Introduction to Information Systems Supporting and Transforming Business, 3rd Canadian Edition Test

Page 1

Introduction to Information Systems Supporting and Transforming Business, 3rd Canadian Edition By

Rainer, Cegielski, Splettstoesser-Hogeterp, Sanchez-Rodriguez


Rainer, Information System, Third Canadian Edition

Testbank

Chapter 1

Introduction to Information Systems Question type: True/False

1) Managing the IS function within an organization is the exclusive responsibility of the IS department in contemporary organizations. Answer: False Learning Objective: Begin the process of becoming an informed user of your organization’s information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Medium

2) An information system collects, processes, stores, analyzes, and disseminates information for a specific purpose. Answer: True Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

3) Information technology relates to any computer-based tools that people use to work with information and to support the information and information-processing needs of an organization. Answer: True Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: Opening Case 1.1: Will Blackberry survive? Difficulty: easy

4) IT is enabling more and more people to communicate, collaborate, and compete, thereby leveling the digital playing field.


Rainer, Information System, Third Canadian Edition

Testbank

Answer: True Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Learning Objective: Identify three ways in which you depend on information technology in your daily life. Section Reference: Opening Case: Case 1.1: Will Blackberry survive? Difficulty: Easy

5) An organization must be large to benefit from IT. Answer: False Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Learning Objective: Identify three ways in which you depend on information technology in your daily life. Section Reference: Opening Case: Case 1.1: Will Blackberry survive? Difficulty: Easy

6) An informed user of IT can enhance his or her organization’s competitive position. Answer: True Learning Objective: Begin the process of becoming an informed user of your organization's information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Easy

7) If you want to run a multinational company, you need to rent office space and hire at least few employees. Answer: False Learning Objective: Begin the process of becoming an informed user of your organization's information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Easy

8) A systems analyst focuses on determining the information requirements and technical specifications for new applications. Answer: True


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Begin the process of becoming an informed user of your organization’s information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Easy

9) An auditing manager focuses on the ethical and legal use of information systems and evaluates the quality or effectiveness of such systems. Answer: True Learning Objective: Begin the process of becoming an informed user of your organization’s information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Medium

10) The CIO of an organization supervises the day-to-day operations of the data and/or computer centre. Answer: False Learning Objective: Begin the process of becoming an informed user of your organization’s information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Medium

11) The Emerging Technologies Manager forecasts technology trends; evaluates and experiments with new technologies. Answer: True Learning Objective: Begin the process of becoming an informed user of your organization’s information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Medium

12) End-user computing has two components: end-user data entry, reporting, and inquiry (commonly referred to as simply users); and end-user development, where users develop usable systems, such as spreadsheets or programs using programming languages or other development tools. Answer: True


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Begin the process of becoming an informed user of your organization’s information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Easy

13) Information technology and information systems are the same thing. Answer: False Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

14) In general, informed users tend to get more value from whatever technologies they use. Answer: True Learning Objective: Begin the process of becoming an informed user of your organization’s information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Medium

15) The grade point average (GPA) values of a class would be considered as information. Answer: False Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

16) The grade point average (GPA) values coupled with appropriate student names of a class would be considered as information. Answer: True Learning Objective: Define the terms data, information, and knowledge, and give examples of each.


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

17) A university registrar who uses her experience with university admissions in reviewing the applicant grades, application essays, and letters of recommendation, would be applying her knowledge in your application process. Answer: True Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

18) A list of football scores with the names of the teams that played the games would be considered information. Answer: True Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

19) The Information Systems functional area, a department of Information technology, deals with the planning, development, management, and use of management information tools to help people perform all the tasks related to information processing and management. Answer: True Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

20) A student’s decision to drop one course and add another would be considered a transaction to the university’s information system but not to its accounting system. Answer: True Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

21) The Supply Chain Management system is an interorganizational information system. Answer: True Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

22) An Electronic Commerce (e-Commerce) system is an intraorganizational information system. Answer: False Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

23) An organization’s supply chain starts at the supplier and ends at the customer. Answer: True Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium


Rainer, Information System, Third Canadian Edition

Testbank

24) E-commerce systems are a type of interorganizational information systems. Answer: True Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

25) An organization’s IT infrastructure consists of the IT components and IT services. Answer: True Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

26) IT personnel use the IT infrastructure to develop information systems. Answer: False Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

27) Meaningful knowledge is information and meaningful information is data. Answer: False Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems


Rainer, Information System, Third Canadian Edition

Testbank

Difficulty: Medium

28) Information is data that have been organized so that they have meaning to provide value to the recipient. Answer: True Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

29) Knowledge is data that have been organized so that they have meaning to provide value to the recipient. Answer: False Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

30) Knowledge is data and information that have been organized and processed to convey understanding, experience, accumulated learning, and expertise applied to a current problem. Answer: True Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

31) Digital dashboards are special information systems that that support all managers of the organization. Answer: True


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

32) IT only positively affects our quality of life. Answer: False Learning Objective: Provide three ways in which information technology can impact managers and three ways in which it can impact non-managerial workers. Section 1.4: Importance of Information Systems to Society Difficulty: Easy

Question Type: Multiple Choice

33) Which of the following is a benefit of being an informed user of IT? a) Understanding what is “behind” applications you use in your organization b) Providing input to enhance your organization’s applications c) Helping to select new applications d) Keeping abreast of new technologies e) All of the above Answer: e Learning Objective: Begin the process of becoming an informed user of your organization’s information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Easy

34) You should seek to be an informed user of IT because ____________. a) it is easy to understand how IT works b) you could end up working in the IT department in your organization c) everyone uses IT d) you will be in a position to enhance the quality of IT applications Answer: d


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Begin the process of becoming an informed user of your organization's information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Medium

35) The title of the executive who is in charge of the people, who design and build information systems, the people who use those systems, and the people responsible for managing those systems is the a) CEO b) CFO c) CIO d) CIS e) CIT Answer: c Learning Objective: Begin the process of becoming an informed user of your organization’s information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Easy

36) What does a systems analyst do? a) Manages an IS service b) Writes computer code. c) Determines information requirements and technical specifications for new applications. d) Forecasts technology trends e) Creates Web sites and pages Answer: c Learning Objective: Begin the process of becoming an informed user of your organization’s information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Medium

37) An emerging technologies manager _____. a) forecasts evaluates new technologies b) manages data networks c) manages the ethical and legal use of information systems d) is responsible for strategic planning e) creates the Web sites and pages


Rainer, Information System, Third Canadian Edition

Testbank

Answer: a Learning Objective: Begin the process of becoming an informed user of your organization’s information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Medium

38) Which of the following statements concerning the complexity of management of information resources is not true? a) Information systems have an enormous strategic value within an organization and therefore firms rely on them heavily. b) Information systems are expensive to acquire, operate, and maintain. c) Computers are decentralized throughout the organization, which makes it harder to manage. d) Managing mainframes has become more difficult. e) Managing information resources is divided between the MIS department and end users and there is no standard way to divide responsibility between them. Answer: d Learning Objective: Begin the process of becoming an informed user of your organization’s information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Easy

39) _________ is a traditional function of the MIS Department. a) Managing system integration including the Internet, intranets, and extranets b) Educating the non-MIS managers about IT c) Providing technical services d) Creating business alliances with business partners Answer: c Learning Objective: Begin the process of becoming an informed user of your organization's information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Medium

40) Which of the following is the correct hierarchy from the lowest level to the highest level? a) knowledge, information, data b) information, data, knowledge


Rainer, Information System, Third Canadian Edition

Testbank

c) data, information, knowledge d) data, experience, information e) information, experience, wisdom Answer: c Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

41) _____ conveys understanding, accumulated learning, and expertise as they apply to a current problem. a) Data b) Information c) Knowledge d) Database e) None of the above Answer: c Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

42) _____ is (are) data that have been organized to have meaning and value to a recipient. a) Insights b) Information c) Knowledge d) Experience e) Wisdom Answer: b Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application.


Rainer, Information System, Third Canadian Edition

Testbank

Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

43) Who manages all systems throughout the organization and the day-to-day operations of the entire IS organization? a) IS Director b) Information center manager c) Project Manager d) Operations Manager e) Programming manager Answer: a Learning Objective: Begin the process of becoming an informed user of your organization’s information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Easy

44) The Software Project Manager is responsible for: a) strategic planning. b) day-to-day operations of the entire organization. c) manages IS services such as help desks, hot lines, training, and consulting. d) manages a particular existing system. e) manages a particular new systems development project. Answer: e Learning Objective: Begin the process of becoming an informed user of your organization’s information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Easy

45) The list of all your purchases from Amazon (books bought, price paid, dates) is defined as ___________. a) data b) information c) knowledge d) experience e) wisdom Answer: b


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

46) If Amazon uses a list of all your purchases (books bought, price paid, dates) to recommend other books to you, then it is applying its _____. a) data b) information c) knowledge d) experience e) wisdom Answer: c Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

47) A listing of all courses offered at your university would be considered _____, whereas a listing of all courses required in your major would be considered _____. a) information, data b) knowledge, information c) information, knowledge d) data, information e) data, knowledge Answer: d Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

48) You are registering for the next semester at your university. You take into account your major, the courses you need, the prerequisites for each course, the times you take each course, and the professors teaching each section, as well as your work schedule. You are using _____ to select your class schedule. a) information b) knowledge c) experience d) wisdom e) data Answer: b Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

49) A purchase of books in the college bookstore is ___________. The report at the end of the day showing sales totals for the day is ____________. a) information, knowledge b) information, data c) data, information d) data, database e) data item, business intelligence Answer: c Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

50) You have just been hired by the largest manufacturer in your area to join their management trainee program. You enjoyed your “computer course” in college and hope that you’ll be able to put that knowledge to good use. Which of the following might you expect to do during the management training program? a) Code a new application b) Recommend new technologies that might impact the organization


Rainer, Information System, Third Canadian Edition

Testbank

c) Design a new application d) Become familiar with tools to support using data for decision making e) Work 9-5 in your office. Answer: d Learning Objective: Provide three ways in which information technology can impact

managers and three ways it can impact non-managerial workers. Section Reference: How Does IT Impact Organizations? Difficulty: Medium

51) As a manager in your company, you expect to retrieve ______ from operational systems and present it as _________ to your boss, who will react based on his ____________. a) knowledge, information, data b) information, data, knowledge c) data, information, knowledge d) data, experience, information e) information, experience, wisdom Answer: c Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

52) In your new position, you are told that you will be working with a business analyst. What would you expect this work to entail? a) Review computer code. b) Explain the business process c) Test programs d) Identify new technology that might benefit the organization e) Create Web sites and pages Answer: b Learning Objective: Begin the process of becoming an informed user of your organization’s information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Medium


Rainer, Information System, Third Canadian Edition

Testbank

53) An organization’s IT components include all of the following except: a) a network. b) programs c) procedures d) a database e) monitors Answer: c Learning Objective1: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

54) A(n) _____________ is a computer program designed to support a specific task or business process. a) Interface b) Application c) Functional area d) Network e) Database Answer: b Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

55) _____ is/are the computer hardware, software, and communications technologies that are used by IT personnel to produce IT services. a) IT components b) IT services c) Information technology d) An information system e) A computer-based information system


Rainer, Information System, Third Canadian Edition

Testbank

Answer: a Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

56) An organization’s _____ consists of the physical facilities, IT components, IT services, and IT management that will support the entire organization. a) information technology architecture b) information technology infrastructure c) information technology d) information system e) computer-based information system Answer: b Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

57) IT personnel use _____ to develop _____. a) IT components, IT services b) computer-based information systems, IT architecture c) IT infrastructure, IT architecture d) IT infrastructure, IT platform e) IT components, IT architecture Answer: a Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium


Rainer, Information System, Third Canadian Edition

Testbank

58) The IT infrastructure is comprised of _______ and ________. a) IT components, IT personnel b) IT components, IT services c) IT services, IT personnel d) IT personnel, computer-based information systems e) Computer-based information systems, IT personnel Answer: b Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

59) Which of the following statements is false? a) An application is a computer program designed to support a specific business process. b) Each functional area within an organization has only one application. c) A functional area information system is the same as a departmental information system. d) A functional area information system can obtain data from other functional area information systems. e) App, application, and application program all mean the same thing. Answer: b Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

60) Enterprise resource planning systems: a) were designed to process transactions faster. b) evolved because newer technologies made older systems obsolete. c) use a common database for all functional areas. d) are utilized to conduct site analyses. e) All the above statements are true. Answer: c


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

61) Knowledge workers: a) handle day-to-day operations within an organization. b) make tactical decisions. c) advise middle managers d) make routine decisions. e) are generalists Answer: c Learning Objective1: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

62) Office automation systems: a) support only the clerical staff. b) are comprised of software that is only used to develop documents and spreadsheets c) include report generators. d) are a type of interorganizational system. e) are usually developed in-house. Answer: c Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Hard

63) ___________ include B2B and B2C. a) Enterprise resource planning systems


Rainer, Information System, Third Canadian Edition

Testbank

b) Computer-based information systems c) Functional area information systems d) Intraorganizational information systems Answer: a Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

64) Which of the following statements is false? a) IT ultimately decreases the number of managers and experts. b) IT makes managers more productive. c) IT increases the number of employees who can report to a single manager. d) IT reduces stress by giving managers more time to make decisions. e) IT decreases the number of promotional opportunities. Answer: d Learning Objective: Discuss three ways in which information technology can impact managers and three ways in which it can impact non-managerial workers. Section Reference: 1.3 How Does IT Impact Organizations? Difficulty: Medium

65) Which of the following statements about the potential impact of IT on non-managerial workers is true? a) IT will create more jobs than it eliminates. b) Employees will feel a higher degree of loyalty towards their company. c) IT could cause employees to experience a loss of identity. d) The flexibility of IT can minimize stress on the job. Answer: c Learning Objective: Discuss three ways in which information technology can impact managers and three ways in which it can impact non-managerial workers. Section Reference: 1.3 How Does IT Impact Organizations? Difficulty: Medium

66) Which of the following statements about your future role as a manager is false?


Rainer, Information System, Third Canadian Edition

Testbank

a) The people I manage will likely be dispersed geographically. b) The size of my team will likely be smaller than teams of today. c) There will be less emphasis on office politics. d) Many of my decisions will be “real time”. e) I will need IT tools to handle the data I utilize to make decisions. Answer: b Learning Objective: Discuss three ways in which information technology can impact managers and three ways in which it can impact non-managerial workers. Section Reference: 1.3 How Does IT Impact Organizations? Difficulty: Medium

67) Which of the following statements about IT’s role in society is false? a) IT has created employee flexibility. b) Robots can do many routine tasks. c) Robots can handle unfamiliar situations. d) IT can be used to help doctors diagnose diseases. e) Telepresence robots can act as the eyes and ears of a business manager. Answer: c Learning Objective: List three positive and three negative societal effects of the increased use of information technology. Section Reference: 1.4 Importance of Information Systems to Society Difficulty: Medium

68) Refer to Opening Case – Will Blackberry Survive? – Which of the following is true? a) rapid changes in information technology can make products obsolete quickly. b) IT is making our world smaller. c) success of a smart phone depends on the number of apps developed. d) rapid changes in information technology can drive non-responsive businesses to the brink of destruction. e) All of the above. Answer: e Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Learning Objective: Identify three ways in which you depend on information technology in your daily life. Section Reference: Opening Case: Will Blackberry Survive?


Rainer, Information System, Third Canadian Edition

Testbank

Difficulty: Medium

69) Refer to IT’s About Business: 1.1 – E-Mealz: Which of the following statements is false? a) Jane could run E-Mealz just as efficiency without technology. b) Jane uses social network sites to promote her business. c) Customers can submit recipes to E-Mealz’s database. d) Customers receive a weekly meal plan and grocery list. e) E-Mealz provides nutritional information. Answer: a Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Learning Objective: Identify three ways in which you depend on information technology in your daily life. Section Reference: IT’s About Small Business 1.1: E-Mealz Difficulty: Medium

70) Refer to IT’s About Business Section Reference: 1.2 – Build Your Own Multinational Company: A digital nomad is a) someone who moves from office to office. b) someone who uses IT to work remotely. c) someone who lives outside Canada. d) someone who works anonymously. e) someone who has no IT costs. Answer: b Learning Objective: Begin the process of becoming an informed user of your organization's information systems. Section Reference: IT’s About Business 1.2 Difficulty: medium

71) Refer to IT’s About Business 1.3 – Electronic E-Discovery Software Replaces Lawyers: Ediscovery a) is still largely in the experimental stage. involves analyzing files in a law firm. b) searches vast numbers of documents for relevant information. c) does not have any more features than a search engine. d) cannot review e-mails or chat conversations. e) cannot recognize changes in behavior.


Rainer, Information System, Third Canadian Edition

Testbank

Answer: b Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: IT’s About Business 1.3 Difficulty: Medium

72) Refer to Closing Case – L’Oreal Retools its Information Systems – Which of the following was not a consequence of integrating L’Oreal’s SAP ERP system with FLEXNet? a) ISIS supports all faculty processes while promoting best practices. b) Master data are stored in the company’s central headquarters. c) Upgrades take much less time. d) Quality control has improved. e) Shop workers found the new system stressful. Answer: e Learning Objective: Provide three ways in which information technology can impact

managers and three ways it can impact non-managerial workers. Section Reference: Closing Case: L’Oreal Retools Its Information Systems Difficulty: Medium

Question Type: Short Answer

73) Differentiate between information systems and information technology. Learning Objective: Begin the process of becoming an informed user of your organization’s information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Medium

74) Differentiate among data, information, and knowledge. Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium


Rainer, Information System, Third Canadian Edition

Testbank

75) Differentiate between information technology and information technology infrastructure. Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

76) Discuss why information systems and information technologies are integral to your lives. Learning Objective: Begin the process of becoming an informed user of your organization’s information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Medium

77) Discuss three ways in which information technology can impact managers. Learning Objective: Discuss three ways in which information technology can impact managers and three ways in which it can impact non-managerial workers. Section Reference: 1.3 How Does IT Impact Organizations? Difficulty: Medium

78) How does IT impact the health and safety of employees? Learning Objective: Discuss three ways in which information technology can impact managers and three ways in which it can impact non-managerial workers. Section Reference: 1.3 How Does IT Impact Organizations? Difficulty: Medium

79) Discuss three ways in which information technology can impact non-managerial workers. Learning Objective: List three positive and three negative societal effects of the increased use of information technology. Section Reference: 1.4 Importance of Information Systems to Society Difficulty: Medium

Question Type: Essay

80) Who is an informed user, and what are the benefits of being an informed user?


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Begin the process of becoming an informed user of your organization's information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Easy

81) Distinguish among the career opportunities that IT offers. Learning Objective: Begin the process of becoming an informed user of your organization's information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Easy

82) Define the terms data, information, and knowledge, and provide examples of each one. Learning Objective: Define the terms data, information, and knowledge, and give examples of each. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

83) Distinguish between ERP and TPS; briefly detail how these systems support the entire organization. Learning Objective: Define the terms information technology, information system, computerbased information system, and application. Section Reference: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

84) Briefly detail upon how IT impacts organizations. Learning Objective: Identify three ways in which you depend on information technology in your daily life. Learning Objective: Provide three ways in which information technology can impact managers and three ways in which it can impact non-managerial workers. Section Reference: 1.3 How does IT impact organizations? Difficulty: Medium

85) Discuss three positive and three negative societal effects of the increased use of information technology.


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: List three positive and three negative societal effects of the increased use of information technology. Section Reference: 1.4 Importance of Information Systems to Society Difficulty: Medium

86) Explain how information technology impacts individuals, organizations, and the world. Support your answer with concrete examples. Learning Objective: Summarize the fundamental concepts and skills related to the impact of information systems on individuals, organizations, and society. Section Reference: Chapter 1 Difficulty: Medium

Legal Notice

Copyright © 2013 by John Wiley & Sons Canada, Ltd. or related companies. All rights reserved.

The data contained in these files are protected by copyright. This manual is furnished under licence and may be used only in accordance with the terms of such licence. The material provided herein may not be downloaded, reproduced, stored in a retrieval system, modified, made available on a network, used to create derivative works, or transmitted in any form or by any means, electronic, mechanical, photocopying,


Rainer, Information System, Third Canadian Edition

Testbank

recording, scanning, or otherwise without the prior written permission of John Wiley & Sons Canada, Ltd.


Rainer, Information System, Third Canadian Edition

Testbank

Chapter 2

Organizational Strategy, Competitive Advantage, and Information Systems Question Type: True/False

1) A business process has inputs and outputs. Answer: True Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Easy

2) A business process can be a liability. Answer: True Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Medium

3) The activities of a business process can be measured. Answer: True Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Easy

4) Cross-functional processes are business processes require the cooperation of multiple functional areas. Answer: True Section: Business Processes Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Easy

5) Cross-functional processes are executed within a single functional area.


Rainer, Information System, Third Canadian Edition

Testbank

Answer: False Learning Objective:Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Easy

6) The procurement process includes the sales function. Answer: False Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Medium

7) The long-term goal of business process management is to create a competitive advantage through organizational flexibility. Answer: True Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.1 Business Processes Difficulty: Medium

8) An organization’s business processes can create a competitive advantage. Answer: True Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Medium

9) A business process always includes information systems. Answer: False Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Medium


Rainer, Information System, Third Canadian Edition

Testbank

10) BPR is a strategy for improving the efficiency of an organization’s data collection. Answer: False Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.2 Business Process Reengineering and Business Process Difficulty: Medium

11) E-Commerce is the process of buying, selling, transferring, or exchanging products, services, or information via computer networks, including the Internet. Answer: True Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.3.3 E-Business and E-Commerce Difficulty: Easy

12) BPM is an implementation of BPR. Answer: False Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.2 Business Process Reengineering and Business Process Management Difficulty: Hard

13) BPM can improve an organization’s flexibility. Answer: True Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.2 Business Process Reengineering and Business Process Difficulty: Medium

14) The overall performance of an organization has little to do with how well it manages its business processes. Answer: False Learning Objective: Differentiate between the terms business process reengineering and business process management.


Rainer, Information System, Third Canadian Edition

Testbank

Section Reference: 2.2 Business Process Reengineering and Business Process Difficulty: Medium

15) Business process management includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes. Answer: True Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.2 Business Process Reengineering and Business Process Difficulty: Easy

16) Differentiation is the result of optimizing the marketing and innovation processes. Answer: True Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.2 Business Process Reengineering and Business Process Difficulty: Hard

17) Productivity is the result of optimizing operations and supplier processes. Answer: False Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.2 Business Process Reengineering and Business Process Difficulty: Hard

18) Customer satisfaction is the result of optimizing and aligning business processes to fulfill customers’ needs, wants, and desires. Answer: True Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.2 Business Process Reengineering and Business Process Difficulty: Hard

19) According to Friedman, the focus of Globalization 3.0 is on groups and individuals. Answer: True Learning Objective: Differentiate between the terms business process reengineering and business process management.


Rainer, Information System, Third Canadian Edition

Testbank

Section Reference: 2.2 Business Process Reengineering and Business Process Difficulty: Hard

20) The business environment refers to the industry that a company is in. Answer: False Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Medium

21) Globalization is the integration and interdependence of many facets of life made possible by rapid advances in information technology. Answer: True Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

22) The information technology environment is the combination of social, legal, economic, physical, and political factors that affect business activities. Answer: False Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

23) In general, labor costs are higher in countries than in developed countries. Answer: False Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

24) Developed countries usually provide greater fringe benefits than developing countries. Answer: True Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

25) Information technology is facilitating the entry of a wide variety of employees into the workforce. Answer: True Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

26) Internet access in Canada is not particularly related to household income. Answer: False Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

27) In general, government deregulation decreases competition. Answer: False Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

28) Ethical issues are important because, if handled poorly, they can damage an organization’s image. Answer: True Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

29) Build-to-stock is a strategy of producing customized products and services. Answer: False Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

30) In mass production, a company produces a large quantity of identical items. Answer: True Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

31) In mass customization, companies produce items in large quantity, but they tailor the items to meet the desires and needs of individual customers. Answer: True Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

32) Customer intimacy is the process whereby a business learns as much as possible about its customers to better anticipate and address their needs.


Rainer, Information System, Third Canadian Edition

Testbank

Answer: True Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

33) A growing IT initiative called green IT is enabling organizations to reduce their carbon footprint. Answer: True Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

34) The digital divide is the gap between data and knowledge. Answer: False Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

35) The One Laptop per Child project aims to use technology to revolutionize how the world can educate its children. Answer: True Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

36) Competitive advantage helps a company function effectively within a market and generate larger-than-average profits.


Rainer, Information System, Third Canadian Edition

Testbank

Answer: True Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Easy

37) An information system that helps an organization gain a competitive advantage is called a competitive information system. Answer: False Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Easy

38) Every competitive organization is driven by the competitive forces identified by Michael Porter. Answer: True Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Easy

39) Michael Porter concludes that the overall impact of the Internet is to increase competition, which generally diminishes a firm’s profitability. Answer: True Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

40) The Internet increases traditional barriers to entry into a market. Answer: False Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Easy

41) The Internet decreases customers’ bargaining power. Answer: False Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Easy

42) Information-based industries face the greatest threat from substitutes. Answer: True Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Easy

43) The music industry is a good example of the extremely low variable costs of digital products. Answer: True Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

44) The internet impact on bargaining power of suppliers always favors buyers. Answer: False Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

45) The introduction of the ATM in the banking industry is an example of the innovation strategy. Answer: True Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Easy

46) An entry barrier is a long-term competitive advantage. Answer: False Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Easy

47) The bargaining power of suppliers is low when their buyers have few choices. Answer: False Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium


Rainer, Information System, Third Canadian Edition

Testbank

48) The bargaining power of suppliers is high when buyers have few choices and low when buyers have many choices. Answer: True Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

49) When there are many substitute products, a company can create a competitive advantage by increasing fees. Answer: False Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Easy

50) Porter’s value chain model is a variation of his competitive advantage framework. Answer: False Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Easy

51) The primary activities in the value chain create the value for which customers are willing to pay. Answer: True Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

52) It’s a good idea for a company to select two competitive advantage strategies. Answer: False Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Easy

53) With a competitive strategy, companies only need to plan their own moves.

Answer: False Learning Objective1: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

Question Type: Multiple Choice

54) Which of the following statements is false? a) Competitive advantage is based on some measurement such as cost, quality, or speed. b) Competitive advantage enables a company to function effectively within a market. c) Competitive advantage leads to higher-than-average profits. d) Competitive advantage requires the use of technology. e) Competitive advantage applies to companies of all sizes. Answer: d Learning Objective: Provide a real-world application of how information systems can contribute to organizational strategies and competitive advantage. Section Reference: Opening Case: Double Trouble for BP Difficulty: Easy

55) BP’s April 2010 oil spill revealed the following about their business processes: a) BP continually ignored the automatic warnings provided by the drilling system. b) BP seemed to neglect the fact that the information systems that support its drilling operations are clearly just as strategic as the firm’s business information systems.


Rainer, Information System, Third Canadian Edition

Testbank

c) BP was able to use IT to create millions of dollars in cost savings. d) All of the above were revealed by the oil spill. Answer: b Learning Objective1: Provide a real-world application of how information systems can contribute to organizational strategies and competitive advantage. Section Reference: Opening Case: Double Trouble for BP Difficulty: Medium

56) BP’s CIO was tasked with ______________. a) Updating their IT systems b) Getting more IT vendors to support their systems c) Reducing the number of IT contractors d) Replace SAP with a better system Answer: c Learning Objective: Provide a real-world application of how information systems can contribute to organizational strategies and competitive advantage. Section Reference: Opening Case: Double Trouble for BP Difficulty: Medium

57) The term store power refers to: a) The increased number of products. b) The increased costs. c) The increased customer traffic. d) The increased sales force. Answer: c Learning Objective: Provide a real-world application of how information systems can contribute to organizational strategies and competitive advantage. Section Reference: IT’s About Small Business, Boosting Store Power Difficulty: Medium

58) The store power can be significantly increased by: a) Proper showcasing of products online. b) Kijiji. c) Craig list. d) Sales force.


Rainer, Information System, Third Canadian Edition

Testbank

Answer: a Learning Objective: Provide a real-world application of how information systems can contribute to organizational strategies and competitive advantage. Section Reference: IT’s About Small Business, Boosting Store Power Difficulty: Easy.

59) The following company focused on providing a platform to companies to proper showcasing of their products. a) Kijiji.com b) CraigList.com c) SalesForce.com d) Shopcaster.com Answer: d Learning Objective: Provide a real-world application of how information systems can contribute to organizational strategies and competitive advantage. Section Reference: IT’s About Small Business, Boosting Store Power Difficulty: Easy

60) Which of the following statements concerning business processes is false? a) A process has inputs. b) A process has outputs. c) A process has activities that can be measured. d) A process creates value. e) A process cannot cross functional area boundaries. Answer: e Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Easy

61) A business process can be a competitive advantage when _____________. a) The company becomes less responsive and efficient b) IT enables the company innovate or to execute better than its competitors c) Inputs are translated to outputs d) A product or service is delivered to the organization Answer: b


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Hard

62) Applying copyrights and trademarks is an example of a(n): a) Accounting business process b) Finance business process c) Marketing business process d) Production business process e) Management information systems business process Answer: c Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Medium

63) Reconciling bank accounts is an example of a(n): a) Accounting Business Process b) Finance Business Process c) Marketing Business Process d) Production Business Process e) Management Information Systems Business Process Answer: a Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Easy 64) Managing account collections is an example of a(n): a) Accounting Business Process b) Finance Business Process c) Marketing Business Process d) Production Business Process e) Management Information Systems Business Process Answer: b


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Medium

65) Collecting sales tax is an example of a(n): a) Accounting Business Process b) Finance Business Process c) Marketing Business Process d) Production Business Process e) Management Information Systems Business Process Answer: c Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Medium

66) Managing purchasing is an example of a(n): a) Accounting Business Process b) Finance Business Process c) Marketing Business Process d) Production Business Process e) Management Information Systems Business Process Answer: d Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Medium

67) Cross-functional business processes: a) Fall within a single functional area b) Cut across multiple functional areas c) Require collaboration d) A and C e) B and C Answer: e


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Medium

68) Managing pay and payroll is an example of a(n): a) Accounting Business Process b) Finance Business Process c) Marketing Business Process d) Human Resources Business Process e) Management Information Systems Business Process Answer: d Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Easy

69) Which of the following processes involves the warehouse, purchasing, and accounting functional areas? a) Procurement b) Fulfillment c) Order entry d) Accounts receivable e) Payroll Answer: a Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Easy

70) Which of the following processes involves the warehouse, sales, and accounting functional areas? a) Procurement b) Fulfillment c) Order entry d) Accounts Receivable e) Payroll


Rainer, Information System, Third Canadian Edition

Testbank

Answer: b Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Easy

71) Which of the following is not a role that information systems play in businesses processes? a) Establish standards b) Execute the process c) Capture and store process data d) Monitor process performance e) Detect problems with the process. Answer: a Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Medium

72) An example of a cross-functional business process is ________. a) Warehousing b) Purchasing c) Procurement d) Accounting Answer: c Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Medium

73) For many organizations, business process reengineering a) Is easy to implement. b) Is not disruptive to implement. c) Has little impact on facilities. d) Is inexpensive. e) Has a major impact on the corporate culture. Answer: e


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Medium

74) Which of the following statements is false? a) BPM is a task-oriented approach. b) BPM can help companies reduce costs. c) BPM can help companies increase revenue. d) BPM can improve customer satisfaction. e) BPM can improve organizational flexibility Answer: a Learning Objective: Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. Section Reference: 2.1 Business Processes Difficulty: Medium

75) Business process ______________ is a management technique that includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes. a) Implementation b) Management c) Optimization d) Reengineering Answer: b Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.2 Business Process Reengineering and Business Process Management Difficulty: Easy

76) The initial goal of business process management is ____________________. a) To be less radical, disruptive, and more incremental b) To improve profitability by decreasing costs and increasing revenue c) To create a competitive advantage through organizational flexibility d) To organize around the business process not the individual task Answer: b


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.2 Business Process Reengineering and Business Process Management Difficulty: Hard

77) Which of the following statements is false? a) BPM begins with process modeling. b) Process modeling is a graphical depiction of all the steps in a process. c) BPM uses Web-enabled technologies for user interfaces. d) Business activity monitoring is used to measure and manage business processes. e) Business activity monitoring is a type of scheduled reporting. Answer: e Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.2 Business Process Reengineering and Business Process Management Difficulty: Medium

78) _____________ is the result of optimizing the manufacturing and logistics processes. a) Customer satisfaction b) Cost reduction c) Cycle and fulfillment time d) Differentiation Answer: c Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.2 Business Process Reengineering and Business Process Management Difficulty: Medium

79) _____________ is the result of optimizing the marketing and innovation processes. a) Customer satisfaction b) Cost reduction c) Cycle and fulfillment time d) Differentiation Answer: d


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.2 Business Process Reengineering and Business Process Management Difficulty: Medium

80) Business process _______________ is a strategy for improving the efficiency and effectiveness of an organization’s business processes. a) Implementation b) Management c) Optimization d) Reengineering Answer: d Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.2 Business Process Reengineering and Business Process Management Difficulty: Medium

81) ____________ pressures are generated by the global economy, intense competition, the changing nature of the workforce, and powerful customers. a) Economic b) Market c) Social d) Technology Answer: b Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.2 Business Process Reengineering and Business Process Management Difficulty: Medium

82) According to Friedman, the focus of Globalization 1.0 was on: a) Countries b) Companies c) Groups d) Individuals Answer: a


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.2 Business Process Reengineering and Business Process Management Difficulty: Easy

83) According to Friedman, the focus of Globalization 2.0 was on: a) Countries b) Companies c) Groups d) Individuals Answer: b Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.2 Business Process Reengineering and Business Process Management Difficulty: Easy

84) According to Friedman, the focus of Globalization 3.0 was on: a) Countries b) Companies c) Groups and Individuals d) Governments Answer: c Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.2 Business Process Reengineering and Business Process Management Difficulty: Easy

85) New and improved technologies rapidly create and support substitutes for products, alternative service options, and superb quality. This is an example of ________ pressures. a) Economic b) Market c) Social d) Technology Answer: d Learning Objective: Differentiate between the terms business process reengineering and business process management.


Rainer, Information System, Third Canadian Edition

Testbank

Section Reference: 2.2 Business Process Reengineering and Business Process Management Difficulty: Easy

86) Spending to protect against terrorism is an example of __________ pressure. a) Economic b) Market c) Social d) Technology Answer: c Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.2 Business Process Reengineering and Business Process Management Difficulty: Easy

87) ____________ is a strategy of producing a large quantity of items, but customizing them to fit the desire of each customer. a) Customer focus b) Make-to-order c) Mass customization d) Personalization Answer: c Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.2 Business Process Reengineering and Business Process Management Difficulty: Easy

88) ____________ is a strategy of producing customized (made to individual specifications) products and services. a) Customer focus b) Make-to-order c) Mass customization d) Personalization Answer: b Learning Objective: Differentiate between the terms business process reengineering and business process management. Section Reference: 2.2 Business Process Reengineering and Business Process Management


Rainer, Information System, Third Canadian Edition

Testbank

Difficulty: Easy

89) Business pressures on organizations are created when there are changes in a) Social factors b) Economic factors c) Legal factors d) Political factors e) Changes in all of these will create business pressures. Answer: e Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

90) Market pressures include which of the following? a) The global economy b) Weak competition c) A homogeneous workforce d) Weak customers e) High-cost offshore labor Answer: a Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

91) The workforce in developed countries is exhibiting all of the following trends except: a) It is becoming more diversified. b) It includes more women. c) It includes more single parents. d) It includes fewer persons with disabilities. e) It includes more minority-group members. Answer: d


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

92) Today’s customers have ________. a) Less knowledge about products b) Less sophistication c) Difficulty in finding information about products d) Higher expectations e) Difficulty in comparing prices Answer: d Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

93) Which of the following statements concerning technology pressures on modern businesses is true? a) Technology changes so rapidly that organizations should wait before they release new technology-based products. b) New technologies offer alternative service options. c) New technologies will never replace existing technologies. d) The amount of information on the Internet remains stable from year to year. e) The important information on the Internet is fee-based. Answer: b Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

94) Which of the following is not an example of the growing initiative called green IT? a) Designing an IT infrastructure to support sustainability. b) Building systems that monitor carbon throughout the organization. c) Asking vendors about compliance on environmental standards.


Rainer, Information System, Third Canadian Edition

Testbank

d) Building computer applications that use less energy e) Designing energy-efficient data centers. Answer: d Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

95) The digital divide is an example of which type of societal pressure? a) Social responsibility b) Government regulations c) Protection against terrorism d) Ethics e) Information overload Answer: a Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

96) Which one of the following statements is false? a) Businesses tend to view government regulations as expensive constraints on their activities. b) Government deregulation reduces competition. c) IT support is essential for compliance with many new regulations. d) IT has been used to identify patterns of behavior associated with terrorist activities. e) Information ethics can destroy the morale of a company’s employees. Answer: b Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

97) Which of the following is not a Section Reference by organizations to business pressures?


Rainer, Information System, Third Canadian Edition

Testbank

a) Delay releases of innovated products. b) Build strategic systems that enable an organization to increase market share or profits. c) Provide tools that satisfy customers so they don’t go to a competitor. d) Manufacture customized goods at a lower cost. e) Conduct business electronically with customers and business partners. Answer: a Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Medium

98) Producing identical items in large quantities is called: a) Strategic systems. b) Customer focus. c) Continuous improvement. d) Mass production. e) Mass customization. Answer: d Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

99) Producing customized items in large quantities is called: a) Strategic systems. b) Customer focus. c) Continuous improvement. d) Mass production. e) Mass customization. Answer: e Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

100) The Bodymetrics body scanner is best characterized as an example of: a) Mass production. b) Customer focus. c) Real-time customer input. d) Mass customization. e) Continuous improvement. Answer: d Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Medium

101) Information-based industries are most susceptible to which one of Porter’s five forces? a) Threat of entry of new competitors b) Bargaining power of suppliers c) Bargaining power of customers d) Threat of substitute products e) Rivalry among existing firms in an industry Answer: d Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

102) Competitive advantage for an organization manifests itself as all of the following except: a) Lower costs b) Higher quality c) Increased time to market d) Increased profits e) Increased speed Answer: c Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one.


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

103) For most companies, the Web _____ the threat that new competitors will enter the market by _____ traditional barriers to entry. a) Decreases, increasing b) Increases, decreasing c) Increases, increasing d) Decreases, decreasing Answer: b Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

104) _____ is a feature that must be offered by a competing organization in order to survive in the marketplace. a) Competitive advantage b) An entry barrier c) Strategic advantage d) Rapid time-to-market e) One-to-one marketing Answer: b Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

105) The threat of competitors’ entering the automobile manufacturing industry is _____ because barriers to entry are so _____. a) Low, low b) High, high


Rainer, Information System, Third Canadian Edition

Testbank

c) High, low d) Low, high Answer: d Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

106) The threat of competitors’ entering a market is very high in industries that perform a(n) _____ role and in industries where the primary product or service is _____. a) Intermediation, physical b) Broker, physical c) Sales, financial d) Financial, digital e) Intermediation, digital Answer: e Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Hard

107) How does the Internet affect the way you purchase your textbooks? a) The Internet gives you fewer choices. b) The Internet increases your bargaining power. c) The Internet provides you with less information. d) The Internet decreases your bargaining power. e) The Internet increases your switching costs. Answer: b Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium


Rainer, Information System, Third Canadian Edition

Testbank

108) Buyer power is _____ when buyers have many choices from whom to buy and _____ when buyers have few choices. a) High, the same b) High, low c) Low, low d) Low, high e) Low, the same Answer: b Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

109) The costs of delivering products in the _____ channel are much higher than delivering products in the _____ channel. a) E-commerce, digital b) Digital, e-commerce c) Digital, physical d) Physical, financial e) Physical, digital Answer: e Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

110) Porter’s competitive forces model helps organizations identify _____, whereas his value chain model helps organizations identify specific _____. a) Competitive opportunities, activities b) General strategies, activities c) Activities, competitive opportunities d) Activities, general strategies e) Primary activities, support activities


Rainer, Information System, Third Canadian Edition

Testbank

Answer: b Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

111) _____ activities create value for which customers are willing to pay, whereas _____ activities do not add value directly to the firm’s products or services. a) Support, primary b) Human resource management, inbound logistics c) Procurement, operations d) Primary, support e) Accounting, outbound logistics Answer: d Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

112) If there are _____ substitutes for an organization’s products or services, then the threat of substitutes is _____. a) Many, high b) Few, low c) Few, high d) Many, low e) Few, negligible Answer: a Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium


Rainer, Information System, Third Canadian Edition

Testbank

113) New technologies can produce new products very _____, which _____ the threat from substitute products. a) Slowly, decreases b) Slowly, increases c) Slowly, does not affect d) Quickly, increases e) Quickly, does not affect Answer: d Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

114) The visibility of Internet applications on the Web makes proprietary systems more difficult to keep secret. This is an example of which of Porter’s five forces? a) Threat of entry of new competitors b) Bargaining power of suppliers c) Bargaining power of customers d) Threat of substitute products e) Rivalry among existing firms in an industry Answer: e Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

115) Walmart’s automatic inventory replenishment system, which enables the company to reduce inventory storage requirements, is an example of which strategy for competitive advantage? a) Cost leadership b) Differentiation c) Innovation d) Operational effectiveness e) Customer-orientation


Rainer, Information System, Third Canadian Edition

Testbank

Answer: a Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

116) Which strategy for competitive advantage involves offering different products, services, or product features? a) Cost leadership b) Differentiation c) Innovation d) Operational effectiveness e) Customer-orientation Answer: b Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Easy

117) Which strategy for competitive advantage involves introducing new products and putting new features in existing products? a) Cost leadership b) Differentiation c) Innovation d) Operational effectiveness e) Customer-orientation Answer: c Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

118) The threat of entry of new competitors is __________ when it is easy to enter a market and __________ when significant barriers to entry exist. a) High, high b) High, low c) Low, low d) Low, high Answer: b Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

119) The bargaining power of suppliers is _______ when buyers have few choices and _________ when buyers have many choices. a) High, high b) High, low c) Low, low d) Low, high Answer: b Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

120) The introduction of ATM machines by Citibank was a classic example of which strategy for competitive advantage? a) Cost leadership b) Innovation c) Differentiation d) Operational effectiveness e) Customer-orientation Answer: b Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage.


Rainer, Information System, Third Canadian Edition

Testbank

Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Easy

121) Southwest Airlines’ low-cost, short-haul strategy is an example of which strategy for competitive advantage? a) Cost leadership b) Differentiation c) Innovation d) Operational effectiveness e) Customer-orientation Answer: b Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Easy

122) Which strategy for competitive advantage involves improving the manner in which an organization executes its internal business processes? a) Cost leadership b) Differentiation c) Innovation d) Operational effectiveness e) Customer-orientation Answer: d Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Easy

123) When Amazon welcomes you by name back to its Web site on your second visit, it is employing which strategy for competitive advantage? a) Cost leadership b) Differentiation c) Innovation


Rainer, Information System, Third Canadian Edition

Testbank

d) Operational effectiveness e) Customer-orientation Answer: e Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

124) IT will impact managers’ jobs in all of the following ways except: a) Managers will have time to get into the field b) Managers can spend more time planning c) Managers can spend more time “putting out fires” d) Managers can gather information more quickly e) None of these Answer: c Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

125) The bargaining power of buyers is ___________ when buyers have many choices and ________ when buyers have few choices. a) High, high b) High, low c) Low, low d) Low, high Answer: b Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium


Rainer, Information System, Third Canadian Edition

Testbank

126) The threat of substitute products or services is _______ when there are many substitutes for an organization’s products or services and ________ when there are few substitutes. a) High, high b) High, low c) Low, low d) Low, high Answer: b Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

127) The rivalry among firms in an industry is __________ when there is fierce competition and ___________ when competition is among fewer firms. a) High, high b) High, low c) Low, low d) Low, high Answer: b Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

128) In the airline industry, ________ is an example of differentiation strategy as it offers regional service at low cost. a) Air Canada b) Air Quebec c) WestJet d) EastJet Answer: c Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Hard


Rainer, Information System, Third Canadian Edition

Testbank

129) Porter’s _____ help(s) companies identify general strategies, whereas his _____ help(s) to identify specific activities where companies can use the strategies for greatest impact. a) Value chain model, competitive forces model b) Primary activities, support activities c) Competitive forces model, primary activities d) Competitive forces model, value chain model e) Value chain model, support activities Answer: d Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

130) The internet ________ buyers’ access to information, __________ buyer power. a) Decreases, decreasing b) Decreases, increasing c) Increases, decreasing d) Increases, increasing Answer: d Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

131) Which strategy for competitive advantage improves the manner in which internal business processes are executed so that a firm performs similar activities better than its rivals? a) Cost leadership b) Differentiation c) Innovation d) Operational effectiveness Answer: d Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium


Rainer, Information System, Third Canadian Edition

Testbank

132) Which of the following is not an example of business – IT alignment? a) The company goals are clear to every IT and business employee. b) The company ensures that IT employees understand how the company makes money. c) The company views IT as a way to support the business but not as a way to create new revenue streams. d) IT professionals rotate into business departments. e) The company views customer service as extremely important. Answer: c Learning Objective: Define business-information technology alignment, and describe the characteristics of effective alignment. Section Reference: 2.5 Business–Information Technology Alignment Difficulty: Medium

133) Which of the following is not a cause of inadequate alignment between IT and business? a) A lack of communication b) Different objectives c) Not understanding each group’s expertise d) Lack of IT knowledge on the part of the business executives e) Lack of funds Answer: e Learning Objective: Define business-information technology alignment, and describe the characteristics of effective alignment. Section Reference: 2.5 Business–Information Technology Alignment Difficulty: Medium

134) Which of the following is NOT a characteristic of excellent alignment between IT and business? a) Organizations create a vibrant and inclusive company culture. b) Organizations ensure business and IT professionals communicate solely from their area of expertise. c) Organizations ensure that IT employees understand how the company makes (or loses) money. d) Organizations view their internal and external customers and their customer service function as supremely important. Answer: b


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Define business-information technology alignment, and describe the characteristics of effective alignment. Section Reference: 2.5 Business–Information Technology Alignment Difficulty: Medium

135) Alignment between IT and business is difficult because ________. a) the objectives of business managers and IT managers are so comprehensive. b) the business and IT departments know little of the other group’s expertise. c) communicate well but find it hard to implement projects that are discussed. d) All of the above are reasons alignment is difficult. Answer: b Learning Objective: Define business-information technology alignment, and describe the characteristics of effective alignment. Section Reference: 2.5 Business–Information Technology Alignment Difficulty: Medium

136) Alignment between IT and business is characterized by a __________ of the IT function with strategy, mission, and goals of the organization. a) tight integration b) loose integration c) replacement d) upgrade Answer: a Learning Objective: Define business-information technology alignment, and describe the characteristics of effective alignment. Section Reference: 2.5 Business–Information Technology Alignment Difficulty: Medium

137) IT governance aims to add value while ______: a) Balancing risk versus return over IT and its processes. b) Maximizing profit. c) Minimizing cost. d) Creating a friendly environment Answer: a Learning Objective: Define the term “IT governance” and explain why information systems need to be effectively managed and planned.


Rainer, Information System, Third Canadian Edition

Testbank

Section Reference: 2.5 Business–Information Technology Alignment Difficulty: Medium

138) Refer to IT’s About Business– Sleek Audio: Which of Friedman’s flatteners applies to Sleek Audio’s decision to bring its manufacturing back to the United States? a) Offshoring b) Informing c) Work-flow software d) Supply chaining e) The Steroids Answer: d Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: IT’s About Business: Sleek Audio Difficulty: Medium

139) ___________ is a website where potential donors can decide where their money can be directed, stating whether it goes to a particular disaster relief fund. a) GiftFlow.org b) RedCross.ca c) Microsoft.ca d) Kiva.org Answer: b Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: IT’s About Business: The Internet Facilitates Generosity Difficulty: Medium

140) According to “The Internet Facilitates Generosity” case, what is the order in which people most readily share? a) Information, Physical goods, Time b) Information, Time, Physical goods c) Time, Information, Physical goods d) Time, Physical goods, Information Answer: b


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: IT’s About Business: The Internet Facilitates Generosity Difficulty: Medium

141) Refer to IT’s About Business – The Internet Facilitates Generosity: Sociologists argue that posting experiences on message boards can actually improve a person’s a) Self-esteem b) Independence c) Wealth d) Free time e) Social status Answer: a Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: IT’s About Business: The Internet Facilitates Generosity Difficulty: Medium

142) The Lululemon Athletica Inc. (www.lululemon.com) focused on creating: a) Brand environment b) Culture of high quality c) Uniqueness d) enhanced customer service with IT e) All of the above Answer: e Learning Objective: Summarize the fundamental concepts and skills related to developing organizational strategies and competitive advantage. Section Reference: Closing Case – Can Lululemon Sustain Competetive Advantage? Difficulty: Medium

Question Type: Short Answer

143) Identify the three types of business pressures, and explain how organizations can use IT to respond to each one. Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each.


Rainer, Information System, Third Canadian Edition

Testbank

Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Medium

144) Using Porter’s competitive forces model, contrast the bargaining power of suppliers and the bargaining power of customers (buyers). Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

145) What are switching costs, and why would a company care about them? Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

146) Differentiate between Porter’s competitive forces model and his value chain model. Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

147) Differentiate between primary activities and support activities in Porter’s value chain model. Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium


Rainer, Information System, Third Canadian Edition

Testbank

148) Evaluate the assertion that an information system by itself can rarely provide a sustainable competitive advantage. Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Medium

Question Type: Essay

149) Explain what a business environment is and what factors within the environment put pressure on the business. Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Medium

150) Explain how changes in social responsibility, government regulation/deregulation, social programs, protection against terrorism, and ethics put pressure on modern businesses. Learning Objective: List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference: 2.3 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Hard

151) Identify the five forces of Porter’s competitive forces model, and explain how the Internet impacts each one. Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Hard

152) Discuss why the variable cost of digital products is extremely low.


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Hard

153) Provide an example of each of the five strategies for competitive advantage. (Do not use the examples provided in the book). Learning Objective: Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective: Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference: 2.4 Competitive Advantage and Strategic Information Systems Difficulty: Hard


Rainer, Information System, Third Canadian Edition

Testbank

Legal Notice Copyright © 2014 by John Wiley & Sons Canada, Ltd. or related companies. All rights reserved.

The data contained in these files are protected by copyright. This manual is furnished under licence and may be used only in accordance with the terms of such licence. The material provided herein may not be downloaded, reproduced, stored in a retrieval system, modified, made available on a network, used to create derivative works, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without the prior written permission of John Wiley & Sons Canada, Ltd.


Rainer, Information System, Third Canadian Edition

Testbank

Chapter 3 Data and knowledge management Question Type: True/False

1) The growing mounds of data have given rise to a new type of professional, the data scientist. Answer: True Learning Objective: Identify three common challenges in managing data, and describe one way organizations can address each challenge using data governance. Section Reference: Case 3.1 Big Data Difficulty: Medium

2) The Information Silos are information that is stored and isolated in separate functional areas. Answer: True Learning Objective: Identify three common challenges in managing data, and describe one way organizations can address each challenge using data governance. Section Reference: Case 3.1 Big Data Difficulty: Easy

3) The decisions about hardware or software last longer, and have a broader impact, than decisions about data. Answer: False Learning Objective: Identify three common challenges in managing data, and describe one way organizations can address each challenge using data governance. Section Reference: Case 3.1 Big Data Difficulty: Easy

4) The biggest problem today is gathering data and then using it properly. Answer: False Learning Objective: Identify three common challenges in managing data, and describe one way organizations can address each challenge using data governance. Section Reference: Case 3.1 Big Data Difficulty: Easy

5) Data governance is an approach to managing functional area information systems.


Rainer, Information System, Third Canadian Edition

Testbank

Answer: False Learning Objective: Identify three common challenges in managing data, and describe one way organizations can address each challenge using data governance. Section Reference: Case 3.1 Big Data Difficulty: Easy

6) Increasing amounts of external data need to be considered in making organizational decisions. Answer: True Learning Objective: Identify three common challenges in managing data, and describe one way organizations can address each challenge using data governance. Section Reference: 3.1 Managing Data Difficulty: Easy

7) Data rot refers to the quality of the data itself. Answer: False Learning Objective: Identify three common challenges in managing data, and describe one way organizations can address each challenge using data governance. Section Reference: 3.1 Managing Data Difficulty: Medium

8) Master data are a set of core data that span all of an enterprise’s information systems. Answer: True Learning Objective: Identify three common challenges in managing data, and describe one way organizations can address each challenge using data governance. Section Reference: 3.1 Managing Data Difficulty: Easy

9) It is important for applications and data to be dependent on each other. Answer: False Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: 3.3 Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

10) Secondary keys have some identifying information but do not identify a file with complete accuracy. Answer: True Learning Objective: Name six problems that can be minimized by using the database approach. Section Reference: 3.2 The Database Approach Difficulty: Easy

11) A negative value for a student’s grade point average is an example of a data integrity problem. Answer: True Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: 3.3 Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach Difficulty: Easy

12) For the following entity-relationship diagram, the Student entity would have the foreign key.

Answer: False Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach: Designing the Database Difficulty: Easy

13) An entity is a person, place, thing, or event about which information is maintained. Answer: True Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: 3.3 Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach: Designing the Database Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

14) An attribute is any characteristic or quality that describes a particular entity. Answer: True Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach: Designing the Database Difficulty: Easy

15) Modality is the minimum number of times an instance of one entity can be associated with an instance of a related entity. Answer: True Learning Objective: Name six problems that can be minimized by using the database approach. Section Reference: 3.2 The Database Approach: Designing the Database Difficulty: Easy

16) The secondary key is a field that identifies a record with complete uniqueness. Answer: False Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach: Designing the Database Difficulty: Easy

17) Entity-relationship diagrams are documents that show the primary and secondary keys associated with a conceptual data model. Answer: False Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: The Database Approach: Designing the Database Difficulty: Easy

18) You would be an instance of your university’s STUDENT class. Answer: True


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach: Designing the Database Difficulty: Easy

19) The relational database model is based on the concept of three-dimensional tables. Answer: False Learning Objective: Discuss at least one main advantage and one main disadvantage of relational databases. Section Reference: 3.3 Database Management Systems Difficulty: Easy

20) A relational database is one big table that contains all the company’s records. Answer: False Learning Objective: Discuss at least one main advantage and one main disadvantage of relational databases. Section Reference: 3.3 Database Management Systems Difficulty: Easy

21) Structured query language is a relational database language that enables users to perform complicated searches with relatively simple statements. Answer: True Learning Objective: Discuss at least one main advantage and one main disadvantage of relational databases. Section Reference: 3.3 Database Management Systems Difficulty: Easy

22) When data are normalized, attributes in the table depend on the primary key and any secondary keys. Answer: False Learning Objective: Discuss at least one main advantage and one main disadvantage of relational databases. Section Reference: 3.3 Database Management Systems Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

23) In a data warehouse, existing data are constantly purged as new data come in. Answer: False Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Learning Objective 2: Demonstrate the use of a multidimensional model to store and analyze data. Section Reference: 3.4 Data Warehouses and Data Marts Difficulty: Easy

24) An organization’s data warehouse generally maintains its operational data. Answer: False Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Learning Objective 2: Demonstrate the use of a multidimensional model to store and analyze data. Section Reference: 3.4 Data Warehouses and Data Marts Difficulty: Easy

25) Online analytical processing (OLAP) involves the analysis of accumulated data by end users. Answer: True Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Learning Objective 2: Demonstrate the use of a multidimensional model to store and analyze data. Section Reference: 3.4 Data Warehouses and Data Marts Difficulty: Easy

26) A data mart can be implemented more quickly than a data warehouse. Answer: True Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Section Reference: 3.4 Data Warehouses and Data Marts Difficulty: Easy

27) Data marts are designed for the end-user needs in a strategic business unit or department. Answer: True


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Learning Objective 2: Demonstrate the use of a multidimensional model to store and analyze data. Section Reference: 3.4 Data Warehouses and Data Marts Difficulty: Easy

28) The Isle of Capri Casinos found its direct mail program was successful in providing a complete view of the customers. Answer: False Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Learning Objective 2: Demonstrate the use of a multidimensional model to store and analyze data. Section reference: IT’s About Business: The Data Warehouse at the Isle of Capri Casinos Difficulty: Medium

29) Master data are generated and captured by operational systems. Answer: False Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Learning Objective 2: Demonstrate the use of a multidimensional model to store and analyze data. Section Reference: 3.4 Data Warehouses and Data Marts: Governance Difficulty: Easy

30) A data mart is a low-cost, scaled-down version of a data warehouse. Answer: True Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Section Reference: 3.4 Data Warehouses and Data Marts: Governance Difficulty: Easy

31) Tacit knowledge is the more objective, rational, and technical types of knowledge. Answer: False Learning Objective: List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference: 3.5 Knowledge Management Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

32) Explicit knowledge refers to the cumulative store of subjective learning, which is personal and hard to formalize. Answer: False Learning Objective: List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference: 3.5 Knowledge Management Difficulty: Easy

33) Knowledge is information in action. Answer: True Learning Objective: List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference: 3.5 Knowledge Management Difficulty: Medium

34) When you start a job, you are given an employee handbook which contains the company’s tacit knowledge. Answer: False Learning Objective: List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference: 3.5 Knowledge Management Difficulty: Medium

35) When you start a job, you watch what other employees are doing and ask them to explain why they do it in a particular way. They are sharing their tacit knowledge. Answer: True Learning Objective: List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference: 3.5 Knowledge Management Difficulty: Medium

36) The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security. Answer: True


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Discuss at least one main advantage and one main disadvantage of relational databases. Section Reference: 3.3 Database Management Systems Difficulty: Easy

Question Type: Multiple Choice

37) Which of the following is NOT a problem with Big Data? a) Gathering data b) Privacy c) Security d) Decision-making Answer: a Learning Objective: Provide a real-world application of data and knowledge management. Section Reference: Big Data Difficulty: Medium

38) Refer to Opening Case – Big Data. Which of the following is not a problem created by “Big Data”? a) The data is not reliable. b) The amount of data exceeds the available storage. c) The existing networks can’t handle the volume. d) It is more difficult to protect the data. e) The vast amounts of data make decision making more complicated. Answer: a Learning Objective: Provide a real-world application of data and knowledge management. Section Reference: Big Data Difficulty: Medium

39) Which of the following has (have) the broadest impact on an organization? a) Decisions about hardware. b) Decisions about software. c) Decisions about data. d) Both “decisions about hardware” and “decisions about software.” e) All of these have an equal impact. Answer: c


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Identify three common challenges in managing data, and describe one way organizations can address each challenge using data governance. Section Reference: 3.1 Managing Data Difficulty: Easy

40) It is difficult to manage data. For example, it is common for customers to move and for companies to go out of business. This is an example of ___________. a) Data degradation b) Data rot c) Data security d) Scattered data Answer: a Learning Objective: Identify three common challenges in managing data, and describe one way organizations can address each challenge using data governance. Section Reference: 3.1 Managing Data Difficulty: Easy

41) Which of the following is not a source for external data? a) Commercial databases b) Corporate databases c) Sensors d) Satellites e) Government reports Answer: b Learning Objective: Identify three common challenges in managing data, and describe one way organizations can address each challenge using data governance. Section Reference: 3.1 Managing Data Difficulty: Easy

42) Which of the following is not a reason why managing data is difficult over time? a) New systems are developed. b) The media the data are stored on becomes problematic. c) New sources of data are created. d) The amount of data increases exponentially. e) All of these are reasons why managing data is difficult over time. Answer: e


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Identify three common challenges in managing data, and describe one way organizations can address each challenge using data governance. Section Reference: 3.1 Managing Data Difficulty: Medium

43) The amount of data we collect is ____________ over time, making it ________ difficult to manage data. a) Decreasing, less b) Decreasing, more c) Increasing, less d) Increasing, more Answer: d Learning Objective: Identify three common challenges in managing data, and describe one way organizations can address each challenge using data governance. Section Reference: 3.1 Managing Data Difficulty: Easy

44) Sarbanes-Oxley legally mandates that public companies evaluate and disclose the effectiveness of their ________________. a) IT policies b) HR rules c) financial controls d) sales goals Answer: c Learning Objective: Identify three common challenges in managing data, and describe one way organizations can address each challenge using data governance. Section Reference: 3.1 Managing Data Difficulty: Medium

45) Not including alphabetic characters in a Social Security Number field is an example of _____. a) Data isolation. b) Data integrity. c) Data consistency. d) Data redundancy. e) Application/data dependence. Answer: b


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach Difficulty: Easy

46) For the following entity-relationship diagram, the attributes you would NOT expect to see in the Computer entity are

a) manufacturer. b) type (laptop or desktop). c) memory size. d) disk size. e) student’s dorm room. Answer: E Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: 3.3 Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach: Designing the Database Difficulty: Easy

47) For the following entity-relationship diagram, what could the primary key be in the Grade entity?

a) Primary key in Student entity b) Primary key in Course entity c) Its own primary key. d) Primary key made up of the primary keys in Student entity and Course entity e) It doesn’t need a primary key. Answer: d Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach: Designing the Database


Rainer, Information System, Third Canadian Edition

Testbank

Difficulty: Medium

48) In a jewelry store, a customer places an order for a piece of jewelry (for example, a silver pin in the shape of a tulip). A customer could order more than one piece of jewelry at a time. Which of the following entity-relationship diagrams is true?

Answer: d Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach: Designing the Database Difficulty: Medium

49) _____ occurs when applications cannot access data associated with other applications. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence


Rainer, Information System, Third Canadian Edition

Testbank

Answer: a Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach Difficulty: Easy

50) _____ occurs when the same data are stored in many places. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence Answer: D Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach Difficulty: Easy

51) Data ___________ ensures applications cannot access data associated with other applications. a) Hermitting b) Inconsistency c) Isolation d) Redundancy Answer: c Learning Objective: Name six problems that can be minimized by using the database approach. Section Reference: 3.2 The Database Approach Difficulty: Easy

52) _____ occurs when various copies of the data agree. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence


Rainer, Information System, Third Canadian Edition

Testbank

Answer: c Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach Difficulty: Easy

53) You have moved to a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management? a) Data redundancy b) Data inconsistency c) Data isolation d) Data security e) Data dependence Answer: b Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach Difficulty: Medium

54) Place the following members of the data hierarchy in their correct order: a) Bit – byte – field – record – database – file b) Bit – field – byte – record – file – database c) Byte – bit – record – field – database d) Bit – byte – field – record – file – database e) Bit – record – field – byte – file -- database Answer: d Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach: The Data Hierarchy Difficulty: Easy

55) Data ___________ ensures data meets system constraints. a) Consistency b) Independence


Rainer, Information System, Third Canadian Edition

Testbank

c) Integrity d) Security Answer: c Learning Objective: Name six problems that can be minimized by using the database approach. Section Reference: 3.2 The Database Approach: The Data Hierarchy Difficulty: Easy

56) Data __________ is a problem minimized by databases. a) Independence b) Integrity c) Isolation d) Security Answer: c Learning Objective: Name six problems that can be minimized by using the database approach. Section Reference: 3.2 The Database Approach: The Data Hierarchy Difficulty: Easy

57) In the data hierarchy, the smallest element is the _____. a) Record. b) Bit. c) Byte. d) Character. e) File. Answer: b Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach: The Data Hierarchy Difficulty: Easy

58) A _______ is eight ________. a) bit, digits b) Byte, characters c) Bit, bytes d) Byte, bits


Rainer, Information System, Third Canadian Edition

Testbank

Answer: d Learning Objective: Name six problems that can be minimized by using the database approach. Section Reference: 3.2 The Database Approach: The Data Hierarchy Difficulty: Easy

59) A(n) _____ is a logical grouping of characters into a word, a small group of words, or a complete number. a) Byte b) Field c) Record d) File e) Database Answer: b Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach: The Data Hierarchy Difficulty: Easy

60) A(n) _____ is a logical grouping of related fields. a) Byte b) Field c) Record d) File e) Database Answer: c Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach: The Data Hierarchy Difficulty: Easy

61) A(n) _____ is a logical grouping of related records. a) Byte b) Field c) Record d) File


Rainer, Information System, Third Canadian Edition

Testbank

e) Database Answer: d Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach: The Data Hierarchy Difficulty: Easy

62) A(n) _____ represents a single character, such as a letter, number, or symbol. a) Byte b) Field c) Record d) File e) Database Answer: a Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach: The Data Hierarchy Difficulty: Easy

63) In a database, the primary key field is used to _____. a) Specify an entity b) Create linked lists c) Identify duplicated data d) Uniquely identify a record e) Uniquely identify an attribute Answer: d Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach: Designing the Database Difficulty: Easy

64) _____ are fields in a record that have some identifying information but typically do not identify the record with complete accuracy.


Rainer, Information System, Third Canadian Edition

Testbank

a) Primary keys b) Secondary keys c) Duplicate keys d) Attribute keys e) Record keys Answer: b Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach: Designing the Database Difficulty: Easy

65) As an individual student in your university’s student database, you are a(n) _____ of the STUDENT class. a) Instance b) Individual c) Representative d) Entity e) Relationship Answer: a Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach: Designing the Database Difficulty: Medium

66) At your university, students can take more than one class, and each class can have more than one student. This is an example of what kind of relationship? a) One-to-one b) One-to-many c) Many-to-one d) Many-to-many e) Some-to-many Answer: d Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach: Designing the Database


Rainer, Information System, Third Canadian Edition

Testbank

Difficulty: Easy

67) In a university’s relational database, the student record contains information regarding the student’s last name. The last name is a(n): a) Attribute. b) Entity. c) Primary key. d) Object. e) File. Answer: A Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach: Designing the Database Difficulty: Easy

68) A database management system is primarily a(n) _____. a) File-handling program b) Data-modeling program c) Interface between applications and a database d) Interface between data and a database e) Interface between queries and a database Answer: c Learning Objective: Discuss at least one main advantage and one main disadvantage of relational databases. Section Reference: 3.3 Database Management Systems Difficulty: Easy

69) In the relational database model, related tables can be joined when they contain common _____. a) Primary keys b) Rows c) Records d) Columns e) Files Answer: d


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Discuss at least one main advantage and one main disadvantage of relational databases. Section Reference: 3.3 Database Management Systems Difficulty: Medium

70) __________________ allows users to perform complicated searches by using relatively simple statements or keywords. a) DBMS b) QBE c) SQL d) SSK Answer: c Learning Objective: Discuss at least one main advantage and one main disadvantage of relational databases. Section Reference: 3.3 Database Management Systems Difficulty: Easy

71) _____ tell the database management system which records are joined with others in related tables. a) Primary keys b) Secondary keys c) Common attributes d) Common files e) Common fields Answer: a Learning Objective: Discuss at least one main advantage and one main disadvantage of relational databases. Section Reference: 3.3 Database Management Systems Difficulty: Medium

72) Data dictionaries perform all of the following functions except: a) Providing information on each record. b) Providing information on why attributes are needed in the database. c) Defining the format necessary to enter data into the database. d) Providing information on the name of each attribute. e) Providing information on how often attributes should be updated. Answer: a


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Discuss at least one main advantage and one main disadvantage of relational databases. Section Reference: 3.3 Database Management Systems Difficulty: Medium

73) In a relational database, every row represents a(n) _____. a) File b) Record c) Attribute d) Primary key e) Secondary key Answer: b Learning Objective: Discuss at least one main advantage and one main disadvantage of relational databases. Section Reference: 3.3 Database Management Systems Difficulty: Easy

74) A standardized language used to manipulate data is _____. a) MS-Access b) Oracle c) Query-by-example language d) Structured query language e) Data-manipulation language Answer: d Learning Objective: Discuss at least one main advantage and one main disadvantage of relational databases. Section Reference: 3.3 Database Management Systems Difficulty: Easy

75) _______________ uses drag-and-drop features to search a database. a) DBMS b) QBE c) SQL d) DDF Answer: b


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Discuss at least one main advantage and one main disadvantage of relational databases. Section Reference: 3.3 Database Management Systems Difficulty: Medium

76) Data dictionaries provide which of the following advantages to the organization? a) They reduce data inconsistency. b) They enable faster program development. c) They make it easier to modify data and information. d) Both “They enable faster program development.” and “They make it easier to modify data and information.” e) All of these Answer: e Learning Objective: Discuss at least one main advantage and one main disadvantage of relational databases. Section Reference: 3.3 Database Management Systems Difficulty: Easy

77) _____ is a method for analyzing and reducing a relational database to its most streamlined form. a) Structured query b) Normalization c) Query by example d) Joining e) Relational analysis Answer: b Learning Objective: Discuss at least one main advantage and one main disadvantage of relational databases. Section Reference: 3.3 Database Management Systems Difficulty: Easy

78) When data are normalized, attributes in the table depend only on the _____. a) Secondary key b) Common attribute c) Primary key d) Common row e) Common record Answer: c


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Discuss at least one main advantage and one main disadvantage of relational databases. Section Reference: 3.3 Database Management Systems Difficulty: Easy

79) _____________ reduces a relational database to its most streamlined form. a) A data dictionary b) A database management system c) Normalization d) Streamlining Answer: c Learning Objective: Discuss at least one main advantage and one main disadvantage of relational databases. Section Reference: 3.3 Database Management Systems Difficulty: Easy

80) Normalized data occurs when attributes in the table depend only on the _______. a) Data dictionary b) Primary key c) Record information d) Secondary key Answer: b Learning Objective: Discuss at least one main advantage and one main disadvantage of relational databases. Section Reference: 3.3 Database Management Systems Difficulty: Easy

81) The data in a data warehouse have which of the following characteristics? a) They are organized by subject. b) They are coded in different formats. c) They are updated in real time. d) They are typically retained for a defined, but limited, period of time. e) They are organized in a hierarchical structure. Answer: a


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Learning Objective 2: Demonstrate the use of a multidimensional model to store and analyze data. Section Reference: 3.4 Data Warehouses and Data Marts Difficulty: Medium

82) The data in a data warehouse: a) Are updated constantly in real time. b) Are updated in batch mode, approximately once per day. c) Are not updated. d) Are purged constantly as new data enter. e) Are available for MIS analysts, but not users. Answer: c Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Learning Objective 2: Demonstrate the use of a multidimensional model to store and analyze data. Section Reference: 3.4 Data Warehouses and Data Marts Difficulty: Medium

83) The process of moving data from various sources into the data warehouse is called: a) Uploading. b) Extracting, transforming, and loading. c) Online transaction processing. d) Master data management. e) Online analytical processing. Answer: b Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Learning Objective 2: Demonstrate the use of a multidimensional model to store and analyze data. Section Reference: 3.4 Data Warehouses and Data Marts Difficulty: Easy

84) A data warehouse is a repository of __________ data. a) Current b) Historical c) Queried d)Numbered


Rainer, Information System, Third Canadian Edition

Testbank

Answer: b Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Section Reference: 3.4 Data Warehouses and Data Marts Difficulty: Easy

85) Compared to data warehouses, data marts have which one of the following characteristics? a) They cost less. b) They have longer lead times for implementation. c) They provide for central rather than local control. d) They contain more information. e) They are more difficult to navigate. Answer: a Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Learning Objective 2: Demonstrate the use of a multidimensional model to store and analyze data. Section Reference: 3.4 Data Warehouses and Data Marts Difficulty: Medium

86) _____ is a formal approach to managing data consistently across an entire organization. a) Database management b) Enterprise information management c) Data warehousing d) Data governance e) Data mart Answer: d Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Learning Objective 2: Demonstrate the use of a multidimensional model to store and analyze data. Section Reference: 3.4 Data Warehouses and Data Marts: Data Governance Difficulty: Easy

87) Which of the following statements is TRUE? a) Databases are organized to make queries very easy. b) Running queries in a data warehouse does not degrade database performance. c) Databases are well-suited for making comparisons between records. d) Querying databases is the most effective and efficient way of using data.


Rainer, Information System, Third Canadian Edition

Testbank

Answer: b Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Section Reference: 3.4 Data Warehouses and Data Marts: Data Governance Difficulty: Hard

88) _____ provide(s) companies with a single version of the truth for their data. a) Data warehouses b) Data marts c) Databases d) Master data management e) Enterprise information management Answer: d Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Learning Objective 2: Demonstrate the use of a multidimensional model to store and analyze data. Section Reference: 3.4 Data Warehouses and Data Marts: Data Governance Difficulty: Easy

89) In data warehouses and data marts, data are stored in a multidimensional structure and visually represented as a data cube. Figure 3.12 is an example of a data cube of sales with the dimensions of product, geographic area, and time period (year). These are called business dimensions. What would the business dimensions be for Walmart’s sales with its many sales transactions for many products in many stores that would allow them to do weekly analysis? a) Customer, product, and month b) Customer, product, store c) Customer, product, store, and month d) Customer, product, store, and week e) Product, store, and week Answer: e Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Learning Objective 2: Demonstrate the use of a multidimensional model to store and analyze data. Section Reference: 3.4 Data Warehouses and Data Marts Difficulty: Medium

90) Organizations are turning to data governance for which of the following reasons?


Rainer, Information System, Third Canadian Edition

Testbank

a) They have too little data. b) They are responding to federal regulations. c) Their data are typically structured. d) Their data are usually located in the organization’s databases. e) Data across their organizations are generally consistent. Answer: b Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Learning Objective 2: Demonstrate the use of a multidimensional model to store and analyze data. Section Reference: 3.4 Data Warehouses and Data Marts: Data Governance Difficulty: Hard

91) __________ involves the analysis of accumulated data and involves a __________. a) OLAP, database b) OLAP, data warehouse c) OLTP, database d) OLTP, data warehouse Answer: b Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Section Reference: 3.4 Data Warehouses and Data Marts: Data Governance Difficulty: Easy

92) _____ describe the activities of the business, whereas _____ categorize(s), aggregate(s), and evaluate(s) data generated by the organization’s activities. a) Transaction data, master data b) Source data, transaction data c) Operational data, master data d) Master data, source data e) Business dimensional data, databases Answer: a Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Learning Objective 2: Demonstrate the use of a multidimensional model to store and analyze data. Section Reference: 3.4 Data Warehouses and Data Marts: Data Governance Difficulty: Medium


Rainer, Information System, Third Canadian Edition

Testbank

93) The Isle of Capri Casinos developed a data warehouse to ________________. a) Enhance its knowledge of its customers b) Target its promotions more precisely c) Adjust the floor in each casino to optimize revenue and profit d) All of the above Answer: d Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Section Reference: 3.4 Data Warehouses and Data Marts: Data Governance Difficulty: Easy

94) Refer to IT’s About Business – Isle of Capri Casinos. Capri Casinos decided it needed a data warehouse for all of the following reasons except: a) To process transactions faster. b) To provide a complete view of the customer. c) To enhance its marketing campaigns d) To provide business users access to business-wide data. e) To determine where to place its slot machines. Answer: a Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Learning Objective 2: Demonstrate the use of a multidimensional model to store and analyze data. Section Reference: IT’s About Business: 5.3 The Data Warehouse at the Isle of Capri Casinos Difficulty: Hard

95) _____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization’s memory and typically reside inside the organization in an unstructured manner. a) Discovery b) Knowledge management c) Decision support d) Online analytical processing e) Data mining Answer: b Learning Objective: List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference: 3.5 Knowledge Management


Rainer, Information System, Third Canadian Edition

Testbank

Difficulty: Easy

96) _____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem. a) Knowledge, information b) Data, information c) Information, data d) Information, knowledge e) Data, knowledge Answer: a Learning Objective: List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference: 3.5 Knowledge Management Difficulty: Medium

97) Explicit knowledge has which of the following characteristics? a) Objective b) Personal c) Slow d) Costly to transfer e) Ambiguous Answer: a Learning Objective: List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference: 3.5 Knowledge Management Difficulty: Medium

98) _____________ knowledge can be easily documented. a) Complete b) Explicit c) Tacit d) Intellectual Answer: b Learning Objective: List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference: 3.5 Knowledge Management


Rainer, Information System, Third Canadian Edition

Testbank

Difficulty: Easy

99) Tacit knowledge has which of the following characteristics? a) Codified b) Objective c) Unstructured d) Rational e) Technical Answer: c Learning Objective: List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference: 3.5 Knowledge Management Difficulty: Medium

100) ____________ knowledge is imprecise and costly to transfer. a) Complete b) Explicit c) Tacit d) Intellectual Answer: c Learning Objective: List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference: 3.5 Knowledge Management Difficulty: Medium

101) Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge. a) Tacit b) Explicit c) Managerial d) Geographical e) Cultural Answer: b Learning Objective: List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference: 3.5 Knowledge Management


Rainer, Information System, Third Canadian Edition

Testbank

Difficulty: Medium

102) The most important benefit of knowledge management systems is: a) They improve customer service. b) They make best practices available to employees. c) They enable the organization to retain scarce knowledge when employees retire. d) They improve employee morale. e) They make product development more efficient. Answer: b Learning Objective: List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference: 3.5 Knowledge Management Difficulty: Medium

103) Which of the following is a challenge for developing a knowledge management system? a) Employees must be willing to share their explicit knowledge. b) It must be continually maintained and updated. c) It makes human capital widely accessible. d) All of the above are challenges Answer: b Learning Objective: List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference: 3.5 Knowledge Management Difficulty: Medium

Question Type: Short Answer

104) Discuss why decisions concerning data structure have a broader impact than decisions concerning hardware and software. Learning Objective: Identify three common challenges in managing data, and describe one way organizations can address each challenge using data governance. Section Reference: 3.1 Managing Data Difficulty: Medium

105) Discuss the difficulties involved in managing data.


Rainer, Information System, Third Canadian Edition

Testbank

Title: Assessment Question 3.105 Learning Objective: Identify three common challenges in managing data, and describe one way organizations can address each challenge using data governance. Section Reference: 3.1 Managing Data Difficulty: Medium

106) Define each element of the data hierarchy, in order from smallest to largest. Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach Difficulty: Medium

107) Discuss the advantages of the database approach. Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach Difficulty: Medium

3.108) Describe entity-relationship modeling. Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach Difficulty: Medium

109) Describe the relational database model. Learning Objective: Discuss at least one main advantage and one main disadvantage of relational databases. Section Reference: 3.3 Database Management Systems Difficulty: Medium

110) Describe the characteristics of a data warehouse. Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Learning Objective 2: Demonstrate the use of a multidimensional model to store and analyze data. Section Reference: 3.4 Data Warehouses and Data Marts


Rainer, Information System, Third Canadian Edition

Testbank

Difficulty: Medium

111) What are the advantages of a data mart? Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Learning Objective 2: Demonstrate the use of a multidimensional model to store and analyze data. Section Reference: 3.4 Data Warehouses and Data Marts Difficulty: Medium

112) Differentiate between explicit knowledge and tacit knowledge. Provide examples of each. Learning Objective: List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference: 3.5 Knowledge Management Difficulty: Medium

113) Describe the six steps of the knowledge management system cycle. Learning Objective: List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference: 3.5 Knowledge Management Difficulty: Medium

Question Type: Essay

114) Describe the various new sources for data, and provide an example of each. Learning Objective: Provide a real-world application of data and knowledge management. Section Reference: Big Data Difficulty: Hard

115) Explain the six problems that can be minimized using the database approach. Learning Objective: Name six problems that can be minimized by using the database approach. Learning Objective 2: Demonstrate how to interpret relationships depicted in an entity-relationship diagram. Section Reference: 3.2 The Database Approach Difficulty: Medium

116) Identify and explain the advantages of the four characteristics of data warehouses.


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Learning Objective 2: Demonstrate the use of a multidimensional model to store and analyze data. Section Reference: 3.4 Data Warehouses and Data Marts Difficulty: Medium

117) Differentiate between master data and transaction data. Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Learning Objective 2: Demonstrate the use of a multidimensional model to store and analyze data. Section Reference: 3.4 Data Warehouses and Data Marts: Data Governance Difficulty: Hard

118) Why is data governance so important for organizations? Learning Objective: Identify the six basic characteristics of data warehouses, and explain the advantages of data warehouses and marts to organizations. Learning Objective 2: Demonstrate the use of a multidimensional model to store and analyze data. Section Reference: 3.4 Data Warehouses and Data Marts: Governance Difficulty: Hard


Rainer, Information System, Third Canadian Edition

Testbank

Chapter 4

Networks Question Type: True-False

1) The Internet is a wide area network. Answer: True Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Easy

2) Voice and data communications are becoming faster but slightly more expensive. Answer: False Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Easy

3) A local area network connects two or more communicating devices in a limited geographical area. Answer: True Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Easy

4) LANs typically contain multiple WANs. Answer: False Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Easy

5) Network interface cards are special adapters that link an individual device to the communications medium on a local area network.


Rainer, Information System, Third Canadian Edition

Testbank

Answer: True Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Easy

6) The network interface card typically houses the LAN’s network operating system. Answer: False Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Easy

7) Wide-area networks have a large capacity, and they typically use a single communications channel. Answer: False Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Easy

8) Digital signals are discrete pulses that are either on or off. Answer: True Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy

9) Digital signals are continuous waves that transmit information by altering the characteristics of the waves. Answer: False Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

10) Peer-to-peer processing means each computer acts as both a client and a server. Answer: True Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy

11) Digital signals have two parameters: frequency and amplitude. Answer: False Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy

12) The U.S. public telephone system was designed as an analog network to carry voice signals. Answer: True Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy

13) Ethernet is a common LAN protocol. Answer: True Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Medium

14) Cable media use wires or cables to transmit data and information. Answer: True Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals


Rainer, Information System, Third Canadian Edition

Testbank

Difficulty: Easy

15) Twisted-pair wire is the least-used form of communications wiring. Answer: False Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Medium

16) Cladding is the coating that surrounds fiber-optic cables and prevents light from leaking out of the fiber. Answer: True Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Medium

17) Systems that use digital subscriber lines (DSL) do not require modems. Answer: False Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy

18) Currently, ATM networks operate only on fiber-optic cable. Answer: True Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Medium

19) IPv6 allows devices to more quickly connect to the Internet than IPv4. Answer: False


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Medium

20) The World Wide Web is synonymous with the Internet. Answer: False Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Medium

21) The Internet is a global network of computer networks. Answer: True Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

22) An intranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization. Answer: True Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

23) Intranets support discovery, communication, and collaboration inside an organization. Answer: True Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

24) An extranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization. Answer: False Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

25) Extranets offer limited accessibility to the intranets of participating companies. Answer: True Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

26) An Internet service provider is a company that offers Internet connections for a fee. Answer: True Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

27) Internet kiosks are computer terminals located in public places like libraries and airports. Answer: True Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

28) A domain name is the official name assigned to an Internet site, consisting of multiple parts, separated by dots, which are translated from right to left in locating the site. Answer: True Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet.


Rainer, Information System, Third Canadian Edition

Testbank

Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

29) The rightmost part of an Internet name is the top-level specification, or the zone. Answer: True Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

30) The World Wide Web is a system with universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture. Answer: True Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

31) Uniform resource locators (URLs) point to the address of a specific resource or site on the Web. Answer: True Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

32) Uniform resource locators (URLs) are software applications through which users access the Web. Answer: False Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

33) The hypertext transport protocol (HTTP) is the communications standard used to transfer pages across the World Wide Web portion of the Internet.


Rainer, Information System, Third Canadian Edition

Testbank

Answer: True Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

34) A major problem of the discovery applications of networks is the huge amount of information available. Answer: True Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

35) VoIP converts analog signals to digital ones. Answer: True Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Medium

36) Metasearch engines search several engines at once and integrate the findings of the various search engines. Answer: True Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

37) The quality of automatic translation of Web pages is usually just as good as human translation. Answer: False Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

38) Commercial portals are intended for broad audiences and offer fairly routine content. Answer: True Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

39) Crowdsourcing refers to outsourcing a task to an undefined, generally large group of people in the form of an open call. Answer: True Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

40) Industry-wide portals are intended for broad audiences and offer fairly routine content. Answer: False Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

41) Electronic mail is the largest-volume application running over the Internet. Answer: True Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

42) With Voice-over-IP, every call opens up a dedicated circuit for the duration of the call. Answer: False


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

43) E-learning is conducted only in virtual classrooms, where all coursework is completed online. Answer: False Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

44) Virtual universities are online universities from which students take classes from home or at an offsite location, via the Internet. Answer: True Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

45) Employees who telecommute have generally found that the experience enhances their careers. Answer: False Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

46) Qwiki produces a real-time search result in multimedia form. Answer: True Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section: IT’s About Business: Informative Videos on the Fly Difficulty: Easy

Question Type: Multiple Choice


Rainer, Information System, Third Canadian Edition

Testbank

47) Which of the following is NOT a reason networks are essential? a) They offer a company flexibility. b) They allow companies to share resources. c) Computers typically work in isolation. d) Employees are geographically dispersed. Answer: c Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Easy

48) _____ refers to the range of frequencies available in any communications channel. a) Protocol b) Broadband c) Capacity d) Narrowband e) Bandwidth Answer: e Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Easy

49) ______________ refers to the transmission capacity of a network. a) Bandwidth b) Bandlength c) Broadband d) Narrowband Answer: a Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

50) Which of the following are advantages of computer networks? a) They enable organizations to be more flexible. b) They enable companies to share hardware, computer applications, and data. c) They enable geographically dispersed employees to work together. d) They provide a critical link between businesses and their customers. e) All of these Answer: e Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Easy

51) Every device in the ________ has a NIC that allows the device to physically connect to the network’s communication medium. a) LAN b) MAN c) PAN d) WAN Answer: a Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Easy

53) The components of a local area network include which of the following? a) File server b) Client computers c) Wireline or wireless communications media d) Network interface cards e) All of these Answer: e Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

54) Which of the following is not a component of a local area network? a) File server b) Client computers c) Bridge d) Network interface cards e) All of these Answer: c Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Medium

55) From largest to smallest, what is the correct order for the types of networks? a) WAN, MAN, PAN, LAN b) MAN, WAN, LAN, PAN c) WAN, MAN, LAN, PAN d) MAN, WAN, PAN, LAN Answer: c Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Easy

56) A _____ connects dissimilar networks. a) Router b) Network interface card c) Bridge d) Gateway e) File server Answer: d Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Easy

57) A(n) _____ connects two or more devices in a limited geographical area.


Rainer, Information System, Third Canadian Edition

Testbank

a) Local area network b) Wide-area network c) Personal area network d) Enterprise network e) Value added network Answer: a Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Easy

58) _____________ usually spans a city. a) LAN b) MAN c) PAN d) WAN Answer: b Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Easy

59) A _____ sends messages through several connected LANs or to a wide-area network. a) Router b) Network interface card c) Bridge d) Gateway e) File server Answer: a Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Easy

60) A _____ allows a device to physically connect to a local area network’s communications medium.


Rainer, Information System, Third Canadian Edition

Testbank

a) File server b) Network interface card c) Network operating system d) Communications channel e) Gateway Answer: b Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Easy

61) All of the following statements concerning wide-area networks are true except: a) They are provided by individual companies. b) They have large capacity. c) They cover large geographical areas. d) They combine multiple communications channels. e) The Internet is an example of a wide-area network. Answer: a Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Medium

62) Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using in-store wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. Which type of network does Gal have? a) Client-server b) Mainframe-based c) LAN d) WAN e) Peer-to-peer Answer: c Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Medium


Rainer, Information System, Third Canadian Edition

Testbank

63) Some modems convert ________ to __________, which is called __________. a) analog, digital, modulation b) digital, analog, demodulation c) analog, numbers, demodulation d) digital, analog, modulation Answer: d Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy 64) The function of _____ is to convert digital signals to analog signals and vice-versa. a) Modems b) Multiplexers c) Front-end processors d) Servers e) Clients Answer: a Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy

65) __________ operates on the same lines as telephones, and the Internet is always available. a) Cable b) Dial-up c) DSL d) Satellite Answer: c Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy

66) _____ signals convey information in wave form, whereas _____ signals convey information in binary form.


Rainer, Information System, Third Canadian Edition

Testbank

a) Analog, packet b) Analog, digital c) Digital, packet d) Digital, analog e) Packet, analog Answer: b Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy

67) __________ is the most prevalent form of communications wiring. a) Coaxial cable b) Fiber-optic cables c) Twisted-pair wire Wireless Answer: c Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Medium

68) _____ are hardware devices that support data transmission and reception across a telecommunications system. a) Integrated services digital networks b) Digital subscriber lines c) Communications channels d) Integrated circuits e) Communications processors Answer: c Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy

69) Which of the following is not a communications channel?


Rainer, Information System, Third Canadian Edition

Testbank

a) Fiber-optic cable b) Satellite transmission c) Twisted-pair wire d) Integrated circuits e) Cellular radio Answer: d Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy

70) Which of the following is a disadvantage of twisted-pair wire? a) Availability b) Cost c) Flexibility d) Speed Answer: d Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Medium

71) Which of the following is not a characteristic of twisted-pair wire? a) Inexpensive b) Easy to work with c) Subject to interference from other electrical sources d) Secure transmissions e) None of these Answer: d Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Medium

72) Which of the following is an advantage of coaxial cable?


Rainer, Information System, Third Canadian Edition

Testbank

a) Cost b) Flexibility c) Security d) All of the above are advantages Answer: c Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Medium

73) The cable medium with the highest bandwidth is: a) Twisted-pair wire b) Coaxial cable c) Fiber-optic cable d) Cellular radio e) Copper cable Answer: c Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy

74) Data are sent through a fiber-optic cable by a(n) _______. a) Optical switch b) Electromagnetic switch c) Laser d) Multiplexer e) Optical modem Answer: c Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy 75) _____________ is a data transmission technology that uses packet switching and allows for almost unlimited bandwidth on demand. a) Asynchronous Transfer Mode


Rainer, Information System, Third Canadian Edition

Testbank

b) Digital Subscriber Line c) Synchronous Optical Network d) T-Carrier System Answer: a Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy

76) Which data transmission technology requires fiber-optic cable, can transmit up to 2.5 gigabits per second, and is more expensive than DSL? a) Digital subscriber line b) Asynchronous transfer mode c) Synchronous optical network d) T-carrier system e) ISDN Answer: b Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Medium

77) Which transmission technology is an interface standard for transporting digital signals over fiberoptic lines that enables the integration of transmissions from multiple vendors? a) Digital subscriber line b) Asynchronous transfer mode c) Synchronous optical network d) T-carrier system e) ISDN Answer: c Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy

78) The _______________ layer of TCP/IP provides the addressing, routing, and packaging of data packets.


Rainer, Information System, Third Canadian Edition

Testbank

a) Application b) Internet c) Network interface d) Transport Answer: b Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy

79) Which of the following is a digital transmission system that defines circuits that operate at different rates, all of which are multiples of the basic 64 Kbps used to transport a single voice call? a) Digital subscriber line b) Asynchronous transfer mode c) Synchronous optical network d) T-carrier system e) ISDN Answer: d Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy

80) In order to ensure that computers developed by different manufacturers can communicate, _____ have been developed. a) Protocols b) Client/server architectures c) WANs d) Application software packages e) Developmental architectures Answer: a Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

81) A protocol is: a) A device that handles the switching of voice and data in a local area network. b) A standard set of rules and procedures for the control of communications in a network. c) A communications service for the connection of devices in a local area network. d) The main communications channel in a wide-area network. e) Synonymous with network interface card. Answer: b Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy

82) The __________ type of peer-to-peer processing is real-time, person-to-person collaboration. a) first b) second c) third d) fourth Answer: b Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy

83) The part of a network that handles the major traffic is the ________. a) Front end b) Network interface c) Multiplexer d) Backbone e) Front end processor Answer: d Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy

84) Which of the following enables users to send data across sometimes unreliable networks?


Rainer, Information System, Third Canadian Edition

Testbank

a) Ethernet b) TCP/IP c) Protocols d) Digital subscriber lines e) Integrated services digital network Answer: b Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy

85) In TCP/IP, IP is responsible for: a) Disassembling and reassembling of packets during transmission. b) Establishing the Internet connection between two computers. c) Moving packets over the network. d) Sequencing the transfer of packets across the network. e) Error checking. Answer: a Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy

86) Which of the following statements concerning packet switching is not true? a) Packets contain a sequence number. b) Packets are routed through different paths. c) Packets require dedicated circuits. d) Packets use TCP/IP to carry their data. e) Packets contain destination addressing. Answer: c Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Medium


Rainer, Information System, Third Canadian Edition

Testbank

87) A type of processing that links two or more computers in an arrangement in which some machines provide computing services for user computers is best described as _______. a) Open systems b) Client/server c) Peer-to-peer d) Centralized e) Mainframe-centric Answer: b Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Easy

88) BitTorrent uses a process called _____, which eliminates file-sharing bottlenecks by having everyone share little pieces of a file at the same time. a) Leeching b) Collaboration c) Packet switching d) Torrents e) Swarming Answer: e Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Medium

89) Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using in-store wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. Which type of media does he likely use to connect the point-of-sale terminal to the desktop? a) Twisted-pair wire b) Coaxial cable c) Fiber-optic cable d) Cellular radio e) Copper cable Answer: a


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Medium

90) Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using in-store wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. Which of the following statements is true? a) Gal must have a Web site in order to use his notebook. b) The notebook is on the same network as the point-of-sale terminal. c) Gal must have an ISP in order to access the Internet from his notebook. d) The notebook will work only when the desktop computer is turned on. e) All of these are true Answer: c Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Medium

91) An ______________ is a restricted network within a company. a) extranet b) internet c) intranet d) insidenet Answer: c Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

92) The _____ is a global wide-area network that connects approximately 1 million organizational computer networks. a) Ethernet b) Extranet c) Internet d) Intranet e) World Wide Web


Rainer, Information System, Third Canadian Edition

Testbank

Answer: c Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

93) A ______________ allows companies to establish a direct, secure, private network link to their internal systems. a) PAN b) DSL c) UPS d) VPN Answer: d Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

94) A(n) _____ is a network designed to serve the internal informational needs of a single organization. a) Global network b) Extranet c) Internet d) Intranet e) World Wide Web Answer: d Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy 95) A ______________ offers limited accessibility inside the organization. a) extranet b) internet c) intranet d) insidenet Answer: a


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

96) A(n) _____ connects parts of the intranets of different organizations and allows secure communications among business partners. a) Global network b) Extranet c) Internet d) Intranet e) World Wide Web Answer: b Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

97) Internet service providers connect to one another through _____. a) Internet connection points b) Common carrier connection points c) Network access points d) Network connection points e) An extranet Answer: c Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy 98) Domain names are read from __________ to __________. a) bottom, top b) top, bottom c) left, right d) right, left Answer: d


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

99) _____ are Internet access points that are located in public places, such as libraries and airports. a) Clients b) Servers c) Internet access computers d) Network computer e) Internet kiosks Answer: e Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

100) Each site on the Internet gets an assigned address, which is a(n) _____. a) TCP address b) IP address c) URL address d) ISO/OSI identifier e) World Wide Web address Answer: c Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

101) What is NOT something browser companies focus on to gain competitive advantage. a) Security b) Download speeds c) Add-ons d) Cloud computing Answer: d


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Medium

102) Consider this domain name, www.business.gsu.edu. The “edu” is the _______. a) Top-level domain b) URL c) Web site locator d) Name of the computer e) Address of the Webmaster Answer: a Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

103) Consider this domain name, www.business.gsu.edu. The “gsu” is the __________. a) Top-level domain b) Name of the organization c) URL d) Name of the specific computer e) Address of the Webmaster Answer: b Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

104) Internet Explorer’s first browser battle was with ___________. a) Apple Safari b) Google Chrome c) Mozilla Firefox d) Netscape Navigator Answer: d


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Medium

105) Consider this domain name, www.business.gsu.edu. The “business” is the ________. a) Top-level domain b) Name of the organization c) URL d) Name of the specific computer e) Address of the Webmaster Answer: d Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

106) Applications offered by the Internet2 include which of the following? a) remote diagnosis b) digital libraries c) distance education d) virtual laboratories e) all of these Answer: e Learning Objective: Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference: 4.3 The Internet and the World Wide Web Difficulty: Easy

107) A _____________ portal supports communities such as hobby groups or political parties. a) affinity b) commercial c) corporate d) industrywide Answer: a


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

108) A ___________ portal is the most popular portal on the Internet. a) affinity b) commercial c) corporate d) industrywide Answer: b Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

109) Networks enable which of the following applications? a) Discovery b) Communications c) Collaboration d) Web services e) All of these Answer: e Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

110) Which of the following are advantages of computer networks? a) They enable organizations to be more flexible. b) They enable companies to share hardware, computer applications, and data. c) They enable geographically dispersed employees to work together. d) They provide a critical link between businesses and their customers. e) All of these Answer: e


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Medium

111) Which network application(s) enable(s) users to access information located in databases all over the world? a) Discovery b) Communications c) Collaboration d) Web services e) None of these Answer: a Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

112) ___________ is(are) the largest-volume application running on the Internet. a) E-mail b) Chat rooms c) FTP d) The World Wide Web Answer: a Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

113) Which of the following statements about publication of material in foreign languages is not correct? a) It is a competitive necessity. b) It must be accurate. c) It is expensive. d) Content must be localized to the needs of people in local markets. e) It is not yet a major consideration for most companies. Answer: e


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Medium

114) ___________ is(are) the latest version of videoconferencing. a) Real-time collaboration b) Teleconferencing c) Telepresence systems d) Web conferencing Answer: c Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

115) _____ portals offer content for diverse communities and are intended for broad audiences. a) Industrywide b) Personal c) Affinity d) Corporate e) Commercial Answer: e Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

116) _____ portals support communities such as hobby groups or political parties. a) Industrywide b) Personal c) Affinity d) Corporate e) Commercial Answer: c


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

117) Which of the following is a drawback of e-learning? a) Equipment needs b) Flexibility c) Time to learn d) Training costs Answer: a Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Medium

118) _____ portals coordinate content within relatively narrow organizational and partners’ communities. a) Publishing b) Personal c) Affinity d) Corporate e) Commercial Answer: d Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

119) Many organizations have implemented corporate portals for which of the following reasons? a) To cut costs b) To free up time for busy managers c) To improve profitability d) To offer customers self-service opportunities e) All of these Answer: e


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

121) Which of the following is a benefit of telecommuting for employees? a) Productivity b) Retention c) Stress-levels d) Visibility Answer: c Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Medium

122) Portals are an example of which network application? a) Discovery b) Collaboration c) Communications d) Web services e) None of these Answer: a Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

123) With _____, every call opens up a dedicated circuit for the duration of the call. a) Voice over IP b) Plain old telephone service c) Chat rooms d) Teleconference e) Internet relay chat Answer: b


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

124) Which of the following is a disadvantage of telecommuting for employers? a) Isolation b) Promotion c) Supervision d) Visibility Answer: c Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

125) With _____, phone calls are treated as just another kind of data. a) Voice over IP b) Plain old telephone service c) Chat rooms d) Teleconference e) Internet relay chat Answer: a Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

126) Skype is an example of _______. a) Teleconference b) Telepresence c) Plain old telephone service d) Voice over IP e) Videoconference Answer: d


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

127) Workflow, groupware, and telepresence systems are examples of which network application? a) Discovery b) Communications c) Collaboration d) Web services e) None of these Answer: c Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

128) The newest type of videoconferencing technology is ________. a) Teleconferencing b) Telepresence c) Work group analysis software d) Workflow software e) Groupware Answer: b Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

129) In a _____ system, participants are able to seamlessly and electronically share data, voice, images, graphics, and animation. a) Teleconference b) Group decision support c) Telepresence d) Telephone conference call e) Crowdsourcing Answer: c


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

130) The benefits of e-learning include which of the following? a) Increased content retention b) Current, high-quality content c) Consistency d) Flexibility e) All of these Answer: e Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

131) Which of the following is not a disadvantage of telecommuting for employees? a) Fewer opportunities for housebound people b) Possible loss of fringe benefits c) Lower pay (in some cases) d) No workplace visibility e) Slower promotions Answer: a Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

132) Refer to Opening Case – The Network Neutrality Wars: Which of the following is not a challenge for achieving net neutrality? a) The amount of video traffic on the Internet is increasing. b) Under current models, the investment required to meet future demand exceeds projected revenue growth. c) Net neutrality might hinder U.S. competitiveness. d) Network providers could censor certain content by slowing down or blocking access. e) Telecommunications and cable companies are in favor of net neutrality.


Rainer, Information System, Third Canadian Edition

Testbank

Answer: e Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Easy

133) Which of the following is NOT a goal of Qwiki? a) To turn information into an experience b) To personalize their page to every user c) To create a superior a video experience d) All of the above are goals of Qwiki Answer: C Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section: IT’s About Business: Informative Videos on the Fly Difficulty: Hard

134) Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using in-store wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. Which type of network application is being used when a salesperson is looking up items in stock? a) Discovery b) Communications c) Collaboration d) Web services e) None of these Answer: e Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Medium

135) Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using in-store wireless access to the Internet) that can be carried around the store to look up current items in stock, or to


Rainer, Information System, Third Canadian Edition

Testbank

search for items from one of his suppliers for special orders. The Web site for the store is www.GalsTunes.net. Which of the following is true? a) Gal must be hosting his Web site on his own desktop computer based on its URL. b) The point-of-sale terminal cannot connect to the Internet. c) Gal must not be selling on his Web site because the top-level domain is “net” and not “com.” d) The desktop computer must also be able to connect to the Internet in order for the notebook to access data from it. e) All of these are true. Answer: b Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Medium

Question Type: Short Answer

136) Differentiate between analog signals and digital signals. Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Medium

137) Describe the various communications processors. Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Medium

138) Differentiate among twisted-pair wire, coaxial cable, and fiber-optic cable. Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Medium

139) Explain what network protocols are and why they are important.


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Medium

140) Describe the three basic types of peer-to-peer processing. Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Medium

141) Describe the benefits of networks to organizations. Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Medium

142) Describe the four network applications. Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Medium

143) Describe the various types of portals. Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Medium

144) What are the benefits and limitations of telecommuting? For individuals? For organizations? Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Medium

Question Type: Essay Questions


Rainer, Information System, Third Canadian Edition

Testbank

145) What does the following statement mean: “Without networks, the computer on your desk would be merely another productivity tool, just like the typewriter once was”? Learning Objective: Summarize the fundamental concepts and skills related to computer networks. Section Reference: Chapter 6 Difficulty: Hard

146) Differentiate among local area networks, wide-area networks, and value-added networks. Learning Objective: Define the term computer network, and compare and contrast the two major types of networks. Section Reference: 4.1 What Is a Computer Network? Difficulty: Medium

147) Describe the functions of the TCP/IP protocol. Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Medium

148) Differentiate between client/server computing and peer-to-peer processing. Learning Objective: Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference: 4.2 Network Fundamentals Difficulty: Medium

149) What are the implications of telepresence systems? Include in your answer the uncertain safety in many parts of the world. Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Hard

150) Discuss the advantages of voice over IP for organizations. Learning Objective: Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference: 4.4 Internet Network Applications Difficulty: Hard


Rainer, Information System, Third Canadian Edition

Testbank

Legal Notice Copyright © 2014 by John Wiley & Sons Canada, Ltd. or related companies. All rights reserved.

The data contained in these files are protected by copyright. This manual is furnished under licence and may be used only in accordance with the terms of such licence. The material provided herein may not be downloaded, reproduced, stored in a retrieval system, modified, made available on a network, used to create derivative works, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without the prior written permission of John Wiley & Sons Canada, Ltd.


Rainer, Information System, Third Canadian Edition

Testbank

Chapter 5

E-business and E-commerce Question Type: True/False

1) In traditional commerce, one or more of the following can be digital: the product or service, the process, and the delivery agent. Answer: False Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Easy

2) You decide to start a landscaping business called Trim Grass. You type www.TrimGrass.com in a Web browser, and no page with that name appears. The domain name is therefore available. Answer: False Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Medium

3) Visiting the Web site of a car manufacturer (e.g., www.gm.com), entering the specifications for the car you want, and then picking up your car at your local dealership is an example of partial electronic commerce. Answer: True Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Easy

4) It is possible to “watch” vending machines over the Internet. Answer: True Learning Objective: Provide a real-world application of e-business and e-commerce. Section Reference: IT’s About Business: Vending Goes Online Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

5) E-commerce is a broader definition of e-business. Answer: False Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Easy

6) eBay is a good example of business-to-consumer electronic commerce. Answer: False Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Easy

7) Forward auctions are auctions that sellers use as a channel to many potential buyers. Answer: True Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Easy

8) In a forward auction, the highest bid wins. Answer: True Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Easy

Question Type: Multiple Choice


Rainer, Information System, Third Canadian Edition

Testbank

9) You decide to start a landscaping business called Trim Grass. One of your services will be to perform fertilizer treatments. You will need to buy a great deal of fertilizer for your many clients. You can use all of the following methods to purchase the fertilizer except: a) Forward auction b) Reverse auction c) Name your Own Price d) Electronic Marketplace e) Multichanneling Answer: e Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Easy

10) You decide to start a landscaping business called Trim Grass. You created a Web site, but it doesn’t seem to be attracting any clients. So, you decide to explore advertising on the Web. Which of the following advertising methods probably would not be beneficial? a) Banner ads b) Pop-up or pop-under ads c) Spamming d) Permission marketing e) Viral marketing Answer: c Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Medium

11) You decide to start a landscaping business called Trim Grass. Some of your residential clients would like to pay their bills online. Which of the following methods will not be appropriate for this type of payment? a) Electronic checks b) Electronic credit cards c) Purchasing cards d) Person-to-person payments e) Stored–value money cards Answer: c


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Easy

12) You decide to start a landscaping business called Trim Grass. You expect to use the Web to help clients find you and communicate with you. You will mow lands, clean flower beds, and pick up leaves in the fall. You will send your clients monthly bills. Which of the following is true? a) Trim Grass is using an e-commerce model. b) Trim Grass is using an e-business model. c) Trim Grass is using a forward auction. d) Trim Grass is an electronic marketplace. e) Trim Grass needs to worry about channel conflict. Answer: b Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Medium

13) You have been running a landscaping business called Trim Grass for about two years. You have developed a special blend of grass seed for your area that you use when you reseed your clients’ lawns. You are receiving emails via your Web site from people who would like to purchase some. You decide to start selling seed online, and you hire someone to rebuild your Web site. Which of the following statements is not true? a) Trim Grass is now multichanneling. b) Trim Grass needs to think about how to ship the seed. c) Trim Grass will have to collect sales tax from all sales. d) Trim Grass will have more expenses. e) Trim Grass will need to consider different advertising methods. Answer: c Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Hard

Question Type: True/False

14) Even though B2C EC is much larger by volume, B2B is more complex.


Rainer, Information System, Third Canadian Edition

Testbank

Answer: False Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

15) An electronic storefront is a Web site on the Internet that represents a single store. Answer: True Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

16) You can make a purchase in a referral mall. Answer: False Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

17) Selling products such as books and computers on the Internet may reduce vendors’ selling costs by 20 to 40 percent, with further reductions being difficult because the products must be delivered physically. Answer: True Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

18) A virtual bank involves conducting banking activities from home, a place of business, or on the road in addition to a physical bank location. Answer: False Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

19) It is more difficult but possible to sell luxury goods online. Answer: True Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

20) Virtual banks are those banks that are dedicated only to Internet transactions. Answer: True Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

21) Channel conflict occurs when click-and-mortar companies have problems with their regular distributors when they sell directly to customers online. Answer: True Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

22) Internet advertising is impersonal, one-way mass communication. Answer: False Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

23) Electronic malls are collections of individual shops under a single Internet address. Answer: True Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

24) Banners are the most common form of advertisement on the Internet. Answer: True Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

25) Hacking is the indiscriminate distribution of electronic ads without permission of the receiver. Answer: False Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

26) Business-to-consumer applications comprise the majority of electronic commerce volume. Answer: False Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

27) Channel conflict occurs when manufacturers disintermediate their channel partners by selling their products directly to consumers. Answer: True Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

29) The key mechanisms in the sell-side marketplace are customized electronic catalogs and reverse auctions. Answer: False Learning Objective: Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference: 5.3 Business-to-Business (B2B) Electronic Commerce


Rainer, Information System, Third Canadian Edition

Testbank

Difficulty: Easy

30) Forward auctions are the major method used in buy-side marketplaces. Answer: False Learning Objective: Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference: 5.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Easy

31) The buy-side marketplace is similar to the business-to-consumer model. Answer: False Learning Objective: Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference: 5.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Easy

32) When multiple buyers combine their orders so that they constitute a large volume and therefore attract more seller attention, it is called group purchasing. Answer: True Learning Objective: Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference: 5.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Easy 33) Horizontal exchanges connect buyers and sellers across many industries. Answer: True Learning Objective: Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference: 5.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Easy

34) In most cases, traditional payment systems are not effective for electronic commerce. Answer: True Learning Objective: Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference: 5.4 Electronic Payments


Rainer, Information System, Third Canadian Edition

Testbank

Difficulty: Easy

35) Stored-value money cards allow you to store a fixed amount of prepaid money and then spend it as necessary. Answer: True Learning Objective: Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference: 5.4 Electronic Payments Difficulty: Easy

36) Smart cards can be used as credit cards, debit cards, and/or loyalty cards. Answer: True Learning Objective: Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference: 5.4 Electronic Payments Difficulty: Easy

37) Purchasing cards and electronic credit cards are equivalent. Answer: True Learning Objective: Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference: 5.4 Electronic Payments Difficulty: Medium

38) Each buyer needs only one e-wallet for all merchants. Answer: False Learning Objective: Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference: 5.4 Electronic Payments Difficulty: Easy

39) Cybersquatting is illegal. Answer: True Learning Objective: Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type.


Rainer, Information System, Third Canadian Edition

Testbank

Section Reference: 5.4 Electronic Payments Difficulty: Medium

40) Selling luxury items online is as easy as selling books and DVDs. Answer: False Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: IT’s About Business: 5.3 Luxury Goods Turn to E-Commerce Difficulty: Easy

41) Domain tasting is a practice of registrants using the five-day “grace period” at the beginning of a domain registration to profit from pay-per-click advertising. Answer: True Learning Objective: Illustrate the ethical and legal issues relating to electronic commerce with two specific examples of each issue, and describe how you would respond or react to the four examples you have provided. Section Reference: 5.5 Ethical and Legal Issues in E-Business Difficulty: Medium

Question Type: Multiple Choice

42) Treat America used _____________ to report on their vending machines. a) e-business b) e-commerce c) the police d) their service team Answer: a Learning Objective: Provide a real-world application of e-business and e-commerce. Section: IT’s About Business: Vending Goes Online Difficulty: Easy

43) _____, which is a broader concept than _____, is the buying and selling of goods and services, as well as servicing customers, collaborating with business partners, and performing transactions within an organization. a) Business-to-business electronic commerce, business-to-customer electronic commerce b) Electronic commerce, electronic business c) Business-to-customer electronic commerce, business-to-business electronic commerce d) Business-to-business electronic commerce, intrabusiness electronic commerce e) Electronic business, electronic commerce


Rainer, Information System, Third Canadian Edition

Testbank

Answer: e Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Medium 44) ____________ organizations have a limited geographical reach. a) Brick-and-mortar b) Business-to-consumer c) Click-and-mortar d) Virtual Answer: a Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Easy

45) The degree of digitization relates to all of the following except: a) The product or service sold b) The process by which the product is produced c) The delivery agent or intermediary d) The size of e-commerce transactions e) None of these Answer: d Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Medium

46) In _______ e-commerce, the sellers and buyers are organizations. a) government-to-citizen b) consumer-to-consumer c) business-to-business d) business-to-consumer e) consumer-to-business


Rainer, Information System, Third Canadian Edition

Testbank

Answer: c Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Easy

47) In ________ e-commerce, an organization provides information and services to its workers. a) business-to-employee b) consumer-to-consumer c) consumer-to-business d) business-to-consumer e) government-to-business Answer: a Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Easy

48) Which of the following is a disadvantage of click-and-mortar organizations? a) Limited geographical reach b) Added complexity combining two different environments c) Customers uncomfortable with online transactions d) No face-to-face interaction with customers Answer: b Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Easy

49) __________ represents the vast majority of e-commerce. a) B2B b) B2C c) C2C d) G2C Answer: a


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Medium

50) In a reverse auction, the __________ bidder wins. a) lowest b) highest c) neutral d) nobody wins since this auction type doesn’t exist Answer: a Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Easy

51) ___________ marketing encourages receivers to send information about products/services to their friends. a) Affiliate b) Electronic c) Group d) Viral Answer: d Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Easy

52) Which of the following is a benefit of e-commerce to customers? a) Makes national and international markets more accessible. b) Lowering costs of processing, distributing, and retrieving information. c) Access a vast number of products and services around the clock. d) Ability to easily and conveniently deliver information, services, and products to people in cities, rural areas, and developing countries. Answer: c


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Medium

53) Direct payment of Social Security benefits is an example of ______ e-commerce. a) government-to-citizen b) consumer-to-consumer c) consumer-to-business d) business-to-consumer e) business-to-business Answer: a Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Easy

54) If you are an worker managing your fringe benefits over your company’s intranet, you are engaging in _________ e-commerce. a) business-to-business b) business-to-consumer c) consumer-to-consumer d) business-to-employee e) government-to-citizen Answer: d Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Easy

55) Which of the following statements regarding the relationship between electronic commerce and search is not correct? a) Purchases often follow successful online searches. b) Shopping carts are often abandoned after unsuccessful online searches. c) Retailers will provide fewer product details to avoid information overload for customers. d) Customers will be able to find the closest store offering the product that they want. e) Customers will have more relevant product information in the near future.


Rainer, Information System, Third Canadian Edition

Testbank

Answer: c Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Medium

56) In _____ auctions, there is one buyer who wants to buy a product. Suppliers submit bids, and the lowest bid wins. a) forward b) static c) reverse d) physical e) simple Answer: c Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Easy

57) eBay uses a _____ auction. a) forward b) static c) reverse d) physical e) simple Answer: a Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Easy

58) _____ auctions employ a request for quotation. a) Forward b) Static c) Reverse


Rainer, Information System, Third Canadian Edition

Testbank

d) Physical e) Simple Answer: c Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Easy

59) _____ auctions are the most common auction model for large purchases. a) Forward b) Static c) Reverse d) Physical e) Simple Answer: c Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Easy

60) In which of the following business models do businesses request quotes from suppliers and use B2B with a reverse auction mechanism? a) Find-the-best-price b) Electronic tendering system c) Name-your-own-price d) Online direct marketing e) Affiliate marketing Answer: b Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Hard

61) A vendor asks its business partners to place logos or banners on their Web sites. If customers click on a logo, visit the vendor’s site, and make a purchase, then the vendor pays a commission to the partner. This scenario illustrates which business model?


Rainer, Information System, Third Canadian Edition

Testbank

a) Find-the-best-price b) Electronic tendering system c) Name-your-own-price d) Online direct marketing e) Affiliate marketing Answer: e Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Medium

62) Which type of electronic commerce is the largest by volume? a) Business-to-employee b) Consumer-to-consumer c) Business-to-business d) Business-to-consumer e) None of these Answer: c Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

63) ____________ advertising is when the company only pays for measurable results. a) Brand b) Click-through c) Impression-based d) Performance-based Answer: d Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

64) Which of the following are luxury shoppers’ requirements that a Web site could not originally provide? a) Hands-on customer service


Rainer, Information System, Third Canadian Edition

Testbank

b) Guidance on the latest fashions c) Trying on/looking at the products d) All of the above are things that couldn’t originally be provided Answer: d Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium

65) Which type of electronic commerce does Amazon practice? a) Business-to-employee b) Consumer-to-consumer c) Consumer- to-business d) Business-to-consumer e) Employee-to-business Answer: d Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

66) _______ e-commerce is also known as e-tailing. a) Business-to-business b) Collaborative commerce c) Intrabusiness d) Business-to-consumer e) Consumer-to-business Answer: d Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

67) The advantages of electronic commerce for consumers include all of the following except: a) You can buy from home 24 hours per day, 7 days per week. b) You have a wider variety of products to choose from. c) You typically cannot access additional information, so you do not have information overload. d) You can easily compare prices and features.


Rainer, Information System, Third Canadian Edition

Testbank

e) You can find unique items. Answer: c Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium

68) An electronic storefront represents ____________. a) the Internet b) a single store c) multiple stores d) a web page Answer: b Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

69) ____________ is when steps are added to the value chain as new players find ways to add value to the business process. a) Cybermediation b) Disintermediation c) Intermediation d) Reintermediation Answer: d Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

70) __________ are electronic billboards. a) Advertisements b) Banners c) Pop-up ads d) Pop-under ads Answer: b


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

71) Which of the following is not an electronic commerce application? a) Home banking b) Buying stocks c) Evaluating an employee d) Conducting an auction e) Buying real estate Answer: c Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

72) Which of the following is not an advantage of e-tailing? a) You can buy from home, 24 hours per day. b) You have only a few products to choose from. c) You can obtain detailed information on products. d) You can compare competitors’ products and prices. e) All of these Answer: b Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium

73) ________ is the process whereby a fully automated electronic commerce transaction eliminates middlemen. a) Disintegration b) Supply chain integration c) Direct sales d) Disintermediation e) Value-added services Answer: d Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service.


Rainer, Information System, Third Canadian Edition

Testbank

Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium

74) Cyberbanking offers all of the following advantages except: a) It is convenient for customers. b) It saves time for customers. c) It includes inexpensive transactions for the bank. d) It can help recruit remote customers. e) It is more expensive for the customer. Answer: e Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium

75) Which of the following is a problem that e-commerce can cause for the airline industry? a) Too many fares b) Mistakes in fares c) Too few fares d) No fares offered on certain routes e) Too many fares offered on certain routes Answer: b Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium

76) Treat America turned to E-business for all of the following reasons except: a) The company needed to capture extensive data from each vending machine. b) The company wanted a competitive advantage over competitors that simply raised prices. c) The company’s vending machines are unmanned. d) Gas prices are increasing. e) The company’s vending machines are open beyond “normal” business hours. Answer: a Learning Objective: Provide a real-world application of e-business and e-commerce. Section Reference: IT’s About Small Business: 5.2 Vending Goes Online Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

77) Difficulties in order fulfillment are most closely associated with which type of electronic commerce? a) Business-to-business b) Business-to-consumer c) Government-to-citizen d) Business-to-employee e) Mobile commerce Answer: b Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium

78) Internet advertising improves on traditional advertising in all of the following ways except: a) Internet ads can be updated at any time at minimal cost. b) Internet ads can reach large numbers of potential buyers all over the world. c) Internet ads are always more effective than other types of advertising. d) Internet ads can make effective use of multimedia. e) Internet ads are current. Answer: c Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium

79) A _____ is automatically launched by some trigger and appears behind the active window. a) keyword banner b) random banner c) pop-up ad d) pop-under ad e) text box Answer: d Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

80) _____ offer(s) consumers incentives to accept advertising and e-mail voluntarily.


Rainer, Information System, Third Canadian Edition

Testbank

a) Viral marketing b) Personalized marketing c) Permission marketing d) Paper catalogs e) Direct mail Answer: c Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

81) _____ refers to online word-of-mouth marketing. a) Permission marketing b) One-to-one marketing c) Personalized marketing d) Viral marketing e) Direct mail Answer: d Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

82) The _________ marketplace is similar to the B2C model in which the buyer comes to the seller’s site, views catalogs, and places and order. a) buy-side b) sell-side c) reverse auction d) e-procurement Answer: b Learning Objective: Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference: 5.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Easy

83) ____________ exchanges connect buyers and sellers in a given industry. a) Functional


Rainer, Information System, Third Canadian Edition

Testbank

b) Horizontal c) Mixed d) Vertical Answer: d Learning Objective: Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference: 5.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Easy

84) ____________ exchanges are used mostly for MRO materials. a) Functional b) Horizontal c) Mixed d) Vertical Answer: b Learning Objective: Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference: 5.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Medium

85) In the _____ marketplace model, organizations attempt to sell their products or services to other organizations electronically. a) buy-side b) sell-side c) group purchasing d) desktop purchasing e) electronic exchange Answer: b Learning Objective: Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference: 5.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Easy

86) The key mechanisms of the _____ marketplace model are forward auctions and electronic catalogs that can be customized for each large buyer. a) buy-side b) sell-side c) group purchasing


Rainer, Information System, Third Canadian Edition

Testbank

d) desktop purchasing e) electronic exchange Answer: b Learning Objective: Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference: 5.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Easy

87) In the _____ marketplace model, EC technology is used to streamline the purchasing process in order to reduce the cost of items purchased, the administrative cost of procurement, and the purchasing cycle time. a) buy-side b) sell-side c) auctions d) group purchasing e) electronic exchange Answer: a Learning Objective: Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference: 5.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Easy

88) In the _____ B2B application, the orders of many buyers are aggregated so that they comprise a large volume, in order to merit more seller attention. a) buy-side b) sell-side c) auctions d) group purchasing e) electronic exchange Answer: d Learning Objective: Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference: 5.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Easy

89) In _____, direct and indirect materials in one industry are purchased on an as-needed basis. a) horizontal exchanges b) vertical exchanges c) buy-side marketplaces


Rainer, Information System, Third Canadian Edition

Testbank

d) functional exchanges e) sell-side marketplaces Answer: b Learning Objective: Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference: 5.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Easy

90) _____ connect buyers and sellers across many industries and are used mainly for indirect materials. a) Horizontal exchanges b) Vertical exchanges c) Buy-side marketplaces d) Functional exchanges e) Sell-side marketplaces Answer: a Learning Objective: Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference: 5.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Easy

91) Purchasing cards are the ___________ equivalent of electronic credit cards. a) B2B b) B2C c) C2C d) G2C Answer: a Learning Objective: Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference: 5.4 Electronic Payments Difficulty: Easy

92) _________ is(are) used for unplanned B2B purchases. a) E-checks b) Electronic credit cards c) Purchasing cards d) Stored value money cards Answer: c


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference: 5.4 Electronic Payments Difficulty: Easy

93) ____________ contain a chip called a microprocessor that can store a considerable amount of information. a) E-checks b) Person-to-person payments c) Smart cards d) Stored-value money cards Answer: c Learning Objective: Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference: 5.4 Electronic Payments Difficulty: Easy

94) Which of the following is NOT a form of electronic cash? a) Person-to-person payments b) Purchasing cards c) Smart cards d) Stored-value money cards Answer: b Learning Objective: Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference: 5.4 Electronic Payments Difficulty: Easy

95) All of the following are limitations of traditional payment methods in electronic commerce except: a) Cash cannot be used because there is no face-to-face contact. b) Paying for goods and services via the mail takes more time. c) Not all organizations accept credit cards. d) It is more secure for the buyer to use the telephone than to complete a secure transaction on a computer. e) None of these Answer: d Learning Objective: Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference: 5.4 Electronic Payments


Rainer, Information System, Third Canadian Edition

Testbank

Difficulty: Medium

96) _____ are a payment mechanism that are similar to regular bank checks but are transmitted electronically, with a signature in digital form. a) Electronic checks b) Electronic credit cards c) Electronic cash transactions d) Electronic wallets e) Electronic debit cards Answer: a Learning Objective: Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference: 5.4 Electronic Payments Difficulty: Easy

97) _____ use credit card numbers, transmitted electronically over the Internet, to pay for goods and services. They are either unencrypted or encrypted, with coded data readable by an intermediary between the buyer’s and seller’s banks. a) Electronic checks b) Electronic credit cards c) Electronic cash transactions d) Electronic wallets e) Electronic debit cards Answer: b Learning Objective: Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference: 5.4 Electronic Payments Difficulty: Easy

98) _____ are typically used for unplanned B2B purchases for amounts under $2000. a) Electronic checks b) Stored-value money cards c) Purchasing cards d) Smart cards e) Person-to-person payments Answer: c Learning Objective: Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type.


Rainer, Information System, Third Canadian Edition

Testbank

Section Reference: 5.4 Electronic Payments Difficulty: Easy

99) ______ are a form of e-cash that enable you to store a fixed amount of prepaid money and then spend it as necessary. a) Electronic checks b) Stored-value money cards c) Purchasing cards d) Smart cards e) Person-to-person payments Answer: b Learning Objective: Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference: 5.4 Electronic Payments Difficulty: Easy

100) _____ contain a chip that can store information and be used for several purposes. a) Electronic checks b) Stored-value money cards c) Purchasing cards d) Smart cards e) Person-to-person payments Answer: d Learning Objective: Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference: 5.4 Electronic Payments Difficulty: Easy

101) _____ enable two individuals to transfer funds without using a credit card. a) Electronic checks b) Stored-value money cards c) Purchasing cards d) Smart cards e) Person-to-person payments Answer: e Learning Objective: Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference: 5.4 Electronic Payments


Rainer, Information System, Third Canadian Edition

Testbank

Difficulty: Easy

102) _____ are software mechanisms that provide security measures and convenience for electronic commerce purchasing. a) Electronic checks b) Digital wallets c) Purchasing cards d) Smart cards e) Person-to-person payments Answer: b Learning Objective: Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference: 5.4 Electronic Payments Difficulty: Easy

103) A _____________ is the right to use but not distribute software . a) copyright b) patent c) intellectual property d) open source Answer: a Learning Objective: Illustrate the ethical and legal issues relating to electronic commerce with two specific examples of each issue, and describe how you would respond or react to the four examples you have provided. Section Reference: 5.5 Ethical and Legal Issues in E-Business Difficulty: Easy

104) Domain tasting is _____________. a) illegal b) legal c) the same as cybersquatting d) both A and C Answer: b Learning Objective: Illustrate the ethical and legal issues relating to electronic commerce with two specific examples of each issue, and describe how you would respond or react to the four examples you have provided. Section Reference: 5.5 Ethical and Legal Issues in E-Business Difficulty: Medium


Rainer, Information System, Third Canadian Edition

Testbank

105) Selling bogus investments and setting up phantom business opportunities are examples of ____________. a) cybersquatting b) domain name abuse c) fraud on the internet d) internet taxation Answer: c Learning Objective: Illustrate the ethical and legal issues relating to electronic commerce with two specific examples of each issue, and describe how you would respond or react to the four examples you have provided. Section Reference: 5.5 Ethical and Legal Issues in E-Business Difficulty: Medium

106) The practice of using similar but not identical domain names is called _____. a) domain spoofing b) domain masquerading c) domain tasting d) cybersquatting e) domain fraud Answer: c Learning Objective: Illustrate the ethical and legal issues relating to electronic commerce with two specific examples of each issue, and describe how you would respond or react to the four examples you have provided. Section Reference: 5.5 Ethical and Legal Issues in E-Business Difficulty: Easy

107) _____ refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or trademark belonging to someone else. a) Domain spoofing b) Domain masquerading c) Domain tasting d) Cybersquatting e) Domain fraud Answer: d Learning Objective: Illustrate the ethical and legal issues relating to electronic commerce with two specific examples of each issue, and describe how you would respond or react to the four examples you have provided. Section Reference: 5.5 Ethical and Legal Issues in E-Business Difficulty: Easy

108) The device that Treat America installed on top of each of their machines communicates the following pieces of data except:


Rainer, Information System, Third Canadian Edition

Testbank

a) The amount of money in the machine at any given minute. b) The amount of product inventory remaining. c) Whether the machine had been moved. d) The number of customers. e) Whether the door had been opened after business hours. Answer: d Learning Objective: Provide a real-world application of e-business and e-commerce. Section Reference: IT’s About Small Business: 5.2 Vending Goes Online Difficulty: Easy

109) Companies use Web sites for all of the following reasons except: a) To reduce operational and transaction costs. b) To enhance their reputation. c) To sell goods and services. d) To reduce the amount of actual cash they need to deal with. e) To induce people to visit a physical location. Answer: d Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Easy

110) Which of the following is NOT a reason eBay was unsuccessful when it purchased EachNet? a) eBay paid too much b) eBay didn’t give enough power to local executives c) eBay underestimated the competition from Taobao d) all of the above are reasons eBay was unsuccessful Answer: a Learning Objective: Summarize the fundamental concepts related to e-business and e-commerce. Section Reference: Case - e-Bay finds it’s a way into China Difficulty: Medium

Question Type: Essay

111) Differentiate between pure and partial electronic commerce. Provide examples of companies in each category.


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Medium

112) Discuss the various types of electronic commerce. Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Medium

113) Differentiate between forward and reverse auctions. Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Medium

114) Differentiate among sell-side marketplaces, buy-side marketplaces, and electronic exchanges. Learning Objective: Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference: 5.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Hard

115) Differentiate between electronic storefronts and electronic malls, and provide examples of each. Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium

116) Discuss the reasons for E-commerce failures. Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium


Rainer, Information System, Third Canadian Edition

Testbank

117) Discuss the benefits and limitations of electronic commerce. Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Hard

118) Discuss the various business-to-consumer applications (e.g., e-tailing, electronic storefronts, electronic malls). Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Hard

119) Discuss the various methods of online advertising. Learning Objective: Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference: 5.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Hard

120) Discuss the following electronic commerce business models and give examples of each type: online direct marketing, electronic tendering system, name-your-own-price, find-the-best-price, affiliate marketing, and viral marketing. Learning Objective: Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference: 5.1 Overview of E-Business and E-Commerce Difficulty: Medium

121) Describe the various types of electronic payments. Learning Objective: Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference: 5.4 Electronic Payments Difficulty: Hard

122) What is domain tasting? Should it be made illegal? Learning Objective: Illustrate the ethical and legal issues relating to electronic commerce with two specific examples of each issue, and describe how you would respond or react to the four examples you have provided. Section Reference: 5.5 Ethical and Legal Issues in E-Business


Rainer, Information System, Third Canadian Edition Difficulty: Hard

Testbank


Rainer, Information System, Third Canadian Edition

Testbank

Legal Notice Copyright © 2014 by John Wiley & Sons Canada, Ltd. or related companies. All rights reserved.

The data contained in these files are protected by copyright. This manual is furnished under licence and may be used only in accordance with the terms of such licence. The material provided herein may not be downloaded, reproduced, stored in a retrieval system, modified, made available on a network, used to create derivative works, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without the prior written permission of John Wiley & Sons Canada, Ltd.


Rainer, Information System, Third Canadian Edition

Testbank

Chapter 6

Wireless, Mobile Computing, and Mobile Commerce Question Type: True/False

1) Korean Tacos is an example of viral marketing. Answer: True Learning Objective 1: Provide a real-world application of wireless, mobile computing, and mobile commerce. Section Reference: IT’s About Small Business: Tacos, Trucks, and Tweets Difficulty: Easy

2) Wireless computing does not really affect productivity. Answer: False Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: Opening Case: The Battle for the Mobile Wallet Difficulty: Easy

3) Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices. Answer: True Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: Opening Case: The Battle for the Mobile Wallet Difficulty: Easy

4) Wireless technologies are not changing the ways that organizations are doing business, but they are enabling organizations to do business faster. Answer: False Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: Opening Case: The Battle for the Mobile Wallet Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

5) Short message service allows users to send short text messages on digital cell phones. Answer: True Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Easy

6) Microwave transmissions are affected by environmental conditions such as storms. Answer: True Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Easy

7) The higher the orbit of a satellite, the larger its footprint. Answer: True Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Easy

8) The global positioning system is supported by GEO satellites. Answer: False Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Easy

9) Radio transmissions are highly secure. Answer: False Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

10) Bluetooth is a LAN. Answer: False Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Easy

11) Bluetooth is a wireless standard that enables temporary, short-range connection between mobile devices. Answer: True Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Easy

12) Ultra-wideband is useful in zero visibility environments. Answer: True Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Medium

13) A hotspot is a small geographical perimeter within which a wireless access point provides service to a number of users. Answer: True Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Easy 14) Wi-Fi hotspots are two-dimensional.


Rainer, Information System, Third Canadian Edition

Testbank

Answer: False Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Easy

15) Wi-Fi provides excellent security. Answer: False Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Easy

16) Near-field Communications facilitates contactless payments. Answer: True Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Medium

17) Mobile means the technology can travel with the user. Answer: True Learning Objective: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: Mobile Computing and Mobile Commerce Difficulty: Easy

18) Personalization means that a mobile device can provide real-time communication, independent of the user’s location. Answer: False Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business.


Rainer, Information System, Third Canadian Edition

Testbank

Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Easy

19) A voice portal is a standard Web site that accepts voice commands. Answer: False Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Easy

20) Mobile wallets enable users to make purchases with a single click from a mobile device. Answer: True Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Easy

21) A mobile device doesn’t have to be wireless. Answer: True Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Easy

22) Location-based services in shopping malls do nothing to help combat online shopping. Answer: False Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Easy

23) OnStar, Sync, and Blue are examples of mobile wallets. Answer: False


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Easy

24) Telemetry is the science that measures physical remoteness by means of wireless transmissions from a remote source to a receiving station. Answer: True Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Easy 25) In a mesh network, the motes transmit their data to a central computer. Answer: False Learning Objective 1: Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference: 6.4 Pervasive Computing Difficulty: Easy

26) Mesh networks are reliable, efficient, and fault tolerant. Answer: True Learning Objective 1: Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference: 6.4 Pervasive Computing Difficulty: Easy

27) Wireless Sensor Networks (WSNs) are networks of interconnected, battery-powered, wireless sensors that are placed into the physical environment. Answer: True Learning Objective 1: Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference: 6.4 Pervasive Computing Difficulty: Easy

28) Pervasive computing and virtual reality are just different names for the same thing.


Rainer, Information System, Third Canadian Edition

Testbank

Answer: False Learning Objective 1: Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference: 6.4 Pervasive Computing Difficulty: Easy

29) RFIDs are networks of interconnected, battery-powered, wireless sensors that are placed into the physical environment. Answer: False Learning Objective 1: Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference: 6.4 Pervasive Computing Difficulty: Easy

30) Two systems being developed to replace bar codes are QR codes and RFID systems. Answer: True Learning Objective 1: Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference: 6.4 Pervasive Computing Difficulty: Medium

31) War driving is the act of location WLANs while driving around a city or elsewhere. Answer: True Learning Objective 1: Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference: 6.5 Wireless Security Difficulty: Easy

32) Rogue access points can be set up by employees. Answer: True Learning Objective 1: Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference: 6.5 Wireless Security Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

33) Wireless systems can be difficult to secure. Answer: True Learning Objective 1: Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference: 6.5 Wireless Security Difficulty: Easy

34) Brigham Young University-Hawaii’s Avenda system works to secure both wireless and wired networks. Answer: True Learning Objective 1: Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference: 6.5 Wireless Security Difficulty: Medium

35) War driving is the act of locating wireless networks while driving around a certain area. Answer: True Learning Objective 1: Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference: 6.5 Wireless Security Difficulty: Easy Question Type: Multiple Choice

36) Individuals are finding it convenient and productive to use wireless devices for which of the following reasons? a) To make use of time that was formerly wasted b) To become more efficient c) Work locations are more flexible d) To be able to allocate working time around personal and professional obligations e) All of these Answer: e Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies


Rainer, Information System, Third Canadian Edition

Testbank

Difficulty: Medium

37) Of the following, which is the major problem with smart phones? a) They are too slow. b) They are too expensive. c) They can be used to compromise security. d) Their screens are too small. e) Their browsers are not fully functional. Answer: c Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Medium

38) The capabilities of smart phones include all of the following except _________. a) a calculator b) e-mail c) a global positioning system d) corporate transaction processing e) a full-function Internet browser Answer: d Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Easy

39) ________ systems are widely used for high-volume, long-distance, point-to-point communication. a) GPS b) Microwave c) Satellite d) Wireless Answer: b Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

40) Unfortunately, many managers consider smart phones as only _____, rather than as _____ that can transmit wirelessly. a) Phones, digital cameras b) Phones, pagers c) Digital cameras, phones d) Digital cameras, pagers e) Cheap, expensive devices Answer: a Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Medium

41) Microwave transmission systems are used for _____ volume, _____ distance, _____ communications. a) Low, long, broadcast b) Low, short, line-of-sight c) High, long, broadcast d) High, short, broadcast e) High, long, line-of-sight Answer: e Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Medium

42) Internet over satellite uses ____________ satellites. a) GEO b) LEO c) MEO d) NEO Answer: a Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies


Rainer, Information System, Third Canadian Edition

Testbank

Difficulty: Easy

43) Which type of satellite has the largest footprint? a) Low-earth-orbit b) Medium-earth-orbit c) Geostationary d) Polar orbit e) Equatorial orbit Answer: c Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Easy

44) The area of the earth reached by a satellite’s transmission is referred to as its _____. a) Hotspot b) Coverage c) Footprint d) Zone e) Wireless area Answer: c Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Easy

45) The greatest problem with GEO satellites is which of the following? a) Propagation delay b) Expense c) Orbital life d) Size of the footprint e) Relative speed with respect to a point on the earth’s surface Answer: a Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies


Rainer, Information System, Third Canadian Edition

Testbank

Difficulty: Easy

46) Line-of-sight is a characteristic of ___________ systems. a) GPS b) microwave c) satellite d) wireless Answer: b Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Medium 47) _____ is a satellite-based tracking system that enables users to determine a person’s position. a) Bluetooth b) Wireless application protocol c) Short message service d) Wi-Fi e) Global positioning system Answer: e Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Easy

48) Which of the following is not an advantage of radio? a) No metallic wires are needed. b) Radio waves propagate easily through office walls. c) Radio devices are inexpensive. d) Radio waves do not create electrical interference problems. e) Radio devices are easy to install. Answer: d Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Medium


Rainer, Information System, Third Canadian Edition

Testbank

49) GPS is a wireless system that uses ________ satellites. a) GEO b) LEO c) MEO d) NEO Answer: c Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Easy

50) The main problem with radio transmission is which of the following? a) Radio waves cannot travel through walls. b) When you travel too far from the source, the signal fades. c) Devices are difficult to install. d) Radio waves are slow. e) Devices are expensive to install. Answer: b Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Medium

51) Pick the answer that puts the satellites in order from smallest number to largest number to cover the earth. a) GEO, MEO, LEO b) LEO, MEO, GEO c) GEO, LEO, MEO d) LEO, GEO, MEO Answer: a Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

52) The most common wireless technology for TV and DVD remote control devices is _______. a) Bluetooth b) Ultra-wideband c) Near-field communications d) WiMAX e) Infrared Answer: e Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Easy

53) ______________ satellites maintain a relatively fixed position. a) GEO b) LEO c) MEO d) NEO Answer: a Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Easy

54) Pick the answer that puts the satellites in order from closest to the earth’s surface to farthest from the earth’s surface. a) GEO, MEO, LEO b) LEO, MEO, GEO c) GEO, LEO, MEO d) LEO, GEO, MEO Answer: b Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

55) _____ is a wireless standard that enables temporary, short-range connection between mobile devices. a) Bluetooth b) Wireless application protocol c) Short message service d) Wi-Fi e) Global positioning system Answer: a Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Easy

56) Which of the following is the most appropriate wireless networking standard for creating personal area networks? a) Wi-Fi b) Cellular radio c) Microwave d) Bluetooth e) WiMAX Answer: d Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Easy

57) Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in healthcare environments? a) Wi-Fi b) Microwave c) Ultra-wideband d) Infrared e) Bluetooth Answer: c


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Medium

58) _________ wireless networks are the familiar Wireless LANs. a) Short-range b) Medium-range c) Long-range d) Wide-area Answer: b Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Medium

59) _____, with the shortest range of any wireless network, is designed to be used with contactless credit cards. a) Near-field communications b) Bluetooth c) Ultra-wideband d) Wi-Fi e) Infrared Answer: a Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Easy

60) Which of the following statements about Wi-Fi is not correct? a) Wi-Fi provides simple Internet access. b) Laptop PC scans contain chips that can send and receive Wi-Fi signals. c) Many companies offer free Wi-Fi access in their stores. d) Wi-Fi requires encryption for secure transmissions. e) Wi-Fi is expensive to set up.


Rainer, Information System, Third Canadian Edition

Testbank

Answer: e Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Medium

61) Bluetooth is an example of a _________ wireless network. a) Short-range b) Medium-range c) Long-range d) Near-range Answer: a Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Easy

62) Which of the following is not inhibiting faster Wi-Fi expansion? a) Users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network services. b) A lack of security. c) The growth of WiMAX d) Unless the service is free, users have to log on to separate accounts for each hotspot. e) Wi-Fi services may not survive in the face of free hotspot access. Answer: c Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Hard

63) A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________. a) Transceiver b) Hotspot


Rainer, Information System, Third Canadian Edition

Testbank

c) Local reception node d) Wireless network e) GPS location Answer: b Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Easy

64) Cellular radio is an example of a ____________ wireless network. a) Short-range b) Medium-range c) Long-range d) Wide-area Answer: d Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Easy

65) Today, most wireless local area networks use the _____ standard, which can transmit up to 54 Mbps and has a range of about 300 feet. a) 802.11a b) 802.11b c) 802.11c d) 802.11g e) WiMAX Answer: d Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Easy

66) The following is NOT an advantage of WiMAX over wireline.


Rainer, Information System, Third Canadian Edition

Testbank

a) Cost b) Aesthetics c) Rural access d) All of the above are advantages of WiMAX Answer: d Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Easy

67) _____ networks use multiple Wi-Fi access points to create a wide area network. a) Mesh b) Pervasive c) Global d) Fixed e) Ubiquitous Answer: a Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Easy

68) _____ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas. a) Bluetooth b) Cell phones c) A satellite d) Ultra-wideband e) Near-field communications Answer: b Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Easy


Rainer, Information System, Third Canadian Edition

Testbank

69) The _____ standard can transmit up to 75 Mbps and has a range of 31 miles. a) Wi-Fi b) 802.11b c) 802.11c d) 802.11g e) WiMAX Answer: e Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Easy

70) ___________ is a small, portable, wireless device that provides users with a permanent Wi-Fi hotspot wherever they go. a) MiFi b) Wi-Fi Direct c) Wireless mesh network d) Wireless NIC Answer: a Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Easy

71) The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________. a) Mobility, broad reach b) Mobility, lack of expense c) Security, broad reach d) Security, mobility e) Broad reach, localization Answer: a


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Medium

72) Which of the following is NOT a driver of m-commerce? a) Bandwidth improvement b) Cell phone culture c) Higher prices of smart phones d) Widespread availability Answer: c Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Easy

73) With regard to mobile computing, _____ means that it is easy and fast to access the Web and other mobile devices. a) Ubiquity b) Convenience c) Instant connectivity d) B and C e) A, B, and C Answer: d Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Medium

74) _________________ is a technology that allows cardholders to make purchases with a single click from their mobile devices. a) Cyberbanking b) Micropayments c) Mobile banking d) Mobile wallets Answer: d


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Easy

75) With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services. a) Ubiquity b) Convenience c) Instant connectivity d) Personalization e) Localization of products and services Answer: e Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Easy

76) The development of mobile commerce is driven by all of the following factors except: a) The widespread availability of mobile devices. b) The cell phone culture. c) Increasing prices. d) Bandwidth improvement. e) It eliminates the need for a PC. Answer: c Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Medium

77) Which of the following is not a mobile application in financial services? a) Transaction processing systems b) Mobile banking c) Wireless electronic payment systems d) Micropayments e) Wireless wallets Answer: a


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Medium

78) ___________ portal aggregates and provides content and services for mobile users. a) Mobile b) Service c) Technology d) Voice Answer: a Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Easy

79) Parking meters that you can pay via your mobile telephone are an example of _________. a) Mobile banking b) Wireless electronic payment c) Wireless wallets d) Brokerage service e) Money transfer Answer: b Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Easy

80) If you buy a hot dog at a concession stand using your contactless credit card, you are using a ________. a) Wireless money transfer b) Wireless wallet c) Wireless bill payment d) Micropayment e) Wireless electronic payment system Answer: e


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Medium

81) Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is an example of ________. a) Viral marketing b) Permission advertising c) Geographical advertising d) Location-based advertising e) Direct marketing Answer: d Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Medium

82) Which of the following is NOT a benefit of location-based services at shopping malls? a) Create product groups b) Guaranteed lower prices c) Receive live updates on sales d) Advertise 2-hour sales to attract people to high-end product purchases Answer: b Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Medium

83) _____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets. a) Location-based services b) Telematics c) Pervasive services d) RFID e) Wi-Fi


Rainer, Information System, Third Canadian Edition

Testbank

Answer: b Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Easy

84) Sense networks track users via all of the following technologies except _______. a) GPS b) Traffic cameras c) Cell towers d) Wi-Fi networks e) None of these Answer: b Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Medium

85) _____ is the science that measures physical remoteness by means of wireless transmission from a remote source to a receiving station. a) Telemetry b) Wireless access point c) Near-field communications d) Microwave e) Wireless positioning Answer: a Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Easy

86) Which of the following is NOT a disadvantage to OnStar, Sync, and Blue Link? a) It is expensive b) You lose a sense of privacy c) It can be a distraction d) It can be controlled by other motorists


Rainer, Information System, Third Canadian Edition

Testbank

Answer: D Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Medium

87) The generic term for technologies that use radio waves to automatically identify individual items is __________. a) Telemetry b) Bar codes c) Shipping labels d) Radio-frequency identification e) Wireless access points Answer: d Learning Objective 1: Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference: 6.4 Pervasive Computing Difficulty: Easy

88) ______________ technology allows manufacturers to attach tags with antennas and computer chips. a) DSL b) RFID c) Satellite d) Smart card Answer: b Learning Objective 1: Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference: 6.4 Pervasive Computing Difficulty: Easy

89) Which of the following is not a limitation of barcodes? a) They require line-of-sight to the scanning device. b) They are printed on paper. c) They identify the manufacturer, product, and item. d) They are difficult to use in a manufacturing plant. e) They are useless in determining expiration date.


Rainer, Information System, Third Canadian Edition

Testbank

Answer: c Learning Objective 1: Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference: 6.4 Pervasive Computing Difficulty: Medium

90) __________ RFID tags are more expensive but can be read over greater distances. a) Active b) Distance c) Passive d) Reactive Answer: a Learning Objective 1: Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference: 6.4 Pervasive Computing Difficulty: Easy

91) The major problem with RFID has been _______. a) Expense b) Bandwidth c) Location d) RFID readers e) RFID tags Answer: a Learning Objective 1: Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference: 6.4 Pervasive Computing Difficulty: Easy

92) What would be the best use of RFID in a business? a) Transaction processing b) Supply chain management c) Personnel tracking d) Enabling communications with customers e) Decreasing network costs


Rainer, Information System, Third Canadian Edition

Testbank

Answer: b Learning Objective 1: Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference: 6.4 Pervasive Computing Difficulty: Medium

93) Which of the following is NOT true of QR codes? a) QR codes store much more information than barcodes. b) Data is stored horizontally and vertically on QR codes. c) QR codes are less resistant to damage than barcodes. d) QR codes can be read from any direction or angle. Answer: c Learning Objective 1: Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference: 6.4 Pervasive Computing Difficulty: Easy

94) _____ networks collect data from many points over an extended space. a) Bluetooth b) Ultra-wideband c) Wireless sensor d) WiMAX e) Wi-Fi Answer: c Learning Objective 1: Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference: 6.4 Pervasive Computing Difficulty: Easy

95) Which of the following can be used for reading utility meters without a person having to get out of a truck? a) RuBee b) ZigBee c) Wi-Fi d) Near-field communications e) RFID


Rainer, Information System, Third Canadian Edition

Testbank

Answer: b Learning Objective 1: Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference: 6.4 Pervasive Computing Difficulty: Easy

96) Pervasive computing can be described as ___________. a) everywhere computing b) ubiquitous computing c) embedded computing d) all of the above Answer: d Learning Objective 1: Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference: 6.4 Pervasive Computing Difficulty: Easy

97) The act of locating wireless local area networks while moving around a city is called ____. a) Eavesdropping b) War driving c) RF jamming d) Cybersquatting e) Installing rogue access devices Answer: b Learning Objective 1: Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference: 6.5 Wireless Security Difficulty: Easy

98) A(n) _____ allows unauthorized entry into a wireless network. a) Lack of encryption b) Disgruntled employee c) Open node d) Illegal server e) Rogue access point Answer: e


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective 1: Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference: 6.5 Wireless Security Difficulty: Easy

99) _________ is an unauthorized access point to a wireless network. a) Illegal access point b) RF access point c) Rogue access point d) War drive access point Answer: c Learning Objective 1: Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference: 6.5 Wireless Security Difficulty: Easy

100) _____ refers to efforts by unauthorized users to access data traveling over wireless networks. a) RF jamming b) War driving c) Eavesdropping d) Telemetry e) Installing rogue access devices Answer: c Learning Objective 1: Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference: 6.5 Wireless Security Difficulty: Easy

101) In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions. a) RF jamming b) War driving c) Eavesdropping d) Telemetry e) Installing rogue access devices Answer: a


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective 1: Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference: 6.5 Wireless Security Difficulty: Easy

102) _____ refers to efforts by unauthorized users to try to access data traveling over wireless networks. a) Eavesdropping b) RF jamming c) Tapping d) War driving Answer: a Learning Objective 1: Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference: 6.5 Wireless Security Difficulty: Easy

103) Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an _____. a) Unencrypted node b) Evil twin c) Open node d) Illegal server e) Unauthorized rogue access point Answer: b Learning Objective 1: 6.5 Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference: 6.5 Wireless Security Difficulty: Easy

104) _____ is when a person or a device intentionally or unintentionally interferes with your wireless network transmissions. a) Eavesdropping b) RF jamming c) Tapping d) War driving


Rainer, Information System, Third Canadian Edition

Testbank

Answer: b Learning Objective 1: Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference: 6.5 Wireless Security Difficulty: Easy

105) Prior to implementing the Avenda system, Brigham Young University-Hawaii, used ____________ to identify and report violators of the Honor Code. a) authentication b) authorization c) least privilege d) had no way of identifying and reporting violators Answer: d Learning Objective 1: Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference: 6.5 Wireless Security Difficulty: Easy

106) The Battle for the Mobile Wallet: Which of the following statements concerning mobile wallets is true? a) Traditional credit card issuers have not shown a serious interest in this technology. b) Individual companies cannot utilize this technology due to its prohibitive price. c) Google has launched a program to manufacture its own smart phone chips. d) Unlike traditional wallets, smart phones can be password protected. e) Consumer advocates endorse mobile systems because they will lead to lower prices. Answer: d Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: Opening Case: The Battle for the Mobile Wallet Difficulty: Medium

107) Tacos, Trucks, and Tweets?: Kogi BBQ uses Twitter to inform customers: a) What’s on the menu. b) A truck’s location. c) Where street parties are being held. d) How to pay for their tacos. e) Kogi BBQ uses Twitter for all of these reasons.


Rainer, Information System, Third Canadian Edition

Testbank

Answer: b Learning Objective 1: Provide a real-world application of wireless, mobile computing, and mobile commerce. Section Reference: IT’s About Small Business: Tacos, Trucks, and Tweets? Difficulty: Easy

108) WiMAX Helps the People of Northern Thailand: Which of the following was not an outcome of deploying WiMAX to the villages in Thailand? a) E-books were made accessible. b) Village schools collaborated with one another. c) The Internet became available as a research tool. d) Many villagers used computers for the first time. e) MFL University could hold classes in outlying villages. Answer: e Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: IT’s About Business: 6.2WiMAX Helps the People of Northern Thailand Difficulty: Medium

109) Location-Based Services at Shopping Malls: Which of the following statements is false? a) The mall industry expects these services will prevent malls from losing shoppers to online retailers. b) A current mall app helps shoppers remember where they parked. c) Some current mall apps offer reward points. d) A mall app can be a loyalty program. e) A mall app can offer coupons based on shoppers location within the mall. Answer: a Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: IT’s About Business: 6.3Location-Based Services at Shopping Malls Difficulty: Medium

110) Your Car Becomes a Smartphone: General Motors’ OnStar is an example of ____________ technology. a) Location-based b) Workflow


Rainer, Information System, Third Canadian Edition

Testbank

c) Telemetry d) Mobile portal e) None of these Answer: c Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: IT’s About Business: 6.4Your Car Becomes a Smartphone Difficulty: Medium

111) Protecting an Open Wireless Network at Brigham Young University – Hawaii: Which of the following statements is false? a) BYU-Hawaii had a closed wireless campus network. b) BYU-Hawaii could not track who was using the network. c) BYU-Hawaii did not use Cisco Clean Access because it did not provide a virtual private network capability. d) BYU-Hawaii uses Avenda to provide virtual private networking for off-campus users. e) BYU-Hawaii uses Avenda to evaluate network performance. Answer: a Learning Objective 1: Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference: IT’s About Business: 6.5Protecting an Open Wireless Network at Brigham Young University–Hawaii Difficulty: Easy

112) The implementation of the mobile wallet has NOT been hindered by _____________. a) a battle between US corporations b) cost c) retailer installation d) social/cultural issues Answer: b Learning Objective 1: Provide a real-world application of wireless, mobile computing, and mobile commerce. Section Reference: IT’s About Small Business: Tacos, Trucks, and Tweets Difficulty: Easy

113) Which of the following is critical to a successful operation of Korean Taco?


Rainer, Information System, Third Canadian Edition

Testbank

a) Communication b) Cost c) Culture d) Taste Answer: a Learning Objective 1: Provide a real-world application of wireless, mobile computing, and mobile commerce. Section Reference: IT’s About Small Business: Tacos, Trucks, and Tweets Difficulty: Easy

114) Michaela runs a dog-walking business. She has three employees, and she prides herself in maintaining a high level of customer service. She gets about half of her business from last-minute requests. When she receives such a request, she needs to know where her employees are so that she can identify the nearest one who might be able to do the walk. Significantly, she needs this information before she can confirm the walk with the client. Which of the following technologies will help her obtain this information? a) Radio transmission b) Internet over Satellite c) LEO constellation d) GPS e) Microwave Answer: d Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Medium

115) Frank and his wife, Paula, run a country store with a special room where husbands can sit while their wives are shopping. The Men’s Corner already has a large-screen TV for sports viewing, but Frank and Paula are considering adding Wi-Fi. Which of the following statements is false? a) Their store would need to have broadband access. b) Their store will need a wireless access point. c) They could charge the customers for the service. d) Wi-Fi is based on radio waves, so they will need a clear line-of-sight into the room. e) They should consider using Wi-Fi Direct. Answer: e


Rainer, Information System, Third Canadian Edition

Testbank

Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Medium

116) Frank and his wife, Paula, run a country store in a high-foot-traffic area. Which of the following would not be a beneficial use of mobile technology for their store? a) Telemetry b) Location-based c) Wireless payments d) Mobile app loyalty program e) All of these could be used beneficial. Answer: a Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Medium

117) Frank and his wife, Paula, run a country store in a high-foot-traffic area. They are trying to understand what the traffic in the store is by using technology. They are considering setting up a wireless sensor network. Which of the following statements is false? a) Motes can be locations throughout the store. b) Once they have created the network, they cannot add additional sensors. c) The data are moved from sensor to sensor to reach a central computer. d) The sensors can tell the direction in which a person is moving. e) The network will need a base station. Answer: d Learning Objective 1: Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference: 6.4 Pervasive Computing Difficulty: Medium

118) Frank and his wife, Paula, run a country store with a special room where husbands can sit while their wives are shopping. The Men’s Corner already has a large-screen TV for sports viewing, and they recently added Wi-Fi. Which of the following is not a security issue? a) A rogue access point b) War driving


Rainer, Information System, Third Canadian Edition

Testbank

c) Motes d) Eavesdropping e) Radio-frequency jamming Answer: d Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Medium

Question Type: Essay

119) Discuss the differences between the traditional working environment and the wireless working environment. Learning Objective 1: Provide a real-world application of wireless, mobile computing, and mobile commerce. Section Reference: Opening Case: The Battle for the Mobile Wallet Difficulty: Medium

120) Describe the convergence of functions in today’s smart phones. Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Medium

121) Differentiate among the three types of satellites. Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Medium

122) Define Bluetooth, and give examples of its uses. Learning Objective 1: Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference: 6.1 Wireless Technologies Difficulty: Medium


Rainer, Information System, Third Canadian Edition

Testbank

123) Describe the 802.11 family of standards. Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Medium

124) Explain location-based commerce, and provide examples. Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce: Mobile Commerce Applications Difficulty: Medium

125) What are micropayments and mobile wallets? Provide examples of their uses. Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce: Mobile Commerce Applications Difficulty: Medium

126) What are mobile portals and voice portals? Provide examples of their uses. Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce: Mobile Commerce Applications Difficulty: Medium

127) What is telemetry, and how is it used. Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce: Mobile Commerce Applications Difficulty: Medium

128) How do wireless sensor networks work, and what are they used for? Learning Objective 1: Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference: 6.4 Pervasive Computing Difficulty: Medium


Rainer, Information System, Third Canadian Edition

Testbank

129) What are the problems with Wi-Fi? Learning Objective 1: Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference: 6.2 Wireless Computer Networks and Internet Access Difficulty: Medium

130) What are the two characteristics of mobile computing, and what are the five value-added attributes of mobile computing? Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Medium

131) Explain the factors that are driving the development of mobile commerce. Learning Objective 1: Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference: 6.3 Mobile Computing and Mobile Commerce Difficulty: Hard

132) Describe pervasive computing and the two technologies that provide its infrastructure. Learning Objective 1: Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference: 6.4 Pervasive Computing Difficulty: Medium

133) Identify and discuss the four major threats to wireless networks. Learning Objective 1: Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference: 6.5 Wireless Security Difficulty: Medium


Rainer, Information System, Third Canadian Edition

Testbank

Legal Notice Copyright © 2014 by John Wiley & Sons Canada, Ltd. or related companies. All rights reserved.

The data contained in these files are protected by copyright. This manual is furnished under licence and may be used only in accordance with the terms of such licence. The material provided herein may not be downloaded, reproduced, stored in a retrieval system, modified, made available on a network, used to create derivative works, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without the prior written permission of John Wiley & Sons Canada, Ltd.


Information System, Third Canadian Edition

Rainer

Chapter 7 Web 2.0 and social networks

Question Type: True/False 1) Users of Web 1.0 sites passively receive information from those sites. Answer: True Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Easy

2) A tag is a keyword or term that describes a piece of information. Answer: True Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Easy

3) Web. 2.0 is a loose collection of information technologies and applications. Answer: True Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Easy

4) Web 2.0 sites are primarily online places to visit. Answer: False Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Easy

5) AJAX is a Web tool that reloads entire Web pages quickly.


Information System, Third Canadian Edition

Rainer

Answer: False Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Medium

6) A tag is the way a developer describes a piece of information. Answer: False Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Medium

7) RSS stands for Real Simple Subscription. Answer: False Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Medium

8) Geo-tagging refers to tagging information on tour sites. Answer: False Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Medium

9) Crowdsourcing is taking a job traditionally performed by an employee or a consultant and outsourcing it to an undefined group of people in the form of an open call. Answer: True Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Easy


Information System, Third Canadian Edition

Rainer

10) A wiki is a collection of blogs. Answer: False Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Medium

11) The term “blog” is short for Weblog. Answer: True Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Easy

12) Blogs cannot contain links to Web sites. Answer: False Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Medium

13) Blogs are not used internally by organizations. Answer: False Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Medium

14) Companies monitor blogs for mention of their products. Answer: True Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications


Information System, Third Canadian Edition

Rainer

Difficulty: Medium

15) One can trust the content of blogs. Answer: False Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Easy

16) Anyone with permission can post material and make changes on a wiki. Answer: True Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Easy

17) Web 2.0 media sites allow people to share digital media. Answer: True Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Easy

18) Social networking sites help users find like-minded people online. Answer: True Learning Objective: Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference: 7.3 Categories of Web 2.0 Sites Difficulty: Easy

19) One of the major categories of Web 2.0 sites is blogs. Answer: False Learning Objective: Discuss the three categories of Web 2.0 sites, and provide at least one example of


Information System, Third Canadian Edition

Rainer

how each one can improve business efficiency and profitability. Section Reference: 7.3 Categories of Web 2.0 Sites Difficulty: Medium

20) You must be a Web site developer in order to create a mashup. Answer: False Learning Objective: Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference: 7.3 Categories of Web 2.0 Sites Difficulty: Medium 21) Social networking sites allow users to upload their content to the Web in the form of text, voice, images, and videos. Answer: True Learning Objective: Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference: 7.3 Categories of Web 2.0 Sites Difficulty: Easy

Question Type: Multiple Choice

22) Which of the following is a disadvantage of Facebook advertising? a) Click-through b) Cost c) Targeting d) Reinforcement Answer: a Learning Objective: Summarize the fundamental concepts related to Web 2.0 and social networks. Section Reference: Opening case Difficulty: Easy

23) Which of the following is NOT true about Web 2.0? a) It is interactive. b) It facilitates collaboration. c) They are online places to visit. d) They harness collective intelligence.


Information System, Third Canadian Edition

Rainer

Answer: c Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Medium

24) Which of the following statements concerning Web 2.0 sites is false? a) They harness collective intelligence. b) They deliver functionality as services. c) They feature remixable applications and data. d) They encourage user participation. e) They cannot be used to start a business. Answer: e Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Easy

25) Which of the following statements concerning tagging is true? a) Tag categories are created by software developers. b) Tagging software has built-in rules. c) Tagging can be performed only on Web pages. d) Tags can be given only to text. e) Folksonomies are a version of tagging. Answer: e Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Easy

26) Tagging is the basis of ___________. a) folksonomies b) LinkedIn c) web page development d) Wikipedia


Information System, Third Canadian Edition

Rainer

Answer: a Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Medium

27) Which of the following statements concerning tagging is false? a) Tags fall into categories. b) Users can pick their own tags. c) Tags can be given to any piece of information or file. d) Tags can be used to retrieve Web content. e) Each user designs a personal set of tagging rules. Answer: a Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Easy

28) Which of the following statements concerning RSS is false? a) Users can customize the information they want. b) Users can specify how often they want the information. c) Blogs cannot be part of an RSS feed. d) A special reader is needed to display RSS content feeds. e) Subscribers get notifications of changes in content. Answer: c Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Medium

29) Which of the following statements concerning RSS is true? a) Blogs cannot be part of an RSS feed. b) RSS feeds deliver information only from news sites. c) RSS cannot be searched. d) RSS feeds transmit a link to the full text of new content to subscribers. e) A special reader is needed that must be purchased.


Information System, Third Canadian Edition

Rainer

Answer: d Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Medium

30) With Web 1.0 sites, users _________________, whereas with Web 2.0 sites, users _________________. a) Use HTML, use CCS b) Passively receive information, participate with the site. c) Use wired connections, use wireless connections. d) Have to know the address of the site, can use search engines to find a site e) Did not have to login to find information, have to login in to find information. Answer: b Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Hard

31) __________ allows you to receive the information you want, when you want it, without having to surf thousands of Web sites. a) Aggregation b) Bookmarking c) RSS d) Search engine utilization Answer: c Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Medium

32) Which of the following is an advantage of tagging? a) Tagging rules are standard within a domain of knowledge. b) Users have to choose from a set of tags so others can find the item. c) Despite the variation in individual rules, the Web collection is rather organized. d) Retrieval finds only the relevant tags to a user’s search. e) Tags use AJAX to speed up searching.


Information System, Third Canadian Edition

Rainer

Answer: c Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Hard

33) You sign up for an RSS feed from CNN.com. Which of the following would you expect to happen? a) When you sign up, you will need to download print templates. b) You won’t be able to search RSS content. c) You will be able to choose only one topic area. d) You will be notified of updates in the content areas you selected. e) You will get content sent to you via e-mail. Answer: d Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Hard

34) AJAX is a web development technique that allows ________ web pages to reload _____. a) full, quickly b) portions of, instead of the entire web page c) multiple, quickly d) no, at any time Answer: b Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Easy

35) Which of the following is not an example of Web 2.0 applications? a) Blogs b) Wikis c) Netcasting d) Crowdsourcing e) AJAX


Information System, Third Canadian Edition

Rainer

Answer: e Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Medium 36) Printing-on-demand is customized printing done in ________ batches. a) small b) medium c) large d) global Answer: a Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Easy

37) Many traditional media companies are using ________ to provide a richer version of the stores they cover. a) Blogs b) Netcasts c) RSS feeds d) Tags e) Wikis Answer: a Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Medium

38) Many companies are using ________ to capture updated product features and specifications. a) Blogs b) Netcasts c) RSS feeds d) Tags e) Wikis Answer: e


Information System, Third Canadian Edition

Rainer

Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Medium

39) Which of the following is a problem associated with blogs? a) Ability to influence b) Accuracy c) Current d) Understanding the customer Answer: b Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Medium

40) Which of the following statements concerning blogging is false? a) Anyone can blog. b) A reader can believe the details in a blog. c) A company can maintain an internal blog site. d) Blogging can be used in marketing. e) Tweets are replacing blogging. Answer: b Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Hard

41) Consumer-generated media can be created through the use of ________. a) blogs b) crowdsourcing c) folksonomies d) wikis Answer: a Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of


Information System, Third Canadian Edition

Rainer

how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Medium

42) You just started to work on a project with three other people. You realize that everyone has their own notes, which makes it hard for you to keep track of what has been done and what still needs to be done. Which of the following applications would you suggest the team use? a) Blogs b) Netcasts c) RSS feeds d) Tags e) Wikis Answer: e Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Medium

43) What is a disadvantage of photo-sharing web sites? a) Convenience b) Cost c) Privacy d) Usability Answer: c Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Easy

44) The comments of consumers in the blogosphere concerning a company’s products are called ____________________. a) Free advertising b) Consumer-generated media. c) Consumer-generated PR d) Rumors e) Reliable feedback Answer: b


Information System, Third Canadian Edition

Rainer

Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Medium

45) The reliability of the content in Wikipedia, the online encyclopedia, is questionable because a) All of the administrators are volunteers. b) No author has to identify himself or herself. c) The content is updated all the time. d) It is difficult to test the authenticity of the content due to the fact that anyone can contribute content. e) All of these are reasons why the content is questionable. Answer: d Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Medium

46) What keeps social networking sites in business? a) profitability b) popularity c) tangible products d) all of the above Answer: b Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Medium

47) Universities are using ________ to provide students with access to lectures. a) Blogs b) Netcasts c) RSS feeds d) Tags e) Wikis Answer: b


Information System, Third Canadian Edition

Rainer

Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Medium

48) Which of the following statements concerning printing-on-demand as a Web 2.0 application is false? a) New small-book printing machines reduce printing costs. b) Free software can be used to edit and typeset text. c) Printing-on-demand companies also offer distribution. d) Printing-on-demand companies market books for their authors. e) Printing-on-demand is attractive to established authors. Answer: d Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Easy

49) Which of the following is not an example of crowdsourcing? a) Posting a task that needs to be completed with a price for completion b) Posting personal pictures that can be licensed by interested parties c) Posting a call for new manuscripts d) Asking for feedback on products and make it publically available e) Asking for new product ideas and reward those used Answer: c Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Easy

50) Carter is a member of a team of five students working on a research project that comprises 25% of his overall grade. The team is trying to decide how they can most effectively work together to complete the final paper. Which of the following would work the best for this team? a) A blog b) A discussion board c) A private social networking site d) A Skype video chat e) A wiki


Information System, Third Canadian Edition

Rainer

Answer: e Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Medium

51) Sean is organizing a 5K race to support the local food bank. The event takes place in three months. Which of the following would be the best strategy? a) Set up a Twitter account, and tweet some details about the event every couple of hours. b) Start blogging about all the organizing that is going on. c) Start a business page in Facebook, and let his friends know about it. d) Start putting pictures of the food bank on photo sharing sites and tag with “5K” e) Build a Web page with all of the details. Answer: c Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications, Categories of Web 2.0 Sites Difficulty: Hard

52) Sean ran a very successful 5K race to support the local food bank. They had 210 runners and raised over $5,000. He wants to continue to do more for the local food bank. Which of the following would be the best use of his time? a) Set up a Twitter account and tweet a story about the food bank every day. b) Start blogging about how the food bank helps people living in the community. c) Use the business page in Facebook that he built for the race and allow people to donate from that page. d) Start putting pictures of the food bank on photo sharing sites and tag with “Food bank” e) Build a Web page with all of the details of the food bank. Answer: b Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications, Categories of Web 2.0 Sites Difficulty: Hard

53) Greg still follows his high school’s lacrosse team. He set up a meeting with the coach to ask how he could help with recruiting. Which of the following Section References would make the most sense from the coach’s point of view?


Information System, Third Canadian Edition

Rainer

a) Build a wiki with other alums of their seasons. b) Build a fan page in Facebook to alert alums to upcoming games. c) Go to games and tweet about the action. d) Blog about the games and include his own insights about his experience. e) Post photos of this year’s games on a photo sharing site and tag them with the name of the high school. Answer: d Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Hard

54) Which of the following statements concerning social networking Web sites is false? a) Any type of content can be loaded. b) The goal is to help people collaborate. c) Social networks can be a valuable business tool. d) Users find the social network feeds distracting. e) Social network software provides tools for finding other people online. Answer: d Learning Objective: Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference: 7.3 Categories of Web 2.0 Sites Difficulty: Medium

55) Which of the following is not a social networking site? a) Facebook b) YouTube c) Flickr d) Wikipedia e) LinkedIn Answer: d Learning Objective: Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference: 7.3 Categories of Web 2.0 Sites Difficulty: Easy


Information System, Third Canadian Edition

Rainer

56) Which of the following statements is false? a) Social networks can be used to achieve strategic objectives. b) The only downside of social networks is the required bandwidth. c) Social networks can be implemented on a secure platform. d) Social networks take the place of traditional employee directories. e) Social networks can offer personal pages as well as business pages. Answer: b Learning Objective: Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference: 7.3 Categories of Web 2.0 Sites Difficulty: Medium

57) Which of the following is a problem with social networking sites? a) Ability (or lack thereof) to pursue strategic objectives b) Their viral nature c) Public relations management d) All of the above are problems with social networking sites Answer: c Learning Objective: Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference: 7.3 Categories of Web 2.0 Sites Difficulty: Hard

58) LinkedIn is a _______________________ social networking site that makes money from advertising and services. a) Training b) College c) Business-oriented d) Video-upload e) Blogging Answer: c

Learning Objective: Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference: 7.3 Categories of Web 2.0 Sites Difficulty: Easy


Information System, Third Canadian Edition

Rainer

59) LinkedIn is a _____________. a) aggregator b) mashup c) search engine d) social networking site Answer: d Learning Objective: Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference: 7.3 Categories of Web 2.0 Sites Difficulty: Easy

60) Building relationships, anticipating needs, and providing special deals for the community’s members is a function of which category of Web 2.0 applications? a) Social networking b) Aggregators c) Blogs d) Crowdsourcing e) Social commerce Answer: e Learning Objective: Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference: 7.3 Categories of Web 2.0 Sites Difficulty: Medium

61) Which of the following is an advantage of social commerce over traditional e-commerce? a) Loyalty b) The ability to predict buying habits based on real-time data c) Processing speed d) Crowdsourcing e) Reduced expenses Answer: b Learning Objective: Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference: 7.3 Categories of Web 2.0 Sites Difficulty: Medium


Information System, Third Canadian Edition

Rainer

62) A Web site that combines content from other Web sites to form new content is called a(n) ______. a) Social network b) Aggregator c) Blog d) E-commerce site e) Mashup Answer: e Learning Objective: Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference: 7.3 Categories of Web 2.0 Sites Difficulty: Easy 63) A(n) _________ is a web site that takes content from a number of other web sites and mixes them together to create a new kind of content. a) aggregator b) mashup c) syndicator d) search engine Answer: b Learning Objective: Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference: 7.3 Categories of Web 2.0 Sites Difficulty: Easy

64) Gerry has a dog-walking business, and he wants to help his walkers plan their route. Which of the following should he use? a) Social networking b) Aggregators c) Blogs d) Crowdsourcing e) Mashup Answer: e Learning Objective: Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference: 7.3 Categories of Web 2.0 Sites Difficulty: Easy


Information System, Third Canadian Edition

Rainer

65) What is a way Zynga can minimize its dependence on Facebook? a) Consider an affiliate relationship where Facebook has a link to Zynga. b) Leverage Facebook’s network of friends to extend its customer reach. c) Use the Facebook currency to generate additional revenue. d) All of the above Answer: a Learning Objective: Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference: IT’s About Business: Online Games are Big Business Difficulty: Medium

66) More than 120 million people play Zynga’s online social games on Facebook. Which of the following is an advantage of the Zynga-Facebook partnership for Zynga? a) People stay on Facebook longer b) 1/3 of the revenue for game-playing goes to Facebook c) Games are easily and frequently promoted d) None of the above are advantages for Zynga Answer: c Learning Objective: Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference: IT’s About Business: Online Games are Big Business Difficulty: Medium

67) Share Your Life in Pictures: Which of the following statements concerning Web-based photo sharing is false? a) Early photo-sharing sites were popular because they facilitated printing. b) Newer sites are focusing on pictures from smartphones. c) Some photo-sharing sites are focusing on serious photographers. d) It’s easy to protect a photo once it’s posted to a sharing site or social network. e) All these statements are true. Answer: d Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: IT’s About Business: 7.3 Share Your Life in Pictures Difficulty: Medium


Information System, Third Canadian Edition

Rainer

68) Online Games Are Big Business: Which of the following statements concerning the online games played on social network sites is false? a) The social network site receives payments from the game company. b) All users of the social network site are fine with having games available and part of feeds. c) Playing the games is free. d) Game companies use social network sites to advertise. e) Facebook created its own currency. Answer: b Learning Objective: Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference: IT’s About Business: 7.4 Online Games Are Big Business Difficulty: Medium

69) What is a disadvantage of Foursquare membership? a) Getting flooded with information b) Loss of “private time” c) Ease with which “bad people” could find you d) All of the above Answer: d Learning Objective: Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference: IT’s About Business: Location, Location, Location Difficulty: Easy

70) Which of the following statements concerning Foursquare is false? a) Foursquare is based on GPS-enabled mobile technology. b) A “mayor” icon is given to the person who checks into a location the most often in the last 60 days. c) Foursquare is used by merchants to attract customers with promotions. d) Other social network sites are adding location-based tools. e) Foursquare has no competition. Answer: e Learning Objective: Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference: IT’s About Business: 7.5 Location, Location, Location Difficulty: Medium


Information System, Third Canadian Edition

Rainer

71) Foursquare relies on _________ advertising. a) Facebook b) Google c) location-based d) pay-per-click Answer: c Learning Objective: Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference: IT’s About Business: Location, Location, Location Difficulty: Easy

72) Which of the following statements about advertising with Facebook is false? a) Targeting marketing is based on information in the member’s profile. b) Advertising can take the form of either text or video. c) Facebook has a high click-through rate. d) Companies set up their own Facebook pages for fans to “like.” e) Facebook promises brand awareness to advertisers. Answer: c Learning Objective: Summarize the fundamental concepts related to Web 2.0 and social networks. Section Reference: Marketing with Facebook Difficulty: Medium

Question Type: Essay

73) What is the difference between Web 1.0 and Web 2.0? Title: Assessment Question 9.50 Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Medium

073 Learning Objective: Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference: 7.1 Web 2.0 Underlying Technologies Difficulty: Medium


Information System, Third Canadian Edition

Rainer

74) Compare and contrast blogs and wikis. Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Medium

75) Define crowdsourcing, and explain why it is valuable Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Medium

76) Identify and analyze the risks and benefits associated with social networking sites. Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Easy

77) Explain how a mashup works (conceptually), and provide some examples of mashups that you have seen. Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Medium

78) Discuss the efforts that Wikipedia takes to improve the reliability of its content. Why do many colleges continue to disallow Wikipedia as a cite for scholarly work. Learning Objective: Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Medium.

79) Explain how a corporate social networking site would differ (on as many aspects as you can think of) from the personal one so many of us belong to. Learning Objective: 7.2 Identify five prominent Web 2.0 applications, and provide at least one example


Information System, Third Canadian Edition of how each one can be utilized in a business setting. Section Reference: 7.2 Web 2.0 Applications Difficulty: Medium

Rainer


Information System, Third Canadian Edition

Rainer

Legal Notice Copyright © 2014 by John Wiley & Sons Canada, Ltd. or related companies. All rights reserved.

The data contained in these files are protected by copyright. This manual is furnished under licence and may be used only in accordance with the terms of such licence. The material provided herein may not be downloaded, reproduced, stored in a retrieval system, modified, made available on a network, used to create derivative works, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without the prior written permission of John Wiley & Sons Canada, Ltd.


Information System, Third Canadian Edition

Rainer Chapter 8

Information systems within the organization Question Type: True/False 1) The Sportvision case shows IS are everywhere and can be used in many different ways. Answer: True Learning Objective: Provide a real-world application of an information system within an organization. Section Reference: Opening Case Difficulty: Easy

2) Pizza Pizza allowed their customers to design their own pizzas to increase sales while increasing the cost. Answer: False Learning Objective: Provide a real-world application of an information system within an organization. Section Reference: IT’s About Small Business: Pizza Pizza’s Customer App Difficulty: Easy

3) TPSs provide data that can be stored in the organization’s databases. Answer: True Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Easy

4) The functional area information systems are the most fundamental information systems in the organization. Answer: False Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Easy

5) The data processed by transaction processing systems provide the inputs for other organizational information systems. Answer: True


Information System, Third Canadian Edition

Rainer

Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Easy

6) Greg is mowing lawns in the neighborhood for the summer. He does not need an information system. Answer: False Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Easy

7) In general, organizations try to automate data entry as much as possible. Answer: True Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Easy

8) HR Information Management System was originally for benefits and tracking vacation. Answer: True Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Medium

9) When you make a purchase online, that transaction is an example of batch processing. Answer: False Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Medium

10) Source data automation involves collecting data from sensors.


Information System, Third Canadian Edition

Rainer

Answer: True Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Medium

11) Functional information systems support the entire enterprise or major portions of it. Answer: False Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Easy

12) The information systems for Accounting and Finance could contain control and auditing process. Answer: True Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Easy

13) The POM function within an organization monitors the customer sales activity. Answer: False Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Easy

14) An example of a transaction in a HRIS application is adding a new employee. Answer: True Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Easy


Information System, Third Canadian Edition

Rainer

15) Information systems can be function-specific. Answer: True Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Easy

16) Historically, the functional area information systems were developed independently of one another. Answer: True Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Easy

17) EAI are not necessary if an ERP system has been installed. Answer: False Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Hard

18) Airgas chose to implement SAP “as-is” to adopt the industry’s best practices. Answer: False Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

19) Information silos were particularly efficient when business processes crossed functional boundaries in an organization. Answer: False Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems


Information System, Third Canadian Edition

Rainer

Difficulty: Easy

20) Business processes may be located within one functional area or may span multiple functional areas. Answer: True Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

21) Best practices are the most successful solutions or problem-solving methods for achieving a business objective. Answer: True Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

22) ERP II systems are considered 3rd generation ERP systems. Answer: True Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

23) Enterprise resource management is an enterprise-wide effort to acquire and retain customers. Answer: False Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

24) Financial management, operations management, and human resource management are extended ERP modules. Answer: False


Information System, Third Canadian Edition

Rainer

Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

25) ERP systems integrate the planning, management and use of all resources of the organization. Answer: True Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

26) When ERP systems are not appropriate in an organization, then that organization can use an enterprise application integration system. Answer: True Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

27) Organizations that use ERP systems are more agile and adaptive. Answer: True Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

28) Exception reports show a greater level of detail than is included in routine reports. Answer: False Learning Objective: Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference: 10.4 Reports Difficulty: Easy


Information System, Third Canadian Edition

Rainer

29) Comparative reports compare things. Answer: True Learning Objective: Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference: 10.4 Reports Difficulty: Easy

30) Key-indicator reports shows data at a greater level of detail. Answer: False Learning Objective: Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference: 10.4 Reports Difficulty: Easy

31) Drill down reports are produced at scheduled intervals. Answer: False Learning Objective: Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference: 10.4 Reports Difficulty: Medium

32) Ad hoc reports are run weekly. Answer: False Learning Objective: Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference: 10.4 Reports Difficulty: Easy

33) ERP systems always provide a competitive advantage because they make a business so much more efficient. Answer: False Learning Objective: Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference: 10.4 Reports Difficulty: Easy


Information System, Third Canadian Edition

Rainer

34) An organization has to own all of the information systems it used. Answer: False Learning Objective: Provide a real-world application of an information system within an organization. Section Reference: Opening Case: Is Baseball a Science? Difficulty: Medium

35) Airgas improved its efficiencies by using SAP, which is a customer relationship management system. Answer: False Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: IT’s About Business: 10.2 SAP at Airgas Difficulty: Medium

36) A company that implements an ERP system must reworking their business processes to meet the procedures established by their ERP systems to gain significant benefits. Answer: True Learning Objective: Summarize the fundamental concepts and skills related to the roles and functions of information systems within organizations. Section Reference: Closing Case: Difficulties in Managing Enterprise Resource Planning Systems Difficulty: Medium

Question Type: Multiple Choice

37) Sportvision is an example of a(n) __________. a) ERP system b) Expert system c) FAIS d) TPS Answer: d Learning Objective: Provide a real-world application of an information system within an organization. Section Reference: Opening Case Difficulty: Medium


Information System, Third Canadian Edition

Rainer

38) Which of the following is true? a) Transactions are only critical to the area they occur in. b) Transactions can only involve one database. c) Transactions can only involve one computer. d) The actual processing of a Transaction has to be standard. e) Transactions generate a small volume of data. Answer: d Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Medium

39) Which of the following is false? a) Corporate data is supplied by Transaction processing systems. b) Information systems are only used by large organizations. c) Reports from information systems are used in all levels of the organization. d) Data from TPS systems feeds ERP systems. e) Information systems within an organization support internal and external processes. Answer: b Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Hard

40) Which of the following is NOT a requirement for a TPS? a) Avoid errors b) Efficiently handle data in high volumes c) Provide data analysis capabilities d) Scalability Answer: c

Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Easy


Information System, Third Canadian Edition

Rainer

41) Organizational transactions are typically _____ volume, _____, and therefore _____ to computerize. a) low, repetitive, difficult b) high, repetitive, easy c) high, different, difficult d) low, different, easy e) high, different, easy Answer: b Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Medium

42) Business transactions that are processed as they occur is an example of a) batch processing b) source data automation c) OLTP d) TPS e) ESS Answer: c Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Medium

43) ____________ is when business transactions are processed as soon as they occur. a) Batch processing b) OLAP c) OLTP d) Source data automation Answer: c Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Easy


Information System, Third Canadian Edition

Rainer

44) The most fundamental information systems in an organization are: a) Office automation systems b) Decision support systems c) Functional area information systems d) Transaction processing systems e) Business intelligence systems Answer: d Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Easy

45) When interest is credited to your savings account at your bank, it is called a: a) Process b) Function c) Calculation d) Transaction e) Decision Answer: d Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Medium

46) Batch processing is when the firm collects data from transactions __________, places them in groups, then prepares and processes the batches ___________. a) as they occur, as they occur b) as they occur, periodically c) periodically, as they occur d) periodically, periodically Answer: b Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Easy


Information System, Third Canadian Edition

Rainer

47) Crediting interest to your savings account at your bank once a month, it is called a: a) Process b) Function c) Calculation d) Transaction e) Decision Answer: a Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Medium

48) When interest is credited to your savings account at your bank, it is called a: a) Process b) Function c) Calculation d) Transaction e) Decision Answer: d Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Medium

49) Data that have been processed by the organization’s _____ are inputs into the organization’s database. a) office automation systems b) functional area information systems c) Transaction processing systems d) decision support systems e) digital dashboards Answer: c Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Easy


Information System, Third Canadian Edition

Rainer

50) Which of the following is not a characteristic of a transaction processing system? a) Small amounts of data are processed b) Sources of data are mainly internal c) Low computation complexity d) High level of accuracy, data integrity, and security e) High level of detail Answer: a Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Easy

51) Which of the following is not an example of a transaction? a) A person hired b) A payroll check generated c) A service sold d) Printing a report e) Checking out at Walmart Answer: d Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Hard

52) Greg is mowing lawns in the neighborhood for the summer. Which of the following is not an example of a transaction he has in his business? a) Adding a new client to his list. b) Mowing a client’s lawn c) Buying gas for his mower d) Driving to the client’s house e) Getting paid by the client Answer: d Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Medium


Information System, Third Canadian Edition

Rainer

53) Which of the following is false? a) TPS need large computers to process the transactions. b) Business transactions can be processed when they occur. c) Business transactions can be processed after they occur. d) Data for transactions can be collected by sensors. e) A transaction is a business event. Answer: a Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Hard

54) Which of the following is not a function of functional area information systems? a) Providing information to managers in the functional areas b) Supporting the managerial tasks of planning, organizing, and controlling operations c) Providing information mainly in the form of reports d) Providing data from business events to the corporate database e) Providing analysis capabilities to middle level managers and staff Answer: d Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Easy

55) Functional area information systems provide ___________ mainly to lower- and middle-level managers in the functional areas via a variety of reports. a) data b) knowledge c) information d) wisdom Answer: c Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Easy


Information System, Third Canadian Edition

Rainer

56) Which of the following is not a process within an information system for Accounting and Finance? a) Budgeting b) Managing Currencies c) Inventory management d) Auditing e) Expense management Answer: c Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Medium

57) __________ involves monitoring how money is spent and assessing financial health. a) Auditing b) Budgetary control c) Financial ratio analysis d) Investment management Answer: a Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Easy

58) Which of the following is not a process within an information system for Human Resource Management? a) Benefits administration b) Firing decisions c) Peer evaluations d) Recruitment e) Training Answer: b Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Easy

59) The “virtual close” is part of the _________ functional area.


Information System, Third Canadian Edition

Rainer

a) Accounting and Finance b) Human Resource Management c) Marketing d) Production/Operations Management Answer: a Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Medium

60) Which of the following is false? a) Inventory management determines how much inventory to order. b) Large companies allow their vendors to manage their inventory. c) The POM function within an organization monitors sales. d) Quality control used by manufacturing units uses metrics. e) Computer systems are used to integrate all aspects of product design. Answer: c Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Medium

61) MRP is part of the ______________ functional area. a) Accounting and Finance b) Human Resource Management c) Marketing d) Production/Operations Management Answer: d Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Medium

62) Which of the following is false? a) ERP systems are an evolution of functional information systems.


Information System, Third Canadian Edition

Rainer

b) ERP systems look the same to users as functional information systems. c) ERP systems have much the same functionality as functional information systems. d) ERP systems produce the same reports as functional information systems. e) ERP systems use the same data as functional information systems. Answer: b Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Medium

63) Enterprise resource planning systems take a(n) _____ view of the overall organization. a) User’s b) Management c) Functional d) Business process e) Transactional Answer: d Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Medium 64) _________ integrate the planning, management and use of all resources of the organization. a) ERP systems b) Expert systems c) FAISs d) TPSs Answer: a Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

65) _____ integrate the planning, management, and use of all of an organization’s resources, and are designed to tightly integrate the functional areas of the organization. a) Transaction processing systems b) Supply chain management systems


Information System, Third Canadian Edition

Rainer

c) Functional area information systems d) Enterprise resource planning systems e) Corporate extranets Answer: d Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

66) Which of the following is false? a) Functional area information systems were usually developed independently. b) Functional area information systems easily communicate with each other. c) ERP systems are designed to integrate business processes. d) ERP systems use a common database. e) ERP systems integrate functional areas within an organization. Answer: b Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Medium

67) ERP systems are designed to break down ____________. a) expert systems b) FAISs c) information silos d) TPSs Answer: c Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Medium

68) The ________ generation of ERP allows a company to compete on a functional level by adopting an enterprisewide approach using the Internet to connect all participants in the value chain. a) 1st b) 2nd


Information System, Third Canadian Edition

Rainer

c) 3rd d) 4th Answer: c Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

69) The characteristics of ERP systems include all of the following except: a) Integrating the planning, management, and use of all resources of the organization b) Providing information necessary to control the business processes of the organization c) Including a set of interdependent software modules d) Typically fitting an organization’s existing business processes e) They are expensive and time-consuming Answer: d Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

70) Enterprise resource planning systems are very _____ software products, meaning that companies typically have to change their _____ to accommodate how the software functions. a) unstructured, business processes b) structured, reporting relationships c) structured, accounting processes d) unstructured, inventory control e) structured, business processes Answer: e Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Medium

71) The ________ generation of ERP was designed to address back-office business processes. a) 1st b) 2nd


Information System, Third Canadian Edition

Rainer

c) 3rd d) 4th Answer: a Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

72) _____ are interorganizational ERP systems that provide Web-enabled links between an organization’s key business systems and its customers, suppliers, business partners, and others. a) Functional area information systems b) Supply chain management systems c) Transaction processing systems d) Office automation systems e) ERP II systems Answer: e Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

73) _____ are the most successful solutions or problem-solving methods for achieving a business objective. a) Business functions b) Best practices c) Optimal strategies d) Business processes e) Enterprise solutions Answer: b Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

74) Which of the following is NOT a benefit Airgas received by implementing SAP? a) Better price management b) Competitiveness


Information System, Third Canadian Edition

Rainer

c) Leaner operating costs d) Small increase in revenue Answer: d Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

75) The drawbacks of ERP systems include all of the following except: a) They are complex b) They are expensive c) They are time-consuming to implement d) Companies may need to change existing business processes to fit the software e) They consist of modules Answer: e Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

76) Which of the following is a benefit of ERP systems? a) Business process adaptation b) Complexity c) Cost d) Flexibility Answer: d Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Medium

77) Which of the following was not included in early ERP systems? a) Sales and Marketing b) Inventory Control c) Order Entry d) Distribution


Information System, Third Canadian Edition

Rainer

e) Raw materials management Answer: a Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

78) Which of the following is a limitation of ERP systems? a) Cost b) Decision-making c) Efficiency d) Flexibility Answer: a Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

79) Which of the following is false about ERP II systems? a) They utilize the Web. b) They include human resources processes. c) Functionality is delivered as e-business suites. d) They support internal- facing applications as well as external-facing applications. e) These ERP systems have no optional modules. Answer: e Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

80) Which of the following is false? a) Breaking down functional silos makes an organization more adaptive. b) An organization doesn’t have to use the business processes coded into the ERP. c) ERP systems change an organization’s business processes. d) ERP systems are time consuming to implement. e) ERP systems require functional areas to work together.


Information System, Third Canadian Edition

Rainer

Answer: b Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy

81) Which of the following has not been identified as a reason for ERP implementation failure? a) Failure to include affected employees in planning b) The complexity of the planning c) Lack of documentation d) Insufficient training e) No change management processes Answer: c Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Medium

82) A __________ report summarizes the performance of critical activities. a) comparative b) drill-down c) key indicator d) summary Answer: c Learning Objective: Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference: 10.4 Reports Difficulty: Easy

83) _____ reports contain special information not found in routine reports. a) Ad hoc b) Summary c) Drill-down d) Key-indicator e) Exception


Information System, Third Canadian Edition

Rainer

Answer: a Learning Objective: Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference: 10.4 Reports Difficulty: Easy

84) __________ reports allow users to click on an item in a report and to be able to access underlying details about that item. a) Comparative b) Detailed c) Drill-down d) Summary Answer: c Learning Objective: Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference: 10.4 Reports Difficulty: Easy

85) _____ reports are produced at scheduled intervals. a) Ad hoc b) Routine c) Exception d) Detailed e) Key indicator Answer: b Learning Objective: Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference: 10.4 Reports Difficulty: Easy

86) __________ reports include only information that falls outside certain threshold standards. a) Comparative b) Exception c) Key indicator d) Summary Answer: b


Information System, Third Canadian Edition

Rainer

Learning Objective: Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference: 10.4 Reports Difficulty: Easy

87) _____ reports summarize the performance of critical activities. a) Ad hoc b) Routine c) Exception d) Detailed e) Key indicator Answer: e Learning Objective: Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference: 10.4 Reports Difficulty: Easy

88) Kathy has taken a job with her ideal company and is excited to start in their sales department. During orientation, she is told that the company is very proud of their ERP system from SAP. Looking at the list of modules the company has, Kathy wonders which one she won’t be using. From the list below, which one would you tell Kathy is the one she won’t be using. a) Customer relationship management b) Human resource management c) Business intelligence d) Operations management e) E-Business Answer: d Learning Objective: Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference: 10.4 Reports Difficulty: Easy

89) When the chief financial officer of a company wants a report on business units who have spent 10 percent more than their allotted budget, she would be requesting which type of report? a) Ad hoc b) Routine c) Exception


Information System, Third Canadian Edition

Rainer

d) Detailed e) Key indicator Answer: c Learning Objective: Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference: 10.4 Reports Difficulty: Medium

90) _____ reports include only information that falls outside certain threshold standards. a) Ad hoc b) Routine c) Exception d) Detailed e) Key indicator Answer: c Learning Objective: Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference: 10.4 Reports Difficulty: Easy

91) Which of the following is NOT an ad hoc report? a) Comparative report b) Drill-down report c) Key-indicator report d) Monthly report Answer: d Learning Objective: Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference: 10.4 Reports Difficulty: Easy

92) To effectively manage by exception (i.e., use exception reports), the company must first create: a) Performance standards b) Best practices c) User information requirements d) A database


Information System, Third Canadian Edition

Rainer

e) Employee evaluation guides Answer: a Learning Objective: Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference: 10.4 Reports Difficulty: Easy

93) Greg is mowing lawns in the neighborhood for the summer. Which type of report would he used to see which of his clients still owe him money? a) Ad hoc b) Summary c) Exception d) Detailed e) Key indicator Answer: c Learning Objective: Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference: 10.4 Reports Difficulty: Easy

94) Greg is mowing lawns in the neighborhood for the summer. Which type of report would he used to see which if a particular client still owe him money? a) Ad hoc b) Routine c) Exception d) Detailed e) Key indicator Answer: a Learning Objective: Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference: 10.4 Reports Difficulty: Easy

95) Pizza Pizza allowed customers to design their own pizzas via iPhone to: a) Increase sales b) Decrease costs


Information System, Third Canadian Edition

Rainer

c) Increase costs d) A and b e) A and c Answer: d Learning Objective: Provide a real-world application of an information system within an organization. Section Reference: IT’s About Small Business: Pizza Pizza’s Customer App Difficulty: Easy

96) Which of the following is false regarding SAP at Airgas? a) Airgas saw economic benefits during the conversion process. b) The project will be over its projected cost budget. c) Airgas switched over its supply chain operations to SAP first. d) Airgas used subject-matter experts to identify required functionality in their SAP system. e) Airgas implemented SAP without the help of consultants. Answer: e Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: IT’s About Business: 10.2 SAP at Airgas Difficulty: Medium

97) Which of the following is true? a) Implementing an ERP system will maintain a competitive advantage. b) Implementing an ERP system will allow a company to operate faster than their competition. c) The IT costs of an ERP implementation goes down over time. d) Customizing an ERP system is permitted. e) The benefits of an ERP implementation go down over time. Answer: d Learning Objective: Summarize the fundamental concepts and skills related to the roles and functions of information systems within organizations. Section Reference: Closing Case: Difficulties in Managing Enterprise Resource Planning Systems Difficulty: Medium

98) Kennametal’s main problem with its ERP installation was _________. a) it cost too much b) it couldn’t upgrade the ERP system c) it made their business processes less efficient


Information System, Third Canadian Edition

Rainer

d) all of the above were problems Kennametal experienced Answer: b Learning Objective: Summarize the fundamental concepts and skills related to the roles and functions of information systems within organizations. Section Reference: Closing Case: Difficulties in Managing Enterprise Resource Planning Systems Difficulty: Easy

Question Type: Essay

99) Differentiate between transaction processing systems and functional area information systems. Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems and Functional Area Information Systems Difficulty: Medium

100) Differentiate between batch processing and online transaction processing. Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Medium

101) Greg is mowing lawns in the neighborhood for the summer. How could he use source data automation to make data entry easier? Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Medium

102) Explain how information systems for accounting and finance support an organization. Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Medium

103) Explain how information systems for production operations management support an organization.


Information System, Third Canadian Edition

Rainer

Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Medium

104) Explain how information systems for human resource management support an organization. Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Medium

105) Explain how information systems for marketing and sales support an organization. Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Medium

106) Define enterprise resource planning systems and discuss why they were developed. Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Medium

107) Describe the various reports that can be obtained from functional area information systems. Learning Objective: Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference: 10.4 Reports Difficulty: Medium

108) Contrast routine reports and drill-down reports. Learning Objective: Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference: 10.4 Reports Difficulty: Easy

109) Define source data automation and describe why this process is so important to transaction processing systems.


Information System, Third Canadian Edition

Rainer

Learning Objective: Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference: 10.1 Transaction Processing Systems Difficulty: Hard

110) Discuss why functional area information systems would have been built as silos. Explain the limitations of that approach. Learning Objective: Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference: 10.2 Functional Area Information Systems Difficulty: Medium

111) Discuss the reasons why ERP systems evolved and what organizations hope to gain by implementing them. Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Medium

112) Differentiate between ERP systems and ERP II systems. Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Medium

113) What are ad-hoc (on-demand) reports? Why does an organization need to be able to run ad-hoc reports? Learning Objective: Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference: 10.3 Enterprise Resource Planning Systems Difficulty: Easy


Information System, Third Canadian Edition

Rainer

Legal Notice Copyright © 2014 by John Wiley & Sons Canada, Ltd. or related companies. All rights reserved.

The data contained in these files are protected by copyright. This manual is furnished under licence and may be used only in accordance with the terms of such licence. The material provided herein may not be downloaded, reproduced, stored in a retrieval system, modified, made available on a network, used to create derivative works, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without the prior written permission of John Wiley & Sons Canada, Ltd.


Information System, Third Canadian Edition

Rainer Chapter 10 Business intelligence

Question Type: True/False

1) The goal of AQUA was to provide a “single version of the truth”. Answer: True Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

2) Unstructured problems are fuzzy, complex problems for which there are no cut-and-dried solutions. Answer: True Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

3) A manager’s primary function is strategic planning. Answer: False Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

4) Decision-making is harder now than it was 20 years ago. Answer: True Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Medium

5) The ratio between organizational inputs and outputs is an indication of the organization’s productivity. Answer: True


Information System, Third Canadian Edition

Rainer

Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

6) Modern information systems support all three managerial roles. Answer: True Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

7) In the choice phase of the decision-making process, managers construct a model that simplifies the problem. Answer: False Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

8) In the implementation phase of the decision-making process, managers set criteria for the evaluation of alternative potential solutions. Answer: False Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

9) The number of alternatives to be considered in decisions today is increasing. Answer: True Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

10) Structured decisions address routine, repetitive problems for which standard solutions exist. Answer: True


Information System, Third Canadian Edition

Rainer

Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

11) Human intuition often plays a role in making unstructured decisions. Answer: True Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

12) Unstructured decisions require a combination of standard solution procedures and individual judgment. Answer: False Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

13) Management control is the acquisition and efficient use of resources in accomplishing organizational tasks. Answer: True Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

14) The use of BI is limited to large corporations. Answer: False Learning Objective: Describe and provide examples of the three different ways that organizations use BI. Section Reference: 10.2 What Is Business Intelligence? Difficulty: Easy

15) Business intelligence (BI) is a broad category of applications, technologies, and processes for gathering, storing, accessing, and analyzing data to help business users make better decisions. Answer: True


Information System, Third Canadian Edition

Rainer

Learning Objective: Describe and provide examples of the three different ways that organizations use BI. Section Reference: What is Business Intelligence? Difficulty: Easy

16) BI only works in large organizations. Answer: False Learning Objective: Describe and provide examples of the three different ways that organizations use BI. Section Reference: What is Business Intelligence? Difficulty: Easy

17) BI can be used to transform the entire business. Answer: True Learning Objective: Describe and provide examples of the three different ways that organizations use BI. Section Reference: What is Business Intelligence? Difficulty: Medium

18) NC State analyzed their structured Web data to reduce their triage process. Answer: False Learning Objective: Describe and provide examples of the three different ways that organizations use BI. Section Reference: IT’s About Business: North Carolina State University Uses Business Analytics to Monetize Intellectual Property Difficulty: Hard

19) Targeted marketing is a good example of the discovery of previously unknown or hidden patterns. Answer: False Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Easy

20) Decision-support systems support only lower- and middle-level managers. Answer: False Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis


Information System, Third Canadian Edition

Rainer

Difficulty: Easy

21) Goal-seeking analysis attempts to find the value of the inputs necessary to achieve a desired level of output. Answer: True Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Easy

22) With goal-seeking analysis, you have to know what you want as a result. Answer: True Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

23) A group decision support system is an interactive, computer-based system that facilitates a group’s efforts to find solutions to semistructured and unstructured problems. Answer: True Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Easy

24) Reality mining allows analysts to extract information from social networking sites. Answer: False Learning Objective: Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference: 10.4 Business Intelligence Applications for Presenting Results Difficulty: Easy

25) CSFs are specific measures of KPIs. Answer: False Learning Objective: Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies.


Information System, Third Canadian Edition

Rainer

Section Reference: 10.4 Business Intelligence Applications for Presenting Results Difficulty: Hard

26) An executive dashboard is very user friendly, supported by graphics, provides exception reporting and drill down, and provides information related to critical success factors. Answer: True Learning Objective: Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference: 10.4 Business Intelligence Applications for Presenting Results Difficulty: Easy

27) Executive dashboards provide support primarily to analytical, quantitative types of decisions. Answer: False Learning Objective: Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference: 10.4 Business Intelligence Applications for Presenting Results Difficulty: Easy

28) Geographic Information Systems (GIS) are computer-based systems for capturing, integrating, manipulating, and displaying data using digitized maps. Answer: True Learning Objective: Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference: 10.4 Business Intelligence Applications for Presenting Results Difficulty: Easy

29) KPI stands for key process information. Answer: False Learning Objective: Describe corporate performance management, and provide an example of how your university could use CPM. Section Reference: 10.5 Business Intelligence in Action: Corporate Performance Management Difficulty: Easy

30) CSFs are qualitative while KPIs are quantitative. Answer: True


Information System, Third Canadian Edition

Rainer

Learning Objective: Describe corporate performance management, and provide an example of how your university could use CPM. Section Reference: 10.5 Business Intelligence in Action: Corporate Performance Management Difficulty: Medium

31) Corporate performance management is involved with monitoring and managing an organization’s performance according to key performance indicators. Answer: True Learning Objective: Describe corporate performance management, and provide an example of how your university could use CPM. Section Reference: Business Intelligence in Action: Corporate Performance Management Difficulty: Easy

32) Corporate performance management (CPM) is involved with monitoring and managing an organization’s performance according to its budget. Answer: False

Learning Objective: Describe corporate performance management, and provide an example of how your university could use CPM. Section Reference: 10.5 Business Intelligence in Action: Corporate Performance Management Difficulty: Easy

33) Even though Norfolk Southern doesn’t have as much information to deal with as other companies, they’ve found a data warehouse has been most useful in their business. Answer: False Learning Objective: Summarize the fundamental concepts and skills related to business intelligence. Section Reference: Closing Case Difficulty: Easy

Question Type: Multiple Choice

34) Which of the following was NOT a problem Daimler AG’s had? a) Consistent information b) Information quality c) Information silos d) Lack of information Answer: d


Information System, Third Canadian Edition

Rainer

Learning Objective: Provide a real-world application of business intelligence. Section Reference: Opening Case Difficulty: Easy

35) _____ is the process by which organizational goals are achieved through the use of organizational resources. a) Organizational decision making b) Operations c) Organizational strategy d) Organizational productivity e) Management Answer: e Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

36) Which of the following is not a basic role of managers? a) Interpersonal b) Entrepreneurial c) Informational d) Decisional Answer: b Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

37) In the definition of management, the organization’s goals are considered _________. a) input b) process c) output d) none of the above Answer: c Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Medium


Information System, Third Canadian Edition

Rainer

38) A monitor is an example of which managerial role? a) Decisional b) Informational c) Interpersonal d) Management Answer: b Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

39) Decision makers construct a model for the situation in the ______ stage of the decision-making process. a) Choice b) Design c) Implementation d) Intelligence Answer: b Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

40) _______ control involves decisions concerning acquiring and using resources efficiently in accomplishing organizational goals. a) Management b) Operational c) Organizational d) Strategic planning Answer: a Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

41) Being a figurehead and leader is part of the _____ managerial role.


Information System, Third Canadian Edition

Rainer

a) interpersonal b) entrepreneurial c) informational d) decisional e) confrontational Answer: a Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference:: 10.1 Managers and Decision Making Difficulty: Easy

42) Being an entrepreneur, disturbance handler, and negotiator is part of the _____ managerial role. a) interpersonal b) entrepreneurial c) informational d) decisional e) confrontational Answer: d Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

43) In the _____ phase of the decision-making process, managers examine a situation and identify and define the problem. a) implementation b) choice c) design d) intelligence e) consideration Answer: d Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

44) In the _____ phase of the decision-making process, managers construct a model that simplifies the problem. a) implementation


Information System, Third Canadian Edition

Rainer

b) choice c) design d) intelligence e) consideration Answer: c Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

45) Success in the _____ phase of the decision-making process results in resolving the original problem, and failure leads to a return to previous phases. a) implementation b) choice c) design d) intelligence e) consideration Answer: a Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

46) In the _____ phase of the decision-making process, managers test potential solutions “on paper.” a) implementation b) choice c) design d) intelligence e) consideration Answer: b Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

47) Which of the following is not a reason why managers need IT support? a) The number of alternatives is decreasing. b) Decisions must typically be made under time pressure.


Information System, Third Canadian Edition

Rainer

c) Decisions are becoming more complex. d) There is a growing need to access remote information sources. e) Decision makers are often based in different locations. Answer: a Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

48) Decisions today are becoming _____ complex, due to _____ uncertainty in the decision environment. a) less, decreased b) more, decreased c) less, increased d) more, increased e) neither more nor less, decreased Answer: d Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Medium

49) Which of the following is not a characteristic of a structured decision? a) It is routine. b) It is repetitive. c) Human intuition is not involved. d) The first three phases of the decision-making process need not occur in any particular sequence e) Standard solutions exist. Answer: d Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Medium

50) The type of decision that can be made by following a definite procedure is called a(n) ______ decision. a) structured b) unstructured c) undocumented d) semistructured


Information System, Third Canadian Edition

Rainer

e) procedural Answer: a Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

51) ________ decisions are more common at lower organizational levels. a) Structured b) Unstructured c) Undocumented d) Semistructured e) Procedural Answer: a Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

52) Rank-and-file employees tend to make more _________ decisions. a) Structured b) Unstructured c) Undocumented d) Semistructured e) Procedural Answer: a Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

53) Calculating gross pay for hourly workers is an example of ________ decision making. a) Structured b) Unstructured c) Undocumented d) Semistructured e) Procedural


Information System, Third Canadian Edition

Rainer

Answer: a Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

54) Which of the following is not a characteristic of unstructured decisions? a) They are complex. b) They typically are fuzzy and unclear. c) Standard solutions exist. d) Human intuition is involved. e) The first three phases of the decision-making process occur in no particular sequence. Answer: c Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Medium

55) When there is no well-understood or agreed-on procedure for making a decision, the decision is said to be: a) undocumented b) structured c) unstructured d) semistructured e) documented Answer: c Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

56) A large foreign automobile manufacturer is considering where to build a new manufacturing plant in the United States. They are making which type of decision? a) structured b) semistructured c) unstructured d) informational e) wisdom Answer: c


Information System, Third Canadian Edition

Rainer

Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Medium

57) Which type of decision requires a combination of standard solution procedures and individual judgment? a) structured b) semistructured c) unstructured d) informational e) wisdom Answer: b Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

58) A company’s annual employee evaluation best fits which type of decision? a) unstructured b) structured c) semistructured d) confrontational e) wisdom Answer: c Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Medium

59) _____ is the efficient and effective execution of specific tasks. a) Operational control b) Management control c) Strategic planning d) Expertise e) Wisdom Answer: a


Information System, Third Canadian Edition

Rainer

Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

60) _____ is the acquisition and efficient use of resources in accomplishing organizational goals. a) Operational control b) Management control c) Strategic planning d) Expertise e) Wisdom Answer: b Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

61) Computer support is greatest for which of the following problems? a) semistructured and strategic planning b) unstructured and operational control c) structured and operational control d) semistructured and management control e) structured and management control Answer: c Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

62) Computer support is least for which of the following problems? a) Semistructured and strategic planning b) Unstructured and strategic planning c) Semistructured and management control d) Unstructured and operational control e) Structured and strategic planning Answer: b Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making.


Information System, Third Canadian Edition

Rainer

Section Reference: 10.1 Managers and Decision Making Difficulty: Easy

63) Elena is trying to decide whether she should expand her ice cream shop to a bigger space. She decides to be very methodical about it and follow the phases of the decision-making process she learned in college. Which of the following statements is true? a) During the intelligence phrase, Elena will build a model using assumptions about the business. b) During the design phrase, Elena will define the opportunity. c) During the choice phase, Elena will lay out her options. d) During the implementation phase, Elena will implement two of her solutions. e) Elena will use test data to validate her model. Answer: e Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Medium

64) _________ is an independent application for a specific functional area. a) Business intelligence b) A data mart c) An enterprise data warehouse d) An ERP Answer: b Learning Objective: Describe and provide examples of the three different ways that organizations use BI. Section Reference: 10.2 What is Business Intelligence? Difficulty: Medium

65) Which of the following was NOT a way NC State used IBM’s “Big Data” analytics technology? a) Analyze its web pages b) Establish new business opportunities c) Market more effectively to potential partners d) Reduce the size of its faculty Answer: d Learning Objective: Describe and provide examples of the three different ways that organizations use BI. Section Reference: IT’s About Business: North Carolina State University Uses Business Analytics to Monetize Intellectual Property Difficulty: Medium


Information System, Third Canadian Edition

Rainer

66) Adelaid Brighton Cement installed a _________ system to address its problems. a) BI b) CRM c) ERP d) SCM Answer: a Learning Objective: Describe and provide examples of the three different ways that organizations use BI. Section Reference: IT’s About Small Business: Adelaide Brighton Cement Difficulty: Easy

67) For Adelaid Brighton Cement, installing a(n) _________ system was cheaper than a(n) ____________ system. a) BI, ERP b) BI, SCM c) ERP, BI d) ERP, SCM Answer: a Learning Objective: Describe and provide examples of the three different ways that organizations use BI. Section Reference: IT’s About Small Business: Adelaide Brighton Cement Difficulty: Medium 68) Searching for valuable business information in a database, data warehouse, or data mart is referred to as _____. a) structured queries b) database queries c) data mining d) query by example e) expert system queries Answer: c Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Easy

69) _____ provides users with a view of what is happening, whereas _____ addresses why it is happening. a) Multidimensional data analysis, structured query language b) Data mining, multidimensional data analysis


Information System, Third Canadian Edition

Rainer

c) Data mining, expert system d) Multidimensional data analysis, neural networks e) Multidimensional data analysis, data mining Answer: e Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

70) Credit card companies would most likely use which of the following to check for fraudulent credit card use? a) Data mining b) Expert systems c) Neural networks d) Multidimensional data analysis e) Structured query language Answer: a Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

71) A company wants to use data from past promotional mailings to identify people who would likely respond favorably to future mailings. This company would most likely use: a) Structured query language b) Multidimensional data analysis c) Neural networks d) Expert systems e) Data mining Answer: e Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

72) _________ involves “slicing and dicing” data stored in a dimensional format, drilling down in the data to greater detail, and aggregating the data. a) ERP b) OLAP


Information System, Third Canadian Edition

Rainer

c) OLTP d) XML Answer: b Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Easy

73) _________ identifies what happened whereas ________ explains why. a) BI, data mining b) BI, data warehousing c) Data mining, BI d) Data warehousing, BI Answer: a Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

74) __________ analysis is the study of the impact of a change in the assumptions on the proposed solution. a) Assumption b) Goal-seeking c) Sensitivity d) What-if Answer: d Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Easy

75) The goal of ________ analysis is to see what you can get by changing some criteria. a) assumption b) goal-seeking c) sensitivity d) what-if Answer: c


Information System, Third Canadian Edition

Rainer

Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Hard

76) Which of the following is not a characteristic of DSSs? a) They support only lower- and middle-level managers. b) They are easy to use and construct. c) They can adapt to changing conditions. d) They usually utilize quantitative models. e) They support all phases of the decision-making process. Answer: a Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

77) At the end of a semester, a student knows that she must achieve a grade of 81 or higher on her final exam to get an A in the course. She has just performed what kind of analysis? a) What-if b) Qualitative c) Sensitivity d) Goal-seeking e) Simulation Answer: d Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

78) _____ attempts to find the value of the inputs necessary to achieve a desired level of output. a) What-if analysis b) Qualitative analysis c) Sensitivity analysis d) Goal-seeking analysis e) Simulation Answer: d


Information System, Third Canadian Edition

Rainer

Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Easy

79) Which of the following is not a characteristic of organizational decision support systems? a) They affect multiple organizational units or corporate issues. b) They cut across organizational functions or hierarchical layers. c) They involve computer-based technologies. d) They are standalone systems. e) They involve communications technologies. Answer: d Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

80) You’ve started an internship at the major hospital in your city. Your boss gave you ten minutes of training on the data warehouse that you have access to. The last thing she told you was to do some analysis on the Visit cube. Which of the following statements is false? a) One dimension of the cube is (probably) day. b) One dimension of the cube is (probably) treatment. c) One dimension of the cube is (probably) doctor. d) One dimension of the cube is (probably) month. e) One dimension of the cube is (probably) patient. Answer: d Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

81) Sally is working for her uncle for the summer in the marketing department of Proctor & Gamble. She tells you she does data mining all day long. Which of the following statements is false? a) Data mining can be used to prove assumptions. b) Data mining is used to identify unknown patterns. c) Data mining can explain why things happened. d) Data mining can predict what will happen. e) Data mining can be used to identify customers. Answer: e


Information System, Third Canadian Edition

Rainer

Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

82) Shawn is doing some budgeting for his new start-up business. He has developed a budget in Excel using formulas, as he was taught to do in college. Which of the following statements is true? a) If Shawn changes one of his assumptions, Excel will automatically recalculate the budget numbers. b) Shawn would use sensitivity analysis to check the impact of changing his price. c) Shawn would use roll-up to review his summary numbers. d) Shawn would use what-if analysis to check the impact of changing his price and the commission he pays his sales people. e) Shawn would use goal-seeking analysis to examine the impact of changing his forecast of units sold. Answer: a Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Medium 83) A(n) _____ provides rapid access to timely information and direct access to management reports. a) decision support system b) expert system c) neural network d) digital dashboard e) data warehouse Answer: d Learning Objective: Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference: 10.4 Business Intelligence Applications for Presenting Results Difficulty: Easy

84) Dashboards are typically targeted at _________. a) middle managers b) operational managers c) tactical managers d) top executives Answer: d


Information System, Third Canadian Edition

Rainer

Learning Objective: Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference: 10.4 Business Intelligence Applications for Presenting Results Difficulty: Easy

85) ____________ is one feature of dashboards that enables users to get details, and details of details, of information. a) Consolidation b) Detailed c) Drill-down d) Status access Answer: c Learning Objective: Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference: 10.4 Business Intelligence Applications for Presenting Results Difficulty: Medium

86) Which capability of digital dashboards enables users to obtain the latest data available on key performance indicators or some other metric, ideally in real time? a) Drill-down b) Key performance indicators c) Status access d) Trend analysis e) Exception reporting Answer: c Learning Objective: Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference: 10.4 Business Intelligence Applications for Presenting Results Difficulty: Easy

87) Which of the following information systems are very user friendly, supported by graphics, and provide exception reporting and drill down? a) Decision support systems b) Digital dashboards c) Functional area information systems d) Group decision support systems e) Expert systems Answer: b


Information System, Third Canadian Edition

Rainer

Learning Objective: Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference: 10.4 Business Intelligence Applications for Presenting Results Difficulty: Easy

88) Digital dashboards provide all of the following capabilities except: a) Drill-down b) Transaction processing c) Status access d) Key performance indicators e) Exception reporting Answer: b Learning Objective: Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference: 10.4 Business Intelligence Applications for Presenting Results Difficulty: Medium

89) The management cockpit best exemplifies which type of system? a) Decision support system b) Expert system c) Digital dashboard d) Functional area information system e) Group decision support system Answer: c Learning Objective: Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference: 10.4 Business Intelligence Applications for Presenting Results Difficulty: Medium

90) The primary distinguishing characteristic of geographical information systems is: a) Every record or digital object has a unique identifier b) Every record or digital object is visible to the user c) Every record or digital object must be accessed by programmers d) Every record or digital object has an identified geographical location e) Every record or digital object is encrypted Answer: d Learning Objective: Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies.


Information System, Third Canadian Edition

Rainer

Section Reference: 10.4 Business Intelligence Applications for Presenting Results Difficulty: Medium

91) Geocoding involves: a) Integrating maps with spatially oriented databases and other databases b) Encrypting spatial information c) Accessing geographical information d) Integrating organizational transactions with spatially oriented databases e) Programming spatially oriented databases Answer: a Learning Objective: Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference: 10.4 Business Intelligence Applications for Presenting Results Difficulty: Medium

92) Today, geographical information systems are being combined with _____ to form geospatial technologies. a) dashboards b) global positioning systems c) decision support systems d) expert systems e) neural networks Answer: b Learning Objective: Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference: 10.4 Business Intelligence Applications for Presenting Results Difficulty: Medium

93) Amanda is working for the CEO of a small company. He asks her to develop a dashboard. Amanda starts thinking about the questions she needs to ask. Which of the following questions is not on Amanda’s list? a) How many levels do you wish to drill down? b) What are your key performance indicators? c) Do you need real-time data? d) Do you want graphs and charts or text? e) Should it run on your iPhone? Answer: c Learning Objective: Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference: 10.4 Business Intelligence Applications for Presenting Results


Information System, Third Canadian Edition

Rainer

Difficulty: Medium

94) Which of the following is an example of a CSF? a) Average customer spending b) Creating high quality products c) Number of product returns d) Turnover rates of employees Answer: b Learning Objective: Describe corporate performance management, and provide an example of how your university could use CPM. Section Reference: Business Intelligence in Action: Corporate Performance Management Difficulty: Easy

95) Which of the following is an example of a KPI? a) Create high-quality products b) Number of new customers c) Reduce product costs d) Retain competitive advantages Answer: b Learning Objective: Describe corporate performance management, and provide an example of how your university could use CPM. Section Reference: Business Intelligence in Action: Corporate Performance Management Difficulty: Easy

96) Norfolk Southern uses a(n) ______ to manage its data. a) business intelligence system b) data mart c) enterprise data warehouse d) ERP Answer: c Learning Objective: Summarize the fundamental concepts and skills related to business intelligence. Section Reference: Closing Case Difficulty: Medium

97) Which of the following best describes Daimler’s Quality Information System (QUIS)? a) Users didn’t have the right tools to access the data.


Information System, Third Canadian Edition

Rainer

b) Information was easily evaluated together. c) The platform had excess capacity. d) The data for diagnostics were not available. e) QUIS was used only by garages. Answer: a Learning Objective: Provide a real-world application of business intelligence. Section Reference: Opening Case: Quality Assurance at Daimler AG Difficulty: Medium

98) Adelaide Brighton Cement decided to use a hosted system called myDIALS for incident hazard and reporting. Which of the following is not a reason for their choice? a) The business intelligence application runs on Adelaide’s servers. b) The BI application runs on myDIALS servers. c) The hosted system involved minimal risk. d) The hosted system was less expensive than an ERP system. e) Implementing the hosted system required no modifications to Adelaide’s existing systems. Answer: a Learning Objective: Provide a real-world application of business intelligence. Section Reference: IT’s About Business: 10.1 Adelaide Brighton Cement Difficulty: Easy

99) Which of the following is not a by-product of Kelley Blue Book’s use of business intelligence data? a) Integrated their data with third-party data b) Improved the speed of estimates on their Web site c) Helped owners determine the best time to sell d) Enabled owners to forecast car prices e) Quicker turnaround to publish a new book. Answer: e Learning Objective: Describe and provide examples of the three different ways that organizations use BI. Section Reference: IT’s About Business: 10.2 Data Analytics Helps Kelley Blue Book Remain Competitive Difficulty: Easy

100) Norfolk Southern used a data warehouse to manage the information that is accessible via business intelligence tools. Which of the following statements about Norfolk Southern’s use of BI tools is not true? a) The data in the data warehouse can be used by all departments in the company. b) Norfolk Southern does not share its data with external customers. c) The data were used to determine where to locate field offices. d) The dashboard application uses visualization technology.


Information System, Third Canadian Edition

Rainer

e) The data for the data warehouse come from operational systems. Answer: b Learning Objective: Summarize the fundamental concepts and skills related to business intelligence. Section Reference: Closing Case: Norfolk Southern Difficulty: Medium

Question Type: Essay

101) Describe the three major roles of managers. Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Medium

102) Explain why managers need IT support. Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Medium

103) Discuss the information technologies that are available to support managers. Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Medium

104) Describe the phases in the decision-making process. Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Medium

105) Describe OLAP, and explain what a data cube is. Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Medium


Information System, Third Canadian Edition

Rainer

106) Explain data mining, using examples. Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

107) Explain how what-if analysis is employed, using examples. Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

108) Explain what data visualization technologies are, using examples. Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

109) Describe how your university could use a decision support system in its admissions process. Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Hard

110) Discuss the structure of problems, the nature of decisions, and the framework for computerized decision analysis. Learning Objective: Identify the phases in the decision-making process, and use a decision-support framework to demonstrate how technology supports managerial decision making. Section Reference: 10.1 Managers and Decision Making Difficulty: Medium

111) Describe how your university could use a geographical information system in its admissions process. What value could your university gain from using such a system? Learning Objective: Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference: 10.3 Business Intelligence Applications for Data Analysis Difficulty: Hard


Information System, Third Canadian Edition

Rainer

112) Speculate on the future of virtual reality applications in higher (college and university) education. Describe some possible applications. Learning Objective: Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference: 10.4 Business Intelligence Applications for Presenting Results Difficulty: Hard


Information System, Third Canadian Edition

Rainer

Legal Notice Copyright © 2014 by John Wiley & Sons Canada, Ltd. or related companies. All rights reserved.

The data contained in these files are protected by copyright. This manual is furnished under licence and may be used only in accordance with the terms of such licence. The material provided herein may not be downloaded, reproduced, stored in a retrieval system, modified, made available on a network, used to create derivative works, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without the prior written permission of John Wiley & Sons Canada, Ltd.


Information System, Third Canadian Edition

Rainer

Chapter 11 Acquiring Information Systems and Applications Question Type: True False

1) Organizations typically move slowly to acquire new information technologies due to the risks involved. Answer: False Learning Objective: Provide a real-world application related to acquiring an information system. Section Reference: Opening Case: GE Healthcare Switches from Systems Development Life 0Cycle to Agile Difficulty: Easy

2) The application portfolio in an organization is a set of recommended applications resulting from the planning and justification process in application development. Answer: True Learning Objective: Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference: 11.1 Planning for and Justifying IT Applications Difficulty: Easy

3) The IT infrastructure delineates the way an organization’s information resources should be used to accomplish its mission. Answer: False Learning Objective: Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference: 11.1 Planning for and Justifying IT Applications Difficulty: Easy

4) IT architecture focuses only on the technical aspects of information resources. Answer: False Learning Objective: Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference: 11.1 Planning for and Justifying IT Applications Difficulty: Medium


Information System, Third Canadian Edition

Rainer

5) The IS operational plan is a set of projects that will be executed by the IS department and by functional area managers. Answer: True Learning Objective: Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference: 11.1 Planning for and Justifying IT Applications Difficulty: Easy

6) Costs are harder to quantify than benefits. Answer: False Learning Objective: Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference: 11.1 Planning for and Justifying IT Applications Difficulty: Easy

7) The return on investment (ROI) method of cost-benefit analysis measures the effectiveness of management in generating profits with its available assets. Answer: True Learning Objective: Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference: 11.1 Planning for and Justifying IT Applications Difficulty: Easy

8) The buy option is particularly attractive if the software vendor allows the company to modify the package to meet its needs. Answer: True Learning Objective: Discuss the four business decisions that companies must make when they acquire new applications. Section Reference: 11.2 Strategies for Acquiring IT Applications Difficulty: Easy

9) Insourcing application development is usually less time consuming and less expensive than buying or leasing.


Information System, Third Canadian Edition

Rainer

Answer: False Learning Objective: Discuss the four business decisions that companies must make when they acquire new applications. Section Reference: 11.2 Strategies for Acquiring IT Applications Difficulty: Easy

10) Software rental is a method of delivering software in which a vendor hosts the applications and customers use them over a network, typically the Internet. Answer: False Learning Objective: Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference: 11.1 Planning for and Justifying IT Applications Difficulty: Easy

11) Open-source applications are basically the same as a proprietary application except for licensing, payment, and support. Answer: True Learning Objective: Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference: 11.1 Planning for and Justifying IT Applications Difficulty: Medium

12) The earlier in the development process that errors are detected, the less expensive they are to correct. Answer: True Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy 13) The SDLC is relatively inflexible. Answer: True Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy


Information System, Third Canadian Edition

Rainer

14) The SDLC encourages changes to user requirements once they have been established. Answer: False

Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy

15) Technical feasibility determines if the project is an acceptable financial risk and if the organization can afford the expense and time needed to complete the project. Answer: False Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy

16) Systems analysis describes how a system will solve the business problem, and systems design describes what the system must do to accomplish the task. Answer: False Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy

17) Adding functions after a project has been initiated is called scope creep. Answer: True Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy

18) In a direct conversion, the new system is turned on, and the old system is turned off at a later time. Answer: False


Information System, Third Canadian Edition

Rainer

Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy

19) Pilot conversion is the process in which the new system is introduced in one part of the organization. Answer: True Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy

20) Systems maintenance includes debugging and updating a system. Answer: True Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy

21) Maintenance ends when the new system is implemented and has run long enough for a systems audit. Answer: False Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy

22) Prototyping allows the users to clarify their information requirements as they use the prototype. Answer: True Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: 11.4 Alternative Methods and Tools for Systems Development Difficulty: Easy


Information System, Third Canadian Edition

Rainer

23) Joint application design is used to collect user requirements. Answer: True Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: 11.4 Alternative Methods and Tools for Systems Development Difficulty: Easy

24) With agile development, a company develops only what it needs right now to be successful. Answer: True Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: 11.4 Alternative Methods and Tools for Systems Development Difficulty: Medium

25) A key principle of the scrum approach for agile development is that users cannot change their minds during a project. Answer: False Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: 11.4 Alternative Methods and Tools for Systems Development Difficulty: Easy

26) Object-oriented development focuses on properties and operations. Answer: True Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: 11.4 Alternative Methods and Tools for Systems Development Difficulty: Medium

27) Outsourcing is the use of outside contractors or external organizations to acquire IT services.


Information System, Third Canadian Edition

Rainer

Answer: True Learning Objective: Analyze the process of vendor and soft ware selection. Section Reference: 11.5 Vendor and Software Selection Difficulty: Easy

28) The most difficult task in evaluating a vendor and a software package is to determine the vendor’s financial health and “staying power.” Answer: False Learning Objective: Analyze the process of vendor and soft ware selection. Section Reference: 11.5 Vendor and Software Selection Difficulty: Medium

29) A request for proposal (RFP) is sent to potential customers. Answer: False Learning Objective: Analyze the process of vendor and soft ware selection. Section Reference: 11.5 Vendor and Software Selection Difficulty: Easy

30) A service-level agreement (SLA) outlines how work is divided between the company and its vendors. Answer: True Learning Objective: Analyze the process of vendor and soft ware selection. Section Reference: 11.5 Vendor and Software Selection Difficulty: Medium

31) System development is easy if done properly. Answer: False Learning Objective: Provide a real-world application related to acquiring an information system. Section Reference: Opening Case Difficulty: Easy

32) Acquiring a new information system for a small organization is always a shorter process than for a large organization. Answer: False


Information System, Third Canadian Edition

Rainer

Learning Objective: Provide a real-world application related to acquiring an information system. Section Reference: IT’s About Small Business: Anniston Orthopaedics and Greenway Medical Technologies Difficulty: Medium

33) The IT architecture is an absolute constraint on future development efforts. Answer: False Learning Objective: Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference: Planning for and Justifying IT Applications Difficulty: Medium

34) Open-source software needs to be licensed, paid for, and supported just like proprietary software. Answer: False Learning Objective: Discuss the four business decisions that companies must make when they acquire new applications. Section Reference: Strategies for Acquiring IT Applications Difficulty: Easy

35) ICASE provides the link between upper CASE and lower CASE tools. Answer: True Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: Alternative Methods and Tools for Systems Development Difficulty: Easy

36) Prototyping and RAD are the same. Answer: False Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: Alternative Methods and Tools for Systems Development Difficulty: Medium


Information System, Third Canadian Edition

Rainer

37) You should always specific exactly what you are paying for when you are negotiating a contract with a vendor. Answer: True Learning Objective: Analyze the process of vendor and soft ware selection. Section Reference: Vendor and Software Selection Difficulty: Easy

38) The WestJet conversion to Sabre was successful while JetBlue’s was not. Answer: False Learning Objective: Summarize the fundamental concepts and skills related to acquiring information systems and applications. Section Reference: Closing Case Difficulty: Easy

Question Type: Multiple Choice

39) The information systems planning process proceeds in which order? a) Organization mission – organization strategic plan – IS strategic plan – new IT architecture b) Organization mission – IS strategic plan – organization strategic plan – IS operational plan c) Organization strategic plan – organization mission – IS strategic plan – new IT architecture d) IT architecture – IS strategic plan – organization strategic plan – organization mission e) IS development projects – IS operational plan – new IT architecture – organization mission Answer: a Learning Objective: Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference: 11.1 Planning for and Justifying IT Applications Difficulty: Medium

40) Which of the following is not a part of the typical IS operational plan? a) The mission of the IS function b) The organizational mission c) The IT architecture d) The application portfolio e) The IS function’s estimate of its goals


Information System, Third Canadian Edition

Rainer

Answer: b Learning Objective: Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference: 11.1 Planning for and Justifying IT Applications Difficulty: Easy

41) Evaluating the benefits of IT projects is more complex than evaluating their costs for all of the following reasons except: a) Benefits are harder than costs to quantify. b) Benefits tend to be more tangible than costs. c) IT can be used for several different purposes. d) The probability of obtaining a return from an IT investment is based on the probability of implementation success. e) The proposed system may be “cutting edge.” Answer: b Learning Objective: Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference: 11.1 Planning for and Justifying IT Applications Difficulty: Medium

42) A company’s IT application portfolio is a) A list of existing application the company owns. b) A list of applications that need to be updated. c) A list of applications that need to be removed. d) A list of applications that need to be replaced. e) A list of application to be added or modified. Answer: e Learning Objective: Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference: 11.1 Planning for and Justifying IT Applications Difficulty: Easy

43) A company’s IT architecture includes all of the following except: a) Hardware and software b) Networks c) Database management systems d) The members of the IT staff


Information System, Third Canadian Edition

Rainer

e) How IT decisions will be made Answer: d Learning Objective: Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference: 11.1 Planning for and Justifying IT Applications Difficulty: Easy

44) Which of the following statements about determining the costs and benefits of IT investments is false? a) Some costs are fixed. b) Costs do not end when the system is installed. c) Many IT projects end up being over budget. d) Benefits are hard to quantify because implementing new technology could be used for multiple purposes. e) Benefits are hard to quantify because they are tangible. Answer: e Learning Objective: Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference: 11.1 Planning for and Justifying IT Applications Difficulty: Medium

45) Which of the following is not an advantage of the buy option for acquiring IS applications? a) Few types of off-the-shelf software are available, thus limiting confusion. b) The software can be tried out. c) The buy option saves time. d) The company will know what it is getting. e) All of these Answer: a Learning Objective: Discuss the four business decisions that companies must make when they acquire new applications. Section Reference: 11.2 Strategies for Acquiring IT Applications Difficulty: Easy

46) Which of the following are disadvantages of the buy option for acquiring IS applications? a) The software may not exactly meet the company’s needs. b) The software may be impossible to modify.


Information System, Third Canadian Edition

Rainer

c) The company will not have control over software improvements. d) The software may not integrate with existing systems. e) All of these Answer: e Learning Objective: Discuss the four business decisions that companies must make when they acquire new applications. Section Reference: 11.2 Strategies for Acquiring IT Applications Difficulty: Easy

47) Which of the following systems acquisition methods saves the company’s time, enables the company to select software that has been used for similar problems in other organizations, and allows the company to try out the software? a) Systems development life cycle b) Prototyping c) End-user development d) Buy option e) Object-oriented development Answer: d Learning Objective: Discuss the four business decisions that companies must make when they acquire new applications. Section Reference: 11.2 Strategies for Acquiring IT Applications Difficulty: Easy

48) Which of the following systems acquisition methods can result in a company’s acquiring software that is controlled by another company, may be difficult to enhance or modify, and may not support the desired business processes? a) Systems development life cycle b) Prototyping c) End-user development d) Buy option e) Component-based development Answer: d Learning Objective: Discuss the four business decisions that companies must make when they acquire new applications. Section Reference: 11.2 Strategies for Acquiring IT Applications Difficulty: Easy


Information System, Third Canadian Edition

Rainer

49) Which of the following systems acquisition methods requires staff to systematically go through every step in the development process and has a lower probability of missing important user requirements? a) Systems development life cycle b) Prototyping c) End-user development d) External acquisition e) Object-oriented development Answer: a Learning Objective: Discuss the four business decisions that companies must make when they acquire new applications. Section Reference: 11.2 Strategies for Acquiring IT Applications Difficulty: Easy

50) Which of the following systems acquisition methods is time consuming, costly, and may produce excessive documentation? a) Systems development life cycle b) Prototyping c) End-user development d) External acquisition e) Object-oriented development Answer: a Learning Objective: Discuss the four business decisions that companies must make when they acquire new applications. Section Reference: 11.2 Strategies for Acquiring IT Applications Difficulty: Easy

51) _____ is a method of delivering software in which a vendor hosts the applications and customers access these applications over the Internet. a) Software-as-a-Service b) Prototyping c) Leasing the application d) Service-oriented architecture e) The buy option Answer: a Learning Objective: Discuss the four business decisions that companies must make when they acquire new applications.


Information System, Third Canadian Edition

Rainer

Section Reference: 11.2 Strategies for Acquiring IT Applications Difficulty: Easy

52) Which of the following statements is false? a) Companies that use Software-as-a-Service are running applications on the vendor’s hardware. b) Application service providers are similar to Software-as-a-Service providers. c) Companies that purchase open-source software cannot modify it. d) Outsourcing refers to acquiring IT applications from outside contractors. e) Insourcing refers to building IT applications in-house. Answer: c Learning Objective: Discuss the four business decisions that companies must make when they acquire new applications. Section Reference: 11.2 Strategies for Acquiring IT Applications Difficulty: Medium

53) Place the stages of the systems development life cycle in order: a) Investigation – analysis – design – programming/testing – implementation – operation/maintenance b) Investigation – design – analysis – programming/testing – implementation – operation/maintenance c) Analysis – design – investigation – operation/maintenance – programming/testing – implementation d) Investigation – analysis – design – programming/testing – operation/maintenance – implementation e) Investigation – implementation – analysis – programming/testing – design – operation/maintenance Answer: a Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy

54) The _____ that changes are made in the systems development life cycle, the _____ expensive these changes become. a) Sooner, less b) Later, less c) More frequently, more d) More extensively, more e) Sooner, more Answer: a


Information System, Third Canadian Edition

Rainer

Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Medium

55) _____ feasibility determines if the project is an acceptable financial risk and if the organization can afford the expense and time needed to complete the project. a) Technical b) Economic c) Organizational d) Behavioral e) Time Answer: b Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy

56) _____ feasibility addresses the human issues of an information systems project. a) Technical b) Economic c) Organizational d) Behavioral e) Time Answer: d Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy

57) _____ feasibility concerns a firm’s policies and politics, power structures, and business relationships. a) Technical b) Economic c) Organizational d) Behavioral e) Time Answer: c


Information System, Third Canadian Edition

Rainer

Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy

58) Which of the following is not a part of systems analysis? a) Defining the business problem b) Identifying the causes of, and solutions to, the business problem c) Identifying the information requirements that the solution must satisfy d) Identifying the technical specifications of the solution e) Gathering information about the existing system Answer: d Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy

59) In the traditional systems development life cycle, users: a) Are important and ongoing members of the development team throughout the life of the project. b) Are important only in the testing phases of the project. c) Have no input. d) Are important only in the maintenance phase of the project. e) Provide information requirements. Answer: e Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Medium

60) The deliverable of the systems design stage is: a) User requirements. b) Technical system specifications. c) The prototype. d) The source code. e) A working application. Answer: b


Information System, Third Canadian Edition

Rainer

Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy

61) Systems design answers the question, _____: a) How will the information system resolve the business problem? b) How much will the information system cost? c) What is the problem the information system must address? d) Who will benefit from use of the information system being developed? e) What is the effective operational life of the system? Answer: a Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Medium

62) When users ask for added functionality during a systems development project, this is called: a) User-defined software. b) Scope creep. c) Bloatware. d) An out-of-control project. e) A runaway project. Answer: b Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy

63) Which of the following statements about scope creep is true? a) Scope creep is relatively cheap, regardless of when it occurs in a project. b) Because scope creep is relatively cheap, successful project managers allow it. c) Because scope creep is expensive, successful project managers will not allow it. d) Because scope creep is expensive, successful project managers limit it. e) Scope creep means that user requirements are being successfully taken care of. Answer: d


Information System, Third Canadian Edition

Rainer

Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Medium

64) In the _____ stage of the systems development life cycle, the design specifications are translated into computer code. a) Systems analysis b) Programming c) Systems design d) Prototyping e) Feasibility study Answer: b Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy

65) ________ conversion is the riskiest type of conversion process. a) Parallel b) Direct c) Pilot d) Phased e) They all have equal risk. Answer: b Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy

66) A firm shuts down its old COBOL legacy system and immediately starts up its new PeopleSoft ERP system. This process is called __________ conversion. a) Phased b) Direct c) Parallel d) Pilot e) Timely


Information System, Third Canadian Edition

Rainer

Answer: b Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy

67) A firm implements a new information system in one of its plants, assesses the new system’s performance, and then implements the new system in its other plants. This is an example of __________ conversion. a) Phased b) Direct c) Parallel d) Pilot e) Timely Answer: d Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy

68) As systems age, maintenance costs _____. a) Decrease b) Increase c) Remain the same d) Are negligible e) Are not considered Answer: b Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Easy

69) Which of the following systems acquisition methods helps clarify user requirements, promotes genuine user participation, and may produce part of the final system? a) Systems development life cycle b) Prototyping


Information System, Third Canadian Edition

Rainer

c) End-user development d) External acquisition e) Component-based development Answer: b Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: 11.4 Alternative Methods and Tools for Systems Development Difficulty: Easy

70) Which of the following systems acquisition methods may encourage inadequate problem analysis, is not practical with large numbers of users, and may result in a company’s purchasing a lower-quality system? a) Systems development life cycle b) Prototyping c) End-user development d) External acquisition e) Component-based development Answer: b Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: 11.4 Alternative Methods and Tools for Systems Development Difficulty: Easy

71) When systems are created rapidly, without a formal development methodology: a) End users can take over the work of MIS analysts. b) The organization quickly outgrows the new system. c) Hardware, software, and quality standards are less important. d) Testing and documentation may be inadequate. e) The organization saves money. Answer: d Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: 11.4 Alternative Methods and Tools for Systems Development Difficulty: Medium


Information System, Third Canadian Edition

Rainer

72) As an MIS analyst, you have decided to use a prototyping methodology for a small, Web-based design project. What is the order of steps that you will follow in the project? a) Develop the prototype; use the prototype; revise and enhance the prototype. b) Identify user requirements; develop the prototype; use the prototype; revise and enhance the prototype. c) Develop the prototype; identify user requirements; use the prototype; revise and enhance the prototype. d) Identify user requirements; develop solutions; select the best prototype; implement the prototype. e) Identify user requirements; develop the prototype; revise and enhance the prototype. Answer: b Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: 11.4 Alternative Methods and Tools for Systems Development Difficulty: Medium

73) The _____ approach to systems development is a group-based tool for collecting user requirements. a) Integrated computer-assisted software engineering b) Joint application design c) Rapid application development d) Prototyping e) Systems development life cycle Answer: b Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: 11.4 Alternative Methods and Tools for Systems Development Difficulty: Easy

74) Which of the following is not an advantage of the joint application design approach to systems development? a) It involves fewer users in the development process. b) It saves time. c) It results in greater user acceptance of the new system. d) It can produce a higher-quality system. e) It provides for greater user participation in the definition of the requirements. Answer: a


Information System, Third Canadian Edition

Rainer

Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: 11.4 Alternative Methods and Tools for Systems Development Difficulty: Easy

75) Agile development a) Takes a long time. b) Requires little user input. c) Delivers functionality in rapid interactions. d) Focuses on all required functionality at each step of the way. e) Uses the scrum approach to design the system. Answer: c Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: 11.4 Alternative Methods and Tools for Systems Development Difficulty: Medium

76) _____ is a software development methodology that delivers functionality in rapid iterations, usually measured in weeks. a) Agile development b) Prototyping c) The systems development life cycle d) Joint application development e) Component-based development Answer: a Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: 11.4 Alternative Methods and Tools for Systems Development Difficulty: Easy

77) Object-oriented development a) Is similar to traditional development approaches. b) Focuses on the original task to be handled. c) Focuses on the processes that must be modeled to perform that task.


Information System, Third Canadian Edition

Rainer

d) Focuses on data. e) Identifies the subjects of the new system. Answer: c Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: 11.4 Alternative Methods and Tools for Systems Development Difficulty: Easy

78) Which of the following systems acquisition methods may eventually require maintenance assistance from the IT department, can produce inadequate documentation, and might result in a company’s acquiring a system with inadequate interfaces to existing systems? a) Systems development life cycle b) Prototyping c) End-user development d) External acquisition e) Component-based development Answer: c Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: 11.4 Alternative Methods and Tools for Systems Development Difficulty: Easy

79) Which of the following is the most difficult and crucial task in evaluating a vendor and a software package? a) Identifying potential vendors b) Determining the evaluation criteria c) Evaluating vendors and packages d) Choosing the vendor and package e) Negotiating a contract Answer: b Learning Objective: Analyze the process of vendor and soft ware selection. Section Reference: 11.5 Vendor and Software Selection Difficulty: Medium


Information System, Third Canadian Edition

Rainer

80) A _____ is sent to potential vendors inviting them to describe their product and how it would meet the firm’s needs. a) Prototype b) Request for proposal c) Technical specification d) Request for bid e) Request for requirements Answer: b Learning Objective: Analyze the process of vendor and soft ware selection. Section Reference: 11.5 Vendor and Software Selection Difficulty: Easy

81) _____ specify how work is to be divided between the company and its vendors. a) Service-level agreements b) Prototypes c) User requirements d) Vendor requirements e) Feasibility studies Answer: a Learning Objective: Analyze the process of vendor and soft ware selection. Section Reference: 11.5 Vendor and Software Selection Difficulty: Easy

82) Refer to Opening Case – GE Healthcare Switches from Waterfall to Agile: Which of the following statements concerning GE Healthcare’s Imaging Solutions’ experience with agile development is not true? a) Imaging Solution started with a cross-functional team and a pilot project. b) Because Imaging Solutions operates in a regulated industry, they needed to do more initial planning and testing than they initially thought necessary. c) They needed to identity cross-team dependencies early in the process. d) The development teams remained independent. e) Imaging Solutions had to transform its culture. Answer: d Learning Objective: Provide a real-world application related to acquiring an information system. Section Reference: Opening Case: GE Healthcare Switches from Systems Development Life Cycle to Agile Difficulty: Medium


Information System, Third Canadian Edition

Rainer

83) Refer to IT’s About Business 11.1 -- ShopMyClothes: High Fashion Sales What was the main reason for ShopMyClothes to acquire a new Information Systems? a) Company had high website development and maintenance costs b) Their present system was obsolete c) Competition had better information systems d) Current Information Systems was not able to integrate with suppliers’ systems e) Any of the above Answer: d Learning Objective: Provide a real-world application related to acquiring an information system. Section Reference: IT’s About Small Business: 11.1 ShopMyClothes: High Fashion Sales Difficulty: Medium

84) Refer to IT’s About Business 11.2 – A Disastrous Development Project: Hidden Costs t: Ontario Ministry of Health and Long-Term Care hired CGI to development of a diabetes registry, aimed at recording and tracking information about Ontarians with diabetes. This arrangement is called ____________. a) Insourcing b) Outsourcing c) Offshoring d) Hiring part-time employees e) SaaS Answer: b Learning Objective: Discuss the four business decisions that companies must make when they acquire new applications. Section Reference: IT’s About Business: 11.2 A Disastrous Development Project Difficulty: Medium

85) Refer IT’s About Business 11.3 – Presto Card Scope Creep and Cost Escalation: Which of the following statements concerning the contract Metrolinx with consultants Accenture? a) Metrolinx outsourced its entire IT function to Accenture. b) Accenture was to deploy new applications to improve services to Ontario residents. c) To develop and operate a magnetic stripe card fare payment system d) Many of the problems cited were network and telephone problems. e) Metrolinx did not provide very strong oversight of Accenture. Answer: c


Information System, Third Canadian Edition

Rainer

Learning Objective: Discuss the four business decisions that companies must make when they acquire new applications. Section Reference: IT’s About Business: 11.3 The State of Virginia’s Outsourcing Contract Proves Costly Difficulty: Medium

86) Refer to Closing Case – A tale of Two Software Upgrades: Both JetBlue and WestJet used which implementation approach when they implemented Sabre Holding’s reservation software? a) Pilot b) Piecemeal c) Direct d) Parallel e) Planned Answer: c Learning Objective: Summarize the fundamental concepts and skills related to acquiring information systems and applications. Section Reference: Closing Case: A Tale of Two Software Upgrades Difficulty: Medium

87) Jennifer is the owner of a start-up boutique that specializes in hard-to-find dress sizes for women. She has been keeping her financial books by using Excel and by hand. She thinks it’s time to buy an accounting package. What question does she need to answer first? a) How will the accounting package resolve my business problem? b) How much will the accounting package cost? c) What is the problem the accounting package must address? d) Who will benefit from the use of the accounting package? e) What is the effective operational life of the accounting package? Answer: c Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Medium

88) Jennifer is the owner of a start-up boutique that specializes in hard-to-find dress sizes for women. She has been keeping her financial books by using Excel and by hand. She researched available accounting packages for a business like hers and has decided on Boutique Accounting. What is the best way for Jennifer to implement Boutique Accounting? a) Pilot b) Piecemeal


Information System, Third Canadian Edition

Rainer

c) Direct d) Parallel e) Any one of these will be fine. Answer: c Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Medium

89) Anna works in the sales organization of a mid-size company. The company is evaluating whether it should replace its existing sales support system. At what stage of the SDLC should Anna expect to participate? a) Systems analysis b) Programming c) Systems design d) Prototyping e) Feasibility study Answer: a Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Medium

90) Ryan works for a small consulting company. They want to do a better job of tracking their clients and the jobs they have bid on and either won or lost. There are no processes in place right now, and all users (consultants and managers) have different ideas. What is the best systems development approach for Ryan’s company? a) SDLC b) Prototyping c) JAD d) Buy option e) Object-oriented development Answer: c Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: 11.4 Alternative Methods and Tools for Systems Development Difficulty: Medium


Information System, Third Canadian Edition

Rainer

91) Anna works in the sales organization of a mid-size company. The company decided to purchase Sales SME that is offered as a SaaS. What would you expect to see in a SLA with the vendors? a) Price of the software b) Upgrade prices for the software c) Whether the software can be changed by Anna’s company d) Availability guarantees e) Bug reporting process Answer: d Learning Objective: Discuss the four business decisions that companies must make when they acquire new applications. Section Reference: 11.2 Strategies for Acquiring IT Applications Difficulty: Medium

92) Which of the following was NOT a lesson learned from the GE Healthcare case? a) Early, frequent user input into the system development process is key. b) Organizations need the appropriate hardware to support new software. c) IT “makes or breaks” a company d) IT impacts competitive advantage Answer: c Learning Objective: Provide a real-world application related to acquiring an information system. Section Reference: Opening Case Difficulty: Easy

93) When making a decision to purchase software, what is the final stage? a) Looking at all the options b) Selecting a software provider c) Signing a contract d) Picking the hardware Answer: c Learning Objective: Provide a real-world application related to acquiring an information system. Section Reference: IT’s About Small Business: Anniston Orthopaedics and Greenway Medical Technologies Difficulty: Medium


Information System, Third Canadian Edition

Rainer

94) Which of the following is NOT one of the 3 objectives the IT strategic plan must meet to allow an organization to achieve its goals? a) Alignment with the strategic plan b) Clearly defined IT steering committee c) IS development resources allocated d) Seamless IT architecture Answer: b Learning Objective: LO 11.1 Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference: Planning for and Justifying IT Applications Difficulty: Easy

95) _______________ is the prioritized inventory of present applications and a detailed plan of projects to be developed or continued. a) Application portfolio b) Mission c) Objectives d) Resource allocation Answer: a Learning Objective: LO 11.1 Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference: Planning for and Justifying IT Applications Difficulty: Easy

96) The ___________ the ROI, the better. a) higher b) lower c) more even d) less even Answer: a Learning Objective: Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Difficulty: Easy Section Reference: Planning for and Justifying IT Applications

97) ___________ computer coding means the product is off-the-shelf.


Information System, Third Canadian Edition

Rainer

a) Custom b) Customized c) Developed d) Prewritten Answer: d Learning Objective: Discuss the four business decisions that companies must make when they acquire new applications. Section Reference: Strategies for Acquiring IT Applications Difficulty: Easy

98) Which of the following is NOT an advantage of buying software? a) Control b) Options c) Testing d) User group Answer: a Learning Objective: Discuss the four business decisions that companies must make when they acquire new applications. Section Reference: Strategies for Acquiring IT Applications Difficulty: Easy

99) ___________ involves relocating operations to places like India and China. a) Inshoring b) Nearshoring c) Offshoring d) Relocation Answer: c Learning Objective: Discuss the four business decisions that companies must make when they acquire new applications. Section Reference: Strategies for Acquiring IT Applications Difficulty: Easy

100) Which of the following was NOT a complaint Marin County had with its SAP implementation? a) Used to train young consultants b) Didn’t contractually stipulate the desired outcomes


Information System, Third Canadian Edition

Rainer

c) Didn’t test the system d) Paid money for a system that wouldn’t work Answer: b Learning Objective: Discuss the four business decisions that companies must make when they acquire new applications. Section Reference: IT’s About Business: A Disastrous Development Project Difficulty: Medium

101) Northrup Grumman’s main objective for the Virginia Commonwealth was: a) Backing up critical databases b) Controlling the IT infrastructure c) Creating a disaster recovery plan d) None of the above was ever an objective Answer: b Learning Objective: Discuss the four business decisions that companies must make when they acquire new applications. Section Reference: IT’s About Business: The State of Virginia’s Outsourcing Contract Proves Costly Difficulty: Medium

102) Which of the following is the correct order for the SDLC? a) System analysis, system investigation, system design, programming and testing, implementation, operation and maintenance b) System analysis, system investigation, system design, implementation, programming and testing, operation and maintenance c) System investigation, system analysis, system design, programming and testing, implementation, operation and maintenance d) System investigation, system analysis, system design, implementation, programming and testing, operation and maintenance Answer: c Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: The Traditional Systems Development Life Cycle Difficulty: Easy

103) _________ feasibility is the organization’s ability to access the proposed project. a) Behavioural


Information System, Third Canadian Edition

Rainer

b) Economic c) Organizational d) Technical Answer: c Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: The Traditional Systems Development Life Cycle Difficulty: Easy

104) ___________ involves the translation of a system’s design specification into computer code. a) Implementation b) Programming c) System design d) Testing Answer: b Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: The Traditional Systems Development Life Cycle Difficulty: Easy

105) ____________ conversion introduces components of the new system in stages, until the entire new system is operational. a) Direct b) Parallel c) Phased d) Pilot Answer: c Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: The Traditional Systems Development Life Cycle Difficulty: Easy

106) _________ conversion is the riskiest. a) Direct b) Parallel c) Phased


Information System, Third Canadian Edition

Rainer

d) Pilot Answer: a Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: The Traditional Systems Development Life Cycle Difficulty: Medium

107) _________ conversion is rarely used today if at all. a) Direct b) Parallel c) Phased d) Pilot Answer: b Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: The Traditional Systems Development Life Cycle Difficulty: Medium

108) _____________ conversion cuts off the old system when the new system is turned on. a) Direct b) Parallel c) Phased d) Pilot Answer: a Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: The Traditional Systems Development Life Cycle Difficulty: Easy

109) ____________ conversion introduces the new system in one part of the organization on a trial basis, when the new system is working properly, it is introduced in other parts of the organization. a) Direct b) Parallel c) Phased d) Pilot


Information System, Third Canadian Edition

Rainer

Answer: d Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: The Traditional Systems Development Life Cycle Difficulty: Easy

110) _________ continues throughout the life of the system. a) Debugging b) Implementation c) Maintenance d) Updating Answer: a Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: The Traditional Systems Development Life Cycle Difficulty: Medium

111) ___________ is an iterative approach to developing a system. a) Agile b) JAD c) RAD d) Scrum Answer: c Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: Alternative Methods and Tools for Systems Development Difficulty: Medium

112) ____________ involves a group meeting of all analysts and users who agree on system requirements. a) Agile b) JAD c) RAD d) Scrum Answer: b


Information System, Third Canadian Edition

Rainer

Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: Alternative Methods and Tools for Systems Development Difficulty: Easy

113) __________ involves systems the only include immediate needs and important items. a) Agile b) JAD c) RAD d) Scrum Answer: a Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: Alternative Methods and Tools for Systems Development Difficulty: Easy

114) The scrum approach involves _______-day sprints to create the potential final product. a) 1 b) 7 c) 15 d) 30 Answer: d Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: Alternative Methods and Tools for Systems Development Difficulty: Easy

115) The __________ represents the business users and any other stakeholders in the project. a) project owner b) scrum master c) scrum team d) scrum user Answer: a


Information System, Third Canadian Edition

Rainer

Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: Alternative Methods and Tools for Systems Development Difficulty: Easy

116) Which of the following is the correct order for vendor and software selection? 1 = choose the vendor and package 2 = determine the evaluation criteria 3 = establish an SLA 4 = evaluate vendors and packages 5 = identify potential vendors 6 = negotiate a contract a) 2, 5, 4, 1, 6, 3 b) 2, 4, 5, 1, 6, 3 c) 5, 2, 4, 1, 6, 3 d) 5, 4, 2, 1, 6, 3 Answer: c Learning Objective: Analyze the process of vendor and soft ware selection. Section Reference: Vendor and Software Selection Difficulty: Medium

117) ___________ is the first stage in selecting a vendor and software. a) Determining the evaluation criteria b) Establishing an SLA c) Evaluating vendors and packages d) Identify potential vendors Answer: d Learning Objective: Analyze the process of vendor and soft ware selection. Section Reference: Vendor and Software Selection Difficulty: Easy

118) An RFP occurs in the _____________ stage of vendor and software selection. a) choosing the vendor and package b) determining the evaluation criteria c) establishing an SLA d) negotiating a contract


Information System, Third Canadian Edition

Rainer

Answer: b Learning Objective: Analyze the process of vendor and soft ware selection. Section Reference: Vendor and Software Selection Difficulty: Easy

119) Which of the following was NOT a reason WestJet and JetBlue switched to the Sabre system? a) Cost b) Customer service c) Flight optimization d) Scheduling Answer: a Learning Objective: Summarize the fundamental concepts and skills related to acquiring information systems and applications. Section Reference: Closing Case Difficulty: Easy

Question Type: Essay

120) Differentiate between the IT strategic plan and the IS operational plan. Learning Objective: Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference: 11.1 Planning for and Justifying IT Applications Difficulty: Medium

121) Contrast the tangible and intangible benefits of a proposed information system. Learning Objective: Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference: 11.1 Planning for and Justifying IT Applications Difficulty: Medium

122) Why is it so hard to justify an information system? Learning Objective: Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference: 11.1 Planning for and Justifying IT Applications Difficulty: Medium


Information System, Third Canadian Edition

Rainer

123) Describe the feasibility study of the SDLC, and discuss why this study is so important. Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Medium

124) What are the outputs from each of the six steps in the SDLC? Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: 11.3 The Traditional Systems Development Life Cycle Difficulty: Medium

125) Contrast agile development and the SDLC. Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: 11.4 Alternative Methods and Tools for Systems Development Difficulty: Medium

126) Contrast component-based development and the SDLC. Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: 11.4 Alternative Methods and Tools for Systems Development Difficulty: Medium

127) Compare and contrast the various strategies for acquiring IT applications. Learning Objective: Discuss the four business decisions that companies must make when they acquire new applications. Section Reference: 11.2 Strategies for Acquiring IT Applications Difficulty: Hard

128) Compare and contrast rapid application development and joint application design.


Information System, Third Canadian Edition

Rainer

Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: 11.4 Alternative Methods and Tools for Systems Development Difficulty: Medium

129) What are application service providers, and how does using ASPs differ from outsourcing? Learning Objective: Analyze the process of vendor and soft ware selection. Section Reference: 11.5 Vendor and Software Selection Difficulty: Medium

130) How do application service providers differ from Software-as-a-Service vendors? Learning Objective: Analyze the process of vendor and soft ware selection. Section Reference: 11.5 Vendor and Software Selection Difficulty: Medium

131) Describe the vendor selection process for an information system. Learning Objective: Analyze the process of vendor and soft ware selection. Section Reference: 11.5 Vendor and Software Selection Difficulty: Medium

Question Type: Fill-in-the-Blank

132) The organizational strategic plan states the firm’s overall ___________, the goals that follow from that, and the broad steps necessary to reach these goals. Answer: mission Learning Objective: Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference: Planning for and Justifying IT Applications Difficulty: Medium

133) ______ is using the professional expertise within an organization to develop and maintain its IT systems. Answer: In-sourcing


Information System, Third Canadian Edition

Rainer

Learning Objective: Discuss the four business decisions that companies must make when they acquire new applications. Section Reference: Strategies for Acquiring IT Applications Difficulty: Easy

134) _______________ is caused by adding functions after the project has been initiated. Answer: Scope creep Learning Objective: Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference: The Traditional Systems Development Life Cycle Difficulty: Easy

135) ________ CASE tools in SDLC automate the early stages of the SDLC Answer: upper Learning Objective: Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference: Alternative Methods and Tools for Systems Development Difficulty: Easy

136) A ___________ is a document sent to potential vendors to submit a proposal describing their software package and explain how it would meet the company’s needs. Answer: Request for Proposal Learning Objective: Analyze the process of vendor and soft ware selection. Section Reference: Vendor and Software Selection Difficulty: Easy


Information System, Third Canadian Edition

Rainer

Legal Notice Copyright © 2014 by John Wiley & Sons Canada, Ltd. or related companies. All rights reserved.

The data contained in these files are protected by copyright. This manual is furnished under licence and may be used only in accordance with the terms of such licence. The material provided herein may not be downloaded, reproduced, stored in a retrieval system, modified, made available on a network, used to create derivative works, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without the prior written permission of John Wiley & Sons Canada, Ltd.


Information System, Third Canadian Edition

Rainer Chapter 12

Ethics and Privacy Question Type: True/False 1) WikiLeaks is illegal. Answer: False Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and

describe the four categories of ethical issues related to information technology. Section Reference: Opening Case Difficulty: Easy

2) Property issues involve the ownership and value of information. Answer: True Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Easy 3) An individual or organization faced with an ethical decision is basically considering whether to break the law. Answer: False Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Easy

4) A code of ethics is a collection of principles that are intended to guide decision making by members of the organization. Answer: True Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Easy


Information System, Third Canadian Edition

Rainer

5) If something is unethical, that means it is illegal. Answer: False Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Medium

6) Improvements in information technologies are leading to a decreasing number of ethical problems. Answer: False Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Easy

7) When you interview for a job at a company, it is likely that the company will Google you and search social networking sites for information on you. Answer: True Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Easy

8) The right of privacy is absolute. Answer: False Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Easy

9) Electronic surveillance of employees is legal. Answer: True Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Easy


Information System, Third Canadian Edition

Rainer

10) Determining whose laws should be followed is a problem related to the international aspects of privacy. Answer: True Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Easy

11) Facebook’s CEO believes privacy is no longer a social norm. Answer: True Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Easy

12) The individual’s right of privacy supersedes the public’s right to know. Answer: False Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Easy

13) In general, employees have high legal protection against surveillance by employers. Answer: False Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Easy

14) Privacy is the right to be left alone and to be free of unreasonable personal intrusions. Answer: True Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one


Information System, Third Canadian Edition

Rainer

potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Easy

15) The opt-out model of informed consent allows a company to collect personal information until the customers specifically requests otherwise. Answer: True Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Easy

16) The Platform for Privacy Preferences automatically communicates privacy policies between a commerce Web site and its visitors. Answer: True Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Easy

17) The flow of information among countries is called transborder data flows. Answer: True Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Easy

18) Terry Childs, an employee of the San Francisco IT department, was not a single point of failure. Answer: False Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and

describe the four categories of ethical issues related to information technology. Section Reference: Closing case Difficulty: Easy

Question Type: Multiple Choice


Information System, Third Canadian Edition

Rainer

19) The WikiLeaks case demonstrated _________________. a) the Internet has very little impact on government organizations b) how easy it is to capture huge amounts of company data c) that employees need to follow specific procedures for posting things online d) the Internet always has a positive influence on a company’s reputation Answer: b Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and

describe the four categories of ethical issues related to information technology. Section Reference: Opening Case Difficulty: Easy

20) The ____________ ethical standard states that an ethical action is the one that provides the most good or does the least harm. a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being Answer: d Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Medium

21) The ____________ ethical standard states that an ethical action is the one that best protects and respects the moral rights of the affected parties. a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being Answer: c Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues


Information System, Third Canadian Edition

Rainer

Difficulty: Medium

22) The _______________ approach maintains that the most ethical action is the one that provides the most good or does the least harm. a) Common good b) Fairness c) Rights d) Utilitarian Answer: d Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Easy 23) The _____________ ethical standard states that ethical actions treat all human beings equally. a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being Answer: b Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Easy

24) The _______________ ethical standard states that respect and compassion for all others is the basis for ethical actions. a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being Answer: a Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues


Information System, Third Canadian Edition

Rainer

Difficulty: Medium

25) Arguing that CEOs make 100 times more than their employees because they have to take more risk than lower-level employees is the ____________ approach. a) Common good b) Fairness c) Rights d) Utilitarian Answer: b Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Medium

26) Which of the following is not a step in ethical decision making? a) Recognize the ethical issue. b) Get the facts. c) Evaluate alternative actions. d) Make a decision and test it. e) All of these are steps in ethical decision making. Answer: e Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Medium

27) ____________ means that you accept the consequences of your decisions and actions. a) Accountability b) Due process c) Liability d) Responsibility Answer: d Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Easy


Information System, Third Canadian Edition

Rainer

28) Various organizations that promote fair and responsible use of information systems often develop a _____. a) Code of ethics b) Strategic plan c) Mission statement d) Responsibility charter e) Goals outline Answer: a Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Easy

29) The Sarbanes-Oxley Act in 2002 requires publicly held companies to implement ________ controls. a) ethical b) financial c) security d) technology Answer: b Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Easy

30) ____________ issues revolve around who should have access to information and whether they should have to pay for this access. a) Accessibility b) Accuracy a) c) Privacy d) Property Answer: a Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Easy


Information System, Third Canadian Edition

Rainer

31) Which of the following is NOT a drawback of photo tagging and geotagging: a) It is easier for everyone to gather information about you. b) You are forced to manually un-tag yourself. c) It is easier to lie about where you’ve been or what you’ve been doing. d) You may experience a certain lack of control over your information. Answer: c Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: IT’s About Business: Big Brother is Watching You Difficulty: Medium

32) Which of the following is NOT a benefit of photo tagging and geotagging: a) It is easier for police to track criminals. b) Criminals can be identified more quickly and accurately. c) Our purchase history can be tracked so that billboards are more customized. d) Digital sensors are more efficient so that home security is easier to implement. Answer: c Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: IT’s About Business: Big Brother is Watching You Difficulty: Medium

33) What is _____ is not necessarily _____. a) Illegal, unethical b) Ethical, illegal c) Unethical, illegal d) Unethical, legal e) Ethical, legal Answer: c Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Medium


Information System, Third Canadian Edition

Rainer

34) _____ issues involve collecting, storing, and disseminating information about individuals. a) Privacy b) Accuracy c) Transferability d) Property e) Accessibility Answer: a Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Easy

35) _____ issues involve the authenticity and fidelity of information that is collected and processed. a) Privacy b) Accuracy c) Transferability d) Property e) Accessibility Answer: b Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Easy

36) _____ issues involve who may obtain information and how much they should pay for this information. a) Privacy b) Accuracy c) Transferability d) Property e) Accessibility Answer: e Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Easy


Information System, Third Canadian Edition

Rainer

37) _____________ means accepting the consequences of your decisions and actions. a) Privacy b) Responsibility c) Transferability d) Accountability e) Liability Answer: b Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Easy

38) ______________ determines who is responsible for the actions taken. a) Privacy b) Responsibility c) Transferability d) Accountability e) Liability Answer: d Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Easy

39) Which of the following is not an ethical issue related to IT? a) Privacy b) Accuracy c) Accountability d) Property (such as intellectual property) e) Accessibility to information Answer: c Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Easy


Information System, Third Canadian Edition

Rainer

40) ______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. a) Privacy b) Responsibility c) Transferability d) Accountability e) Liability Answer: e Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Easy

41) Shelli runs a small boutique in Tel Aviv. She accepts credit cards and writes the number on her copy of the receipt in case there is a problem later. This practice involves which ethical issue related to IT? a) Privacy b) Accuracy c) Accountability d) Property (such as intellectual property) e) Accessibility to information Answer: a Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Medium

42) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. A new bakery business down the block wants to buy Shelli’s client list from her. If Shelli does sell the list, which ethical issue related to IT would be involved? a) Privacy b) Accuracy c) Accountability d) Property (such as intellectual property) Answer: a Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.


Information System, Third Canadian Edition

Rainer

Section Reference: 12.1 Ethical Issues Difficulty: Medium

43) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. She keeps all her client data on her laptop in a password-protected file. Her decision to protect the file reflects which ethical issue related to IT? a) Privacy b) Accuracy c) Accountability d) Property (such as intellectual property) e) Accessibility to information Answer: e Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Medium

44) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. Clients fill out a form to join her mailing list. Shelli indicates on the form that client information will not be shared without permission. This policy illustrates which ethical issue related to IT? a) Privacy b) Accuracy c) Accountability d) Property (such as intellectual property) e) Accessibility to information Answer: a Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Medium

45) Shelli runs a small boutique in Tel Aviv. Her intern just came to her with a new design for her Web site. Shelli really likes the design, and she informs the intern that he is quite the artist. Section ReferenceThe intern responds that he found the design on the Internet. Shelli replies that they can’t use it. Her decision reflects which ethical issue related to IT? a) Privacy b) Accuracy


Information System, Third Canadian Edition

Rainer

c) Accountability d) Property (such as intellectual property) e) Accessibility to information Answer: d Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Medium

46) Shelli runs a small boutique in Tel Aviv. Her intern was checking the boutique’s Facebook page and noticed some negative comments. He deleted them. At the end of the day, when they were closing up, he told Shelli about the comments and what he had done. Shelli was not pleased, and she told him so. Why wasn’t Shelli pleased? a) She didn’t like hearing anything negative about her store. b) People are free to say what they wish. c) She thought he should ask her before he deleted them. d) He wasn’t supposed to be checking Facebook. e) All of these are reasons for Shelli’s not being pleased. Answer: b Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Medium

47) Which of the following statements is correct? a) An individual’s right to privacy is absolute. b) Determining and enforcing privacy regulations can be difficult. c) An individual’s right to privacy supersedes the needs of society. d) Advances in information technologies have not affected individual privacy. e) The Internet has increased individuals’ privacy. Answer: b Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Medium

48) The public’s right to know is ___________ to the individual’s right of privacy.


Information System, Third Canadian Edition

Rainer

a) equal b) inferior c) superior d) undecided Answer: c Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Easy

49) Privacy rights apply to ______________. a) groups b) individuals c) institutions d) all of the above Answer: d Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Easy

50) _____________ is the tracking of people’s activities, online or offline, with the aid of computers. a) Computer spying b) Data aggregation c) Electronic surveillance d) Profiling Answer: c Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Easy

51) Customer intimacy is a __________ outcome of profiling. a) positive b) negative


Information System, Third Canadian Edition

Rainer

c) neutral d) inevitable Answer: a Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Medium

52) The __________ permits the company to collect personal information until the customer specifically requests that the data not be collected. a) opt-in model b) opt-out model c) government d) privacy code Answer: b Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Easy

53) Which of the following is a correct argument on the pros and cons of conveniently sharing information and protecting privacy? a) We have quick and easy access to our contacts on social networking sites, but it is much easier for stalking to occur. b) Protecting our privacy is difficult and complicated, even if securing our information makes us feel more comfortable with using the Internet. c) We need to be careful about what we post online, particularly since it may be difficult to ensure the security of our information on the Internet. d) All of the above are correct. Answer: d Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Medium

54) The process of profiling:


Information System, Third Canadian Edition

Rainer

a) Increases individual privacy. b) Decreases individual privacy. c) Has no effect on individual privacy. d) Is illegal in more than half of the states. e) Is legal but unethical. Answer: b Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Medium

55) What is the relationship between advances in information technology and the practice of profiling? a) Advances in IT make it more difficult to profile individuals. b) Advances in IT have no impact on profiling. c) Advances in IT make it more expensive to profile individuals. d) Advances in IT make it easier to profile individuals. Answer: d Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Medium

56) Which of the following statements is not correct? a) Employees have limited protection against surveillance by employers. b) The large majority of organizations monitor employee Internet usage. c) The large majority of organizations use URL filtering. d) As with normal first-class mail, employers cannot read employee e-mail. e) Employees should be aware that surveillance is legal. Answer: d Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Medium

57) How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other.


Information System, Third Canadian Edition

Rainer

a) The public, the individual b) The public, ethics c) Freedom of speech, privacy d) The individual, freedom of speech e) Ethics, security Answer: c Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Hard

58) Privacy advocates prefer which model of informed consent? a) Opt-in b) Opt-out c) Either A or B d) Neither A nor B Answer: a Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Easy

59) Which of the following statements is correct? a) International privacy and security laws are very consistent. b) Consistent international privacy and security laws help companies with their regulatory requirements from country to country. c) Consistent international privacy and security laws enable information to flow freely among countries. d) The absence of consistent international privacy and security laws has led to a complex global legal framework. e) Consistent international privacy and security laws are followed by all countries. Answer: d Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Medium


Information System, Third Canadian Edition

Rainer

60) Data aggregators sell digital dossiers to companies that want to know their customers better. This practice is called ________. a) Customer relationships b) Customer profiling c) Customer intimacy d) Customer knowledge e) Spying Answer: c Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Medium

61) Which of the following is false about WikiLeaks? a) Anyone can submit files to WikiLeaks. b) The most controversial expose involved the U.S. government. c) Governments and companies are using network forensics to identify intruders who break into systems. d) Because of WikiLeaks, governments and companies are trying to use data leak prevention software to prevent unauthorized downloads. e) WikiLeaks is legally protected in the U.S. because it is merely a conduit for the documents. Answer: c Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and

describe the four categories of ethical issues related to information technology. Section Reference: Opening Case: What to Do About WikiLeaks? Difficulty: Medium

62) Which of the following is false? a) Two employees talking about a customer’s account is an ethical issue. b) Employees talking to friends about peoples bank accounts is an ethical issue. c) Educating employees will solve the problems at the bank. d) ShaNiqua should have told the bank managers. e) Strong information technology security is not the solution. Answer: c Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: IT’s About Small Business: 12.1 MidTown Bank


Information System, Third Canadian Edition

Rainer

Difficulty: Medium

63) Is the use of privately collected data without a person’s knowledge unethical? Which of the following is not increasing the amount of collected data? a) Inexpensive database management software b) Inexpensive digital sensors c) Low-cost digital cameras d) Cell phones with cameras and GPS sensors e) Low cost of storing digital data Answer: a Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: IT’s About Business: 12.2 Big Brother Is Watching You Difficulty: Medium

64) Which of the following is false about photo tagging? a) Users must assign names to people in photos. b) People do not need to give permission to be tagged. c) Facial-recognition software can only look for similar facial features among the user’s photos. d) Facial-recognition software can look at videos as well as photos. e) There is no way a person can stop this. Answer: c Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: IT’s About Business: 12.2 Big Brother Is Watching You Difficulty: Medium

65) Which of the following is false about Facebook’s privacy polices? a) Facebook puts the responsibility of privacy in the hands of the user. b) Facebook as an “off switch” that lets users block all access to their information from third-party applications and Web sites. c) Facebook’s CEO feels that privacy is no longer a social norm. d) Facebook created new “buckets” that could be designated to groups of people. e) Facebook uses an Opt-in model. Answer: e Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one


Information System, Third Canadian Edition

Rainer

potential threat to the privacy of the data stored there. Section Reference: IT’s About Business: 12.3 Your Privacy on Facebook Difficulty: Medium

66) According to Terry Childs’s defense lawyer, his actions were justified because _______. a) he was the only one who knew the system b) he had access to his supervisor’s account c) he never used the data he downloaded d) he didn’t cause any damage to the system Answer: a Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and

describe the four categories of ethical issues related to information technology. Section Reference: Closing Case Difficulty: Hard

Question Type: Essay

67) Identify and analyze the fundamental ethical issues involved with information technology. Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Medium

68) Discuss the fundamental tenants of ethics: responsibility, accountability, and liability. Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Medium

69) Explain why something that is unethical might not necessarily be illegal. Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Medium

70) Discuss the two rules of privacy: The right of privacy is not absolute, and the public’s right to know


Information System, Third Canadian Edition

Rainer

supersedes the individual’s right to privacy. Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Medium

71) Compare and contrast the two informed consent models: opt-in and opt-out. Why do companies prefer one over the other? Why do privacy advocates prefer one over the other? Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Medium

72) Discuss the relationship between surveillance and privacy. Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Hard

73) Compare and contrast the four widely used stands for ethics: utilitarian, rights, fairness, and common good. Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference: 12.1 Ethical Issues Difficulty: Medium

74) Discuss the international aspects of privacy. How do these aspects impact transborder data flows? Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference: 12.2 Privacy Difficulty: Medium


Information System, Third Canadian Edition

Rainer

Legal Notice Copyright © 2014 by John Wiley & Sons Canada, Ltd. or related companies. All rights reserved.

The data contained in these files are protected by copyright. This manual is furnished under licence and may be used only in accordance with the terms of such licence. The material provided herein may not be downloaded, reproduced, stored in a retrieval system, modified, made available on a network, used to create derivative works, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without the prior written permission of John Wiley & Sons Canada, Ltd.


Information System, Third Canadian Edition

Rainer Chapter 13 Information Security

Question Type: True/False

1) Having one backup of your business data is sufficient for security purposes. Answer: False Learning Objective: Describe a real-world application of information security. Section Reference 1: IT’s About Business 13.1: Thomas Tax Service Difficulty: Easy

2) The security of each computer on the Internet is independent of the security of all other computers on the Internet. Answer: False Learning Objective: Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: 13.1 Introduction to Information Security Difficulty: Easy

3) The computing skills necessary to be a hacker are decreasing. Answer: True Learning Objective: Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: 13.1 Introduction to Information Security Difficulty: Easy

4. Human errors cause more than half of the security-related problems in many organizations. Answer: True Learning Objective: Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference 1: 13.2 Unintentional Threats to Information Systems Difficulty: Easy

5) The higher the level of an employee in organization, the greater the threat that he or she poses to the organization. Answer: True Learning Objective: Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference 1: 13.2 Unintentional Threats to Information Systems Difficulty: Easy


Information System, Third Canadian Edition

Rainer

6) Dumpster diving is always illegal because it involves trespassing on private property. Answer: False Learning Objective: Discuss the nine types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

7) Software can be copyrighted. Answer: True Learning Objective: Discuss the nine types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

8) Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated. Answer: True Learning Objective: Discuss the nine types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

9) Zero-day attacks use deceptive e-mails to acquire sensitive personal information. Answer: False Learning Objective: Discuss the nine types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Medium

10) In most cases, cookies track your path through Web sites and are therefore invasions of your privacy. Answer: True Learning Objective: Discuss the nine types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

11) Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition (SCADA) systems to cause widespread physical damage. Answer: True


Information System, Third Canadian Edition

Rainer

Learning Objective: Discuss the nine types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

12) Supervisory control and data acquisition (SCADA) systems require human data input. Answer: False Learning Objective: Discuss the nine types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Medium

13) Cyberterrorism is usually carried out by nations. Answer: False Learning Objective: Discuss the nine types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

14) IT security is the responsibility of everyone in the organization. Answer: True Learning Objective: Define the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: 13.4 What Organizations Are Doing to Protect Information Resources Difficulty: Easy

15) Risk analysis involves determining whether security programs are working. Answer: False Learning Objective: Define the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: 13.4 What Organizations Are Doing to Protect Information Resources Difficulty: Medium

16) A password refers to “something the user is.” Answer: False Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls


Information System, Third Canadian Edition

Rainer

Difficulty: Easy

17) Organizations utilize layers of controls because they face so many diverse threats to information security. Answer: True Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Medium

18) Public-key encryption uses two different keys, one public and one private. Answer: True Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Medium

19) Voice recognition is an example of “something a user does” authentication. Answer: True Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Medium

20) Organizations use authentication to establish privileges to systems operations. Answer: True Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Medium

21) The area located between two firewalls within an organization is called the demilitarized zone. Answer: True Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Easy


Information System, Third Canadian Edition

Rainer

22) A VPN is a network within the organization. Answer: False Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Easy

23) A URL that begins with https rather than http indicates that the site transmits using an extra layer of security called transport layer security. Answer: True Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Easy 24) Backup plans are not always necessary. Answer: False Learning Objective: Describe a real-world application of information security. Section Reference: Opening Case Difficulty: Medium

25) Social engineers often impersonate legitimate employees. Answer: True Learning Objective: Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference: 13.2 Unintentional Threats to Information Systems Difficulty: Easy

26) Cookies in your web browser are not tracked by businesses. Answer: False Learning Objective: Discuss the ten types of deliberate attacks. Section Reference: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

27) The University of Exeter had an excellent IT staff, so their systems were completely functional even after a virus attack.


Information System, Third Canadian Edition

Rainer

Answer: False Learning Objective: Discuss the nine types of deliberate attacks. Section Reference: 13.3 IT’s About Business: Virus Attack Hits the University of Exeter Difficulty: Easy

28) SCADA attacks like Stuxnet are an act of cyberwarfare. Answer: True Learning Objective: Discuss the ten types of deliberate attacks. Section Reference: 13.3 IT’s About Business: The Stuxnet Worm Difficulty: Easy

29) Authentication and authorization are synonyms. Answer: False Learning Objective: Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference: 13.6 Information Security Controls Difficulty: Easy

30) Employees needing access to the Web was City National Bank and Trust’s most significant security problem. Answer: True Learning Objective: Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference: 13.5 IT’s About Business: Information Security at City National Bank and Trust Difficulty: Easy

31) You start a dog-walking service, and you store your client’s records on your cell phone. You don’t need to worry about information security. Answer: False Learning Objective: Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: 13.1 Introduction to Information Security Difficulty: Easy

Question Type: Multiple Choice


Information System, Third Canadian Edition

Rainer

32) Which of the following is not a consequence of poor information security practices? a) Stolen information b) Stolen identities c) Financial loss d) Loss of service e) All of the above are consequences of poor information security practices. Answer: e Learning Objective: Describe a real-world application of information security. Section Reference 1: IT’s About Business 13.1: Thomas Tax Service Difficulty: Easy

33) In its study of various organizations, the Ponemon Institute found that the most common cause of data breaches was: a) Weak passwords. b) Unattended computers. c) Employee negligence. d) Contract labor, such as consultants. e) Poor antivirus software. Answer: c Learning Objective: Describe a real-world application of information security. Section Reference 1: IT’s About Business 13.1: Thomas Tax Service Difficulty: Hard

34) Which of the following factors is not increasing the threats to information security? a) Smaller computing devices b) Downstream liability c) The Internet d) Limited storage capacity on portable devices e) Due diligence Answer: d Learning Objective: Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: 13.1 Introduction to Information Security Difficulty: Medium

35) The computing skills necessary to be a hacker are decreasing for which of the following reasons? a) More information systems and computer science departments are teaching courses on hacking so that their graduates can recognize attacks on information assets.


Information System, Third Canadian Edition

Rainer

b) Computer attack programs, called scripts, are available for download from the Internet. c) International organized crime is training hackers. d) Cybercrime is much more lucrative than regular white-collar crime. e) Almost anyone can buy or access a computer today. Answer: b Learning Objective: Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: 13.1 Introduction to Information Security Difficulty: Hard

36) Rank the following in terms of dollar value of the crime, from highest to lowest. a) Robbery – white collar crime – cybercrime b) White collar crime – extortion – robbery c) Cybercrime – white collar crime – robbery d) Cybercrime – robbery – white collar crime e) White collar crime – burglary – robbery Answer: c Learning Objective: Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: 13.1 Introduction to Information Security Difficulty: Medium

37) A _____ is any danger to which an information resource may be exposed. a) vulnerability b) risk c) control d) threat e) compromise Answer: d Learning Objective: Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: 13.1 Introduction to Information Security Difficulty: Easy

38) An information system’s _____ is the possibility that the system will be harmed by a threat. a) vulnerability b) risk c) control d) danger


Information System, Third Canadian Edition

Rainer

e) compromise Answer: a Learning Objective: Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: 13.1 Introduction to Information Security Difficulty: Easy

39) The most overlooked people in information security are: a) Consultants and temporary hires. b) Secretaries and consultants. c) Contract laborers and executive assistants. d) Janitors and guards. e) Executives and executive secretaries. Answer: d Learning Objective: Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference 1: 13.2 Unintentional Threats to Information Systems Difficulty: Easy

40) Employees in which functional areas of the organization pose particularly grave threats to information security? a) Human resources, finance b) Human resources, management information systems c) Finance, marketing d) Operations management, management information systems e) Finance, management information systems Answer: b Learning Objective: Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference 1: 13.2 Unintentional Threats to Information Systems Difficulty: Easy

41) Unintentional threats to information systems include all of the following except: a) Malicious software b) Tailgating c) Power outage d) Lack of user experience e) Tornados Answer: a Learning Objective: Compare and contrast human mistakes and social engineering, providing an example for each.


Information System, Third Canadian Edition

Rainer

Section Reference 1: 13.2 Unintentional Threats to Information Systems Difficulty: Medium

42) _____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges. a) Tailgating b) Hacking c) Spoofing d) Social engineering e) Spamming Answer: d Learning Objective: Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference 1: 13.2 Unintentional Threats to Information Systems Difficulty: Easy

43) The cost of a stolen laptop includes all of the following except: a) Loss of intellectual property b) Loss of data c) Backup costs d) Loss of productivity e) Replacement cost Answer: c Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

44) Dumpster diving is: a) Always illegal because it is considered trespassing. b) Never illegal because it is not considered trespassing. c) Typically committed for the purpose of identity theft. d) Always illegal because individuals own the material in the dumpster. e) Always legal because the dumpster is not owned by private citizens. Answer: c Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Medium

45) Cybercriminals can obtain the information they need in order to assume another person’s identity by:


Information System, Third Canadian Edition

Rainer

a) Infiltrating an organization that stores large amounts of personal information. b) Phishing. c) Hacking into a corporate database. d) Stealing mail. e) All of the above are strategies to obtain information to assume another person’s identity. Answer: e Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

46) A _____ is intellectual work that is known only to a company and is not based on public information. a) copyright b) patent c) trade secret d) knowledge base e) private property Answer: c Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

47) A pharmaceutical company’s research and development plan for a new class of drugs would be best described as which of the following? a) Copyrighted material b) Patented material c) A trade secret d) A knowledge base e) Public property Answer: c Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

48) A _____ is a document that grants the holder exclusive rights on an invention for 20 years. a) copyright b) patent c) trade secret d) knowledge base


Information System, Third Canadian Edition

Rainer

e) private property notice Answer: b Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

49) An organization’s e-mail policy has the least impact on which of the following software attacks? a) Virus b) Worm c) Phishing d) Denial-of-Service attack e) Spear phishing Answer: d Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: 4.3 Deliberate Threats to Information Systems Difficulty: Hard

50) _____ are segments of computer code that attach to existing computer programs and perform malicious acts. a) Viruses b) Worms c) Trojan horses d) Back doors e) Logic bombs Answer: a Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

51) _____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated. a) Viruses b) Worms c) Trojan horses d) Back doors e) Logic bombs Answer: e Learning Objective: Discuss the ten types of deliberate attacks.


Information System, Third Canadian Edition

Rainer

Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

52) _____ are segments of computer code embedded within an organization’s existing computer programs that activate and perform a destructive action at a certain time or date. a) Viruses b) Worms c) Trojan horses d) Back doors e) Logic bombs Answer: e Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

53) A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail. a) Virus b) Denial-of-service c) Distributed denial-of-service d) Phishing e) Brute force dictionary Answer: d Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

54) In a _____ attack, a coordinated stream of requests is launched against a target system from many compromised computers at the same time. a) phishing b) virus c) worm d) back door e) distributed denial-of-service Answer: e Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Easy


Information System, Third Canadian Edition

Rainer

55) The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious. a) Alien software b) Virus c) Worm d) Back door e) Logic bomb Answer: a Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

56) Which of the following is(are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers? a) Spyware b) Spamware c) Adware d) Viruses e) Worms Answer: b Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

57) When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers respond by using _____. a) keyloggers, screen scrapers b) screen scrapers, uninstallers c) keyloggers, spam d) screen scrapers, keyloggers e) spam, keyloggers Answer: a Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Medium


Information System, Third Canadian Edition

Rainer

58) _____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset. a) Risk management b) Risk analysis c) Risk mitigation d) Risk acceptance e) Risk transference Answer: b Learning Objective: Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: 13.4 What Organizations Are Doing to Protect Information Resources Difficulty: Easy

59) Which of the following statements is false? a) Credit card companies usually block stolen credit cards rather than prosecute. b) People tend to shortcut security procedures because the procedures are inconvenient. c) It is easy to assess the value of a hypothetical attack. d) The online commerce industry isn’t willing to install safeguards on credit card transactions. e) The cost of preventing computer crimes can be very high. Answer: c Learning Objective: Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: 13.4 What Organizations Are Doing to Protect Information Resources Difficulty: Easy

60) In _____, the organization takes concrete actions against risks. a) risk management b) risk analysis c) risk mitigation d) risk acceptance e) risk transference Answer: c Learning Objective: Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: 4.4 What Organizations Are Doing to Protect Information Resources Difficulty: Easy

61) Which of the following is not a strategy for mitigating the risk of threats against information?


Information System, Third Canadian Edition

Rainer

a) Continue operating with no controls and absorb any damages that occur b) Transfer the risk by purchasing insurance. c) Implement controls that minimize the impact of the threat d) Install controls that block the risk. e) All of the above are strategies for mitigating risk. Answer: e Learning Objective: Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: 13.4 What Organizations Are Doing to Protect Information Resources Difficulty: Easy

62) In _____, the organization purchases insurance as a means to compensate for any loss. a) risk management b) risk analysis c) risk mitigation d) risk acceptance e) risk transference Answer: e Learning Objective: Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: 13.4 What Organizations Are Doing to Protect Information Resources Difficulty: Easy

63) Which of the following statements concerning the difficulties in protecting information resources is not correct? a) Computing resources are typically decentralized. b) Computer crimes often remain undetected for a long period of time. c) Rapid technological changes ensure that controls are effective for years. d) Employees typically do not follow security procedures when the procedures are inconvenient. e) Computer networks can be located outside the organization. Answer: c Learning Objective: Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: 13.4 What Organizations Are Doing to Protect Information Resources Difficulty: Medium

64) _____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources. a) Access


Information System, Third Canadian Edition

Rainer

b) Physical c) Data security d) Administrative e) Input Answer: a Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Easy

65) Access controls involve _____ before _____. a) biometrics, signature recognition b) authentication, authorization c) iris scanning, voice recognition d) strong passwords, biometrics e) authorization, authentication Answer: b Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Easy

66) Biometrics are an example of: a) Something the user is. b) Something the user wants. c) Something the user has. d) Something the user knows. e) Something the user does. Answer: a Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Easy

67) Voice and signature recognition are examples of: a) Something the user is. b) Something the user wants. c) Something the user has. d) Something the user knows.


Information System, Third Canadian Edition

Rainer

e) Something the user does. Answer: e Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Easy

68) Passwords and passphrases are examples of: a) Something the user is. b) Something the user wants. c) Something the user has. d) Something the user knows. e) Something the user does. Answer: e Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Easy

69) Which of the following is not a characteristic of strong passwords? a) They are difficult to guess. b) They contain special characters. c) They are not a recognizable word. d) They are not a recognizable string of numbers e) They tend to be short so they are easy to remember. Answer: e Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Medium

70) Which of the following is not an example of a weak password? a) IloveIT b) 08141990 c) 9AmGt/* d) Rainer e) InformationSecurity Answer: c


Information System, Third Canadian Edition

Rainer

Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Medium

71) Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted’s _____ key, and Ted decrypts the message using his _____ key. a) public, public b) public, private c) private, private d) private, public e) none of these Answer: b Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Medium

72) Which of the following statements concerning firewalls is not true? a) Firewalls prevent unauthorized Internet users from accessing private networks. b) Firewalls examine every message that enters or leaves an organization’s network. c) Firewalls filter network traffic according to categories of activities that are likely to cause problems. d) Firewalls filter messages the same way as anti-malware systems do. e) Firewalls are sometimes located inside an organization’s private network. Answer: d Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Medium

73) In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called _____, the company allows everything to run unless it is not approved. a) whitelisting, blacklisting b) whitelisting, encryption c) encryption, whitelisting d) encryption, blacklisting e) blacklisting, whitelisting Answer: a


Information System, Third Canadian Edition

Rainer

Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Medium

74) Organizations use hot sites, warm sites, and cold sites to insure business continuity. Which of the following statements is not true? a) A cold site has no equipment. b) A warm site has no user workstations. c) A hot site needs to be located close to the organization’s offices. d) A hot site duplicates all of the organization’s resources. e) A warm site does not include actual applications. Answer: c Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Easy

75) Refer to IT’s About Business 13.2 – Virus Attack Hits the University of Exeter. Which of the following statements about the virus attack is true? a) The attack was confined to the Exeter campus. b) Telephone service was not disrupted. c) It took three days to clean infected computers and bring the network back into operation. d) Only the PCs owned by the University had to be scanned. e) The attack did not affect the professors’ ability to run their classes. Answer: c Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: IT’s About Business 13.2: Virus Attack Hits the University of Exeter Difficulty: Medium

76) Refer to IT’s About Business 13.3 – The Stuxnet Worm: Which of the following statements is true? a) The worm targeted large data warehouses. b) The worm was fairly simplistic. c) The worm spread from Iran to other countries. d) The worm probably only took a month to build. e) The worm specifically targeted nuclear facilities. Answer: e Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: IT’s About Business 13.3: The Stuxnet Worm


Information System, Third Canadian Edition

Rainer

Difficulty: Medium

77) Refer to IT’s About Business 13.4 – Information Security at City National Bank and Trust: Using the M86 Security software allowed City National Bank and Trust to do all of the following except: a) Apply policy-based standards for e-mail. b) Comply with Sarbanes-Oxley. c) Categorize Web sites and block questionable ones. d) Provide all employees with secure access to external e-mail. e) Prevent employees from downloading potentially dangerous files. Answer: d Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: IT’s About Business 13.4 Information Security at City National Bank and Trust Difficulty: Medium

78) Refer to Opening Case – 13.1 Cybercriminals Use Social Networks for Targeted Attacks: Cybercriminals use Facebook for all of the following reasons except: a) It is easy to get into the Facebook code itself. b) People trust messages from their Facebook friends. c) Social networks aren’t closely regulated in corporate network defense systems. d) Many social network users aren’t technology savvy and wouldn’t realize their computer is under the control of outsiders. e) There is a black market for Facebook usernames and passwords. Answer: a Learning Objective: Describe a real-world application of information security. Section Reference 1: 13.1 Chapter Opener: Cybercriminals Use Social Networks for Targeted Attacks Difficulty: Medium

79) Your company’s headquarters was just hit head on by a hurricane, and the building has lost power. The company sends you to their hot site to minimize downtime from the disaster. Which of the following statements is true? a) The site will not have any servers. b) The site will not have any workstations, so you need to bring your laptop. c) The site is probably in the next town. d) The site should be an almost exact replica of the IT configuration at headquarters. e) The site will not have up-to-date data. Answer: d Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls


Information System, Third Canadian Edition

Rainer

Difficulty: Medium

80) You receive an e-mail from your bank informing you that they are updating their records and need your password. Which of the following statements is true? a) The message could be an industrial espionage attack. b) The message could be a phishing attack. c) The message could be a denial of service attack. d) The message could be a back door attack. e) The message could be a Trojan horse attack. Answer: b Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Medium

81) You start a new job, and the first thing your new company wants you to do is create a user ID and a password. Which of the following would be a strong password? a) The name of the company b) Your last name c) Your birthdate d) Your initials (capitalized) and the number of the floor you are on e) The name of the company spelled backward Answer: e Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Medium

82) You start a new job, and human resources gives you a ten-page document that outlines the employee responsibilities for information security. Which of the following statements is most likely to be true? a) The document recommends that login passwords be left on a piece of paper in the center desk drawer so that others can use the laptop if necessary. b) You are expected to read the document, and you could be reprimanded if you don’t follow its guidelines. c) You can back up sensitive data to a thumb drive so you can take them home to work with. d) The document indicates that you can leave your laptop unlocked if you leave your desk for less than an hour. e) The document permits you to lend your laptop to your brother for the weekend. Answer: b Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each.


Information System, Third Canadian Edition

Rainer

Section Reference 1: 13.5 Information Security Controls Difficulty: Easy

83) Which of the following is NOT a way you can protect yourself on-line? a) Creating a complex password b) Clicking only on links from friends c) Installing antivirus software d) Manage your privacy settings Answer: b Learning Objective: Describe a real-world application of information security. Section Reference: 13.0 Opening Case Difficulty: Hard

84) In the “Thomas Tax Service” case, Dwight had to manually restore his data because __________. a) his backups were corrupt b) he didn’t trust the technician c) he didn’t have backups d) he liked doing lots of extra work Answer: c Learning Objective: Describe a real-world application of information security. Section Reference: 13.0 IT’s About Business: Thomas Tax Service Difficulty: Easy

85) Which of the following is a characteristic of a backup? a) They prevent computer failures. b) They never have any problems. c) They should only be done on a USB drive. d) They make it easy to restore data. Answer: d Learning Objective: Describe a real-world application of information security. Section Reference: 13.0 IT’s About Business: Thomas Tax Service Difficulty: Easy

86) A(n) ______________ is any danger to which a system may be exposed. a) Attack b) Security failure c) Threat


Information System, Third Canadian Edition

Rainer

d) Vulnerability Answer: c Learning Objective: Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference: 13. 1 Introduction to Information Security Difficulty: Easy

87) Which of the following is NOT a factor increasing the vulnerability of information resources? a) Business environments are more connected than ever. b) Our small, portable devices are much easier to steal or lose. c) Hacking is more difficult, but hackers are more skilled. d) Management support is lacking. Answer: c Learning Objective: Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference: 13.1 Introduction to Information Security Difficulty: Easy

88) The Internet is a(n) ___________ network. a) trusted b) untrusted c) neutral d) unbiased Answer: b Learning Objective: Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference: 13. 1Introduction to Information Security Difficulty: Medium

89) The employees who pose the biggest risk to information security work in _____________. a) customer service b) IT c) marketing d) sales Answer: b Learning Objective: Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each.


Information System, Third Canadian Edition

Rainer

Section Reference: 14.1 Introduction to Information Security Difficulty: Easy

90) Being careless with your computing devices is ______________. a) a deliberate threat b) a human error c) an intentional threat d) social engineering Answer: b Learning Objective: Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference: 13.2 Unintentional Threats to Information Systems Difficulty: Easy

91) Not logging off the company network when gone from the office for any extended period of time is an example of which type of human mistake? a) Carelessness with computing devices b) Poor password selection and use c) Carelessness with one’s office d) Carelessness using unmanaged devices Answer: c Learning Objective: Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference: 13.2 Unintentional Threats to Information Systems Difficulty: Easy

92) Social engineering is typically _____________ human error on the part of an employee, but it is _____________ on the part of the attacker. a) intentional, unintentional b) intentional, intentional c) unintentional, intentional d) unintentional, unintentional Answer: c Learning Objective: Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference: 13.2 Unintentional Threats to Information Systems Difficulty: Easy

93)____________ is an intellectual work, such as a business plan, that is a company secret and is not based on public information.


Information System, Third Canadian Edition

Rainer

a) Copyright b) Intellectual property c) Patent d) Trade secret Answer: d Learning Objective: Discuss the nine types of deliberate attacks. Section Reference: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

94) The main goal of phishing is _______________. a) espionage b) identity theft c) sabotage d) cyberterrorism Answer: b Learning Objective: Discuss the nine types of deliberate attacks. Section Reference: 13.3 Deliberate Threats to Information Systems Difficulty: Medium

95) A copyright provides creators of intellectual property with ownership of the property for the life of the creator plus _________ years. a) 20 b) 50 c) 70 d) 100 Answer: c Learning Objective: Discuss the nine types of deliberate attacks. Section Reference: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

96) A segment of computer code that performs malicious actions and will spread by itself without requiring another computer program. a)Logic bomb b) Trojan horse c) Virus d) Worm Answer: d


Information System, Third Canadian Edition

Rainer

Learning Objective: Discuss the nine types of deliberate attacks. Section Reference: 13.3 Deliberate Threats to Information Systems Difficulty: Easy 97) ___________ record(s) a continuous “movie” of what you do on a screen. a) Adware programs b) Keystroke loggers c) Screen scrapers d) Spamware Answer: c Learning Objective: Discuss the ten types of deliberate attacks. Section Reference: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

98) What made the University of Exeter’s system vulnerable to attack? a) The appropriate patches for the security software had not been applied in a timely fashion. b) The students and faculty didn’t log off the system, so an intruder was able to get onto the system very easily. c) The university did not have a good spam policy, so the intruder was able to send the virus via e-mail. d) The university did not run background checks on employees and hired the hacker without knowing about his past actions. Answer: a Learning Objective: Discuss the ten types of deliberate attacks. Section Reference: 13.3 IT’s About Business: Virus Attack Hits the University of Exeter Difficulty: Easy

99) Stuxnet is a _____________ that targets _____________ systems. a) Virus, SCADA b) Worm, SCADA c) Virus, ERP d) Worm, ERP Answer: b Learning Objective: 13.3 Discuss the ten types of deliberate attacks. Section Reference: IT’s About Business: The Stuxnet Worm Difficulty: Medium

100) _______________ assesses the value of each asset being protected, estimates the probability it might be compromised, and compares the probable costs of it being compromised with the cost of protecting it.


Information System, Third Canadian Edition

Rainer

a) Risk analysis b) Risk determination c) Risk management d) Risk mitigation Answer: a Learning Objective: Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference: What Organizations are Doing to Protect Information Resources Difficulty: Easy

101) Risk _________ involves minimizing the impact of a threat. a) acceptance b) diversion c) limitation d) transference Answer: c Learning Objective: Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference: What Organizations are Doing to Protect Information Resources Difficulty: Easy

102) Which of the following is NOT a reason it is difficult to protect information resources? a) Many individuals control or have access to information assets. b) There aren’t enough security procedures in place. c) It is easy to be a hacker. d) The costs of preventing hazards can be very high. Answer: b Learning Objective: Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference: What Organizations are Doing to Protect Information Resources Difficulty: Medium

103) Purchasing insurance is an example of risk ___________. a) acceptance b) diversion c) limitation d) transference Answer: d


Information System, Third Canadian Edition

Rainer

Learning Objective: Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference: 13. 4 What Organizations are Doing to Protect Information Resources Difficulty: Easy

104) Walls, doors, and fences are examples of __________ controls. a) access b) communications c) network d) physical Answer: d Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference: 13.5 Information Security Controls Difficulty: Easy

105) Biometrics is an example of something user ____________. a) does b) has c) is d) knows Answer: c Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference: 13.5 Information Security Controls Difficulty: Easy

106) ______________ is a process in which a company allows all software to run unless it is on the list. a) Blacklisting b) Graylisting c) Hitlisting d) Whitelisting Answer: A Learning Objective: Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference: 13.5 Information Security Controls Difficulty: Easy


Information System, Third Canadian Edition

Rainer

107) ______________ is a private network that uses a public network to connect users securely to the organization’s internal systems. a) SSL b) VPN c) URL d) A firewall Answer: b Learning Objective: Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference: 13.5 Information Security Controls Difficulty: Easy

108) A DMZ is located ______________. a) inside the company’s firewalls b) outside the company’s firewalls c) between 2 firewalls d) on the Internet Answer: c Learning Objective: Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference: 13.5 Information Security Controls Difficulty: Medium

109) A ___________ site does not include the actual applications the company runs. a) cold b) hot c) warm d) neutral Answer: c Learning Objective: Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference: 13.5 Information Security Controls Difficulty: Easy

110) Auditing _____________ the computer means inputs, outputs, and processing are checked. a) around b) through


Information System, Third Canadian Edition

Rainer

c) using d) with Answer: b Learning Objective: Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference: 13,5 Information Security Controls Difficulty: Easy 111) City National Bank and Trust’s policies are an example of _____________. a) blacklisting b) graylisting c) whitelisting d) paranoia Answer: a Learning Objective: Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference: 13.5 IT’s About Business: Information Security at City National Bank and Trust Difficulty: Medium

Question Type: Essay

112) Compare trade secrets, patents, and copyrights as forms of intellectual property. Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Medium

113) Contrast unintentional and deliberate threats to an information resource. Provide examples of both. Learning Objective: Compare and contrast human mistakes and social engineering, providing an example for each. Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: 13.2 Unintentional Threats to Information Systems Section Reference 2: 13.3 Deliberate Threats to Information Systems Difficulty: Medium

114) Contrast the following types of remote attacks: virus, worm, phishing, and spear phishing. Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Medium


Information System, Third Canadian Edition

Rainer

115) Contrast the following types of attacks created by programmers: Trojan horse, back door, and logic bomb Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Medium

116) Contrast spyware and spamware. Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Easy

117) Contrast risk acceptance, risk limitation, and risk transference. Learning Objective: Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: 13.4 What Organizations Are Doing to Protect Information Resources Difficulty: Medium

118) Describe public key encryption. Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Medium

119) Compare a hot site, a warm site, and a cold site as strategies for business continuity. Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Medium

120) Contrast the four types of authentication. Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Medium

121) Identify and discuss the factors that are contributing to the increasing vulnerability of organizational information assets. Learning Objective: Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each.


Information System, Third Canadian Edition

Rainer

Section Reference 1: 13.1 Introduction to Information Security Difficulty: Hard

122) Define identity theft, and explain the types of problems that it creates for the victims. Learning Objective: Discuss the ten types of deliberate attacks. Section Reference 1: 13.3 Deliberate Threats to Information Systems Difficulty: Medium

123) Discuss the possible consequences of a terrorist attack on a supervisory control and data acquisition (SCADA) system. Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Hard

124) Define the principle of least privilege, and consider how an organization’s senior executives might view the application of this principle. Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Hard

125) Explain why anti-malware software is classified as reactive. Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Hard

126) Describe how a digital certificate works. Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Hard

127) Tim ventured out into the world of retail by renting a cart at a local mall. His product is personalized coffee mugs. He uses his laptop to track sales and to process credit card sales. He has a customer mailing list that is updated by customers on the laptop as well. At the end of each day, Tim backs up all of his data to a thumb drive and puts the drive into the laptop case with the laptop. Discuss Tim’s information security strategy.


Information System, Third Canadian Edition

Rainer

Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 13.5 Information Security Controls Difficulty: Medium

Question Type: Fill-in-the-Blank

128) Security is the _____________ against criminal activity, danger, damage, and/or loss. Answer: degree of protection Learning Objective: Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference: 13. 1 Introduction to Information Security Difficulty: Easy

129) Social engineering is where the attacker uses _____________ to trick a legitimate employee into providing confidential company information such as passwords. Answer: social skills Learning Objective: Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference: 13.2 Unintentional Threats to Information Systems Difficulty: Easy

130) Risk is the ___________ that a threat will impact information resources. Answer: probability Learning Objective: Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference: 13.4 What Organizations are Doing to Protect Information Resources Difficulty: Easy

131) ______________ is when permission is issued to individuals and groups to do certain activities that can be performed by users of the system. Answer: Authorization Learning Objective: Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference: 13.5 Information Security Controls Difficulty: Easy

132) Security is the _____________ against criminal activity, danger, damage, and/or loss.


Information System, Third Canadian Edition

Rainer

Answer: degree of protection Learning Objective: Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference: 13,1 Introduction to Information Security Difficulty: Easy

133) Social engineering is where the attacker uses _____________ to trick a legitimate employee into providing confidential company information such as passwords. Answer: social skills Learning Objective: Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference: 13.2 Unintentional Threats to Information Systems Difficulty: Easy

134) Risk is the ___________ that a threat will impact information resources. Answer: probability Learning Objective: Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference: 13.4 What Organizations are Doing to Protect Information Resources Difficulty: Easy

135) _______________ is when permission is issued to individuals and groups to do certain activities that can be performed by users of the system. Answer: Authorization Learning Objective: Identify the types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference: 13.5 Information Security Controls Difficulty: Easy


Information System, Third Canadian Edition

Rainer

Legal Notice Copyright © 2014 by John Wiley & Sons Canada, Ltd. or related companies. All rights reserved.

The data contained in these files are protected by copyright. This manual is furnished under licence and may be used only in accordance with the terms of such licence. The material provided herein may not be downloaded, reproduced, stored in a retrieval system, modified, made available on a network, used to create derivative works, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without the prior written permission of John Wiley & Sons Canada, Ltd.


Information System, Third Canadian Edition

Rainer

Tech Guide 1 Hardware

Question Type: True/False

1) Computer technologies become obsolete faster than other technologies in the organization. Answer: True Learning Objective: Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference: TG 1.1 Introduction Difficulty: Easy

2) One key issues with hardware is how to keep up with rapid price/performance increases Answer: True Learning Objective: Discuss the strategic issues that link hardware design to business strategy. Section Reference: TG 1.2 Strategic Hardware Issues Difficulty: Medium 3) A super computer is the term given to the latest technology Answer: False Learning Objective: Describe the hierarchy of computers according to power and their respective roles. Section Reference: TG 1.3 Computer Hierarchy Difficulty: Medium

4) A mainframe is a type of server. Answer: False Learning Objective: Describe the hierarchy of computers according to power and their respective roles. Section Reference: TG 1.3 Computer Hierarchy Difficulty: Medium

5) A thin-client system is a desktop computer that doesn’t have locally installed software. Answer: True


Information System, Third Canadian Edition

Rainer

Learning Objective: Describe the hierarchy of computers according to power and their respective roles. Section Reference: TG 1.3 Computer Hierarchy Difficulty: Easy

6) Laptop, notebook, and netbook computers cost more than desktops because of their portability. Answer: True Learning Objective: Describe the hierarchy of computers according to power and their respective roles. Section Reference: TG 1.3 Computer Hierarchy Difficulty: Easy

7) Each generation of computer hardware has exhibited increased processing power and decreased costs. Answer: True

Learning Objective: Describe the hierarchy of computers according to power and their respective roles. Section Reference: TG 1.3 Computer Hierarchy Difficulty: Easy

8) Minicomputers are relatively small, inexpensive computers that perform the same functions as mainframe computers, but to a limited extent. Answer: True Learning Objective: Describe the hierarchy of computers according to power and their respective roles. Section Reference: TG 1.3 Computer Hierarchy Difficulty: Easy

9) The mouse is the most common input device. Answer: False Learning Objective: Differentiate the various types of input and output technologies and their uses. Section Reference: TG 1.4 Input and Output Technologies Difficulty: Easy

10) Source data automation uses various technologies to input data with minimal human intervention. Answer: True


Information System, Third Canadian Edition

Rainer

Learning Objective: Differentiate the various types of input and output technologies and their uses. Section Reference: TG 1.4 Input and Output Technologies Difficulty: Easy

11) Microcontrollers are computer chips that are embedded in products and technologies of various types and sizes. Answer: False Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Easy

12) Computers can run any type of program regardless of the amount and type of memory that the computer has. Answer: False Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Easy

13) A byte represents a particular alphanumeric character or a simple mathematical operation. Answer: True Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Easy

14) Primary storage is the main memory of a computer, in which small amounts of data that will be used immediately are stored. Answer: True Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Easy

15) Random access memory is that part of primary storage that holds a software program (or a portion of it) and small amounts of data when they are brought from secondary storage. Answer: True


Information System, Third Canadian Edition

Rainer

Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Easy

16) If your computer loses its power supply, you will not lose the contents of your random access memory, because it is not volatile. Answer: False Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Easy

17) Sequential access is a type of data access that is associated primarily with magnetic disks. Answer: False Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Easy

18) Magnetic tape provides faster access to data than magnetic disks. Answer: False Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Easy

19) An optical storage device is a form of secondary storage device on which data are recorded and read by laser in a computer’s disk drive. Answer: True Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Easy

20) Digital video disks (DVDs) have higher storage capacities than CD-ROMs. Answer: True


Information System, Third Canadian Edition

Rainer

Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Easy

21) The cost per megabyte of storage is greater for traditional hard disk storage than for PC memory cards. Answer: False Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Easy

22) Hardware is becoming smaller, faster, and cheaper over time. Answer: True Learning Objective: Analyze the major hardware issues that affect information workers in today's business environment. Section: TG 1.1 Introduction Difficulty: Easy

23) A thin client offers the full functionality of a PC but is much lighter. Answer: False Learning Objective: Describe the hierarchy of computers according to power and their respective roles. Section: TG 1.3 Computer Hierarchy Difficulty: Easy 24) Multimedia technologies integrate text, sounds, still images, animation, and digitized motion video. Answer: True Learning Objective: Differentiate the various types of input and output technologies and their uses. Section Reference: TG 1.4 Input and Output Technologies Difficulty: Easy

25) Secondary storage is volatile. Answer: False Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit


Information System, Third Canadian Edition

Rainer

Difficulty: Easy

Question Type: Multiple Choice

26) Which of the following factors does not affect decisions about hardware? a) Power b) Appropriateness for the task c) Size d) Cost e) Speed Answer: c Learning Objective: Identify the major components of a computer system. Section Reference: TG 1.1 Introduction Difficulty: Easy

27) To model the weather or simulate nuclear weapons testing, you would most likely use a(n): a) Mainframe computer. b) Workstation. c) Supercomputer. d) Personal computer. e) Active badge. Answer: c Learning Objective: Describe the hierarchy of computers according to power and their respective roles. Section Reference: TG 1.3 Computer Hierarchy Difficulty: Easy

28) A _____ refers to the fastest computing engines available at any given time. a) Supercomputer b) Mainframe c) Midrange computer d) Microcomputer e) Laptop computer Answer: a Learning Objective: Describe the hierarchy of computers according to power and their respective roles. Section Reference: TG 1.3 Computer Hierarchy


Information System, Third Canadian Edition

Rainer

Difficulty: Easy

29) A ___________ is an example of a computer system that is designed to accommodate multiple users simultaneously. a) Microcomputer b) Mainframe c) Laptop d) Palmtop e) Wearable computer Answer: b Learning Objective: Describe the hierarchy of computers according to power and their respective roles. Section Reference: TG 1.3 Computer Hierarchy Difficulty: Easy

30) A _____ is used in large enterprises for extensive computing applications that are accessed by thousands of concurrent users. a) Supercomputer b) Mainframe c) Midrange computer d) Microcomputer e) Laptop computer Answer: b Learning Objective: Describe the hierarchy of computers according to power and their respective roles. Section Reference: TG 1.3 Computer Hierarchy Difficulty: Easy

31) Which of the following is not a component of hardware? a) Primary and secondary storage b) The operating system c) Input and output technologies d) The central processing unit e) Communication technologies Answer: b Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Medium


Information System, Third Canadian Edition

Rainer

32) Which of the following is not a component of the central processing unit? a) Registers b) Control unit c) Secondary storage d) Arithmetic-logic unit e) Keyboard Answer: c Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Medium

33) Which of the following does not affect the speed of the machine instruction cycle? a) Clock speed b) Word length c) Bus width d) Line width e) Physical design of the chip Answer: d Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Medium

34) Moore’s Law predicted that microprocessor complexity would ______. a) Double every year. b) Double every two years. c) Increase slowly. d) Decrease slowly. e) Decrease rapidly. Answer: b Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Medium

35) The amount and type of memory that a computer possesses affects which of the following?


Information System, Third Canadian Edition

Rainer

a) The type of program the computer can run b) The speed of the computer c) The cost of the computer d) The cost of processing data e) All of these Answer: e Learning Objective: Computer Storage. Section Reference: TG 1.6 Distinguish between primary and secondary storage along the dimensions of speed, cost and capacity. Difficulty: Easy

36) The amount and type of memory that a computer possesses affects all the following except: a) The type of program the computer can run. b) The speed of the computer. c) The cost of the computer. d) The cost of processing data. e) The speed of data entry. Answer: e Learning Objective: Computer Storage.. Section Reference: TG 1.6 Distinguish between primary and secondary storage along the dimensions of speed, cost and capacity. Difficulty: Medium

37) Arrange the hierarchy of terms to describe memory capacity in the correct sequence, from smallest to largest: a) Megabyte – kilobyte – gigabyte – terabyte – exabyte – petabyte b) Exabyte – petabyte – terabyte – gigabyte – megabyte – kilobyte c) Kilobyte – megabyte – gigabyte – terabyte – petabyte – exabyte d) Petabyte – exabyte – kilobyte – gigabyte – kilobyte – terabyte e) Kilobyte – gigabyte – megabyte – exabyte – petabyte – terabyte Answer: c Learning Objective: Computer Storage. Section Reference: TG 1.6 Distinguish between primary and secondary storage along the dimensions of speed, cost and capacity. Difficulty: Easy


Information System, Third Canadian Edition

Rainer

38) Primary storage stores which of the following for very brief periods of time? a) Data to be processed by the CPU b) Instructions for the CPU as to how to process the data c) Operating system programs that manage various aspects of the computer’s operations d) All of these Answer: d Learning Objective: Computer Storage. Section Reference: TG 1.6 Distinguish between primary and secondary storage along the dimensions of speed, cost and capacity. Difficulty: Easy

39) Which of the following is not stored in primary storage? a) Data to be processed by the CPU b) Instructions for the CPU as to how to process the data c) Archival data d) Operating system programs e) All of these are stored in primary storage. Answer: c Learning Objective: Computer Storage. Section Reference: TG 1.6 Distinguish between primary and secondary storage along the dimensions of speed, cost and capacity. Difficulty: Easy

40) The main types of primary storage are: a) Register. b) Random access memory. c) Cache memory. d) Read-only memory. e) All of these Answer: e Learning Objective: Computer Storage. Section Reference: TG 1.6 Distinguish between primary and secondary storage along the dimensions of speed, cost and capacity. Difficulty: Easy


Information System, Third Canadian Edition

Rainer

41) _____________is(are) the part of primary storage that holds a software program (or a portion of it) and small amounts of data when they are brought from secondary storage. a) Read-only memory b) Random access memory c) Cache memory d) Registers e) Flash memory Answer: b Learning Objective: LO TG 1.6 Computer Storage. Section Reference: TG 1.6 Distinguish between primary and secondary storage along the dimensions of speed, cost and capacity. Difficulty: Easy

42) Random access memory is _____ and _____. a) Volatile, temporary b) Nonvolatile, permanent c) Nonvolatile, temporary d) Volatile, permanent e) Volatile, inexpensive Answer: a Learning Objective: Computer Storage. Section Reference: TG 1.6 Distinguish between primary and secondary storage along the dimensions of speed, cost and capacity. Difficulty: Medium

43) Registers have all of the following characteristics except: a) They are a type of primary storage. b) They can store only extremely limited amounts of instructions and data. c) They provide the fastest storage. d) They are slower than RAM. e) All of these are characteristics of registers. Answer: d Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Medium


Information System, Third Canadian Edition

Rainer

44) Which of the following is not a type of primary storage? a) Random access memory b) Registers c) Cache d) Read-only memory e) Optical Answer: e Learning Objective: Computer Storage. Section Reference: TG 1.6 Distinguish between primary and secondary storage along the dimensions of speed, cost and capacity. Difficulty: Medium

45) The type of primary storage, located closest to the CPU, where the computer can temporarily store blocks of data used most often is called: a) Read-only memory. b) Registers. c) Random access memory. d) Cache memory. e) Flash memory. Answer: d Learning Objective: Computer Storage. Section Reference: TG 1.6 Distinguish between primary and secondary storage along the dimensions of speed, cost and capacity. Difficulty: Easy

46) The type of primary storage where certain critical instructions are safeguarded because the storage is nonvolatile and the instructions can be read only by the computer and not changed by the user is called: a) Read-only memory. b) Random access memory. c) Cache memory d) Registers e) Flash memory Answer: a Learning Objective: Computer Storage. Section Reference: TG 1.6 Distinguish between primary and secondary storage along the dimensions of speed, cost and capacity.


Information System, Third Canadian Edition

Rainer

Difficulty: Easy

47) Secondary storage has which of the following characteristics? a) It is nonvolatile. b) It is more cost effective than primary storage. c) It is slower than primary storage. d) It can utilize a variety of media. e) All of these Answer: e Learning Objective: Computer Storage. Section Reference: TG 1.6 Distinguish between primary and secondary storage along the dimensions of speed, cost and capacity. Difficulty: Easy

48) Which of the following is not a characteristic of secondary storage? a) It is nonvolatile. b) It is more cost effective than primary storage. c) It is slower than primary storage d) It cannot utilize any media except chips e) None of these Answer: d Learning Objective: Computer Storage. Section Reference: TG 1.6 Distinguish between primary and secondary storage along the dimensions of speed, cost and capacity. Difficulty: Medium

49) The characteristics of magnetic tape include all of the following except: a) It is the fastest magnetic storage medium. b) It is the cheapest magnetic storage medium. c) It provides sequential access to the data. d) It has greater storage capacity than thumb drives. e) It is often used for archival storage. Answer: a Learning Objective: Computer Storage. Section Reference: TG 1.6 Distinguish between primary and secondary storage along the dimensions of speed, cost and capacity.


Information System, Third Canadian Edition

Rainer

Difficulty: Medium

50) If you wished to store a large amount of archival data for a long period of time, you would choose which of the following? a) Magnetic disk b) Magnetic tape c) Read-only chips d) Cache chips e) Thumb drives Answer: b Learning Objective: Computer Storage. Section Reference: TG 1.6 Distinguish between primary and secondary storage along the dimensions of speed, cost and capacity. Difficulty: Medium

51) To access a specific piece of information, _____ are usually faster than _____. a) Sequential access storage devices, direct access storage devices b) Direct access storage devices, sequential access storage devices c) Streaming tape devices, DVDs d) Optical storage devices, random access memory e) Sequential access storage devices, thumb drives Answer: b Learning Objective: Computer Storage. Section Reference: TG 1.6 Distinguish between primary and secondary storage along the dimensions of speed, cost and capacity. Difficulty: Medium

52) _____ are electronic storage devices that contain no moving parts. a) Hard drives b) Flash memory devices c) Streaming tape devices d) DVDs e) CDs Answer: b Learning Objective: Computer Storage.


Information System, Third Canadian Edition

Rainer

Section Reference: TG 1.6 Distinguish between primary and secondary storage along the dimensions of speed, cost and capacity. Difficulty: Easy

53) Jun is getting ready to open a store in her home town to sell unique lamp bases and shades. What kind of computer does she need at this point? a) Mainframe computer b) Server c) Supercomputer d) Personal computer e) iPad Answer: d Learning Objective: Describe the hierarchy of computers according to power and their respective roles. Section Reference: TG 1.3 Computer Hierarchy Difficulty: Easy

54) Jun has been in business selling unique lamp bases and shades for two years in her first location. She is getting ready to open a second location two towns over. What kind of computer does she need at this point? a) Mainframe computer b) Server c) Supercomputer d) Personal computer e) iPad Answer: b Learning Objective: Describe the hierarchy of computers according to power and their respective roles. Section Reference: TG 1.3 Computer Hierarchy Difficulty: Medium

55) Jun really likes your Apple iPad and wants to get one for her lamp business. What kind of computer would the iPad replace? a) Mainframe computer b) Workstation c) Server d) Personal computer e) Smartphone Answer: d


Information System, Third Canadian Edition

Rainer

Learning Objective: Describe the hierarchy of computers according to power and their respective roles. Section Reference: TG 1.3 Computer Hierarchy Difficulty: Medium

56)_______________ manipulates the data and controls the tasks performed by other components. a) CPU b) Primary storage c) Output technologies d) Secondary storage Answer: a Learning Objective: Analyze the major hardware issues that affect information workers in today's business environment. Section: TG 1.1 Introduction Difficulty: Easy

57) _____________________ stores data and programs for future use. a) CPU b) Primary storage c) Output technologies d) Secondary storage Answer: d Learning Objective: Analyze the major hardware issues that affect information workers in today's business environment. Section: TG 1.1 Introduction Difficulty: Easy

58) ________________ provide for the flow of data from external computer networks to the CPU and vice versa. a) Communication technologies b) Input technologies c) Output technologies d) Secondary storage devices Answer: a Learning Objective: Analyze the major hardware issues that affect information workers in today's business environment. Section: TG 1.1 Introduction Difficulty: Easy


Information System, Third Canadian Edition

Rainer

59) Which of the following is NOT a strategic hardware issue? a) Price and performance b) Personal and organizational productivity c) BYOD d) Need for the latest and greatest applications Answer: d Learning Objective: Discuss the strategic issues that link hardware design to business strategy. Section: TG 1.2 Discuss the strategic issues that link hardware design to business strategy Difficulty: Medium

60) Which of the following is the correct order of the computer hierarchy, from smallest to largest? a) Supercomputers, mainframe computers, midrange computers, microcomputers b) Microcomputers, midrange computers, mainframe computers, supercomputers c) Microcomputers, mainframe computers, midrange computers, supercomputers d) Supercomputers, midrange computers, mainframe computers, microcomputers Answer: b Learning Objective: Describe the hierarchy of computers according to power and their respective roles. Section Reference: TG 1.3 Computer Hierarchy Difficulty: Easy

61) Desktop PCs are an example of _____________ a) mainframe computers b) microcomputers c) midrange computers d) supercomputers Answer: b Learning Objective: Describe the hierarchy of computers according to power and their respective roles. Section Reference: TG 1.3 Computer Hierarchy Difficulty: Easy

62) NASA’s computer system is an example of ___________ a) mainframe computers b) microcomputers


Information System, Third Canadian Edition

Rainer

c) midrange computers d) supercomputers Answer: d Learning Objective: Describe the hierarchy of computers according to power and their respective roles. Section: Computer Hierarchy Difficulty: Medium

63) Airline reservation systems are an example of ___________ a) mainframe computers b) microcomputers c) midrange computers d) supercomputers Answer: a Learning Objective: Describe the hierarchy of computers according to power and their respective roles. Section: Computer Hierarchy Difficulty: Easy

64) Which of the following is an example of an output technology? a) Joystick b) Keyboard c) Printer d) RFID scanner Answer: c Learning Objective: Differentiate the various types of input and output technologies and their uses. Section Reference: TG 1.4 Input and Output Technologies Difficulty: Easy

65) Which of the following is an example of an input technology? a) Monitor b) Mouse c) Printer d) Plotter Answer: b Learning Objective: Differentiate the various types of input and output technologies and their uses.


Information System, Third Canadian Edition

Rainer

Section Reference: TG 1.4 Input and Output Technologies Difficulty: Easy

66) Which of the following is an example of source-data automation? a) Keyboard b) Mouse c) UPC scanner d) Voice recognition Answer: c Learning Objective: Differentiate the various types of input and output technologies and their uses. Section Reference: TG 1.4 Input and Output Technologies Difficulty: Easy

67) Registers are high-speed storage areas that store __________ amounts of data and instructions for ___________ periods of time. a) very large, long b) very large, short c) very small, long d) very small, short Answer: d Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Easy

68) Which of the following arranges the hierarchy of memory capacity from largest to smallest? a) ZB, EB, PB, TB, GB, MB, KB b) ZB, EB, PB, TB, MB, GM, KB c) ZB, EB, PB, TB, GB, KB, MB d) ZB, EB, PB, TB, MB, KB, MB Answer: a Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Easy

69) __________ is main memory.


Information System, Third Canadian Edition

a) ALU b) Primary storage c) A register d) Secondary storage Answer: b Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Medium

70) RAM is ___________ storage that is ____________. a) primary, nonvolatile b) primary, volatile c) secondary, nonvolatile d) secondary, volatile Answer: b Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Easy

71) __________ is an example of secondary storage. a) A hard drive b) Cache memory c) RAM d) ROM Answer: a Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Easy

72) A(n) _________ is the cheapest storage medium. a) hard drive b) magnetic tape c) magnetic disk d) optical storage device

Rainer


Information System, Third Canadian Edition

Rainer

Answer: b Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Medium

73) _________ uses the unused digital portion of a regular copper telephone line. a) Dial-up access b) Cable c) DSL d) Wireless Answer: c Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Easy

Question Type: Essay

74) Discuss why it is difficult to make hardware decisions today. Learning Objective: Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference: TG 1.1 Introduction Difficulty: Medium

75) Describe the components that make up hardware. Learning Objective: Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference: TG 1.1 Introduction Difficulty: Medium

76) What are the types of primary storage? Learning Objective: Computer Storage. Section Reference: TG 1.6 Distinguish between primary and secondary storage along the dimensions of speed, cost and capacity. Difficulty: Medium


Information System, Third Canadian Edition

Rainer

77) Compare and contrast supercomputers, mainframes, midrange computers, and microcomputers. Learning Objective: Describe the hierarchy of computers according to power and their respective roles. Section Reference: TG 1.3 Computer Hierarchy Difficulty: Medium

78) What are the types of secondary storage? Learning Objective: Computer Storage. Section Reference: TG 1.6 Distinguish between primary and secondary storage along the dimensions of speed, cost and capacity. Difficulty: Medium

Question Type: Fill-in-the-Blank

79) _______________ refers to the physical equipment for the input, processing, output, and storage activities of a computer system. Answer: Hardware Learning Objective: Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference: TG 1.1 Introduction Difficulty: Easy

80) ___________ input data with minimal human intervention. Answer: Source-data automation Learning Objective: Differentiate the various types of input and output technologies and their uses. Section Reference: TG 1.4 Input and Output Technologies Difficulty: Easy

81) Moore’s Law states that microprocessor complexity would ________ every 2 years. Answer: double Learning Objective: Describe the design and functioning of the central processing unit. Section Reference: TG 1.5 The Central Processing Unit Difficulty: Easy


Information System, Third Canadian Edition

Rainer

Legal Notice Copyright © 2014 by John Wiley & Sons Canada, Ltd. or related companies. All rights reserved.

The data contained in these files are protected by copyright. This manual is furnished under licence and may be used only in accordance with the terms of such licence. The material provided herein may not be downloaded, reproduced, stored in a retrieval system, modified, made available on a network, used to create derivative works, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without the prior written permission of John Wiley & Sons Canada, Ltd.


Information System, Third Canadian Edition

Rainer

Tech Guide 2 Software Question Type: True/False

1) Software is typically quite complex. Answer: True Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.1 Introduction Difficulty: Easy

2) As hardware costs have decreased over the past 20 years, software costs have also decreased) Answer: False Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.1 Introduction Difficulty: Easy

3) Software consists of computer programs, which are sequences of instructions for the computer. Answer: True Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.1 Introduction Difficulty: Easy

4) Computer hardware and software are designed to be general purpose) Answer: False Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.1 Introduction Difficulty: Easy

5) Application software cannot be run on computer hardware without systems software) Answer: True Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.1 Introduction Difficulty: Easy


Information System, Third Canadian Edition

Rainer

6) Computer code is generally efficient, well designed, and contains very few errors. Answer: False Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.2 Software Issues Difficulty: Easy

7) Companies who develop software for sale license that software for use to protect their product from being copied and distributed illegally. Answer: True Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.2 Software Issues Difficulty: Easy

8) Open systems refers to a model of computer products – hardware, operating systems, and application software – that allow any computing device to be seamlessly connected to and interact with any other computing device) Answer: True Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.2 Software Issues Difficulty: Easy

9) The operating system supervises the overall operation of the computer. Answer: True Learning Objective: Differentiate between the two major types of software and describe the general functions of the operating system. Section Reference: TG 2.3 Systems Software Difficulty: Easy

10) The user interface is the most sophisticated on enterprise operating systems and the least sophisticated on desktop operating systems. Answer: False Learning Objective: Differentiate between the two major types of software and describe the general functions of the operating system.


Information System, Third Canadian Edition

Rainer

Section Reference: TG 2.3 Systems Software Difficulty: Easy

11) Packaged application software addresses a specific or unique business need for a company. Answer: True Learning Objective: Identify the major types of application software. Section Reference: TG 2.4 Application Software Difficulty: Easy

12) Off-the-shelf application software consists of specific software programs developed for a particular company by a software vendor. Answer: False Learning Objective: Identify the major types of application software. Section Reference: TG 2.4 Application Software Difficulty: Easy

13) Personal application software consists of widely used packages such as word processing, spreadsheet, communications, and graphics software) Answer: True Learning Objective: Identify the major types of application software. Section Reference: TG 2.4 Application Software Difficulty: Easy 14) Open-source software is not licensed. Answer: False Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.4 Application Software Difficulty: Medium

15) Debugging is one of the most expensive and time-consuming components of software installation. Answer: True Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.4 Application Software Difficulty: Medium


Information System, Third Canadian Edition

Rainer

16)Application software allows system software to run. Answer: False Learning Objective: Identify the major types of application software. Section Reference: TG 2.4 Application Software Difficulty: Easy

Question Type: Multiple Choice

17) Over the past 20 years, hardware costs have _____, while software costs have _____. a) Increased, increased b) Decreased, decreased c) Decreased, increased d) Increased, decreased e) Increased, remained level Answer: c Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.1 Introduction Difficulty: Medium

18) Today, software comprises a larger percentage of the cost of modern computer systems than it did in the early 1950s. Which of the following reasons account(s) for this development? a) Hardware costs have decreased. b) Hardware performance has increased. c) Software has become increasingly complex. d) Building software applications remains slow, complex, and error-prone. e) All of these Answer: e Learning Objective: Discuss the major software issues that confront modern organizations.. Section Reference: TG 2.1 Introduction Section Reference: TG 2.1 Introduction to Software Difficulty: Medium

19) Which of the following is not a reason why software currently comprises a larger percentage of the cost of modern computer systems than it did in the early 1950s?


Information System, Third Canadian Edition

Rainer

a) Hardware costs have increased. b) Hardware performance has increased c) Software has become increasingly complex. d) Building software applications remains slow, complex, and error-prone. e) None of these Answer: a Learning Objective: Discuss the major software issues that confront modern organizations.. Section Reference: TG 2.1 Introduction Difficulty: Medium

20) Which of the following is not an overall trend in software? a) Increased complexity b) Increased cost c) Increased number of errors d) Increased amount of mainframe software written by users e) Increasing percentage of the costs of information systems Answer: d Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.2 Software Issues Difficulty: Medium

21) _____ is(are) a written description of a computer program’s functions. a) Explanatory instructions b) Documentation c) Graphical user interface d) Plug and play e) README files Answer: b Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.1 Introduction Difficulty: Easy

22) The overall trends in software include all of the following except: a) Increased complexity. b) Increased cost. c) Increased number of defects. d) Increased security.


Information System, Third Canadian Edition

Rainer

e) Increasing percentage of the costs of modern computer systems. Answer: d Learning Objective: Discuss the major software issues that confront modern organizations.. Section Reference: TG 2.1 Introduction Difficulty: Easy

23) The _____ complexity of software results in a _____ potential for errors. a) Decreasing, decreasing b) Decreasing, increasing c) Increasing, decreasing d) Increasing, level e) Increasing, increasing Answer: e Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.1 Introduction Difficulty: Medium

24) _____ are sequences of instructions used to direct the workings of a computer. a) Computer programs b) Microcode instructions c) Assembler commands d) Systems software e) Input/output instructions Answer: a Learning Objective: Discuss the major software issues that confront modern organizations.. Section Reference: TG 2.1 Introduction Difficulty: Easy

25) The set of computer programs used to manage hardware resources is called: a) Microsoft Office Suite. b) Application software. c) General software. d) Systems software. e) Personal application software. Answer: d


Information System, Third Canadian Edition

Rainer

Learning Objective: Discuss the major software issues that confront modern organizations.. Section Reference: TG 2.1 Introduction Difficulty: Medium

26) The set of computer instructions that provides specific functionality to a user is called: a) Transaction processing software. b) Application software. c) General software. d) Systems software. e) Microcode Answer: b Learning Objective: Discuss the major software issues that confront modern organizations.. Section Reference: TG 2.1 Introduction Difficulty: Easy

27) Which of the following is not a characteristic of today’s typical software? a) It s efficient. b) It is full of errors. c) It is poorly designed. d) It is expensive. e) It is an art as well as a science. Answer: a Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.2 Software Issues Difficulty: Medium

28) The concept of _____ refers to competing computing products working together. a) Open-source software b) Software-as-a-Service c) Object-oriented software d) Application software packages e) Open systems Answer: e Learning Objective: Analyze the advantages and disadvantages of open-source software. Section Reference: TG 2.2 Software Issues Difficulty: Easy


Information System, Third Canadian Edition

Rainer

29) In order to protect their software from illegal distribution, vendors often rely on _____. a) Secure packaging b) Private security agents c) Software licensing d) Internet-based distribution methods e) Personal honesty Answer: c Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.1 Software Issues Difficulty: Easy

30) _____ is software whose source code is available at no cost to developers and users. a) Freeware b) Shareware c) Open systems d) Open-source software e) Software-as-a-Service Answer: d Learning Objective: Analyze the advantages and disadvantages of open-source software. Section Reference: TG 2.2 Software Issues Difficulty: Easy

31) Which of the following is not an advantage of open-source software? a) It produces high-quality code. b) It produces code that can be changed to meet the user’s needs. c) Bugs are discovered quickly. d) Support is available only through online communities of core developers. e) It produces reliable code. Answer: d Learning Objective: Analyze the advantages and disadvantages of open-source software. Section Reference: TG 2.2 Software Issues Difficulty: Medium

32) Which of the following is not a function of the operating system?


Information System, Third Canadian Edition

Rainer

a) It allocates CPU time and main memory to programs running on the computer. b) It provides an interface between the user and the hardware. c) It supervises the overall operation of the computer. d) It increases the complexity of the system to the user. e) None of these Answer: d Learning Objective: Differentiate between the two major types of software and describe the general functions of the operating system. Section Reference: TG 2.3 Systems Software Difficulty: Medium

33) The main system control program is the _____. a) Operating system b) Cache software c) Virtual memory d) Security monitor e) Multithread register Answer: a Learning Objective: Differentiate between the two major types of software and describe the general functions of the operating system. Section Reference: TG 2.3 Systems Software Difficulty: Easy

34) The _____ allows users to exert direct control of icons on the computer screen. a) Systems software b) Application software c) Graphical user interface d) Plug-and-play e) Operating system Answer: c Learning Objective: Differentiate between the two major types of software and describe the general functions of the operating system. Section Reference: TG 2.3 Systems Software Difficulty: Easy

35) Creating specific application software using an organization’s own resources is called ____ .


Information System, Third Canadian Edition

Rainer

a) Outsourcing b) Consultant-based development c) In-house development d) Contract software e) Documentation Answer: c Learning Objective: Identify the major types of application software. Section Reference: TG 2.4 Application Software Difficulty: Easy

36) _____ programs are often used to analyze financial data) a) Database b) Word processing c) Spreadsheet d) Graphics e) Communications Answer: c Learning Objective: Identify the major types of application software. Section Reference: TG 2.4 Application Software Difficulty: Easy

37) Jun is getting ready to open a store in her home town to sell unique lamp bases and shades. She has bought a laptop to use in the store for all of her operating needs. One of the first applications she needs is one to handle her accounting and checkbook. How might she obtain such an application? a) Open-source software b) Software-as-a-Service c) Object-oriented software d) Application software package e) Open systems Answer: d Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.2 Software Issues Difficulty: Easy

38) Jun has bought an accounting package for her business, which involves selling unique lamp bases and shades. She wants to hire some part-time help to assist her in implementing and becoming


Information System, Third Canadian Edition

Rainer

comfortable with the new software.. Which of the follow skill sets would be the most beneficial for this worker to possess? a) Business processes b) Operating systems c) Programming languages d) HTML e) Open systems Answer: a Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.2 Software Issues Difficulty: Medium

39) Jun has bought an accounting package for her business, which involves selling unique lamp bases and shades. She and a part-time employee are getting up to speed on the package but are having trouble matching her business processes to the software) What does Jun have to do to make the software more effective? a) Change the UI b) Change the way the program works c) Change her business processes to match the software d) Install an updated version of the software e) Hire another part-time worker to help Answer: c Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.2 Software Issues Difficulty: Medium

40) ____________ is the sequence of instructions for the computer. a) Computer program b) Software c) Stored program concept d) Documentation Answer: a Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: Introduction Difficulty: Easy


Information System, Third Canadian Edition

Rainer

41) _______________ is a set of computer instructions that provide more specific functionality to a user. a) Application software b) Documentation c) Hardware d) Systems software Answer: a Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: Introduction Difficulty: Easy

42) ______________ software is available at no cost to developers or users. a) Free b) Proprietary c) Open source d) Operating system Answer: c Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: Introduction Difficulty: Easy

43) ____________ refers to a group of computing products that work together. a) Collaboration b) Open source software c) Open systems d) Stored program concept Answer: c Learning Objective: Analyze the advantages and disadvantages of open-source software. Section Reference: Software Issues Difficulty: Medium

44) Which of the following is NOT a benefit of open source software? a) Compatibility b) Flexibility c) High quality d) Reliability


Information System, Third Canadian Edition

Rainer

Answer: a Learning Objective: Analyze the advantages and disadvantages of open-source software. Section Reference: Software Issues Difficulty: Medium

45) The ____________ is the main system control program, which supervises the overall operations of the computer, allocates CPU time and main memory to programs, and provides an interface between the user and the hardware. a) application software b) GUI c) operating system d) social interface Answer: c Learning Objective: Analyze the advantages and disadvantages of open-source software. Section Reference: Systems Software Difficulty: Easy

46) The paperclip in Microsoft Office is an example of a ____________. a) application software program b) GUI c) operating system program d) social interface Answer: d Learning Objective: Differentiate between the two major types of application software. Section Reference: Systems Software Difficulty: Medium

47) Linux is a(n) _________, ___________. a) open source, application software program b) open source, operating system c) proprietary, application software program d) proprietary, operating system Answer: b Learning Objective: Describe the advantages and disadvantages associated with systems software.


Information System, Third Canadian Edition

Rainer

Section Reference: Systems Software Difficulty: Medium

48) ___________ is NOT an example of application software. a) Desktop publishing b) GUI c) Personal finance d) Spreadsheet Answer: b Learning Objective: Identify the major types of application software. Section Reference: Application Software Difficulty: Easy

49) _______________ provides the tools for data retrieval, modification, deletion, and insertion. a) Communication b) Data management c) Desktop publishing d) Personal information management Answer: b Learning Objective: Identify the major types of application software. Section Reference: Application Software Difficulty: Easy

50) ______________ is(are) a general-purpose, off-the-shelf application program designed to help individual users increase their productivity. a) A package b) A browser c) Personal application software d) Presentation graphics Answer: c Learning Objective: Identify the major types of application software. Section Reference: Application Software Difficulty: Medium

Question Type: Essay


Information System, Third Canadian Edition

Rainer

51) Discuss the reasons why software is more costly than hardware in today’s information systems. Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.1 Introduction Difficulty: Hard

52) What are the overall trends in software? Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.1 Introduction Difficulty: Medium

53) Describe the various types of application software. Learning Objective: Identify the major types of application software. Section Reference: TG 2.4 Application Software Difficulty: Medium

54) Discuss the importance of software defects. Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.2 Software Issues Difficulty: Medium

55) Describe the factors to be considered for software selection. Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: TG 2.2 Software Issues Difficulty: Medium

56) Discuss the importance of software licensing. Learning Objective: LO TG2.1 Discuss the major software issues that confront modern organizations. Section Reference: TG 2.2 Software Issues Difficulty: Medium

Question Type: Fill-in-the-Blank

57) ______________ is a set of computer programs that enable the hardware to process data.


Information System, Third Canadian Edition

Rainer

Answer: Software Learning Objective: Discuss the major software issues that confront modern organizations. Section Reference: Introduction Difficulty: Easy

58) ___________ written description of the program’s functions. Answer: Documentation Learning Objective: Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference: Introduction Difficulty: Easy

59) _________ refers to a computer program that has been developed by a vendor and is available for purchase in a prepackaged form. Answer: Package Learning Objective: Identify the major types of application software. Section Reference: Application Software Difficulty: Easy


Information System, Third Canadian Edition

Rainer

Legal Notice Copyright © 2014 by John Wiley & Sons Canada, Ltd. or related companies. All rights reserved.

The data contained in these files are protected by copyright. This manual is furnished under licence and may be used only in accordance with the terms of such licence. The material provided herein may not be downloaded, reproduced, stored in a retrieval system, modified, made available on a network, used to create derivative works, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without the prior written permission of John Wiley & Sons Canada, Ltd.


Information System, Third Canadian Edition

Rainer

Tech Guide 3 Emerging types of enterprise computing Question Type: True/False

1) Entering data and programs from user departments to the mainframe was called remote data entry. Answer: False Learning Objective: Describe the evolution of IT infrastructure. Section Reference: TG 3.1 Introduction Difficulty: Medium

2) MIS departments embraced the arrival of personal computers in the work place. Answer: False Learning Objective: Describe the evolution of IT infrastructure. Section Reference: TG 3.1 Introduction Difficulty: Easy

3) Mainframe computers are no longer being used. Answer: False Learning Objective: Describe the evolution of IT infrastructure. Section Reference: TG 3.1 Introduction Difficulty: Easy

4) Companies are building massive data centers called computer floors to meet their processing needs. Answer: False Learning Objective: Describe a server farm. Section Reference: TG 3.2 Server Farms Difficulty: Easy

5) Server farms can be located just about anywhere. Answer: False Learning Objective: Describe a server farm.


Information System, Third Canadian Edition

Rainer

Section Reference: TG 3.2 Server Farms Difficulty: Medium

6) Server virtualization uses software-based partitions to create multiple virtual servers on a single physical server. Answer: True Learning Objective: Define virtualization, and discuss its advantages. Section Reference: TG 3.3 Virtualization Difficulty: Medium

7) Grid computing combines processing resources to form a virtual supercomputer. Answer: True Learning Objective: Define grid computing, and discuss its advantages. Section Reference: TG 3.4 Grid Computing Difficulty: Easy

8) Any application can run on a grid computing system Answer: False Learning Objective: Define grid computing, and discuss its advantages. Section Reference: TG 3.4 Grid Computing Difficulty: Medium

9) Utility computing is also called on-demand computing. Answer: True Learning Objective: Define utility computing, and discuss its advantages. Section Reference: TG 3.5 Utility Computing Difficulty: Easy

10) The “cloud” in cloud computing is composed of computers, the software on those computers, and the network connections among those computers. Answer: True Learning Objective: Define cloud computing, and analyze its advantages and disadvantages. Section Reference: TG 3.6 Cloud Computing


Information System, Third Canadian Edition

Rainer

Difficulty: Easy

11) The primary advantage of cloud computing is that it is easier for users to do their work. Answer: False Learning Objective: Define cloud computing, and analyze its advantages and disadvantages. Section Reference: TG 3.6 Cloud Computing Difficulty: Easy

12) Customers that are using software-as-a-service are not using cloud computing. Answer: False Learning Objective: Define cloud computing, and analyze its advantages and disadvantages. Section Reference: TG 3.6 Cloud Computing Difficulty: Easy

13) Web macros allow IT professionals to combine features so that applications on almost any device can work together. Answer: False Learning Objective: Define and discuss Web services and service-oriented architecture. Section Reference: TG 3.7 Emerging Software Trends Difficulty: Easy

14) XML makes it easier to exchange data among applications. Answer: True Learning Objective: Define and discuss Web services and service-oriented architecture. Section Reference: TG 3.7 Emerging Software Trends Difficulty: Medium

15) XML is a more powerful language than HTML. Answer: True Learning Objective: Define and discuss Web services and service-oriented architecture. Section Reference: TG 3.7 Emerging Software Trends Difficulty: Medium


Information System, Third Canadian Edition

Rainer

16) XML tags data. Answer: True Learning Objective: Define and discuss Web services and service-oriented architecture. Section Reference: TG 3.7 Emerging Software Trends Difficulty: Easy

17) Simple object access protocol (SOAP) defines how messages can be exchanged through the use of HTML. Answer: False Learning Objective: Define and discuss Web services and service-oriented architecture. Section Reference: TG 3.7 Emerging Software Trends Difficulty: Medium

18) Web services description language (WSDL) is used to create XML documents. Answer: True Learning Objective: Define and discuss Web services and service-oriented architecture. Section Reference: TG 3.7 Emerging Software Trends Difficulty: Easy

19) UDDI is a registry of descriptions of Web services. Answer: True Learning Objective: Define and discuss Web services and service-oriented architecture. Section Reference: TG 3.7 Emerging Software Trends Difficulty: Easy

20) A service-oriented architecture is an IT architecture that makes it possible to build business applications using Web services. Answer: True Learning Objective: Define and discuss Web services and service-oriented architecture. Section Reference: TG 3.7 Emerging Software Trends Difficulty: Easy


Information System, Third Canadian Edition 21) Originally, IT was the only with access to technology. Answer: True Learning Objective: Describe the evolution of IT infrastructure. Section Reference: Introduction Difficulty: Easy

22) Small organizations are more likely to have server farms than larger organizations. Answer: False Learning Objective: Describe a server farm. Section Reference: Server Farms Difficulty: Easy

Question Type: Multiple Choice

23) One of the advantages of a server farm is: a) It takes less than an hour to add a server to the server farm. b) Running many servers is less expensive. c) If one server fails, an application can be automatically moved to another one. d) Fewer people are required to run many machines. e) Servers can be stacked on top of one another, so less space is needed. Answer: c Learning Objective: Describe a server farm. Section Reference: TG 3.2 Server Farms Difficulty: Medium

24) Server virtualization a) Can function only within server farms. b) Uses software to build multiple virtual servers on the same machine. c) Requires changes to applications. d) Requires a license for each virtual server. e) Requires no additional security Answer: b Learning Objective: Define virtualization, and discuss its advantages. Section Reference: TG 3.3 Virtualization

Rainer


Information System, Third Canadian Edition Difficulty: Easy

25) Which of the following is not a benefit of employing server virtualization? a) Cost savings in space b) Cost savings in energy c) Cost savings in customer service d) Cost savings in maintenance e) Cost savings in personnel Answer: c Learning Objective: Define virtualization, and discuss its advantages. Section Reference: TG 3.3 Virtualization Difficulty: Easy

26) Grid computing a) Runs an application on one server. b) Is ideal for transaction processing systems. c) Divides the processing of an application among servers. d) Does not require any special software. e) Is difficult to scale up. Answer: c Learning Objective: Define grid computing, and discuss its advantages. Section Reference: TG 3.4 Grid Computing Difficulty: Medium

27) Which of the following is not a benefit of grid computing? a) It enables efficient use of computing resources. b) It enables applications to run faster. c) There is no single point of failure. d) It reduces the number of applications. e) It makes it easier to scale up or down. Answer: d Learning Objective: Define grid computing, and discuss its advantages. Section Reference: TG 3.4 Grid Computing Difficulty: Medium

Rainer


Information System, Third Canadian Edition

Rainer

28) Utility computing a) Is the same as grid computing. b) Is called on-demand computing. c) Can be offered by any company with excess resources. d) Charges customers a flat rate. e) Is the same as cloud computing. Answer: b Learning Objective: Define utility computing, and discuss its advantages. Section Reference: TG 3.5 Utility Computing Difficulty: Medium

29) Which of the following statements concerning cloud computing is not true? a) Users access computers in the cloud, usually via the Internet. b) The cloud includes computers, software, and a network. c) A cloud can be private or public. d) A cloud is usually a server farm. e) Data are stored on the user’s computer Answer: e Learning Objective: Define cloud computing, and analyze its advantages and disadvantages. Section Reference: TG 3.6 Cloud Computing Difficulty: Medium

30) Which of the following is not a disadvantage of cloud computing? a) Privacy b) Security c) Reliability d) Costs e) Loss of control Answer: d Learning Objective: Define cloud computing, and analyze its advantages and disadvantages. Section Reference: TG 3.6 Cloud Computing Difficulty: Easy

31) Which of the following is not a service of cloud computing? a) Cloud infrastructure as a service


Information System, Third Canadian Edition

Rainer

b) Cloud data storage as a service c) Cloud platform as a service d) Cloud software as a service e) All of these are services of cloud computing. Answer: b Learning Objective: Define cloud computing, and analyze its advantages and disadvantages. Section Reference: TG 3.6 Cloud Computing Difficulty: Medium

32) Which of the following is not a benefit of using Web services? a) New applications can be developed quickly. b) Users can access data without knowing where the data are. c) Organizations can use the Internet infrastructure without having to implement any new technologies. d) Web services enable IT professionals to use shared protocols to build applications. e) Using Web services does not require any new skill sets. Answer: e Learning Objective: Define and discuss Web services and service-oriented architecture. Section Reference: TG 3.7 Emerging Software Trends Difficulty: Medium

33) Which of the following is not a key protocol of Web services? a) HTML b) SOAP c) XML d) WSDL e) UDDI Answer: a Learning Objective: Define and discuss Web services and service-oriented architecture. Section Reference: TG 3.7 Emerging Software Trends Difficulty: Easy

34) A service-oriented architecture a) Is one in which the servers are supporting multiple mobile devices. b) Enables Web services to be reused across an organization. c) Is a type of cloud computing. d) Is focused on user response.


Information System, Third Canadian Edition

Rainer

e) Places servers closest to the primary user. Answer: b Learning Objective: Define and discuss Web services and service-oriented architecture. Section Reference: TG 3.7 Emerging Software Trends Difficulty: Medium

35) Hyo runs an ice cream store with her family. Which of the following technologies might be a good source of computing for the store? a) Server farm b) Grid computing c) Cloud computing d) Utility computing e) Virtualization Answer: c Learning Objective: Define cloud computing, and analyze its advantages and disadvantages. Section Reference: Emerging Software Trends Difficulty: Medium

36) Travis is the VP of Operations for a company that owns and operates six ski areas around the world. Which of the following might be a good source of computing for the company? a) Server farm b) Grid computing c) Cloud computing d) Utility computing e) Virtualization Answer: c Learning Objective: Define cloud computing, and analyze its advantages and disadvantages. Section Reference: Technology Guide 3 Difficulty: Medium

37) Paula owns a variety store in a tourist town. The store recently went online, and the response has been remarkable. The store’s current infrastructure is running close to capacity, so handling the influx of orders is taking much longer than it should. Which of the following suggestions might be the best solution for the company? a) Add another server to their infrastructure. b) Use grid computing to process the orders across many servers.


Information System, Third Canadian Edition c) Use cloud computing services. d) Use the services of a utility computing provider. e) Convert their existing servers to virtual services. Answer: a Learning Objective: Describe a server farm. Section Reference: Technology Guide 3 Difficulty: Medium

38) What was the earliest stage in the evolution of the IT infrastructure? a) Enterprise computing b) Local area networks c) Standalone mainframes d) Standalone personal computers Answer: c Learning Objective: Describe the evolution of IT infrastructure. Section Reference: Introduction Difficulty: Easy

39) What is the most recent change in the evolution of the IT infrastructure? a) Enterprise computing b) Local area networks c) Mainframe and dumb terminals d) Cloud computing and mobile computing Answer: d Learning Objective: Describe the evolution of IT infrastructure. Section Reference: Introduction Difficulty: Easy 40) __________ first allowed people to be more productive and share resources. a) Enterprise computing b) Local area networks c) Mainframe and dumb terminals d) Cloud computing and mobile computing Answer: b Learning Objective: Describe the evolution of IT infrastructure.

Rainer


Information System, Third Canadian Edition

Rainer

Section Reference: Introduction Difficulty: Medium

41) ____________ first allowed people to share pools of resources over a network, usually the Internet. a) Mainframe and dumb terminals b) Local area networks c) Enterprise computing d) Cloud computing and mobile computing Answer: d Learning Objective: Describe the evolution of IT infrastructure. Section Reference: Introduction Difficulty: Medium

42) Which of the following is FALSE about server farms? a) They provide redundancy. b) They provide fault tolerance. c) They are inexpensive. d) They are comprised of hundreds of thousands of computers. Answer: c Learning Objective: Describe a server farm. Section Reference: Server Farms Difficulty: Easy

43) _____________ is used to create partitions on a single server so that multiple applications can run on a single server. a) A server farm b) Cloud computing c) Grid computing d) Server virtualization Answer: d Learning Objective: Define virtualization, and discuss its advantages. Section Reference: Virtualization Difficulty: Easy

44) Which of the following is NOT a benefit of virtualization?


Information System, Third Canadian Edition

Rainer

a) Agility b) Cost savings c) Easy to create d) Service-oriented IT department Answer: c Learning Objective: Define virtualization, and discuss its advantages. Section Reference: Virtualization Difficulty: Easy

45) Which of the following is NOT a benefit of grid computing? a) Cost b) Faster applications c) Fault tolerance d) Scalability Answer: a Learning Objective: Define grid computing, and discuss its advantages. Section Reference: Grid Computing Difficulty: Easy

46) Grid computing involves applying the resources of ________ computer(s) in a network to __________ problem(s) at the same time. a) many, a single b) many, many c) a single, a single d) a single, many Answer: a Learning Objective: Define grid computing, and discuss its advantages. Section Reference: Grid Computing Difficulty: Easy

47) ______________ makes computing resources and infrastructure management available to a customer as needed. a) Cloud computing b) Grid computing c) Utility computing


Information System, Third Canadian Edition

Rainer

d) Virtualization Answer: c Learning Objective: Define utility computing, and discuss its advantages. Section Reference: Utility Computing Difficulty: Easy

48) Which of the following is an advantage of cloud computing? a) Cost b) Privacy c) Reliability d) Security Answer: a Learning Objective: Define cloud computing, and analyze its advantages and disadvantages. Section Reference: Cloud Computing Difficulty: Medium

49) _________ as a Service is a service that delivers applications over the cloud. a) Infrastructure b) Platform c) Software d) Technology Answer: c Learning Objective: Define cloud computing, and analyze its advantages and disadvantages. Section Reference: Cloud Computing Difficulty: Easy

50) __________ as a Service supports the deployment of entire systems. a) Infrastructure b) Platform c) Software d) Technology Answer: b Learning Objective: Define cloud computing, and analyze its advantages and disadvantages. Section Reference: Cloud Computing


Information System, Third Canadian Edition

Rainer

Difficulty: Easy

51) ______________ allow(s) systems to “talk” to each other without human intervention. a) Cloud computing b) Grid computing c) Virtualization d) Web services Answer: d Learning Objective: Define and discuss Web services and service-oriented architecture. Section Reference: Emerging Software Trends Difficulty: Medium

52) Which of the following is NOT an advantage of web services? a) Can quickly create a new infrastructure b) Can access data without understanding the process c) Can create new applications quickly and easily d) Can easily automate business processes Answer: A Learning Objective: Define and discuss Web services and service-oriented architecture. Section Reference: Emerging Software Trends Difficulty: Medium

53) _______________ facilitate(s) the reuse of web services. a) Application programs b) Cloud computing c) Grid computing d) Service-oriented architectures Answer: d Learning Objective: Define and discuss Web services and service-oriented architecture. Section Reference: Emerging Software Trends Difficulty: Medium

54) __________ makes it easier to exchange data among applications and interpret the data. a) SOAP


Information System, Third Canadian Edition

Rainer

b) UDDI c) WSDL d) XML Answer: d Learning Objective: Define and discuss Web services and service-oriented architecture. Section Reference: Emerging Software Trends Difficulty: Medium

55) ___________ is used to create XML documents that describe tasks performed by various web services. a) SOAP b) UDDI c) WSDL d) XML Answer: c Learning Objective: Define and discuss Web services and service-oriented architecture. Section Reference: Emerging Software Trends Difficulty: Medium

Question Type: Essay

56) Discuss virtualization and its advantages Learning Objective: Define virtualization, and discuss its advantages. Section Reference: TG 3.3 Virtualization Difficulty: Easy

57) Discuss grid computing and its advantages Learning Objective: Define grid computing, and discuss its advantages. Section Reference: TG 3.4 Grid Computing Difficulty: Easy

58) Compare and contrast grid computing and utility computing. Learning Objective: Define grid computing, and discuss its advantages. Learning Objective: Define utility computing, and discuss its advantages. Section Reference: TG 3.4 Grid Computing


Information System, Third Canadian Edition

Rainer

Section Reference: TG 3.5 Utility Computing Difficulty: Medium

59) Discuss Web services. Learning Objective: Define and discuss Web services and service-oriented architecture. Section Reference: TG 3.7 Emerging Software Trends Difficulty: Easy

60) Define cloud computing, and discuss its advantages and disadvantages. Learning Objective: Define cloud computing, and analyze its advantages and disadvantages. Section Reference: TG 3.6 Cloud Computing Difficulty: Medium

61) Compare and contrast cloud computing and service-oriented architecture. Learning Objective: Define cloud computing, and analyze its advantages and disadvantages. Learning Objective: Define and discuss Web services and service-oriented architecture. Section Reference: TG 3.6 Cloud Computing Section Reference: TG 3.7 Emerging Software Trends: Web Services Difficulty: Medium

62) Define each of the following terms, and explain how they are related: XML, SOAP, WSDL, and UDDI. Learning Objective: Define and discuss Web services and service-oriented architecture. Section Reference: TG 3.7 Emerging Software Trends Difficulty: Medium

Question Type: Fill-in-the-Blank

63) __________ contain hundreds of thousands of networked computer servers. Answer: Server farms Learning Objective: Describe a server farm. Section Reference: Server Farms Difficulty: Easy

64) A ________ cloud is maintained by an external cloud service provider, accessed through the Internet, and available to the general public.


Information System, Third Canadian Edition

Rainer

Answer: public Learning Objective: LO TG3.6 Define cloud computing, and analyze its advantages and disadvantages. Section Reference: Cloud Computing Difficulty: Easy


Information System, Third Canadian Edition

Rainer

Legal Notice Copyright © 2014 by John Wiley & Sons Canada, Ltd. or related companies. All rights reserved.

The data contained in these files are protected by copyright. This manual is furnished under licence and may be used only in accordance with the terms of such licence. The material provided herein may not be downloaded, reproduced, stored in a retrieval system, modified, made available on a network, used to create derivative works, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without the prior written permission of John Wiley & Sons Canada, Ltd.


Information System, Third Canadian Edition

Rainer

Tech Guide 4 Intelligent Systems

Question Type: True/False

1) Artificial intelligence is perishable, whereas natural intelligence is permanent from an organizational point of view. Answer: False Learning Objective: Differentiate between artificial intelligence and human intelligence. Learning Objective 1: TG 4.1 Introduction to Intelligent Systems Difficulty: Easy

2) It is difficult to document the knowledge of artificial intelligence, but it is easy to document the knowledge of natural intelligence. Answer: False Learning Objective: Differentiate between artificial intelligence and human intelligence. Learning Objective 1: TG 4.1 Introduction to Intelligent Systems Difficulty: Easy

3) Expertise refers to the extensive, task-specific knowledge acquired from training, reading, and experience. Answer: True Learning Objective: Define expert systems, and provide examples of their use. Learning Objective 1: TG 4.2 Expert Systems Difficulty: Easy

4) Expert systems attempt to mimic human experts by applying expertise in a specific domain. Answer: True Learning Objective: Define expert systems, and provide examples of their use. Learning Objective 1: TG 4.2 Expert Systems Difficulty: Easy

5) An expert system has a knowledge base and an inference engine.


Information System, Third Canadian Edition

Answer: True Learning Objective: Define expert systems, and provide examples of their use. Learning Objective 1: TG 4.2 Expert Systems Difficulty: Easy

6) One problem with expert systems is they decrease quality. Answer: False Learning Objective: Define expert systems, and provide examples of their use. Learning Objective 1: TG 4.2 Expert Systems Difficulty: Easy

7) A neural network has two layers of interconnected nodes. Answer: False Learning Objective: Define neural networks, and provide examples of their use. Learning Objective 1: TG 4.3 Neural Networks Difficulty: Easy

8) Fuzzy logic defines subjective concepts. Answer: True Learning Objective: Define fuzzy logic, and provide examples of its use. Learning Objective 1: TG 4.4 Fuzzy Logic Difficulty: Easy

9) A genetic algorithm finds the combination of inputs that produces the best outputs. Answer: True Learning Objective: Define genetic algorithms, and provide examples of their use. Learning Objective 1: TG 4.5 Genetic Algorithms Difficulty: Easy

10) Intelligent agents use expert systems and fuzzy logic to create their behavior. Answer: True

Rainer


Information System, Third Canadian Edition Learning Objective: Define intelligent agents, and provide examples of their use. Learning Objective 1: TG 4.6 Intelligent Agents Difficulty: Easy

11) The goal of artificial intelligence is to completely replace human intelligence. Answer: False Learning Objective: Differentiate between artificial intelligence and human intelligence. Learning Objective 1: Introduction to Intelligent Systems Difficulty: Easy 12) The explanation subsystem is used to justify recommendations.

Answer: True Learning Objective: Define expert systems, and provide examples of their use. Learning Objective 1: Expert Systems Difficulty: Easy

13) Neural networks simulate the underlying concepts of the biological brain. Answer: True Learning Objective: Define neural networks, and provide examples of their use. Learning Objective 1: Neural Networks Difficulty: Easy

14) Neural networks require complete inputs to be effective. Answer: False Learning Objective: Define neural networks, and provide examples of their use. Learning Objective 1: Neural Networks Difficulty: Easy

15) Fuzzy logic can only address problems that are black and white. Answer: False Learning Objective: Define fuzzy logic, and provide examples of its use. Learning Objective 1: Fuzzy Logic Difficulty: Easy

Rainer


Information System, Third Canadian Edition

Rainer

16) Google uses fuzzy logic. Answer: True Learning Objective: Define fuzzy logic, and provide examples of its use. Learning Objective 1: Fuzzy Logic Difficulty: Medium

17) A genetic algorithm is an optimizing method that finds the combination of outputs that produces the best inputs. Answer: False Learning Objective: Define genetic algorithms, and provide examples of their use. Learning Objective 1: Genetic Algorithms Difficulty: Easy

18) A shopping bot is also called a personal agent. Answer: False Learning Objective: Define intelligent agents, and provide examples of their use. Learning Objective 1: Intelligent Agents Difficulty: Easy

19) A user agent is also called a personal agent. Answer: True Learning Objective: Define intelligent agents, and provide examples of their use. Learning Objective 1: Intelligent Agents Difficulty: Easy

20) Which of the following is not a characteristic of natural intelligence? a) It is perishable from an organizational point of view. b) It is easy, fast, and inexpensive. c) It is erratic and inconsistent. d) It is highly creative. e) It makes use of a wide context of experiences. Answer: b


Information System, Third Canadian Edition

Learning Objective: Differentiate between artificial intelligence and human intelligence. Learning Objective 1: TG 4.1 Introduction to Intelligent Systems Difficulty: Medium

21) Which of the following is not a characteristic of artificial intelligence? a) It is permanent. b) It is easy, fast, and inexpensive. c) It is highly creative. d) It tends to be effective only in narrow domains. e) It is consistent and thorough. Answer: c Learning Objective: Differentiate between artificial intelligence and human intelligence. Learning Objective 1: TG 4.1 Introduction to Intelligent Systems Difficulty: Medium

22) Expert systems: a) solve problems that are too difficult for human experts b) are based on procedural computer programming languages c) work in specific domains d) can apply to any business problem e) share characteristics with mainframe computing Answer: c Learning Objective: Define expert systems, and provide examples of their use. Learning Objective 1: TG 4.2 Expert Systems Difficulty: Medium

23) Which of the following statements is false? a) Expert systems cannot replace decision makers. b) Expert systems apply expertise in a specific domain. c) Expert systems capture the expertise from a domain expert (a person). d) Expert systems can be embedded in larger systems. e) Expert systems follow a logical path towards a recommendation. Answer: a Learning Objective: Define expert systems, and provide examples of their use. Learning Objective 1: TG 4.2 Expert Systems

Rainer


Information System, Third Canadian Edition Difficulty: Medium

24) Which of the following is not an expert system activity? a) Knowledge acquisition b) Knowledge domain c) Knowledge inferencing d) Knowledge representation e) Knowledge transfer Answer: b Learning Objective: Define expert systems, and provide examples of their use. Learning Objective 1: TG 4.2 Expert Systems Difficulty: Medium

25) An inference engine is: a) a data mining strategy used by intelligent agents b) the programming environment of an expert system c) a method of organizing expert system knowledge into chunks d) a methodology used to search through the rule base of an expert system e) the user interface of an expert system Answer: d Learning Objective: Define expert systems, and provide examples of their use. Learning Objective 1: TG 4.2 Expert Systems Difficulty: Medium

26) Which of the following statements concerning expert systems is false? a) The knowledge base contains facts. b) The knowledge base contains rules. c) An expert system can explain its recommendation. d) The blackboard displays the recommendation. e) Expert systems cannot learn from their own mistakes. Answer: d Learning Objective: Define expert systems, and provide examples of their use. Learning Objective 1: TG 4.2 Expert Systems Difficulty: Medium

Rainer


Information System, Third Canadian Edition

Rainer

27) Which of the following is not a benefit of expert systems? a) Increased output and productivity b) Capture and dissemination of scarce expertise c) Increased decision-making time d) Reliability e) Works with incomplete, uncertain information Answer: c Learning Objective: Define expert systems, and provide examples of their use. Learning Objective 1: TG 4.2 Expert Systems Difficulty: Medium

28) Which of the following is not a limitation of expert systems? a) Expert systems cannot work with incomplete or uncertain data.ans b) A process might contain too many rules to work as an expert system. c) A process might be too vague to work as an expert system. d) Decisions made by expert systems might be a potential liability. e) Expert systems need to learn from their own mistakes. Answer: a Learning Objective: Define expert systems, and provide examples of their use. Learning Objective 1: TG 4.2 Expert Systems Difficulty: Medium

29) _____ refer(s) to computer reasoning that deals with uncertainties by simulating the process of human reasoning. a) Expert systems b) Artificial neural networks c) Speech understanding systems d) Fuzzy logic e) Computer vision systems Answer: d Learning Objective: Define fuzzy logic, and provide examples of its use. Learning Objective 1: TG 4.4 Fuzzy Logic Difficulty: Medium

30) Fuzzy logic could be used to define which of the following terms:


Information System, Third Canadian Edition

Rainer

a) Gender b) Moderate income c) Age d) Address e) Income Answer: b Learning Objective: Define fuzzy logic, and provide examples of its use. Learning Objective 1: TG 4.4 Fuzzy Logic Difficulty: Medium

31) Which of the following is not a characteristic of genetic algorithms? a) Selection b) Crossover c) Transformation d) Mutation Answer: c Learning Objective: Define genetic algorithms, and provide examples of their use. Learning Objective 1: TG 4.5 Genetic Algorithms Difficulty: Medium

32) Which of the following statements is false? a) In genetic algorithms, crossover means combining portions of good outcomes. b) Generic algorithms are best suited for decision making where there are thousands of solutions. c) Users have to tell the generic algorithm what constitutes a “good” solution. d) In genetic algorithms, mutation means randomly trying combinations and evaluating the outcome. e) All of these statements are true. Answer: e Learning Objective: Define genetic algorithms, and provide examples of their use. Learning Objective 1: TG 4.5 Genetic Algorithms Difficulty: Medium

33) Which of the following statements is false? a) An intelligent agent is a software program. b) Intelligent agents are also called bots. c) Intelligent agents are always helpful. d) Intelligent agents use export systems and fuzzy logic.


Information System, Third Canadian Edition

Rainer

e) Intelligent agents perform repetitive computer-related tasks. Answer: c Learning Objective: Define intelligent agents, and provide examples of their use. Learning Objective 1: TG 4.6 Intelligent Agents Difficulty: Easy

34) Which of the following statements is false? a) Information agents search for information and store it for the user. b) Information agents are used by Google to surf the Web sites in Google’s index. c) Monitoring-and-surveillance agents are also called predictive agents. d) Personal agents take action on behalf of the user. e) User agents automatically fill out forms on the Web from stored information. Answer: a Learning Objective: Define intelligent agents, and provide examples of their use. Learning Objective 1: TG 4.6 Intelligent Agents Difficulty: Easy

35) Hyo runs an ice cream shop with her family. They need to train someone to close the store at the end of day. This process is an example of which type of intelligent system? a) Expert systems b) Neural network c) Fuzzy logic d) Genetic algorithms e) Intelligent agent Answer: a Learning Objective: Define expert systems, and provide examples of their use. Learning Objective 1: TG 4.2 Expert Systems Difficulty: Medium

36) Hyo runs an ice cream shop with her family. They have configured their computer to put any e-mail that contains the word “order” into a folder called Possible Orders. This process is an example of which type of intelligent system? a) Expert systems b) Neural network c) Fuzzy logic d) Genetic algorithms


Information System, Third Canadian Edition

Rainer

e) Intelligent agent Answer: e Learning Objective: Define intelligent agents, and provide examples of their use. Learning Objective 1: TG 4.6 Intelligent Agents Difficulty: Medium

37) Hyo runs an ice cream shop with her family. They just started letting customers fax in their ice cream orders. Sometimes the writing is hard to read, and Hyo’s family has to guess what the customers have ordered based on what flavors the shop has. This process is an example of which type of intelligent system? a) Expert systems b) Neural network c) Fuzzy logic. d) Genetic algorithms e) Intelligent agent. Answer: c Learning Objective: Define intelligent agents, and provide examples of their use. Learning Objective 1: TG 4.6 Intelligent Agents Difficulty: Medium

38) Which of the following is a characteristic of artificial intelligence? a) It is difficult to document. b) It makes use of a wide context of experiences. c) It can be erratic, inconsistent, and incomplete at times. d) It is a permanent preservation of knowledge. Answer: d Learning Objective: Differentiate between artificial intelligence and human intelligence. Learning Objective 1: Introduction to Intelligent Systems Difficulty: Easy

39) What is the primary purpose of the Turing test? a) Determine whether computers can exhibit intelligent behavior. b) Support or replace decision-makers. c) Explains recommendations provided by the computer. d) Recognize patterns within complex data.


Information System, Third Canadian Edition

Rainer

Answer: a Learning Objective: Differentiate between artificial intelligence and human intelligence. Learning Objective 1: Introduction to Intelligent Systems Difficulty: Medium

40) Which of the following is NOT an intelligent system? a) ujam b) IBM’s Watson c) Blackboard d) Norfolk Southern’s PLASMA Answer: c Learning Objective: Differentiate between artificial intelligence and human intelligence. Learning Objective 1: Introduction to Intelligent Systems Difficulty: Hard

41) ______________ attempt to mimic human experts by applying expertise in a specific domain. a) Neural networks b) Expert systems c) Genetic algorithms d) Intelligent agents Answer: b Learning Objective: Define expert systems, and provide examples of their use. Learning Objective 1: Expert Systems Difficulty: Easy

42) Which of the following is the correct order of the activities to transfer expertise from the expert to a computer? a) Acquisition, Representation, Inferencing, Transfer b) Transfer, Acquisition, Representation, Inferencing c) Acquisition, Inferencing, Representation, Transfer d) Transfer, Acquisition, Inferencing, Representation Answer: a Learning Objective: Define expert systems, and provide examples of their use. Learning Objective 1: Expert Systems Difficulty: Easy


Information System, Third Canadian Edition

Rainer

43) In this stage of transferring expertise from the expert to a computer, acquired knowledge is organized as rules or frames and stored electronically in a knowledge base. a) Acquisition b) Inferencing c) Representation d) Transfer Answer: c Learning Objective: Define expert systems, and provide examples of their use. Learning Objective 1: Expert Systems Difficulty: Easy

44) Neural networks are NOT used for _____________. a) combatting fraud b) preventing money-laundering c) airline security d) medical expertise Answer: d Learning Objective: Define neural networks, and provide examples of their use. Learning Objective 1: Neural Networks Difficulty: Medium

45) Neural networks are _________________. a) a system of programs and data structures b) used to approximate the operation of the human brain c) particularly good at recognizing subtle, hidden, and newly emerging patterns in complex data d) All of the above describe neural networks Answer: d Learning Objective: Define neural networks, and provide examples of their use. Learning Objective 1: Neural Networks Difficulty: Easy

46) _______________ is a mathematical method of handling imprecise or subjective information. a) An expert system


Information System, Third Canadian Edition b) Fuzzy logic c) A neural network d) An intelligent agent Answer: b Learning Objective: Define fuzzy logic, and provide examples of its use. Learning Objective 1: Fuzzy Logic Difficulty: Easy

47) Fuzzy logic handles _______________ concepts. a) Black and white b) Objective c) Subjective d) Well-defined Answer: c Learning Objective: Define fuzzy logic, and provide examples of its use. Learning Objective 1: Fuzzy Logic Difficulty: Easy

48) ______________ gives preference to better and better outcomes. a) Crossover b) Evolution c) Mutation d) Selection Answer: d Learning Objective: Define genetic algorithms, and provide examples of their use. Learning Objective 1: Genetic Algorithms Difficulty: Easy

49) Which of the following is NOT true of genetic algorithms? a) They work best when there are only a few possible solutions. b) They can be used to find and evaluate solutions intelligently. c) They can process many more possibilities more thoroughly and faster than humans. d) They mimic the evolutionary “survival of the fittest” process. Answer: a Learning Objective: Define genetic algorithms, and provide examples of their use.

Rainer


Information System, Third Canadian Edition

Rainer

Learning Objective 1: Genetic Algorithms Difficulty: Medium

50) Randomly trying combinations and evaluating the success (or failure) of an outcome is _________________. a) crossover b) evolution c) mutation d) selection Answer: c Learning Objective: Define genetic algorithms, and provide examples of their use. Learning Objective 1: Genetic Algorithms Difficulty: Easy

51) Combining portions of good outcomes in the hope of creating an even better outcome is _________________. a) crossover b) mutation c) selection d) testing Answer: a Learning Objective: Define genetic algorithms, and provide examples of their use. Learning Objective 1: Genetic Algorithms Difficulty: Easy

52) Intelligent agents often use ________________ behind the scenes. a) expert systems and fuzzy logic b) expert systems and neural networks c) fuzzy logic and neural networks d) fuzzy logic and genetic algorithms Answer: a Learning Objective: Define intelligent agents, and provide examples of their use. Learning Objective 1: Intelligent Agents Difficulty: Medium


Information System, Third Canadian Edition

Rainer

53) ____________ agents help customers find the products and services they need on a web site. a) Information b) Monitoring-and-surveillance c) Buyer d) User Answer: c Learning Objective: Define intelligent agents, and provide examples of their use. Learning Objective 1: Intelligent Agents Difficulty: Easy

54) A _____________ agent is software that will search several retailer websites and provide a comparison of each retailer’s offerings including price and availability. a) Buyer b) Personal c) User d) Information Answer: a Learning Objective: Define intelligent agents, and provide examples of their use. Learning Objective 1: Intelligent Agents Difficulty: Easy 55) ____________ agents constantly observe and report on some item of interest. a) Information b) Monitoring-and-surveillance c) Buyer d) User Answer: b Learning Objective: Define intelligent agents, and provide examples of their use. Learning Objective 1: Intelligent Agents Difficulty: Easy

Question Type: Essay

56) Compare and contrast expert systems and intelligent agents. Learning Objective: Define neural networks, and provide examples of their use.


Information System, Third Canadian Edition Learning Objective: Define fuzzy logic, and provide examples of its use. Learning Objective 1: TG 4.3 Neural Networks Section Reference: TG 4.4 Fuzzy Logic Difficulty: Medium

57) How are neural networks useful to businesses? Learning Objective: Define neural networks, and provide examples of their use. Learning Objective: Define fuzzy logic, and provide examples of its use. Learning Objective 1: TG 4.3 Neural Networks Section Reference: TG 4.4 Fuzzy Logic Difficulty: Medium

58) How are intelligent agents useful to businesses? Learning Objective: Define neural networks, and provide examples of their use. Learning Objective: Define fuzzy logic, and provide examples of its use. Learning Objective 1: TG 4.3 Neural Networks Section Reference: TG 4.4 Fuzzy Logic Difficulty: Medium

59) Compare and contrast fuzzy logic and neural networks. Learning Objective: Define neural networks, and provide examples of their use. Learning Objective: Define fuzzy logic, and provide examples of its use. Learning Objective 1: TG 4.3 Neural Networks Section Reference: TG 4.4 Fuzzy Logic Difficulty: Medium

60) What are the advantages and disadvantages of artificial intelligence systems? Learning Objective: Differentiate between artificial intelligence and human intelligence. Learning Objective 1: TG 4.1 Introduction to Intelligent Systems Difficulty: Hard

61) Describe how your university could use an expert system in its admissions process. Learning Objective: Define expert systems, and provide examples of their use. Learning Objective 1: TG 4.2 Expert Systems Difficulty: Hard

Rainer


Information System, Third Canadian Edition

Rainer

62) Contrast the three types of intelligent agents and give examples of how they might be used in business. Learning Objective: Define intelligent agents, and provide examples of their use. Learning Objective 1: TG 4.6 Intelligent Agents Difficulty: Hard

Question Type: Fill-in-the-Blank

63) Artificial intelligence is a subfield of computer science concerned with studying the thought processes of ____________. Answer: humans Learning Objective: Differentiate between artificial intelligence and human intelligence. Learning Objective 1: Introduction to Intelligent Systems Difficulty: Easy

64) The _________________ is a computer program that provides a methodology for reasoning and formulating conclusions. Answer: inference engine Learning Objective: Define expert systems, and provide examples of their use. Learning Objective 1: Expert Systems Difficulty: Easy

65) A _________________ is a system of programs and data structures that approximates the operation of the human brain. Answer: neural network Learning Objective: Define neural networks, and provide examples of their use. Learning Objective 1: Neural Networks Difficulty: Easy

66) Fuzzy logic is a mathematical method of handling _______________ information. Answer: imprecise or subjective Learning Objective: Define fuzzy logic, and provide examples of its use. Learning Objective 1: Fuzzy Logic Difficulty: Easy


Information System, Third Canadian Edition

Rainer

67) A ____________ mimics the evolutionary “survival-of-the-fittest” process to generate increasingly better solutions to a problem. Answer: genetic algorithm Learning Objective: Define genetic algorithms, and provide examples of their use. Learning Objective 1: Genetic Algorithms Difficulty: Easy

68) An intelligent agent is a software program that assists you, or acts on your behalf, in performing ______________________ computer-related tasks. Answer: repetitive Learning Objective: Define intelligent agents, and provide examples of their use. Learning Objective 1: Intelligent Agents Difficulty: Medium


Information System, Third Canadian Edition

Rainer

Legal Notice Copyright © 2014 by John Wiley & Sons Canada, Ltd. or related companies. All rights reserved.

The data contained in these files are protected by copyright. This manual is furnished under licence and may be used only in accordance with the terms of such licence. The material provided herein may not be downloaded, reproduced, stored in a retrieval system, modified, made available on a network, used to create derivative works, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without the prior written permission of John Wiley & Sons Canada, Ltd.


Information System, Third Canadian Edition

Rainer

Tech Guide 5 Protecting your information assets Question Type: True/False

1) As businesses improve their information security, organized crime is turning its attention to consumers. Answer: True Learning Objective: Explain why it is critical that you protect your information assets. Section Reference: TG 5.1 Introduction Difficulty: Easy

2) Social engineering attacks are a threat at work but typically not at home. Answer: False Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: TG 5.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy

3) You should ask whether your Social Security number is necessary for identification or if any combination of nine numbers and letters will do just as well. Answer: True Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: TG 5.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy

4) Using credit cards with your face on them will decrease your information security because clerks will look for your signature. Answer: False Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: TG 5.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy


Information System, Third Canadian Edition

Rainer

5) Virtual credit cards cannot be used for in-store purchases that require a traditional plastic card. Answer: True Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: TG 5.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy

6) You should keep close track of your credit card billing cycles. Answer: True Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: TG 5.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy

7) You should use debit cards because they are directly linked to your bank account and, therefore, you cannot overspend. Answer: False Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: TG 5.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy

8) Your credit card company bears the liability for fraudulent charges, regardless of when you notify them. Answer: False Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: TG 5.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy

9) You should use a Post Office box for your personal mail. Answer: True


Information System, Third Canadian Edition

Rainer

Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: TG 5.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy

10) A single-cut shredder is sufficient to shred your documents at home, whereas a cross-cut (confetti) shredder is necessary at work because your work documents are more sensitive. Answer: False Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: TG 5.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy

11) Companies that provide proactive protection of your personal information allow customers to lock their credit files. Answer: True Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: TG 5.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy

12) It is possible for criminals to gain information about many people from social networking sites. Answer: True Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Easy

13) It is OK to open an e-mail attachment as long as you know and trust the person who sent the e-mail. Answer: False Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Easy


Information System, Third Canadian Edition

Rainer

14) You should update your definitions before scanning your system with anti-malware software. Answer: True Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Easy

15) One strategy for controlling spam is to set up multiple free e-mail accounts. Answer: True Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Easy

16) It is best to use a straight-line shredder to protect your unused documents. Answer: False Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: Behavioral Actions to Protect Your Information Assets Difficulty: Easy 17) Credit card companies bear the liability for fraudulent charges, provided that they are notified within 60 days of the theft. Answer: True Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: Behavioral Actions to Protect Your Information Assets Difficulty: Easy

Question Type: Multiple Choice

18) A _____ offers you the option of shopping online with a disposable credit card number. a) Credit card b) Debit card c) Driver’s license


Information System, Third Canadian Edition

Rainer

d) Virtual credit card e) Bank card Answer: d Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: Behavioral Actions to Protect Your Information Assets Difficulty: Easy

19) Which of the following statements is not correct? a) You should use credit cards with your picture on them. b) You may use virtual credit cards for additional security. c) You should use debit cards whenever possible for additional security. d) You cannot use virtual credit cards for in-store purchases. e) Signatures on credit cards are often impossible to read. Answer: c Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: TG 5.2 Behavioral Actions to Protect Your Information Assets Difficulty: Medium

20) Your liability with credit cards is typically _____, whereas your liability with debit cards is _____. a) The amount in your bank account, your credit limit b) Your credit limit, the amount in your bank account c) The amount in your bank account, zero d) Your credit limit, zero e) Zero, the amount in your bank account Answer: e Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: TG 5.2 Behavioral Actions to Protect Your Information Assets Difficulty: Medium

21) Which of the following statements about companies that provide proactive protection of your information assets is not correct? a) These companies allow their customers to lock their credit files.


Information System, Third Canadian Edition

Rainer

b) These companies ensure that new lines of credit cannot be opened unless their clients unlock their credit files. c) These companies operate independently of the three major credit reporting agencies. d) Signing up with these companies means that merchants and banks must have verbal or written permission from their customers before opening new credit in their names. e) These companies will proactively monitor their clients’ credit files at the three credit reporting agencies. Answer: c Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: TG 5.2 Behavioral Actions to Protect Your Information Assets Difficulty: Hard

22) If your identity is stolen, what is the first thing you should do? a) Change all of your credit cards. b) Get a lawyer. c) Open a file with all of your paperwork. d) File a detailed police report. e) Notify the three major credit-reporting agencies. Answer: b Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: TG 5.2 Behavioral Actions to Protect Your Information Assets Difficulty: Medium

23) A(n) ___________ refers to software installed on your computer that controls communications to and from your computer by permitting or denying communications based on your security settings. a) Proactive monitoring package b) Anti-spyware package c) Content-filtering package d) Anti-malware package e) Personal firewall Answer: e Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Medium


Information System, Third Canadian Edition

Rainer

24) Personal firewalls perform all of the following functions except: a) They should not respond to Internet requests to ports that are not used for common Internet use. b) They should seek out the origin of malware in an attempt to block it in the future. c) They should alert you to suspicious behavior. d) They should block outbound connections that you do not initiate. e) They should tell you when a program or connection is attempting to do something that you do not want. Answer: b Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Medium

25) _____ software logs keystrokes, e-mails, applications, windows, Web sites, Internet connection, passwords, chat conversations, Web cams, and screenshots. a) Firewall b) Anti-malware c) Monitoring d) Content-filtering e) Anti-spyware Answer: c Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Easy

26) Content-filtering software performs all of the following functions except: a) Blocking access to undesirable Web sites. b) Recording all Web sites visited. c) Proactively monitoring computers to protect against malware attacks. d) Recording both sides of chat conversations. e) Enabling users to selectively filter content. Answer: c Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets


Information System, Third Canadian Edition

Rainer

Difficulty: Medium

27) Which of the following is not a reason to install proactive intrusion detection and prevention software on your computer? a) Anti-malware software is reactive. b) This software reduces your vulnerability to zero-day attacks. c) Anti-malware software requires you to update malware signatures on a regular basis. d) This software reduces your vulnerability to distributed denial-of-service attacks. e) None of these Answer: d Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Hard

28) Which of the following attacks is most closely associated with downloading and installing patches immediately? a) Denial-of-service b) Zero-day attacks c) Distributed denial-of-service d) Viruses e) Worms Answer: b Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Hard

29) Methods you should use to protect your portable devices and information include all of the following except: a) Using two-factor authentication. b) Making certain not to leave your portable devices in plain view in a car. c) Keeping your portable devices in an inconspicuous container. d) Encrypting the hard drive of your laptop. e) All of these are legitimate protection methods. Answer: e


Information System, Third Canadian Edition

Rainer

Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Medium

30) A(n) _____ is a computer to which you connect, that in turn connects to the Web site you wish to visit. a) Proxy server b) Internet server c) Intermediate server d) Backbone server e) E-mail server Answer: a Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Easy

31) A _____ cookie either originates on, or is sent to, the Web site that you are currently viewing. a) Tracking b) Monitoring c) Second-party d) Third-party e) First-party Answer: e Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Easy

32) A _____ cookie either originates on, or is sent to, a different Web site than the one you are currently viewing. a) Tracking cookie b) Monitoring cookie c) Second-party cookie d) Third-party cookie e) First-party cookie


Information System, Third Canadian Edition

Rainer

Answer: d Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Easy

33) For security in your wireless computing, you should use the _____ encryption standard, rather than the older _____ encryption standard. a) WPA, WEP b) WPA2, WPA c) WEP, WPA d) WPA2, WEP e) WEP, WPB Answer: d Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Easy

34) Which of the following is a good password? a) Your last name b) Your birth date c) Your mother’s name and her birth date d) Your driver’s license number e) Your social security number Answer: c Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: TG 5.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy

35) Your little brother came for a visit and used your laptop. You didn’t think anything of it at the time, but now your laptop is running really slow. Which of the following statements is false? a) It can’t be a worm because your anti-malware software would have blocked it. b) It can’t be a Trojan horse because your anti-spam software would have blocked it. c) It can’t be your brother’s fault because he only visited Web sites, and he didn’t open any files.


Information System, Third Canadian Edition

Rainer

d) Your brother admits to opening a joke file on his e-mail, but the file was from a good friend, so it can’t be your brother’s fault. e) All of these statements are false. Answer: e Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Medium

36) You got careless and left your laptop in a taxi back from the airport. However, you aren’t too worried about your information. Which of the following should not a reason for your attitude? a) You back up all your files every Monday night. b) You encrypt all of your personal information. c) Your operating system requires a password at start-up. d) You have trace software on your laptop. e) You named the file that contains your list of passwords BirthdaysToRemember. Answer: e Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Hard

37) _____________ is an example of a behavioral action you can take to protect your information assets. a) Having your picture on your credit card b) Opening e-mails only from people you know and trust c) Running security checks d) Installing antivirus software Answer: a Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section: Behavioral Actions to Protect Your Information Assets Difficulty: Medium

38) _____________ is an example of a behavioral action you can take to protect your information assets.


Information System, Third Canadian Edition

Rainer

a) Don’t download files/software from web sites you don’t know or trust b) Limit your use of debit cards c) Never post personal information about yourself on social networking sites d) Update your privacy settings on Facebook, Twitter, etc. Answer: b Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section: Behavioral Actions to Protect Your Information Assets Difficulty: Medium

39) The first step to recover from identity theft is ____________. a) call your credit card company b) change all your credit cards c) get a lawyer d) fill out fraud affidavits for creditors Answer: c Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section: Behavioral Actions to Protect Your Information Assets Difficulty: Medium

40) _____________ is an example of a computer-based action you can take to protect your information assets. a) Having your picture on your credit card b) Limiting your use of debit cards c) Knowing your credit card billing cycles d) Installing antivirus software Answer: d Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section: Behavioral Actions to Protect Your Information Assets Difficulty: Medium

41) ________________ is an example of a computer-based action you can take to protect your information assets. a) Never posting personal information about yourself on social networking sites


Information System, Third Canadian Edition

Rainer

b) Frequently getting new credit card numbers c) Not using your “snail-mail” mailbox at home d) Shredding your documents Answer: a Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section: Behavioral Actions to Protect Your Information Assets Difficulty: Medium

42) Which of the following is a computer action you can take to prevent malware infections? a) Install a security suite on your computer b) Install a firewall on your computer c) Install monitoring software on your computer d) All of the above Answer: d Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section: Behavioral Actions to Protect Your Information Assets Difficulty: Medium

43) The worst browser to use to protect yourself from malware infections is ________. a) Chrome b) Firefox c) Internet Explorer d) Opera Answer: C Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section: Behavioral Actions to Protect Your Information Assets Difficulty: Easy 44) Using both a token/biometric and your personal password is an example of ________. a) Two-factor authentication b) Two-factor authorization c) Multi-factor authentication d) Multi-factor authorization


Information System, Third Canadian Edition

Rainer

Answer: a Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section: Behavioral Actions to Protect Your Information Assets Difficulty: Easy

Question Type: Essay

45) Describe the functions of anti-malware software on your computer. Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Medium

46) What functions should a personal firewall provide for you? Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Medium

47) What functions should you expect from monitoring software on your computer? Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Medium

48) What functions should you expect from content-filtering software on your computer? Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Medium

49) Describe the steps you should take to protect yourself when computing wirelessly. Learning Objective: Identify the various computer-based actions you can take to protect your information assets. Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets


Information System, Third Canadian Edition

Rainer

Difficulty: Medium

50) It’s hard to remember lots of passwords, so why not use just one? Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: TG 5.2 Behavioral Actions to Protect Your Information Assets Difficulty: Medium

51) Why is it so important to protect your information assets? Learning Objective: Explain why it is critical that you protect your information assets. Section Reference: TG 5.1 Introduction Difficulty: Hard

52) Discuss the pros and cons of using credit cards vs. debit cards.

Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: TG 5.2 Behavioral Actions to Protect Your Information Assets Difficulty: Hard

53) Discuss the benefits of using the services of companies that provide proactive protection of your personal information. Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: TG 5.2 Behavioral Actions to Protect Your Information Assets Difficulty: Hard

54) List and explain the actions you should take if your identity is stolen. Learning Objective: Identify the various behavioral actions you can take to protect your information assets. Section Reference: TG 5.2 Behavioral Actions to Protect Your Information Assets Difficulty: Hard

55) Discuss the dangers of social networking Web sites. Learning Objective: Identify the various computer-based actions you can take to protect your information assets.


Information System, Third Canadian Edition

Rainer

Section Reference: TG 5.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Hard

Legal Notice Copyright © 2014 by John Wiley & Sons Canada, Ltd. or related companies. All rights reserved.

The data contained in these files are protected by copyright. This manual is furnished under licence and may be used only in accordance with the terms of such licence. The material provided herein may not be downloaded, reproduced, stored in a retrieval system, modified, made available on a network, used to create derivative works, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without the prior written permission of John Wiley & Sons Canada, Ltd.


Test Bank for Introduction to Information Systems, Third Canadian Edition

1

Case Appendix Case Distribution and Index The following provides a list of the cases provided in this Appendix, and the Chapters or Technology Guides to which the case pertains. Use these cases as assignments, midterm questions or final examination questions. The Case Appendix contains the entire case with references to the chapters or technology guides to which they pertain. You will find a suggested solution in the individual chapters and technology guides to which the questions pertain. Case Title

1

BestPay Camelot Industries

x

2

3

x

x

4

5

6

7

8

9

10

11

12

13

TG1

TG2

TG3

TG4

x

x

x

East General Hospital

x

Globoha Company

x

Internal Audit Summer Job

x

x x x

Lovely Hands Company Men R US

x

x

x

x x

Note that these cases have questions that apply to multiple chapters. Detailed suggested solutions are provided in the chapters listed. Cases are listed below alphabetically by case name.


Case Appendix

2

BestPay BestPay Inc. is an online service provider of payroll processing in Winnipeg, Manitoba, with over 125,000 customers. A review of the web site reveals that the organization is full service: you can purchase payroll software, or access systems online. BestPay provides payroll, human resources, retirement planning and tax services. Employees can even log on and use the systems as an internet-based time clock. Required: A) For each of the five strategies for competitive advantage, describe the strategy, and explain how BestPay could implement the strategy. (10 marks) Response: Chapter 2, Competitive Advantages and Strategic Information Systems B) You have been asked to assist with the design of the payroll database for BestPay Inc. Explain the purpose of each of the following components of the database design and provide an example of how they would apply to the payroll database. (10 marks) • • • • •

Data model Entity Attribute Primary Key Secondary Key

Response: Chapter 3 C) Your company is a small employer with ten employees that uses BestPay Inc. for payroll processing. Explain to your boss the different types of anti-malware protection that are available and their purpose. (5 marks) Response: Technology Guide 3, Computer-Based Actions

Camelot Industries Camelot Industries Ltd. (CIL) sells card decks, all kinds of them. Playing cards for children and adults, tarot cards (for self-analysis and fortune telling), and a variety of new age cards such as angel cards, dragon cards, sacred geometry cards and native medicine cards. Traditionally, CIL sold only to retail outlets, although they had factory direct sales at their distribution centre every morning. Last year, CIL created a web site, camelotcards.com, used to sell cards directly to a broader range of retailers and to the general public. To help its existing dealer network, the web site has a location directory, so that individuals can find out where the card deck of their choice is selling in their area. Also, to help its existing dealer network, sales to the general public are accepted only if the individual is buying at least ten decks of cards. Otherwise, the individual is urged to go their nearest new age book or novelty store. Camelot Industries Ltd. (CIL) has 35,000 retailers around the world that purchase its products. CIL uses functional software to handle its transaction processing for sales to these retailers.


Test Bank for Introduction to Information Systems, Third Canadian Edition

3

A) Using the following table, describe the four listed business pressures and explain how each pressure would affect Camelot Industries Ltd. (8 marks) Response: Chapter 1, Business Pressures, Organizational Responses, and IT Support B) Camelot Industries Ltd. (CIL) is thinking of implementing new software for its data management that would include a relational database. Provide CIL with four advantages or disadvantages for the use of a relational database management system. (4 marks) Response: Chapter 3, The Database Approach and Relational Database Management Systems B) Following is an example of what the sales transaction information at CIL looks like: Customer number Ang852 Ojk685 Zee153

Invoice number 00095235 00085632 00195732

Invoice date

Invoice amount

August 12,2009 August 31, 2009 October 14, 2009

1596.35 680.66 6011.00

Clearly describe the following terms and provide an example from the table for each term. Clearly explain why your example is appropriate. (8 marks) • • • •

Attribute Record Instance Secondary key

Response: Chapter 3 The Database Approach C)

What is operational CRM? (1 mark)

Response: Chapter 9, Operational CRM D)

Provide five examples of how CIL could provide customer service and support to its customers. (5 marks)

Response: Chapter 9, Operational CRM

East General Hospital Vocera is a multi-purpose intercom that can be worn about a person’s neck or clipped to clothing. It uses wireless technology and operates the same way that the communications devices in ‘Star Trek’ worked – you tap the device to activate it. The system uses voice recognition to initiate calls to others, and can also send text messages. Since the system was recently implemented by East General Hospital, staff can now talk to others who are in isolation, and obtain emergency help if they tap the device’s grey button twice. It cost the hospital several million dollars to implement the system. The older city hospital is about one million square feet in size, with thick brick walls and special concrete protection around rooms that handle radiation, such as medical imaging.


Case Appendix

4

Now, the hospital is thinking of implementing electronic document systems for its patient records. This would mean that existing hospital records would be scanned and placed into electronic files, while any new records would be created electronically or added to patient records as prepared. The hospital is looking at two different options for its acquisition of the patient record system – purchasing a packaged system that is in use by hospitals in the U.S., or having a customized system developed. (Rererences: “A new badge of honour,” by T. Burgmann, Toronto Star, p. B1, B4, Nov 16/09); and www.vocera.com (accessed January 29, 2011) Required: A)

What are the advantages of purchasing ready-made packaged software? (3 marks)

Response: Chapter 11, Strategies for Acquiring IT Applications B)

What are the disadvantages of purchasing ready-made packaged software? (3 marks)

Response: Chapter 11, Strategies for Acquiring IT Applications C)

What are the advantages of developing customized software? (3 marks)

Response: Chapter 11, Strategies for Acquiring IT Applications D)

What are the disadvantages of developing customized software? (3 marks)

Response: Chapter 11, Strategies for Acquiring IT Applications

Globoha Company Globoha Company sells rare books and antiques made of brass and other metals. The company has a physical location in Kolkata, West Bengal, India and in Montreal, Quebec, Canada. It also has a secure web site. Globoha has an inventory system that requires each item to have a serial number, as well as providing detailed information about the product (for example, age, description, author or artist), the product cost and product selling price. Typical inventory information looks like this: Serial number* 345560987 149567369

Supplier B. Smith Able Antiques

222234569

S. Saal

Notes:

Status Good quality Needs refurbishing Damaged, medium

Product Type* BookHard AntiqueBrass BookSoft

Cost 15.00 225.00

Sales Price 32.00 0.00

196.32

425.00


Test Bank for Introduction to Information Systems, Third Canadian Edition •

5

The Product Type* and Serial number* are used to link the inventory information to other tables that contain detailed information about the product, such as age, author, artist or publisher. There are separate tables for BookHard products (hardcover books), BookSoft (softcover books), AntiqueBrass (antiques made of brass), as well as fifteen other product types that each have different tables. Products that are not ready for sale (such as antiques that need fixing or refurbishing) are given a zero sales price.

Required: A) For each of the following two types of portals, describe the nature or purpose of this type of portal and provide an example of how Globoha Company could use the portal. (4 marks) • Affinity portal • Corporate portal Response: Chapter 4 Network Applications B) For each of the following network technologies, explain how Globoha Company could use the technology. (5 marks) Response: Technology Guide 4, Network Fundamentals

Internal Audit Summer Job As a summer job you have been hired as an intern in the internal audit department of a large national retail organization. As part of your job, you will be assisting with a vulnerability assessment prior to conducting a risk assessment. Then, the team will consider how controls in could affect privacy at the organization, prior to testing these controls. A) Describe four factors that would increase the vulnerability of your organization’s information assets. (4 marks) Response: Chapter 12 Threats to Information Privacy B) For each of the following types of controls: • define or describe the type of control, and • provide an example of that type of control that might contribute to improved privacy over customer data at the retail organization. (8 marks) Response: Chapter 12 Protecting Information Resources C) Your internal audit team members will be working at two different locations at the organization: some of you will be working in Toronto, while others will be in Montreal. Provide four examples of how your team could use information technology to collaborate during the completion of your work. (4 marks) Response: Chapter 4 Network Applications


Case Appendix

6

D) Describe how you could use personal application software to assist you in your job. (5 marks) Response: Technology Guide 2, Application Software

Lovely Hands Company Lovely Hands Company (LHC) is a jewelry store that specializes in diamond rings, Rolex watches and precious stone ornaments, such as diamond earrings. LHC’s products start at $500 and go upwards to a few high end items that sell for hundreds of thousands of dollars. The in-store jeweler, a master craftsman, designs products for his customers, and is world-renowned for his original designs. LHC is considering embedding tiny RFID chips, called the Memory Spot, on the inside of each jewelry item in inconspicuous locations. At a size only slightly larger than the tip of a pencil, the Memory Spot can easily be placed upon products in places where they are difficult to remove without the proper tools. The jeweler would be responsible for embedding and removing these chips. For low-end products (those that sell for less than $2,000), the chips would be permanently installed, while for high-end products they would be removed after customer payment by the jeweler, at the option of the customer. The Memory Spot does not require a power source, as it uses power from the magnetic field generated by the wireless sensor network or by some wireless devices. The Memory Spot will contain information such as the materials present in the item (e.g. gold, platinum, emerald, or diamond), the item serial number, and its sales price. It will also contain the name and address of the store, and tracking software that can be remotely triggered in the event that the item is stolen. Since the Memory Spot reader must be very close to the item, the inside of the display cases will be fitted with readers, and trigger devices that can be turned on by employees with a foot button in the event of a robbery. The software will also be activated when the store closes at the end of the day, and deactivated when the store opens. At time of purchase, store equipment will read the Memory Spot, match the information to the customer invoice, and transfer to the Memory Spot the customer’s name and address. In addition to using wireless systems for the Memory Spot, the store’s local area network is also enabled using wireless technology. Required: A) Describe three different types of electronic payments that LHC could accept. (3 marks) Response: Chapter 5, Electronic payments B) Describe two security threats that could occur with wireless networks. (2 marks) Response: Chapter 6, Wireless Security C) The Memory Spot is a passive tag. Describe an active tag, and provide two advantages or disadvantages of active tags for LHC. (3 marks) Response: Chapter 6, Pervasive Computing D) Provide five specific examples of customer-touching applications that LHC could use. (5 marks)


Test Bank for Introduction to Information Systems, Third Canadian Edition

7

Response: Chapter 9, Operational CRM E) Describe actions that the company can take to protect its wireless systems. Response: Technology Guide 3, Computer-Based Actions

Men R Us Men R Us Limited (MRU) is a large men’s wear store with locations in Canada and the U.S. MRU has been in business for over 50 years, and has resisted the development of an online store, as it felt that its customers prefer to try on and buy their clothing, rather than purchase over the internet. MRU has a basic web site that provides information about store locations and the different lines of clothing that it offers. The number of telephone calls to the store about prices has increased, as customers seem to be comparison shopping much more before deciding to buy. MRU believes that a web site online store presence could increase its sales, because it could advertise its products online, even if it was only for the purpose of comparison shopping. Accordingly, it has decided that it will have its web site upgraded to provide for secure shopping. MRU is considering several different development approaches in the development of its online store, and would like a further explanation of the advantages and disadvantages of these approaches before proceeding. In particular, it is considering outsourcing, the use of an application service provider, and prototyping. Required: A) marks)

Describe the advantages and disadvantages to MRU of outsourcing the development of its online store. (3

Response: Chapter 11, Strategies for Acquiring IT Applications B)

Describe the advantages and disadvantages to MRU of the use of an application service provider. (4 marks)

Response: Chapter 11, Strategies for Acquiring IT Applications C)

Describe the advantages and disadvantages to MRU of the use of prototyping. (5 marks)

Response: Chapter 11, Alternative Methods and Tools for Systems Development


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.