence, and also get the systems back online so the organization can resume business. It consists of five major steps. The first is to identify the threat by communicating with the crisis management team. Next is to contain the damage which involves taking systems offline and restricting system access. The third step is to determine the cause which involves investigating logs and preserving evidence. The fourth step is to recover the systems by restoring from media known to be good and getting the organization up and running. The last step consists of evaluating lessons learned by prosecuting the offender, improving systems, and reevaluating the risk matrix. AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 128) Discuss any two kinds of authentication strategies used in organizations. Answer: Technical controls for preventing unauthorized access draw on technologies that can authenticate people and determine what access privileges they should be granted. Reliance on user knowledge is the simplest strategy, although in many ways the weakest and easiest to crack. Financial institutions especially have expanded password security to require the user to have several pieces of knowledge, or to link each login to a particular IP address. They also take the precaution of sending the PIN to account holders by mail in a letter separate from the user ID. Biometric identifiers are also widely used, especially for physical security, since they are more difficult to crack, forge, or copy. AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate

34 ..


129) Write a brief note on encryption of digital information. Answer: A powerful technical control that protects sensitive data is encryption. This process transforms the data using mathematical formulas, so that no one can read it unless they know the key to unscrambling it. A user can encrypt individual files on a computer, or the whole disk drive, by adding a password, but he will not be allowed to retrieve the information if he forgets it. Encryption is so effective that if an organization loses sensitive information that was encrypted, notification laws do not apply. AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 130) How does a firewall help in preventing intrusion into information systems? Answer: A firewall is a technical control in an organization that inspects incoming and outgoing traffic and either blocks or permits it according to rules the organization establishes. The firewall can be a hardware device or a software program, and its rules regulate traffic based on different levels of trust. The rules might state that any other server in the same domain is trustworthy, so traffic would pass easily between them. External traffic from the Internet, however, would need different rules. These systems also include features to detect suspicious events and alert managers immediately. AACSB: Information Technology Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 131) Discuss social engineering and explain why humans are soft targets for social engineers. Answer: Social engineering is the art of manipulating people into breaking normal security procedures or divulging confidential information. Humans are tempting targets for those with malicious intent who understand such behavior. One weak spot is the human desire to help others. People routinely pass virus-laden hoaxes along to friends and neighbors, trying to be helpful. Respect for authority is another common human tendency that intruders exploit, relying on uniforms, titles, or just verbal hints that the company president wants something done. Humans are certainly not immune to greed, and scammers tap this human frailty routinely to persuade people to turn over confidential information or money. Ironically, another highly effective bit of social engineering relies on the human desire to avoid malware. AACSB: Information Technology Chapter LO: 10.5 Explain why human behavior is often the weakest link for ethics, privacy, and security, and provide examples of strategies that can be used to counteract the weaknesses. Difficulty: Moderate

35 ..


132) What are some of the key elements that a security awareness program should comprise? Answer: Organizations should have robust security awareness programs to help educate and continually remind people about the risks that lax security presents. The program should cover the organization's own policies and procedures, as well as laws and regulations about how information should be handled to ensure compliance. Beyond legal compliance requirements, a security awareness program should also alert people to the many ways in which social engineering can exploit human tendencies toward kindness, helpfulness, greed, or just productivity. It should provide training in tools such as encryption and help people to spot areas in which breaches might occur. Finally, it should reinforce the principle that the organization has an ethical responsibility to maintain information security. AACSB: Information Technology Chapter LO: 10.5 Explain why human behavior is often the weakest link for ethics, privacy, and security, and provide examples of strategies that can be used to counteract the weaknesses. Difficulty: Moderate

36 ..


Introduction to Information Systems, 5e (Wallace) Chapter 11 Systems Development and Procurement 1) The goal of the planning phase of the systems development life cycle (SDLC) is to define the business need for a project. Answer: TRUE AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 2) A feasibility study is an important part of the analysis stage of the systems development life cycle (SDLC). Answer: FALSE AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 3) The person who leads a requirements analysis needs to have a solid background in business management and information systems. Answer: TRUE AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 4) A process diagram traces how each process operates from beginning to end clearly to all the stakeholders. Answer: TRUE AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 5) Business process reengineering was criticized because it overemphasized the importance of the human element in managing business processes. Answer: FALSE AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 6) Screen attractiveness is an example of a performance requirement in a system. Answer: FALSE AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy

1 ..


7) The choice of software development environments and hardware architecture is affected by the experience and capabilities of an organization's IT staff. Answer: TRUE AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 8) A use case diagram will show the series of steps involved in the implementation process of a system. Answer: FALSE AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 9) End-users with disabilities should be considered in the design phase of the systems development life cycle (SDLC). Answer: TRUE AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 10) A project- and issue-tracking software offers customizable dashboards to developers that help them see at a glance how a project is coming along. Answer: TRUE AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 11) A code review is a peer review process in which programmers familiar with a project check over one another's work to ensure it is well documented and properly written. Answer: TRUE AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 12) In acceptance testing, tests are conducted by an organization's IT staff to assess how well a system performs under peak loads. Answer: FALSE AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy

2 ..


13) A phased implementation is an expensive process that launches a new system while the old one is still running. Answer: FALSE AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 14) Often, the only logical choice for the implementation of small systems is a direct implementation strategy. Answer: TRUE AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 15) A drawback of the waterfall method is the inability to make changes to previous stages once they are complete. Answer: FALSE AACSB: Information Technology Chapter LO: 11.2 Describe three major software development strategies. Difficulty: Easy 16) Agile software development methods use a highly structured approach in which tasks are sequenced according to the systems development life cycle (SDLC). Answer: FALSE AACSB: Information Technology Chapter LO: 11.2 Describe three major software development strategies. Difficulty: Easy 17) A reason why the waterfall method is still in use is because business managers are comfortable with its logical and familiar structure. Answer: TRUE AACSB: Information Technology Chapter LO: 11.3 Explain why organizations choose one software development strategy over another for particular projects. Difficulty: Easy 18) Prepackaged software is a good option for business functions that do not need to offer competitive advantage. Answer: TRUE AACSB: Information Technology Chapter LO: 11.4 Explain how organizations decide whether to build or buy and the steps they use if they choose to buy an information system. Difficulty: Easy

3 ..


19) A disadvantage of custom system development is that it involves high overall cost and requires more time before going live. Answer: TRUE AACSB: Information Technology Chapter LO: 11.4 Explain how organizations decide whether to build or buy and the steps they use if they choose to buy an information system. Difficulty: Easy 20) A systems integrator is a special kind of consultant who has expertise in making the different hardware and software components of an information system work together. Answer: TRUE AACSB: Information Technology Chapter LO: 11.5 Identify several ways in which the human element is important for systems development and procurement. Difficulty: Easy 21) ________ is the first step in the systems development life cycle (SDLC), which defines the business need for a project, assesses its importance to the company, and determines whether the project is feasible. A) Testing B) Planning C) Maintenance D) Development Answer: B AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 22) Jonathan has joined a new software company in Manhattan and has been assigned the task of developing an internal communications system. He begins the task by assessing how the system will help in efficiently coordinating the projects that the company handles and in determining the feasibility of the system. In the given scenario, Jonathan is in the ________ step of the systems development life cycle (SDLC). A) testing B) planning C) design D) maintenance Answer: B AACSB: Information Technology; Analytical Thinking Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Moderate

4 ..


23) Info Labs Inc., a marketing communications company, launches a project at a fixed cost of $180,000. What is the amount of savings earned from the project per month if it returns the investment in 3 years? A) $5,000 B) $7,000 C) $9,000 D) $10,000 Answer: A AACSB: Information Technology; Analytical Thinking Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Difficult 24) ________ is a driver of information systems development that touches on security, privacy, safety, and regulatory compliance. A) Customer relationship management B) Return on investment C) Competitive advantage D) Ensuring compliance and risk reduction Answer: D AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 25) A ________ is an important part of the planning stage of the systems development life cycle (SDLC) and examines whether an initiative is viable from technical, financial, and legal standpoints. A) procurement analysis B) feasibility study C) market share analysis D) brand assessment Answer: B AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 26) ________ is a process in which stakeholders identify the features that a project will need and then prioritize them as mandatory, preferred, or nonessential. A) Requirements analysis B) Informative modeling C) Acceptance testing D) A Feasibility study Answer: A AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy

5 ..


27) Mike, a research analyst, is in the analysis phase of a project, the goal of which is the development of smile shutter technology in cameras. Mike first identifies and analyzes the integral elements that need to be included in the technology such as red eye removal, blink detection, and face identification and then prioritizes them as mandatory, preferred, or nonessential. Which of the following processes is being illustrated in the given scenario? A) probabilistic analysis B) competitive analysis C) requirements analysis D) amortized analysis Answer: C AACSB: Information Technology; Analytical Thinking Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Moderate 28) The major function of a process diagram is to trace ________. A) process operations from beginning to end clearly to all stakeholders B) the errors that could possibly creep into the process during the analysis stage of the SDLC C) the maintenance cost of an initiative D) the implementation cost of an initiative Answer: A AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 29) An early form of business process management (BPM) that was developed as a means to make sweeping changes to eliminate all processes that did not add value was known as ________. A) business process reengineering B) business process mapping C) business process automation D) business process modeling Answer: A AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 30) Michael Hammer's business process reengineering was criticized because it ________. A) overemphasized the importance of people in business processes B) reiterated redesign as a major contributor to the failure of most business processes C) failed to realize that the human element is key to improving business processes D) emphasized the importance of processes that do not necessarily add value to business Answer: C AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Moderate

6 ..


31) Which of the following is a function of a requirements definition document (RDD)? A) emphasizing the impact that information systems have on business processes B) specifying the features that an information system should have C) conducting the S.W.O.T. analysis of the business' industry D) estimating the maintenance cost of a business process Answer: B AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 32) Which of the following is an example of the security requirements included in a requirements definition document (RDD)? A) screen attractiveness B) response time C) encryption D) user navigation Answer: C AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 33) Components such as response time, availability, and scalability are examples of the ________ included in a requirements definition document (RDD). A) security requirements B) performance requirements C) accessibility requirements D) language requirements Answer: B AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 34) Screen attractiveness is an example of the ________ included in a requirements definition document (RDD). A) compliance requirements B) integration requirements C) security requirements D) usability requirements Answer: D AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy

7 ..


35) Tom Daniels, an employee of a telecommunications company, is developing software that would enable customers to activate value-added services in a matter of seconds. Which of the following requirements is Tom developing if he is working to improve the visual appeal of the interface and to enhance the ease of learning the software? A) compliance requirements B) integration requirements C) security requirements D) usability requirements Answer: D AACSB: Information Technology; Analytical Thinking Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Difficult 36) User navigation and data display are examples of the ________ included in a requirements definition document RDD. A) compliance requirements B) security requirements C) interface requirements D) integration requirements Answer: C AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 37) Which of the following features is most likely an example of the usability requirements included in a requirements definition document (RDD)? A) complex navigation B) high task efficiency C) bright, flashy graphics D) high accessibility for people with disabilities Answer: B AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 38) Lee works for Pink Net Worldwide Inc., an advertising company in California. Lee is developing software to improve the process of coordination with clients. Which of the following requirements is he concentrating on if he is interfacing the clients' software with a few of the information systems that are currently functioning within the company? A) compliance requirements B) usability requirements C) integration requirements D) performance requirements Answer: C AACSB: Information Technology; Analytical Thinking Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Moderate 8 ..


39) Sam Torres, a security officer at a content management firm, is required to monitor the people coming in and going out of the organization and ensure data privacy through the process of encryption. Which of the following types of requirements is Sam focusing on in the given scenario? A) interface requirements B) language requirements C) usability requirements D) security requirements Answer: D AACSB: Information Technology; Analytical Thinking Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Moderate 40) ________ an information system is typically the best choice for a business when the available systems support common business functions, such as financial or human capital management. A) Promoting B) Selling C) Building D) Buying Answer: D AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 41) A general rule of thumb is that an organization should consider buying software rather than building it if the ________. A) software can meet 75% to 80% of all business requirements B) existing software would require extensive customization C) organization needs to retain its business processes with only slight variations D) software needs to fit enterprise architecture perfectly Answer: A AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 42) Which of the following best describes service-oriented architecture (SOA)? A) systems created with mutually dependent software components B) systems with a single software component that handles all the service functions C) systems assembled from relatively independent software components D) systems with a single software component that handles one important service function Answer: C AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 9 ..


43) Service-oriented architecture is especially useful in ________ companies. A) agile B) static C) slow-moving D) dying Answer: A AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 44) The ________ phase is a technical blueprint for a whole system which captures all aspects of how the system's components will function together to accomplish goals, using descriptions, diagrams and models. A) maintenance B) design C) testing D) implementation Answer: B AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 45) A use case diagram is used to indicate how ________. A) direct implementation is carried out in companies B) users can switch from one operating system to another C) database tables are interconnected with one another D) different types of users will interact with a system Answer: D AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 46) Johanna Taylor, a creative developer at Leo Technologies Inc., is developing a website for the company. To address the usability needs of website visitors, she ensures that visitors would be able to easily locate what they need on the website. She avoids flashy graphics and chooses a font with high readability. Joanna is most likely in the ________ stage of the SDLC. A) testing B) design C) maintenance D) implementation Answer: B AACSB: Information Technology; Analytical Thinking Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Moderate

10 ..


47) The use case diagram is a standardized graphic used by designers to ________. A) improve communication and clarity, documenting the system's components and the behaviors it is expected to perform B) establish clarity in audio models of object-oriented and software-intensive systems C) test and repair implemented software systems and hence establish clarity in communication D) design information systems using flashy graphics and multi-dimensional animations Answer: A AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 48) Which of the following should be undertaken during the design phase of the systems development life cycle (SDLC)? A) defining the business need for a project B) keeping in mind end users with disabilities C) conducting risk analysis for a project D) estimating a project's likely return on investment Answer: B AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 49) Which of the following is the primary goal of the development phase of the systems development life cycle (SDLC)? A) analyzing and documenting what a system should do for a business B) translating the requirements definition document into a workable design C) converting a design into a fully operational information system D) calculating the return on investment for a business project Answer: C AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 50) Which of the following functions does the version control software perform? A) allowing developers to interact with different versions of a system simultaneously B) allowing developers to track different versions of news feeds once they are put on networks C) allowing developers to write over one another's files to efficiently integrate data D) allowing developers to track versions of the source code during development Answer: D AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy

11 ..


51) Which of the following functions does a project-and issue-tracking software perform? A) comparing and analyzing a project with a competitor's project in the market B) enforcing checkout procedures to prevent developers from writing over another's files C) allowing customers to estimate the sales of a product before its launch in the market D) maintaining a complete history of project activity, including dates and tasks assigned Answer: D AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 52) The ________ offers customizable dashboards so that developers can see at a glance how a process is coming along, what activities they need to complete in a day, and how they can keep abreast of all aspects of the process. A) project- and issue-tracking software B) mind mapping software C) keystroke logging software D) version control software Answer: A AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 53) ________ is a peer review process in which programmers familiar with the project and the development environment check over one another's work to ensure it is well documented and properly written. A) Double-blind review B) Single-blind review C) Adversarial review D) Code review Answer: D AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 54) Testing is a part of the ________ phase of the systems development life cycle (SDLC). A) analysis B) development C) implementation D) planning Answer: B AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy

12 ..


55) Joshua Lee, an engineer at Footprints Inc., is provided with a design by the creative team in his company for creating software that would help travel agents answer and track traveler requests efficiently. He is now converting the design into an operational information system. Which of the following phases of the SDLC is the software currently in? A) analysis phase B) development phase C) implementation phase D) planning phase Answer: B AACSB: Information Technology; Analytical Thinking Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Moderate 56) ________ is a type of testing for information systems that involves programmers checking the functionality of small modules of code during the development phase of the systems development life cycle (SDLC). A) Unit testing B) System testing C) Integration testing D) Acceptance testing Answer: A AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 57) Which of the following types of testing involves both end users and IT staff testing the functionality of an entire IS? A) system testing B) parallel testing C) unit testing D) acceptance testing Answer: A AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 58) The type of testing that involves end users performing final testing to determine whether a project is complete as specified is known as ________. A) stress testing B) parallel testing C) unit testing D) acceptance testing Answer: D AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 13 ..


59) Which of the following is involved in the integration testing process for information systems? A) checking the functionality of small modules of code during the development phase B) testing a new system's interfaces with other software components it links to C) determining whether a project is complete as specified by the end user D) conducting tests to assess how well a system performs under peak loads Answer: B AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 60) Which of the following types of testing for information systems is conducted to assess how well a system performs under peak loads? A) stress testing B) parallel testing C) unit testing D) system testing Answer: A AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 61) Which of the following is a type of testing for information systems where developers use the same input and compare the new system's output to the output generated by the system it is replacing? A) stress testing B) parallel testing C) unit testing D) acceptance testing Answer: B AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 62) Which of the following do all types of information system tests mimic? A) problems the IT staff are likely to face while developing the system B) events the system is likely to handle when it goes live C) challenges advertisers are likely to face while promoting the system D) maintenance issues the users are likely to face while using the system Answer: B AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy

14 ..


63) Independent testers are critical in testing information systems mainly because ________. A) programmers are not the best testers when testing their own code B) programmers are generally too busy to test their codes C) federal law mandates third-party feedback before a system is approved by an organization D) most state laws mandate third-party feedback before a system is approved by an organization Answer: A AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 64) Which of the following will take place in a parallel implementation of an information system? A) launching the new system while the old one is still running B) launching two similar systems with different outputs at the same time C) switching off the old system when new processes are running D) launching modules of the new system in phases rather than all at once Answer: A AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 65) A ________ of an information system launches the new system while the old one is still running and employees either do their jobs twice or two separate teams handle the same processes. A) phased implementation B) direct implementation C) parallel implementation D) pilot implementation Answer: C AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 66) Which of the following is an advantage of a parallel implementation of an information system? A) The process is inexpensive and thus can be undertaken over a long period of time. B) There are two systems processing the same case, both of which should have the same output. C) The existing process is automatically switched off when new processes are running. D) The implementation makes each system process distinctly different cases. Answer: B AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy

15 ..


67) Which of the following is a disadvantage of a parallel implementation of an information system? A) The process cannot provide the same result that is produced by the existing system. B) The process is expensive in nature and is usually in place for only a short period. C) The process switches off the old system when two new processes are running. D) The process can run only old systems as it does not have the setup to operate on new systems. Answer: B AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 68) Escapade Inc., a travel agency in Sydney, is using a highly expensive implementation process for a short period of time. It launches the new system while the old one is still running and employees must do their jobs twice, once on each system. Which of the following is the company using? A) parallel implementation B) phased implementation C) direct implementation D) pilot implementation Answer: A AACSB: Information Technology; Analytical Thinking Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Moderate 69) A disadvantage of a ________ is that the new system's modules may be tightly integrated, so implementing one without the others may create some confusion and require temporary interfaces to the old systems. A) phased implementation B) direct implementation C) parallel implementation D) pilot implementation Answer: A AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 70) Which of the following occurs during a phased implementation? A) focusing on different departmental groups at a time B) launching the new system while the old one is still running C) focusing on launching modules in steps rather than all at once D) launching all the modules of the new system on a single go-live date Answer: C AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy

16 ..


71) A ________ switches off the old system and launches all the modules of the new one on a single, very hectic go-live date, sometimes called the "big bang." A) phased implementation B) direct implementation C) parallel implementation D) pilot implementation Answer: B AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 72) A major advantage of a ________ is that people whose roles span modules do not have to switch back and forth between old and new modules. A) phased implementation B) direct implementation C) parallel implementation D) pilot implementation Answer: B AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 73) A ________ is often the only logical implementation strategy for smaller systems. A) phased implementation B) direct implementation C) pilot implementation D) parallel implementation Answer: B AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 74) The ________ refers to a process which organizations put into place to manage and prioritize requests to add new features to an information system. A) conformity assessment B) calibration process C) change control process D) requirements analysis Answer: C AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy

17 ..


75) Which of the following best describes legacy systems? A) new systems which are unable to replace old systems B) new systems which are replicas of old regal systems C) old systems which are built on aging or obsolete architectures D) old systems that are no longer in use Answer: C AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Easy 76) The ________ involves the sequential occurrence of systems development life cycle tasks, with one activity starting only after the previous one has been completed. A) iterative method B) agile method C) waterfall method D) Gauss-Seidel method Answer: C AACSB: Information Technology Chapter LO: 11.2 Describe three major software development strategies. Difficulty: Easy 77) The ________ phase of the waterfall method involves nailing down requirements, at which point the developers estimate the time and resources needed to complete a project. A) analysis B) implementation C) development D) testing Answer: A AACSB: Information Technology Chapter LO: 11.2 Describe three major software development strategies. Difficulty: Easy 78) Which of the following is a drawback of the waterfall method? A) It is unable to adapt to changes in the business landscape. B) Several activities occur at the same time, which makes it hard to monitor them. C) Once a task is completed, it cannot be changed. D) Its SDLC tasks occur in a nonsequential manner. Answer: A AACSB: Information Technology Chapter LO: 11.2 Describe three major software development strategies. Difficulty: Easy

18 ..


79) The ________ compresses the time horizon for software development and focuses on the time available until the next release while the development team determines how many of the requirements it can deliver in that timeframe. A) iterative method B) waterfall method C) agile D) V-model Answer: A AACSB: Information Technology Chapter LO: 11.2 Describe three major software development strategies. Difficulty: Easy 80) ________ refers to the creation of software prototypes that can be shared with users for receiving feedback, so that developers can make improvements before a lot of effort is spent building a fully functioning version. A) Incremental development B) Social engineering C) Agile software development D) Rapid application development Answer: D AACSB: Information Technology Chapter LO: 11.2 Describe three major software development strategies. Difficulty: Easy 81) In the ________, tasks are not sequenced according to the systems development life cycle (SDLC) and many activities occur simultaneously. A) V-model method B) agile method C) iterated method D) waterfall method Answer: B AACSB: Information Technology Chapter LO: 11.2 Describe three major software development strategies. Difficulty: Easy 82) ________ is an agile method for software development that relies on tightly knit, cohesive teams that do sprints of 2 to 4 weeks each. A) Scrum B) Extreme programming C) Spiral modeling D) V-modeling Answer: A AACSB: Information Technology Chapter LO: 11.2 Describe three major software development strategies. Difficulty: Easy

19 ..


83) An agile method that focuses on frequent releases of workable software and short time boxes for development is known as ________. A) Scrum programming B) extreme programming C) prototype modeling D) incremental modeling Answer: B AACSB: Information Technology Chapter LO: 11.2 Describe three major software development strategies. Difficulty: Easy 84) A distinguishing feature of ________ is that developers work in pairs, reviewing one another's work, providing each other with feedback, and testing the code as it is written. A) extreme programming B) metaprogramming C) incremental modeling D) Scrum programming Answer: A AACSB: Information Technology Chapter LO: 11.2 Describe three major software development strategies. Difficulty: Easy 85) Which of the following best defines agile methods? A) They stress agile teams undertaking sequenced tasks. B) They involve agile developers who are individually responsible for delivery. C) They involve characteristics of cohesiveness and trust. D) They involve developers who are resistant to changes in requirements. Answer: C AACSB: Information Technology Chapter LO: 11.3 Explain why organizations choose one software development strategy over another for particular projects. Difficulty: Easy 86) Which of the following reasons explains why waterfall methods are still widely in use? A) It is cheap and takes very little time to rework a project using this method. B) It does not handle any changes in a project. C) It has a logical and familiar structure which is comfortable to use. D) Its goals are more focused than those of agile and iterative methods. Answer: C AACSB: Information Technology Chapter LO: 11.3 Explain why organizations choose one software development strategy over another for particular projects. Difficulty: Easy

20 ..


87) Which of the following is an advantage of custom system development? A) It has low overall costs and is inexpensive to run. B) It requires less time to go live. C) It is tailored closely to an organization's needs. D) It does not require in-house maintenance and upgrades. Answer: C AACSB: Information Technology Chapter LO: 11.4 Explain how organizations decide whether to build or buy and the steps they use if they choose to buy an information system. Difficulty: Easy 88) Which of the following is a disadvantage of custom system development? A) It does not match an organization's requirements. B) It has no strategic value that can contribute to a company's competitive advantage. C) It requires employees to change their processes completely. D) It requires long periods of time before going live. Answer: D AACSB: Information Technology Chapter LO: 11.4 Explain how organizations decide whether to build or buy and the steps they use if they choose to buy an information system. Difficulty: Easy 89) Which of the following is an advantage of prepackaged software? A) It requires a short implementation time. B) It includes new features that a company requires. C) It is always well-fitted to enterprise architecture. D) It has high overall costs. Answer: A AACSB: Information Technology Chapter LO: 11.4 Explain how organizations decide whether to build or buy and the steps they use if they choose to buy an information system. Difficulty: Easy 90) Which of the following is a disadvantage of prepackaged software? A) It does not employ an industry's best practices to handle the processes. B) It requires an organization to change its business processes. C) It involves high costs and a long implementation time. D) It does not work for applications that offer few competitive advantages. Answer: B AACSB: Information Technology Chapter LO: 11.4 Explain how organizations decide whether to build or buy and the steps they use if they choose to buy an information system. Difficulty: Easy

21 ..


91) A ________ is a request sent to software vendors describing a new system that an organization requires in broad, high-level terms, to which interested vendors can respond by describing the products and services that could fit the requirement. A) request for proposal B) request for information C) request for quotation D) request for tender Answer: B AACSB: Information Technology Chapter LO: 11.4 Explain how organizations decide whether to build or buy and the steps they use if they choose to buy an information system. Difficulty: Easy 92) Which of the following includes a high-level description of a system that an organization is on the lookout for? A) request for proposal B) request for information C) request for quotation D) request for tender Answer: B AACSB: Information Technology Chapter LO: 11.4 Explain how organizations decide whether to build or buy and the steps they use if they choose to buy an information system. Difficulty: Easy 93) A ________ is an invitation to software companies to submit a formal bid, including a detailed description of their products, services, and costs. A) request for proposal B) request for application C) request for quotation D) request for tender Answer: A AACSB: Information Technology Chapter LO: 11.4 Explain how organizations decide whether to build or buy and the steps they use if they choose to buy an information system. Difficulty: Easy 94) An organization is using the best-of-breed approach if it ________. A) creates the best systems with the latest technologies available B) procures the best systems, regardless of the vendor C) procures whatever systems are offered by the best vendors in the market D) outsources the implementation to the best implementation partners in the market Answer: B AACSB: Information Technology Chapter LO: 11.4 Explain how organizations decide whether to build or buy and the steps they use if they choose to buy an information system. Difficulty: Easy 22 ..


95) The ________ procures the finest systems for each application, regardless of the vendor. A) integrated approach B) unified approach C) best-of-breed approach D) ad-hoc approach Answer: C AACSB: Information Technology Chapter LO: 11.4 Explain how organizations decide whether to build or buy and the steps they use if they choose to buy an information system. Difficulty: Easy 96) An organization is using a unified procurement approach if it ________. A) prefers systems that are offered by a single vendor B) sells systems to buyers from the same market C) buys systems from different geographic markets D) creates the best systems with the latest technologies available Answer: A AACSB: Information Technology Chapter LO: 11.4 Explain how organizations decide whether to build or buy and the steps they use if they choose to buy an information system. Difficulty: Easy 97) ________ refers to an approach in which organizations strongly prefer systems that are offered by a single vendor, which also supplies the ERP. A) Unified procurement B) Best-of-breed procurement C) Ad-hoc procurement D) Green public procurement Answer: A AACSB: Information Technology Chapter LO: 11.4 Explain how organizations decide whether to build or buy and the steps they use if they choose to buy an information system. Difficulty: Easy 98) Which of the following is an advantage of customizing a packaged solution? A) Customization adds a competitive advantage to processes that an organization cannot alter. B) There is very little scope for errors, especially in large systems, due to integrated modules. C) Vendors will be responsible for any bugs that may arise due to customization. D) Vendors find it easier to upgrade customized systems than to upgrade noncustomized systems. Answer: A AACSB: Information Technology Chapter LO: 11.4 Explain how organizations decide whether to build or buy and the steps they use if they choose to buy an information system. Difficulty: Easy 23 ..


99) Which of the following is an example of a systems integrator? A) a consultant who ensures that employees are making the best use of information systems B) a manager who, through leadership, prepares the organization for change to become dynamic C) a manager who inspires employees to work together and provide resources the project team needs D) a consultant who ensures that the hardware and software components of an IS work together Answer: D AACSB: Information Technology; Analytical Thinking Chapter LO: 11.5 Identify several ways in which the human element is important for systems development and procurement. Difficulty: Easy 100) Which of the following is a disadvantage of using consulting services? A) It gives an organization access to people who do not know the software well. B) It tends to make employees feel less ownership of a project and less committed to changes. C) It tends to assign a large number of people to a project in addition to the consultants. D) It tends to make employees get too involved in the development tasks. Answer: B AACSB: Information Technology Chapter LO: 11.5 Identify several ways in which the human element is important for systems development and procurement. Difficulty: Easy 101) BabyCenter's largest adjustment with the adoption of scrum was ________. A) cultural change was management's goal to clear the company's backlog of requirements and establish priorities based on their strategic value to competitive advantage, return on investment, or risk management B) developers were racing among projects and maintenance activities, and many were bypassing access controls and good programming practices to quickly fix bugs and get at least a few new features installed C) priorities for developing the site's new features kept changing, and were frustrated by delays in nailing down requirements and delivering design specs D) none of the above Answer: A Chapter LO: 11.3 Explain why organizations choose one software development strategy over another for particular projects. Difficulty: Moderate 102) US Strategic Command's hurdles in adjusting to an agile method included ________. A) software and technical snags B) paired programmers do about as well as the better performer of the pair but no better C) resistance to change from a traditional hierarchy to the more collaborative XP style D) all of the above Answer: C Chapter LO: 11.3 Explain why organizations choose one software development strategy over another for particular projects. Difficulty: Moderate 24 ..


103) US Strategic Command developing a pilot program for paired software design is an example of what type of agile approach? A) iterative software development methods B) Scrum C) extreme programming (XP) D) all of the above Answer: C Chapter LO: 11.3 Explain why organizations choose one software development strategy over another for particular projects. Difficulty: Moderate 104) What are success factors for global software development teams? A) the need to work hard to develop trust and the importance of frequent meetings B) the value of making everyone's work visible to all the team members C) using technology D) both A and B Answer: D Chapter LO: 11.3 Explain why organizations choose one software development strategy over another for particular projects. Difficulty: Easy 105) What are the different steps in the systems development life cycle (SDLC)? What does the first step of the SDLC entail? Answer: The systems development life cycle (SDLC) process begins with planning and goes through several phases until the system has been implemented; it then enters its maintenance period. In theory, the process encompasses seven sequential steps, although, of course, the real world is often unrulier. The seven steps are planning, analysis, design, development, testing, implementation, and maintenance. The first step in the process is planning. The goal of this step is to define the business need for a project, assess its importance to the company, and determine whether the project is actually feasible or not. AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Moderate 106) What is a feasibility study? Explain. Answer: A feasibility study is an important part of the planning process that examines whether an initiative is viable from technical, financial, and legal standpoints. It may not be technically feasible if the technologies either don't exist yet or are not mature enough to support the project's goals. Financially, the return on investment may be promising, but the organization may not have sufficient capital to fund it. A legal review may uncover grave risks that could expose the company to lawsuits. AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Moderate

25 ..


107) What is a requirements analysis? Explain. Answer: A requirements analysis is undertaken once a project has approval to proceed. In this process, stakeholders identify the features a new system will need and then prioritize them as mandatory, preferred, or nonessential. Gathering these requirements entails many meetings, interviews, and reviews of the way existing processes unfold. The person who leads this analysis needs a solid background in business management and information systems, but also outstanding listening and consensus-building skills. The stakeholders will have different views about how processes actually work and how they should be improved, especially when their own jobs are involved. A well-done requirements analysis should also uncover opportunities to optimize business processes and even eliminate some of them. AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Moderate 108) Why was business process reengineering unsuccessful as a process and criticized by users? Answer: An early form of business process management that was introduced in the 1990s was called business process reengineering (BPR). Michael Hammer proposed BPR to make sweeping changes that eliminated all processes that did not add value. Following his advice, many companies went through wrenching, expensive, and ultimately unsuccessful projects led by consultants to redesign processes throughout the organization. It soon became clear that the human element is key to managing and improving business processes, and by 1995, BPR was criticized as a fad that forgot people. BPR's objectives are sound, though, if the techniques are used in a more focused way on smaller projects in the context of new system development and overall business process management. AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Moderate 109) What is a requirements definition document? Answer: The output of the analysis phase is known as the requirements definition analysis which specifies in detail what features a system should have, prioritized by the stakeholders. It also includes assumptions and constraints that affect the system, such as the need to migrate and possibly reformat data from an existing system. Stakeholders sign off on the document, confirming that this is indeed the system they need, specified as precisely as possible. AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Moderate

26 ..


110) What are some of the key elements that need to be kept in mind during the design phase of the systems development life cycle (SDLC)? Discuss. Answer: The design phase captures all aspects of how a system's components will function together to accomplish the goal, using descriptions, models, and diagrams. It is the technical blueprint for the whole system, with all the fine print and details. The choice of software development environments and hardware architecture is a critical one. Although a particular software development environment might be marginally more efficient for a specific project, the disadvantages of a fragmented, poorly integrated architecture are too costly to ignore. The choice will also be affected by the experience and capabilities of the IT staff. This phase also addresses usability and considers the needs of all the different end users who will interact with the system. End users with disabilities should also be considered in this phase. AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Moderate 111) What is version control software? Answer: Version control software tracks versions of the code, acting like a library with checkout procedures to prevent developers from writing over one another's files. To work on a program, the developer checks it out of the library. Other developers can still view it and see who has it, but they can't make their own changes. When the developer has finished, the code is checked back into the library as the latest version, and another developer can then check it out. AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Moderate 112) What are the different features offered by project- and issue-tracking software to help developers during the design phase of the systems development life cycle (SDLC)? Answer: Project- and issue-tracking software offers useful features to help developers stay abreast of all aspects of their projects. Developers can upload diagrams and documentation, comment on activity, describe challenges, report bugs, and request assistance. The software maintains a complete history of project activity, including dates showing when each module was started and completed and who has been assigned each task. It also offers customizable dashboards so developers can see at a glance how the project is coming along and which activities they need to complete today. AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Moderate

27 ..


113) Discuss the testing phase of the systems development life cycle. Answer: Testing goes on during the development phase, as individual modules are completed. When the system has been completed, it undergoes much more rigorous testing to ensure that the whole system works smoothly together, not just its individual modules. Each test mimics events the system will handle when it goes live. The test cases are carefully documented so the developers can make corrections in case of any failures. Software tools help tremendously with this testing as well. Once developers create a library of test cases, software tools can automatically run them against the system as it evolves to test for errors. The tools can simulate an army of customers, simultaneously trying to complete a web-based form with different data, different input errors, different browsers, and different expected outcomes. Some software tools can check for security holes, compliance with accessibility regulations, performance under loads, broken web links, and more. AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Moderate 114) What is a parallel implementation process? Discuss its advantages and drawbacks. Answer: A parallel implementation process launches the new system while the old one is still running. Employees either do their jobs twice, once on each system, or two separate teams handle the same processes, one team on each system. An advantage to this approach is that both systems are processing the same cases, so if the new one is operating properly, the output should be the same. However, parallel implementation is very expensive and thus is usually in place for only a short period. Also, if the old system is being retired because it bungled some processes, the comparisons might not be valid. AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Moderate 115) How does a phased implementation process operate? Answer: A phased implementation launches modules in phases rather than all at once. For example, an ERP might start with human resources and then phase in components of the financial modules and supply chain. The implementation team and trainers can focus on one departmental group at a time, helping them become accustomed to the new software while the developers watch for glitches. A disadvantage is that the new system's modules may be tightly integrated, so implementing one without the others may create some confusion and require temporary interfaces to the old systems. For example, the human resources system will include payroll data that must be passed to the old general ledger if the new ledger isn't up and running yet. Consistency is also an issue if information is maintained in more than one place as the modules are phased in. AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Moderate

28 ..


116) Discuss the advantages and drawbacks of direct implementation. Answer: A direct implementation process switches off the old system and launches all the modules of the new one on a single, very hectic go-live date. A major advantage is that all those temporary bridges between old and new modules are unnecessary, and people whose roles span modules do not have to switch back and forth. The strategy works well for smaller systems and may be the only logical choice for them. But the risks can be high for large-scale implementations of complex software, such as the ERP, involving thousands of employees. AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Moderate 117) How are change requests handled and bugs fixed after systems go live? Answer: Despite extensive testing, no system with any complexity is bug-free. The test cases used to pound the system into shape touch on only a small subset of all the possible events and combinations. Once the system has gone live, users introduce more cases and bugs surface. Bugs also arise because the surrounding technologies evolve. Most systems continue to evolve as new features and enhancements are added after the initial launch. To manage all the bug fixes and change requests, organizations put into place a change control process. IT staff help clarify the change requests and estimate the resources required to accomplish them. They then work closely with business units and executive management to determine priorities. Backlogs of these fixes can grow very long, especially as the system gets older. AACSB: Information Technology Chapter LO: 11.1 Describe the seven phases of the systems development life cycle (SDLC). Difficulty: Moderate 118) Explain the waterfall method of software development. Discuss how it is different from the iterative method. Answer: In the waterfall method, the SDLC tasks occur sequentially, with one activity starting only after the previous one has been completed. The analysis phase nails down the requirements, and at that point the developers estimate the time and resources needed to complete the project. Different people may be engaged in each task, and they hand off their work to the next team when their part is done. While the waterfall method estimates time and resources needed based on the analysis of requirements, the iterative methods do the reverse. Iterative methods focus on the time available until the next release, or iteration, and the development team determines how many of the requirements it can deliver in that timeframe. AACSB: Information Technology Chapter LO: 11.2 Describe three major software development strategies. Difficulty: Moderate

29 ..


119) What is rapid application development? Explain. Answer: A common approach used in iterative methods that helps software developers bring an application to life more quickly is called rapid application development. Developers create a software prototype that they can share with users and get their feedback to make corrections and improvements before a lot of effort is spent building a fully functioning version. End users are much more helpful when they can see a prototype even if most of it doesn't actually work. The approach works well with the overlapping phases typical of iterative development, and it is often used in other software development approaches as well. AACSB: Information Technology Chapter LO: 11.2 Describe three major software development strategies. Difficulty: Moderate 120) What is extreme programming? What are its distinguishing features? Answer: Extreme programming (XP) is a team-based agile method that focuses on frequent releases of workable software and time boxes for development. The approach stresses four fundamental principles: coding, testing, listening, and designing. A project will start with user stories, often written on 3 X 5 index cards, and the team arranges these into a plan for the features that will be in the next software release. A distinguishing feature of XP is that developers work in pairs, reviewing one another's work, providing each other with feedback, and testing the code as it is written. Often the pair will sit side by side, viewing the same monitor and pushing the keyboard and mouse back and forth as they collaborate to come up with good coding solutions. XP's strong emphasis on testing is also an important feature, and one reason for its development was to improve software quality. AACSB: Information Technology Chapter LO: 11.2 Describe three major software development strategies. Difficulty: Moderate 121) How does organizational culture play an important part in the choosing of a particular software development strategy over another? Answer: An organization's culture plays an important part in choosing a particular software development strategy. Moving to an agile development approach, for instance, means much more than programming in pairs or adopting the colorful Scrum vocabulary. It is a cultural shift that many development teams may find uncomfortable. Agile methods need developers who welcome changes in requirements, because they understand that the ultimate goal is to develop software that users really want, not just to finish a project on time. On the other hand, the waterfall method stresses sequenced tasks, so developers who complete their task on time consider themselves successful even if the project itself is falling behind. But agile teams are collectively responsible for delivery, and team members must help one another achieve the goal to be successful. The team must be cohesive and trusting, since each member's job and career may depend on the whole team's performance. AACSB: Information Technology Chapter LO: 11.3 Explain why organizations choose one software development strategy over another for particular projects. Difficulty: Moderate

30 ..


122) What are some of the advantages and disadvantages of a prepackaged software? Answer: Prepackaged software has various advantages attached to it. It handles processes using the industry's best practices, requires a shorter implementation time, usually carries lower cost, includes vendor's new features and maintains compliance requirements, and works best for applications that offer few competitive advantages. However, it also has a few disadvantages. It does not match all the organization's requirements, requires an organization to change business processes, and may not include new features needed by the organization. AACSB: Information Technology Chapter LO: 11.4 Explain how organizations decide whether to build or buy and the steps they use if they choose to buy an information system. Difficulty: Moderate 123) What is a request for information (RFI) invitation? How is it related to a request for proposal (RFP)? Answer: During the early phases of the SDLC, IT staff and business users should be systematically exploring the landscape of prepackaged software that might fit the organization's needs. As the list of user requirements develops, a request for information (RFI) is sent out to many potential vendors to serve as their initial market scan of the options. The RFI describes the new system in broad, high-level terms, and interested vendors send responses describing their products and services. The steering committee decides whether to proceed with the design phase or buy. If the responses to the RFI and the committee's own research show some possible prepackaged options, the committee will develop a request for proposal (RFP), which is an invitation to software companies to submit a formal proposal, including a detailed description of their products, services, and costs. This invitation is sent to the most promising commercial vendors and possibly also to companies that specialize in implementing open-source products. AACSB: Information Technology Chapter LO: 11.4 Explain how organizations decide whether to build or buy and the steps they use if they choose to buy an information system. Difficulty: Moderate 124) Discuss the pros and cons of working with consultants for systems development and procurement. Answer: Implementing a new system, especially a large one from a commercial vendor, often means engaging consulting services to help configure, customize, and launch the software. One advantage of engaging consultants is that it gives an organization access to experts who know the software well. Experienced consultants have seen how different companies implement the product most effectively, and they know where the trouble spots are. Another advantage of consulting services is that the organization does not have to assign so many key people to the project full-time and then backfill their positions. However, there are also disadvantages of working with consultants. The organization's own employees will be less involved in many of the development and implementation tasks, so they will miss opportunities to learn the ins and outs of the software. They may also feel less ownership of the project and be less committed to all the changes that new processes will mean to their units. AACSB: Information Technology Chapter LO: 11.5 Identify several ways in which the human element is important for systems development and procurement. Difficulty: Moderate 31 ..


125) What are cultural impacts that a toy company, Fun Fun Toys, may face when shifting to an agile strategy? Answer: Some developers resist changes to the requirements after the analysis phase has been done. They see it as rework, and they try to lock down the requirements through written documents, contracts, and user sign-offs. Agile methods require developers who welcome changes in requirements because they understand that the ultimate goal is to develop software that users really want, not just to finish a project on time. Another cultural shift is from the "me" mentality to "we." The waterfall method stresses sequenced tasks, so developers who complete their task on time consider themselves successful even if the project itself is falling behind. But agile teams are collectively responsible for delivery, and team members must help one another achieve the goal to be successful. The team must be cohesive and trusting because each member's job and career may depend on the whole team's performance. Chapter LO: 11.3 Explain why organizations choose one software development strategy over another for particular projects. Difficulty: Difficult 126) What key concerns should a manager for an upcoming social media app, EmojiChat, consider when deciding between Scrum and other approaches? Answer: First, the choice of a development approach depends heavily on the type of project. For example, an iterative approach will work well for projects in which the requirements can be launched in discrete phases as releases. The clarity of requirements can also affect the choice. A waterfall method would work when the requirements are clear, stable, and easy to define well in advance. When business needs are changing rapidly, lengthy projects based on the waterfall method will likely fall short and an agile approach should be used. It is a cultural shift that many development teams may find uncomfortable. After years of using the waterfall method, for instance, some developers resist changes to the requirements after the analysis phase has been done. Another cultural shift is from the "me" mentality to "we." They find that agile development needs more discipline, not less, especially for larger projects, and employees need coaching and time to adjust to a team-oriented approach. Some prefer not to make that switch. To avoid the risks of the traditional waterfall method, however, companies are adapting the method to much shorter timeframes and more focused goals, using an "incremental" waterfall method and often adding agile methods into the mix. Chapter LO: 11.3 Explain why organizations choose one software development strategy over another for particular projects. Difficulty: Difficult

32 ..


Introduction to Information Systems, 5e (Wallace) Chapter 12 Information Systems Project Management and Strategic Planning 1) A project is a temporary activity that is launched for a specific purpose to carry out a particular objective. Answer: TRUE Chapter LO: 12.1 Define a project, and explain how time, cost, and scope affect it. Difficulty: Easy 2) A difference between projects and processes is that processes are unique, whereas projects are recurring. Answer: FALSE Chapter LO: 12.1 Define a project, and explain how time, cost, and scope affect it. Difficulty: Easy 3) Every project is constrained by three fundamental, interrelated forces: time, cost, and scope. Answer: TRUE Chapter LO: 12.1 Define a project, and explain how time, cost, and scope affect it. Difficulty: Easy 4) The planning processes lay the groundwork for the project by clarifying the value it will bring to the organization, setting its objectives, and estimating the project's length, scope, and cost. Answer: FALSE Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 5) A key document that authorizes the project is the project charter which shows that the project has the commitment and support of senior management. Answer: TRUE Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 6) Project charters are drafted in kickoff meetings. Answer: FALSE Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 7) Deliverables refer to the products, documents, or services that will be delivered to the sponsor during the course of the project. Answer: TRUE Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy

1 ..


8) Scope creep refers to a strategy in which everyone in a project team agrees upon what features the project will involve. Answer: FALSE Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 9) It is good practice for project managers to spend more time on the executing processes than any other processes. Answer: FALSE Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Moderate 10) Executing processes involve coordinating efforts that ensure the tasks on the work breakdown structure are carried out properly. Answer: TRUE Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 11) The critical path in a Gantt chart is the shortest path through the project and identifies those tasks that can be delayed without affecting the finish date. Answer: FALSE AACSB: Information Technology Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Moderate 12) The closing phase of a project should also include a process that documents the lessons learned from the project. Answer: TRUE Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 13) Change management refers to a structured approach to the transition employees must make as they switch from their existing work processes to new ones. Answer: TRUE Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 14) Project management software provides tools to help the PM manage time, resources, and costs. Answer: TRUE AACSB: Information Technology Chapter LO: 12.3 Explain how project management software helps managers plan, track, and manage projects. Difficulty: Easy

2 ..


15) Escalation of commitment refers to the tendency of people to increase features in a project in order to accommodate excess resources. Answer: FALSE Chapter LO: 12.4 Identify the main factors that cause projects to succeed or fail. Difficulty: Moderate 16) Lack of customization and high stakeholder involvement are amongst some of the most cited reasons for project failure. Answer: FALSE Chapter LO: 12.4 Identify the main factors that cause projects to succeed or fail. Difficulty: Easy 17) Well-understood and binding agreements with vendors and consultants are essential to the success of a project. Answer: TRUE Chapter LO: 12.4 Identify the main factors that cause projects to succeed or fail. Difficulty: Easy 18) The acceptable-use policy covers laws on harassment, fraudulent use, and any attempts to disrupt information systems or circumvent authentication. Answer: TRUE AACSB: Information Technology Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy 19) Disaster recovery refers to all the procedures, documentation, and resources the organization puts into place to prepare for a disaster and recover the technical infrastructure. Answer: TRUE AACSB: Information Technology Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy 20) Business continuity refers to the willingness of an organization to pull the plug on a project in which huge sums and resources need to be invested. Answer: FALSE Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy 21) A confirmation bias is a rare human tendency to believe that an event was predictable even if it was not. Answer: FALSE Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Easy 3 ..


22) A black swan refers to those favorable, external events which contribute to an organization's growth. Answer: FALSE AACSB: Information Technology Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Easy 23) The purpose of a strategic plan is the roadmap that clarifies how information systems contribute to the company's mission and strategy for the future and what needs to be done to protect the organization's assets and ensure its success. Answer: TRUE Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy 24) Black Swan events rarely occur in a person's lifetime as seen by the inability to predict them. Answer: FALSE Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Moderate 25) The World Bank is a unique global partnership that helps strategic planning for development projects around the world on topics that range widely, including indicators on agricultural output, education, employment, environment, and economics. Answer: TRUE Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy 26) What is NOT a component of an information systems strategic plan that needs to be addressed? A) escalation of commitment B) vision, principles, and policies C) project portfolio management D) disaster recovery and business continuity Answer: A Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy

4 ..


27) Which of the below components are a part of the vision, principles, and policies of an information systems strategic plan? A) funding models for IT,acceptable-use and security policies, record retention policies B) deciding which projects to pursue, managing the portfolio C) disaster recovery and business continuity D) none of the above Answer: A Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy 28) What of the below reasons is TRUE about why information systems should have a strategic plan? A) most fail factors are more likely to involve the way projects are managed, monitored, communicated, and supported by senior execs B) information systems are central to success and strategic competitiveness C) project managers must master is change management, which is a structured approach to the transition employees must make as they switch from their existing work processes to new ones D) all of the above Answer: B Chapter LO: 12.4 Identify the main factors that cause projects to succeed or fail. Difficulty: Moderate 29) What of the below are not black swan events? A) WWI B) invention of personal computers C) terrorist attack on a data center D) all of the above ate black swan events Answer: D Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Moderate 30) What bias tends to prevent people from preparing for a black swan event? A) confirmation bias B) hindsight bias C) availability bias D) none of the above Answer: C Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Moderate

5 ..


31) Gartner Inc.'s planning tool in strategic planning which tracks the evolution of technologies or IT-related business trends is known as ________. A) "Hype cycle" B) "Trough of Disillusionment" C) "Peak of Inflated Expectations" D) "Plateau of Productivity" Answer: A Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy 32) Gartner Inc.'s hype cycle, generally begins with what trigger? A) slope of enlightenment B) peak of inflated expectations C) high capital investment D) a disruptive innovation Answer: D Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy 33) According to Gartner Inc.'s hype cycle, blockchain for data security is at what stage? A) Technology Trigger B) Peak of Inflated Expectations C) Trough of Disillusionment D) Plateau of Productivity Answer: B Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy 34) According to Gartner Inc.'s hype cycle, Enterprise Architecture is at what stage? A) Peak of Inflated Expectations B) Trough of Disillusionment C) Slope of Enlightenment D) Plateau of Productivity Answer: C Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy

6 ..


35) JetBlue and WestJet software migrations taught what lessons? A) timing of a migration is strategic to avoid competitors undercutting prices B) communication to customers ahead of time caused more problems instead of smoothing bumps C) neither entity hired enough staff to handle the transition D) all of the above Answer: A Chapter LO: 10.4 Explain steps used to manage security risks, identify threats, assess vulnerabilities, and develop administrative and technical controls. Difficulty: Moderate 36) In a major software implementation for new ticketing reservations, which of the following outcomes is NOT true? A) JetBlue learned from WestJet's missteps, so its "brain transplant" caused minimal disruption. B) WestJet's performance began lagging because of increased expenses and labor shortages in Canada. C) That WestJet learned from JetBlue to emphasize communications blog was the platform they used to explain how the company was preparing for the software implementation. D) The migration suffered from glitches, and WestJet's website crashed. Customers had to deal with long waits, and angry bloggers posted their complaints. Answer: C Chapter LO: 12.4 Identify the main factors that cause projects to succeed or fail. Difficulty: Moderate 37) The World Bank as an open data website collects and shares data on what aspects of global interests? A) banking, interest rates, current exchanges B) agricultural output, education, employment, environment C) banking, economics, political shifts D) none of the above Answer: B Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy 38) Which of the following is an accurate definition of a project? A) a temporary activity to carry out a particular objective B) a series of events that continually replicate a product C) an undertaking with a general objective of improving an organization D) a recurring sequence of events that facilitate the creation of a service Answer: A Chapter LO: 12.1 Define a project, and explain how time, cost, and scope affect it. Difficulty: Easy

7 ..


39) A ________ is a temporary activity that is launched for a specific purpose, to carry out a particular objective. A) project B) system C) process D) milestone Answer: A Chapter LO: 12.1 Define a project, and explain how time, cost, and scope affect it. Difficulty: Easy 40) Which of the following is a difference between projects and processes? A) Projects are permanent in nature, whereas processes are temporary. B) Projects are unique and one of a kind, whereas processes are recurring. C) Projects need to be tweaked so that the underlying activities are streamlined, whereas processes involve uncertainty. D) Project durations can be predicted easily, whereas process durations are difficult to predict. Answer: B Chapter LO: 12.1 Define a project, and explain how time, cost, and scope affect it. Difficulty: Moderate 41) A ________ is a series of events designed to deliver a product or service that is recurring in nature. A) process B) milestone C) project D) task Answer: A Chapter LO: 12.1 Define a project, and explain how time, cost, and scope affect it. Difficulty: Easy 42) Which of the following is a characteristic of a process? A) a specific, unique purpose B) elements of uncertainty C) temporary endeavor D) recurring in nature Answer: D Chapter LO: 12.1 Define a project, and explain how time, cost, and scope affect it. Difficulty: Easy 43) Which of the following is the best example of a project? A) backing up organizational data periodically B) performing weekly information system maintenance C) updating software programs regularly D) opening a new branch office Answer: D Chapter LO: 12.1 Define a project, and explain how time, cost, and scope affect it. Difficulty: Easy 8 ..


44) Which of the following is true of the triple constraint in projects? A) The time constraint is the most critical of the three constraints in projects. B) The three fundamental project constraints are insulated from each other. C) Changes in one fundamental constraint affect the other constraints as well. D) Cost constraints take precedence over time and scope constraints in all projects. Answer: C Chapter LO: 12.1 Define a project, and explain how time, cost, and scope affect it. Difficulty: Easy 45) The ________ process lays the groundwork for the project by clarifying the value it will bring to the organization, setting its objectives, and estimating the project's length, scope, and cost. A) controlling B) initiating C) planning D) executing Answer: B Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 46) Which of the following sets of processes is carried out first in project management? A) executing process B) initiating process C) implementing process D) monitoring process Answer: B Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 47) The stage at which a project is conceived is known as the ________ process. A) initiating B) planning C) monitoring D) controlling Answer: A Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy

9 ..


48) The stage at which early phase managers identify the major players in the project, including the sponsor, the project manager, the team members, and other stakeholders, is known as the ________. A) executing process B) initiating process C) monitoring process D) controlling process Answer: B Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 49) Which of the following best describes a project charter? A) a document which lists the outcomes of a project B) a document that tracks the progress of a project C) a key document that authorizes a project D) an informal document that assesses the effectiveness of a project Answer: C Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 50) A ________ is a document that authorizes a project and includes a clear statement of objectives, estimated start and end dates, the names of the relevant people and their roles, a tentative budget, criteria for success, and other pertinent information. A) project charter B) burn down chart C) business case D) project proposal Answer: A Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 51) Which of the following functions does a project charter perform? A) measuring the outcomes of the project B) assessing the progress of the project C) stating the reasoning behind initiating the project D) estimating start and end dates for the project Answer: D AACSB: Information Technology Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Moderate

10 ..


52) How does a project charter help in managing a project? A) defines project metrics clearly so there is no need to change the scope midway through a project B) helps make the project management process more informal and fosters greater collaboration C) tracks the progress of the project and sets benchmarks for the project team to achieve D) avoids unexpected surprises and leaves room for changes to meet organization's needs Answer: D Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Moderate 53) Which of the following statements is true of a project charter? A) It generally includes the work breakdown structure. B) It is a document prepared to monitor the progress of the project. C) It documents the experiences and knowledge gained during the project. D) It shows that the senior management supports the project. Answer: D Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 54) A kickoff meeting involves ________. A) project stakeholders meeting one another to review the project charter B) the project manager assessing the outcomes of the project and measuring its effectiveness C) the project team convening together to submit a proposal for a project D) project stakeholders meeting before the executing process is started Answer: A Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Moderate 55) A(n) ________ is an initiating process where stakeholders meet one another, sometimes for the first and only time. A) kickoff meeting B) board meeting C) pre-bid meeting D) annual general meeting Answer: A Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 56) Which of the following best describes deliverables in a project? A) products, documents, or services that will be handed over to the sponsor B) standards expected by a client from the project team C) guidelines that a manager formulates for a team to follow D) resources needed for smooth execution of a project Answer: A Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Moderate 11 ..


57) The term ________ refers to products, documents, or services that will be handed over to the sponsor during the course of the project. A) resources B) standards C) deliverables D) benchmarks Answer: C Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 58) Which of the following best describes the term scope creep? A) a method of keeping track of a project's progress unobtrusively B) the way in which project features are added in an uncontrolled way C) the process through which a project's goals can be achieved much ahead of the deadline D) a method of assessing the resource requirements for a project Answer: B Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 59) The term ________ refers to the way in which features are added in an uncontrolled way, often without considering the impact on the budget or timeline. A) cone of uncertainty B) scope creep C) risk appetite D) conceptual fusion Answer: B Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 60) A(n) ________ is an orderly listing of actual tasks that a project team must complete to produce the project's deliverables. A) work breakdown structure B) business case C) executive summary D) mission statement Answer: A Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 61) A(n) ________ is a document that clarifies which features are included in a project. A) executive summary B) business case C) scope statement D) mission statement Answer: C Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 12 ..


62) A ________ lists tasks on the work breakdown structure, along with each task's projected start and finish dates, in graphical format. A) cluster diagram B) Gantt chart C) PERT network chart D) conceptual graph Answer: B AACSB: Information Technology Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 63) In which of the following project management areas is a Gantt chart most likely to be used? A) scope assessment B) time management C) human resource management D) risk management Answer: B AACSB: Information Technology Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 64) Which of the following tools helps keep a project on track to meet its deadlines by listing tasks on a work breakdown schedule? A) Smith chart B) Nolan chart C) Gantt chart D) PERT network chart Answer: C AACSB: Information Technology Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 65) Which of the following is true about work breakdown structure? A) It is generally created during the executing process of a project. B) A word processor is the best software package to create work breakdown structures. C) Work breakdown structures are used only to plan and list the tasks a team must complete. D) Gantt charts are generally used to show work breakdown structures. Answer: D AACSB: Information Technology Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy

13 ..


66) The ________ process in project management focuses on devising how the project will be executed. A) monitoring B) planning C) controlling D) closing Answer: B Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 67) ________ in project management include all the coordinating efforts that ensure that tasks on the work breakdown structure are carried out properly. A) Initiating processes B) Designing processes C) Planning processes D) Executing processes Answer: D Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 68) Which of the following is an example of an executing process? A) defining milestones and goals B) allocating work assignments C) fixing project schedules D) identifying deliverables Answer: B Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Moderate 69) Successful project managers spend the majority of their time on which of the following? A) planning and monitoring B) communicating with shareholders C) focusing on project execution D) delegating very few tasks to subordinates Answer: A Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 70) ________ track progress from start to finish, pinpointing any deviations from the plan. A) Initiating processes B) Executing and coordinating processes C) Planning processes D) Monitoring and controlling processes Answer: D Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 14 ..


71) In the ________ phase, project managers pay close attention to reports and dashboards that might show early warning signs that some tasks have fallen behind. A) initiating B) executing C) monitoring D) planning Answer: C Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 72) Which of the following best defines predecessors in a work breakdown structure? A) the tasks that are performed over a long period of time, side by side with new tasks B) the tasks that need to be completed before a particular task can begin C) the new tasks that are undertaken right after a long overdue task is completed D) the tasks that are undertaken as a continuation of older, incomplete tasks Answer: B Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 73) The term ________ refers to a task in the work breakdown structure that needs to be completed before a particular task can begin. A) subtask B) successor C) subroutine D) predecessor Answer: D Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 74) Which of the following best defines a critical path in a project? A) the longest project path comprised of tasks that do not affect the finish date if they are delayed B) the longest project path that identifies tasks that cannot be delayed without affecting the finish date C) the path obtained by adding the time required for tasks of the shortest duration D) the shortest path undertaken in a monitoring process in which there is no fixed deadline Answer: B Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy

15 ..


75) The ________ refers to the longest course through the project, which identifies those tasks that cannot be delayed without affecting the finish date. A) graph bandwidth B) critical path C) long tail D) degree sequence Answer: B Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 76) Which of the following is a feature of a project's closing process? A) identifying deliverables and components needed to achieve success B) allocating work assignments and monitoring progress of the team C) negotiating contracts and conducting research to achieve results D) signing off by the sponsor that all deliverables have been accepted Answer: D Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 77) The ________ phase in a project involves documenting lessons learned from the project so that the experience is useful to other project teams and adds to the organization's knowledge base. A) executing B) planning C) closing D) initiating Answer: C Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 78) The ________ phase ideally involves wrapping up a project in an orderly way and a sponsor signing off that all deliverables have been received and accepted. A) implementing B) planning C) closing D) executing Answer: C Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy

16 ..


79) Which of the following challenges is typically a feature of the closing phase of a project? A) motivating project stakeholders B) documenting lessons learned C) creating a work breakdown structure D) implementing mitigation strategies Answer: B Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 80) ________ is a structured approach that the transition employees must make as they switch from their existing work processes to new ones. A) Change management B) Total quality management C) Project portfolio management D) Knowledge management Answer: A Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Easy 81) Which of the following best defines change management? A) an approach to streamlining work processes to maintain universal codes B) an approach that familiarizes new employees in an organization with work processes C) an approach to the transition employees as they switch from existing work to new processes D) an approach to project management that ensures that project stakeholders do not deviate from the defined project objectives Answer: C AACSB: Information Technology Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Moderate 82) Which of the following are the primary areas for which project management software is used? A) management of task delegation B) management of resources and budgets C) management of customer and shareholder data D) management of time, people, resources, and costs Answer: D Chapter LO: 12.3 Explain how project management software helps managers plan, track, and manage projects. Difficulty: Easy

17 ..


83) Which of the following is the most critical factor that contributes to the failure of projects? A) limited scope B) low customization C) high stakeholder involvement D) unrealistic time frames Answer: D Chapter LO: 12.4 Identify the main factors that cause projects to succeed or fail. Difficulty: Easy 84) One of the critical factors that contribute to the failure of projects is ________. A) the limited scope of the project B) the lack of executive support for the project C) the low requirement for customization D) the high stakeholder involvement in the project Answer: B Chapter LO: 12.4 Identify the main factors that cause projects to succeed or fail. Difficulty: Easy 85) Which of the following best defines escalation of commitment? A) the tendency to invest in a project when it offers increasing returns over a period of time B) the tendency of employees to increase productivity at work when provided with incentives C) the tendency of employees to quit an organization when their needs are being disregarded D) the tendency to continue to invest in a project despite mounting evidence that it is not succeeding Answer: D Chapter LO: 12.4 Identify the main factors that cause projects to succeed or fail. Difficulty: Moderate 86) The tendency to continue investing in a project, despite mounting evidence that it is not succeeding, often comes about because people mistakenly let sunk costs affect decision making rather than weighing the value of further investment. This tendency is known as ________. A) zero-profit condition B) escalation of commitment C) progress trap D) zero-sum game Answer: B Chapter LO: 12.4 Identify the main factors that cause projects to succeed or fail. Difficulty: Easy

18 ..


87) A real estate developer in the New Jersey area purchases a large tract of land and plans to build an apartment complex equipped with a golf course and other amenities. The developer is targeting the affluent software engineers from Manhattan who are looking for second homes. Halfway through the process of construction, recession hits the nation and many people lose their jobs. There are no takers for the apartments the developer is building, as homebuyers look for less expensive options. The developer, dismayed at the huge investment he has already made in the project, decides that it would be unwise to stop the project and plans to go ahead with it. The developer's reasoning is consistent with the idea of ________. A) progress trap B) post-purchase rationalization C) buyer's remorse D) escalation of commitment Answer: D AACSB: Analytic Thinking Chapter LO: 12.4 Identify the main factors that cause projects to succeed or fail. Difficulty: Moderate 88) Which of the following should a project manager ideally do to efficiently manage a project? A) commit to delivering features that stakeholders are expecting even if timelines are narrow B) allow end-users to learn from their mistakes instead of handholding after launch C) avoid making unpopular decisions that might dismay the clients D) define the time, cost, and scope constraints clearly as the project unfolds Answer: D Chapter LO: 12.4 Identify the main factors that cause projects to succeed or fail. Difficulty: Easy 89) Which of the following is a critical success factor for projects? A) involvement and buy-in from a niche segment of end users B) a strategy to manage conflicts among stakeholders C) a design strategy that helps isolate existing and old legacy systems from new systems D) informal agreements with consultants and vendors to build trust Answer: B Chapter LO: 12.4 Identify the main factors that cause projects to succeed or fail. Difficulty: Easy 90) The ________ lays out rules about what employees are allowed to do with IT resources and what activities are disallowed. A) executive summary B) acceptable-use policy C) project charter D) project proposal Answer: B AACSB: Information Technology Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy 19 ..


91) The ________ encompasses services each employee will be provided, whether and how much they can utilize company resources for personal use, the kinds of surveillance that are in place, and reinforce legal requirements, such as prohibitions against unauthorized copying. A) executive summary B) acceptable-use policy C) project charter D) project proposal Answer: B AACSB: Information Technology Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy 92) Which of the following statements is true about acceptable-use policies? A) Penalties for violating a policy are decided by the organization and will not be a legal issue. B) Employees agree to the policy after accessing the organization's IT resources. C) Policies are restricted to the organization's resources and do not concern personally owned devices. D) The surveillance and monitoring processes that are in place are also included in the policy. Answer: D AACSB: Information Technology Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Moderate 93) Which of the following disclaimers would protect a firm from implied contract obligations in the event of an employee's email containing wording that implies a firm contract? A) a disclaimer stating that any contract must be confirmed by the employee's manager B) a disclaimer warning recipients against disclosing information contained in the email C) a disclaimer warning recipients that they are responsible for checking the message for malicious content D) a disclaimer that includes wording that the message is intended only for the addressee Answer: A AACSB: Information Technology Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy

20 ..


94) A company requires its employees to include a certain disclaimer in their emails that states that the company is not responsible if recipients of emails rely on the advice provided by the employees. What potential threat does such a disclaimer protect the company from? A) implied contractual obligations B) transmission of viruses C) negligent misstatements D) employee misuse Answer: C AACSB: Information Technology Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy 95) ________ is a continuous process that oversees all the projects for an organization, selecting which projects to pursue and culling those projects that have a poor prognosis. A) Total quality management B) Business process outsourcing C) Project portfolio management D) Change management Answer: C Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy 96) Which of the following best describes project portfolio management? A) a process that oversees all projects and selects which projects to pursue B) a process that integrates a company's project with a prospective external project C) a process that creates and visualizes projects from scratch D) a process that tracks the progress of projects and adjusts their scope accordingly Answer: A Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy 97) Why is it a challenging task to calculate a project's return on investment (ROI)? A) It involves differentiating between the costs and savings, which are often hard to distinguish. B) Estimating ROI for projects that involve information systems involves specialized accounting knowledge. C) It is difficult to estimate ROI for projects where costs rise unexpectedly, and revenue increases are hard to predict. D) When project costs remain stable throughout the duration of the project, they become hard to keep track of. Answer: C Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Moderate 21 ..


98) A ________ oversees all the projects going on throughout the organization and provides project management training, software, and support. A) records management office B) program management office C) document management office D) business process management office Answer: B AACSB: Information Technology Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy 99) Which of the following collects data from each project and aggregates it, building a larger picture of the overall health of the organization's project portfolio? A) records management office B) program management office C) document management office D) change management office Answer: B AACSB: Information Technology Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy 100) Which among the following is the hardest task for an organization's program management office? A) resolving conflicts between project managers B) offering software and support to different projects C) providing project management training D) collecting reliable data from projects Answer: D AACSB: Information Technology Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Moderate 101) ________ refers to all the procedures, documentation, and resources an organization puts into place to prepare for a crisis situation and recover technical infrastructure. A) Data repository B) Disaster recovery C) Business automation D) Data warehouse Answer: B AACSB: Information Technology Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy 22 ..


102) ________ refers to maintaining an organization's business operations to avoid a devastating revenue loss and damaged reputation. A) Business continuity B) First-order resolution C) Escalation of commitment D) Business incubation Answer: A AACSB: Information Technology Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy 103) Which of the following disasters is most likely to cause massive absenteeism in organizations? A) denial of service attacks B) unauthorized break-ins C) pandemics D) information leaks Answer: C AACSB: Information Technology Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy 104) Which of the following is most likely to be a consequence of a security breach in an organization? A) massive absenteeism B) electrical outages C) alteration of data D) employee evacuations Answer: C AACSB: Information Technology Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Easy 105) The term ________ refers to a common human tendency to make systematic mistakes when processing information or making judgments. A) negativity effect B) fuzzy-trace theory C) cognitive bias D) error of omission Answer: C Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Easy 23 ..


106) Which of the following best describes overconfidence bias? A) the tendency to judge the probability of an event based on how easily examples come to mind B) the tendency to choose information that supports our existing position and ignore conflicting evidence C) a tendency to overestimate the time it will take to complete a task D) the act of having more faith in our own estimates than is realistically justified Answer: D Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Easy 107) The human tendency to choose information to examine and support a view they already hold and ignore data that might refute their hypothesis is known as a(n) ________. A) confirmation bias B) optimism bias C) choice-supportive bias D) distinction bias Answer: A Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Easy 108) Which of the following best describes confirmation bias? A) the tendency to claim more responsibility for successes than failures B) the tendency of a person to overestimate how much other people agree with him or her C) the tendency to choose information that supports our existing position D) the tendency to view two options as more distinctive when evaluating them simultaneously than when evaluating them separately Answer: C Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Easy 109) A(n) ________ bias refers to a belief that an actual event was predictable even if it was not. A) anchoring B) hindsight C) confirmation D) distinction Answer: B Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Easy 110) Which of the following best describes a hindsight bias? A) the tendency to rely on one piece of information, however irrelevant B) the tendency to claim more responsibility for successes than failures C) the tendency to choose information that supports our existing position D) the belief that an actual event was predictable even if it was not Answer: D Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Easy 24 ..


111) Which of the following best describes a planning fallacy? A) the tendency to choose information supporting our existing position and ignore conflicting evidence B) the tendency to underestimate the time it will take to complete a task C) the tendency to rely on one piece of information, however irrelevant D) the tendency to believe that an actual event was predictable even if it was not Answer: B Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Easy 112) A ________ refers to the tendency to underestimate the time it will take to complete a task. A) regression fallacy B) planning fallacy C) deductive fallacy D) continuum fallacy Answer: B Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Easy 113) The term ________ refers to the tendency for people to rely too heavily on one piece of information to adjust their estimates, even if it is irrelevant. A) availability bias B) confirmation bias C) anchoring D) predecessors Answer: C Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Easy 114) An ________ bias refers to the tendency to judge the probability of an event based on how easily examples come to mind. A) availability B) overconfidence C) anchoring D) optimism Answer: A Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Easy

25 ..


115) Which of the following best describes an availability bias? A) the tendency of people to do or believe things because many others hold the same views B) the tendency to judge the probability of an event based on how easily examples come to mind C) the tendency to draw different conclusions from a wide range of information D) the tendency of people to have a stronger preference for immediate gains rather than long term effects Answer: B Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Easy 116) Which of the following best describes an anchoring bias? A) the tendency to rely on one specific piece of information, regardless of its irrelevance B) the tendency to judge the probability of an event based on how easily examples come to mind C) the tendency to underestimate the time it will take to complete a task D) the tendency to draw different conclusions from a wide range of information Answer: A Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Moderate 117) Which of the following is an accurate definition of "black swans"? A) malicious software programs with the potential to disable enormous networks B) software programs that are designed to attract malicious attacks to study their properties C) events that occur very rarely and are difficult or nearly impossible to predict D) stages along the project management process at which regular progress checks are made Answer: C AACSB: Information Technology Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Moderate 118) The term ________ is used to describe an extremely rare event that is difficult or nearly impossible to predict, but which can have an immense impact in areas such as technology, finance, and science. A) honeypot B) Trojan horse C) black swan D) long tail Answer: C AACSB: Information Technology Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Easy

26 ..


119) Which of the following is true of black swan events? A) They are the most frequently occurring disruptions in information systems. B) The term is exclusively used to describe malicious attacks on information systems. C) The invention of the personal computer is an example of a black swan. D) Their occurrences can be anticipated with simple prediction models. Answer: C AACSB: Information Technology Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Easy 120) Black swan events ________. A) have minimal impact in areas such as technology, finance, and science B) are usually easy to predict C) occur frequently in the information technology field D) pose difficult challenges for strategic planners Answer: D AACSB: Information Technology; Analytical Thinking Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Easy 121) Discuss the differences between processes and projects. Answer: Projects are temporary, with their own budgets, timelines, and sponsor. In contrast, a business process is a series of events designed to deliver a product or service that is repeated over and over. Projects are unique, but processes are recurring. Projects are one of a kind, and they involve uncertainty because people are doing things that are new to them, so their predictions about how long tasks will take may be well off the mark. In contrast, a process should be tweaked so that the underlying activities are streamlined, efficient, predictable, and cost-effective. Chapter LO: 12.1 Define a project, and explain how time, cost, and scope affect it. Difficulty: Moderate 122) What is a project charter? Answer: A project charter is a key document that authorizes the project. The charter shows that the project has the commitment and support of senior management, an essential element for success. It should also include a clear statement of objectives, estimated start and end dates, the names of the relevant people and their roles, a tentative budget, criteria for success, and any other pertinent information to get the project off to a good start. The charter helps to avoid unexpected surprises later, but still leaves room for changes to best meet the organization's needs. Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Moderate

27 ..


123) What is a project management plan? Explain its significance. Answer: The planning process should start early with the over-arching project management plan. The project management plan is the road map and guide for executing the project, and it describes the components needed to ensure success. The plan should include an organizational chart, a detailed description of the work to be performed, information about the schedule, details about meetings and reviews, success metrics, and notations about any information systems or project monitoring tools that will be used. It should also identify the deliverables which are the products, documents, or services that will be delivered to the sponsor during the course of the project. Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Moderate 124) Write a brief note on the executing processes for a project. Answer: Executing processes include all the coordinating efforts that ensure the tasks on the work breakdown structure are carried out properly. In this phase, the project manager's task is to communicate with stakeholders, allocate work assignments, negotiate contracts, coach team members, hold meetings, write updates, give presentations for the board, conduct research, and much more. The best project managers, however, spend a little more time on the other processesespecially planning and a little less on executing. Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Moderate 125) Explain the closing processes involved in project management. Answer: The closing processes formally end the project in an orderly way. The sponsor may need to sign off that all deliverables have been received and accepted, and the team members may be reassigned to their regular jobs. The closing phase should also include a process that documents the lessons learned from the project so the experience can benefit other project teams and add to the organization's knowledge base. Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Moderate 126) Why is it important to document the lessons learned during a project? Answer: The closing phase of a project should include a process that documents the lessons learned from the project so the experience can benefit other project teams and add to the organization's knowledge base. A challenge often faced in a closing process is that many organizations neglect the lessons learned in a project. Team members have little incentive to spend more time documenting the lessons learned for the organization. They already know those lessons, after all, and will benefit from them when they participate on another project team. Time spent writing them all up is time away from their other priorities. Reluctance to document lessons learned is especially acute for failed projects, where people don't want to admit mistakes or risk blame. Despite the challenges, smart managers in a high-performing organization will develop incentives to encourage team members to share what they learned about project management. Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Moderate

28 ..


127) What are the essential characteristics that a project manager should possess? Answer: The project manager needs leadership skills, excellent communication abilities, and strong team-building skills. Although technical competence in the task at hand is valuable, "people" skills are equally so. The project manager will motivate the team members and rely on their capabilities and drive to carry out the project. This person must be an attentive listener to hear the views of all the stakeholders and an effective speaker to present the project's status to sponsors and defend resource needs. Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Moderate 128) What is change management? Answer: Change management is a structured approach to the transition employees must make as they switch from their existing work processes to new ones. Much change accompanies the introduction of new information systems, particularly when some processes are drastically revised or eliminated through business process management efforts. Resistance to change can sink an entire project. Chapter LO: 12.2 Describe the five processes of project management. Difficulty: Moderate 129) Explain how project management software helps managers to plan and track projects. Answer: Project management software provides extensive tools to help the project manager (PM) manage time, one of the three constraints in any project. For instance, the PM can use the project plan as the baseline schedule. Once the project starts, the PM can enter actual completion dates for each task or percent completed, and the software can display two bars for each task, one for the baseline and one for the actual progress. Another useful feature in project management software is the ability to assign people to tasks and then track their workloads and duties across the project. The PM can enter the people who will be working on the tasks, along with their working calendars and planned vacations. Salaries, consulting fees, equipment, travel, rentals, and other expenses can all be estimated up front with project management software and then tracked against the baseline as the project progresses. AACSB: Information Technology Chapter LO: 12.3 Explain how project management software helps managers plan, track, and manage projects. Difficulty: Moderate 130) What are the key factors that contribute toward a project's success or failure? Answer: Most factors that lead to the failure of projects are related to the way projects are managed, monitored, communicated, and supported by senior executives. The success factors are almost the mirror image of those that contribute to failure in a project. It is important that a project manager clearly communicates the time, cost, and scope constraints as the project unfolds. Another factor that should not be underestimated is the need for end-user training and handholding after launch. If help is readily available, employees will master the new processes and software much more quickly, and with much less frustration. Most organizations have several projects underway simultaneously that incorporate information systems and technology, so strategic planning is essential for establishing priorities and resources for the project portfolio. Chapter LO: 12.4 Identify the main factors that cause projects to succeed or fail. Difficulty: Moderate 29 ..


131) Briefly describe the phenomenon of "escalation of commitment." Answer: The tendency to continue investing in a project, despite mounting evidence that it is not succeeding, is known as the escalation of commitment phenomenon. It often comes about because people mistakenly let sunk costs affect decision making rather than weighing the value of further investment. People are loath to pull the plug on a project in which huge sums and organizational resources have already been invested. Instead of weighing the value of further investment, they forget that sunk costs are bygones and should not guide future decision making. Some spectacular failures happen because of this phenomenon. Chapter LO: 12.4 Identify the main factors that cause projects to succeed or fail. Difficulty: Moderate 132) Discuss the acceptable-use policy. Answer: An acceptable-use policy is an organizational policy which states the principles that employees must agree to before accessing IT resources. The policy lays out the rules about what employees are allowed to do with IT resources and what activities are disallowed. These policies touch on the services each employee will be provided, whether and how much they can use company resources for personal use, and what surveillance is in place. Policies also stress legal requirements, such as copyright infringement or exporting encryption software. Harassment, fraudulent use, and any attempts to disrupt information systems or circumvent authentication are covered as well. Acceptable-use policies should contain clear language describing the organization's security and confidentiality requirements. AACSB: Information Technology Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Moderate 133) What is a program management office? Answer: A program management office is that part or department of an organization that oversees all the projects going on throughout the organization and provides project management training, software, and support. These offices also help resolve the conflicts that arise between project managers vying for the time of IT staff or other resources. With the organization's goals in mind, the PMO can make the tough decisions about how scarce resources are assigned and which projects will take precedence. To track progress on all the projects, the PMO collects data from each one and aggregates it, building a larger picture of the overall health of the organization's project portfolio. AACSB: Information Technology Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Moderate

30 ..


134) What is a black swan in a business environment? Explain. Answer: A black swan refers to those extremely rare events that are difficult or nearly impossible to predict. Though the odds of their occurrence might be less than one percent, these rare events have an immense impact in areas such as technology, finance, and science, and they pose enormous challenges for strategic planners. They also lead to many mistakes in judgment and prediction. AACSB: Information Technology Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Moderate 135) What is hindsight bias and how is it different from a confirmation bias? Explain. Answer: A hindsight bias refers to the human tendency to think that an unusual event was predictable, once they know it actually happened. This tendency explains why people heap blame on strategic planners who are caught off guard by a black swan. On the other hand, a confirmation bias refers to the human tendency to choose to examine information that supports the person's view but ignore data that might refute that view. Chapter LO: 12.6 Explain how the human element affects strategic planning. Difficulty: Moderate 136) What are the advantages and disadvantages of communicating a major project such as a months-long highway construction project in advance? Answer: Customers have to deal with long waits, traffic, potential accidents, and angry social media posts and bloggers posted their complaints. DOT website could crash from visits trying to figure out alternate routes. Alternate routes cause traffic delaying school buses, city public transport, and trucking delays in shipping. Advantages of an early communications include, creating appropriate create routes to avoid accidents, angry travelers, delayed buses. Creating goodwill by informing stakeholders like schools, public transportation as partners to smooth backups, allows police and other emergency responders better access to emergency sites by re-routing traffic effectively. Chapter LO: 12.5 Explain the importance of strategic planning for information systems, and describe the issues that the plan should address. Difficulty: Difficult

31 ..


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.