Introduction to Information Systems, 5th Edition BY Rainer, Prince, Cegielski
Email: richard@qwconsultancy.com
Package Title: Assessment Questions Course Title: IS 5e Chapter Number: 1
Question Type: True/False
1. An information system collects, processes, stores, analyzes, and disseminates information for a specific purpose using a computer. Answer: False Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
2. Information technology refers to computer-based tools used to support the needs of an organization Answer: True Section Reference 1: Overview of Computer-based Information Systems Difficulty: easy Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
3. IT is enabling more and more people to communicate, collaborate, and compete, thereby leveling the digital playing field. Answer: False Section Reference 1: Why Should I Study Information Systems? Difficulty: Easy Learning Objective 1: LO 1.1 Identify the reasons why being an informed user of information systems is important in today’s world.
4. You do not have to work in the IT department to benefit from learning about IT Answer: True Section Reference 1: Why Should I Study Information Systems? Difficulty: Easy Learning Objective 1: LO 1.1 Identify the reasons why being an informed user of information systems is important in today’s world. 5. An informed user of IT can enhance his or her organization’s competitive position. Answer: True -1-
Section Reference 1: Why Should I Study Information Systems? Difficulty: Easy Learning Objective 1: LO 1.1 Identify the reasons why being an informed user of information systems is important in today’s world. 6. Managing the IS function within an organization is the exclusive responsibility of the IS department Answer: False Section Reference 1: Why Should I Study Information Systems Difficulty: Medium Learning Objective 1: LO 1.1 Identify the reasons why being an informed user of information systems is important in today’s world.
7. A systems analyst focuses on designing specifications for new technology. Answer: True Section Reference 1: Why Should I Study Information Systems? Difficulty: Easy Learning Objective 1: LO 1.1 Identify the reasons why being an informed user of information systems is important in today’s world.
8. An auditing manager focuses on the ethical and legal use of information systems. Answer: True Section Reference 1: Why Should I Study Information Systems? Difficulty: Medium Learning Objective 1: LO 1.1 Identify the reasons why being an informed user of information systems is important in today’s world.
9. End-user computer refers to a group of end users working together to manage their interactions with a computer. Answer: False Section Reference 1: Why Should I Study Information Systems Difficulty: Easy Learning Objective 1: LO 1.1 Identify the reasons why being an informed user of information systems is important in today’s world.
10. Information technology and information systems are the same thing. Answer: False Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
-2-
11. In general, informed users tend to get more value from whatever technologies they use. Answer: True Section Reference 1: Why Should I Study Information Systems? Difficulty: Medium Learning Objective 1: LO 1.1 Identify the reasons why being an informed user of information systems is important in today’s world.
12. A combination of your high school grades, application essays, letters of recommendation, and Scholastic Aptitude Test (SAT) scores would be considered information. Answer: True Section Reference 1: Overview of Computer-based Information Systems Difficulty: Easy Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
13. A university registrar who uses her experience with university admissions along with your high school grades, application essays, letters of recommendation, and Scholastic Aptitude Test (SAT) scores, would be applying her knowledge in your application process. Answer: True Section Reference 1: Overview of Computer-based Information Systems Difficulty: Easy Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
14. A list of football scores with the names of the teams that played the games would be considered information. Answer: True Section Reference 1: Overview of Computer-based Information Systems Difficulty: Easy Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
15. Information technology deals with the planning, development, management, and use of management information tools to help people perform all the tasks related to information processing and management.
-3-
Answer: False Section Reference 1: Overview of Computer-based Information Systems Difficulty: Easy Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization. 16. A student’s decision to drop one course and add another would be considered a transaction to the university’s information system but not to its accounting system. Answer: True Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
17. An ERP system is an interorganizational information system. Answer: False Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization. 18. An organization’s supply chain starts at the supplier and ends at the customer. True Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
19. E-commerce systems are a type of interorganizational information systems. Answer: True Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization. 20. An organization’s IT platform consists of the IT components and IT services. False Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization. -4-
21. IT personnel use the IT infrastructure to develop information systems. Answer: False Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
22. Information is data that have been organized to provide value. Answer: True Section Reference 1: Overview of Computer-based Information Systems Difficulty: Easy Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
23. Knowledge is data that have been organized to convey accumulated learning. Answer: False Section Reference 1: Overview of Computer-based Information Systems Difficulty: Easy Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
24. Digital dashboards are special information systems that that support all managers of the organization. Answer: True Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
Question Type: Multiple Choice
25 . Which of the following is not a benefit of being an informed user of IT? A. Understanding what is “behind” applications you use in your organization. B. Providing input to enhance your organization’s applications C. Helping to select new applications D. Keeping abreast of new technologies E. Working in the IT side of the organization.
-5-
Answer: E Section Reference 1: Why Should I Study Information Systems? Difficulty: Easy Learning Objective 1: LO 1.1 Identify the reasons why being an informed user of information systems is important in today’s world. 26. The title of the executive who is in charge of the people who design and build information systems, the people who use those systems, and the people responsible for managing those systems is the A. CEO B. CFO C. CIO D. CIS E. CIT Answer: C Section Reference 1: Why Should I Study Information Systems? Difficulty: Easy Learning Objective 1: LO 1.1 Identify the reasons why being an informed user of information systems is important in today’s world.
27. What does a systems analyst do? A. Manages an IS service B. Writes computer code. C. Interfaces between end users and programmers D. Forecasts technology trends E. Creates Web sites and pages Answer: C Section Reference 1: Why Should I Study Information Systems? Difficulty: Medium Learning Objective 1: LO 1.1 Identify the reasons why being an informed user of information systems is important in today’s world.
28. Which of the following statements concerning the management of information resources is not true? A. They have an enormous strategic value within an organization and therefore are relied on. B. Information systems are expensive to acquire, operate, and maintain. C. Computers are decentralized throughout the organization, which makes it harder to manage. D. Managing mainframes has become more difficult. E. Managing information resources is divided between the MIS department and end users.
-6-
Answer: D Section Reference 1: Why Should I Study Information Systems Difficulty: Easy Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world.
29. Which of the following is the correct hierarchy from the lowest level to the highest level? A. knowledge, information, data B. information, data, knowledge C. data, information, knowledge D. data, information, experience E. information, experience, wisdom Answer: C Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
30. _____ conveys understanding, accumulated learning, and expertise as they apply to a current problem. A. Data B. Information C. Knowledge D. Experience E. Wisdom Answer: C Section Reference 1: Overview of Computer-based Information Systems Difficulty: Easy Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
31. _____ is (are) data that have been organized to have meaning and value to a recipient. A. Insights B. Information C. Knowledge D. Experience E. Wisdom Answer: B -7-
Section Reference 1: Overview of Computer-based Information Systems Difficulty: Easy Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
32. The list of all your purchases from Amazon (books bought, price paid, dates) is defined as ___________. A. data B. information C. knowledge D. experience E. wisdom Answer: B Section Reference 1: Overview of Computer-based Information Systems Difficulty: Easy Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
33. If Amazon uses a list of all your purchases (books bought, price paid, dates) to recommend other books to you, then it is applying its _____. A. data B. information C. knowledge D. experience E. wisdom Answer: C Section Reference 1: Overview of Computer-based Information Systems Difficulty: Easy Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
34. A listing of all courses offered at your university would be considered _____, whereas a listing of all courses required in your major would be considered _____. A. information, data B. knowledge, information C. information, knowledge D. data, information E. data, knowledge Answer: D -8-
Section Reference 1: Overview of Computer-based Information Systems Difficulty: Easy Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
35. You are registering for the next semester at your university. You take into account your major, the courses you need, the prerequisites for each course, the times you take each course, and the professors teaching each section, as well as your work schedule. ansYou are using _____ to select your class schedule. A. information B. knowledge C. experience D. wisdom E. data Answer: B Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization. 36. A purchase of books in the college bookstore is ___________. The report at the end of the day showing sales totals for the day is ____________. A. information, knowledge B. information, data C. data, information D. data, database E. data item, business intelligence Answer: C Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization. 37. An organization’s information technology architecture: A. provides a guide for current operations. B. provides a blueprint for future directions. C. integrates the information requirements of the organization and all users. D. is analogous to the architecture of a house. E. all of the above Answer: E Section Reference 1: Overview of Computer-based Information Systems Difficulty: Easy Learning Objective 1: LO 1.2 Describe the various types of computer-based information -9-
systems in an organization.
38. An organization’s IT components include all of the following except: A. a network. B. programs C. procedures D. a database E. monitors Answer: C Section Reference 1: Overview of Computer-based Information Systems Difficulty: Easy Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
39. A(n) _____________ is a computer program designed to support a specific task or business process. A. Interface B. Application C. Functional area D. Network E. Database Answer: B Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
40. _____ is/are the computer hardware, software, and communications technologies that are used by IT personnel to produce IT services. A. IT components B. IT services C. Information technology D. An information system E. A computer-based information system Answer: A Section Reference 1: Overview of Computer-based Information Systems Difficulty: Easy Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization. - 10 -
41. An organization’s _____ consists of the physical facilities, IT components, IT services, and IT management that will support the entire organization. A. information technology architecture B. information technology infrastructure C. information technology D. information system E. computer-based information system Answer: B Section Reference 1: Overview of Computer-based Information Systems Difficulty: Easy Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
42. IT personnel use _____ to produce _____. A. IT components, IT services B. computer-based information systems, IT architecture C. IT infrastructure, IT architecture D. IT infrastructure, IT platform E. IT components, IT architecture Answer: A Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
43. The IT infrastructure is comprised of _______ and ________. A. IT components, IT personnel B. IT components, IT services C. IT services, IT personnel D. IT personnel, computer-based information systems E. Computer-based information systems, IT personnel Answer: B Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization. 44. Which of the following statements is false?
- 11 -
A. An application is a computer program designed to support a specific business process. B. Each functional area within an organization has only one application. C. A functional area information system is the same as a departmental information system. D. A functional area information system can obtain data from other functional area information systems. E. App, application, and application program all mean the same thing. Answer: B Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization. 45. Enterprise resource planning systems A. were designed to process transactions faster. B. evolved because newer technologies made older systems obsolete. C. use a common database for all functional areas. D. are utilized to conduct site analyses. E. All the above statements are true. Answer: C Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
46. Knowledge workers A. handle day-to-day operations within an organization. B. make tactical decisions. C. advise middle managers D. make routine decisions. E. are generalists Answer: C Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization. 47. Office automation systems A. support only the clerical staff. B. are comprised of software that is used to develop documents and spreadsheets C. include report generators. D. are a type of interorganizational system. E. are usually developed in-house. - 12 -
Answer: C Section Reference 1: Overview of Computer-based Information Systems Difficulty: Hard Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization. 48. ___________ include B2B and B2C. A. Enterprise resource planning systems B. Computer-based information systems C. Functional area information systems D. Interorganizational information systems
Answer: C Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
49. Which of the following statements is false? A. IT ultimately decreases the number of managers and experts. B. IT makes managers more productive. C. IT increases the number of employees who can report to a single manager. D. IT reduces stress by giving managers more time to make decisions. E. IT decreases the number of promotional opportunities. Answer: D Section Reference 1: How Does IT Impact Organizations Difficulty: Medium Learning Objective 1: LO 1.3 Discuss ways in which information technology can affect managers and nonmanagerial workers.
50. Which of the following statements about the potential impact of IT on nonmanagerial workers is true? A. IT will create more jobs than it eliminates. B. Employees will feel a higher degree of loyalty towards their company. C. IT could cause employees to experience a loss of identity. D. The flexibility of IT can minimize stress on the job. Answer: C Section Reference 1: How Does IT Impact Organizations Difficulty: Medium Learning Objective 1: LO 1.3 Discuss ways in which information technology can affect managers and nonmanagerial workers.
- 13 -
51. Which of the following statements about your future role as a manager is false? A. The people I manage will likely be dispersed geographically. B. The size of my team will likely be smaller than teams of today. C. There will be less emphasis on office politics. D. Many of my decisions will be “real time”. E. I will need IT tools to handle the data I utilize to make decisions. Answer: B Section Reference 1: How Does IT Impact Organizations Difficulty: Medium Learning Objective 1: LO 1.3 Discuss ways in which information technology can affect managers and nonmanagerial workers. 52. Which of the following statements about IT’s role in society is false? A. IT has created employee flexibility. B. Robots can do many routine tasks. C. Robots can handle unfamiliar situations. D. IT can be used to help doctors diagnose diseases. E. Telepresence robots can act as the eyes and ears of a business manager. Answer: C Section Reference 1: Importance of Information Systems to Society Difficulty: Medium LO 1.4 Identify positive and negative societal effects of the increased use of information technology 53. Development in software technologies result in A. Increased competition from established industry rivals B. Increased competition from new entrants into the industry C. Increased competition from new entrants offering substitute products or services D. A and B only E. A, B and C Answer: E Section Reference 1: Opening case Difficulty: Medium Learning Objective 1: LO 1.0. Provide a real-world application of the value of becoming an informed user of information systems. 54. Refer to IT’s About Business Section Reference 1: 1.1 – Warby Parker : Which of the following statements is false? A. Warby Parker is using IT to provide better customer experience B. Warby Parker is using IT to reduce it’s cost to increase profit margins C. Warby Parker’s innovative IT based business model can be easily replicated
- 14 -
Answer: B Section Reference 1: IT’s About Business Section Reference 1: 1.1 Difficulty: Medium LO 1.0. Provide a real-world application of the value of becoming an informed user of information systems. 55. Refer to IT’s About Business Section Reference 1: 1.2 – Internet Registry Enhances Island Nation’s Economy, Which of the following statements is true about the ways Tokelau has benefited by giving the use the its top level country domain .tk to Freedom Registry A. Freedom Registry sells the .tk domain name at a cost and pays Tokelau a portion of its earnings B. Freedom Registry earns revenue from advertising on expired websites that is shared with Tokelau Answer: B Section Reference 1: IT’s About Business 1.2 Difficulty: medium LO 1.0. Provide a real-world application of the value of becoming an informed user of information systems. 56. Refer to IT’s About Business 1.3 – Different Types of Robots ______________ enable an individual to maintain a consistent connection with co-workers, customers, or clients. A. Drones B. Telepresence Robots C. Autonomous Cars D. Remote Sensors Answer: B Section Reference 1: IT’s About Business 1.3 Difficulty: medium LO 1.0. Provide a real-world application of the value of becoming an informed user of information systems. 57. Refer to Closing Case: Baxter: Coming to Work Right Next to You Modern industrial robots must be suited to the following situations: A. They can be used in the same production line as human workers B. They can easily be modified to learn new tasks C. They should be low cost and easy to install D. A and C only E. All of the above Answer: E Section Reference 1: Closing Case Difficulty: easy
- 15 -
Learning Objective 1: LO 1.5 Summarize the fundamental concepts and skills related to the impact of information systems on individuals, organizations, and society.
Question Type: Short Answer
58. Differentiate between information systems and information technology. Section Reference 1: Why Should I Study Information Systems? Difficulty: Medium Learning Objective 1: LO 1.1 Identify the reasons why being an informed user of information systems is important in today’s world.
59 . Differentiate among data, information, and knowledge. Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
60 . Differentiate between information technology and information technology infrastructure. Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
61. Discuss why information systems and information technologies are integral to your lives. Section Reference 1: Why Should I Study Information Systems? Difficulty: Medium Learning Objective 1: LO 1.1 Identify the reasons why being an informed user of information systems is important in today’s world.
62. Discuss three ways in which information technology can impact managers. Section Reference 1: How Does IT Impact Organizations Difficulty: Medium Learning Objective 1: LO 1.3 Discuss ways in which information technology can affect managers and nonmanagerial workers.
- 16 -
63. Discuss three ways in which information technology can impact non-managerial workers. Section Reference 1: Importance of Information Systems on Society Difficulty: Medium LO 1.4 Identify positive and negative societal effects of the increased use of information technology Essay 64. Explain how information technology impacts individuals, organizations, and the world. Support your answer with concrete examples. Difficulty: Medium Learning Objective 1: LO 1.5 Summarize the fundamental concepts and skills related to the impact of information systems on individuals, organizations, and society. 65. Discuss three positive and three negative societal effects of the increased use of information technology. Section Reference 1: Importance of Information Systems to Society Difficulty: Medium LO 1.4 Identify positive and negative societal effects of the increased use of information technology 66 Define the terms data, information, and knowledge, and provide examples of each one. Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
Question Type: Multiple Choice 67. You have just been hired by the largest manufacturer in your area to join their management trainee program. You enjoyed your “computer course” in college and hope that you’ll be able to put that knowledge to good use. Which of the following might you expect to do during the management training program? A. Code a new application B. Recommend new technologies that might impact the organization C. Design a new application D. Become familiar with tools to support using data for decision making E. Work 9-5 in your office. Answer: D LO 1.5 Summarize the fundamental concepts and skills related to the impact of information systems on individuals, organizations, and society. Difficulty: Medium
- 17 -
68. As a manager in your company, you expect to retrieve ______ from operational systems and present it as _________ to your boss, who will react based on his ____________. A. knowledge, information, data B. information, data, knowledge C. data, information, knowledge D. data, information, experience E. information, experience, wisdom Answer: C Section Reference 1: Overview of Computer-based Information Systems Difficulty: Medium Learning Objective 1: LO 1.2 Describe the various types of computer-based information systems in an organization.
69. In your new position, you are told that you will be working with a business analyst. What would you expect this work to entail? A. Review computer code. B. Explain the business process C. Test programs D. Identify new technology that might benefit the organization E. Create Web sites and pages Answer: B Section Reference 1: Why Should I Study Information Systems? Difficulty: Medium Learning Objective 1: LO 1.1 Identify the reasons why being an informed user of information systems is important in today’s world.
- 18 -
Package Title: Assessment Questions Course Title: Intro IS 5e Chapter Number: 2
Question Type: True/False 1. A business process has inputs and outputs Answer: True Section reference 1: Business Processes Difficulty: Easy
Learning Objective 1: LO 2.1 Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. 2. The activities of a business process can be measured Answer: True Section reference 1: Business Processes Difficulty: Easy
Learning Objective 1: LO 2.1 Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. 3. Cross-functional processes are executed within a single functional area. Answer: False Section reference 1: Business Processes Difficulty: Easy
Learning Objective 1: LO 2.1 Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. 4. The procurement process includes the sales function. Answer: False Section reference 1: Business Processes Difficulty: Medium
Learning Objective 1: LO 2.1 Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. 5. An organization’s business processes can create a competitive advantage. Answer: True Section reference 1: Business Processes Difficulty: Medium
Learning Objective 1: LO 2.1 Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization.
6. A business process always includes information systems. Answer: False Section reference 1: Business Processes Difficulty: Medium
Learning Objective 1: LO 2.1 Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. 7. BPR is a strategy for improving the efficiency of an organization’s data collection. Answer: False Section reference 1: Business process reengineering and business process management Difficulty: Medium
Learning Objective 1: LO 2.2 Differentiate between the terms business process reengineering and business process management. 8. BPM is an implementation of BPR. Answer: False Section reference 1: Business process reengineering and business process management Difficulty: Hard
Learning Objective 1: LO 2.2 Differentiate between the terms business process reengineering and business process management. 9. BPM can improve an organization’s flexibility. Answer: True Section reference 1: Business process reengineering and business process management Difficulty: Medium
Learning Objective 1: LO 2.2 Differentiate between the terms business process reengineering and business process management. 10. The overall performance of an organization has little to do with how well it manages its business processes. Answer: False Section reference 1: Business Process Reengineering and Business Process Management Difficulty: Medium
Learning Objective 1: LO 2.2 Differentiate between the terms business process reengineering and business process management. 11. Business process management includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes.
Answer: True Section reference 1: Business Process Reengineering and Business Process Management Difficulty: Easy
Learning Objective 1: LO 2.2 Differentiate between the terms business process reengineering and business process management. 12. Competitive advantage refers to making higher profits. Answer: False Section Reference 1:Opening case Difficulty: Easy
Learning Objective 1: LO 2.2 Differentiate between the terms business process reengineering and business process management. 13. The business environment refers to the industry that a company is in. Answer: False Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 14. Globalization is the integration and interdependence of many facets of life made possible by rapid advances in information technology. Answer: True Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 15. The information technology environment is the combination of social, legal, economic, physical, and political factors that affect business activities. Answer: False Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 16. In general, labor costs are higher in developed countries than in developing countries. Answer: True Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each.
17. Developed countries usually provide greater fringe benefits than developing countries. Answer: True Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each.
18. Information technology is facilitating the entry of a wide variety of employees into the workforce. Answer: True Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 19. Internet access in the United States is not particularly related to household income. Answer: False Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 20. In general, government deregulation decreases competition. Answer: False Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 21. Ethical issues are important because, if handled poorly, they can damage an organization’s image. Answer: True Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 22. Build-to-stock is a strategy of producing customized products and services. Answer: False Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 23. In mass production, a company produces a large quantity of identical items. Answer: True Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 24. In mass customization, companies produce items in large quantity, but they tailor the items to meet the desires and needs of individual customers. Answer: True Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 25. Customer intimacy is the process whereby a business learns as much as possible about its customers to better anticipate and address their needs. Answer: True Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 26. A growing IT initiative called green IT is enabling organizations to reduce their carbon footprint. Answer: True Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each.
27. The digital divide is the gap between data and knowledge. Answer: False Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 28. The One Laptop per Child project aims to use technology to revolutionize how the world can educate its children. Answer: True Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 29. Competitive advantage helps a company function effectively within a market and generate larger-than-average profits. Answer: True Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Easy
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. 30. An information system that helps an organization gain a competitive advantage is called a competitive information system. Answer: False Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Easy
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. 31. Every competitive organization is driven by the competitive forces identified by Michael Porter. Answer: True Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Easy
LO 2.4.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one.
32. Michael Porter concludes that the overall impact of the Internet is to increase competition, which generally diminishes a firm’s profitability. Answer: True Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Easy
LO 2.4.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. 33. The Internet increases traditional barriers to entry into a market. Answer: False Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Easy
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. 34. The Internet decreases customers’ bargaining power. Answer: False Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Easy
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. 35. Information-based industries face the greatest threat from substitutes. Answer: True Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Easy
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. 36. The music industry is a good example of the extremely low variable costs of digital products. Answer: True Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Easy
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. 37. The introduction of the ATM in the banking industry is an example of the innovation strategy. Answer: True
Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Easy
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. 38. An entry barrier is a long-term competitive advantage. Answer: False Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Easy
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. 39. The bargaining power of suppliers is low when their buyers have many choices. Answer: True Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Easy
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. 40. When there are many substitute products, a company can create a competitive advantage by increasing fees. Answer: False Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Easy
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. 41. Porter’s value chain model is a variation of his competitive advantage framework. Answer: False Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Easy
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. 42. The primary activities in the value chain create the value for which customers are willing to pay. Answer: True Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Easy
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage.
43. It’s a good idea for a company to select two competitive advantage strategies. Answer: False Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Easy
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage.
Question Type: Multiple Choice 44. Which of the following statements concerning business processes is false? A. A process has inputs. B. A process has outputs. C. A process has activities that can be measured. D. A process creates value. E. A process cannot cross functional area boundaries. Answer: E Section reference 1: Business Processes Difficulty: Easy
Learning Objective 1: LO 2.1 Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. 45. Applying copyrights and trademarks is an example of a(n): A. Accounting business process B. Finance business process C. Marketing business process D. Production business process E. Management information systems business process Answer: C Section reference 1: Business Processes Difficulty: Medium
Learning Objective 1: LO 2.1 Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. 46. Reconciling bank accounts is an example of a(n): A. Accounting Business Process B. Finance Business Process C. Marketing Business Process D. Production Business Process E. Management Information Systems Business Process Answer: A
Section reference 1: Business Processes Difficulty: Easy
Learning Objective 1: LO 2.1 Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. 47. Managing account collections is an example of a(n): A. Accounting Business Process B. Finance Business Process C. Marketing Business Process D. Production Business Process E. Management Information Systems Business Process Answer: B Section reference 1: Business Processes Difficulty: Medium
Learning Objective 1: LO 2.1 Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. 48. Collecting sales tax is an example of a(n): A. Accounting Business Process B. Finance Business Process C. Marketing Business Process D. Production Business Process E. Management Information Systems Business Process Answer: C Section reference 1: Business Processes Difficulty: Medium
Learning Objective 1: LO 2.1 Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. 49. Managing purchasing is an example of a(n): A. Accounting Business Process B. Finance Business Process C. Marketing Business Process D. Production Business Process E. Management Information Systems Business Process Answer: D Section reference 1: Business Processes Difficulty: Medium
Learning Objective 1: LO 2.1 Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. 50. Managing pay and payroll is an example of a(n): A. Accounting Business Process B. Finance Business Process C. Marketing Business Process D. Human Resources Business Process E. Management Information Systems Business Process
Answer: D Section reference 1: Business Processes Difficulty: Easy
Learning Objective 1: LO 2.1 Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. 51. Which of the following processes involves the warehouse, purchasing, and accounting functional areas? A. Procurement B. Fulfillment C. Order entry D. Accounts receivable E. Payroll Answer. A Section reference 1: Business Processes Difficulty: Easy
Learning Objective 1: LO 2.1 Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. 52. Which of the following processes involves the warehouse, sales, and accounting functional areas? A. Procurement B. Fulfillment C. Order entry D. Accounts Receivable E. Payroll Answer. B Section reference 1: Business Processes Difficulty: Easy
Learning Objective 1: LO 2.1 Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. 53. Which of the following is not a role that information systems play in businesses processes? A. Establish standards B. Execute the process C. Capture and store process data D. Monitor process performance E. Detect problems with the process. Answer: A Section reference 1: Business Processes Difficulty: Medium
Learning Objective 1: LO 2.1 Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. 54. For many organizations, business process reengineering
A. Is easy to implement. B. Is not disruptive to implement. C. Has little impact on facilities. D. Is inexpensive. E. Has a major impact on the corporate culture. Answer: E Section reference 1: Business Processes Difficulty: Medium
Learning Objective 1: LO 2.1 Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. 55. Which of the following statements is false? A. BPM is a task-oriented approach. B. BPM can help companies reduce costs. C. BPM can help companies increase revenue. D. BPM can improve customer satisfaction. E. BPM can improve organizational flexibility Answer: A Section reference 1: Business Processes Difficulty: Medium
Learning Objective 1: LO 2.1 Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. 56. Which of the following statements is false? A. BPM begins with process modeling. B. Process modeling is a graphical depiction of all the steps in a process. C. BPM uses Web-enabled technologies for user interfaces. D. Business activity monitoring is used to measure and manage business processes. E. Business activity monitoring is a type of scheduled reporting. Answer: E Section reference 1: Business process reengineering and business process management Difficulty: Medium
Learning Objective 1: LO 2.2 Differentiate between the terms business process reengineering and business process management.
57. Business pressures on organizations are created when there are changes in A. Social factors B. Economic factors C. Legal factors D. Political factors E. Changes in all of the above will create business pressures.
Answer: E Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each.
58. Market pressures include which of the following? A. the global economy B. weak competition C. a homogeneous workforce D. weak customers E. high-cost offshore labor Answer: A Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 59. The workforce in developed countries is exhibiting all of the following trends except: A. It is becoming more diversified. B. It includes more women. C. It includes more single parents. D. It includes fewer persons with disabilities. E. It includes more minority-group members. Answer: D Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each.
60. Today’s customers have ________ . A. less knowledge about products B. less sophistication C. difficulty in finding information about products D. higher expectations E. difficulty in comparing prices Answer: D Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each.
61. Which of the following statements concerning technology pressures on modern businesses is true? A. Technology changes so rapidly that organizations should wait before they release new technology-based products. B. New technologies offer alternative service options. C. New technologies will never replace existing technologies. D. The amount of information on the Internet remains stable from year to year. E. The important information on the Internet is fee-based. Answer: B Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 62. Which of the following is not an example of the growing initiative called green IT? A. Designing an IT infrastructure to support sustainability. B. Building systems that monitor carbon throughout the organization. C. Asking vendors about compliance on environmental standards. D. Building computer applications that use less energy E. Designing energy-efficient data centers. Answer: D Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each.
63. The digital divide is an example of which type of societal pressure? A. social responsibility B. government regulations C. protection against terrorism D. ethics E. information overload Answer: A Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 64. Which one of the following statements is false? A. Businesses tend to view government regulations as expensive constraints on their activities. B. Government deregulation reduces competition. C. IT support is essential for compliance with many new regulations. D. IT has been used to identify patterns of behavior associated with terrorist activities.
E. Information ethics can destroy the morale of a company’s employees. Answer: B Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 65. Which of the following is not a Section Reference 1 by organizations to business pressures? A. Delay releases of innovated products. B. Build strategic systems that enable an organization to increase market share or profits. C. Provide tools that satisfy customers so they don’t go to a competitor. D. Manufacture customized goods at a lower cost. E. Conduct business electronically with customers and business partners. Answer: A Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Medium
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each.
66. Producing identical items in large quantities is called: A. strategic systems. B. customer focus. C. continuous improvement. D. mass production. E. mass customization. Answer: D Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each.
67. Producing customized items in large quantities is called: A. strategic systems. B. customer focus. C. continuous improvement. D. mass production. E. mass customization. Answer: E Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each.
68. The Bodymetrics body scanner is best characterized as an example of: A. mass production. B. customer focus. C. real-time customer input. D. mass customization. E. continuous improvement. Answer: D Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Medium
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 69. Information-based industries are most susceptible to which one of Porter’s five forces? A. threat of entry of new competitors B. bargaining power of suppliers C. bargaining power of customers D. threat of substitute products E. rivalry among existing firms in an industry Answer: D Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
LO 2.4.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. 70. Competitive advantage for an organization manifests itself as all of the following except: A. Lower costs B. Higher quality C. Increased time to market D. Increased profits E. Increased speed Answer: C Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage.
71. For most companies, the Web _____ the threat that new competitors will enter the market by _____ traditional barriers to entry. A. decreases, increasing B. increases, decreasing C. increases, increasing D. decreases, decreasing Answer: B Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage.
72. _____ is a feature that must be offered by a competing organization in order to survive in the marketplace. A. Competitive advantage B. An entry barrier C. Strategic advantage D. Rapid time-to-market E. One-to-one marketing Answer: B Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage.
73. The threat of competitors’ entering the automobile manufacturing industry is _____ because barriers to entry are so _____. A. low, low B. high, high C. high, low D. low, high
Answer: D Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. 74. The threat of competitors’ entering a market is very high in industries that perform a(n) _____ role and in industries where the primary product or service is _____. A. intermediation, physical B. broker, physical
C. sales, financial D. financial, digital E. intermediation, digital Answer: E Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Hard
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage.
75. How does the Internet affect the way you purchase your textbooks? A. The Internet gives you fewer choices. B. The Internet increases your bargaining power. C. The Internet provides you with less information. D. The Internet decreases your bargaining power. E. The Internet increases your switching costs. Answer: B Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage.
76. Buyer power is _____ when buyers have many choices from whom to buy and _____ when buyers have few choices. A. high, the same B. high, low C. low, low D. low, high E. low, the same Answer: B Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage.
77. The costs of delivering products in the _____ channel are much higher than delivering products in the _____ channel. A. e-commerce, digital B. digital, e-commerce C. digital, physical D. physical, financial E. physical, digital
Answer: E Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage.
78. Porter’s competitive forces model helps organizations identify _____, whereas his value chain model helps organizations identify specific _____. A. competitive opportunities, activities B. general strategies, activities C. activities, competitive opportunities D. activities, general strategies E. primary activities, support activities Answer: B Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
LO 2.4.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. 79. _____ activities create value for which customers are willing to pay, whereas _____ activities do not add value directly to the firm’s products or services. A. Support, primary B. Human resource management, inbound logistics C. Procurement, operations D. Primary, support E. Accounting, outbound logistics Answer: D Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage.
80. If there are _____ substitutes for an organization’s products or services, then the threat of substitutes is _____. A. many, high B. few, low C. few, high D. many, low E. few, negligible Answer: A Section Reference 1: Competitive Advantage and Strategic Information Systems
Difficulty: Medium
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage.
81. New technologies can produce new products very _____, which _____ the threat from substitute products. A. slowly, decreases B. slowly, increases C. slowly, does not affect D. quickly, increases E. quickly, does not affect Answer: D Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage.
82. The visibility of Internet applications on the Web makes proprietary systems more difficult to keep secret. This is an example of which of Porter’s five forces? A. threat of entry of new competitors B. bargaining power of suppliers C. bargaining power of customers D. threat of substitute products E. rivalry among existing firms in an industry Answer: E Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
LO 2.4.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. 83. Walmart’s automatic replenishment system, which enables the company to reduce inventory storage requirements, is an example of which strategy for competitive advantage? A. cost leadership B. differentiation C. innovation D. operational effectiveness E. customer-orientation Answer: A Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage.
84. Which strategy for competitive advantage involves offering different products, services, or product features? A. cost leadership B. differentiation C. innovation D. operational effectiveness E. customer-orientation Answer: B Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Easy
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage.
85. Which strategy for competitive advantage involves introducing new products and putting new features in existing products? A. cost leadership B. differentiation C. innovation D. operational effectiveness E. customer-orientation Answer: C Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Easy
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage.
86. Which strategy for competitive advantage involves improving the manner in which an organization executes its internal business processes? A. cost leadership B. differentiation C. innovation D. operational effectiveness E. customer-orientation Answer: D Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Easy
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage.
87. When Amazon welcomes you by name back to its Web site on your second visit, it is employing which strategy for competitive advantage? A. cost leadership B. differentiation C. innovation D. operational effectiveness E. customer-orientation Answer: E Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. 88. IT will impact managers’ jobs in all of the following ways except: A. managers will have time to get into the field B. managers can spend more time planning C. managers can spend more time “putting out fires” D. managers can gather information more quickly E. none of the above Answer: C Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage.
89. Porter’s _____ help(s) companies identify general strategies, whereas his _____ help(s) to identify specific activities where companies can use the strategies for greatest impact. A. value chain model, competitive forces model B. primary activities, support activities C. competitive forces model, primary activities D. competitive forces model, value chain model E. value chain model, support activities Answer: D Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
LO 2.4.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one.
90. Which of the following is not an example of business – IT alignment? A. The company goals are clear to every IT and business employee. B. The company ensures that IT employees understand how the company makes money. C. The company views IT as a way to support the business but not as a way to create new revenue streams. D. IT professionals rotate into business departments. E. The company views customer service as extremely important. Answer: C Section Reference 1: Business-Information Technology Alignment Difficulty: Medium
Learning Objective 1: LO 2.5 Define business-information technology alignment, and describe the characteristics of effective alignment. 91. Which of the following is not a cause of inadequate alignment between IT and business? A. A lack of communication B. Different objectives C. Not understanding each group’s expertise D. Lack of IT knowledge on the part of the business executives E. Lack of funds Answer: E Section Reference 1: Business-Information Technology Alignment Difficulty: Medium
Learning Objective 1: LO 2.5 Define business-information technology alignment, and describe the characteristics of effective alignment. 92. Refer IT’s About Business 2.1 – Sharing Bicycles. Alta’s competitive advantage stems from the fact that A. they have a unique product or service B. they have un-replicable business model C. they have a first mover advantage D. they are the cost leader in their industry E. none of the above Answer: A Section Reference 1: IT’s About Business 2.1 Difficulty: Medium LO 2.0 Provide a real-world application of how information systems can contribute to organizational strategies and competitive advantage. 93. Refer to IT’s About Business 2.2 – Chevron: The changes over the past few years at Chevron were brought about by __________ and __________ at the company level and ____________ at the local level. A. BPI, BPM, BPR B. BPR, BPI, BPM
C. BPM, Six Sigma, BPR D. BPR, BPM and BPI Answer: D Section Reference 1: IT’s About Business 2.2 Difficulty: Medium
Learning Objective 1: LO 2.2 Differentiate between the terms business process reengineering and business process management. 94. Refer to IT’s About Business 2.3 – “Bring Your Own Device” Can Cause Problems: Hamilton Fraser’s human resource department created an acceptable use policy for their employees’ personal communication devices for the following reason: A. They didn’t want their employees wasting time playing games on their iPhones B. They didn’t want the corporate data to be accessible on mobile devices that were lost/misplaced C. They wanted to monitor how their employees were spending their time D. They didn’t want their employees to use social media while working E. They only wanted employees to use Android devices Answer: B Section Reference 1: IT’s About Business 2.3 Difficulty: Medium
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 95. Refer to IT’s About Business 2.4 – The Surui Tribe of the Amazon: The Surui Tribe’s use of technology demonstrates how IT can be used to A. to conserve natural resources B. to prevent deforestation C. to catch criminals D. to create carbon off-sets E. to create awareness about environmental problems Answer: B Section Reference 1: IT’s About Business 2.4 Difficulty: Easy
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 96. Refer to IT’s About Business 2.5 – Massachusetts Mutual Transforms Its Information Systems: What kind of transformation did Massachusetts Mutual Transforms undergo? A. BPI B. BPR C. BPM
Answer: B Section Reference 1: IT’s About Business 2.5 Difficulty: Hard
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 97. Refer to Closing Case – IBM’s Watson: IBM Watson differs from other information systems’ capabilities in the following manner: A. it can store vast amounts of information B. it can search through a large amount of information C. it can process natural language commands D. it can process large amounts of information in response to a query and assign confidence measures to a set of possible solutions E. it can selectively update information based on current trends on the Internet Answer: D Section Reference 1: Closing Case Difficulty: Medium LO 2.6 Summarize the fundamental concepts and skills related to developing organizational strategies and competitive advantage.
Question Type: Short Answer 98. Identify the three types of business pressures, and explain how organizations can use IT to respond to each one. Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Medium
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 99. Using Porter’s competitive forces model, contrast the bargaining power of suppliers and the bargaining power of customers (buyers). Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. 100. What are switching costs, and why would a company care about them? Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. 101. Differentiate between Porter’s competitive forces model and his value chain model.
Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
LO 2.4.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. 102. Differentiate between primary activities and support activities in Porter’s value chain model. Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
LO 2.4.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. 103. Evaluate the assertion that an information system by itself can rarely provide a sustainable competitive advantage. Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage.
Question Type: Essay 104. Explain what a business environment is and what factors within the environment put pressure on the business. Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Medium
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 105. Explain how changes in social responsibility, government regulation/deregulation, social programs, protection against terrorism, and ethics put pressure on modern businesses. Section Reference 1: Business Pressures, Organizational Responses, and IT Support Difficulty: Hard
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 106. Identify the five forces of Porter’s competitive forces model, and explain how the Internet impacts each one. Section Reference 1: Competitive Advantage and Strategic Information Systems
Difficulty: Hard
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 107. Discuss why the variable cost of digital products is extremely low. Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Hard
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each. 108. Provide an example of each of the five strategies for competitive advantage. (Do not use the examples provided in the book). Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Hard
Learning Objective 1: LO 2.3 List and provide examples of the three types of business pressures, and describe one IT response to each.
Question Type: Multiple Choice 109. Ted works in his family’s bakery business. They supply bread and rolls to neighboring restaurants, and have their own store-front where they sell breads, rolls, pastries, cookies, and cupcakes. Ted thinks he should put free Wi-Fi in the store front (which seats about 15 people). This idea reflects which one of Porter’s five competitive forces? A. threat of entry of new competitors B. bargaining power of suppliers C. bargaining power of customers D. threat of substitute products E. rivalry among existing firms in an industry Answer: E Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. 110. Ted works in his family’s bakery business. They supply bread and rolls to neighboring restaurants, and they have their own store front where they sell breads, rolls, pastries, cookies and cupcakes. Ted wants to start a Cookie Club that gives each member (joining is free) a free cookie after they have purchased a dozen. This idea Reflects which one of Porter’s five competitive forces? A. threat of entry of new competitors
B. bargaining power of suppliers C. bargaining power of customers D. threat of substitute products E. rivalry among existing firms in an industry Answer: C Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. 111. Ted works in his family’s bakery business. They supply bread and rolls to neighboring restaurants, and they have their own-store front where they sell breads, rolls, pastries, cookies and cupcakes. Ted wants to build a web site for the business that will allow customers to order cookies and cupcakes for later pickup. Is this idea A. A strategic information system B. In alignment with the business. C. in support of a cost leadership strategy D. likely to provide long term competitive advantage E. a support activity within the value chain Answer: B Section Reference 1: Competitive Advantage and Strategic Information Systems Difficulty: Medium
Learning Objective 1: LO 2.4.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. 112. Hyo runs an ice cream store with her family. Which of the following activities is a part of their procurement process? A. Recording their daily sales revenue B. Sending an order to their sugar supplier C. Making the ice cream D. Setting up an employee schedule E. Taking an order for an ice cream cake Answer: B Section reference 1: Business Processes Difficulty: Medium
Learning Objective 1: LO 2.1 Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. 113. Hyo runs an ice cream store with her family. Which of the following activities is a part of their procurement? A. Send an order to a supplier. B. Decide what to order. C. Record daily sales revenue D. Record goods received E. Send a check to a supplier
Answer: C Section reference 1: Business Processes Difficulty: Medium
Learning Objective 1: LO 2.1 Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization. 114. Hyo runs an ice cream store with her family. Which of the following activities is a part of their fulfillment process? A. Receiving goods from their supplier B. Making ice cream C. Recording daily sales revenue D. Recording goods received E. Making a custom-order ice cream cake Answer: E Section reference 1: Business Processes Difficulty: Medium
Learning Objective 1: LO 2.1 Understand the concept of business processes, and provide examples of business processes in the functional areas of an organization.
Package Title: Testbank Questions Course Title: IS 5e Chapter Number: 3
Question Type: True/False
1. An individual or organization faced with an ethical decision is basically considering whether to break the law. Answer: False Section reference 1: Ethical Issues Difficulty: Easy LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
2. A code of ethics is a collection of principles that are intended to guide decision making by members of the organization. Answer: True Section reference 1: Ethical Issues Difficulty: Easy LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
3. Improvements in information technologies are leading to a decreasing number of ethical problems. Answer: False Section reference 1: Ethical Issues Difficulty: Easy LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
4. When you interview for a job at a company, it is likely that the company will Google you and search social networking sites for information on you. Answer: True Section reference 1: Privacy Difficulty: Easy LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
5. The right of privacy is absolute.
Answer: False Section reference 1: Privacy Difficulty: Easy LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. 6. The individual’s right of privacy supersedes the public’s right to know. Answer: False Section reference 1: Privacy Difficulty: Easy LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. 7. In general, employees have high legal protection against surveillance by employers. Answer: False Section reference 1: Privacy Difficulty: Easy LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. 8. The opt-out model of informed consent allows a company to collect personal information until the customers specifically requests otherwise. Answer: True Section reference 1: Privacy Difficulty: Easy LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. 9. The Platform for Privacy Preferences automatically communicates privacy policies between a commerce Web site and its visitors. Answer: True Section reference 1: Privacy Difficulty: Easy LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. 10. The flow of information among countries is called transborder data flows. Answer: True Section reference 1: Privacy Difficulty: Easy LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. 11. The “safe harbor” framework details how the European Union exports data about U.S. citizens.
Answer: False Section reference 1: Privacy Difficulty: Medium. LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Question Type: Multiple Choice 12. The ____________ ethical standard states that an ethical action is the one that provides the most good or does the least harm. A. Common good B. Fairness C. Rights D. Utilitarian E. Well-being Answer: D Section reference 1: Ethic Issues Difficulty: Medium LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. 13. The ____________ ethical standard states that an ethical action is the one that best protects and respects the moral rights of the affected parties. A. Common good B. Fairness C. Rights D. Utilitarian E. Well-being Answer: C Section reference 1: Ethic Issues Difficulty: Medium LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
14. The _____________ ethical standard states that ethical actions treat all human beings equally. A. Common good B. Fairness C. Rights D. Utilitarian E. Well-being Answer: B Section reference 1: Ethic Issues Difficulty: Easy LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
15. The _______________ ethical standard states that respect and compassion for all others is the basis for ethical actions. A. Common good B. Fairness C. Rights D. Utilitarian E. Well-being Answer: A Section reference 1: Ethic Issues Difficulty: Medium LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
16. Which of the following is not a step in ethical decision making? A. Recognize the ethical issue. B. Get the facts. C. Evaluate alternative actions. D. Make a decision and test it. E. All of these are steps in ethical decision making. Answer: E Section reference 1: Ethic Issues Difficulty: Medium LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
17. Various organizations that promote fair and responsible use of information systems often develop a _____. A. Code of ethics B. Strategic plan C. Mission statement D. Responsibility charter E. Goals outline Answer: A Section reference 1: Ethical Issues Difficulty: Easy LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
18. What is _____ is not necessarily _____. A. Illegal, unethical B. Ethical, illegal C. Unethical, illegal D. Unethical, legal
E. Ethical, legal Answer: C Section reference 1: Ethical Issues Difficulty: Medium LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
19. _____ issues involve collecting, storing, and disseminating information about individuals. A. Privacy B. Accuracy C. TrAnswerferability D. Property E. Accessibility Answer: A Section reference 1: Ethical Issues Difficulty: Easy LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
20. _____ issues involve the authenticity and fidelity of information that is collected and processed. A. Privacy B. Accuracy C. TrAnswerferability D. Property E. Accessibility Answer: B Section reference 1: Ethical Issues Difficulty: Easy LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
21. _____ issues involve who may obtain information and how much they should pay for this information. A. Privacy B. Accuracy C. Transferability D. Property E. Accessibility Answer: E Section reference 1: Ethical Issues Difficulty: Easy LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
22. _____________ means accepting the consequences of your decisions and actions. A. Privacy B. Responsibility C. Transferability D. Accountability E. Liability Answer: B Section reference 1: Ethical Issues Difficulty: Easy LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. 23. ______________ determines who is responsible for the actions taken. A. Privacy B. Responsibility C. TrAnswerferability D. Accountability E. Liability Answer: D Section reference 1: Ethical Issues Difficulty: Easy LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. 24. Which of the following is not an ethical issue related to IT? A. Privacy B. Accuracy C. Accountability D. Property (such as intellectual property) E. Accessibility to information Answer: C Section reference 1: Ethical Issues Difficulty: Easy LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
25. ______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. A. Privacy B. Responsibility C. TrAnswerferability D. Accountability E. Liability Answer: E Section reference 1: Ethical Issues
Difficulty: Easy LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. 26. Which of the following statements is correct? A. An individual’s right to privacy is absolute. B. Determining and enforcing privacy regulations can be difficult. C. An individual’s right to privacy supersedes the needs of society. D. Advances in information technologies have not affected individual privacy. E. The Internet has increased individuals’ privacy. Answer: B Section reference 1: Privacy Difficulty: Medium LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
27. The process of profiling: A. Increases individual privacy. B. Decreases individual privacy. C. Has no effect on individual privacy. D. Is illegal in more than half of the states. E. Is legal but unethical. Answer: B Section reference 1: Privacy Difficulty: Medium LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
28. What is the relationship between advances in information technology and the practice of profiling? A. Advances in IT make it more difficult to profile individuals. B. Advances in IT have no impact on profiling. C. Advances in IT make it more expensive to profile individuals. D. Advances in IT make it easier to profile individuals. Answer: D Section reference 1: Privacy Difficulty: Medium LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
29. Which of the following statements is not correct? A. Employees have limited protection against surveillance by employers. B. The large majority of organizations monitor employee Internet usage. C. The large majority of organizations use URL filtering. D. As with normal first-class mail, employers cannot read employee e-mail.
E. Employees should be aware that surveillance is legal. Answer: D Section reference 1: Privacy Difficulty: Medium LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
30. How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other. A. The public, the individual B. The public, ethics C. Freedom of speech, privacy D. The individual, freedom of speech E. Ethics, security Answer: C Section reference 1: Privacy Difficulty: Hard LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
31. Privacy advocates prefer which model of informed consent? A. Opt-in B. Opt-out C. Either A or B D. Neither A nor B Answer: A Section reference 1: Privacy Difficulty: Easy LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
32. Which of the following statements is correct? A. International privacy and security laws are very consistent. B. Consistent international privacy and security laws help companies with their regulatory requirements from country to country. C. Consistent international privacy and security laws enable information to flow freely among countries. D. The absence of consistent international privacy and security laws has led to a complex global legal framework. E. Consistent international privacy and security laws are followed by all countries. Answer: D Section reference 1: Privacy Difficulty: Medium
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
33. Data aggregators sell digital dossiers to companies that want to know their customers better. This practice is called ________. A. Customer relationships B. Customer profiling C. Customer intimacy D. Customer knowledge E. Spying Answer: C Section reference 1: Privacy Difficulty: Medium LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. 34. Refer to Opening Case– What to Do About WikiLeaks?: Which of the following is false about WikiLeaks? A. Anyone can submit files to WikiLeaks. B. The most controversial expose involved the U.S. government. C. Governments and companies are using network forensics to identify intruders who break into systems. D. Because of WikiLeaks, governments and companies are trying to use data leak prevention software to prevent unauthorized downloads. E. WikiLeaks is legally protected in the U.S. because it is merely a conduit for the documents. Answer: C Section reference 1: Opening Case Difficulty: Medium LO 3.0 Provide a real-world application relating to ethics and privacy in the use of information systems. 35. Refer to IT’s About Business 3.1: Pinterest: Pinterest’s user agreements allows A. Users to pin images that they have created B. Users to pin images from any website C. Users to pin images others have pinned D. A and C E. A, B and C Answer: A Section reference 1: IT’s About Business 3.1 Difficulty: Medium LO 3.0 Provide a real-world application relating to ethics and privacy in the use of information systems. 36. Refer to IT’s About Business 3.2 -- The Dot Clones: It is easy to replicate online business models because of the following reasons A. eCommerce website and their business models are easy to replicate B. eCommerce websites can be easily sold and rebranded
C. eCommerce websites do not require a large amount of investment D. eCommerce website cannot have a presence in more than one country Answer: A Section reference 1: IT’s About Business 3.2 Difficulty: Medium LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. 37. Refer to IT’s About Business 3.3 -- Google Glass: Big Brother Really Is Watching You: Which of the following is true about the privacy issues surrounding the use of Google glass to record audio and visual information? A. It is possible to get the consent of everyone who is being recorded B. Audio and visual recordings from Google Glass can be used for any purpose, including legal proceedings C. Audio and visual recordings data are solely the property of Google D. Users of Google Glass have to announce to the public if they are going to record or photograph anything Answer: B Section reference 1: IT’s About Business 3.3 Difficulty: Medium LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. 38. Refer to Closing Case: Traget Provides a Surprise: which of the following is not a source of information used by Target to profile their customers? A. Shopping patterns for each guest B. Online shopping activities C. User’s e-mail correspondences D. Customer’s public records E. Customer’s credit information Answer: C Section reference 1: Closing Case Difficulty: Medium LO 3.0 Provide a real-world application relating to ethics and privacy in the use of information systems.
Question Type: Essay 39. Identify and analyze the fundamental ethical issues involved with information technology. Section reference 1: Ethical Issues Difficulty: Medium LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. 40. Discuss the fundamental tenants of ethics: responsibility, accountability, and liability.
Section reference 1: Ethical Issues Difficulty: Medium LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. 41. Explain why something that is unethical might not necessarily be illegal. Section reference 1: Ethical Issues Difficulty: Medium LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. 42. Discuss the two rules of privacy: The right of privacy is not absolute, and the public’s right to know supersedes the individual’s right to privacy. Section reference 1: Privacy Difficulty: Medium LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. 43. Compare and contrast the two informed consent models: opt-in and opt-out. Why do companies prefer one over the other? Why do privacy advocates prefer one over the other? Section reference 1: Privacy Difficulty: Medium LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. 44 Discuss the relationship between surveillance and privacy. Section reference 1: Ethical Issues Difficulty: Hard LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. 45. Compare and contrast the four widely used stands for ethics: utilitarian, rights, fairness, and common good. Section reference 1: Ethical Issues Difficulty: Medium LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. 46. Discuss the international aspects of privacy. How do these aspects impact trAnswerborder data flows? Section reference 1: Privacy Difficulty: Medium LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Question Type: Multiple Choice 47. Shelli runs a small boutique in Tel Aviv. She accepts credit cards and writes the number on her copy of the receipt in case there is a problem later. This practice involves which ethical issue related to IT? A. Privacy B. Accuracy C. Accountability D. Property (such as intellectual property) E. Accessibility to information Answer: A Section reference 1: Ethical Issues Difficulty: Medium LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. 48. Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. A new bakery business down the block wants to buy Shelli’s client list from her. If Shelli does sell the list, which ethical issue related to IT would be involved? A. Privacy B. Accuracy C. Accountability D. Property (such as intellectual property) Answer: A Section reference 1: Ethical Issues Difficulty: Medium LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. 49. Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. She keeps all her client data on her laptop in a password-protected file. Her decision to protect the file reflects which ethical issue related to IT? A. Privacy B. Accuracy C. Accountability D. Property (such as intellectual property) E. Accessibility to information Answer: E Section reference 1: Ethical Issues Difficulty: Medium LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. 50. Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. Clients fill out a form to join her mailing list. Shelli indicates on the form that client information will not be shared without permission. This policy illustrates which ethical issue related to IT?
A. Privacy B. Accuracy C. Accountability D. Property (such as intellectual property) E. Accessibility to information Answer: A Section reference 1: Ethical Issues Difficulty: Medium LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. 51. Shelli runs a small boutique in Tel Aviv. Her intern just came to her with a new design for her Web site. Shelli really likes the design, and she informs the intern that he is quite the artist. Section reference 1The intern responds that he found the design on the Internet. Shelli replies that they can’t use it. Her decision reflects which ethical issue related to IT? A. Privacy B. Accuracy C. Accountability D. Property (such as intellectual property) E. Accessibility to information Answer: D Section reference 1: Ethical Issues Difficulty: Medium LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. 52. Shelli runs a small boutique in Tel Aviv. Her intern was checking the boutique’s Facebook page and noticed some negative comments. He deleted them. At the end of the day, when they were closing up, he told Shelli about the comments and what he had done. Shelli was not pleased, and she told him so. Why wasn’t Shelli pleased? A. She didn’t like hearing anything negative about her store. B. People are free to say what they wish. C. She thought he should ask her before he deleted them. D. He wasn’t supposed to be checking Facebook. E. All of these are reasons for Shelli’s not being pleased. Answer: B Section reference 1: Ethical Issues Difficulty: Medium LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Package Title: Testbank Questions Course Title: IS 5e Chapter Number: 4
Question Type: True/False
1) Having one backup of your business data is sufficient for security purposes. Answer: False Title: Assessment Question 4.01 Learning Objective 1: LO 4.1 Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: Introduction to Information Security Difficulty: Easy
2) The security of each computer on the Internet is independent of the security of all other computers on the Internet. Answer: False Title: Assessment Question 4.02 Learning Objective 1: LO 4.1 Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: Introduction to Information Security Difficulty: Easy
3) The computing skills necessary to be a hacker are decreasing. Answer: True Title: Assessment Question 4.03 Learning Objective 1: LO 4.1 Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: Introduction to Information Security Difficulty: Easy
4. Human errors cause more than half of the security-related problems in many organizations. Answer: True Title: Assessment Question 4.04 Learning Objective 1: LO 4.2 Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference 1: Unintentional Threats to Information Systems Difficulty: Easy
5) The higher the level of an employee in organization, the greater the threat that he or she poses to the organization. Answer: True
Title: Assessment Question 4.05 Learning Objective 1: LO 4.2 Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference 1: Unintentional Threats to Information Systems Difficulty: Easy 6) Dumpster diving is always illegal because it involves trespassing on private property. Answer: False Title: Assessment Question 4.06 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Easy
7) Software can be copyrighted. Answer: True Title: Assessment Question 4.07 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Easy
8) Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated. Answer: True Title: Assessment Question 4.08 Learning Objective 1: LO 4.3 Discuss the types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Easy
9) Zero-day attacks use deceptive e-mails to acquire sensitive personal information. Answer: False Title: Assessment Question 4.09 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Medium
10) In most cases, cookies track your path through Web sites and are therefore invasions of your privacy. Answer: True Title: Assessment Question 4.10 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Easy
11) Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition (SCADA) systems to cause widespread physical damage. Answer: True Title: Assessment Question 4.11 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Easy
12) Supervisory control and data acquisition (SCADA) systems require human data input. Answer: False Title: Assessment Question 4.12 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Medium
13) Cyberterrorism is usually carried out by nations. Answer: False Title: Assessment Question 4.13 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Easy
14) IT security is the responsibility of everyone in the organization. Answer: True Title: Assessment Question 4.14 Learning Objective 1: LO 4.4 Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: What Companies Are Doing to Protect Information Resources Difficulty: Easy
15) Risk analysis involves determining whether security programs are working. Answer: False Title: Assessment Question 4.15 Learning Objective 1: LO 4.4 Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: What Companies Are Doing to Protect Information Resources Difficulty: Medium 16) A password refers to “something the user is.”
Answer: False Title: Assessment Question 4.16 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Easy
17) Organizations utilize layers of controls because they face so many diverse threats to information security. Answer: True Title: Assessment Question 4.17 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Medium
18) Public-key encryption uses two different keys, one public and one private. Answer: True Title: Assessment Question 4.18 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Medium 19) Voice recognition is an example of “something a user does” authentication. Answer: True Title: Assessment Question 4.19 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Medium
20) Organizations use authentication to establish privileges to systems operations. Answer: True Title: Assessment Question 4.20 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Medium
21) The area located between two firewalls within an organization is called the demilitarized zone.
Answer: True Title: Assessment Question 4.21 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Easy
22) A VPN is a network within the organization. Answer: False Title: Assessment Question 4.22 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Easy
23) A URL that begins with https rather than http indicates that the site transmits using an extra layer of security called transport layer security. Answer: True Title: Assessment Question 4.23 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Easy
Question Type: Multiple Choice
24) Which of the following factors is not increasing the threats to information security? a) smaller computing devices b) downstream liability c) the Internet d) limited storage capacity on portable devices e) due diligence Answer: d Title: Assessment Question 4.24 Learning Objective 1: LO 4.1 Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: Introduction to Information Security Difficulty: Medium
25) The computing skills necessary to be a hacker are decreasing for which of the following reasons? a) More information systems and computer science departments are teaching courses on hacking so that their graduates can recognize attacks on information assets. b) Computer attack programs, called scripts, are available for download from the Internet. c) International organized crime is training hackers. d) Cybercrime is much more lucrative than regular white-collar crime. e) Almost anyone can buy or access a computer today. Answer: b Title: Assessment Question 4.25 Learning Objective 1: LO 4.1 Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: Introduction to Information Security Difficulty: Hard
26) Rank the following in terms of dollar value of the crime, from highest to lowest. a) robbery – white collar crime – cybercrime b) white collar crime – extortion – robbery c) cybercrime – white collar crime – robbery d) cybercrime – robbery – white collar crime e) white collar crime – burglary – robbery Answer: c Title: Assessment Question 4.26 Learning Objective 1: LO 4.1 Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: Introduction to Information Security Difficulty: Medium
27) A _____ is any danger to which an information resource may be exposed. a) vulnerability b) risk c) control d) threat e) compromise Answer: d Title: Assessment Question 4.27 Learning Objective 1: LO 4.1 Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: Introduction to Information Security Difficulty: Easy 28) An information system’s _____ is the possibility that the system will be harmed by a threat. a) vulnerability b) risk
c) control d) danger e) compromise Answer: a Title: Assessment Question 4.28 Learning Objective 1: LO 4.1 Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: Introduction to Information Security Difficulty: Easy
29) The most overlooked people in information security are: a) consultants and temporary hires. b) secretaries and consultants. c) contract laborers and executive assistants. d) janitors and guards. e) executives and executive secretaries. Answer: d Title: Assessment Question 4.29 Learning Objective 1: LO 4.2 Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference 1: Unintentional Threats to Information Systems Difficulty: Easy
30) Employees in which functional areas of the organization pose particularly grave threats to information security? a) human resources, finance b) human resources, management information systems c) finance, marketing d) operations management, management information systems e) finance, management information systems Answer: b Title: Assessment Question 4.30 Learning Objective 1: LO 4.2 Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference 1: Unintentional Threats to Information Systems Difficulty: Easy
31) Unintentional threats to information systems include all of the following except: a) malicious software b) tailgating c) power outage d) lack of user experience e) tornados Answer: a
Title: Assessment Question 4.31 Learning Objective 1: LO 4.2 Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference 1: Unintentional Threats to Information Systems Difficulty: Medium
32) _____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges. a) Tailgating b) Hacking c) Spoofing d) Social engineering e) Spamming Answer: d Title: Assessment Question 4.32 Learning Objective 1: LO 4.2 Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference 1: Unintentional Threats to Information Systems Difficulty: Easy
33) The cost of a stolen laptop includes all of the following except: a) Loss of intellectual property b) Loss of data c) Backup costs d) Loss of productivity e) Replacement cost Answer: c Title: Assessment Question 4.33 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Easy
34) Dumpster diving is: a) always illegal because it is considered trespassing. b) never illegal because it is not considered trespassing. c) typically committed for the purpose of identity theft. d) always illegal because individuals own the material in the dumpster. e) always legal because the dumpster is not owned by private citizens. Answer: c Title: Assessment Question 4.34 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Medium
35) Cybercriminals can obtain the information they need in order to assume another person’s identity by: a) Infiltrating an organization that stores large amounts of personal information. b) Phishing. c) Hacking into a corporate database. d) Stealing mail. e) All of the above are strategies to obtain information to assume another person’s identity. Answer: e Title: Assessment Question 4.35 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Easy
36) A _____ is intellectual work that is known only to a company and is not based on public information. a) copyright b) patent c) trade secret d) knowledge base e) private property Answer: c Title: Assessment Question 4.36 Learning Objective 1: LO 4.3 Discuss the nine types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Easy 37) A pharmaceutical company’s research and development plan for a new class of drugs would be best described as which of the following? a) Copyrighted material b) Patented material c) A trade secret d) A knowledge base e) Public property Answer: c Title: Assessment Question 4.37 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Easy
38) A _____ is a document that grants the holder exclusive rights on an invention for 20 years. a) copyright b) patent c) trade secret
d) knowledge base e) private property notice Answer: b Title: Assessment Question 4.38 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Easy 39) An organization’s e-mail policy has the least impact on which of the following software attacks? a) virus b) worm c) phishing e) zero-day e) spear phishing Answer: d Title: Assessment Question 4.39 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Hard
40) _____ are segments of computer code that attach to existing computer programs and perform malicious acts. a) Viruses b) Worms c) Trojan horses d) Back doors e) Logic bombs Answer: a Title: Assessment Question 4.40 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Easy
41) _____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated. a) Viruses b) Worms c) Trojan horses d) Back doors e) Logic bombs Answer: e Title: Assessment Question 4.41 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks.
Section Reference 1: Deliberate Threats to Information Systems Difficulty: Easy 42) _____ are segments of computer code embedded within an organization’s existing computer programs that activate and perform a destructive action at a certain time or date. a) Viruses b) Worms c) Trojan horses d) Back doors e) Logic bombs Answer: e Title: Assessment Question 4.42 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Easy
43) A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official email. a) Zero-day b) Denial-of-service c) Distributed denial-of-service d) Phishing e) Brute force dictionary Answer: d Title: Assessment Question 4.43 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Easy
44) In a _____ attack, a coordinated stream of requests is launched against a target system from many compromised computers at the same time. a) phishing b) zero-day c) worm d) back door e) distributed denial-of-service Answer: e Title: Assessment Question 4.44 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Easy
45) The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious. a) Alien software b) Virus c) Worm d) Back door e) Logic bomb Answer: a Title: Assessment Question 4.45 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Easy
46) Which of the following is(are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers? a) Spyware b) Spamware c) Adware d) Viruses e) Worms Answer: b Title: Assessment Question 4.46 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Easy
47) When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers respond by using _____. a) keyloggers, screen scrapers b) screen scrapers, uninstallers c) keyloggers, spam d) screen scrapers, keyloggers e) spam, keyloggers Answer: a Title: Assessment Question 4.47 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Medium
48) _____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset. a) Risk management
b) Risk analysis c) Risk mitigation d) Risk acceptance e) Risk transference Answer: b Title: Assessment Question 4.48 Learning Objective 1: LO 4.4 Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: What Companies Are Doing to Protect Information Resources Difficulty: Easy
49) Which of the following statements is false? a) Credit card companies usually block stolen credit cards rather than prosecute. b) People tend to shortcut security procedures because the procedures are inconvenient. c) It is easy to assess the value of a hypothetical attack. d) The online commerce industry isn’t willing to install safeguards on credit card transactions. e) The cost of preventing computer crimes can be very high. Answer: c Title: Assessment Question 4.49 Learning Objective 1: LO 4.4 Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: What Companies Are Doing to Protect Information Resources Difficulty: Easy
50) In _____, the organization takes concrete actions against risks. a) risk management b) risk analysis c) risk mitigation d) risk acceptance e) risk transference Answer: c Title: Assessment Question 4.50 Learning Objective 1: LO 4.4 Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: What Companies Are Doing to Protect Information Resources Difficulty: Easy
51) Which of the following is not a strategy for mitigating the risk of threats against information? a) Continue operating with no controls and absorb any damages that occur b) Transfer the risk by purchasing insurance. c) Implement controls that minimize the impact of the threat d) Install controls that block the risk. e) All of the above are strategies for mitigating risk.
Answer: e Title: Assessment Question 4.51 Learning Objective 1: LO 4.4 Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: What Companies Are Doing to Protect Information Resources Difficulty: Easy
52) In _____, the organization purchases insurance as a means to compensate for any loss. a) risk management b) risk analysis c) risk mitigation d) risk acceptance e) risk transference Answer: e Title: Assessment Question 4.52 Learning Objective 1: LO 4.4 Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: What Companies Are Doing to Protect Information Resources Difficulty: Easy
53) Which of the following statements concerning the difficulties in protecting information resources is not correct? a) Computing resources are typically decentralized. b) Computer crimes often remain undetected for a long period of time. c) Rapid technological changes ensure that controls are effective for years. d) Employees typically do not follow security procedures when the procedures are inconvenient. e) Computer networks can be located outside the organization. Answer: c Title: Assessment Question 4.53 Learning Objective 1: LO 4.4 Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: What Companies Are Doing to Protect Information Resources Difficulty: Medium
54) _____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources. a) Access b) Physical c) Data security d) Administrative e) Input Answer: a Title: Assessment Question 4.54
Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Easy
55) Access controls involve _____ before _____. a) biometrics, signature recognition b) authentication, authorization c) iris scanning, voice recognition d) strong passwords, biometrics e) authorization, authentication Answer: b Title: Assessment Question 4.55 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Easy
56) Biometrics are an example of: a) something the user is. b) something the user wants. c) something the user has. d) something the user knows. e) something the user does. Answer: a Title: Assessment Question 4.56 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Easy
57) Voice and signature recognition are examples of: a) something the user is. b) something the user wants. c) something the user has. d) something the user knows. e) something the user does. Answer: e Title: Assessment Question 4.57 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Easy
58) Passwords and passphrases are examples of: a) something the user is. b) something the user wants. c) something the user has. d) something the user knows. e) something the user does. Answer: e Title: Assessment Question 4.58 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Easy
59) Which of the following is not a characteristic of strong passwords? a) They are difficult to guess. b) They contain special characters. c) They are not a recognizable word. d) They are not a recognizable string of numbers e) They tend to be short so they are easy to remember. Answer: e Title: Assessment Question 4.59 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Medium
60) Which of the following is not an example of a weak password? a) IloveIT b) 08141990 c) 9AmGt/* d) Rainer e) InformationSecurity Answer: c Title: Assessment Question 4.60 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Medium 61) Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted’s _____ key, and Ted decrypts the message using his _____ key. a) public, public
b) public, private c) private, private d) private, public e) none of these Answer: b Title: Assessment Question 4.61 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Medium
62) Which of the following statements concerning firewalls is not true? a) Firewalls prevent unauthorized Internet users from accessing private networks. b) Firewalls examine every message that enters or leaves an organization’s network. c) Firewalls filter network traffic according to categories of activities that are likely to cause problems. d) Firewalls filter messages the same way as anti-malware systems do. e) Firewalls are sometimes located inside an organization’s private network. Answer: d Title: Assessment Question 4.62 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Medium
63) In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called _____, the company allows everything to run unless it is not approved. a) whitelisting, blacklisting b) whitelisting, encryption c) encryption, whitelisting d) encryption, blacklisting e) blacklisting, whitelisting Answer: a Title: Assessment Question 4.63 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Medium
64) Organizations use hot sites, warm sites, and cold sites to insure business continuity. Which of the following statements is not true? a) A cold site has no equipment. b) A warm site has no user workstations. c) A hot site needs to be located close to the organization’s offices. d) A hot site duplicates all of the organization’s resources.
e) A warm site does not include actual applications. Answer: c Title: Assessment Question 4.64 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Easy
Question Type: Essay
65) Compare trade secrets, patents, and copyrights as forms of intellectual property. Answer: Title: Assessment Question 4.65 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Medium
66) Contrast unintentional and deliberate threats to an information resource. Provide examples of both. Answer: Title: Assessment Question 4.66 Learning Objective 1: LO 4.2 Compare and contrast human mistakes and social engineering, providing an example for each. Learning Objective 2: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Unintentional Threats to Information Systems Section Reference 2: Deliberate Threats to Information Systems Difficulty: Medium
67) Contrast the following types of remote attacks: virus, worm, phishing, and spear phishing. Answer: Title: Assessment Question 4.67 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Medium
68) Contrast the following types of attacks created by programmers: Trojan horse, back door, and logic bomb Answer: Title: Assessment Question 4.68 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Medium
69) Contrast spyware and spamware. Answer: Title: Assessment Question 4.69 Learning Objective 1: LO 4.3 Discuss the ten types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Easy
70) Contrast risk acceptance, risk limitation, and risk transference. Answer: Title: Assessment Question 4.70 Learning Objective 1: LO 4.4 Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: What Companies Are Doing to Protect Information Resources Difficulty: Medium
71) Describe public key encryption. Answer: Title: Assessment Question 4.71 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Medium
72) Compare a hot site, a warm site, and a cold site as strategies for business continuity. Answer: Title: Assessment Question 4.72 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Medium
73) Contrast the four types of authentication. Answer: Title: Assessment Question 4.73 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Medium
74) Identify and discuss the factors that are contributing to the increasing vulnerability of organizational information assets. Answer: Title: Assessment Question 4.74 Learning Objective 1: LO 4.1 Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: Introduction to Information Security Difficulty: Hard
75) Define identity theft, and explain the types of problems that it creates for the victims. Answer: Title: Assessment Question 4.75 Learning Objective 1: LO 4.3 Discuss the nine types of deliberate attacks. Section Reference 1: Deliberate Threats to Information Systems Difficulty: Medium
76) Discuss the possible consequences of a terrorist attack on a supervisory control and data acquisition (SCADA) system. Answer: Title: Assessment Question 4.76 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Hard 77) Define the principle of least privilege, and consider how an organization’s senior executives might view the application of this principle. Answer: Title: Assessment Question 4.77 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Hard
78) Explain why anti-malware software is classified as reactive. Answer: Title: Assessment Question 4.78 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Hard
79) Describe how a digital certificate works. Answer: Title: Assessment Question 4.79 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Hard
Question Type: True/False 80) You start a dog-walking service, and you store your client’s records on your cell phone. You don’t need to worry about information security. Answer: False Title: Assessment Question 4.80 Learning Objective 1: LO 4.1 Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: Introduction to Information Security Difficulty: Easy
Question Type: Multiple Choice 81) Your company’s headquarters was just hit head on by a hurricane, and the building has lost power. The company sends you to their hot site to minimize downtime from the disaster. Which of the following statements is true? a) The site will not have any servers. b) The site will not have any workstations, so you need to bring your laptop. c) The site is probably in the next town. d) The site should be an almost exact replica of the IT configuration at headquarters. e) The site will not have up-to-date data. Answer: d Title: Assessment Question 4.81 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Medium
82) You receive an e-mail from your bank informing you that they are updating their records and need your password. Which of the following statements is true? a) The message could be an industrial espionage attack. b) The message could be a phishing attack. c) The message could be a denial of service attack. d) The message could be a back door attack. e) The message could be a Trojan horse attack.
Answer: b Title: Assessment Question 4.82 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Medium
83) You start a new job, and the first thing your new company wants you to do is create a user ID and a password. Which of the following would be a strong password? a) The name of the company b) Your last name c) Your birthdate d) Your initials (capitalized) and the number of the floor you are on e) The name of the company spelled backward Answer: e Title: Assessment Question 4.83 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Medium
84) You start a new job, and human resources gives you a ten-page document that outlines the employee responsibilities for information security. Which of the following statements is most likely to be true? a) The document recommends that login passwords be left on a piece of paper in the center desk drawer so that others can use the laptop if necessary. b) You are expected to read the document, and you could be reprimanded if you don’t follow its guidelines. c) You can back up sensitive data to a thumb drive so you can take them home to work with. d) The document indicates that you can leave your laptop unlocked if you leave your desk for less than an hour. e) The document permits you to lend your laptop to your brother for the weekend. Answer: b Title: Assessment Question 4.84 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Easy
Question Type: Essay
85) Tim ventured out into the world of retail by renting a cart at a local mall. His product is personalized coffee mugs. He uses his laptop to track sales and to process credit card sales. He has a customer mailing list that is updated by customers on the laptop as well. At the end of each day, Tim backs up all of his data to a thumb drive and puts the drive into the laptop case with the laptop. Discuss Tim’s information security strategy. Answer:
Title: Assessment Question 4.85 Learning Objective 1: LO 4.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: Information Security Controls Difficulty: Medium
Package Title: Testbank Questions Course Title: IS 5e Chapter Number: 5
Question Type: True-False 1. It is easy to manage all the data coming into an organization. Answer: False Section reference 1: Managing Data Difficulty: Easy Learning Objective 1: LO 5.1 Discuss ways that common challenges in managing data can be addressed using data governance.
2. Increasing amounts of external data need to be considered in making organizational decisions. Answer: True Section reference 1: Managing Data Difficulty: Easy Learning Objective 1: LO 5.1 Discuss ways that common challenges in managing data can be addressed using data governance.
3. Data rot refers to the quality of the data itself. Answer: False Section reference 1: Managing Data Difficulty: Medium Learning Objective 1: LO 5.1 Discuss ways that common challenges in managing data can be addressed using data governance.
4. There is no difference between master data and transaction data. Answer: False Section reference 1: Managing Data Difficulty: Easy Learning Objective 1: LO 5.1 Discuss ways that common challenges in managing data can be addressed using data governance.
5. Big Data is easy to define. Answer: False Section Reference 1: Big Data
1
Learning Objective 1: LO 5.2. Define Big Data, and discuss its basic characteristics. Difficulty: Easy 6. Big Data has three distinct characteristics that distinguish it from traditional data. Answer: True Section Reference 1: Big Data Difficulty: Easy Learning Objective 1: LO 5.2. Define Big Data, and discuss its basic characteristics. 7. Today, large corporations are able to process big data but only at great expense. Answer: False Section Reference 1: Big Data Difficulty: Medium Learning Objective 1: LO 5.2. Define Big Data, and discuss its basic characteristics. 8. It is important for applications and data to be dependent on each other. Answer: False Section reference 1: The Database Approach Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 9. A negative value for a student’s grade point average is an example of a data integrity problem. Answer: True Section reference 1: The Database Approach Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 10. An entity is a person, place, thing, or event about which information is maintained. Answer: True Section reference 1: Designing the Database Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 11. An attribute is any characteristic or quality that describes a particular entity. Answer: True Section reference 1: Designing the Database Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 12. The secondary key is a field that identifies a record with complete uniqueness.
2
Answer: False Section reference 1: Designing the Database Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 13. Entity-relationship diagrams are documents that show the primary and secondary keys associated with a conceptual data model. Answer: False Section reference 1: Designing the Database Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 14. You would be an instance of your university’s STUDENT class. Answer: True Section reference 1: Designing the Database Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram.
15. The relational database model is based on the concept of three-dimensional tables. Answer: False Section reference 1: Database Management Systems Difficulty: Easy Learning Objective 1: LO 5.4 Discuss the advantages and disadvantages of relational databases. 16. Structured query language is a relational database language that enables users to perform complicated searches with relatively simple statements. Answer: True Section reference 1: Database Management Systems Difficulty: Easy Learning Objective 1: LO 5.4 Discuss the advantages and disadvantages of relational databases. 17. The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security. Answer: True Section reference 1: Database Management Systems Difficulty: Easy Learning Objective 1: LO 5.4 Discuss the advantages and disadvantages of relational databases.
3
18. When data are normalized, attributes in the table depend on the primary key and any secondary keys. Answer: False Section reference 1: Database Management Systems Difficulty: Easy Learning Objective 1: LO 5.4 Discuss the advantages and disadvantages of relational databases. 19. In a data warehouse, existing data are constantly purged as new data come in. Answer: False Section reference 1: Data Warehousing Difficulty: Easy Learning Objective 1: LO 5.5 Explain the elements necessary to successfully implement and maintain data warehouses. 20. An organization’s data warehouse generally maintains its operational data. Answer: False Section reference 1: Data Warehousing Difficulty: Easy Learning Objective 1: LO 5.5 Explain the elements necessary to successfully implement and maintain data warehouses. 21. Online analytical processing (OLAP) involves the analysis of accumulated data by end users. Answer: True Section reference 1: Data Warehousing Difficulty: Easy Learning Objective 1: LO 5.5 Explain the elements necessary to successfully implement and maintain data warehouses. 22. Data marts are designed for the end-user needs in a strategic business unit or department. Answer: True Section reference 1: Data Warehousing Difficulty: Easy Learning Objective 1: LO 5.5 Explain the elements necessary to successfully implement and maintain data warehouses. 23. Master data are generated and captured by operational systems. Answer: False Section reference 1: Data Governance Difficulty: Easy Learning Objective 1: LO 5.5 Explain the elements necessary to successfully implement and maintain data warehouses. 24. Tacit knowledge is the more objective, rational, and technical types of knowledge.
4
Answer: False Section reference 1: Knowledge Management Difficulty: Easy Learning Objective 1: LO 5.6 Describe the benefits and challenges of implementing knowledge management systems in organizations. 25. Explicit knowledge refers to the cumulative store of subjective learning, which is personal and hard to formalize. Answer: False Section reference 1: Knowledge Management Difficulty: Easy Learning Objective 1: LO 5.6 Describe the benefits and challenges of implementing knowledge management systems in organizations. 26. Refer to IT’s About Business 5.1: The Rollins Automotive illustrates that a single database can be used to convey information very fast between multiple organizations and software applications. Answer: True Section reference IT’s About Business 5.1 Difficulty: Easy Learning Objective 1: LO 5.0 Provide a real-world application of data and knowledge management. 27. Refer to IT’s About Business 5.2: Storing data in proprietary formats does not pose a great challenge in consolidating and systematically categorizing data from multiple sources. Answer: False Section reference IT’s About Business 5.2 Difficulty: Easy Learning Objective 1: LO 5.0 Provide a real-world application of data and knowledge management.
Question Type: MULTIPLE CHOICE
28. Which of the following is not a source for external data? A. Commercial databases B. Corporate databases C. Sensors D. Satellites E. Government reports Answer: B Section reference 1: Managing Data Difficulty: Easy
5
Learning Objective 1: LO 5.1 Discuss ways that common challenges in managing data can be addressed using data governance. 29. Which of the following is not a reason why managing data is difficult over time? A. New systems are developed. B. The media the data are stored on becomes problematic. C. New sources of data are created. D. The amount of data increases exponentially. E. All of these are reasons why managing data is difficult over time. Answer: E Section Reference 1: Managing Data Difficulty: Medium Learning Objective 1: LO 5.1 Discuss ways that common challenges in managing data can be addressed using data governance.
Question Type: Multiple Select
30. Which of the following are requirements under the Sarbanes-Oxley act? (check all that apply) a) Public companies must evaluate and disclose the effectiveness of their internal financial controls. b) Companies must hire independent auditors to verify the disclosures. c) IT employees are held personally responsible for the release and validity of all filings. d) Company officers can be held personally liable if the company lacks satisfactory data management policies. e) Companies will not be held liable if a security breach occurs. Answer: a.b.d Section Reference 1: Managing Data Difficulty: Medium Learning Objective 1: LO 5.1 Discuss ways that common challenges in managing data can be addressed using data governance.
Question Type: Multiple Choice
31. The amount of data produced worldwide is increasing by ___% each year. a) 10 b) 50 c) 90 d) It is not increasing at all. Answer: b Section reference 1: Big Data Difficulty: Easy
6
Learning Objective 1: LO 5.2. Define Big Data, and discuss its basic characteristics. 32. What are the three distinct characteristics that distinguish big data from traditional data? a) volume, variety and veracity b) volume, velocity and verification c) volume, velocity and variety d) volume, verification and variety Answer: c Section reference 1: Big Data Difficulty: Medium Learning Objective 1: LO 5.2. Define Big Data, and discuss its basic characteristics. 33. Traditional data formats change ______ while big data formats change _______. a) slowly, rapidly b) rapidly, slowly c) slowly, incrementally d) both formats of data change at the same rate Answer: a Section reference 1: Big Data Difficulty: Medium Learning Objective 1: LO 5.2. Define Big Data, and discuss its basic characteristics.
34. Why are many organizations turning to NoSQL databases to manage big data? a) NoSQL databases do not allow for missing data b) NOSQL databases can process unstructured as well as structured data c) NoSQL databases have a finite amount of data they can handle d) NoSQL databases are less expensive than other databases Answer: b Section Reference 1: Big Data Difficulty: Hard Learning Objective 1: LO 5.2. Define Big Data, and discuss its basic characteristics.
35. Not including alphabetic characters in a Social Security Number field is an example of _____ . A. Data isolation. B. Data integrity. C. Data consistency. D. Data redundancy. E. Application/data dependence. Answer: B Section reference 1: The Database Approach
7
Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 36. _____ occurs when applications cannot access data associated with other applications. A. Data isolation B. Data integrity C. Data consistency D. Data redundancy E. Application/Data dependence Answer: A Section reference 1: The Database Approach Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 37. _____ occurs when the same data are stored in many places. A. Data isolation B. Data integrity C. Data consistency D. Data redundancy E. Application/Data dependence Answer: D Section reference 1: The Database Approach Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 38. _____ occurs when various copies of the data agree. A. Data isolation B. Data integrity C. Data consistency D. Data redundancy E. Application/Data dependence Answer: C Section reference 1: The Database Approach Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 39. You have moved to a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management? A. Data redundancy B. Data inconsistency C. Data isolation D. Data security E. Data dependence
8
Answer: B Section reference 1: The Database Approach Difficulty: Medium Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 40. Place the following members of the data hierarchy in their correct order: A. Bit – byte – field – record – database – file B. Bit – field – byte – record – file – database C. Byte – bit – record – field – database D. Bit – byte – field – record – file – database E. Bit – record – field – byte – file -- database Answer: D Section reference 1: Data Hierarchy Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram.
41. In the data hierarchy, the smallest element is the _____. A. Record. B. Bit. C. Byte. D. Character. E. File. Answer: B Section reference 1: Data Hierarchy Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 42. A(n) _____ is a logical grouping of characters into a word, a small group of words, or a complete number. A. Byte B. Field C. Record D. File E. Database Answer: B Section reference 1: Data Hierarchy Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 43. A(n) _____ is a logical grouping of related fields. A. Byte B. Field C. Record
9
D. File E. Database Answer: C Section reference 1: Data Hierarchy Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 44. A(n) _____ is a logical grouping of related records. A. Byte B. Field C. Record D. File E. Database Answer: D Section reference 1: Data Hierarchy Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 45. A(n) _____ represents a single character, such as a letter, number, or symbol. A. Byte B. Field C. Record D. File E. Database Answer: A Section reference 1: Data Hierarchy Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 46. In a database, the primary key field is used to _____. A. specify an entity B. create linked lists C. identify duplicated data D. uniquely identify a record E. uniquely identify an attribute Answer: D Section reference 1: Designing the Database Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 47. _____ are fields in a record that have some identifying information but typically do not identify the record with complete accuracy. A. Primary keys
10
B. Secondary keys C. Duplicate keys D. Attribute keys E. Record keys Answer: B Section reference 1: Designing the Database Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 48. As an individual student in your university’s student database, you are a(n) _____ of the STUDENT class. A. instance B. individual C. representative D. entity E. relationship Answer: A Section reference 1:Designing the Database Difficulty: Medium Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 49. At your university, students can take more than one class, and each class can have more than one student. This is an example of what kind of relationship? A. one-to-one B. one-to-many C. many-to-one D. many-to-many E. some-to-many Answer: D Section reference 1: Designing the Database Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 50. In a university’s relational database, the student record contains information regarding the student’s last name. The last name is a(n): A. attribute. B. entity. C. primary key. D. object. E. file. Answer: A Section reference 1: Designing the Database Difficulty: Easy
11
Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 51. A database management system is primarily a(n) _____. A. file-handling program B. data-modeling program C. interface between applications and a database D. interface between data and a database E. interface between queries and a database Answer: C Section reference 1: Database Management Systems Difficulty: Easy Learning Objective 1: LO 5.4 Discuss the advantages and disadvantages of relational databases. 52. In the relational database model, related tables can be joined when they contain common _____. A. primary keys B. rows C. records D. columns E. files Answer: D Section reference 1: Database Management Systems Difficulty: Medium Learning Objective 1: LO 5.4 Discuss the advantages and disadvantages of relational databases. 53. _____ tell the database management system which records are joined with others in related tables. A. Primary keys B. Secondary keys C. Common attributes D. Common files E. Common fields Answer: A Section reference 1: Database Management Systems Difficulty: Medium Learning Objective 1: LO 5.4 Discuss the advantages and disadvantages of relational databases. 54. Data dictionaries perform all of the following functions except: A. Providing information on each record. B. Providing information on why attributes are needed in the database. C. Defining the format necessary to enter data into the database. D. Providing information on the name of each attribute. E. Providing information on how often attributes should be updated.
12
Answer: A Section reference 1: Database Management Systems Difficulty: Medium Learning Objective 1: LO 5.4 Discuss the advantages and disadvantages of relational databases. 55. In a relational database, every row represents a(n) _____. A. file B. record C. attribute D. primary key E. secondary key Answer: B Section reference 1: Database Management Systems Difficulty: Easy Learning Objective 1: LO 5.4 Discuss the advantages and disadvantages of relational databases.
56. A standardized language used to manipulate data is _____. A. MS-Access B. Oracle C. query-by-example language D. structured query language E. data-manipulation language Answer: D Section reference 1: Database Management Systems Difficulty: Easy Learning Objective 1: LO 5.4 Discuss the advantages and disadvantages of relational databases. 57. Data dictionaries provide which of the following advantages to the organization? A. They reduce data inconsistency. B. They enable faster program development. C. They make it easier to modify data and information. D. Only B and C E. All of the above Answer: E Section reference 1: Database Management Systems Difficulty: Easy Learning Objective 1: LO 5.4 Discuss the advantages and disadvantages of relational databases. 58. _____ is a method for analyzing and reducing a relational database to its most streamlined form. A. Structured query B. Normalization C. Query by example
13
D. Joining E. Relational analysis Answer: B Section reference 1: Database Management Systems Difficulty: Easy Learning Objective 1: LO 5.4 Discuss the advantages and disadvantages of relational databases. 59. When data are normalized, attributes in the table depend only on the _____. A. secondary key B. common attribute C. primary key D. common row E. common record Answer: C Section reference 1: Database Management Systems Difficulty: Easy Learning Objective 1: LO 5.4 Discuss the advantages and disadvantages of relational databases. 60. The data in a data warehouse have which of the following characteristics? A. They are organized by subject. B. They are coded in different formats. C. They are updated in real time. D. They are typically retained for a defined, but limited, period of time. E. They are organized in a hierarchical structure. Answer: A Section reference 1: Data Warehousing Difficulty: Medium Learning Objective 1: LO 5.5 Explain the elements necessary to successfully implement and maintain data warehouses.
61. The data in a data warehouse: A. are updated constantly in real time. B. are updated in batch mode, approximately once per day. C. are not updated. D. are purged constantly as new data enter. E. are available for MIS analysts, but not users. Answer: C Section reference 1: Data Warehousing Difficulty: Medium Learning Objective 1: LO 5.5 Explain the elements necessary to successfully implement and maintain data warehouses.
62. The process of moving data from various sources into the data warehouse is called:
14
A. uploading. B. extracting, transforming, and loading. C. online transaction processing. D. master data management. E. online analytical processing. Answer: B Section reference 1: Data Warehousing Difficulty: Easy Learning Objective 1: LO 5.5 Explain the elements necessary to successfully implement and maintain data warehouses.
63. Compared to data warehouses, data marts have which one of the following characteristics? A. They cost less. B. They have longer lead times for implementation. C. They provide for central rather than local control. D. They contain more information. E. They are more difficult to navigate. Answer: A Section reference 1: Data Warehousing Difficulty: Medium Learning Objective 1: LO 5.5 Explain the elements necessary to successfully implement and maintain data warehouses.
64. _____ is a formal approach to managing data consistently across an entire organization. A. Database management B. Enterprise information management C. Data warehousing D. Data governance E. Data mart Answer : D Section reference 1 : Data Governance Difficulty : Easy Learning Objective 1: LO 5.5 Explain the elements necessary to successfully implement and maintain data warehouses.
65. _____ provide(s) companies with a single version of the truth for their data. A. Data warehouses B. Data marts C. Databases D. Master data management E. Enterprise information management Answer: D Section reference 1: Data Governance
15
Difficulty: Easy Learning Objective 1: LO 5.5 Explain the elements necessary to successfully implement and maintain data warehouses.
66. Organizations are turning to data governance for which of the following reasons? A. They have too little data. B. They are responding to federal regulations. C. Their data are typically structured. D. Their data are usually located in the organization’s databases. E. Data across their organizations are generally consistent. Answer: B Section reference 1: Data Governance Difficulty: Hard Learning Objective 1: LO 5.5 Explain the elements necessary to successfully implement and maintain data warehouses.
67. _____ describe the activities of the business, whereas _____ categorize(s), aggregate(s), and evaluate(s) data generated by the organization’s activities. A. Transaction data, master data B. Source data, transaction data C. Operational data, master data D. Master data, source data E. Business dimensional data, databases Answer: A Section reference 1: Data Governance Difficulty: Medium Learning Objective 1: LO 5.5 Explain the elements necessary to successfully implement and maintain data warehouses.
68. _____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization’s memory and typically reside inside the organization in an unstructured manner. A. Discovery B. Knowledge management C. Decision support D. Online analytical processing E. Data mining Answer: B Section reference 1: Knowledge Management Difficulty: Easy Learning Objective 1: LO 5.6 Describe the benefits and challenges of implementing knowledge management systems in organizations.
16
69. _____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem. A. Knowledge, information B. Data, information C. Information, data D. Information, knowledge E. Data, knowledge Answer: A Section reference 1: Knowledge Management Difficulty: Medium Learning Objective 1: LO 5.6 Describe the benefits and challenges of implementing knowledge management systems in organizations.
70. Explicit knowledge has which of the following characteristics? A. objective B. personal C. slow D. costly to transfer E. ambiguous Answer: A Section reference 1: Knowledge Management Difficulty: Medium Learning Objective 1: LO 5.6 Describe the benefits and challenges of implementing knowledge management systems in organizations.
71. Tacit knowledge has which of the following characteristics? A. codified B. objective C. unstructured D. rational E. technical Answer: C Section reference 1: Knowledge Management Difficulty: Medium Learning Objective 1: LO 5.6 Describe the benefits and challenges of implementing knowledge management systems in organizations.
72. Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge. A. tacit B. explicit C. managerial D. geographical E. cultural
17
Answer: B Section reference 1: Knowledge Management Difficulty: Medium Learning Objective 1: LO 5.6 Describe the benefits and challenges of implementing knowledge management systems in organizations.
73. The most important benefit of knowledge management systems is: A. They improve customer service. B. They make best practices available to employees. C. They enable the organization to retain scarce knowledge when employees retire. D. They improve employee morale. E. They make product development more efficient. Answer: B Section reference 1: Knowledge Management Difficulty: Medium Learning Objective 1: LO 5.6 Describe the benefits and challenges of implementing knowledge management systems in organizations. 74. Refer to IT’s About Business 5.3: Database Solution for the German Aerospace Center: The challenges associated with data collection from satellites include the following except: A. Capturing data in real time B. Storing data at the satellite C. Transferring data from the satellite to central databases D. Storing current and past data collected from the satellites E. Processing data to compare current and past information to predict future events Answer: E Section reference 1: Refer to IT’s About Business 5.3 Difficulty: medium Learning Objective 1: LO 5.0 Provide a real-world application of data and knowledge management. 75. Refer to IT’s About Business 5.4: Hospital Improves Patient Care with Data Warehouse: A single source of all patient data, accessible to multiple hospitals will have the following benefit A. aid in medical research B. reduce duplicate tests C. eliminate the need for patients to do their own record keeping D. faster transfer of high-volume image data across different locations E. all of the above Answer: E Section reference 1: Refer to IT’s About Business 5.3 Difficulty: easy Learning Objective 1: LO 5.0 Provide a real-world application of data and knowledge management. 76. Refer to Closing Case – Can Organizations Have Too Much Data? The primary reason why organizations would want to maintain multiple copies of the same data are the regulations and laws.
18
Answer: False Section reference 1: Closing Case Difficulty: easy Learning Objective 1: LO 5.0 Provide a real-world application of data and knowledge management.
Question Type: SHORT ANSWER 77. Discuss why decisions concerning data structure have a broader impact than decisions concerning hardware and software. Section reference 1: Managing Data Difficulty: Medium Learning Objective 1: LO 5.1 Discuss ways that common challenges in managing data can be addressed using data governance.
78. Discuss the difficulties involved in managing data. Section reference 1: Managing Data Difficulty: Medium Learning Objective 1: LO 5.1 Discuss ways that common challenges in managing data can be addressed using data governance.
79 List ways in which organizations can leverage big data to gain value. Section reference 1: Big Data Difficulty: Medium Learning Objective 1: LO 5.2. Define Big Data, and discuss its basic characteristics.
80. Define each element of the data hierarchy, in order from smallest to largest. Section reference 1: The Database Approach Difficulty: Medium Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram.
81. Discuss the advantages of the database approach. Section reference 1: The Database Approach Difficulty: Medium Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram.
19
82. Describe entity-relationship modeling. Section reference 1: The Database Approach Difficulty: Medium Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram.
83. Describe the relational database model. Section reference 1: Database Management Systems Difficulty: Medium Learning Objective 1: LO 5.4 Discuss the advantages and disadvantages of relational databases. 84. Describe the characteristics of a data warehouse. Section reference 1: Data Warehousing Difficulty: Medium Learning Objective 1: LO 5.5 Explain the elements necessary to successfully implement and maintain data warehouses.
85. What are the advantages of a data mart? Section reference 1: Data Warehousing Difficulty: Medium Learning Objective 1: LO 5.5 Explain the elements necessary to successfully implement and maintain data warehouses.
86. Differentiate between explicit knowledge and tacit knowledge. Provide examples of each. Section reference 1: Knowledge Management Difficulty: Medium Learning Objective 1: LO 5.5 Explain the elements necessary to successfully implement and maintain data warehouses.
87. Describe the six steps of the knowledge management system cycle. Section reference 1: Knowledge Management Difficulty: Medium Learning Objective 1: LO 5.5 Explain the elements necessary to successfully implement and maintain data warehouses.
Question Type: ESSAY
20
89. Describe the various new sources for data, and provide an example of each. Section reference 1: Opening case Difficulty: Hard Learning Objective 1: LO 5.1 Discuss ways that common challenges in managing data can be addressed using data governance. 90. Explain the six problems that can be minimized using the database approach. Section reference 1: The Database Approach Difficulty: Medium Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram.
91. Identify and explain the advantages of the four characteristics of data warehouses. Section reference 1: data Warehousing Difficulty: Medium Learning Objective 1: LO 5.5 Explain the elements necessary to successfully implement and maintain data warehouses.
92. Differentiate between master data and transaction data. Section reference 1: Data Governance Difficulty: Hard Learning Objective 1: LO 5.5 Explain the elements necessary to successfully implement and maintain data warehouses.
93. Why is data governance so important for organizations? Section reference 1: Data Governance Difficulty: Hard Learning Objective 1: LO 5.5 Explain the elements necessary to successfully implement and maintain data warehouses.
QUESTION TYPE: TRUE/FALSE 94. For the following entity-relationship diagram, the Student entity would have the foreign key.
Answer: False Section reference 1: Designing the Database
21
Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram.
Question Type: Multiple Choice
95. For the following entity-relationship diagram, the attributes you would NOT expect to see in the Computer entity are
A. manufacturer. B. type (laptop or desktop). C. memory size. D. disk size. E. student’s dorm room. Answer: E Section reference 1: Designing the Database Difficulty: Easy Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram.
96. For the following entity-relationship diagram, what could the primary key be in the Grade entity?
A. Primary key in Student entity B. Primary key in Course entity C. Its own primary key. D. Primary key made up of the primary keys in Student entity and Course entity E. It doesn’t need a primary key. Answer: D Section reference 1: Designing the Database Difficulty: Medium Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram. 97. In a jewelry store, a customer places an order for a piece of jewelry (for example, a silver pin in the shape of a tulip). A customer could order more than one piece of jewelry at a time. Which of the following entity-relationship diagrams is true?
22
Answer: D Section reference 1: Designing the Database Difficulty: Medium Learning Objective 1: LO 5.3 Explain how to interpret the relationships depicted in an entityrelationship diagram.
98. In data warehouses and data marts, data are stored in a multidimensional structure and visually represented as a data cube. Figure 3.12 is an example of a data cube of sales with the dimensions of product, geographic area, and time period (year). These are called business dimensions. What would the business dimensions be for Walmart’s sales with its many sales transactions for many products in many stores that would allow them to do weekly analysis? A. Customer, product, and month B. Customer, product, store C. Customer, product, store, and month D. Customer, product, store, and week E. Product, store, and week Answer: E Section reference 1: Data Warehouse Difficulty: Medium
23
Question Type: True/False 99. When you start a job, you are given an employee handbook which contains the company’s tacit knowledge. Answer: False Section reference 1: Knowledge Management Difficulty: Medium
100. When you start a job, you watch what other employees are doing and ask them to explain why they do it in a particular way. They are sharing their tacit knowledge. Answer: True Section reference 1: Knowledge Management Difficulty: Medium
24
Package Title: Testbank Questions Course Title: Intro to IS 5e Chapter Number: 6
Question Type: True/False 1. A local area network connects two or more communicating devices in a limited geographical area. Answer: True Section reference 1: What Is a Computer Network? Difficulty: Easy Learning Objective 1: LO 6.1 Compare and contrast the two major types of networks.
2. Network interface cards are special adapters that link an individual device to the communications medium on a local area network. Answer: True Section reference 1: What Is a Computer Network? Difficulty: Easy Learning Objective 1: LO 6.1 Compare and contrast the two major types of networks.
3. The network interface card typically houses the LAN’s network operating system. Answer: False Section reference 1: What Is a Computer Network? Difficulty: Easy Learning Objective 1: LO 6.1 Compare and contrast the two major types of networks.
4. Wide-area networks have a large capacity, and they typically use a single communications channel. Answer: False Section reference 1: What Is a Computer Network? Difficulty: Easy Learning Objective 1: LO 6.1 Compare and contrast the two major types of networks. 5. Digital signals are continuous waves that transmit information by altering the characteristics of the waves.
Answer: False Section reference 1: Network Fundamentals Difficulty: Easy Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
6. Digital signals have two parameters: frequency and amplitude. Answer: False Section reference 1: Network Fundamentals Difficulty: Easy Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
7. The U.S. public telephone system was designed as an analog network to carry voice signals. Answer: True Section reference 1: Network Fundamentals Difficulty: Easy Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
8. Cable media use wires or cables to transmit data and information. Answer: True Section reference 1: Network Fundamentals Difficulty: Easy Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
9. Twisted-pair wire is the least-used form of communications wiring. Answer: False Section reference 1: Network Fundamentals Difficulty: medium Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
10. Cladding is the coating that surrounds fiber-optic cables and prevents light from leaking out of the fiber.
Answer: True Section reference 1: Network Fundamentals Difficulty: Medium Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
11. Systems that use digital subscriber lines (DSL) do not require modems. Answer: False Section reference 1: Network Fundamentals Difficulty: Easy Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
12. Currently, ATM networks operate only on fiber-optic cable. Answer: True Section reference 1: Network Fundamentals Difficulty: Medium Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
13. The Internet is a global network of computer networks. Answer: True Section reference 1: The Internet and World Wide Web Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet. 14. An intranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization. Answer: True Section reference 1: The Internet and World Wide Web Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
15. Intranets support discovery, communication, and collaboration inside an organization. Answer: True Section reference 1: The Internet and the World Wide Web
Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
16. An extranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization. Answer: False Section reference 1: The Internet and World Wide Web Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
17. Extranets offer limited accessibility to the intranets of participating companies. Answer: True Section reference 1: The Internet and World Wide Web Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
18. An Internet service provider is a company that offers Internet connections for a fee. Answer: True Section reference 1: The Internet and World Wide Web Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
19. Internet kiosks are computer terminals located in public places like libraries and airports. Answer: True Section reference 1: The Internet and World Wide Web Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
20. A domain name is the official name assigned to an Internet site, consisting of multiple parts, separated by dots, which are translated from right to left in locating the site. Answer: True Section reference 1: The Internet and World Wide Web Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
21. The rightmost part of an Internet name is the top-level specification, or the zone. Answer: True Section reference 1: The Internet and World Wide Web Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
22. The World Wide Web is a system with universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture. Answer: True Section reference 1: The Internet and World Wide Web Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
23. Uniform resource locators (URLs) point to the address of a specific resource or site on the Web. Answer: True Section reference 1: The Internet and World Wide Web Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
24. Uniform resource locators (URLs) are software applications through which users access the Web. Answer: False Section reference 1: The Internet and World Wide Web Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
25. The hypertext transport protocol (HTTP) is the communications standard used to transfer pages across the World Wide Web portion of the Internet. Answer: True Section reference 1: The Internet and World Wide Web Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
26. A major problem of the discovery applications of networks is the huge amount of information available.
Answer: True Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
27. Metasearch engines search several engines at once and integrate the findings of the various search engines. Answer: True Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
28. The quality of automatic translation of Web pages is usually just as good as human translation. Answer: False Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
29. Commercial portals are intended for broad audiences and offer fairly routine content. Answer: True Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
30. Industrywide portals are intended for broad audiences and offer fairly routine content. Answer: False Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
31. Electronic mail is the largest-volume application running over the Internet.
Answer: True Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
32. With Voice-over-IP, every call opens up a dedicated circuit for the duration of the call. Answer: False Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
33. E-learning is conducted only in virtual classrooms, where all coursework is completed online. Answer: False Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
34. Virtual universities are online universities from which students take classes from home or at an off-site location, via the Internet. Answer: True Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
35. Employees who telecommute have generally found that the experience enhances their careers. Answer: False Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications. 36. Refer to IT’s About Business 6.1: Studio G. When scaling infrastructure, it is important to not only consider current needs, but also consider possible future needs.
Answer: True Section reference 1: IT’s About Business 6.1 Difficulty: Easy Learning Objective 1: LO 6.0 Provide a real-world application of a computer network. 37. Refer to IT’s About Business 6.5: Yahoo! CEO Marissa Mayer Bans Telecommuting. The cost savings of telecommuting to both the employees and employers universally outweighs the benefits of working in the office. Answer: False Section reference 1: IT’s About Business 6.1 Difficulty: Easy Learning Objective 1: LO 6.0 Provide a real-world application of a computer network.
Multiple Choice 38. _____ refers to the range of frequencies available in any communications channel. A. Protocol B. Broadband C. Capacity D. Narrowband E. Bandwidth Answer: E Section reference 1: What Is a Computer Network? Difficulty: Easy Learning Objective 1: LO 6.1 Compare and contrast the two major types of networks.
39. Which of the following are advantages of computer networks? A. They enable organizations to be more flexible. B. They enable companies to share hardware, computer applications, and data. C. They enable geographically dispersed employees to work together. D. They provide a critical link between businesses and their customers. E. All of the above Answer: E Section reference 1: What Is a Computer Network? Difficulty: Easy Learning Objective 1: LO 6.1 Compare and contrast the two major types of networks.
40. The components of a local area network include which of the following? A. File server B. Client computers C. Wireline or wireless communications media D. Network interface cards E. All of the above
Answer: E Section reference 1: What Is a Computer Network? Difficulty: Easy Learning Objective 1: LO 6.1 Compare and contrast the two major types of networks.
41. Which of the following is not a component of a local area network? A. File server B. Client computers C. Bridge D. Network interface cards E. All of the above Answer: C Section reference 1: What Is a Computer Network? Difficulty: Medium Learning Objective 1: LO 6.1 Compare and contrast the two major types of networks.
42. A _____ connects dissimilar networks. A. Router B. Network interface card C. Bridge D. Gateway E. File server Answer: D Section reference 1: What Is a Computer Network? Difficulty: Easy Learning Objective 1: LO 6.1 Compare and contrast the two major types of networks.
43. A(n) _____ connects two or more devices in a limited geographical area. A. Local area network B. Wide-area network C. Personal area network D. Enterprise network E. Value added network Answer: A Section reference 1: What Is a Computer Network? Difficulty: Easy Learning Objective 1: LO 6.1 Compare and contrast the two major types of networks.
44. A _____ sends messages through several connected LANs or to a wide-area network.
A. Router B. Network interface card C. Bridge D. Gateway E. File server Answer: A Section reference 1: What Is a Computer Network? Difficulty: Easy Learning Objective 1: LO 6.1 Compare and contrast the two major types of networks.
45. A _____ allows a device to physically connect to a local area network’s communications medium. A. File server B. Network interface card C. Network operating system D. Communications channel E. Gateway Answer: B Section reference 1: What Is a Computer Network? Difficulty: Easy Learning Objective 1: LO 6.1 Compare and contrast the two major types of networks.
46 All of the following statements concerning wide-area networks are true except: A. They are provided by individual companies. B. They have large capacity. C. They cover large geographical areas. D. They combine multiple communications channels. E. The Internet is an example of a wide-area network. Answer: A Section reference 1: What Is a Computer Network? Difficulty: Medium Learning Objective 1: LO 6.1 Compare and contrast the two major types of networks.
47. The function of _____ is to convert digital signals to analog signals and vice-versa. A. Modems B. Multiplexers C. Front-end processors D. Servers E. Clients Answer: A Section reference 1: Network Fundamentals Difficulty: Easy
Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
48. _____ signals convey information in wave form, whereas _____ signals convey information in binary form. A. Analog, packet B. Analog, digital C. Digital, packet D. Digital, analog E. Packet, analog Answer: B Section reference 1: Network Fundamentals Difficulty: Easy Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
49. _____ are hardware devices that support data transmission and reception across a telecommunications system. A. Integrated services digital networks B. Digital subscriber lines C. Communications channels D. Integrated circuits E. Communications processors Answer: C Section reference 1: Network Fundamentals Difficulty: Easy Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
50. Which of the following is not a communications channel? A. Fiber-optic cable B. Satellite transmission C. Twisted-pair wire D. Integrated circuits E. Cellular radio Answer: D Section reference 1: Network Fundamentals Difficulty: Easy Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
51. Which of the following is not a characteristic of twisted-pair wire?
A. Inexpensive B. Easy to work with C. Subject to interference from other electrical sources D. Secure transmissions E. None of the above Answer: D Section reference 1 Network Fundamentals Difficulty: Medium Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
52. The cable medium with the highest bandwidth is: A. Twisted-pair wire B. Coaxial cable C. Fiber-optic cable D. Cellular radio E. Copper cable Answer: C Section reference 1: Network Fundamentals Difficulty: Easy Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
53. Data are sent through a fiber-optic cable by a(n) _______. A. Optical switch B. Electromagnetic switch C. Laser D. Multiplexer E. Optical modem Answer: C Section reference 1: Network Fundamentals Difficulty: Easy Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
54. Which data transmission technology requires fiber-optic cable, can transmit up to 2.5 gigabits per second, and is more expensive than DSL? A. Digital subscriber line B. Asynchronous transfer mode C. Synchronous optical network D. T-carrier system E. ISDN
Answer: B Section reference 1: Network Fundamentals Difficulty: Medium Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
55. Which transmission technology is an interface standard for transporting digital signals over fiber-optic lines that enables the integration of transmissions from multiple vendors? A. Digital subscriber line B. Asynchronous transfer mode C. Synchronous optical network D. T-carrier system E. ISDN Answer: C Section reference 1: Network Fundamentals Difficulty: Easy Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
56. Which of the following is a digital transmission system that defines circuits that operate at different rates, all of which are multiples of the basic 64 Kbps used to transport a single voice call? A. Digital subscriber line B. Asynchronous transfer mode C. Synchronous optical network D. T-carrier system E. ISDN Answer: D Section reference 1: Network Fundamentals Difficulty: Easy Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
57. In order to ensure that computers developed by different manufacturers can communicate, _____ have been developed. A. Protocols B. Client/server architectures C. WANs D. Application software packages E. Developmental architectures Answer: A
Section reference 1: Network Fundamentals Difficulty: Easy Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
58. A protocol is: A. A device that handles the switching of voice and data in a local area network. B. A standard set of rules and procedures for the control of communications in a network. C. A communications service for the connection of devices in a local area network. D. The main communications channel in a wide-area network. E. Synonymous with network interface card. Answer: B Section reference 1: Network Fundamentals Difficulty: Easy Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
59. The part of a network that handles the major traffic is the ________. A. Front end B. Network interface C. Multiplexer D. Backbone E. Front end processor Answer: D Section reference 1: Network Fundamentals Difficulty: Easy Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
60. Which of the following enables users to send data across sometimes unreliable networks? A. Ethernet B. TCP/IP C. Protocols D. Digital subscriber lines E. Integrated services digital network Answer: B Section reference 1: Network Fundamentals Difficulty: Easy Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
61. In TCP/IP, IP is responsible for: A. Disassembling and reassembling of packets during transmission. B. Establishing the Internet connection between two computers. C. Moving packets over the network. D. Sequencing the transfer of packets across the network. E. Error checking. Answer: A Section reference 1: Network Fundamentals Difficulty: Easy Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
62. Which of the following statements concerning packet switching is not true? A. Packets contain a sequence number. B. Packets are routed through different paths. C. Packets require dedicated circuits. D. Packets use TCP/IP to carry their data. E. Packets contain destination addressing. Answer: C Section reference 1: Network Fundamentals Difficulty: Medium Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
63. A type of processing that links two or more computers in an arrangement in which some machines provide computing services for user computers is best described as _______. A. Open systems B. Client/server C. Peer-to-peer D. Centralized E. Mainframe-centric Answer: B Section reference 1: Network Fundamentals Difficulty: Easy Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
64. BitTorrent uses a process called _____, which eliminates file-sharing bottlenecks by having everyone share little pieces of a file at the same time. A. Leeching B. Collaboration
C. Packet switching D. Torrents E. Swarming Answer: E Section reference 1: Network Fundamentals Difficulty: Medium Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
65. The _____ is a global wide-area network that connects approximately 1 million organizational computer networks. A. Ethernet B. Extranet C. Internet D. Intranet E. World Wide Web Answer: C Section reference 1: The Internet and World Wide Web Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
66. A(n) _____ is a network designed to serve the internal informational needs of a single organization. A. Global network B. Extranet C. Internet D. Intranet E. World Wide Web Answer: D Section reference 1: The Internet and World Wide Web Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
67. A(n) _____ connects parts of the intranets of different organizations and allows secure communications among business partners. A. Global network B. Extranet C. Internet D. Intranet E. World Wide Web Answer: B Section reference 1: The Internet and World Wide Web Difficulty: Easy
Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
68. Internet service providers connect to one another through _____. A. Internet connection points B. Common carrier connection points C. Network access points D. Network connection points E. An extranet Answer: C Section reference 1: The Internet and World Wide Web Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
69. _____ are Internet access points that are located in public places, such as libraries and airports. A. Clients B. Servers C. Internet access computers D. Network computer E. Internet kiosks Answer: E Section reference 1: The Internet and World Wide Web Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
70. Each site on the Internet gets an assigned address, which is a(n) _____. A. TCP address B. IP address C. URL address D. ISO/OSI identifier E. World Wide Web address Answer: C Section reference 1: The Internet and World Wide Web Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
71. Consider this domain name, www.business.gsu.edu. The “edu” is the _______. A. Top-level domain B. URL C. Web site locator
D. Name of the computer E. Address of the Webmaster Answer: A Section reference 1: The Internet and World Wide Web Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
72. Consider this domain name, www.business.gsu.edu. The “gsu” is the __________. A. Top-level domain B. Name of the organization C. URL D. Name of the specific computer E. Address of the Webmaster Answer: B Section reference 1: The Internet and World Wide Web Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
73. Consider this domain name, www.business.gsu.edu. The “business” is the ________. A. Top-level domain B. Name of the organization C. URL D. Name of the specific computer E. Address of the Webmaster Answer: D Section reference 1: The Internet and World Wide Web Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
74. Applications offered by the Internet2 include which of the following? A. remote diagnosis B. digital libraries C. distance education D. virtual laboratories E. all of the above Answer: E Section reference 1: The Internet and World Wide Web Difficulty: Easy Learning Objective 1: LO 6.3 Describe the most common methods for accessing the Internet.
75. Networks enable which of the following applications? A. Discovery B. Communications C. Collaboration D. Web services E. All of the above Answer: E Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
76. Which of the following are advantages of computer networks? A. They enable organizations to be more flexible. B. They enable companies to share hardware, computer applications, and data. C. They enable geographically dispersed employees to work together. D. They provide a critical link between businesses and their customers. E. All of the above Answer: E Section reference 1: Network Applications Difficulty: Medium Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
77. Which network application(s) enable(s) users to access information located in databases all over the world? A. Discovery B. Communications C. Collaboration D. Web services E. None of the above Answer: A Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
78. Which of the following statements about publication of material in foreign languages is not correct? A. It is a competitive necessity. B. It must be accurate. C. It is expensive. D. Content must be localized to the needs of people in local markets.
E. It is not yet a major consideration for most companies. Answer: E Section reference 1: Network Applications Difficulty: Medium Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
79. _____ portals offer content for diverse communities and are intended for broad audiences. A. Industrywide B. Personal C. Affinity D. Corporate E. Commercial Answer: E Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
80. _____ portals support communities such as hobby groups or political parties. A. Industrywide B. Personal C. Affinity D. Corporate E. Commercial Answer: C Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
81. _____ portals coordinate content within relatively narrow organizational and partners’ communities. A. Publishing B. Personal C. Affinity D. Corporate E. Commercial Answer: D Section reference 1: Network Applications
Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
82. Many organizations have implemented corporate portals for which of the following reasons? A. To cut costs B. To free up time for busy managers C. To improve profitability D. To offer customers self-service opportunities E. All of the above Answer: E Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
83. Portals are an example of which network application? A. Discovery B. Collaboration C. Communications D. Web services E. None of the above Answer: A Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
84. With _____, every call opens up a dedicated circuit for the duration of the call. A. Voice over IP B. Plain old telephone service C. Chat rooms D. Teleconference E. Internet relay chat Answer: B Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
85. With _____, phone calls are treated as just another kind of data. A. Voice over IP B. Plain old telephone service C. Chat rooms D. Teleconference E. Internet relay chat Answer: A Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
86. Skype is an example of _______. A. Teleconference B. Telepresence C. Plain old telephone service D. Voice over IP E. Videoconference Answer: D Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
87. Workflow, groupware, and telepresence systems are examples of which network application? A. Discovery B. Communications C. Collaboration D. Web services E. None of the above Answer: C Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
88. The newest type of videoconferencing technology is ________. A. Teleconferencing B. Telepresence C. Work group analysis software D. Workflow software
E. Groupware Answer: B Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
89. In a _____ system, participants are able to seamlessly and electronically share data, voice, images, graphics, and animation. A. Teleconference B. Group decision support C. Telepresence D. Telephone conference call E. Crowdsourcing Answer: Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
90. The benefits of e-learning include which of the following? A. Increased content retention B. Current, high-quality content C. Consistency D. Flexibility E. All of the above Answer: E Section reference 1: Network Applications Difficulty: Easy Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
91. Which of the following is not a disadvantage of telecommuting for employees? A. Fewer opportunities for housebound people B. Possible loss of fringe benefits C. Lower pay (in some cases) D. No workplace visibility E. Slower promotions Answer: A Section reference 1: Network Applications Difficulty: Easy
Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications. 92. Refer to Opening Case – The Network Neutrality Wars: Which of the following is not a challenge for achieving net neutrality? A. The amount of video traffic on the Internet is increasing. B. Under current models, the investment required to meet future demand exceeds projected revenue growth. C. Net neutrality might hinder U.S. competitiveness. D. Network providers could censor certain content by slowing down or blocking access. E. Telecommunications and cable companies are in favor of net neutrality. Answer: E Section reference 1: Opening Case Difficulty: Easy Learning Objective 1: LO 6.0 Provide a real-world application of a computer network. 93. Refer to IT’s About Business 6.2: A New Search Engine. Which of the following statements is true about the Summly search engine A. Summly is faster than search engines like Yahoo and Google B. Summly’s results are actually manually handpicked by D’Aloisio’s employees C. Summly uses indexing technology to generate superior answers than Google D. Summly uses AI tools like genetic algorithms to generate search results E. All of the above are true Answer: D Section reference 1: IT’s About Business 6.2 Difficulty: Medium Learning Objective 1: LO 6.0 Provide a real-world application of a computer network. 94. Refer to IT’s About Business 6.3: Marriott’s Corporate Portal: Marriott’s BrandWorks portal has the following features A. Knowledge sharing B. Resource sharing C. Collaboration D. Video Conferencing E. All of the above Answer: D Section reference 1: IT’s About Business 6.3 Difficulty: Easy Learning Objective 1: LO 6.0 Provide a real-world application of a computer network. 95. Refer to IT’s About Business 6.4: Massive Open Online Courses. Which of the following statements are true about MOOCs A. Anyone can start a MOOC B. Anyone can enroll in MOOCs for credit
C. Students have to be enrolled in the university to get credit for MOOCs D. Students have to be physically present on campus to enroll in MOOCs E. All of the above are true Answer: C Section reference 1: IT’s About Business 6.4 Difficulty: Medium Learning Objective 1: LO 6.0 Provide a real-world application of a computer network.
Short Answer Questions 96.. Differentiate between analog signals and digital signals. Section reference 1: Network Fundamentals Difficulty: Medium Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
97. Describe the various communications processors. Section reference 1: Network Fundamentals Difficulty: Medium Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
98. Differentiate among twisted-pair wire, coaxial cable, and fiber-optic cable. Section reference 1: Network Fundamentals Difficulty: Medium Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
99. Explain what network protocols are and why they are important. Section reference 1: Network Fundamentals Difficulty: Medium Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
100. Describe the three basic types of peer-to-peer processing. Section reference 1: Network Fundamentals
Difficulty: Medium Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
101. Describe the benefits of networks to organizations. Section reference 1: Network Applications Difficulty: Medium Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
102. Describe the four network applications. Section reference 1: Network Applications Difficulty: Medium Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
103. Describe the various types of portals. Section reference 1: Network Applications Difficulty: Medium Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
104. What are the benefits and limitations of telecommuting? For individuals? For organizations? Section reference 1: Network Applications Difficulty: Medium Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
Essay Questions 105. What does the following statement mean: “Without networks, the computer on your desk would be merely another productivity tool, just like the typewriter once was”? Difficulty: Hard Learning Objective 1: LO 6.5 Summarize the fundamental concepts and skills related to computer networks.
106. Differentiate among local area networks, wide-area networks, and value-added networks. Section reference 1: What Is a Computer Network? Difficulty: Medium Learning Objective 1: LO 6.1 Compare and contrast the two major types of networks.
107. Describe the functions of the TCP/IP protocol. Section reference 1: Network Fundamentals Difficulty: Medium Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
108. Differentiate between client/server computing and peer-to-peer processing. Section reference 1: Network Fundamentals Difficulty: Medium Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
109. What are the implications of telepresence systems? Include in your answer the uncertain safety in many parts of the world. Section reference 1: Network Applications Difficulty: Hard Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
110. Discuss the advantages of voice over IP for organizations. Section reference 1: Network Applications Difficulty: Hard Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
Question Type: Multiple Choice
111. Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using instore wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. Which type of network does Gal have? A. Client-server B. Mainframe-based
C. LAN D. WAN E. Peer-to-peer Answer: C Section reference 1: What Is a Computer Network? Difficulty: Medium Learning Objective 1: LO 6.1 Compare and contrast the two major types of networks.
112. Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using instore wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. Which type of media does he likely use to connect the point-of-sale terminal to the desktop? A. Twisted-pair wire B. Coaxial cable C. Fiber-optic cable D. Cellular radio E. Copper cable Answer: A Section reference 1: Network Fundamentals Difficulty: Medium Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. 113. Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using instore wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. Which of the following statements is true? A. Gal must have a Web site in order to use his notebook. B. The notebook is on the same network as the point-of-sale terminal. C. Gal must have an ISP in order to access the Internet from his notebook. D. The notebook will work only when the desktop computer is turned on. E. All of the above are true. Answer: C Section reference 1: Network Fundamentals Difficulty: Medium Learning Objective 1: LO 6.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.
114. Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using instore wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. Which type of network application is being used when a salesperson is looking up items in stock? A. Discovery B. Communications C. Collaboration
D. Web services E. None of the above Answer: E Section reference 1: Network Applications Difficulty: Medium Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
115. Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using instore wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. The Web site for the store is www.GalsTunes.net. Which of the following is true? A. Gal must be hosting his Web site on his own desktop computer based on its URL. B. The point-of-sale terminal cannot connect to the Internet. C. Gal must not be selling on his Web site because the top-level domain is “net” and not “com.” D. The desktop computer must also be able to connect to the Internet in order for the notebook to access data from it. E. All of the above are true. Answer: B Section reference 1: Network Applications Difficulty: Medium Learning Objective 1: LO 6.4 Explain the impact that networks have had on business and everyday life for each of the six major categories of network applications.
Package Title: Testbank Questions Course Title: IS 5e Chapter Number: 7
Question Type: True/False 1. In traditional commerce, one or more of the following can be digital: the product or service, the process, and the delivery agent. Answer: False Section reference 1: Overview of E-Business and E-Commerce Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 2. Visiting the Web site of a car manufacturer (e.g., www.gm.com), entering the specifications for the car you want, and then picking up your car at your local dealership is an example of partial electronic commerce. Answer: True Section reference 1: Overview of E-Business and E-Commerce Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 3. eBay is a good example of business-to-consumer electronic commerce. Answer: False Section reference 1: Overview of E-Business and E-Commerce Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 4. Forward auctions are auctions that sellers use as a channel to many potential buyers. Answer: True Section reference 1: Overview of E-Business and E-Commerce Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 5. Even though B2C EC is much larger by volume, B2B is more complex. Answer: False Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each. 6. An electronic storefront is a Web site on the Internet that represents a single store. Answer: True Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy
-1-
Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each. 7. You can make a purchase in a referral mall. Answer: False Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each. 8. Selling products such as books and computers on the Internet may reduce vendors’ selling costs by 20 to 40 percent, with further reductions being difficult because the products must be delivered physically. Answer: True Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each. 9. Virtual banks are those banks that are dedicated only to Internet trAnsweractions. Answer: True Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each. 10. Channel conflict occurs when click-and-mortar companies have problems with their regular distributors when they sell directly to customers online. Answer: True Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each. 11. Internet advertising is impersonal, one-way mass communication. Answer: False Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each. 12. Banners are the most common form of advertisement on the Internet. Answer: True Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each.
-2-
13. Hacking is the indiscriminate distribution of electronic ads without permission of the receiver. Answer: False Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each. 14. Business-to-consumer applications comprise the majority of electronic commerce volume. Answer: False Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each. 15. The key mechanisms in the sell-side marketplace are customized electronic catalogs and reverse auctions. Answer: False Section reference 1: Business-to-Business (B2B) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.3 Describe the three business models for business-to-business electronic commerce. 16. The buy-side marketplace is similar to the business-to-consumer model. Answer: False Section reference 1: Business-to-Business (B2B) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.3 Describe the three business models for business-to-business electronic commerce. 17. Horizontal exchanges connect buyers and sellers across many industries. Answer: True Section reference 1: Business-to-Business (B2B) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.3 Describe the three business models for business-to-business electronic commerce. 18. In most cases, traditional payment systems are not effective for electronic commerce. Answer: True Section reference 1: Overview of E-Business and E-Commerce Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 19. Smart cards can be used as credit cards, debit cards, and/or loyalty cards. Answer: True Section reference 1: Overview of E-Business and E-Commerce
-3-
Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 20. Each buyer needs only one e-wallet for all merchants. Answer: False Section reference 1: Overview of E-Business and E-Commerce Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 21. E-commerce affects only businesses that sell products online. Answer: False Section reference 1: Opening case – Flash Crash Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 22. Refer to IT’s About Business 7.1: Gemvara is an example of pure e-Commerce. Answer: False Section reference 1: IT’s about businesses 7.1 Difficulty: Easy Learning Objective 1: LO 7.0 Provide a real-world application of e-business and e-commerce. 23. Refer to IT’s About Business 7.1: Selling luxury items online is as easy as selling books and DVDs. Answer: False Section reference 1: IT’s About Business 7.1 Difficulty Easy Learning Objective 1: LO 7.0 Provide a real-world application of e-business and e-commerce 24. Refer to IT’s About Business 7.4: Showrooming occurs when customers prefer to physically handle the products before purchasing them from the same store. Answer. False Section reference 1: IT’s About Business 7.4 Difficulty Easy Learning Objective 1: LO 7.0 Provide a real-world application of e-business and e-commerce 25. Refer to IT’s About Business 7.5: eBay’s updates to its business model involved the development of new technologies. Answer. False Section reference 1: IT’s About Business 7.5 Difficulty Easy Learning Objective 1: LO 7.0 Provide a real-world application of e-business and e-commerce
Question Type: Multiple Choice
-4-
26. Which of the following is not an effect that E-commerce has had on organizations? A. E-commerce enables smaller businesses to operate in areas dominated by larger companies. B. E-commerce increases the number of potential customers to whom the company can market its products. C. E-commerce is a costly medium for increasing market share. D. E-commerce removes many barriers for start-up businesses. E. E-commerce makes it easy to reach customers around the world. Answer: C Section reference 1: Material after Chapter opening case Difficulty: Easy Learning Objective 1: LO 7.0 Provide a real-world application of e-business and e-commerce 27. _____, which is a broader concept than _____, is the buying and selling of goods and services, as well as servicing customers, collaborating with business partners, and performing transactions within an organization. A. Business-to-business electronic commerce, business-to-customer electronic commerce B. Electronic commerce, electronic business C. Business-to-customer electronic commerce, business-to-business electronic commerce D. Business-to-business electronic commerce, intrabusiness electronic commerce E. Electronic business, electronic commerce Answer: E Section reference 1: Overview of E-Business and E-Commerce Difficulty: Medium Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 28. The degree of digitization relates to all of the following except: A. the product or service sold B. the process by which the product is produced C. the delivery agent or intermediary D. the size of e-commerce transactions E. none of the above Answer: D Section reference 1: Overview of E-Business and E-Commerce Difficulty: Medium Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 29. In _______ e-commerce, the sellers and buyers are organizations. A. government-to-citizen B. consumer-to-consumer C. business-to-business D. business-to-consumer E. consumer-to-business Answer: C Section reference 1: Overview of E-Business and E-Commerce Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 30. In ________ e-commerce, an organization provides information and services to its workers.
-5-
A. business-to-employee B. consumer-to-consumer C. consumer-to-business D. business-to-consumer E. government-to-business Answer: A Section reference 1: Overview of E-Business and E-Commerce Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 31. Direct payment of Social Security benefits is an example of ______ e-commerce. A. government-to-citizen B. consumer-to-consumer C. consumer-to-business D. business-to-consumer E. business-to-business Answer: A Section reference 1: Overview of E-Business and E-Commerce Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 32. If you are an worker managing your fringe benefits over your company’s intranet, you are engaging in _________ e-commerce. A. business-to-business B. business-to-consumer C. consumer-to-consumer D. business-to-employee E. government-to-citizen Answer: D Section reference 1: Overview of E-Business and E-Commerce Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 33. Which of the following statements regarding the relationship between electronic commerce and search is not correct? A. Purchases often follow successful online searches. B. Shopping carts are often abandoned after unsuccessful online searches. C. Retailers will provide fewer product details to avoid information overload for customers. D. Customers will be able to find the closest store offering the product that they want. E. Customers will have more relevant product information in the near future. Answer: C Section reference 1: Overview of E-Business and E-Commerce Difficulty: Medium Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 34. In _____ auctions, there is one buyer who wants to buy a product. Suppliers submit bids, and the lowest bid wins. A. forward B. static
-6-
C. reverse D. physical E. simple Answer: C Section reference 1: Overview of E-Business and E-Commerce Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 35. eBay uses a _____ auction. A. forward B. static C. reverse D. physical E. simple Answer: A Section reference 1: Overview of E-Business and E-Commerce Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 36. _____ auctions employ a request for quotation. A. Forward B. Static C. Reverse D. Physical E. Simple Answer: C Section reference 1: Overview of E-Business and E-Commerce Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 37. _____ auctions are the most common auction model for large purchases. A. Forward B. Static C. Reverse D. Physical E. Simple Answer: C Section reference 1: Overview of E-Business and E-Commerce Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 38. In which of the following business models do businesses request quotes from suppliers and use B2B with a reverse auction mechanism? A. find-the-best-price B. electronic tendering system C. name-your-own-price D. online direct marketing E. affiliate marketing
-7-
Answer: B Section reference 1: Overview of E-Business and E-Commerce Difficulty: Difficult Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 39. A vendor asks its business partners to place logos or banners on their Web sites. If customers click on a logo, visit the vendor’s site, and make a purchase, then the vendor pays a commission to the partner. This scenario illustrates which business model? A. find-the-best-price B. electronic tendering system C. name-your-own-price D. online direct marketing E. affiliate marketing Answer: E Section reference 1: Overview of E-Business and E-Commerce Difficulty: Medium Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 40. Which type of electronic commerce is the largest by volume? A. business-to-employee B. consumer-to-consumer C. business-to-business D. business-to-consumer E. none of the above Answer: C Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each. 41. Which type of electronic commerce does Amazon practice? A. business-to-employee B. consumer-to-consumer C. consumer- to-business D. business-to-consumer E. employee-to-business Answer: D Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each.
42. _______ e-commerce is also known as e-tailing. A. Business-to-business B. Collaborative commerce C. Intrabusiness D. Business-to-consumer E. Consumer-to-business
-8-
Answer: D Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each.
43. The advantages of electronic commerce for consumers include all of the following except: A. You can buy from home 24 hours per day, 7 days per week. B. You have a wider variety of products to choose from. C. You typically cannot access additional information, so you do not have information overload. D. You can easily compare prices and features. E. You can find unique items. Answer: C Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each.
44. Which of the following is not an electronic commerce application? A. home banking B. buying stocks C. evaluating an employee D. conducting an auction E. buying real estate Answer: C Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each.
45. Which of the following is not an advantage of e-tailing? A. You can buy from home, 24 hours per day. B. You have only a few products to choose from. C. You can obtain detailed information on products. D. You can compare competitors’ products and prices. E. All of the above Answer: B Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each.
46. ________ is the process whereby a fully automated electronic commerce transaction eliminates middlemen. A. Disintegration B. Supply chain integration
-9-
C. Direct sales D. Disintermediation E. Value-added services Answer: D Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each.
47. Cyberbanking offers all of the following advantages except: A. It is convenient for customers. B. It saves time for customers. C. It includes inexpensive transactions for the bank. D. It can help recruit remote customers. E. It is more expensive for the customer. Answer: E Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each.
48. Which of the following is a problem that e-commerce can cause for the airline industry? A. Too many fares B. Mistakes in fares C. Too few fares D. No fares offered on certain routes E. Too many fares offered on certain routes Answer: B Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each.
49. Refer to IT’s About Business 7.2: The service offered by ZocDoc is A. Digital B. Physical C. Both D. Neither Answer: A Section reference 1: IT’s About Business 7.2 Difficulty: Easy Learning Objective 1: LO 7.0 Provide a real-world application of e-business and e-commerce.
50. In IT’s About Business 7.3: Macy has involved external companies to perform the following service
- 10 -
A. Increase traffic to the Macy’s website B. Track Macy’s website traffic C. Analyze Macy’s website performance D. Create a mobile version on Macy’s website E. Track customer details on Macy’s website Answer: C Section reference 1: IT’s About Business 7.3 Difficulty: Easy Learning Objective 1: LO 7.0 Provide a real-world application of e-business and e-commerce.
51. Difficulties in order fulfillment are most closely associated with which type of electronic commerce? A. business-to-business B. business-to-consumer C. government-to-citizen D. business-to-employee E. mobile commerce Answer: B Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each. 52. Internet advertising improves on traditional advertising in all of the following ways except: A. Internet ads can be updated at any time at minimal cost. B. Internet ads can reach large numbers of potential buyers all over the world. C. Internet ads are always more effective than other types of advertising. D. Internet ads can make effective use of multimedia. E. Internet ads are current. Answer: C Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each. 53. A _____ is automatically launched by some trigger and appears behind the active window. A. keyword banner B. random banner C. pop-up ad D. pop-under ad E. text box Answer: D Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each. 54. _____ offer(s) consumers incentives to accept advertising and e-mail voluntarily. A. Viral marketing
- 11 -
B. Personalized marketing C. Permission marketing D. Paper catalogs E. Direct mail Answer: C Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each. 55. _____ refers to online word-of-mouth marketing. A. Permission marketing B. One-to-one marketing C. Personalized marketing D. Viral marketing E. Direct mail Answer: D Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each. 56. In the _____ marketplace model, organizations attempt to sell their products or services to other organizations electronically. A. buy-side B. sell-side C. group purchasing D. desktop purchasing E. electronic exchange Answer: B Section reference 1: Business-to-Business (B2B) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.3 Describe the three business models for business-to-business electronic commerce. 57. The key mechanisms of the _____ marketplace model are forward auctions and electronic catalogs that can be customized for each large buyer. A. buy-side B. sell-side C. group purchasing D. desktop purchasing E. electronic exchange Answer: B Section reference 1: Business-to-Business (B2B) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.3 Describe the three business models for business-to-business electronic commerce.
- 12 -
58. In the _____ marketplace model, EC technology is used to streamline the purchasing process in order to reduce the cost of items purchased, the administrative cost of procurement, and the purchasing cycle time. A. buy-side B. sell-side C. auctions D. group purchasing E. electronic exchange Answer: A Section reference 1: Business-to-Business (B2B) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.3 Describe the three business models for business-to-business electronic commerce. 59. In the _____ B2B application, the orders of many buyers are aggregated so that they comprise a large volume, in order to merit more seller attention. A. buy-side B. sell-side C. auctions D. group purchasing E. electronic exchange Answer: D Section reference 1: Business-to-Business (B2B) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.3 Describe the three business models for business-to-business electronic commerce. 60. In _____, direct and indirect materials in one industry are purchased on an as-needed basis. A. horizontal exchanges B. vertical exchanges C. buy-side marketplaces D. functional exchanges E. sell-side marketplaces Answer: B Section reference 1: Business-to-Business (B2B) Electronic Commerce Difficulty: Easy Learning Objective 1: LO 7.3 Describe the three business models for business-to-business electronic commerce. 61. _____ connect buyers and sellers across many industries and are used mainly for indirect materials. A. Horizontal exchanges B. Vertical exchanges C. Buy-side marketplaces D. Functional exchanges E. Sell-side marketplaces Answer: A Section reference 1: Business-to-Business (B2B) Electronic Commerce Difficulty: Easy
- 13 -
Learning Objective 1: LO 7.3 Describe the three business models for business-to-business electronic commerce. 62. All of the following are limitations of traditional payment methods in electronic commerce except: A. Cash cannot be used because there is no face-to-face contact. B. Paying for goods and services via the mail takes more time. C. Not all organizations accept credit cards. D. It is more secure for the buyer to use the telephone than to complete a secure transaction on a computer. E. None of the above Answer: D Section reference 1: Overview of E-Business and E-Commerce Difficulty: Medium Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 63. _____ are a payment mechanism that are similar to regular bank checks but are transmitted electronically, with a signature in digital form. A. Electronic checks B. Electronic credit cards C. Electronic cash transactions D. Electronic wallets E. Electronic debit cards Answer: A Section reference 1: Overview of E-Business and E-Commerce Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 64. _____ use credit card numbers, transmitted electronically over the Internet, to pay for goods and services. They are either unencrypted or encrypted, with coded data readable by an intermediary between the buyer’s and seller’s banks. A. Electronic checks B. Electronic credit cards C. Electronic cash transactions D. Electronic wallets E. Electronic debit cards Answer: B Section reference 1: Overview of E-Business and E-Commerce Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce.
65. ______ are a form of e-cash that enable you to store a fixed amount of prepaid money and then spend it as necessary. A. Electronic checks B. Stored-value money cards C. Purchasing cards D. Smart cards E. Person-to-person payments Answer: B
- 14 -
Section reference 1: Overview of E-Business and E-Commerce Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 66. _____ contain a chip that can store information and be used for several purposes. A. Electronic checks B. Stored-value money cards C. Purchasing cards D. Smart cards E. Person-to-person payments Answer: D Section reference 1: Overview of E-Business and E-Commerce Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 67. _____ enable two individuals to transfer funds without using a credit card. A. Electronic checks B. Stored-value money cards C. Purchasing cards D. Smart cards E. Person-to-person payments Answer: E Section reference 1: Overview of E-Business and E-Commerce s Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce.
68. The practice of using similar but not identical domain names is called _____. A. domain spoofing B. domain masquerading C. domain tasting D. cybersquatting E. domain fraud Answer: C Section reference 1: Ethical and Legal Issues in E-Business Difficulty: Easy Learning Objective: LO 7.4 Identify the ethical and legal issues related to electronic commerce, providing examples. 69. _____ refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or trademark belonging to someone else. A. Domain spoofing B. Domain masquerading C. Domain tasting D. Cybersquatting E. Domain fraud Answer: D Section reference 1: Ethical and Legal Issues in E-Business Difficulty: Easy
- 15 -
Learning Objective: LO 7.4 Identify the ethical and legal issues related to electronic commerce, providing examples. 70. Which of the following statements about eBureau is true: A. eBureau is used by eCommerce websites B. eBureau does not violate any privacy laws C. eBureau gets permission from consumers D. eBureau creates ranks and scores consumers E. eBureau only uses publicly available information Answer: D Section reference 1: Closing Case Difficulty: Easy Learning Objective: LO 7.0 Provide a real-world application of e-business and e-commerce. 71. Companies use Web sites for all of the following reasons except: A. To reduce operational and transaction costs. B. To enhance their reputation. C. To sell goods and services. D. To reduce the amount of actual cash they need to deal with. E. To induce people to visit a physical location. Answer: D Section reference 1: Overview of E-Business and E-Commerce Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. Question Type: Essay
72. Differentiate between pure and partial electronic commerce. Provide examples of companies in each category. Section reference 1: Overview of E-Business and E-Commerce Difficulty: Medium Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 73. Discuss the various types of electronic commerce. Section reference 1: Overview of E-Business and E-Commerce Difficulty: Medium Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 74. Differentiate between forward and reverse auctions. Section reference 1: Overview of E-Business and E-Commerce Difficulty: Medium Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 75. Differentiate among sell-side marketplaces, buy-side marketplaces, and electronic exchanges. Section reference 1: Business-to-Business (B2B) Electronic Commerce Difficulty: Hard
- 16 -
Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each. 76. Differentiate between electronic storefronts and electronic malls, and provide examples of each. Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each. 77. Discuss the reasons for E-commerce failures. Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each.
78. Discuss the benefits and limitations of electronic commerce. Section reference 1: Overview of E-Business and E-Commerce Difficulty: Hard Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 79. Discuss the various business-to-consumer applications (e.g., e-tailing, electronic storefronts, electronic malls). Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Hard Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each. 80. Discuss the various methods of online advertising. Section reference 1: Business-to-Consumer (B2C) Electronic Commerce Difficulty: Hard Learning Objective 1: LO 7.2 Discuss the various online services of business-to-consumer electronic commerce, providing a specific example of each. 81. Discuss the following electronic commerce business models and give examples of each type: online direct marketing, electronic tendering system, name-your-own-price, find-the-best-price, affiliate marketing, and viral marketing. Section reference 1: Overview of E-Business and E-Commerce Difficulty: Medium Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce. 82. Describe the various types of electronic payments. Section reference 1: Overview of E-Business and E-Commerce Difficulty: Hard
- 17 -
Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce 83. What is domain tasting? Should it be made illegal? Section reference 1: Ethical and Legal Issues in E-Business Difficulty: Hard Learning Objective 1: LO 7.4 Identify the ethical and legal issues related to electronic commerce, providing examples. Question Type: True/False 84. You decide to start a landscaping business called Trim Grass. You type www.TrimGrass.com in a Web browser, and no page with that name appears. The domain name is therefore available. Answer: False Section reference 1: Ethical and Legal Issues in E-Business Difficulty: Medium Learning Objective 1: LO 7.4 Identify the ethical and legal issues related to electronic commerce, providing examples.
Question Type: Multiple Choice
85. You decide to start a landscaping business called Trim Grass. One of your services will be to perform fertilizer treatments. You will need to buy a great deal of fertilizer for your many clients. You can use all of the following methods to purchase the fertilizer except: A. Forward auction B. Reverse auction C. Name your Own Price D. Electronic Marketplace E. Multichanneling Answer: E Section reference 1: Overview of E-Business and E-Commerce Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce 86. You decide to start a landscaping business called Trim Grass. You created a Web site, but it doesn’t seem to be attracting any clients. So, you decide to explore advertising on the Web. Which of the following advertising methods probably would not be beneficial? A. Banner ads B. Pop-up or pop-under ads C. Spamming D. Permission marketing E. Viral marketing Answer: C Section reference 1: Overview of E-Business and E-Commerce Difficulty: Medium Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce
- 18 -
87. You decide to start a landscaping business called Trim Grass. Some of your residential clients would like to pay their bills online. Which of the following methods will not be appropriate for this type of payment? A. Electronic checks B. Electronic credit cards C. Purchasing cards D. Person-to-person payments E. Stored–value money cards Answer: C Section reference 1: Overview of E-Business and E-Commerce Difficulty: Easy Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce 88. You decide to start a landscaping business called Trim Grass. You expect to use the Web to help clients find you and communicate with you. You will mow lands, clean flower beds, and pick up leaves in the fall. You will send your clients monthly bills. Which of the following is true? A. Trim Grass is using an e-commerce model. B. Trim Grass is using an e-business model. C. Trim Grass is using a forward auction. D. Trim Grass is an electronic marketplace. E. Trim Grass needs to worry about channel conflict. Answer: B Section reference 1: Overview of E-Business and E-Commerce Difficulty: Medium Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce
89. You have been running a landscaping business called Trim Grass for about two years. You have developed a special blend of grass seed for your area that you use when you reseed your clients’ lawns. You are receiving e-mails via your Web site from people who would like to purchase some. You decide to start selling seed online, and you hire someone to rebuild your Web site. Which of the following statements is not true? A. Trim Grass is now multichanneling. B. Trim Grass needs to think about how to ship the seed. C. Trim Grass will have to collect sales tax from all sales. D. Trim Grass will have more expenses. E. Trim Grass will need to consider different advertising methods. Answer: C Section reference 1: Overview of E-Business and E-Commerce Difficulty: Hard Learning Objective 1: LO 7.1 Describe the six common types of electronic commerce
- 19 -
Package Title: Testbank Questions Course Title: IS 5e Chapter Number: 8
Question Type: True/False
1. Wireless computing does not really affect productivity. Answer: False Section reference 1: chapter opening case Difficulty: Easy Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce.
2. Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices. Answer: True Section reference 1: chapter opening case Difficulty: Easy Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce.
3. Wireless technologies are not changing the ways that organizations are doing business, but they are enabling organizations to do business faster. Answer: False Section reference 1: chapter opening case Difficulty: Easy Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce.
4. Short message service allows users to send short text messages on digital cell phones. Answer: True Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
5. Microwave transmissions are affected by environmental conditions such as storms. Answer: True Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
6. The higher the orbit of a satellite, the larger its footprint. Answer: True Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
7. The global positioning system is supported by GEO satellites. Answer: False Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
8. Radio transmissions are highly secure. Answer: False Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
9. Bluetooth is a wireless standard that enables temporary, short-range connection between mobile devices. Answer: True Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
10. A hotspot is a small geographical perimeter within which a wireless access point provides service to a number of users. Answer: True Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
11. Wi-Fi provides excellent security. Answer: False Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
12. In a mesh network, the motes transmit their data to a central computer. Answer: False Section reference 1: Pervasive Computing Difficulty: Easy Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
13. Mesh networks are reliable, efficient, and fault tolerant. Answer: True Section reference 1: Pervasive Computing Difficulty: Easy Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
14. Personalization means that a mobile device can provide real-time communication, independent of the user’s location. Answer: False Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
15. A voice portal is a standard Web site that accepts voice commands.
Answer: False Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
16. Mobile wallets enable users to make purchases with a single click from a mobile device. Answer: True Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
17. Telemetry is the science that measures physical remoteness by means of wireless transmissions from a remote source to a receiving station. Answer: True Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
18. Pervasive computing and virtual reality are just different names for the same thing. Answer: False Section reference 1: Pervasive Computing Difficulty: Easy Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one. 19. Two systems being developed to replace bar codes are QR codes and RFID systems. Answer: True Section reference 1: Pervasive Computing Difficulty: Medium Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
20. Rogue access points can be set up by employees. Answer: True Section reference 1: Wireless Security Difficulty: Easy
Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.
21. War driving is the act of locating wireless networks while driving around a certain area. Answer: True Section reference 1: Wireless Security Difficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business. 22. Refer to IT’s About Business 8.6 – BP Uses Wireless Technologies: Wireless sensors can be used to increase safety and reliability by doing tasks that are too dangerous for humans. Answer: False Section reference 1: IT’s About Business 8.6 Difficulty: Medium Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce. 23. Refer to IT’s About Business 8.7 – Brazil Uses Smart Meters: Smart Meters can be used to monitor electricity consumption and detect theft. Answer: True Section reference 1: IT’s About Business 8.7 Difficulty: Easy Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce.
Question Type: Multiple Choice
24. Individuals are finding it convenient and productive to use wireless devices for which of the following reasons? A. To make use of time that was formerly wasted B. To become more efficient C. Work locations are more flexible D. To be able to allocate working time around personal and professional obligations E. All of the above Answer: E Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
25. Of the following, which is the major problem with smart phones? A. They are too slow. B. They are too expensive. C. They can be used to compromise security. D. Their screens are too small. E. Their browsers are not fully functional. Answer: C Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
26. The capabilities of smart phones include all of the following except _________. A. A calculator B. E-mail C. A global positioning system D. Corporate transaction processing E. A full-function Internet browser Answer: D Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
27. Unfortunately, many managers consider smart phones as only _____, rather than as _____ that can transmit wirelessly. A. Phones, digital cameras B. Phones, pagers C. Digital cameras, phones D. Digital cameras, pagers E. Cheap, expensive devices Answer: A Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
28. Microwave transmission systems are used for _____ volume, _____ distance, _____ communications. A. Low, long, broadcast
B. Low, short, line-of-sight C. High, long, broadcast D. High, short, broadcast E. High, long, line-of-sight Answer: E Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
29. Which type of satellite has the largest footprint? A. Low-earth-orbit B. Medium-earth-orbit C. Geostationary D. Polar orbit E. Equatorial orbit Answer: C Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
30. The area of the earth reached by a satellite’s transmission is referred to as its _____. A. Hotspot B. Coverage C. Footprint D. Zone E. Wireless area Answer: C Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
31. The greatest problem with GEO satellites is which of the following? A. Propagation delay B. Expense C. Orbital life D. Size of the footprint E. Relative speed with respect to a point on the earth’s surface Answer: A
Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
32. _____ is a satellite-based tracking system that enables users to determine a person’s position. A. Bluetooth B. Wireless application protocol C. Short message service D. Wi-Fi E. Global positioning system Answer: E Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
33. Which of the following is not an advantage of radio? A. No metallic wires are needed. B. Radio waves propagate easily through office walls. C. Radio devices are inexpensive. D. Radio waves do not create electrical interference problems. E. Radio devices are easy to install. Answer: D Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
34. The main problem with radio transmission is which of the following? A. Radio waves cannot travel through walls. B. When you travel too far from the source, the signal fades. C. Devices are difficult to install. D. Radio waves are slow. E. Devices are expensive to install. Answer: B Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
35. The most common wireless technology for TV and DVD remote control devices is _______. A. Bluetooth B. Ultra-wideband C. Near-field communications D. WiMAX E. Infrared Answer: E Section reference 1: Wireless Technologies Difficulty: Easy Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
36. _____ is a wireless standard that enables temporary, short-range connection between mobile devices. A. Bluetooth B. Wireless application protocol C. Short message service D. Wi-Fi E. Global positioning system Answer: A Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
37. Which of the following is the most appropriate wireless networking standard for creating personal area networks? A. Wi-Fi B. Cellular radio C. Microwave D. Bluetooth E. WiMAX Answer: D Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
38. Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in healthcare environments? A. Wi-Fi B. Microwave C. Ultra-wideband D. Infrared E. Bluetooth Answer: C Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Medium Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
39. _____, with the shortest range of any wireless network, is designed to be used with contactless credit cards. A. Near-field communications B. Bluetooth C. Ultra-wideband D. Wi-Fi E. Infrared Answer: A Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
40. Which of the following statements about Wi-Fi is not correct? A. Wi-Fi provides simple Internet access. B. Laptop PC scans contain chips that can send and receive Wi-Fi signals. C. Many companies offer free Wi-Fi access in their stores. D. Wi-Fi requires encryption for secure transmissions. E. Wi-Fi is expensive to set up. Answer: E Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Medium Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
41. Which of the following is not inhibiting faster Wi-Fi expansion? A. Users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network services.
B. A lack of security. C. The growth of WiMAX D. Unless the service is free, users have to log on to separate accounts for each hotspot. E. Wi-Fi services may not survive in the face of free hotspot access. Answer: C Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Hard Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
42. A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________. A. Transceiver B. Hotspot C. Local reception node D. Wireless network E. GPS location Answer: B Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
43. Today, most wireless local area networks use the _____ standard, which can transmit up to 54 Mbps and has a range of about 300 feet. A. 802.11a B. 802.11b C. 802.11c D. 802.11g E. WiMAX Answer: D Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
44. _____ networks use multiple Wi-Fi access points to create a wide area network. A. Mesh B. Pervasive C. Global
D. Fixed E. Ubiquitous Answer: A Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
45. _____ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas. A. Bluetooth B. Cell phones C. A satellite D. Ultra-wideband E. Near-field communications Answer: B Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
46. The _____ standard can transmit up to 75 Mbps and has a range of 31 miles. A. Wi-Fi B. 802.11b C. 802.11c D. 802.11g E. WiMAX Answer: E Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Easy Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
47. The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________. A. Mobility, broad reach B. Mobility, lack of expense C. Security, broad reach D. Security, mobility E. Broad reach, localization
Answer: A Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
48. With regard to mobile computing, _____ means that it is easy and fast to access the Web and other mobile devices. A. Ubiquity B. Convenience C. Instant connectivity D. B and C E. A, B, and C Answer: D Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
49. With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services. A. Ubiquity B. Convenience C. Instant connectivity D. Personalization E. Localization of products and services Answer: E Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
50. The development of mobile commerce is driven by all of the following factors except: A. The widespread availability of mobile devices. B. The cell phone culture. C. Increasing prices. D. Bandwidth improvement. E. It eliminates the need for a PC. Answer: C Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Medium
Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
51. Which of the following is not a mobile application in financial services? A. Transaction processing systems B. Mobile banking C. Wireless electronic payment systems D. Micropayments E. Wireless wallets Answer: A Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
52. Parking meters that you can pay via your mobile telephone are an example of _________. A. Mobile banking B. Wireless electronic payment C. Wireless wallets D. Brokerage service E. Money transfer Answer: B Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
53. If you buy a hot dog at a concession stand using your contactless credit card, you are using a ________. A. Wireless money transfer B. Wireless wallet C. Wireless bill payment D. Micropayment E. Wireless electronic payment system Answer: E Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
54. Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is an example of ________. A. Viral marketing B. Permission advertising C. Geographical advertising D. Location-based advertising E. Direct marketing Answer: D Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
55. _____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets. A. Location-based services B. Telematics C. Pervasive services D. RFID E. Wi-Fi Answer: B Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
56. Sense networks track users via all of the following technologies except _______. A. GPS B. Traffic cameras C. Cell towers D. Wi-Fi networks E. None of the above Answer: B Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
57. _____ is the science that measures physical remoteness by means of wireless transmission from a remote source to a receiving station. A. Telemetry B. Wireless access point
C. Near-field communications D. Microwave E. Wireless positioning Answer: A Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Easy Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
58. The generic term for technologies that use radio waves to automatically identify individual items is __________. A. Telemetry B. Bar codes C. Shipping labels D. Radio-frequency identification E. Wireless access points Answer: D Section reference 1: Pervasive Computing Difficulty: Easy Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
59. Which of the following is not a limitation of barcodes? A. They require line-of-sight to the scanning device. B. They are printed on paper. C. They identify the manufacturer, product, and item. D. They are difficult to use in a manufacturing plant. E. They are useless in determining expiration date. Answer: C Section reference 1: Pervasive Computing Difficulty: Medium Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
60. The major problem with RFID has been _______. A. Expense B. Bandwidth C. Location D. RFID readers E. RFID tags Answer: A
Section reference 1: Pervasive Computing Difficulty: Easy Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
61. What would be the best use of RFID in a business? A. Transaction processing B. Supply chain management C. Personnel tracking D. Enabling communications with customers E. Decreasing network costs Answer: B Section reference 1: Pervasive Computing Difficulty: Medium Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
62. _____ networks collect data from many points over an extended space. A. Bluetooth B. Ultra-wideband C. Wireless sensor D. WiMAX E. Wi-Fi Answer: C Section reference 1: Pervasive Computing Difficulty: Easy Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
63. Which of the following can be used for reading utility meters without a person having to get out of a truck? A. RuBee B. ZigBee C. Wi-Fi D. Near-field communications E. RFID Answer: B Section reference 1: Pervasive Computing Difficulty: Easy Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
64. The act of locating wireless local area networks while moving around a city is called ____. A. Eavesdropping B. War driving C. RF jamming D. Cybersquatting E. Installing rogue access devices Answer: B Section reference 1: Wireless Security Difficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.
65. A(n) _____ allows unauthorized entry into a wireless network. A. Lack of encryption B. Disgruntled employee C. Open node D. Illegal server E. Rogue access point Answer: E Section reference 1: Wireless Security Difficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.
66. _____ refers to efforts by unauthorized users to access data traveling over wireless networks. A. RF jamming B. War driving C. Eavesdropping D. Telemetry E. Installing rogue access devices Answer: C Section reference 1: Wireless Security Difficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.
67. In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions. A. RF jamming
B. War driving C. Eavesdropping D. Telemetry E. Installing rogue access devices Answer: A Section reference 1: Wireless Security Difficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.
68. Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an _____. A. Unencrypted node B. Evil twin C. Open node D. Illegal server E. Unauthorized rogue access point Answer: B Section reference 1: Wireless Security Difficulty: Easy Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.
69. Refer to Opening Case – The Battle for the Mobile Wallet: Which of the following statements concerning mobile wallets is true? A. Traditional credit card issuers have not shown a serious interest in this technology. B. Individual companies cannot utilize this technology due to its prohibitive price. C. Google has launched a program to manufacture its own smart phone chips. D. Unlike traditional wallets, smart phones can be password protected. E. Consumer advocates endorse mobile systems because they will lead to lower prices. Answer: D Section reference 1: Opening Case Difficulty: Medium Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce. 70. Refer to IT’s About Business 8.1 – Big Wheel Mobile Truck & Square: Products like Square offer small independent businesses the following advantages over the traditional credit card systems: A. Square does not charge merchants a fee for each transaction B. Square does not require expensive equipment
C. Square can run on most mobile devices that the merchant already has D. Square can be easily customized and updated E. All of the above Answer: E Section reference 1: IT’s About Business 8.1 Difficulty: Easy Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce 71. Refer to IT’s About Business 8.2 – Cell Phones Revolutionize Healthcare in Uganda: Which of the following was not an outcome of using cell phones in Uganda? A. Medication was removed from clinics that had too much B. Doctors could text each other patient names C. The mTrac system requires a long training period for users D. Anonymous text messages can be sent to report any problems at the clinics E. All of the above are true Answer: D Section reference 1: IT’s About Business 8.2 Difficulty: Medium Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce 72. Refer to IT’s About Business 8.3 - Near-Field Communications Helps Travelers in Japan: Which of the following statements is false? A. SKiP reduces the check-in, security and boarding time in the train stations to 15 mins B. Retailers and merchants and send targeted marketing messages to customers who are physically near their store C. Japanese smartphones can be used as translators and wallets D. NFC technology in smart phones is used for ticketing and boarding passes Answer: A Section reference 1: IT’s About Business 8.3 Difficulty: Medium Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce 73. Refer to IT’s About Business 8.4 – Airlines Provide Wi-Fi to Passengers: As customers get more used to having ubiquitous Internet access, Wi-Fi in airplanes will be ______. A. Free B. More expensive than it is now C. Provided by the government D. Illegal E. None of the above Answer: A Section reference 1: IT’s About Business 8.4 Difficulty: Medium Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce
74. Refer to IT’s About Business 8.5 – Mobile Ads Still Aren’t Very Good: Which of the following statements is false? A. Mobile advertising sends advertisements to users based on their current location B. Mobile advertising requires new formats since banner ads are not visible on small screens C. Pop-up window advertising does not work as well on mobile devices as it does on computer screens D. It is easier to track the effectiveness of mobile advertising than other mediums E. Mobile advertising can be used to distribute coupons Answer: A Section reference 1: IT’s About Business 8.5 Difficulty: Easy Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce 75. Refer to Closing Case – Retailer Gains Many Benefits with RFID Item-Level Tagging: Which of the following is the primary advantage of using RFID tags for retailers? A. Easy to see tags on items B. Storing more information about each item C. Cost savings from time and labor D. Cost savings on tags E. Cost savings on scanner installations Answer: C Section reference 1: Closing Case Difficulty: Medium Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce
Question Type: Essay
76. Discuss the differences between the traditional working environment and the wireless working environment. Section reference 1: Material following chapter-opening case Difficulty: Medium Learning Objective 1: LO 8.0 Provide a real-world application of wireless, mobile computing, and mobile commerce 77. Describe the convergence of functions in today’s smart phones. Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
78. Differentiate among the three types of satellites. Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media 79. Define Bluetooth, and give examples of its uses. Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media
80. Describe the 802.11 family of standards. Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Medium Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively. 81. Explain location-based commerce, and provide examples. Section reference 1: Mobile Commerce Applications Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business. 82. What are micropayments and mobile wallets? Provide examples of their uses. Section reference 1: Mobile Commerce Applications Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business. 83. What are mobile portals and voice portals? Provide examples of their uses. Section reference 1: Mobile Commerce Applications Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business. 84. What is telemetry, and how is it used. Section reference 1: Mobile Commerce Applications Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
85. How do wireless sensor networks work, and what are they used for? Section reference 1: Pervasive Computing Difficulty: Medium Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
86. What are the problems with Wi-Fi? Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Medium Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business.
87. What are the two characteristics of mobile computing, and what are the five value-added attributes of mobile computing? Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business. 88. Explain the factors that are driving the development of mobile commerce. Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Hard Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
89. Describe pervasive computing and the two technologies that provide its infrastructure. Section reference 1: Pervasive Computing Difficulty: Medium Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
90. Identify and discuss the four major threats to wireless networks. Section reference 1: Wireless Security Difficulty: Medium Learning Objective 1: LO 8.5 Explain how the four major threats to wireless networks can damage a business. Question Type: Multiple Choice
91. Michaela runs a dog-walking business. She has three employees, and she prides herself in maintaining a high level of customer service. She gets about half of her business from lastminute requests. When she receives such a request, she needs to know where her employees are so that she can identify the nearest one who might be able to do the walk. Significantly, she needs this information before she can confirm the walk with the client. Which of the following technologies will help her obtain this information? A. Radio transmission B. Internet over Satellite C. LEO constellation D. GPS E. Microwave Answer: D Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media. 92. Frank and his wife, Paula, run a country store with a special room where husbands can sit while their wives are shopping. The Men’s Corner already has a large-screen TV for sports viewing, but Frank and Paula are considering adding Wi-Fi. Which of the following statements is false? A. Their store would need to have broadband access. B. Their store will need a wireless access point. C. They could charge the customers for the service. D. Wi-Fi is based on radio waves, so they will need a clear line-of-sight into the room. E. They should consider using Wi-Fi Direct. Answer: E Section reference 1: Wireless Computer Networks and Internet Access Difficulty: Medium Learning Objective 1: LO 8.2 Describe how businesses can use technology employed by shortrange, medium-range, and long-range networks respectively.
93. Frank and his wife, Paula, run a country store in a high-foot-traffic area. Which of the following would not be a beneficial use of mobile technology for their store? A. Telemetry B. Location-based C. Wireless payments D. Mobile app loyalty program E. All of these could be used beneficial. Answer: A Section reference 1: Mobile Computing and Mobile Commerce Difficulty: Medium Learning Objective 1: LO 8.3 Provide a specific example of how each of the five major mcommerce applications can benefit a business.
94. Frank and his wife, Paula, run a country store in a high-foot-traffic area. They are trying to understand what the traffic in the store is by using technology. They are considering setting up a wireless sensor network. Which of the following statements is false? A. Motes can be locations throughout the store. B. Once they have created the network, they cannot add additional sensors. C. The data are moved from sensor to sensor to reach a central computer. D. The sensors can tell the direction in which a person is moving. E. The network will need a base station. Answer: D Section reference 1: Pervasive Computing Difficulty: Medium Learning Objective 1: LO 8.4 Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one. 95. Frank and his wife, Paula, run a country store with a special room where husbands can sit while their wives are shopping. The Men’s Corner already has a large-screen TV for sports viewing, and they recently added Wi-Fi. Which of the following is not a security issue? A. A rogue access point B. War driving C. Motes D. Eavesdropping E. Radio-frequency jamming Answer: D Section reference 1: Wireless Technologies Difficulty: Medium Learning Objective 1: LO 8.1 Identify advantages and disadvantages of each of the four main types of wireless transmission media.
Package Title: Testbank Questions Course Title: Chapter Number: 9
Question Type: True/False
1) Web. 2.0 is a loose collection of information technologies and applications. Answer: True Title: Testbank Question 9.01 Learning Objective 1: LO 9.1: Describe six Web 2.0 tools and the two major types of Web 2.0 sites. Section Reference 1: 9.1 Web 2.0 Difficulty: Easy
2) Web 2.0 sites are primarily online places to visit. Answer: False Title: Testbank Question 9.02 Learning Objective 1: LO 9.1: Describe six Web 2.0 tools and the two major types of Web 2.0 sites. Section Reference 1: 9.1 Web 2.0 Difficulty: Easy
3) A tag is the way a developer describes a piece of information. Answer: False Title: Testbank Question 9.03 Learning Objective 1: LO 9.1: Describe six Web 2.0 tools and the two major types of Web 2.0 sites. Section Reference 1: 9.1 Web 2.0 Difficulty: Medium
4) Geo-tagging refers to tagging information on tour sites. Answer: False Title: Testbank Question 9.04 -1-
Learning Objective 1: LO 9.1: Describe six Web 2.0 tools and the two major types of Web 2.0 sites. Section Reference 1: 9.1 Web 2.0 Difficulty: Medium
5) A wiki is a collection of blogs. Answer: False Title: Testbank Question 9.05 Learning Objective 1: LO 9.1: Describe six Web 2.0 tools and the two major types of Web 2.0 sites. Section Reference 1: 9.1 Web 2.0 Difficulty: Medium
6) Companies monitor blogs for mention of their products. Answer: True Title: Testbank Question 9.06 Learning Objective 1: LO 9.1: Describe six Web 2.0 tools and the two major types of Web 2.0 sites. Section Reference 1: 9.1 Web 2.0 Difficulty: Medium
7) One can trust the content of blogs. Answer: False Title: Testbank Question 9.07 Learning Objective 1: LO 9.1: Describe six Web 2.0 tools and the two major types of Web 2.0 sites. Section Reference 1: 9.1 Web 2.0 Difficulty: Easy
8) Web 2.0 media sites allow people to share digital media. Answer: True Title: Testbank Question 9.08 Learning Objective 1: LO 9.1: Describe six Web 2.0 tools and the two major types of Web 2.0 sites. -2-
Section Reference 1: 9.1 Web 2.0 Difficulty: Easy
9) You must be a Web site developer in order to create a mashup. Answer: False Title: Testbank Question 9.09 Learning Objective 1: LO 9.1: Describe six Web 2.0 tools and the two major types of Web 2.0 sites. Section Reference 1: 9.1 Web 2.0 Difficulty: Medium 10) Buying a book online at Amazon is an example of social commerce. Answer: False Title: Testbank Question 9.10 Learning Objective 1: LO 9.2 Describe the benefits and risks of social commerce to companies Section Reference 1: 9.2 Fundamentals of Social Computing in Business Difficulty: Easy 11) When using social commerce, the user has to leave the social network page in order to purchase a product. Answer: False Title: Testbank Question 9.11 Learning Objective 1: LO 9.2 Describe the benefits and risks of social commerce to companies Section Reference 1: 9.2 Fundamentals of Social Computing in Business Difficulty: Easy 12) Businesses do not use social commerce for new products. Answer: False Title: Testbank Question 9.12 Learning Objective 1: LO 9.2 Describe the benefits and risks of social commerce to companies Section Reference 1: 9.2 Fundamentals of Social Computing in Business Difficulty: Medium 13) Generating revenue from social networking sites is easy to do. Answer: False -3-
Title: Testbank Question 9.13 Learning Objective 1: LO 9.2 Describe the benefits and risks of social commerce to companies Section Reference 1: 9.2 Fundamentals of Social Computing in Business Difficulty: Medium 14) Word of mouth marketing can be achieved using social shopping. Answer: True Title: Testbank Question 9.14 Learning Objective 1: LO 9.3 Identify the methods used for shopping socially Section Reference 1: 9.3 Social Computing in Business Shopping Difficulty:Easy 15) Craigslist is an example of a shopping community. Answer: False Title: Testbank Question 9.15 Learning Objective 1: LO 9.3 Identify the methods used for shopping socially Section Reference 1: 9.3 Social Computing in Business Shopping Difficulty: Medium 16) Viral marketing is an example of social advertising Answer: True Title: Testbank Question 9.16 Learning Objective 1: LO 9.4 Discuss innovative ways to use social networking sites for advertising and market research Section Reference 1: 9.4 Social Computing in Business Marketing Difficulty: Easy 17) Social ads are placed in paid-for media space on social networking Web sites. Answer: True Title: Testbank Question 9.17 Learning Objective 1: LO 9.4 Discuss innovative ways to use social networking sites for advertising and market research Section Reference 1: 9.4 Social Computing in Business Marketing Difficulty: Easy 18) Social apps are online apps that promote social interaction Answer: True -4-
Title: Testbank Question 9.18 Learning Objective 1: LO 9.4 Discuss innovative ways to use social networking sites for advertising and market research Section Reference 1: 9.4 Social Computing in Business Marketing Difficulty: Easy 19) Ads cannot appear as YouTube videos. Answer: False Title: Testbank Question 9.19 Learning Objective 1: LO 9.4 Discuss innovative ways to use social networking sites for advertising and market research Section Reference 1: 9.4 Social Computing in Business Marketing Difficulty: Easy 20) Communication marketing is using social media sites to get feedback. Answer: False Title: Testbank Question 9.20 Learning Objective 1: LO 9.4 Discuss innovatinve ways to use social networking sites for advertising and market research Section Reference 1: 9.4 Social Computing in Business Marketing Difficulty: Medium 21) Social networks are helping marketing professionals understand who their customers are. Answer: True Title: Testbank Question 9.21 Learning Objective 1: LO 9.4 Discuss innovative ways to use social networking sites for advertising and market research Section Reference 1: 9.4 Social Computing in Business Marketing Difficulty: Medium 22) People making online posts know that they are providing market research data. Answer: False Title: Testbank Question 9.22 Learning Objective 1: LO 9.4 Discuss innovative ways to use social networking sites for advertising and market research Section Reference 1: 9.4 Social Computing in Business Marketing Difficulty: Medium
-5-
23) Social computing increases the need for customer service. Answer: False Title: Testbank Question 9.23 Learning Objective 1: LO 9.5 Describe how social computing improves customer service. Section Reference 1: 9.5 Social Computing in Business: Customer Relationship Management Difficulty: Easy 24) Social computing empowers customers to act. Answer: True Title: Testbank Question 9.24 Learning Objective 1: LO 9.5 Describe how social computing improves customer service. Section Reference 1: 9.5 Social Computing in Business: Customer Relationship Management Difficulty: Easy
25) Human Resources departments only use social computing for external tasks. Answer: False Title: Testbank Question 9.25 Learning Objective 1: LO 9.6 Discuss different ways in which human resource managers make use of social computing. Section Reference 1: 9.6 Social Computing in Business: Human Resource Management Difficulty: Medium 26) More and more organizations are using social media for training sessions. Answer: True Title: Testbank Question 9.26 Learning Objective 1: LO 9.6 Discuss different ways in which human resource managers make use of social computing. Section Reference 1: : 9.6 Social Computing in Business: Human Resource Management Difficulty: Easy 27) Recruiters only use social computing to find people who are unemployed. Answer: False Title: Testbank Question 9.27 Learning Objective 1: LO 9.6 Discuss different ways in which human resource managers make use of social computing. Section Reference 1: 9.6 Social Computing in Business: Human Resource Management -6-
Difficulty: Medium 28) Social computing sites are not utilized by passive job seekers. Answer: False Title: Testbank Question 9.28 Learning Objective 1: LO 9.6 Discuss different ways in which human resource managers make use of social computing. Section reference1: 9.6 Social Computing in Business: Human Resource Management
Question Type: Multiple Choice
29) With Web 1.0 sites, users _________________, whereas with Web 2.0 sites, users _________________. a) Use HTML, use CCS b) Passively receive information, participate with the site. c) Use wired connections, use wireless connections. d) Have to know the address of the site, can use search engines to find a site e) Did not have to login to find information, have to login in to find information. Answer: b Title: Testbank Question 9.29 Learning Objective 1: LO 9.1: Describe six Web 2.0 tools and the two major types of Web 2.0 sites. Section Reference 1: 9.1 Web 2.0 Difficulty: Hard
30) You sign up for an RSS feed from CNN.com. Which of the following would you expect to happen? a) When you sign up, you will need to download print templates. b) You won’t be able to search RSS content. c) You will be able to choose only one topic area. d) You will be notified of updates in the content areas you selected. e) You will get content sent to you via e-mail. Answer: d
-7-
Title: Testbank Question 9.30 Learning Objective 1: LO 9.1 Describe six Web 2.0 tools and the two major types of Web 2.0 sites.
Section Reference 1: 9.1 Web 2.0 Difficulty: Hard
31) Which of the following is not an example of Web 2.0 applications? a) Blogs b) Wikis c) Netcasting d) Crowdsourcing e) AJAX Answer: e Title: Testbank Question 9.31 Learning Objective 1: LO 9.1 Describe Web 2.0, and the two major types of Web 2.0 sites Section Reference 1: 9.1 Web 2.0 Difficulty: Medium
32) Many companies are using ________ to capture updated product features and specifications. a) Blogs b) Netcasts c) RSS feeds d) Tags e) Wikis Answer: e Title: Testbank Question 9.32 Learning Objective 1: LO 9.1 Describe Web 2.0, and the two major types of Web 2.0 sites Section Reference 1: 9.1 Web 2.0 Difficulty: Medium
33) Which of the following statements concerning blogging is false? a) Anyone can blog. b) A reader can believe all of the details in a blog. c) A company can maintain an internal blog site. d) Blogging can be used in marketing. e) Tweets are replacing blogging. -8-
Answer: b Title: Testbank Question 9.33 Learning Objective 1: LO 9.1 Describe Web 2.0, and the two major types of Web 2.0 sites Section Reference 1: 9.1 Web 2.0 Difficulty: Hard
34) You just started to work on a project with three other people. You realize that everyone has their own notes, which makes it hard for you to keep track of what has been done and what still needs to be done. Which of the following applications would you suggest the team use? a) Blogs b) Netcasts c) RSS feeds d) Tags e) Wikis Answer: e Title: Testbank Question 9.34 Learning Objective 1: LO 9.1 Describe Web 2.0, and the two major types of Web 2.0 sites Section Reference 1: 9.1 Web 2.0 Difficulty: Medium 35) The comments of consumers in the blogosphere concerning a company’s products are called ____________________. a) Free advertising b) Consumer-generated media. c) Consumer-generated PR d) Rumors e) Reliable feedback Answer: b Title: Testbank Question 9.35 Learning Objective 1: LO 9.1 Describe Web 2.0, and the two major types of Web 2.0 sites. Section Reference 1: 9.1 Web 2.0 Difficulty: Medium
36) The reliability of the content in Wikipedia, the online encyclopedia, is questionable because
-9-
a) All of the administrators are volunteers. b) No author has to identify himself or herself. c) The content is updated all the time. d) It is difficult to test the authenticity of the content due to the fact that anyone can contribute content. e) All of the above are reasons why the content is questionable. Answer: d Title: Testbank Question 9.36 Learning Objective 1: LO 9.1 Describe Web 2.0, and the two major types of Web 2.0 sites. Section Reference 1: 9.1 Web 2.0 Difficulty: Medium 37) A Web site that combines content from other Web sites to form new content is called a(n) ______. a) Social network b) Aggregator c) Blog d) E-commerce site e) Mashup Answer: e Title: Testbank Question 9.37 Learning Objective 1: LO 9.1 Describe Web 2.0, and the two major types of Web 2.0 sites Section Reference 1: 9.1 Web 2.0 Difficulty: Easy
38) Which of the following is not a social networking site? a) Facebook b) YouTube c) Flickr d) Wikipedia e) LinkedIn Answer: d Title: Testbank Question 9.38 Learning Objective 1: LO 9.1 Describe Web 2.0, and the two major types of Web 2.0 sites Section Reference 1: 9.1 Web 2.0 Difficulty: Easy
- 10 -
39) LinkedIn is a _______________________ social networking site that makes money from advertising and services. a) Training b) College c) Business-oriented d) Video-upload e) Blogging Answer: c Title: Testbank Question 9.39 Learning Objective 1: LO 9.1 Describe Web 2.0, and the two major types of Web 2.0 sites Section Reference 1: 9.1 Web 2.0 Difficulty: Medium
420Which type of social network allows users to edit and contribute content posted to a particular site? a) Wiki b) Blog c) RSS d) Mashup Answer: a Title: Testbank Question 9.40 Learning Objective 1: LO 9.1 Describe Web 2.0, and the two major types of Web 2.0 sites Section Reference 1: 9.1 Web 2.0
41) A business that wants to create a forum allowing employees to interact with coworkers would benefit from utilizing__________. a) RSS b) Mashups c) Enterprise Social Networks d) Microblogs Answer: c Title: Testbank Question 9.41 Learning Objective 1: LO 9.1 Describe Web 2.0, and the two major types of Web 2.0 sites Section Reference 1: 9.1 Web 2.0 42) Building relationships, anticipating needs, and providing special deals for the community’s members is a function of which category of Web 2.0 applications?
- 11 -
a) Social networking b) Aggregators c) Blogs d) Crowdsourcing e) Social commerce Answer: e Title: Testbank Question 9.42 Learning Objective 1: LO 9.2 Describe the benefits and risks of social commerce to companies. Section Reference 1: 9.2 Fundamentals of Social Computing in Business Difficulty: Medium
43) Which of the following is an advantage of social commerce over traditional e-commerce? a) Loyalty b) The ability to predict buying habits based on real-time data c) Processing speed d) Crowdsourcing e) Reduced expenses Answer: b Title: Testbank Question 9.43 Learning Objective 1: LO 9.2 Describe the benefits and risks of social commerce to companies. Section Reference 1: 9.2 Fundamentals of Social Computing in Business Difficulty: Medium
44) Which of the following is a true statement about the impact of social computing on a business? a) There is a high cost to using viral marketing b) It is difficult to gain information about customers c) A small minority of individuals contribute the majority of feedback and can provide skewed data d) Social computing does not allow for rapid feedback from customers. Answer: c Title: Testbank Question 9.44 Learning Objective 1: LO 9.2 Describe the benefits and risks of social commerce to companies. Section Reference 1: 9.2 Fundamentals of Social Computing in Business Difficulty: Medium 45) Which of the following is not an example of social commerce? a) Wendy offers gift cards to online users for funniest response to various challenges. - 12 -
b) Pepsi Co. sends live notifications to customers when they are close to a store that sells their products. c) Disney allows people to book tickets on Facebook without leaving the site. d) Best Buy has a Web site which can be used to purchase products for pick up in a store. e) Zappo’s uses Twitter to send customers coupons when they mention a Zappo’s product. Answer: d Title: Testbank Question 9.45 Learning Objective 1: LO 9.2 Describe the benefits and risks of social commerce to companies Section Reference 1: 9.2 Fundamentals of Social Computing in Business Difficulty: Easy
46) Which of the following is a risk of social computing? a) The content posted will not be found with a search engine. b) Employees will be willing to participate. c) Employees will maintain company privacy. d) Ignoring negative posts is easy to do. e) Consumer-generated content is not edited or filtered Answer: e Title: Testbank Question 9.46 Learning Objective 1: LO 9.2 Describe the benefits and risks of social commerce to companies Section Reference 1: 9.2 Fundamentals of Social Computing in Business Difficulty: Medium 47) Which of the following is true about social commerce? a) Social commerce only benefits customers. b) Social commerce only benefits businesses. c) Businesses can easily learn about customers’ experiences. d) Social commerce is only concerned with the selling process. e) New products are never tested via social commerce. Answer: c Title: Testbank Question 9.47 Learning Objective 1: LO 9.2 Describe the benefits and risks of social commerce to companies Section Reference 1: 9.2 Fundamentals of Social Computing in Business Difficulty: Hard
48) Which of the following is not an example of social shopping? a) Group shopping - 13 -
b) Going to Amazon.com to buy a book c) Shopping communities and clubs d) Social marketplaces e) Peer-to-peer shopping models Answer: b Title Testbank Question 9.48 Learning Objective 1: LO 9.3 Identify the methods used for shopping socially Section Reference 1: 9.3 Social Computing in Business Shopping Difficulty: Medium
49) Groupon is an example of ________________ a) Shopping communities and clubs b) Social marketplace c) Group shopping d) Peer-to-peer shopping e) Collaborative consumption Answer: c Title: Testbank Question 9.49 Learning Objective 1: LO 9.3 Identify the methods used for shopping socially Section Reference 1: 9.3 Social Computing in Business Shopping Difficulty: Easy 50) Which of the following ratings/reviews do companies routinely pay for? a) customer reviews b) expert ratings c) sponsored reviews d) none of the choices are correct Answer: c Title: Testbank Question 8.50 Learning Objective 1: LO 8.3 Identify the methods used for shopping socially Section Reference 1: 9.3 Social Computing in Business Shopping Difficulty: Easy
51) Ratings, reviews, and recommendations a) Are always provided by businesses on their Web site. b) Are posted by experts. c) Are posted without compensation. d) Are an aspect of social shopping. e) Are not beneficial to the business - 14 -
Answer: d Testbank Question 9.51 Learning Objective 1: LO 9.3 Identify the methods used for shopping socially Section Reference 1: 9.3 Social Computing in Business Shopping Difficulty: Medium
52) Social marketplaces act as online ______________ that harness the power of social networks for introducing, buying, and selling products and services. a) intermediaries b) shopping carts c) communities d) collaborative consumption e) mashup Answer: a Testbank Question 9.52 Learning Objective 1: LO 9.3 Identify the methods used for shopping socially Section Reference 1: 9.3 Social Computing in Business Shopping Difficulty: Medium 53) Which of the following is a type of collaborative consumption? a) Buying a new book from Amazon b) Craigslist c) Renting a car from Hertz or Avis d) Buying a e-textbook from your bookstore Answer: b Title: Testbank Question 9.53 Learning Objective 1: LO 9.3 Identify the methods used for shopping socially Section Reference 1: 9.3 Social Computing in Business Shopping Difficulty: Easy
54) Which of the following social shopping methods contributes to environmental sustainability? a) Group shopping b) Peer-to-peer shopping c) Shopping clubs d) Social marketplaces Answer: b Title: Testbank Question 9.54 - 15 -
Learning Objective 1: LO 9.3 Identify the methods used for shopping socially Section Reference 1: 9.3 Social Computing in Business Shopping Difficulty: Easy
55) Which of the following tools are not used by marketing professionals to compile market research? a) Blogs b) Wikis c) Online forums d) Social networking sites e) RSS Answer: e Title: Testbank Question 9.55 Learning Objective 1: LO 9.4 Discuss innovative ways to use social networking sites for advertising and market research Section Reference 1: 9.4 Social Computing in Business Marketing Difficulty: Medium
56) The monitoring, collection, and analysis of socially generated data is called a) Social networking b) Social commerce c) Social intelligence d) Social advertising e) Social capital Answer: c Title: Testbank Question 9.56 Learning Objective 1: LO 9.4 Discuss innovative ways to use social networking sites for advertising and market research Section Reference 1: 9.4 Social Computing in Business Marketing Difficulty: Medium
57) All of the following are used to provide online market research except a) Reviews b) Recommendations c) Voting d) Emails e) Blogs Answer: d - 16 -
Title: Testbank Question 9.57 Learning Objective 1: LO 9.4 Discuss innovative ways to use social networking sites for advertising and market research Section Reference 1: 9.4 Social Computing in Business Marketing Difficulty: Medium
58) Which of the following is false about social advertising? a) Social network sites have turned to advertising as a way to make revenue. b) Viral marketing is effective with social netwoirking c) Social advertising removes peer pressure from the buying decision. d) Social advertisements are placed in paid-for media space by companies. e) Social apps support social interactions and are managed by a company to promote its brand. Answer: c Title: Testbank Question 9.58 Learning Objective 1: LO 9.4 Discuss innovative ways to use social networking sites for advertising and market research Section Reference 1: 9.4 Social Computing in Business Marketing Difficulty: Hard
59) Using social computing tools to do market research a) Is only done by consumers b) Is only done by businesses c) Is expensive d) Can foster closer customer relationships e) Uses only data provided to the business. Answer: d Title: Testbank Question 9.59 Learning Objective 1: LO 9.4 Discuss innovative ways to use social networking sites for advertising and market research Section Reference 1: 9.4 Social Computing in Business Marketing Difficulty: Medium
60) Conversational marketing can take place in which of the following forums? a) Blogs b) Wikis c) Online forums d) Social networking sites - 17 -
e) All of the above Answer: e Title: Testbank Question 9.60 Learning Objective 1: LO 9.4 Discuss innovative ways to use social networking sites for advertising and market research Section Reference 1: 9.4 Social Computing in Business Marketing Difficulty: Easy
61) The monitoring, collection, and analysis of socially generated data, and the resultant strategic decisions are combined in a process known as_________. a) social commerce b) social intelligence c) social capital d) social networking Answer: b Title: Testbank Question 9.61 Learning Objective 1: LO 9.4 Discuss innovative ways to use social networking sites for advertising and market research Section Reference 1: 9.4 Social Computing in Business Marketing Difficulty: Easy
62) Which of the following is true about the impact of social computing on customer service? a) It’s harder for customers to be heard by a company. b) Businesses can take their time responding to social media posts. c) Customers themselves can be used to reduce problems. d) Businesses will only get negative comments on social media posts. Answer: c Title: Testbank Question 9.62 Learning Objective 1: LO 9.5 Describe how social computing improves customer service. Section Reference 1: 9.5 Social Computing in Business: Customer Relationship Management Difficulty: Medium
63) Social computing has allowed customers a) To be advocates and influencers. b) To continue to have to be passive with their interactions with companies c) To be forced to interact more often with customer service. d) To be restricted to only posting positive feedback about products.. Answer: a - 18 -
Title: Testbank Question 9.63 Learning Objective 1: LO 9.5 Describe how social computing improves customer service. Section Reference 1: 9.5 Social Computing in Business: Customer Relationship Management Difficulty: Medium
64) One of the problems that HR departments have with using social computing to recruit is a) all candidates seek them out b) they only receive qualified applications c) they receive many more applications than they can process. d) social sites each have their own special niche e) they cannot be used for internal tasks. Answer: c Title: Testbank Question 9.654Learning Objective 1: LO 9.6 Discuss different ways in which human resource managers make use of social computing Section Reference 1: 9.6 Social Computing in Business: Human Resource Management Difficulty: Easy
65) HR departments use social computing applications to assist them in which of the following activities: a) Recruiting b) Training c) Regrouping teams d) Managing downsizing e) All of the above Answer: e Title: Testbank Question 9.65 Learning Objective 1: LO 9.6 Discuss different ways in which human resource managers make use of social computing Section Reference 1: 9.6 Social Computing in Business: Human Resource Management Difficulty: Easy
66) Refer to IT’s About Business 9.1 – Tiger Tans and Gifts: Which of the following is true about Lisa’s use of Facebook to grow her business? a) Lisa had to build her own Web site b) Lisa does not do online selling via Facebook. c) Lisa only posts on her page when she has a new product. - 19 -
d) Lisa is using crowdsourcing to get new product designs. Answer: b Title: Testbank Question 9.66 Learning Objective 1: LO 9.1 Describe Web 2.0, and the two major types of Web 2.0 sites Section Reference 1: IT’s About Business 9.1 Difficulty: Medium 67) Refer to IT’s About Business 9.1 – Tiger Tans and Gifts: Lisa Kelling is able to use her business’s Facebook page to do the following: a) Create an online presence for her business b) Provide information (e.g., location and times) about her business c) Let customers place orders online d) Post pictures of new product designs Answer: c Title: Testbank Question 9.67 Learning Objective 1: LO 9.1 Describe Web 2.0, and the two major types of Web 2.0 sites Section Reference 1: IT’s About Business 9.1 Difficulty: Medium
68) Refer to IT’s About Business 9.3 – Pinterest: Pinterest is: a) a site that allows users to explore through information shared by friends. b) in direct competition with Facebook. c) a shareable online bulletin board. d) making money Answer: c Title: Testbank Question 9.68 Learning Objective 1: Identify the methods used for shopping socially Section Reference 1: IT’s About Business 9.3 Difficulty: Medium
69) Refer to IT’s About Business 9.4: Twitter can only be used to get across messages for your own organization /product? True False - 20 -
Answer: False Title: Testbank Question 9.69 Learning Objective 1: Identify the methods used for shopping socially Section Reference 1: IT’s About Business 9.4 Difficulty: Medium 70) Refer to IT’s About Business 9.5 – Buying a Vehicle Takes Work: Cars.com integrates different types of data from different sources and presents it to customers. Which of the following is false about its Web 2.0 efforts? a) Cars.com earns revenue from online classified ads. b) Users need to join Cars.com in order to obtain pricing quotes from dealerships. c) Their site offers user-generated content from customers. d) The company has mobile apps. e) Cars.com uses Facebook and Twitter to increase its visibility. Answer: b Title: Testbank Question 9.70 Learning Objective 1: LO 9.1 Describe Web 2.0, and the two major types of Web 2.0 sites Section Reference 1: IT’s About Business 9.5 Difficulty: Medium 714) Refer to IT’s About Business 9.6 – So You Want to Find a Job: Which of the following is a benefit of searching for a job online? a) It’s easy to find potential positions online. b) Software filters are as effective as human reviews. c) There are only a few hundred resumes for each posted position d) There are only a few sites to review. e) Social networking can help personalize the search. Answer: e Title: Testbank Question 9.71 Learning Objective 1: LO 9.6 Discuss different ways in which human resource managers make use of social computing. Section Reference 1: IT’s About Business 9.6 Difficulty: Medium
- 21 -
72) YouTube does not earn direct revenue from a) Text and Video Advertising b) Promoted videos c) Branded Channels d) Television Movie Studios e) YouTube earns direct revenue from all the above Answer: E Title: Testbank Question 9.72 Learning Objective 1: Identify the methods used for shopping socially Section Reference 1: IT’s About Business 9.4 Difficulty: Medium 73) Refer to Opening Case #1 – Facebook Commerce: Which of the following is true about Facebook commerce? a) Shoppers can make purchases without leaving Facebook. b Only traditional retailers can have Facebook stores. c) Facebook credits can only be purchased through Facebook. d) Facebook charges businesses to set up a storefront. Answer: a Title: Testbank Question 9.73 Learning Objective 1: LO 9.3 Identify the methods used for shopping socially. Section Reference 1: Opening Case 1: Facebook Commerce Difficulty: Medium 74) Refer to Closing Case - Can Anyone Succeed with Local, Online Advertising? The main challenge for Yelp’s profitability is a) Lack of customer participation b) Lack of paying clients c) Competition from Google and Facebook d) (a) and (b) only Answer: c Title: Testbank Question 9.74 Learning Objective 1: LO 9.3 Identify the methods used for shopping socially. Learning Objective 2: LO 9.6 Discuss different ways in which human resource managers made use of social computing. Section Reference 1: Closing Case: Can Anyone Succeed with Local, Online Advertising? Difficulty: Medium
- 22 -
Question Type: Essay
75) What is the difference between Web 1.0 and Web 2.0? Title: Testbank Question 9.75 Learning Objective 1: LO 9.1 Describe Web 2.0, and the two major types of Web 2.0 sites Section Reference 1: 9.1 Web 2.0 Difficulty: Medium
76) Compare and contrast blogs and wikis. Title: Testbank Question 9.76 Learning Objective 1: LO 9.1 Describe Web 2.0, and the two major types of Web 2.0 sites Section Reference 1: 9.1 Web 2.0 Difficulty: Medium
77) Discuss the efforts that Wikipedia takes to improve the reliability of its content. Why do many colleges continue to disallow Wikipedia as a cite for scholarly work? Title: Testbank Question 9.77 Learning Objective 1: LO 9.1 Describe Web 2.0, and the two major types of Web 2.0 sites. Section Reference 1: 9.1 Web 2.0 Difficulty: Medium
78) Explain how a corporate social networking site would differ (on as many aspects as you can think of) from the personal one that so many of us belongs to. Title: Testbank Question 9.78 Learning Objective 1: LO 9.2 Describe the benefits and risks of social commerce to companies. Section Reference 1: 9.2 Fundamentals of Social Computing in Business Difficulty: Medium 79) Identify and analyze the risks and benefits associated with social networking sites. Title: Testbank Question 9.79 Learning Objective 1: LO 9.2 Describe the benefits and risks of social commerce to companies. Section Reference 1: 9.2 Fundamentals of Social Computing in Business Difficulty: Easy
- 23 -
80) Give three examples of how YouTube is redefining the entertainment business. Comment on the success or limitations of their efforts. Title: Testbank Question 9.80 Learning Objective: LO 9.2 Describe the benefits and risks of social commerce to companies. Section Reference 1: 9.2 Fundamentals of Social Computing in Business Difficulty: Medium 81) What are the risks a company has when they contract to offer a Groupon? Title: Testbank Question 9.81 Learning Objective: LO 9.3 Identify the methods used for shopping socially Section Reference 1: 9.3 Social Computing in Business: Shopping Difficulty: Medium 82) What is collaborative consumption? What are its benefits? What are its risks? Title: Testbank Question 9.82 Learning Objective: LO 9.3 Identify the methods used for shopping socially Section Reference 1: 9.3 Social Computing in Business: Shopping Difficulty: Medium 83) Explain social intelligence and give some examples. Title: Testbank Question 9.83 Learning Objective: LO 9.4 Discuss innovative ways to use social networking sites for advertising and market research Section Reference 1: 9.4 Social Computing in Business: Marketing Difficulty: Medium 84) How does social computing improve the customer experience? What benefits do the customers derive from using social computing? Title: Testbank Question 9.84 Learning Objective: LO 9.5 Describe how social computing improves customer service Section Reference 1: 9.5 Social Computing in Business: Customer Relationship Management Difficulty: Medium 85) Social computing is making it easier for recruiters to find good candidates and making it harder. Explain this statement. Title: Testbank Question 9.85 Learning Objective: LO 9.6 Discuss different ways in which human resource managers make use of social computing Section Reference 1: 9.6 Social Computing in Business: Human Resource Management
- 24 -
- 25 -
Package Title: Testbank Questions Course Title: IS 5e Chapter Number: 10 Question Type: True/False
1. The functional area information systems are the most fundamental information systems in the organization. Answer: False Section reference 1: Transaction Processing Systems Difficulty: Easy
2. The data processed by transaction processing systems provide the inputs for other organizational information systems. Answer: True Section reference 1: Transaction Processing Systems Difficulty: Easy
3. In general, organizations try to automate data entry as much as possible. Answer: True Section reference 1: Transaction Processing Systems Difficulty: Easy 4. When you make a purchase online, that transaction is an example of batch processing. Answer: False Section reference 1: Functional Area Information Systems Difficulty: Medium 5. Functional information systems support the entire enterprise or major portions of it. Answer: False Section reference 1: Functional Area Information Systems Difficulty: Easy 6. The information systems for Accounting and Finance could contain control and auditing process. Answer: True Section reference 1: Functional Area Information Systems Difficulty: Easy 7. The POM function within an organization monitors the customer sales activity.
Answer: False Section reference 1: Functional Area Information Systems Difficulty: Easy 8. An example of a transaction in a HRIS application is adding a new employee. Answer: True Section reference 1: Functional Area Information Systems Difficulty: Easy
9. Information systems can be function-specific. Answer: True Section reference 1: Functional Area Information Systems Difficulty: Easy
10. Historically, the functional area information systems were developed independently of one another. Answer: True Section reference 1: Functional Area Information Systems Difficulty: Easy
11. Information silos were particularly efficient when business processes crossed functional boundaries in an organization. Answer: False Section reference 1: Enterprise Resource Planning Systems Difficulty: Easy
12. Business processes may be located within one functional area or may span multiple functional areas. Answer: True Section reference 1: Enterprise Resource Planning Systems Difficulty: Easy
13. Best practices are the most successful solutions or problem-solving methods for achieving a business objective. Answer: True Section reference 1: Enterprise Resource Planning Systems Difficulty: Easy
14. Enterprise resource management is an enterprise-wide effort to acquire and retain customers.
Answer: False Section reference 1: Enterprise Resource Planning Systems Difficulty: Easy
15. Financial management, operations management, and human resource management are extended ERP modules. Answer: False Section reference 1: Enterprise Resource Planning Systems Difficulty: Easy
16. When ERP systems are not appropriate in an organization, then that organization can use an enterprise application integration system. Answer: True Section reference 1: Enterprise Resource Planning Systems Difficulty: Easy
17. Organizations that use ERP systems are more agile and adaptive. Answer: True Section reference 1: Enterprise Resource Planning Systems Difficulty: Easy 18. ERP systems cannot manage cross departmental processes. Answer: False Section Reference 1: ERP Support for Business Processes Difficulty: Easy
19. Exception reports show a greater level of detail than is included in routine reports. Answer: False Section reference 1: Reports Difficulty: Easy 20. Key-indicator reports shows data at a greater level of detail. Answer: False Section reference 1: Reports Difficulty: Easy 21. Drill down reports are produced at scheduled intervals. Answer: False Section reference 1: Reports Difficulty: Medium
22. An organization has to own all of the information systems it used. Answer: False Section reference 1: Material after Opening Case Difficulty: Medium 23. In addition to cost savings and in labor and time, the new IS added a level of reliability and quick access to information that employees had not even realized they needed. Answer: True Section reference 1: IT’s About Business 10.1 Difficulty: Medium 24. European railways improved its efficiencies by using SAP, which is a customer relationship management system. Answer: False Section reference 1: IT’s About Business 10.2 Difficulty: Medium 25. A company that implements an ERP system must reworking their business processes to meet the procedures established by their ERP systems to gain significant benefits. Answer: True Section reference 1: Closing case Difficulty: Medium
Question Type: Multiple Choice 26. Which of the following is true? A. Transactions are only critical to the area they occur in. B. Transactions can only involve one database. C. Transactions can only involve one computer. D. The actual processing of a Transaction has to be standard. E. Transactions generate a small volume of data. Answer: D Section reference 1: Transaction Processing Systems Difficulty: Medium 27. Which of the following is false? A. Corporate data is supplied by Transaction processing systems. B. Information systems are only used by large organizations. C. Reports from information systems are used in all levels of the organization. D. Data from TPS systems feeds ERP systems. E. Information systems within an organization support internal and external processes. Answer: B Section reference 1: Transaction Processing Systems
Difficulty: Hard 28. Organizational transactions are typically _____ volume, _____, and therefore _____ to computerize. A. low, repetitive, difficult B. high, repetitive, easy C. high, different, difficult D. low, different, easy E. high, different, easy Answer: B Section reference 1: Transaction Processing Systems Difficulty: Medium 29. Business transactions that are processed as they occur is an example of A. batch processing B. source data automation C. OLTP D. TPS E. ESS.
Answer: C Section reference 1: Transaction Processing Systems Difficulty: Medium
30. The most fundamental information systems in an organization are: A. office automation systems B. decision support systems C. functional area information systems D. Transaction processing systems E. business intelligence systems Answer: D Section reference 1: Transaction Processing Systems Difficulty: Easy
31. When interest is credited to your savings account at your bank, it is called a: A. process B. function C. calculation D. Transaction E. decision Answer: D Section reference 1: Transaction Processing Systems Difficulty: Medium
32. Crediting interest to your savings account at your bank once a month, it is called a: A. process B. function C. calculation D. Transaction E. decision Answer: A Section reference 1: Transaction Processing Systems Difficulty: Medium 33. When interest is credited to your savings account at your bank, it is called a: A. process B. function C. calculation D. Transaction E. decision Answer: D Section reference 1: Transaction Processing Systems Difficulty: Medium 34. Data that have been processed by the organization’s _____ are inputs into the organization’s database. A. office automation systems B. functional area information systems C. Transaction processing systems D. decision support systems E. digital dashboards Answer: C Section reference 1: Transaction Processing Systems Difficulty: Easy
35. Which of the following is not a characteristic of a transaction processing system? A. small amounts of data are processed B. sources of data are mainly internal C. low computation complexity D. high level of accuracy, data integrity, and security E. high level of detail Answer: A Section reference 1: Transaction Processing Systems Difficulty: Easy
36. Which of the following is not an example of a transaction? A. A person hired
B. A payroll check generated C. A service sold D. Printing a report E. Checking out at Walmart Answer: D Section reference 1: Transaction Processing Systems Difficulty: Hard 37. Which of the following is false? A. TPS need large computers to process the transactions. B. Business transactions can be processed when they occur. C. Business transactions can be processed after they occur. D. Data for transactions can be collected by sensors. E. A transaction is a business event. Answer: A Section reference 1: Transaction Processing Systems Difficulty: Hard
38. Which of the following is not a function of functional area information systems? A. providing information to managers in the functional areas B. supporting the managerial tasks of planning, organizing, and controlling operations C. providing information mainly in the form of reports D. providing data from business events to the corporate database E. providing analysis capabilities to middle level managers and staff Answer: D Section reference 1: Functional Area Information Systems Difficulty: Easy
39. Which of the following is not a process within an information system for Accounting and Finance? A. Budgeting B. Managing Currencies C. Inventory management D. Auditing E. Expense management Answer: C Section reference 1: Functional Area Information Systems Difficulty: Medium 40. Which of the following is not a process within an information system for Human Resource Management? A. Benefits administration B. Firing decisions C. Peer evaluations D. Recruitment E. Training
Answer: B Section reference 1: Functional Area Information Systems Difficulty: Easy 41. Which of the following is false? A. Inventory management determines how much inventory to order. B. Large companies allow their vendors to manage their inventory. C. The POM function within an organization monitors sales. D. Quality control used by manufacturing units uses metrics. E. Computer systems are used to integrate all aspects of product design. Answer: C Section reference 1: Functional Area Information Systems Difficulty: Medium 42. Which of the following is false? A. ERP systems are an evolution of functional information systems. B. ERP systems look the same to users as functional information systems. C. ERP systems have much the same functionality as functional information systems. D. ERP systems produce the same reports as functional information systems. E. ERP systems use the same data as functional information systems. Answer: B Section reference 1: Enterprise Resource Planning Systems Difficulty: Medium
43. Enterprise resource planning systems take a(n) _____ view of the overall organization. A. User’s B. Management C. Functional D. Business process E. Transactional Answer: D Section reference 1: Enterprise Resource Planning Systems Difficulty: Medium
44. _____ integrate the planning, management, and use of all of an organization’s resources, and are designed to tightly integrate the functional areas of the organization. A. Transaction processing systems B. Supply chain management systems C. Functional area information systems D. Enterprise resource planning systems E. Corporate extranets Answer: D Section reference 1: Enterprise Resource Planning Systems
Difficulty: Easy 45. Which of the following is false? A. Functional area information systems were usually developed independently. B. Functional area information systems easily communicate with each other. C. ERP systems are designed to integrate business processes. D. ERP systems use a common database. E. ERP systems integrate functional areas within an organization. Answer: B Section reference 1: Enterprise Resource Planning Systems Difficulty: Medium
46. The characteristics of ERP systems include all of the following except: A. integrating the planning, management, and use of all resources of the organization B. providing information necessary to control the business processes of the organization C. including a set of interdependent software modules D. typically fitting an organization’s existing business processes E. they are expensive and time-consuming Answer: D Section reference 1: Enterprise Resource Planning Systems Difficulty: Easy
47. Enterprise resource planning systems are very _____ software products, meaning that companies typically have to change their _____ to accommodate how the software functions. A. unstructured, business processes B. structured, reporting relationships C. structured, accounting processes D. unstructured, inventory control E. structured, business processes Answer: E Section reference 1: Enterprise Resource Planning Systems Difficulty: Medium
48. _____ are interorganizational ERP systems that provide Web-enabled links between an organization’s key business systems and its customers, suppliers, business partners, and others. A. Functional area information systems B. Supply chain management systems C. Transaction processing systems D. Office automation systems E. ERP II systems Answer: E Section reference 1: Enterprise Resource Planning Systems
Difficulty: Easy
49. _____ are the most successful solutions or problem-solving methods for achieving a business objective. A. Business functions B. Best practices C. Optimal strategies D. Business processes E. Enterprise solutions Answer: B Section reference 1: Enterprise Resource Planning Systems Difficulty: Easy
50. The drawbacks of ERP systems include all of the following except: A. They are complex B. They are expensive C. They are time-consuming to implement D. Companies may need to change existing business processes to fit the software E. They consist of modules Answer: E Section reference 1: Enterprise Resource Planning Systems Difficulty: Easy 51. Which of the following was not included in early ERP systems? A. Sales and Marketing B. Inventory Control C. Order Entry D. Distribution E. Raw materials management Answer: A Section reference 1: Enterprise Resource Planning Systems Difficulty: Easy
52. Which of the following is false about ERP II systems? A. They utilize the Web. B. They include human resources processes. C. Functionality is delivered as e-business suites. D. They support internal- facing applications as well as external-facing applications. E. These ERP systems have no optional modules. Answer: E Section reference 1: Enterprise Resource Planning Systems Difficulty: Easy
53. Which of the following is false? A. Breaking down functional silos makes an organization more adaptive. B. An organization doesn’t have to use the business processes coded into the ERP. C. ERP systems change an organization’s business processes. D. ERP systems are time consuming to implement. E. ERP systems require functional areas to work together. Answer: B Section reference 1: Enterprise Resource Planning Systems Difficulty: Easy
54. Which of the following has not been identified as a reason for ERP implementation failure? A. Failure to include affected employees in planning B. The complexity of the planning C. Lack of documentation D. Insufficient training E. No change management processes Answer: C Section reference 1: Enterprise Resource Planning Systems Difficulty: Medium
55. The ______________ process originates in the warehouse and end in the accounting department. A. procurement B. fulfillment C. production D. None of the choices are correct Answer: A Section Reference 1: ERP Support for Business Processes Difficulty: Easy
56. The ____________ process originates in the sales department and ends in the accounting department. A. procurement B. fulfillment C. production D. None of the choices are correct Answer: B Section Reference 1: ERP Support for Business Processes Difficulty: Easy
57. Which of the following activities does not occur within the order fulfillment process? A. The sales department receives a customer inquiry and issues a quotation indicating price and availability. B. The sales department forwards a sales order to the warehouse. C. The warehouse forwards a purchase requisition in order to buy goods from a vendor. D. The warehouse prepares the shipment and produces internal documentation. E. The accounting department issues an invoice to the customer. Answer: C Section Reference 1: ERP Support for Business Processes Difficulty: Medium
58. _____ reports contain special information not found in routine reports. A. Ad hoc B. Summary C. Drill-down D. Key-indicator E. Exception Answer: A Section reference 1: Reports Difficulty: Easy
59. _____ reports are produced at scheduled intervals. A. Ad hoc B. Routine C. Exception D. Detailed E. Key indicator Answer: B Section reference 1: Reports Difficulty: Easy
60. _____ reports summarize the performance of critical activities. A. Ad hoc B. Routine C. Exception D. Detailed E. Key indicator Answer: E Section reference 1: Reports Difficulty: Easy
61. When the chief financial officer of a company wants a report on business units who have spent 10 percent more than their allotted budget, she would be requesting which type of report? A. Ad hoc B. Routine C. Exception D. Detailed E. Key indicator Answer: C Section reference 1: reports Difficulty: Medium
62. _____ reports include only information that falls outside certain threshold standards. A. Ad hoc B. Routine C. Exception D. Detailed E. Key indicator Answer: C Section reference 1: reports Difficulty: Easy
63. To effectively manage by exception (i.e., use exception reports), the company must first create: A. performance standards B. best practices C. user information requirements D. a database E. employee evaluation guides Answer: A Section reference 1: Reports Difficulty: Easy 64. Refer to Opening Case – IT Transformation at Ford Motor Company: Which of the following is true? A. The best way to improve the efficiency of existing IT is to add new technology B. Consolidation and redundancy elimination is an important aspect of improving IT infrastructure C. To increase productivity of the IT systems, new employees with experience should be brought in as replacements D. The most efficient use of recourses is to develop all applications in house. Answer: B Section reference 1: Opening Case Difficulty: Medium
65. Refer to Closing Case – In order to meet its goals with fewer resources in a difficult economy, PACCAR A. Outsourced the development of the new system B. Hired talented IT employees while laying off other workers C. Trained their employees in new skills D. Bought existing software to suit their needs E. Used open source software since it was free Answer: A Section reference 1: Closing Case Difficulty: Easy
Question Type: Essay
66. Differentiate between transaction processing systems and functional area information systems. Section reference 1: Transaction Processing Systems and Functional Area Information Systems Difficulty: Medium
67. Differentiate between batch processing and online transaction processing. Section reference 1: Transaction Processing Systems Difficulty: Medium 68. Explain how information systems for accounting and finance support an organization. Section reference 1: Functional Area Information Systems Difficulty: Medium 69. Explain how information systems for production operations management support an organization. Section reference 1: Functional Area Information Systems Difficulty: Medium 70. Explain how information systems for human resource management support an organization. Section reference 1: Functional Area Information Systems Difficulty: Medium 71. Explain how information systems for marketing and sales support an organization. Section reference 1: Functional Area Information Systems Difficulty: Medium
72. Define enterprise resource planning systems and discuss why they were developed.
Section reference 1: Enterprise Resource Planning Systems Difficulty: Medium
73. Describe the various reports that can be obtained from functional area information systems. Section reference 1: Reports Difficulty: Medium 74. Contrast routine reports and drill-down reports. Section reference 1: Reports Difficulty: Easy
75. Define source data automation and describe why this process is so important to transaction processing systems. Section reference 1: Transaction Processing Systems Difficulty: Hard 76. Discuss why functional area information systems would have been built as silos. Explain the limitations of that approach. Section reference 1: Functional Area Information Systems Difficulty: Medium
77. Discuss the reasons why ERP systems evolved and what organizations hope to gain by implementing them. Section reference 1: Enterprise Resource Planning Systems Difficulty: Medium
78. Differentiate between ERP systems and ERP II systems. Section reference 1: Enterprise Resource Planning Systems Difficulty: Medium
79. What are ad-hoc (on-demand) reports? Why does an organization need to be able to run ad-hoc reports? Section reference 1: Enterprise Resource Planning Systems Difficulty: Easy
Question Type: True/False
80. Greg is mowing lawns in the neighborhood for the summer. He does not need an information system. Answer: False Section reference 1: Transaction Processing Systems Difficulty: Easy
Question Type: Multiple Choice
81. Greg is mowing lawns in the neighborhood for the summer. Which of the following is not an example of a transaction he has in his business? A. Adding a new client to his list. B. Mowing a client’s lawn C. Buying gas for his mower D. Driving to the client’s house E. Getting paid by the client Answer: D Section reference 1: Transaction Processing Systems Difficulty: Medium 82. Greg is mowing lawns in the neighborhood for the summer. Which type of report would he used to see which of his clients still owe him money? A. Ad hoc B. Summary C. Exception D. Detailed E. Key indicator Answer: C Section reference 1: reports Difficulty: Easy 83. Greg is mowing lawns in the neighborhood for the summer. Which type of report would he used to see which if a particular client still owe him money? A. Ad hoc B. Routine C. Exception D. Detailed E. Key indicator Answer: A Section reference 1: reports Difficulty: Easy Question Type: Essay
84. Greg is mowing lawns in the neighborhood for the summer. How could he use source data automation to make data entry easier? Section reference 1: Transaction Processing Systems Difficulty: Medium Question Type: Multiple Choice
85. Kathy has taken a job with her ideal company and is excited to start in their sales department. During orientation, she is told that the company is very proud of their ERP system from SAP. Looking at the list of modules the company has, Kathy wonders which one she won’t be using. From the list below, which one would you tell Kathy is the one she won’t be using. A. Customer relationship management B. Human resource management C. Business intelligence D. Operations management E. E-Business Answer: D Section reference 1: reports Difficulty: Easy
Testbank Questions Rainer Intro 5e Chapter 11 Customer Relationship Management and Supply Chain Management
Question Type: True/False
1. Over time, the customer relationship with vendors has become more personal. Answer: False Section Reference 1: Defining Customer Relationship Management Difficulty: Easy Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM. 2. Today, customers are becoming increasingly powerful. Answer: True Section Reference 1: Defining Customer Relationship Management Difficulty: Easy Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM.
3. The real problem with interacting with customers over the Web is that the company does not have an opportunity to make a good first impression in person. Answer: True Section Reference 1: Defining Customer Relationship Management Difficulty: Easy Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM.
4. CRM systems focus on marketing to masses of people. Answer: False Section Reference 1: Defining Customer Relationship Management Difficulty: Easy Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM.
5. CRM means that a company should interact with its customers as a group. Answer: False Section Reference 1: Defining Customer Relationship Management Difficulty: Easy Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM.
6. Properly designed CRM systems provide a single, enterprise wide view of each customer. Answer: True Section Reference 1: Defining Customer Relationship Management Difficulty: Easy Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM.
7. In the past, customer data has been located all over the company, typically in the functional areas. Answer: True Section Reference 1: Defining Customer Relationship Management Difficulty: Easy Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM.
8. Tweets can be used as customer touch points. Answer: True Section Reference 1: Defining Customer Relationship Management Difficulty: Easy Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM.
9. Transactional CRM systems provide interactive communication with the customer throughout the organization. Answer: False Section Reference 1: Defining Customer Relationship Management Difficulty: Easy Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM.
10. For purposes of efficiency, customer data are best stored in the functional areas of the organization. Answer: False Section Reference 1: Defining Customer Relationship Management Difficulty: Easy Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM.
11. Collaborative CRM systems provide interaction with customers throughout the entire organization. Answer: True
Section Reference 1: Defining Customer Relationship Management Difficulty: Easy Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM.
12. Operational CRM systems support the front-office business processes which directly interact with customers. Answer: True Section Reference 1: Operational CRM Difficulty: Easy Learning Objective 1: LO 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems. 13. Sales force automation is a customer-facing application. Answer: True Section Reference 1: Operational CRM Difficulty: Easy Learning Objective 1: LO 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems. 14. If you have visited Amazon’s Web site previously and then return, Amazon recommends other books that you might like. This is called cross-selling. Answer: True Section Reference 1: Operational CRM Difficulty: Easy Learning Objective 1: LO 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems.
15. Mobile CRM systems are targeting customers through their laptops. Answer: True Section Reference 1: Other Types of CRM Systems Difficulty: Easy Learning Objective 1: LO 11.4 Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, and open source CRM systems. 16. Open-source CRM software doesn’t have as many features or functions as other DRM software. Answer: False Section Reference 1: Other Types of CRM Systems Difficulty: Easy Learning Objective 1 LO 11.4 Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, and open source CRM systems.
17. Modern organizations are concentrating on their core competencies and on becoming more flexible and agile. Answer: True Section Reference 1: Supply Chains Difficulty : Easy Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain. 18. Supply chain visibility is the time between the receipt of incoming goods and the dispatch of finished, outbound products. Answer: False Section Reference 1: Supply Chains Difficulty : Easy Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain.
19. Sourcing from external suppliers occurs in the upstream portion of the supply chain. Answer: True Section Reference 1: Supply Chains Difficulty : Easy Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain.
20. Packaging and assembly take place in the downstream portion of the supply chain. Answer: False Section Reference 1: Supply Chains Difficulty : Easy Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain.
21. There are typically four flows in the supply chain: materials, information, returns, and financial. Answer: False Section Reference 1: Supply Chains Difficulty : Easy Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain.
22. The goal of SCM systems is to reduce friction along the supply chain. Answer: True Section Reference 1: Supply Chain Management Difficulty : Easy Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain. 23. The pull model is make-to-stock.
Answer: False Section Reference 1: Supply Chain Management Difficulty : Easy Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
24. The push model begins with a forecast. Answer: True Section Reference 1: Supply Chain Management Difficulty : Easy Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
25. Whether forecasters overestimate or underestimate demand, the company still faces problems. Answer: True Section Reference 1: Supply Chain Management Difficulty : Easy Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
26. A major source of supply chain uncertainty is the supply forecast. Answer: False Section Reference 1: Supply Chain Management Difficulty : Easy Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
27. The most common solution to supply chain problems is building inventories. Answer: True Section Reference 1: Supply Chain Management Difficulty: Easy Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
28. Horizontal integration is a business strategy in which a company buys its suppliers. Answer: False Section Reference 1: Supply Chain Management Difficulty: Easy Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
29. Just-in-time inventory systems try to maximize inventories to protect against uncertainties along the supply chain. Answer: False Section Reference 1: Supply Chain Management Difficulty: Easy Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
30. Internet protocol data interchange is a communication standard that enables business partners to electronically exchange routine documents. Answer: False Section Reference 1: Information Technology Support for Supply Chain Management Difficulty : Easy Learning Objective 1: LO 11.7 Explain the utility of each of the three major technologies that supports supply chain management. 31. Electronic data interchange is a problem for small businesses. Answer: True Section Reference 1: Information Technology Support for Supply Chain Management Difficulty: Easy Learning Objective 1: LO 11.7 Explain the utility of each of the three major technologies that supports supply chain management.
32. The Internet-based extranet is much less costly than proprietary networks. Answer: True Section Reference 1: Information Technology Support for Supply Chain Management Difficulty: Easy Learning Objective 1: LO 11.7 Explain the utility of each of the three major technologies that supports supply chain management. 33. In companies that have many separate divisions, it is most efficient for each division to maintain its own information system. Answer: False Section Reference 1: IT About Business 11.1 Difficulty: Easy Learning Objective 1: LO 11.0 Provide real-world applications for customer relationship management and supply chain management. 34. Customers can only make payments using their bank or credit card apps on smart phones Answer: False Section Reference 1: IT About Business 11.3 Difficulty: Easy
Learning Objective 1: LO 11.0 Provide real-world applications for customer relationship management and supply chain management. 35. Nutricia’s CRM system is an example of a customer facing application. Answer: True Section Reference 1: IT About Business 11.4 Difficulty: Easy Learning Objective 1: LO 11.0 Provide real-world applications for customer relationship management and supply chain management. Multiple Choice
36. Over time, the customer relationship with vendors has become more impersonal for all of the following reasons except: A. people move from farms to cities B. consumers became mobile C. supermarkets and department stores proliferated D. customer relationship management systems were developed E. the Internet grew rapidly Answer: D Section Reference 1: Material following chapter opening case Difficulty: Hard Learning Objective 1: LO 11.0 Provide real-world applications for customer relationship management and supply chain management.
37. Which of the following best describes CRM? A. a process B. a set of technologies C. an information system D. a way of thinking and acting E. a set of decisions Answer: D Section Reference 1: Defining Customer Relationship Management Difficulty: Medium Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM.
38. Which of the following is an important enabler of CRM? A. recognizing that there are many customer touch points B. recognizing the necessity of treating all customers the same C. recognizing the need for sophisticated CRM information systems D. recognizing the need for sophisticated customer databases E. recognizing the need for a data warehouse Answer: A Section Reference 1: Defining Customer Relationship Management
Difficulty: Medium Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM.
39. Which of the following is not a customer touch point? A. telephone contact B. e-mail C. Web sites D. customer visits to a store E. none of the above – all are touch points Answer: E Section Reference 1: Defining Customer Relationship Management Difficulty: Medium Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM.
40. The complete data on a customer is called: A. a profile B. a record C. a 360-degree view D. a file E. a consolidated customer map Answer: C Section Reference 1: Defining Customer Relationship Management Difficulty: Easy Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM.
41. Which of the following is the most important enabler of the 360-degree view of the customer across an organization? A. the organization’s database B. the organization’s data warehouse C. the organization’s CRM systems D. the organization’s collaborative CRM systems E. the organization’s analytical CRM systems Answer: B Section Reference 1: Defining Customer Relationship Management Difficulty: Hard Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM.
42. Which of the following statements is false? A. Data consolidation and 360-degree view mean the same thing. B. Data about customers in various functional areas was difficult to share.
C. Collaborative CRM systems enable customers to provide direct feedback to the organization D. CRM systems use a data warehouse to make all customer data available to every unit of the business. E. Organizations can use blogs for customer input about their products and services. Answer: A Section Reference 1: Defining Customer Relationship Management Difficulty: Easy Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM.
43. _____ systems support the front-office business processes which directly interact with customers. A. CRM B. Collaborative CRM C. Operational CRM D. Analytical CRM E. Transactional CRM Answer: C Section Reference 1: Operational CRM Difficulty: Hard Learning Objective 1: LO 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems.
44. _____ includes those areas where customers directly interact with the company. A. CRM B. Analytical CRM C. Customer-facing CRM D. Customer-touching CRM E. Transactional CRM Answer: C Section Reference 1: Operational CRM Difficulty: Easy Learning Objective 1: LO 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems. 45. Which of the follow statements is false about customer interaction centers (CIC)? A. A call center is an example of a CIC. B. A Help Desk is an example of a CIC. C. In outboard telesales the sales person contacts the customer. D. In inboard telesales the customer calls the CIC. E. Live chat provides an advantage over telephone conversations. Answer: D Section Reference 1: Operational CRM Difficulty: Medium Learning Objective 1: LO 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems.
46. The sales, marketing, and service functions are part of: A. CRM B. analytical CRM C. operational CRM D. collaborative CRM E. transactional CRM Answer: C Section Reference 1: Operational CRM Difficulty: Easy Learning Objective 1: LO 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems.
47. In _____, company representatives use multiple communication channels to support the communications preferences of customers. A. telesales rooms B. group decision support rooms C. videoconferencing centers D. sales team meetings E. customer interaction centers Answer: E Section Reference 1: Operational CRM Difficulty: Easy Learning Objective 1: LO 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems.
48. _____ is the component of an operational CRM system that automatically records all the aspects in a sales transaction process. A. Inbound telesales B. Outbound telesales C. Sales team efforts D. Sales force automation E. The customer help desk Answer: D Section Reference 1: Operational CRM Difficulty: Easy Learning Objective 1: LO 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems.
49. _____ is the practice of marketing additional related products to customers based on a previous purchase. A. Bundling B. Up-selling C. Re-selling
D. Additional selling E. Cross-selling Answer: E Section Reference 1: Operational CRM Difficulty: Easy Learning Objective 1: LO 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems.
50. AT&T sells telephone services that include local and long-distance service, voice mail service, caller ID, and digital subscriber line access to the Internet. This is a form of: A. up-selling B. cross-selling C. bundling D. customer relationship management E. customer intimacy Answer: C Section Reference 1: Operational CRM Difficulty: Medium Learning Objective 1: LO 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems.
51. You are in the market for a small economy car. The salesperson has you drive the economy car, and then hands you the keys to a mid-size car of the same brand for you to drive. The salesperson is engaged in: A. up-selling B. cross-selling C. bundling D. customer relationship management E. customer intimacy Answer: A Section Reference 1: Operational CRM Difficulty: Medium Learning Objective 1: LO 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems.
52. _____ is a sales strategy where the business person will provide to customers the opportunity to purchase higher-value related products. A. Bundling B. Up-selling C. Re-selling D. Additional selling E. Cross-selling Answer: B Section Reference 1: Operational CRM
Difficulty: Easy Learning Objective 1: LO 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems.
53. _____ is a form of _____. A. Up-selling, re-selling B. Bundling, cross-selling C. Up-selling, bundling D. Cross-selling, re-selling E. Re-selling, additional selling Answer: B Section Reference 1: Operational CRM Difficulty: Medium Learning Objective 1: LO 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems.
54. A check-in kiosk at the airport would be what type of CRM application? A. Inbound telesales B. Customer touching C. Outbound telesales D. Sales E. Customer facing Answer: B Section Reference 1: Operational CRM Difficulty: Medium Learning Objective 1: LO 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems.
55. _____ are simple tools for answering repetitive customer questions. A. Personalized Web pages B. Customized products and services C. Frequently asked questions D. E-mail systems E. Automated response systems Answer: C Section Reference 1: Operational CRM Difficulty: Easy Learning Objective 1: LO 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems.
56. Which of the following statements about loyalty programs is false? A. Loyalty programs work when there is a high frequency of repeat purchases. B. Loyalty programs work when there is not personal customization. C. The purpose of loyalty programs is to influence future behavior.
D. The purpose of loyalty programs is to reward past behavior E. Loyalty programs are a customer-touching application. Answer: D Section Reference 1: Operational CRM Difficulty: Medium Learning Objective 1: LO 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems.
57. _____ systems study customer behavior and perceptions to provide business intelligence. A. CRM B. Collaborative CRM C. Operational CRM D. Analytical CRM E. Transactional CRM Answer: D Section Reference 1: Analytical CRM Difficulty: Easy Learning Objective 1: LO 11.3 List the benefits of analytical CRM systems to businesses.
58. _____ creates statistical models of customer behavior and the value of customer relationships over time. A. CRM B. Analytical CRM C. Operational CRM D. Collaborative CRM E. Transactional CRM Answer: B Section Reference 1: Analytical CRM Difficulty: Easy Learning Objective 1: LO 11.3 List the benefits of analytical CRM systems to businesses. 59. _____ is a CRM system that is hosted by an external vendor in the vendor’s data center. A. Mobile CRM B. Analytical CRM C. Operational CRM D. On-demand CRM E. Customer-facing CRM Answer: D Section Reference 1: Other Types of CRM Difficulty: Easy Learning Objective 1: LO 11.4 Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, and open source CRM systems.
60. Potential problems with on-demand CRM include all of the following except: A. increases costs for the organization B. vendor could prove unreliable C. difficult to modify hosted software D. may be difficult to integrate hosted software with existing software in the organization E. giving strategic data to a vendor is risky Answer: A Section Reference 1: Other Types of CRM Difficulty: Medium Learning Objective 1: LO 11.4 Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, and open source CRM systems.
61. The benefits of open-source CRM include all of the following except: A. it is easy to customize B. it is favorably priced C. it has more functionality than in-house CRM systems D. updates and error fixes occur rapidly E. it has extensive support information available Answer: C Section Reference 1: Other Types of CRM Difficulty: Medium Learning Objective 1: LO 11.4 Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, and open source CRM systems. 62. Trends that have led to the supply chain concept include all of the following except: A. modern organizations are focusing on their core competencies B. modern organizations are concentrating on becoming more agile and flexible C. modern organizations are buying their suppliers in order to have more transparency along the supply chain D. modern organizations are relying on other companies to supply necessary goods and services E. modern organizations are relying on an increasing number of suppliers Answer: C Section Reference 1: Supply Chains Difficulty: Hard Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain.
63. _____ is the ability for all organizations in a supply chain to access or view relevant data on purchased materials as these materials move through their suppliers’ production processes and transportation networks to their receiving docks. A. Supply chain visibility B. Horizontal integration C. Vertical integration D. Supply chain intelligence E. Supply chain integration Answer: A
Section Reference 1: Supply Chains Difficulty: Medium Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain.
64. _____ is the time between the receipt of incoming goods and the dispatch of finished, outbound products. A. Inventory turnover B. Inventory velocity C. Inventory speed D. Inventory time E. Inventory production Answer: B Section Reference 1: Supply Chains Difficulty: Easy Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain.
65. A(n) _____ refers to the flow of materials, information, money, and services from raw material suppliers, through factories and warehouses to the end customers. A. demand chain B. business process C. manufacturing process D. supply chain E. enterprise resource process Answer: D Section Reference 1: Supply Chains Difficulty: Easy Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain. 66. A company’s suppliers, suppliers’ suppliers, and the processes for managing them is the: A. suppliers’ chain B. external supply chain C. upstream portion of the supply chain D. downstream portion of the supply chain E. entire supply chain Answer: C Section Reference 1: Supply Chains Difficulty: Easy Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain.
67. Packaging, assembly, or manufacturing take place in which segment of the supply chain? A. upstream B. internal C. downstream D. external
E. none of the above Answer: B Section Reference 1: Supply Chains Difficulty: Easy Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain. 68. A company’s organization and processes for distributing and delivering products to its final customers is the: A. suppliers’ chain B. external supply chain C. upstream portion of the supply chain D. downstream portion of the supply chain E. entire supply chain Answer: D Section Reference 1: Supply Chains Difficulty: Easy Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain.
69. Distribution or dispersal takes place in which segment of the supply chain? A. upstream B. internal C. downstream D. external E. none of the above Answer: C Section Reference 1: Supply Chains Difficulty: Easy Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain.
70. _____ are the physical products, raw materials, and supplies that flow along a supply chain. A. Reverse flows B. Reverse logistics C. Material flows D. Information flows E. Financial flows Answer: C Section Reference 1: Supply Chains Difficulty: Easy Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain.
71. Returned products, recycled products, and disposal of materials or products are called: A. reverse flows B. returns
C. material flows D. information flows E. financial flows Answer: A Section Reference 1: Supply Chains Difficulty: Easy Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain.
72. _____ involve money transfers, payments, credit card information and authorization, payment schedules, e-payments, and credit-related data. A. Reverse flows B. Reverse logistics C. Material flows D. Information flows E. Financial flows Answer: E Section Reference 1: Supply Chains Difficulty: Easy Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain.
73. Which of the following is not a goal of supply chain management? A. to reduce uncertainty along the supply chain B. to decrease inventory levels C. to increase cycle time D. to improve customer service E. to improve business processes Answer: C Section Reference 1: Supply Chain Management Difficulty: Medium Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
74. Interorganizational information systems result in all of the following except: A. reduced costs of routine business transactions B. improved quality of information flow C. reduced errors D. increased cycle time E. eliminated paper processing Answer: D Section Reference 1: Supply Chain Management Difficulty: Easy Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
75. In the _____, the production process begins with a forecast. A. supply chain model B. inventory model C. pull model D. vertical integration model E. push model Answer: E Section Reference 1: Supply Chain Management Difficulty: Easy Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
76. In the _____, the production process begins with a customer order. A. supply chain model B. inventory model C. pull model D. vertical integration model E. push model Answer: C Section Reference 1: Supply Chain Management Difficulty: Easy Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
77. Which of the following is not a problem along the supply chain? A. poor customer service B. high inventory costs C. loss of revenues D. decreased cycle times E. extra cost of expediting shipments Answer: D Section Reference 1: Supply Chain Management Difficulty: Medium Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
78. The _____ is erratic shifts in orders up and down the supply chain. A. demand forecast effect B. supply forecast effect C. bullwhip effect D. inventory effect E. customer coordination effect Answer: C
Section Reference 1: Supply Chain Management Difficulty: Easy Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
79. The bullwhip effect comes from which of the following? A. poor demand forecast B. price fluctuations C. order batching D. rationing within the supply chain E. all of the above Answer: E Section Reference 1: Supply Chain Management Difficulty: Medium Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
80. Which of the following is not responsible for the bullwhip effect? A. poor demand forecast B. price fluctuations C. order batching D. rationing within the supply chain E. poor supply forecast Answer: E Section Reference 1: Supply Chain Management Difficulty: Medium Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
81. Which of the following is not a possible solution to supply chain problems? A. vertical integration B. building inventories C. information sharing D. horizontal integration E. the bullwhip effect Answer: D Section Reference 1: Supply Chain Management Difficulty: Medium Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
82. When Wal-Mart sells a package of diapers, the company captures data on that sale at its point-ofsale terminal and transmits that data to the company that makes the diapers. When it is necessary, the diaper company restocks the diapers in that Wal-Mart store. This process is called:
A. supply chain management B. demand chain management C. vendor-managed inventory D. enterprise resource planning inventory E. just-in-time inventory Answer: C Section Reference 1: Supply Chain Management Difficulty: Medium Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
83. Which of the following is not a benefit of EDI? A. data entry errors are minimized B. length of messages is longer C. messages are secured D. fosters collaborative relationships E. reduced cycle time Answer: B Section Reference 1: Information Technology Support for Supply Chain Management Difficulty: Medium Learning Objective 1: LO 11.7 Explain the utility of each of the three major technologies that supports supply chain management. 84. Which of the following is not a limitation of EDI? A. it is inflexible B. business processes may have to be restructured C. it is expensive, but ongoing operating costs are low D. multiple EDI standards exist E. it is difficult to make quick changes Answer: C Section Reference 1: Information Technology Support for Supply Chain Management Difficulty: Medium Learning Objective 1: LO 11.7 Explain the utility of each of the three major technologies that supports supply chain management.
85. The primary goal of extranets is to do which of the following? A. foster collaboration between and among business partners B. to provide security for corporate intranets C. to provide effective communications inside corporate intranets D. to enable corporate employees to view inventory information for their companies E. to enable business partners to better plan mergers and acquisitions Answer: A Section Reference 1: Information Technology Support for Supply Chain Management Difficulty: Medium
Learning Objective 1: LO 11.7 Explain the utility of each of the three major technologies that supports supply chain management.
86. Extranets use _____ technology to make communication over the Internet more secure. A. telepresence B. anti-malware C. virtual private network D. voice-over IP E. videoconferencing Answer: C Section Reference 1: Information Technology Support for Supply Chain Management Difficulty: Easy Learning Objective 1: LO 11.7 Explain the utility of each of the three major technologies that supports supply chain management.
87. The FedEx extranet that allows customers to track the status of a package is an example of which type of extranet? A. a company and its dealers, customers, and/or suppliers B. an industry’s extranet C. joint venture D. B2B exchange E. B2C exchange Answer: A Section Reference 1: Information Technology Support for Supply Chain Management Difficulty: Medium Learning Objective 1: LO 11.7 Explain the utility of each of the three major technologies that supports supply chain management.
88. _____ portals automate the business processes involved in purchasing products between a single buyer and multiple suppliers. A. Distribution B. Corporate C. Affiliate D. Intranet E. Procurement Answer: E Section Reference 1: Information Technology Support for Supply Chain Management Difficulty: Easy Learning Objective 1: LO 11.7 Explain the utility of each of the three major technologies that supports supply chain management. 89. Refer to Opening Case – Customer Relationship Management in the Internet Age: Which of the following is false?
A. Millions of people review products, services and companies on the Internet, so one bad review doesn’t have a big impact B. Tweets containing certain words or brand names can be easily tracked down to the user C. Once a comment or review is made it online, it go viral and be easily seen by millions of people D. Social media like facebook, youtube and twitter can affect a company’s reputation both positively and negatively E. All Statements are true Answer. A Section Reference 1: Opening Case Difficulty: Easy Learning Objective 1: LO 11.0 Provide real-world applications for customer relationship management and supply chain management. 90. Refer to Opening Case: Which of the following is true? A. Organizations can ignore social media. B. Organizations only need to be followed on Twitter to be effective. C. An organization has to act on posts about itself on Twitter and Facebook. D. Tweeter is the only way to monitor customer experiences E. Organizations can put up a Facebook fan page and customers will flock to it. Answer. C Section Reference 1: Opening Case Difficulty: Medium Learning Objective 1: LO 11.0 Provide real-world applications for customer relationship management and supply chain management. 91. Refer to IT’s About Business 11.2: Which of the following is true about the CRM system described in the case: A. It reduces the time customers spend on the phone B. It cuts labor related costs C. It helps predict frequent customer needs D. It increases the security of the hotel E. It reduces customer fallout. Answer. C Section Reference 1: IT’s About Business 11.2 Difficulty: Easy Learning Objective 1: LO 11.0 Provide real-world applications for customer relationship management and supply chain management. 92. Refer to IT’s About Business 11.5 – Campus Quilts Partners with UPS to Manage Its Supply Chain: Which of the following statements is true? A. Small businesses can learn how to manage the logistics from UPS B. UPS is a customer facing CRM system C. UPS is a customer touching CRM system D. UPS can outsource logistics to more proficient companies E. UPS handles the logistics for small companies without the resources and expertise Answer: E Section Reference 1: IT’s About Business 11.5
Difficulty: Medium Learning Objective 1: LO 11.0 Provide real-world applications for customer relationship management and supply chain management.
93. Refer to IT’s About Business 11.6: By creating manufacturing super centers, 3M was able to make its supply chain more efficient and achieve the following benefits: A. Reduce currency risk B. Reduce shipping costs C. Easier product customization D. Reduced cycle time E. All of the above Answer. C Section Reference 1: IT’s About Business 11.6 Difficulty: Easy Learning Objective 1: LO 11.0 Provide real-world applications for customer relationship management and supply chain management. 94. Refer to IT’s About Business 11.7: Airbus is able to track all the items in its supply chain using A. GPS B. Infra-red scanners C. Weight sensors D. RFID E. All of the above Answer. D Section Reference 1: IT’s About Business 11.7 Difficulty: Easy Learning Objective 1: LO 11.0 Provide real-world applications for customer relationship management and supply chain management. 95. Refer to Closing Case – Cengage Uses Information Technology to Improve Warehouse Operations: The updated warehouse management system has created the following benefits? A. Increased worker productivity B. Lower training time C. Fewer errors D. Faster cycle time E. All of the above Answer: E Section Reference 1: Closing Case Difficulty: Medium Learning Objective 1: LO 11.0 Provide real-world applications for customer relationship management and supply chain management. Short Answer
96. Describe the various customer touch points in any organization. Which ones are more effective for you as college students? Section Reference 1: Defining Customer Relationship Management Difficulty: Medium Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM.
97. Describe the various customer-facing applications in an organization. Section Reference 1: Operational CRM Difficulty: Medium Learning Objective 1: 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems.
98. Describe the elements within sales force automation. Section Reference 1: Operational CRM Difficulty: Medium Learning Objective 1: 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems. 99. Contrast operational CRM systems and analytical CRM systems. Section Reference 1: Operational CRM, Analytical CRM Difficulty: Medium Learning Objective 1: 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems. Learning Objective 2: LO 11.3 List the benefits of analytical CRM systems to businesses. 100. What are the problems associated with on-demand CRM? Section Reference 1: Other Types of CRM Difficulty: Medium Learning Objective 1: LO 11.4 Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, and open source CRM systems. 101. Describe the reasons that so many companies think mobile CRM is the CRM system of the future. Section Reference 1: Other Types of CRM Difficulty: Medium Learning Objective 1: LO 11.4 Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, and open source CRM systems.
102. Discuss the benefits of voice directed picking systems. Section Reference 1: Closing case #1 Difficulty: Medium
Learning Objective 1: LO 11.0 Provide real-world applications for customer relationship management and supply chain management.
103. Describe supply chain visibility and explain why it is important to an organization. Section Reference 1: Supply Chains Difficulty: Medium Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain.
104. Describe inventory velocity and explain why it is important to an organization. Section Reference 1: Supply Chains Difficulty: Medium Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain.
105. Describe the three flows along a supply chain. Section Reference 1: Supply Chains Difficulty: Medium Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain. 106. Explain what “upstream” and “downstream” are within a supply chain. Section Reference 1: Supply Chains Difficulty: Medium Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain. 107. Differentiate between the pull model and the push model. Section Reference 1: Supply Chain Management Difficulty: Medium Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
108. Describe the various methods that companies use to solve problems along their supply chains. Section Reference 1: Supply Chain Management Difficulty: Medium Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains. 109. What is the bullwhip effect? Section Reference 1: Supply Chain Management Difficulty: Medium
Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
110. Explain and contrast just-in-time inventory and vendor-managed inventory. Section Reference 1: Supply Chain Management Difficulty: Medium Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
Essay Questions 111. Describe why the customer – vendor relationship has become more impersonal. Section Reference 1: Defining Customer Relationship Management Difficulty: Hard Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM. 112. Explain why the concept of a customer relationship management system became necessary. Section Reference 1: Defining Customer Relationship Management Difficulty: Medium Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM. 113. What is the rationale behind customer-touching applications? Explain four such applications. Section Reference 1: Operational CRM Difficulty: Hard Learning Objective 1: LO 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems. 114. Discuss the benefits and limitations of on-demand CRM systems. Section Reference 1: Other Types of CRM Difficulty: Medium Learning Objective 1: LO 11.4 Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, and open source CRM systems.
115 What are the benefits of open-source CRM? Section Reference 1: Other Types of CRM Difficulty: Medium Learning Objective 1: LO 11.4 Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, and open source CRM systems.
116. Describe the supply chain of your university. Be sure to include all three segments. Section Reference 1: Supply Chain Management Difficulty: Medium Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
117. Describe vertical integration. How does this concept relate to supply chain management? Section Reference 1: Supply Chain Management Difficulty: Hard Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
118. Define EDI and how it works. Section Reference 1: Information Technology Support for Supply Chain Management Difficulty: Medium Learning Objective 1: LO 11.7 Explain the utility of each of the three major technologies that supports supply chain management.
119. Describe the three main types of extranets. Section Reference 1: Information Technology Support for Supply Chain Management Difficulty: Medium Learning Objective 1: LO 11.7 Explain the utility of each of the three major technologies that supports supply chain management.
True or False 120. Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Haya needs to decide on her CRM strategy before she can decide on her CRM systems. Answer: True Section Reference 1: Defining customer relationship management Difficulty: Easy Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM.
Multiple Choice 121. Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Which of the following customer touch points will give Haya the most information after her first weekend of selling? A. Communication she sends via smart phones. B. She should build a web site before she begins to sell on campus. C. She should send an Email to all students on campus. D. She should put a flyer in every mail box on campus. E. Actual physical interactions when customers visit her store Answer: E Section Reference 1: Defining customer Relationship Management Difficulty: Easy Learning Objective 1: LO 11.1 Identify the primary functions of both customer relationship management (CRM) and collaborative CRM.
122. Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Which of the following should Haya consider during her first month of operation? A. A sales force automation system B. A customer interaction center C. Bundling D. Campaign management E. Purchasing profiles Answer: C Section Reference 1: Operational Customer Relationship Management Systems Difficulty: Hard Learning Objective 1: LO 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems.
123. Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Which of the following should Haya focus on during her first month of operation? A. Search/comparison capabilities on a web site
B. Personalized experiences to make a purchase on a web site C. Customization of ties D. FAQs E. A loyalty program Answer: E Section Reference 1: Operational Customer Relationship Management Systems Difficulty: Medium Learning Objective 1: LO 11.2 Describe how businesses might utilize applications of each of the two major components of operational CRM systems.
124. Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Haya begins collecting data about her customers by having them sign up for Promotional Emails at her store. She collects their names and Email address on her form. How might she use the customer data? A. Target marketing campaigns B. Cross-sell C. Gain insights into her products D. Perform customer profitability analysis E. Marketing Answer: E Section Reference 1: Analytical Customer Relationship Management Systems Difficulty: Hard Learning Objective 1: LO 11.3 List the benefits of analytical CRM systems to businesses. 125. Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Haya begins to notice that her sports ties are selling really well. Which of the following should be her next step? A. Target marketing campaigns B. Cross-sell C. Insights into her products D. Customer profitability analysis E. Marketing Answer: A Section Reference 1: Analytical Customer Relationship Management Systems Difficulty: Medium Learning Objective 1: LO 11.3 List the benefits of analytical CRM systems to businesses.
True or False 126. Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. The supplier of Haya’s ties is downstream in her supply chain. Answer: False Section Reference 1: Supply Chains Difficulty: Meidum Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain. Multiple Choice 127. Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Which of the following is true about Haya’s supply chain? A. Haya’s supplier is downstream in her supply chain. B. Haya’s customers are upstream in her supply chain. C. If a customer returns a tie, that is known as reverse logistics. D. Haya has no information flows. E. Haya’s supplier is the only other link in her supply chain. Answer: C Section Reference 1: Supply Chains Difficulty: Hard Learning Objective 1: LO 11.5 Describe the three components and the three flows of a supply chain.
128. Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Haya orders 40 ties in each of the school colors and 10 in each of four sports. Which of the following is true about Haya’s supply chain? A. Haya is using a push model. B. Haya is using a pull model. C. Haya is experiencing the bull whip effect. D. Haya has an accurate demand forecast. E. None of the above are true. Answer: A
Section Reference 1: Supply Chain Management Difficulty: Hard Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
129. Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Haya orders 40 ties in each of the school colors and 10 in each of four sports. Which of the following is true about Haya’s supply chain? A. Haya is using a just-in-time inventory system. B. Haya is using a vendor-managed inventory. C. Haya is building inventories. D. Haya has vertical integration with her upstream supplier. E. Haya is using a pull model. Answer: C Section Reference 1: Supply Chain Management Difficulty: Hard Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
130. Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Haya knows she needs to manage her relationship with her supplier. Which of the following is true? A. Haya should invest in EDI software. B. Haya can use the supplier’s intranet to order. C. Haya should give the supplier access to her VPN. D. Haya can use the supplier’s procurement portal to order. E. Haya can use the supplier’s extranet to check on her order. Answer: E Section Reference 1: Supply Chain Management Difficulty: Hard Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains. 131. Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union.
Haya orders 40 ties in each of the school colors and 10 in each of four sports. She almost instantly sold out of all the sport themed ties. She decides to approach each of the sports teams on campus to see if they would be willing to buy ties “in bulk”. Which of the following is true about Haya’s supply chain? A. Haya is using a push model. B. Haya is using a pull model. C. Haya is experiencing the bull whip effect. D. Haya has an accurate demand forecast. E. None of the above are true. Answer: B Section Reference 1: Supply Chain Management Difficulty: Hard Learning Objective 1: LO 11.6 Identify popular strategies to solving different challenges of supply chains.
Package Title: Testbank Questions Course Title: IS 5e Chapter Number: 12
Question Type: True/False 1. A manager’s primary function is strategic planning. Answer: False Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making. 2. The ratio between organizational inputs and outputs is an indication of the organization’s productivity. Answer: True Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
3. Modern information systems support all three managerial roles. Answer: True Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
4. In the choice phase of the decision-making process, managers construct a model that simplifies the problem. Answer: False Section reference 1: Managers and Decision-making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
5. In the implementation phase of the decision-making process, managers set criteria for the evaluation of alternative potential solutions. Answer: False Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
6. The number of alternatives to be considered in decisions today is increasing. Answer: True
Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
7. Structured decisions address routine, repetitive problems for which standard solutions exist. Answer: True Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
8. Human intuition often plays a role in making unstructured decisions. Answer: True Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
9. Unstructured decisions require a combination of standard solution procedures and individual judgment. Answer: False Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
10. Management control is the acquisition and efficient use of resources in accomplishing organizational tasks. Answer: True Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
11. Targeted marketing is a good example of the discovery of previously unknown or hidden patterns. Answer: False Section reference 1: Business Intelligence Applications for Data Analysis Difficulty: Easy Learning Objective 1: LO 12.3 Explain the value that different BI applications provide to large and small businesses.
12. Decision-support systems support only lower- and middle-level managers. Answer: False Section reference 1: Business Intelligence Applications for Data Analysis Difficulty: Easy
Learning Objective 1: LO 12.3 Explain the value that different BI applications provide to large and small businesses.
13. Goal-seeking analysis attempts to find the value of the inputs necessary to achieve a desired level of output. Answer: True Section reference 1: Business Intelligence Applications for Data Analysis Difficulty: Easy Learning Objective 1: LO 12.3 Explain the value that different BI applications provide to large and small businesses. 14. A group decision support system is an interactive, computer-based system that facilitates a group’s efforts to find solutions to semistructured and unstructured problems. Answer: True Section reference 1: Business Intelligence Applications for Data Analysis Difficulty: Easy Learning Objective 1: LO 12.3 Explain the value that different BI applications provide to large and small businesses.
15. An executive dashboard is very user friendly, supported by graphics, provides exception reporting and drill down, and provides information related to critical success factors. Answer: True Section reference 1: Business Intelligence Applications for Presenting Results Difficulty: Easy Learning Objective 1: LO 12.4 Offer examples of how business and government agencies can sue different BI applications to analyze data. 16. Executive dashboards provide support primarily to analytical, quantitative types of decisions. Answer: False Section reference 1: Business Intelligence Applications for Presenting Results Difficulty: Easy Learning Objective 1: LO 12.4 Offer examples of how business and government agencies can sue different BI applications to analyze data. 17. KPI stands for key process information. Answer. False Section reference 1: Business Intelligence in Action: Corporate Performance Management Difficulty: Easy Learning Objective 1: LO 12.5 Explain how your university could use CPM to effect solution to two campus problems. 18. Corporate performance management (CPM) is involved with monitoring and managing an organization’s performance according to its budget. Answer. False Section reference 1: Business Intelligence in Action: Corporate Performance Management
Difficulty: Easy Learning Objective 1: LO 12.5 Explain how your university could use CPM to effect solution to two campus problems.
Question Type: Multiple Choice
19. _____ is the process by which organizational goals are achieved through the use of organizational resources. A. Organizational decision making B. Operations C. Organizational strategy D. Organizational productivity E. Management Answer: E Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making. 20. Which of the following is not a basic role of managers? A. interpersonal B. entrepreneurial C. informational D. decisional Answer: B Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
21. Being a figurehead and leader is part of the _____ managerial role. A. interpersonal B. entrepreneurial C. informational D. decisional E. confrontational Answer: A Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
22. Being an entrepreneur, disturbance handler, and negotiator is part of the _____ managerial role. A. interpersonal B. entrepreneurial C. informational D. decisional E. confrontational
Answer: D Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
23. In the _____ phase of the decision-making process, managers examine a situation and identify and define the problem. A. implementation B. choice C. design D. intelligence E. consideration Answer: D Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
24. In the _____ phase of the decision-making process, managers construct a model that simplifies the problem. A. implementation B. choice C. design D. intelligence E. consideration Answer: C Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
25. Success in the _____ phase of the decision-making process results in resolving the original problem, and failure leads to a return to previous phases. A. implementation B. choice C. design D. intelligence E. consideration Answer: A Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making. 26. In the _____ phase of the decision-making process, managers test potential solutions “on paper.” A. implementation B. choice C. design D. intelligence E. consideration
Answer: B Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
27. Which of the following is not a reason why managers need IT support? A. The number of alternatives is decreasing. B. Decisions must typically be made under time pressure. C. Decisions are becoming more complex. D. There is a growing need to access remote information sources. E. Decision makers are often based in different locations. Answer: A Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
28. Decisions today are becoming _____ complex, due to _____ uncertainty in the decision environment. A. less, decreased B. more, decreased C. less, increased D. more, increased E. neither more nor less, decreased Answer: D Section reference 1: Managers and Decision Making Difficulty: Medium Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
29. Which of the following is not a characteristic of a structured decision? A. It is routine. B. It is repetitive. C. Human intuition is not involved. D. The first three phases of the decision-making process need not occur in any particular sequence E. Standard solutions exist. Answer: D Section reference 1: Managers and Decision Making Difficulty: Medium Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
30. The type of decision that can be made by following a definite procedure is called a(n) ______ decision. A. structured B. unstructured C. undocumented D. semistructured E. procedural
Answer: A Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
31. ________ decisions are more common at lower organizational levels. A. Structured B. Unstructured C. Undocumented D. Semistructured E. Procedural Answer: A Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
32. Rank-and-file employees tend to make more _________ decisions. A. Structured B. Unstructured C. Undocumented D. Semistructured E. Procedural Answer: A Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
33. Calculating gross pay for hourly workers is an example of ________ decision making. A. Structured B. Unstructured C. Undocumented D. Semistructured E. Procedural Answer: A Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
34. Which of the following is not a characteristic of unstructured decisions? A. They are complex. B. They typically are fuzzy and unclear. C. Standard solutions exist. D. Human intuition is involved. E. The first three phases of the decision-making process occur in no particular sequence. Answer: C
Section reference 1: Managers and Decision Making Difficulty: Medium Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
35. When there is no well-understood or agreed-on procedure for making a decision, the decision is said to be: A. undocumented B. structured C. unstructured D. semistructured E. documented Answer: C Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
36. A large foreign automobile manufacturer is considering where to build a new manufacturing plant in the United States. They are making which type of decision? A. structured B. semistructured C. unstructured D. informational E. wisdom Answer: C Section reference 1: Managers and Decision Making Difficulty: Medium Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
37. Which type of decision requires a combination of standard solution procedures and individual judgment? A. structured B. semistructured C. unstructured D. informational E. wisdom Answer: B Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making. 38. A company’s annual employee evaluation best fits which type of decision? A. unstructured B. structured C. semistructured D. confrontational E. wisdom
Answer: C Section reference 1: Managers and Decision Making Difficulty: Medium Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
39. _____ is the efficient and effective execution of specific tasks. A. Operational control B. Management control C. Strategic planning D. Expertise E. Wisdom Answer: A Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
40. _____ is the acquisition and efficient use of resources in accomplishing organizational goals. A. Operational control B. Management control C. Strategic planning D. Expertise E. Wisdom Answer: B Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
41. Computer support is greatest for which of the following problems? A. semistructured and strategic planning B. unstructured and operational control C. structured and operational control D. semistructured and management control E. structured and management control Answer: C Section reference 1: Managers and Decision Making Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
42. Computer support is least for which of the following problems? A. semistructured and strategic planning B. unstructured and strategic planning C. semistructured and management control D. unstructured and operational control E. structured and strategic planning Answer: B Section reference 1: Managers and Decision Making
Difficulty: Easy Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
43. Searching for valuable business information in a database, data warehouse, or data mart is referred to as _____. A. structured queries B. database queries C. data mining D. query by example E. expert system queries Answer: C Section reference 1: Business Intelligence Applications for Data Analysis Difficulty: Easy Learning Objective 1: LO 12.3 Explain the value that different BI applications provide to large and small businesses.
44. _____ provides users with a view of what is happening, whereas _____ addresses why it is happening. A. Multidimensional data analysis, structured query language B. Data mining, multidimensional data analysis C. Data mining, expert system D. Multidimensional data analysis, neural networks E. Multidimensional data analysis, data mining Answer: E Section reference 1: Business Intelligence Applications for Data Analysis Difficulty: Medium Learning Objective 1: LO 12.3 Explain the value that different BI applications provide to large and small businesses 45. Credit card companies would most likely use which of the following to check for fraudulent credit card use? A. Data mining B. Expert systems C. Neural networks D. Multidimensional data analysis E. Structured query language Answer: A Section reference 1: Business Intelligence Applications for Data Analysis Difficulty: Medium Learning Objective 1: LO 12.3 Explain the value that different BI applications provide to large and small businesses
46. A company wants to use data from past promotional mailings to identify people who would likely respond favorably to future mailings. This company would most likely use: A. structured query language B. multidimensional data analysis C. neural networks D. expert systems
E. data mining Answer: E Section reference 1: Business Intelligence Applications for Data Analysis Difficulty: Medium Learning Objective 1: LO 12.3 Explain the value that different BI applications provide to large and small businesses 47. Which of the following is not a characteristic of DSSs? A. They support only lower- and middle-level managers. B. They are easy to use and construct. C. They can adapt to changing conditions. D. They usually utilize quantitative models. E. They support all phases of the decision-making process. Answer: A Section reference 1: Business Intelligence Applications for Data Analysis Difficulty: Medium Learning Objective 1: LO 12.3 Explain the value that different BI applications provide to large and small businesses
48. At the end of a semester, a student knows that she must achieve a grade of 81 or higher on her final exam to get an A in the course. She has just performed what kind of analysis? A. What-if B. Qualitative C. Sensitivity D. Goal-seeking E. Simulation Answer: D Section reference 1: Business Intelligence Applications for Data Analysis Difficulty: Medium Learning Objective 1: LO 12.3 Explain the value that different BI applications provide to large and small businesses 49. _____ attempts to find the value of the inputs necessary to achieve a desired level of output. A. What-if analysis B. Qualitative analysis C. Sensitivity analysis D. Goal-seeking analysis E. Simulation Answer: D Section reference 1: Business Intelligence Applications for Data Analysis Difficulty: Easy Learning Objective 1: LO 12.3 Explain the value that different BI applications provide to large and small businesses 50. Which of the following is not a characteristic of organizational decision support systems? A. They affect multiple organizational units or corporate issues. B. They cut across organizational functions or hierarchical layers. C. They involve computer-based technologies. D. They are standalone systems.
E. They involve communications technologies. Answer: D Section reference 1: Business Intelligence Applications for Data Analysis Difficulty: Medium Learning Objective 1: LO 12.3 Explain the value that different BI applications provide to large and small businesses 51. A(n) _____ provides rapid access to timely information and direct access to management reports. A. decision support system B. expert system C. neural network D. digital dashboard E. data warehouse Answer: D Section reference 1: Business Intelligence Applications for Presenting Results Difficulty: Easy Learning Objective 1: LO 12.4 Offer examples of how business and government agencies can sue different BI applications to analyze data. 52. Which capability of digital dashboards enables users to obtain the latest data available on key performance indicators or some other metric, ideally in real time? A. Drill-down B. Key performance indicators C. Status access D. Trend analysis E. Exception reporting Answer: C Section reference 1: Business Intelligence Applications for Presenting Results Difficulty: Easy Learning Objective 1: LO 12.4 Offer examples of how business and government agencies can sue different BI applications to analyze data. 53. Which of the following information systems are very user friendly, supported by graphics, and provide exception reporting and drill down? A. decision support systems B. digital dashboards C. functional area information systems D. group decision support systems E. expert systems Answer: B Section reference 1: Business Intelligence Applications for Presenting Results Difficulty: Easy Learning Objective 1: LO 12.4 Offer examples of how business and government agencies can sue different BI applications to analyze data. 54. Digital dashboards provide all of the following capabilities except: A. drill-down B. trAnsweraction processing C. status access D. key performance indicators E. exception reporting
Answer: B Section reference 1: Business Intelligence Applications for Presenting Results Difficulty: Medium Learning Objective 1: LO 12.4 Offer examples of how business and government agencies can sue different BI applications to analyze data. 55. The management cockpit best exemplifies which type of system? A. decision support system B. expert system C. digital dashboard D. functional area information system E. group decision support system Answer: C Section reference 1: Business Intelligence Applications for Presenting Results Difficulty: Medium Learning Objective 1: LO 12.4 Offer examples of how business and government agencies can sue different BI applications to analyze data. 56. The primary distinguishing characteristic of geographical information systems is: A. every record or digital object has a unique identifier B. every record or digital object is visible to the user C. every record or digital object must be accessed by programmers D. every record or digital object has an identified geographical location E. every record or digital object is encrypted Answer: D Section reference 1: Business Intelligence Applications for Presenting Results Difficulty: Medium Learning Objective 1: LO 12.4 Offer examples of how business and government agencies can sue different BI applications to analyze data. 57. Geocoding involves: A. integrating maps with spatially oriented databases and other databases B. encrypting spatial information C. accessing geographical information D. integrating organizational transactions with spatially oriented databases E. programming spatially oriented databases Answer: A Section reference 1: Business Intelligence Applications for Presenting Results Difficulty: Medium Learning Objective 1: LO 12.4 Offer examples of how business and government agencies can sue different BI applications to analyze data. 58. Today, geographical information systems are being combined with _____ to form geospatial technologies. A. dashboards B. global positioning systems C. decision support systems D. expert systems E. neural networks
Answer: B Section reference 1: Business Intelligence Applications for Presenting Results Difficulty: Medium Learning Objective 1: LO 12.4 Offer examples of how business and government agencies can sue different BI applications to analyze data.
Question Type: Multiple Select 59. Refer to the Opening Case – Developing Smarter Cities through Analytics Which of the following benefits did South Bend realize from implementing the analytics software? (select all that apply):? A. Reduced repairs costs Increased efficiencies in service delivery Reductions in the number of maintenance employees Increased information sharing between management Reduction in on the job injuries Answer: A,B and D Section reference 1: Opening Case Difficulty: Medium Learning Objective 1: LO 12.0 Provide a real-world application of business intelligence.
Question Type: Multiple Choice 60. Refer to IT’s About Business 12.2 – Can We Predict the Weather?: Climate Corporation’s use of Earth Risk analytics has the following implications for farmers: A. Farmers know if their crops will fail before hand B. Farmers are required to purchase federal insurance C. Farmers are issued claim payments much faster D. Farmers have to pay lower insurance Answer: C Section reference 1: IT’s About Business 12.2 Difficulty: Easy Learning Objective 1: LO 12.0 Provide a real-world application of business intelligence. 61. Refer to IT’s About Business 12.3 – Predicting Customer Behavior: Seminole uses Enterprise Miner to A. Make its direct marketing efforts more productive B. Organize concerts that attract more customers C. Determine the best time to have concerts D. Record addresses for the direct mailers for concerts E. All of the above Answer: A Section reference 1: IT’s About Business 12.3 Difficulty: Easy Learning Objective 1: LO 12.0 Provide a real-world application of business intelligence. 62. Refer to IT’s About Business 12.1 – Analytics Helps Farmers: _______ is a method or technique that has consistently shown superior results to those achieved with other means;
A. Business Analytics B. Benchmarking C. A Best Practice D. Online Transaction Processing E. Online Analytical Processing Answer: B Section reference 1: IT’s About Business 12.1 Difficulty: Medium Learning Objective 1: LO 12.0 Provide a real-world application of business intelligence. 63. Refer to IT’s About Business 12.4 – Analytics Helps to Reduce Injuries to Rugby Players: The Leicester Tigers are working with IBM to? A. Stop injury prone players from competing in games B. Assess the likelihood a player will get injured C. Tailor exercise regimen to decrease the likelihood of injury D. Help injured players recover faster. E. All of the above Answer: C Section reference 1: IT’s About Business 12.4 Difficulty: Medium Learning Objective 1: LO 12.0 Provide a real-world application of business intelligence. 64. Refer to Closing Case – Which of the following statements is not true about SCPD’s use of PredPol’s analytic tools A. Predictive policing allowed SCPD to make more efficient use of its resources B. PredPol’s analytics indicated that each patrol car should only stay in one small area C. Predictive policing identified areas where the probability of crimes occurring was high D. Predictive policing saved SCPD money because fewer arrests were made E. Predictive policing was initially not an attractive tool to the policemen Answer: B Section reference 1: Closing Case Difficulty: Medium Learning Objective 1: LO 12.0 Provide a real-world application of business intelligence.
Question Type: Essay
65. Describe the three major roles of managers. Section reference 1: Managers and Decision Making Difficulty: Medium Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making. 66. Explain why managers need IT support. Section reference 1: Managers and Decision Making Difficulty: Medium Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
67. Discuss the information technologies that are available to support managers. Section reference 1: Managers and Decision Making Difficulty: Medium Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making. 68. Describe the phases in the decision-making process. Section reference 1: Managers and Decision Making Difficulty: Medium Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making. 69. Describe OLAP, and explain what a data cube is. Section reference 1: Business Intelligence Applications for Data Analysis Difficulty: Medium Learning Objective 1: LO 12.3 Explain the value that different BI applications provide to large and small businesses. 70. Explain data mining, using examples. Section reference 1: Business Intelligence Applications for Data Analysis Difficulty: Medium Learning Objective 1: LO 12.3 Explain the value that different BI applications provide to large and small businesses. 71. Explain how what-if analysis is employed, using examples. Section reference 1: Business Intelligence Applications for Data Analysis Difficulty: Medium Learning Objective 1: LO 12.3 Explain the value that different BI applications provide to large and small businesses. 72. Explain what data visualization technologies are, using examples. Section reference 1: Business Intelligence Applications for Data Analysis Difficulty: Medium Learning Objective 1: LO 12.3 Explain the value that different BI applications provide to large and small businesses.
73. Describe how your university could use a decision support system in its admissions process. Section reference 1: Business Intelligence Applications for Data Analysis Difficulty: Hard Learning Objective 1: LO 12.3 Explain the value that different BI applications provide to large and small businesses. 74. Discuss the structure of problems, the nature of decisions, and the framework for computerized decision analysis. Section reference 1: Managers and Decision Making Difficulty: Medium Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
75. Describe how your university could use a geographical information system in its admissions process. What value could your university gain from using such a system? Section reference 1: Business Intelligence Applications for Data Analysis Difficulty: Hard Learning Objective 1: LO 12.3 Explain the value that different BI applications provide to large and small businesses.
76. Speculate on the future of virtual reality applications in higher (college and university) education. Describe some possible applications. Section reference 1: Business Intelligence Applications for Presenting Results Difficulty: Hard Learning Objective 1: LO 12.4 Offer examples of how business and government agencies can sue different BI applications to analyze data. Question Type: True/False 77. The use of BI is limited to large corporations. Answer: False Section reference 1: What is Business Intelligence? Difficulty: Easy Learning Objective 1: LO 12.2 Provide examples of different ways that organizations made use of business intelligence (BI)..
Question Type: Multiple Choice 78. You’ve started an internship at the major hospital in your city. Your boss gave you ten minutes of training on the data warehouse that you have access to. The last thing she told you was to do some analysis on the Visit cube. Which of the following statements is false? A. One dimension of the cube is (probably) day. B. One dimension of the cube is (probably) treatment. C. One dimension of the cube is (probably) doctor. D. One dimension of the cube is (probably) month. E. One dimension of the cube is (probably) patient. Answer: D Section reference 1: Business Intelligence Applications for Data Analysis Difficulty: Medium Learning Objective 1: LO 12.3 Explain the value that different BI applications provide to large and small businesses.
79. Sally is working for her uncle for the summer in the marketing department of Proctor & Gamble. She tells you she does data mining all day long. Which of the following statements is false? A. Data mining can be used to prove assumptions. B. Data mining is used to identify unknown patterns. C. Data mining can explain why things happened. D. Data mining can predict what will happen.
E. Data mining can be used to identify customers. Answer: E Section reference 1: Business Intelligence Applications for Data Analysis Difficulty: Medium Learning Objective 1: LO 12.3 Explain the value that different BI applications provide to large and small businesses. 80. Shawn is doing some budgeting for his new start-up business. He has developed a budget in Excel using formulas, as he was taught to do in college. Which of the following statements is true? A. If Shawn changes one of his assumptions, Excel will automatically recalculate the budget numbers. B. Shawn would use sensitivity analysis to check the impact of changing his price. C. Shawn would use roll-up to review his summary numbers. D. Shawn would use what-if analysis to check the impact of changing his price and the commission he pays his sales people. E. Shawn would use goal-seeking analysis to examine the impact of changing his forecast of units sold. Answer: A Section reference 1: Business Intelligence Applications for Data Analysis Difficulty: Medium Learning Objective 1: LO 12.3 Explain the value that different BI applications provide to large and small businesses.
81. Amanda is working for the CEO of a small company. He asks her to develop a dashboard. Amanda starts thinking about the questions she needs to ask. Which of the following questions is not on Amanda’s list? A. How many levels do you wish to drill down? B. What are your key performance indicators? C. Do you need real-time data? D. Do you want graphs and charts or text? E. Should it run on your iPhone? Answer: C Section reference 1: Business Intelligence Applications for Presenting Results Difficulty: Medium Learning Objective 1: LO 12.4 Offer examples of how business and government agencies can sue different BI applications to analyze data. 82. Elena is trying to decide whether she should expand her ice cream shop to a bigger space. She decides to be very methodical about it and follow the phases of the decision-making process she learned in college. Which of the following statements is true? A. During the intelligence phrase, Elena will build a model using assumptions about the business. B. During the design phrase, Elena will define the opportunity. C. During the choice phase, Elena will lay out her options. D. During the implementation phase, Elena will implement two of her solutions. E. Elena will use test data to validate her model. Answer: E Section reference 1: Managers and Decision Making Difficulty: Medium Learning Objective 1: LO 12.1 Explain different ways in which IT supports decision making.
Package Title: Testbank Questions Course Title: IS 5e Chapter Number: 13 Question Type: True/False
1. The application portfolio in an organization is a set of recommended applications resulting from the planning and justification process in application development. Answer: True Section reference 1: Planning for and Justifying IT Applications Difficulty: Easy
2. The IT infrastructure delineates the way an organization’s information resources should be used to accomplish its mission. Answer: False Section reference 1: Planning for and Justifying IT Applications Difficulty: Easy 3. IT architecture focuses only on the technical aspects of information resources. Answer: False Section reference 1: Planning for and Justifying IT Applications Difficulty: Medium
4. The IS operational plan is a set of projects that will be executed by the IS department and by functional area managers. Answer: True Section reference 1: Planning for and Justifying IT Applications Difficulty: Easy
5. Costs are harder to quantify than benefits. Answer: False Section reference 1: Planning for and Justifying IT Applications Difficulty: Easy
6. The return on investment (ROI) method of cost-benefit analysis measures the effectiveness of management in generating profits with its available assets.
Answer: True Section reference 1: Planning for and Justifying IT Applications Difficulty: Easy
7. The buy option is particularly attractive if the software vendor allows the company to modify the package to meet its needs. Answer: True Section reference 1: Strategies for Acquiring IT Applications Difficulty: Easy
8. Insourcing application development is usually less time consuming and less expensive than buying or leasing. Answer: False Section reference 1: Strategies for Acquiring IT Applications Difficulty: Easy 9. Software rental is a method of delivering software in which a vendor hosts the applications and customers use them over a network, typically the Internet. Answer: False Section reference 1: Planning for and Justifying IT Applications Difficulty: Easy 10. Open-source applications are basically the same as a proprietary application except for licensing, payment, and support. Answer: True Section reference 1: Planning for and Justifying IT Applications Difficulty: Medium
11. The earlier in the development process that errors are detected, the less expensive they are to correct. Answer: True Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy 12. The SDLC is relatively inflexible. Answer: True Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy
13. The SDLC encourages changes to user requirements once they have been established. Answer: False Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy
14. Technical feasibility determines if the project is an acceptable financial risk and if the organization can afford the expense and time needed to complete the project. Answer: False Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy
15. Systems analysis describes how a system will solve the business problem, and systems design describes what the system must do to accomplish the task. Answer: False Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy
16. Adding functions after a project has been initiated is called scope creep. Answer: True Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy
17. In a direct conversion, the new system is turned on, and the old system is turned off at a later time. Answer: False Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy
18. Pilot conversion is the process in which the new system is introduced in one part of the organization. Answer: True Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy
19. Systems maintenance includes debugging and updating a system. Answer: True Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy
20. Maintenance ends when the new system is implemented and has run long enough for a systems audit. Answer: False Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy
21. Prototyping allows the users to clarify their information requirements as they use the prototype. Answer: True Section reference 1: Alternative Methods and Tools for Systems Development Difficulty: Easy 22. Joint application design is used to collect user requirements. Answer: True Section reference 1: Alternative Methods and Tools for Systems Development Difficulty: Easy 23. With agile development, a company develops only what it needs right now to be successful. Answer: True Section reference 1: Alternative Methods and Tools for Systems Development Difficulty: Medium 24. A key principle of the scrum approach for agile development is that users cannot change their minds during a project. Answer: False Section reference 1: Alternative Methods and Tools for Systems Development Difficulty: Easy
25. Object-oriented development focuses on properties and operations. Answer: True Section reference 1: Alternative Methods and Tools for Systems Development Difficulty: Medium
26. Refer IT’s About Business 13.4 – Atlassian Helps Manage Large Software Projects: Making too much information about the projects available to the software developers will confuse them and slow down the development time. Answer: False Section reference 1: Atlassian Helps Manage Large Software Projects: Difficulty: Easy
Question Type: Multiple Choice
27. The information systems planning process proceeds in which order? A. Organization mission – organization strategic plan – IS strategic plan – new IT architecture B. Organization mission – IS strategic plan – organization strategic plan – IS operational plan C. Organization strategic plan – organization mission – IS strategic plan – new IT architecture D. IT architecture – IS strategic plan – organization strategic plan – organization mission E. IS development projects – IS operational plan – new IT architecture – organization mission Answer: A Section reference 1: Planning for and Justifying IT Applications Difficulty: Medium
28. Which of the following is not a part of the typical IS operational plan? A. The mission of the IS function B. The organizational mission C. The IT architecture D. The application portfolio E. The IS function’s estimate of its goals Answer: B Section reference 1: Planning for and Justifying IT Applications Difficulty: Easy
29. Evaluating the benefits of IT projects is more complex than evaluating their costs for all of the following reasons except: A. Benefits are harder than costs to quantify. B. Benefits tend to be more tangible than costs. C. IT can be used for several different purposes. D. The probability of obtaining a return from an IT investment is based on the probability of implementation success. E. The proposed system may be “cutting edge.”
Answer: B Section reference 1: Planning for and Justifying IT Applications Difficulty: Medium
30. A company’s IT application portfolio is A. A list of existing application the company owns. B. A list of applications that need to be updated. C. A list of applications that need to be removed. D. A list of applications that need to be replaced. E. A list of application to be added or modified. Answer: E Section reference 1: Planning for and Justifying IT Applications Difficulty: Easy
31. A company’s IT architecture includes all of the following except: A. Hardware and software B. Networks C. Database management systems D. The members of the IT staff E. How IT decisions will be made Answer: D Section reference 1: Planning for and Justifying IT Applications Difficulty: Easy 32. Which of the following statements about determining the costs and benefits of IT investments is false? A. Some costs are fixed. B. Costs do not end when the system is installed. C. Many IT projects end up being over budget. D. Benefits are hard to quantify because implementing new technology could be used for multiple purposes. E. Benefits are hard to quantify because they are tangible. Answer: E Section reference 1: Planning for and Justifying IT Applications Difficulty: Medium
33. Which of the following is not an advantage of the buy option for acquiring IS applications? A. Few types of off-the-shelf software are available, thus limiting confusion. B. The software can be tried out. C. The buy option saves time.
D. The company will know what it is getting. E. All of the above Answer: A Section reference 1: Strategies for Acquiring IT Applications Difficulty: Easy
34. Which of the following are disadvantages of the buy option for acquiring IS applications? A. The software may not exactly meet the company’s needs. B. The software may be impossible to modify. C. The company will not have control over software improvements. D. The software may not integrate with existing systems. E. All of the above Answer: E Section reference 1: Strategies for Acquiring IT Applications Difficulty: Easy
35. Which of the following systems acquisition methods saves the company’s time, enables the company to select software that has been used for similar problems in other organizations, and allows the company to try out the software? A. Systems development life cycle B. Prototyping C. End-user development D. Buy option E. Object-oriented development Answer: D Section reference 1: Strategies for Acquiring IT Applications Difficulty: Easy
36. Which of the following systems acquisition methods can result in a company’s acquiring software that is controlled by another company, may be difficult to enhance or modify, and may not support the desired business processes? A. Systems development life cycle B. Prototyping C. End-user development D. Buy option E. Component-based development Answer: D Section reference 1: Strategies for Acquiring IT Applications Difficulty: Easy
37. Which of the following systems acquisition methods requires staff to systematically go through every step in the development process and has a lower probability of missing important user requirements? A. Systems development life cycle B. Prototyping C. End-user development D. External acquisition E. Object-oriented development Answer: A Section reference 1: Strategies for Acquiring IT Applications Difficulty: Easy
38. Which of the following systems acquisition methods is time consuming, costly, and may produce excessive documentation? A. Systems development life cycle B. Prototyping C. End-user development D. External acquisition E. Object-oriented development Answer: A Section reference 1: Strategies for Acquiring IT Applications Difficulty: Easy
39. _____ is a method of delivering software in which a vendor hosts the applications and customers access these applications over the Internet. A. Software-as-a-Service B. Prototyping C. Leasing the application D. Service-oriented architecture E. The buy option Answer: A Section reference 1: Strategies for Acquiring IT Applications Difficulty: Easy
40. Which of the following statements is false? A. Companies that use Software-as-a-Service are running applications on the vendor’s hardware. B. Application service providers are similar to Software-as-a-Service providers. C. Companies that purchase open-source software cannot modify it. D. Outsourcing refers to acquiring IT applications from outside contractors. E. Insourcing refers to building IT applications in-house.
Answer: C Section reference 1: Strategies for Acquiring IT Applications Difficulty: Medium
41. Place the stages of the systems development life cycle in order: A. Investigation – analysis – design – programming/testing – implementation – operation/maintenance B. Investigation – design – analysis – programming/testing – implementation – operation/maintenance C. Analysis – design – investigation – operation/maintenance – programming/testing – implementation D. Investigation – analysis – design – programming/testing – operation/maintenance – implementation E. Investigation – implementation – analysis – programming/testing – design – operation/maintenance Answer: A Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy
42. The _____ that changes are made in the systems development life cycle, the _____ expensive these changes become. A. Sooner, less B. Later, less C. More frequently, more D. More extensively, more E. Sooner, more Answer: A Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Medium
43. _____ feasibility determines if the project is an acceptable financial risk and if the organization can afford the expense and time needed to complete the project. A. Technical B. Economic C. Organizational D. Behavioral E. Time Answer: B Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy
44. _____ feasibility addresses the human issues of an information systems project. A. Technical B. Economic C. Organizational D. Behavioral E. Time Answer: D Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy
45. _____ feasibility concerns a firm’s policies and politics, power structures, and business relationships. A. Technical B. Economic C. Organizational D. Behavioral E. Time Answer: C Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy
46. Which of the following is not a part of systems analysis? A. Defining the business problem B. Identifying the causes of, and solutions to, the business problem C. Identifying the information requirements that the solution must satisfy D. Identifying the technical specifications of the solution E. Gathering information about the existing system Answer: D Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy
47. In the traditional systems development life cycle, users: A. Are important and ongoing members of the development team throughout the life of the project. B. Are important only in the testing phases of the project. C. Have no input. D. Are important only in the maintenance phase of the project. E. Provide information requirements. Answer: E
Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Medium
48. The deliverable of the systems design stage is: A. User requirements. B. Technical system specifications. C. The prototype. D. The source code. E. A working application. Answer: B Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy
49. Systems design answers the question, _____: A. How will the information system resolve the business problem? B. How much will the information system cost? C. What is the problem the information system must address? D. Who will benefit from use of the information system being developed? E. What is the effective operational life of the system? Answer: A Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Medium
50. When users ask for added functionality during a systems development project, this is called: A. User-defined software. B. Scope creep. C. Bloatware. D. An out-of-control project. E. A runaway project. Answer: B Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy
51. Which of the following statements about scope creep is true? A. Scope creep is relatively cheap, regardless of when it occurs in a project. B. Because scope creep is relatively cheap, successful project managers allow it. C. Because scope creep is expensive, successful project managers will not allow it. D. Because scope creep is expensive, successful project managers limit it. E. Scope creep means that user requirements are being successfully taken care of.
Answer: D Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Medium
52. In the _____ stage of the systems development life cycle, the design specifications are translated into computer code. A. Systems analysis B. Programming C. Systems design D. Prototyping E. Feasibility study Answer: B Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy
53. ________ conversion is the riskiest type of conversion process. A. Parallel B. Direct C. Pilot D. Phased E. They all have equal risk. Answer: B Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy
54. A firm shuts down its old COBOL legacy system and immediately starts up its new PeopleSoft ERP system. This process is called __________ conversion. A. Phased B. Direct C. Parallel D. Pilot E. Timely Answer: B Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy
55. A firm implements a new information system in one of its plants, assesses the new system’s performance, and then implements the new system in its other plants. This is an example of __________ conversion. A. Phased
B. Direct C. Parallel D. Pilot E. Timely Answer: D Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy
56. As systems age, maintenance costs _____. A. Decrease B. Increase C. Remain the same D. Are negligible E. Are not considered Answer: B Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Easy
57. Which of the following systems acquisition methods helps clarify user requirements, promotes genuine user participation, and may produce part of the final system? A. Systems development life cycle B. Prototyping C. End-user development D. External acquisition E. Component-based development Answer: B Section reference 1: Alternative Methods and Tools for Systems Development Difficulty: Easy
58. Which of the following systems acquisition methods may encourage inadequate problem analysis, is not practical with large numbers of users, and may result in a company’s purchasing a lower-quality system? A. Systems development life cycle B. Prototyping C. End-user development D. External acquisition E. Component-based development Answer: B Section reference 1: Alternative Methods and Tools for Systems Development Difficulty: Easy
59. When systems are created rapidly, without a formal development methodology: A. End users can take over the work of MIS analysts. B. The organization quickly outgrows the new system. C. Hardware, software, and quality standards are less important. D. Testing and documentation may be inadequate. E. The organization saves money. Answer: D Section reference 1: Alternative Methods and Tools for Systems Development Difficulty: Medium
60. As an MIS analyst, you have decided to use a prototyping methodology for a small, Webbased design project. What is the order of steps that you will follow in the project? A. Develop the prototype; use the prototype; revise and enhance the prototype. B. Identify user requirements; develop the prototype; use the prototype; revise and enhance the prototype. C. Develop the prototype; identify user requirements; use the prototype; revise and enhance the prototype. D. Identify user requirements; develop solutions; select the best prototype; implement the prototype. E. Identify user requirements; develop the prototype; revise and enhance the prototype. Answer: B Section reference 1: Alternative Methods and Tools for Systems Development Difficulty: Medium
61. The _____ approach to systems development is a group-based tool for collecting user requirements. A. Integrated computer-assisted software engineering B. Joint application design C. Rapid application development D. Prototyping E. Systems development life cycle Answer: B Section reference 1: Alternative Methods and Tools for Systems Development Difficulty: Easy
62. Which of the following is not an advantage of the joint application design approach to systems development? A. It involves fewer users in the development process. B. It saves time. C. It results in greater user acceptance of the new system.
D. It can produce a higher-quality system. E. It provides for greater user participation in the definition of the requirements. Answer: A Section reference 1: Alternative Methods and Tools for Systems Development Difficulty: Easy
63. Agile development A. Takes a long time. B. Requires little user input. C. Delivers functionality in rapid interactions. D. Focuses on all required functionality at each step of the way. E. Uses the scrum approach to design the system. Answer: C Section reference 1: Alternative Methods and Tools for Systems Development Difficulty: Medium
64. _____ is a software development methodology that delivers functionality in rapid iterations, usually measured in weeks. A. Agile development B. Prototyping C. The systems development life cycle D. Joint application development E. Component-based development Answer: A Section reference 1: Alternative Methods and Tools for Systems Development Difficulty: Easy
65. Object-oriented development A. Is similar to traditional development approaches. B. Focuses on the original task to be handled. C. Focuses on the processes that must be modeled to perform that task. D. Focuses on data. E. Identifies the subjects of the new system. Answer: C Section reference 1: Alternative Methods and Tools for Systems Development Difficulty: Easy
66. Which of the following systems acquisition methods may eventually require maintenance assistance from the IT department, can produce inadequate documentation, and might result in a company’s acquiring a system with inadequate interfaces to existing systems?
A. Systems development life cycle B. Prototyping C. End-user development D. External acquisition E. Component-based development Answer: C Section reference 1: Alternative Methods and Tools for Systems Development Difficulty: Easy
67. Refer to Opening Case – Tweak or Trash: Which of the following statements concerning Accentures approach to rework their IT needs is not true? A. Upgrading systems does not require the elimination of all existing systems B. The most efficient option is to develop the new systems in-house C. The initial costs of upgrading organization wide systems can be very high D. Upgrading a large organization’s IT systems can take years E. Continuous minor upgrades (or tweaking) to existing systems will ultimately hinder progress Answer: D Section reference 1: Opening Case Difficulty: Medium 68. Refer to IT’s About Business 13.1 -- Anniston Orthopaedics and Greenway Medical Technologies: Assuming that a contract can be reached and Anniston decides to install Greenway’s software, which is the best implementation approach? A. Pilot B. Piecemeal C. Direct D. Parallel E. Any one of the above will be fine. Answer: D Section reference 1: IT’s About Business 13.1 Difficulty: Medium 69. Refer to IT’s About Business 13.2 – A Disastrous Development Project: Marin County hired Deloitte Consulting to work with them on the implementation of the new SAP system. This arrangement is called ____________. A. Insourcing B. Outsourcing C. Offshoring D. Hiring part-time employees E. SaaS
Answer: B Section reference 1: IT’s About Business 13.2 Difficulty: Medium 70. Refer IT’s About Business 13.3 – General Motors Insources Its Information Technology Function: Based on reading the case, GM’s decision to switch from outsourcing to in-house development was motivated by which of the following factors? A. Outsourcing is more expensive than in-sourcing B. They wanted to retrain existing employees to develop software C. They wanted shorted lead times D. They did not want their strategy to be known by outsiders E. Government incentives to use American developers Answer: C Section reference 1: IT’s About Business 13.3 Difficulty: Medium 71. Refer to Closing Case – Putting It All Together: Which of the following statements is not true about Chubb Insurance’s strategy A. Considerable effort was made to explain the advantages of the unified architecture to employees B. The unified architecture reduced costs C. The unified architecture is flexible and allows employees to use technologies of their choice D. The unified architecture enables Chubb to make faster decisions E. The unified architecture enables Chubb to reduce time to market Answer: C Section reference 1: Closing Case Difficulty: Medium
Question Type Essay 72. Differentiate between the IT strategic plan and the IS operational plan. Section reference 1: Planning for and Justifying IT Applications Difficulty: Medium
73. Contrast the tangible and intangible benefits of a proposed information system. Section reference 1: Planning for and Justifying IT Applications Difficulty: Medium
74. Why is it so hard to justify an information system?
Section reference 1: Planning for and Justifying IT Applications Difficulty: Medium
75. Describe the feasibility study of the SDLC, and discuss why this study is so important. Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Medium
76. What are the outputs from each of the six steps in the SDLC? Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Medium
77. Contrast agile development and the SDLC. Section reference 1: Alternative Methods and Tools for Systems Development Difficulty: Medium
78. Contrast component-based development and the SDLC. Section reference 1: Alternative Methods and Tools for Systems Development Difficulty: Medium
79. Compare and contrast the various strategies for acquiring IT applications. Section reference 1: Strategies for acquiring IT Applications Difficulty: Hard
80. Compare and contrast rapid application development and joint application design. Section reference 1: Alternative Methods and Tools for Systems Development Difficulty: Medium
Question Type: Multiple Choice
81. Jennifer is the owner of a start-up boutique that specializes in hard-to-find dress sizes for women. She has been keeping her financial books by using Excel and by hand. She thinks it’s time to buy an accounting package. What question does she need to answer first? A. How will the accounting package resolve my business problem? B. How much will the accounting package cost? C. What is the problem the accounting package must address? D. Who will benefit from the use of the accounting package? E. What is the effective operational life of the accounting package? Answer: C Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Medium
82. Jennifer is the owner of a start-up boutique that specializes in hard-to-find dress sizes for women. She has been keeping her financial books by using Excel and by hand. She researched available accounting packages for a business like hers and has decided on Boutique Accounting. What is the best way for Jennifer to implement Boutique Accounting? A. Pilot B. Piecemeal C. Direct D. Parallel E. Any one of the above will be fine. Answer: C Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Medium 83. Anna works in the sales organization of a mid-size company. The company is evaluating whether it should replace its existing sales support system. At what stage of the SDLC should Anna expect to participate? A. Systems analysis B. Programming C. Systems design D. Prototyping E. Feasibility study Answer: A Section reference 1: The Traditional Systems Development Life Cycle Difficulty: Medium 84. Ryan works for a small consulting company. They want to do a better job of tracking their clients and the jobs they have bid on and either won or lost. There are no processes in place right now, and all users (consultants and managers) have different ideas. What is the best systems development approach for Ryan’s company? A. SDLC B. Prototyping C. JAD D. Buy option E. Object-oriented development
Answer: C Section reference 1: Alternative Methods and Tools for Systems Development Difficulty: Medium 85. Anna works in the sales organization of a mid-size company. The company decided to purchase Sales SME that is offered as a SaaS. What would you expect to see in a SLA with the vendors? A. Price of the software B. Upgrade prices for the software C. Whether the software can be changed by Anna’s company D. Availability guarantees E. Bug reporting process Answer: D Section reference 1: Strategies for Acquiring IT Applications Difficulty: Medium
Testbank Rainer Intro 5e Technology Guide 1 -- Hardware
True/False
1. Computer technologies become obsolete faster than other technologies in the organization. Answer: True Section Reference 1: Introduction Difficulty: Easy Learning Objective 1: LO TG1.1 Analyze the major hardware issues that affect information workers in today's business environment.
2. A supercomputer is the term given to the latest technology. Answer: False Section Reference 1: Strategic Hardware Issues Difficulty: Medium Learning Objective 1: LO TG1.2 Discuss the strategic issues that link hardware design to business strategy. 3. A mainframe is a type of server. Answer.: False Section Reference 1: Strategic Hardware Issues Difficulty: Medium Learning Objective 1: LO TG1.2 Discuss the strategic issues that link hardware design to business strategy. 4. A thin-client system is a desktop computer that doesn’t have locally installed software. Answer: True Section Reference 1: Strategic Hardware Issues Difficulty: Easy Learning Objective 1: LO TG1.2 Discuss the strategic issues that link hardware design to business strategy. 5. Laptop, notebook, and netbook computers cost more than desktops because of their portability. Answer: True Section Reference 1: Strategic Hardware Issues Difficulty: Easy Learning Objective 1: LO TG1.2 Discuss the strategic issues that link hardware design to business strategy.
6. Each generation of computer hardware has exhibited increased processing power and decreased costs. Answer: True Section Reference 1: Computer Hierarchy Difficulty: Easy Learning Objective 1: LO TG1.3 Describe the hierarchy of computers according to power and their respective roles.
7. Minicomputers are relatively small, inexpensive computers that perform the same functions as mainframe computers, but to a limited extent. Answer: True Section Reference 1: Computer Hierarchy Difficulty: Easy Learning Objective 1: LO TG1.3 Describe the hierarchy of computers according to power and their respective roles.
8. The mouse is the most common input device. Answer: False Section Reference 1: Input and Output Technologies Difficulty: Easy Learning Objective 1: LO TG1.4 Differentiate the various types of input and output technologies and their uses.
9. Source data automation uses various technologies to input data with minimal human intervention. Answer: True Section Reference 1: Input and Output Technologies Difficulty: Easy Learning Objective 1: LO TG1.4 Differentiate the various types of input and output technologies and their uses.
10. Microcontrollers are computer chips that are embedded in products and technologies of various types and sizes. Answer: False Section Reference 1: The Central Processing Unit Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
11. Computers can run any type of program regardless of the amount and type of memory that the computer has. Answer: False Section Reference 1: The Central Processing Unit Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
12. A byte represents a particular alphanumeric character or a simple mathematical operation. Answer: True Section Reference 1: The Central Processing Unit Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
13. Primary storage is the main memory of a computer, in which small amounts of data that will be used immediately are stored. Answer: True Section Reference 1: The Central Processing Unit Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
14. Random access memory is that part of primary storage that holds a software program (or a portion of it) and small amounts of data when they are brought from secondary storage. Answer: True Section Reference 1: The Central Processing Unit Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
15. If your computer loses its power supply, you will not lose the contents of your random access memory, because it is not volatile. Answer: False Section Reference 1: The Central Processing Unit Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
16. Sequential access is a type of data access that is associated primarily with magnetic disks. Answer: False Section Reference 1: The Central Processing Unit Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
17. Magnetic tape provides faster access to data than magnetic disks. Answer: False Section Reference 1: The Central Processing Unit Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
18. An optical storage device is a form of secondary storage device on which data are recorded and read by laser in a computer’s disk drive. Answer: True Section Reference 1: The Central Processing Unit Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
19. Digital video disks (DVDs) have higher storage capacities than CD-ROMs. Answer: True Section Reference 1: The Central Processing Unit Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
20. The cost per megabyte of storage is greater for traditional hard disk storage than for PC memory cards. Answer: False Section Reference 1: The Central Processing Unit Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
Multiple Choice
21. Which of the following factors does not affect decisions about hardware? A. Power B. Appropriateness for the task C. Size D. Cost E. Speed Answer: C Section Reference 1: Introduction Difficulty: Easy Learning Objective 1: LO TG1.1 Analyze the major hardware issues that affect information workers in today's business environment. 22. To model the weather or simulate nuclear weapons testing, you would most likely use a(n): A. Mainframe computer. B. Workstation. C. Supercomputer. D. Personal computer. E. Active badge. Answer: C Section Reference 1: Computer Hierarchy Difficulty: Easy Learning Objective 1: LO TG1.3 Describe the hierarchy of computers according to power and their respective roles. 23. A _____ refers to the fastest computing engines available at any given time. A. Supercomputer B. Mainframe C. Midrange computer D. Microcomputer E. Laptop computer Answer: A Section Reference 1: Computer Hierarchy Difficulty: Easy Learning Objective 1: LO TG1.3 Describe the hierarchy of computers according to power and their respective roles.
24. A ___________ is an example of a computer system that is designed to accommodate multiple users simultaneously. A. Microcomputer
B. Mainframe C. Laptop D. Palmtop E. Wearable computer Answer: B Section Reference 1: Computer Hierarchy Difficulty: Easy Learning Objective 1: LO TG1.3 Describe the hierarchy of computers according to power and their respective roles.
25. A _____ is used in large enterprises for extensive computing applications that are accessed by thousands of concurrent users. A. Supercomputer B. Mainframe C. Midrange computer D. Microcomputer E. Laptop computer Answer: B Section Reference 1: Computer Hierarchy Difficulty: Easy Learning Objective 1: LO TG1.3 Describe the hierarchy of computers according to power and their respective roles.
26. Which of the following is not a component of hardware? A. Primary and secondary storage B. The operating system C. Input and output technologies D. The central processing unit E. Communication technologies Answer: B Section Reference 1: The Central Processing Unit Difficulty: Medium Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
27. Which of the following is not a component of the central processing unit? A. Registers B. Control unit C. Secondary storage D. Arithmetic-logic unit E. Keyboard Answer: C
Section Reference 1: The Central Processing Unit Difficulty: Medium Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
28. Which of the following does not affect the speed of the machine instruction cycle? A. Clock speed B. Word length C. Bus width D. Line width E. Physical design of the chip Answer: D Section Reference 1: The Central Processing Unit Difficulty: Medium Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
29. Moore’s Law predicted that microprocessor complexity would ______. A. Double every year. B. Double every two years. C. Increase slowly. D. Decrease slowly. E. Decrease rapidly. Answer: B Section Reference 1: The Central Processing Unit Difficulty: Medium Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
30. Increased microprocessor complexity results from which of the following? A. Decreasing line width B. Increasing transistor miniaturization C. Using new materials for the chip that increase conductivity D. Putting more transistors on the chip E. All of the above Answer: E Section Reference 1: The Central Processing Unit Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
31. The amount and type of memory that a computer possesses affects which of the following? A. The type of program the computer can run B. The speed of the computer C. The cost of the computer D. The cost of processing data E. All of the above Answer: E Section Reference 1: The Central Processing Unit Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
32. The amount and type of memory that a computer possesses affects all the following except: A. The type of program the computer can run. B. The speed of the computer. C. The cost of the computer. D. The cost of processing data. E. The speed of data entry. Answer: E Section Reference 1: The Central Processing Unit Difficulty: Medium Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
33. Arrange the hierarchy of terms to describe memory capacity in the correct sequence, from smallest to largest: A. Megabyte – kilobyte – gigabyte – terabyte – exabyte – petabyte B. Exabyte – petabyte – terabyte – gigabyte – megabyte – kilobyte C. Kilobyte – megabyte – gigabyte – terabyte – petabyte – exabyte D. Petabyte – exabyte – kilobyte – gigabyte – kilobyte – terabyte E. Kilobyte – gigabyte – megabyte – exabyte – petabyte – terabyte Answer: C Section Reference 1: The Central Processing Unit Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
34. Primary storage stores which of the following for very brief periods of time? A. Data to be processed by the CPU B. Instructions for the CPU as to how to process the data
C. Operating system programs that manage various aspects of the computer’s operations D. All of the above Answer: D Section Reference 1: The Central Processing Unit Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
35. Which of the following is not stored in primary storage? A. Data to be processed by the CPU B. Instructions for the CPU as to how to process the data C. Archival data D. Operating system programs E. All of the above are stored in primary storage. Answer: C Section Reference 1: The Central Processing Unit Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
36. The main types of primary storage are: A. Register. B. Random access memory. C. Cache memory. D. Read-only memory. E. All of the above Answer: E Section Reference 1: The Central Processing Unit Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
37. _____________is(are) the part of primary storage that holds a software program (or a portion of it) and small amounts of data when they are brought from secondary storage. A. Read-only memory B. Random access memory C. Cache memory D. Registers E. Flash memory Answer: B Section Reference 1: The Central Processing Unit
Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
38. Random access memory is _____ and _____. A. Volatile, temporary B. Nonvolatile, permanent C. Nonvolatile, temporary D. Volatile, permanent E. Volatile, inexpensive Answer: A Section Reference 1: The Central Processing Unit Difficulty: Medium Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
39. Registers have all of the following characteristics except: A. They are a type of primary storage. B. They can store only extremely limited amounts of instructions and data. C. They provide the fastest storage. D. They are slower than RAM. E. All of the above are characteristics of registers. Answer: D Section Reference 1: The Central Processing Unit Difficulty: Medium Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
40. Which of the following is not a type of primary storage? A. Random access memory B. Registers C. Cache D. Read-only memory E. Optical Answer: E Section Reference 1: The Central Processing Unit Difficulty: Medium Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
41. The type of primary storage, located closest to the CPU, where the computer can temporarily store blocks of data used most often is called: A. Read-only memory. B. Registers. C. Random access memory. D. Cache memory. E. Flash memory. Answer: D Section Reference 1: The Central Processing Unit Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
42. The type of primary storage where certain critical instructions are safeguarded because the storage is nonvolatile and the instructions can be read only by the computer and not changed by the user is called: A. Read-only memory. B. Random access memory. C. Cache memory D. Registers E. Flash memory Answer: A Section Reference 1: The Central Processing Unit Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
43. Secondary storage has which of the following characteristics? A. It is nonvolatile. B. It is more cost effective than primary storage. C. It is slower than primary storage. D. It can utilize a variety of media. E. All of the above Answer: E Section Reference 1: The Central Processing Unit Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
44. Which of the following is not a characteristic of secondary storage? A. It is nonvolatile. B. It is more cost effective than primary storage.
C. It is slower than primary storage D. It cannot utilize any media except chips E. None of the above Answer: D Section Reference 1: The Central Processing Unit Difficulty: Medium Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
45. The characteristics of magnetic tape include all of the following except: A. It is the fastest magnetic storage medium. B. It is the cheapest magnetic storage medium. C. It provides sequential access to the data. D. It has greater storage capacity than thumb drives. E. It is often used for archival storage. Answer: A Section Reference 1: The Central Processing Unit Difficulty: Medium Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
46. If you wished to store a large amount of archival data for a long period of time, you would choose which of the following? A. Magnetic disk B. Magnetic tape C. Read-only chips D. Cache chips E. Thumb drives Answer: B Section Reference 1: The Central Processing Unit Difficulty: Medium Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
47. To access a specific piece of information, _____ are usually faster than _____. A. Sequential access storage devices, direct access storage devices B. Direct access storage devices, sequential access storage devices C. Streaming tape devices, DVDs D. Optical storage devices, random access memory E. Sequential access storage devices, thumb drives Answer: B
Section Reference 1: The Central Processing Unit Difficulty: Medium Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
48. _____ are electronic storage devices that contain no moving parts. A. Hard drives B. Flash memory devices C. Streaming tape devices D. DVDs E. CDs Answer: B Section Reference 1: The Central Processing Unit Difficulty: Easy Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
Question Type: Essay
49. Discuss why it is difficult to make hardware decisions today. Section Reference 1: Introduction Difficulty: Medium Learning Objective 1: LO TG1.1 Analyze the major hardware issues that affect information workers in today's business environment.
50. Describe the components that make up hardware. Section Reference 1: Introduction Difficulty: Medium Learning Objective 1: LO TG1.1 Analyze the major hardware issues that affect information workers in today's business environment.
51. What are the types of primary storage? Section Reference 1: The Central Processing Unit Difficulty: Medium Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
52. Compare and contrast supercomputers, mainframes, midrange computers, and microcomputers. Section Reference 1: Computer Hierarchy Difficulty: Medium Learning Objective 1: LO TG1.3 Describe the hierarchy of computers according to power and their respective roles. 53. What are the types of secondary storage? Section Reference 1: The Central Processing Unit Difficulty: Medium Learning Objective 1: LO TG 1.5 Describe the design and functioning of the central processing unit.
Question Type: Multiple Choice 54. Jun is getting ready to open a store in her home town to sell unique lamp bases and shades. What kind of computer does she need at this point? A. Mainframe computer B. Server C. Supercomputer D. Personal computer E. iPad Answer: D Section Reference 1: Computer Hierarchy Difficulty: Easy Learning Objective 1: LO TG1.3 Describe the hierarchy of computers according to power and their respective roles. 55. Jun has been in business selling unique lamp bases and shades for two years in her first location. She is getting ready to open a second location two towns over. What kind of computer does she need at this point? A. Mainframe computer B. Server C. Supercomputer D. Personal computer E. iPad Answer: B Section Reference 1: Computer Hierarchy Difficulty: Medium Learning Objective 1: LO TG1.3 Describe the hierarchy of computers according to power and their respective roles. 56. Jun really likes your Apple iPad and wants to get one for her lamp business. What kind of computer would the iPad replace? A. Mainframe computer B. Workstation
C. Server D. Personal computer E. Smartphone Answer: D Section Reference 1: Computer Hierarchy Difficulty: Medium Learning Objective 1: LO TG1.3 Describe the hierarchy of computers according to power and their respective roles.
Rainer Intro 5e Technology Guide 2: Computer Software
True/False
1. Software is typically quite complex. Answer: True Section Reference 1: Introduction to Software Difficulty: Easy Learning Objective 1: LO TG2.1 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment.
2. As hardware costs have decreased over the past 20 years, software costs have also decreased. Answer: False Section Reference 1: Introduction to Software Difficulty: Easy Learning Objective 1: LO TG2.1 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment.
3. Software consists of computer programs, which are sequences of instructions for the computer. Answer: True Section Reference 1: Introduction to Software Difficulty: Easy Learning Objective 1: LO TG2.1 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment.
4. Computer hardware and software are designed to be general purpose. Answer: False Section Reference 1: Introduction to Software Difficulty: Easy Learning Objective 1: LO TG2.1 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment.
5. Application software cannot be run on computer hardware without systems software. Answer: True Section Reference 1: Introduction to Software Difficulty: Easy Learning Objective 1: LO TG2.1 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment.
6. Computer code is generally efficient, well designed, and contains very few errors. Answer: False Section Reference 1: Software Issues Difficulty: Easy Learning Objective 1: LO TG2.2 Discuss the major software issues that confront modern organizations.
7. Companies who develop software for sale license that software for use to protect their product from being copied and distributed illegally. Answer: True Section Reference 1: Software Issues Difficulty: Easy Learning Objective 1: LO TG2.2 Discuss the major software issues that confront modern organizations.
8. Open systems refers to a model of computer products – hardware, operating systems, and application software – that allow any computing device to be seamlessly connected to and interact with any other computing device. Answer: True Section Reference 1: Software Issues Difficulty: Easy Learning Objective 1: LO TG2.2 Discuss the major software issues that confront modern organizations.
9. The operating system supervises the overall operation of the computer. Answer: True Section Reference 1: Systems Software Difficulty: Easy
10. The user interface is the most sophisticated on enterprise operating systems and the least sophisticated on desktop operating systems. Answer: False Section Reference 1: Systems Software Difficulty: Easy
12. Packaged application software addresses a specific or unique business need for a company. Answer: True Section Reference 1: Application Software Difficulty: Easy
13. Off-the-shelf application software consists of specific software programs developed for a particular company by a software vendor. Answer: False Section Reference 1: Application Software Difficulty: Easy
14. Personal application software consists of widely used packages such as word processing, spreadsheet, communications, and graphics software. Answer: True Section Reference 1: Application Software Difficulty: Easy
Multiple Choice
15. Over the past 20 years, hardware costs have _____, while software costs have _____. A. Increased, increased B. Decreased, decreased C. Decreased, increased D. Increased, decreased E. Increased, remained level Answer: C Section Reference 1: Introduction to Software Difficulty: Medium
Learning Objective 1: LO TG2.1 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment.
16. Today, software comprises a larger percentage of the cost of modern computer systems than it did in the early 1950s. Which of the following reasons account(s) for this development? A. Hardware costs have decreased. B. Hardware performance has increased. C. Software has become increasingly complex. D. Building software applications remains slow, complex, and error-prone. E. All of the above Answer: E Section Reference 1: Introduction to Software Difficulty: Medium Learning Objective 1: LO TG2.1 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment.
17. Which of the following is not a reason why software currently comprises a larger percentage of the cost of modern computer systems than it did in the early 1950s? A. Hardware costs have increased. B. Hardware performance has increased C. Software has become increasingly complex. D. Building software applications remains slow, complex, and error-prone. E. None of the above Answer: A Section Reference 1: Introduction to Software Difficulty: Medium Learning Objective 1: LO TG2.1 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment.
18. Which of the following is not an overall trend in software? A. Increased complexity B. Increased cost C. Increased number of errors D. Increased amount of mainframe software written by users E. Increasing percentage of the costs of information systems Answer: D Section Reference 1: Software Issues Difficulty: Medium Learning Objective 1: LO TG2.2 Discuss the major software issues that confront modern organizations.
19. _____ is(are) a written description of a computer program’s functions. A. Explanatory instructions B. Documentation C. Graphical user interface D. Plug and play E. README files Answer: B Section Reference 1: Introduction to Software Difficulty: Easy Learning Objective 1: LO TG2.1 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment.
20. The overall trends in software include all of the following except: A. Increased complexity. B. Increased cost. C. Increased number of defects. D. Increased security. E. Increasing percentage of the costs of modern computer systems. Answer: D Section Reference 1: Introduction to Software Difficulty: Easy Learning Objective 1: LO TG2.1 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment.
21. The _____ complexity of software ansresults in a _____ potential for errors. A. Decreasing, decreasing B. Decreasing, increasing C. Increasing, decreasing D. Increasing, level E. Increasing, increasing Answer: E Section Reference 1: Introduction to Software Difficulty: Medium Learning Objective 1: LO TG2.1 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment.
22. _____ are sequences of instructions used to direct the workings of a computer.
A. Computer programs B. Microcode instructions C. Assembler commands D. Systems software E. Input/output instructions Answer: A Section Reference 1: Introduction to Software Difficulty: Easy Learning Objective 1: LO TG2.1 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment.
23. The set of computer programs used to manage hardware resources is called: A. Microsoft Office Suite. B. Application software. C. General software. D. Systems software. E. Personal application software. Answer: D Section Reference 1: Introduction to Software Difficulty: Medium Learning Objective 1: LO TG2.1 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment.
24. The set of computer instructions that provides specific functionality to a user is called: A. Transaction processing software. B. Application software. C. General software. D. Systems software. E. Microcode Answer: B Section Reference 1: Introduction to Software Difficulty: Easy Learning Objective 1: LO TG2.1 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment.
25. Which of the following is not a characteristic of today’s typical software? A. It s efficient. B. It is full of errors. C. It is poorly designed.
D. It is expensive. E. It is an art as well as a science. Answer: A Section Reference 1: Software Issues Difficulty: Medium Learning Objective 1: LO TG2.2 Discuss the major software issues that confront modern organizations.
26. The concept of _____ refers to competing computing products working together. A. Open-source software B. Software-as-a-Service C. Object-oriented software D. Application software packages E. Open systems Answer: E Section Reference 1: Software Issues Difficulty: Easy Learning Objective 1: LO TG2.2 Discuss the major software issues that confront modern organizations.
27. In order to protect their software from illegal distribution, vendors often rely on _____. A. Secure packaging B. Private security agents C. Software licensing D. Internet-based distribution methods E. Personal honesty Answer: C Section Reference 1: Software Issues Difficulty: Easy Learning Objective 1: LO TG2.2 Discuss the major software issues that confront modern organizations.
28. _____ is software whose source code is available at no cost to developers and users. A. Freeware B. Shareware C. Open systems D. Open-source software E. Software-as-a-Service Answer: D Section Reference 1: Software Issues Difficulty: Easy
Learning Objective 1: LO TG2.2 Discuss the major software issues that confront modern organizations.
29. Which of the following is not an advantage of open-source software? A. It produces high-quality code. B. It produces code that can be changed to meet the user’s needs. C. Bugs are discovered quickly. D. Support is available only through online communities of core developers. E. It produces reliable code. Answer: D Section Reference 1: Software Issues Difficulty: Medium Learning Objective 1: LO TG2.2 Discuss the major software issues that confront modern organizations.
30. Which of the following is not a function of the operating system? A. It allocates CPU time and main memory to programs running on the computer. B. It provides an interface between the user and the hardware. C. It supervises the overall operation of the computer. D. It increases the complexity of the system to the user. E. None of the above Answer: D Section Reference 1: Systems Software Difficulty: Medium Learning Objective 1: LO TG2.3 Describe the advantages and disadvantages associated with systems software.
31. The main system control program is the _____. A. Operating system B. Cache software C. Virtual memory D. Security monitor E. Multithread register Answer: A Section Reference 1: Systems Software Difficulty: Easy Learning Objective 1: LO TG2.3 Describe the advantages and disadvantages associated with systems software.
32. The _____ allows users to exert direct control of icons on the computer screen.
A. Systems software B. Application software C. Graphical user interface D. Plug-and-play E. Operating system Answer: C Section Reference 1: Systems Software Difficulty: Easy Learning Objective 1: LO TG2.3 Describe the advantages and disadvantages associated with systems software.
33. Creating specific application software using an organization’s own resources is called ____ . A. Outsourcing B. Consultant-based development C. In-house development D. Contract software E. Documentation Answer: C Section Reference 1: Application Software Difficulty: Easy Learning Objective 1: LO TG2.4 Identify the major types of application software. 34. _____ programs are often used to analyze financial data. A. Database B. Word processing C. Spreadsheet D. Graphics E. Communications Answer: C Section Reference 1: Application Software Difficulty: Easy Learning Objective 1: LO TG2.4 Identify the major types of application software.
Question Type: Essay
35. Discuss the reasons why software is more costly than hardware in today’s information systems.
Section Reference 1: Software Issues Difficulty: Hard Learning Objective 1: LO TG2.2 Discuss the major software issues that confront modern organizations.
36. What are the overall trends in software? Section Reference 1: Software Issues Difficulty: Medium Learning Objective 1: LO TG2.2 Discuss the major software issues that confront modern organizations.
37. Describe the various types of application software. Section Reference 1: Application Software Difficulty: Medium Learning Objective 1: LO TG2.4 Identify the major types of application software.
38. Discuss the importance of software defects. Section Reference 1: Software Issues Difficulty: Medium Learning Objective 1: LO TG2.2 Discuss the major software issues that confront modern organizations.
39. Describe the factors to be considered for software selection. Section Reference 1: Software Issues Difficulty: Medium Learning Objective 1: LO TG2.2 Discuss the major software issues that confront modern organizations.
40. Discuss the importance of software licensing. Section Reference 1: Software Issues Difficulty: Medium Learning Objective 1: LO TG2.2 Discuss the major software issues that confront modern organizations.
Question Type: Multiple Choice
41. un is getting ready to open a store in her home town to sell unique lamp bases and shades. She has bought a laptop to use in the store for all of her operating needs. One of the first applications she needs is one to handle her accounting and checkbook. How might she obtain such an application? A. Open-source software B. Software-as-a-Service C. Object-oriented software D. Application software package E. Open systems Answer: D Section Reference 1: Software Issues Difficulty: Easy Learning Objective 1: LO TG2.2 Discuss the major software issues that confront modern organizations.
42. Jun has bought an accounting package for her business, which involves selling unique lamp bases and shades. She wants to hire some part-time help to assist her in implementing and becoming comfortable with the new software.. Which of the follow skill sets would be the most beneficial for this worker to possess? A. Business processes B. Operating systems C. Programming languages D. HTML E. Open systems Answer: A Section Reference 1: Software Issues Difficulty: Medium Learning Objective 1: LO TG2.2 Discuss the major software issues that confront modern organizations.
43 Jun has bought an accounting package for her business, which involves selling unique lamp bases and shades. She and a part-time employee are getting up to speed on the package but are having trouble matching her business processes to the software. What does Jun have to do to make the software more effective? A. Change the UI B. Change the way the program works C. Change her business processes to match the software D. Install an updated version of the software E. Hire another part-time worker to help Answer: C Section Reference 1: Software Issues Difficulty: Medium Learning Objective 1: LO TG2.2 Discuss the major software issues that confront modern organizations.
Package Title: Testbank Questions Course Title: IS 5e Chapter Number: Tech Guide 3
Question Type: True and False 1) Entering data and programs from user departments to the mainframe was called remote data entry. Answer: False Title: Assessment Question TG3.01 Learning Objective 1: LO TG3.1 Describe the problems that modern information technology departments. Section Reference 1: TG3.1 Introduction Difficulty: Medium
2) MIS departments embraced the arrival of personal computers in the work place. Answer: False Title: Assessment Question TG3.02 Learning Objective 1: LO TG3.1 Describe the problems that modern information technology departments. Section Reference 1: TG3.1 Introduction Difficulty: Easy
3) Mainframe computers are no longer being used. Answer: False Title: Assessment Question TG3.03 Learning Objective 1: LO TG3.1 Describe the problems that modern information technology departments.Section Reference 1: TG3.1 Introduction Difficulty: Easy
4) Companies are building massive data centers called computer floors to meet their processing needs. Answer: False
Title: Assessment Question TG3.04 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Easy
5) Server farms can be located just about anywhere. Answer: False Title: Assessment Question TG3.05 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Medium
6) Server virtualization uses software-based partitions to create multiple virtual servers on a single physical server. Answer: True Title: Assessment Question TG3.06 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.. Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Medium
7) Grid computing combines processing resources to form a virtual supercomputer. Answer: True Title: Assessment Question TG3.07 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.. Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Easy
8) Any application can run on a grid computing system Answer: False Title: Assessment Question TG3.08 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing..
Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Medium
9) Utility computing is also called on-demand computing. Answer: True Title: Assessment Question TG3.09 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.. Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Easy 10) The “cloud” in cloud computing is composed of computers, the software on those computers, and the network connections among those computers. Answer: True Title: Assessment Question TG3.10 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.. Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Easy
11) The primary advantage of cloud computing is that it is easier for users to do their work. Answer: False Title: Assessment Question TG3.11 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.. Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Easy 12) The four types of cloud computing are public clouds, private clouds, hybrid clouds, and horizontal clouds. Answer: False Title; Assessment Questions TG3.12 Learning Objective TG3.3: Identify a use-case-scenario for each of the four types of clouds. Section TG3.3: Different types of Clouds Difficulty: Medium
13) One advanatage of cloud computing is that it shifts IT from a capital expenses to an operating expense. Answer: True Title; Assessment Questions TG3.13 Learning Objective TG3.3: Identify a use-case-scenario for each of the four types of clouds. Section TG3.3: Different types of Clouds Difficulty: Medium
14) The service model infrastructure is the same across all three major types of cloud computing. Anwser: False Title; Assessment Questions TG3.14 Learning Objective TG3.4: Explain the operational model of each of the three types of cloud services. Section TG3.4: Cloud Computing Services Difficulty: Medium
15) The pricing model for intrastructure-as-a-servcice model offered by cloud computing providers is usually a per user fee. Answer: False Title; Assessment Questions TG3.15 Learning Objective TG3.4: Explain the operational model of each of the three types of cloud services. Section TG3.4: Cloud Computing Services Difficulty: Medium
16) Customers that are using software-as-a-service are not using cloud computing. Answer: False Title: Assessment Question TG3.16 Learning Objective TG3.4: Explain the operational model of each of the three types of cloud services. Section TG3.4: Cloud Computing Services Difficulty: Easy 17) Only small organizations can benefit from cloud computing.
Answer: False Title; Assessment Questions TG3.17 Learning Objective TG3.5: Identify the key benefits of cloud computing Section TG3.5: Cloud Computing Benefits. Difficulty: Medium
18) Security-issues around cloud computer center around the management of the security-based services. Answer: True Title; Assessment Questions TG3.18 Learning Objective TG3.6: Discuss the concerns and risks associated with cloud computing. Section TG3.6: Concerns and Risks with Cloud Computing Difficulty: Medium
Question Type: Multiple Choice
19) One of the advantages of a server farm is: a) It takes less than an hour to add a server to the server farm. b) Running many servers is less expensive. c) If one server fails, an application can be automatically moved to another one. d) Fewer people are required to run many machines. e) Servers can be stacked on top of one another, so less space is needed. Answer: c Title: Assessment Question TG3.19 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.. Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Medium
20) Server virtualization
a) Can function only within server farms. b) Uses software to build multiple virtual servers on the same machine. c) Requires changes to applications. d) Requires a license for each virtual server. e) Requires no additional security Answer: b Title: Assessment Question TG3.20 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.. Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Easy
21) Which of the following is not a benefit of employing server virtualization? a) Cost savings in space b) Cost savings in energy c) Cost savings in customer service d) Cost savings in maintenance e) Cost savings in personnel Answer: c Title: Assessment Question TG3.21 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.. Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Easy
22) Grid computing a) Runs an application on one server. b) Is ideal for transaction processing systems. c) Divides the processing of an application among servers. d) Does not require any special software. e) Is difficult to scale up. Answer: c Title: Assessment Question TG3.22 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing..
Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Medium
23) Which of the following is not a benefit of grid computing? a) It enables efficient use of computing resources. b) It enables applications to run faster. c) There is no single point of failure. d) It reduces the number of applications. e) It makes it easier to scale up or down. Answer: d Title: Assessment Question TG3.23 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.. Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Medium
24) Utility computing a) Is the same as grid computing. b) Is called on-demand computing. c) Can be offered by any company with excess resources. d) Charges customers a flat rate. e) Is the same as cloud computing. Answer: b Title: Assessment Question TG3.24 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.. Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Medium
25) Which of the following statements concerning cloud computing is not true? a) Users access computers in the cloud, usually via the Internet. b) The cloud includes computers, software, and a network. c) A cloud can be private or public. d) A cloud is usually a server farm. e) Data are stored on the user’s computer Answer: e
Title: Assessment Question TG3.25 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.. Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Medium
26) Which of the following is not a disadvantage of cloud computing? a) Privacy b) Security c) Reliability d) Costs e) Loss of control Answer: d Title: Assessment Question TG3.26 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.. Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Easy
27) Which of the following is not a service of cloud computing? a) Cloud infrastructure as a service b) Cloud data storage as a service c) Cloud platform as a service d) Cloud software as a service e) All of the above are services of cloud computing. Answer: b Title: Assessment Question TG3.27 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.. Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Medium 28) ______________ provides a nonexclusive IT infrastructure over the Internet. a) Public cloud computing b) Private cloud computing c) Hybrid cloud computing
d) Vertical cloud computing e) Horizontal cloud computing Answer: a Title: Assessment Question TG3.28 Learning Objective TG3.3: Identify a use-case-scenario for each of the four types of clouds. Section TG3.3: Different types of Clouds Difficulty: Medium 29) ______________ provides a exclusive IT infrastructure over an intranet. a) Public cloud computing b) Private cloud computing c) Hybrid cloud computing d) Vertical cloud computing e) Horizontal cloud computing Answer: b Title: Assessment Question TG3.29 Learning Objective TG3.3: Identify a use-case-scenario for each of the four types of clouds. Section TG3.3: Different types of Clouds Difficulty: Medium 30) ______________ provides cloud services based on security requirements. a) Public cloud computing b) Private cloud computing c) Hybrid cloud computing d) Vertical cloud computing e) Horizontal cloud computing Answer: c Title: Assessment Question TG3.30 Learning Objective TG3.3: Identify a use-case-scenario for each of the four types of clouds. Section TG3.3: Different types of Clouds Difficulty: Medium
31) ______________ provides computer resources on demand. a) Infrastructure-as-a-service model b) Platform-as-a-service model c) Software-as-a-service model
d) SOAP model Answer: a Title: Assessment Question TG3.31 Learning Objective TG3.4: Explain the operational model of each of the three types of cloud services. Section TG3.4: Cloud Computing Services Difficulty: Medium 32) ______________ handles all aspects of an application – the software, the resources to run it, and storing the data. a) Infrastructure-as-a-service model b) Platform-as-a-service model c) Software-as-a-service model d) SOAP model Answer: c Title: Assessment Question TG3.32 Learning Objective TG3.4: Explain the operational model of each of the three types of cloud services. Section TG3.4: Cloud Computing Services Difficulty: Medium 33) ______________ provides computer resources as extensions to an organization’s existing resources. a) Infrastructure-as-a-service model b) Platform-as-a-service model c) Software-as-a-service model d) SOAP model Answer: b Title: Assessment Question TG3.33 Learning Objective TG3.4: Explain the operational model of each of the three types of cloud services. Section TG3.4: Cloud Computing Services Difficulty: Medium 34) Which of the following is not a benefit of cloud computing? a) Making individuals more productive
b) Facilitating collaboration c) Reducing costs d) Responding quickly to market changes e) Reducing the need for an IT strategy Answer: e Title: Assessment Question TG3.34 Learning Objective TG3.5: Identify the key benefits of cloud computing Section TG3.5: Cloud Computing Benefits. Difficulty: Medium 35) Which of the following is not a concern or risk of cloud computing? a) Training b) Legacy systems are not easily transferable to the cloud. c) Costs d) Reliability e) Security Answer: a Title: Assessment Question TG3.35 Learning Objective TG3.5: Identify the key benefits of cloud computing Section TG3.5: Cloud Computing Benefits. Difficulty: Medium
Question Type: Essay
36) Discuss virtualization and its advantages Title: Assessment Question TG3.36 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.. Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Easy
37) Discuss grid computing and its advantages. Title: Assessment Question TG3.37
Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.. Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Easy
38) Compare and contrast grid computing and utility computing. Title: Assessment Question TG3.38 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.. Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Medium
39) Define cloud computing, and discuss its advantages and disadvantages. Title: Assessment Question TG3.39 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.. Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Medium
40) Compare and contrast cloud computing and service-oriented architecture. Title: Assessment Question TG3.40 Learning Objective 2: LO TG3.7 Explain the role of Web services in building a firm’s IT applications, providing examples. Section Reference 2: TG3.7 Emerging Software Trends Difficulty: Medium
Question Type: Multiple Choice
41) Hyo runs an ice cream store with her family. Which of the following technologies might be a good source of computing for the store? a) Server farm b) Grid computing c) Cloud computing
d) Utility computing e) Virtualization Answer: c Title: Assessment Question TG3.41 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.. Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Medium 42) Hyo runs an ice cream store with her family. Which of the following types of cloud computing would be best for the business? a) Public cloud computing b) Private cloud computing c) Hybrid cloud computing d) Vertical cloud computing e) Horizontal cloud computing Answer: a Title: Assessment Question TG3.42 Learning Objective TG3.3: Identify a use-case-scenario for each of the four types of clouds. Section TG3.3: Different types of Clouds Difficulty: Medium
43) Hyo runs an ice cream store with her family. Which of the following cloud computing services would make the most sense for the business? a) Infrastructure-as-a-service model b) Platform-as-a-service model c) Software-as-a-service model d) SOAP model Answer: c Title: Assessment Question TG3.43 Learning Objective TG3.4: Explain the operational model of each of the three types of cloud services. Section TG3.4: Cloud Computing Services Difficulty: Medium
44) Travis is the VP of Operations for a company that owns and operates six ski areas around the world. Which of the following might be a good source of computing for the company? a) Server farm b) Grid computing c) Cloud computing d) Utility computing e) Virtualization Answer: c Title: Assessment Question TG3.44 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.. Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Medium 45) Travis is the VP of Operations for a company that owns and operates six ski areas around the world. Which of the following types of cloud computing would be best for the business? a) Public cloud computing b) Hybrid cloud computing c) Vertical cloud computing d) Horizontal cloud computing Answer: b Title: Assessment Question TG3.45 Learning Objective TG3.3: Identify a use-case-scenario for each of the four types of clouds. Section TG3.3: Different types of Clouds Difficulty: Medium
46) Travis is the VP of Operations for a company that owns and operates six ski areas around the world. Their IT needs are seasonal. Which of the following cloud computing services would make the most sense for the business? a) Infrastructure-as-a-service model b) Platform-as-a-service model c) Software-as-a-service model d) SOAP model Answer: a Title: Assessment Question TG3.46
Learning Objective TG3.4: Explain the operational model of each of the three types of cloud services. Section TG3.4: Cloud Computing Services Difficulty: Medium
47) Paula owns a variety store in a tourist town. The store recently went online, and the response has been remarkable. The store’s current infrastructure is running close to capacity, so handling the influx of orders is taking much longer than it should. Which of the following suggestions might be the best solution for the company? a) Add another server to their infrastructure. b) Use grid computing to process the orders across many servers. c) Use cloud computing services. d) Use the services of a utility computing provider. e) Convert their existing servers to virtual services. Answer: a Title: Assessment Question TG3.47 Learning Objective 1: LO TG3.2 Describe the key characteristics and advantages of cloud computing.. Section Reference 1: TG3.2 What is Cloud Computing? Difficulty: Medium
48) Paula owns a variety store in a tourist town. The store recently went online, and the response has been remarkable. The store’s current infrastructure is running close to capacity, so handling the influx of orders is taking much longer than it should. Which of the following types of cloud computing would be best for the business? a) Public cloud computing b) Private cloud computing c) Vertical cloud computing d) Horizontal cloud computing Answer: b Title: Assessment Question TG3.48 Learning Objective TG3.3: Identify a use-case-scenario for each of the four types of clouds. Section TG3.3: Different types of Clouds Difficulty: Medium
49) Paula owns a variety store in a tourist town. The store recently went online, and the response has been remarkable. The store’s current infrastructure is running close to capacity, so handling the influx of orders is taking much longer than it should. Which of the following cloud computing services would make the most sense for the business? a) Infrastructure-as-a-service model b) Platform-as-a-service model c) Software-as-a-service model d) SOAP model Answer: a Title: Assessment Question TG3.49 Learning Objective TG3.4: Explain the operational model of each of the three types of cloud services. Section TG3.4: Cloud Computing Services Difficulty: Medium
Package Title: Testbank Questions Course Title: Rainer IS 5e Chapter Number: Technology Guide 4
Question Type: True/False
1) Artificial intelligence is perishable, whereas natural intelligence is permanent from an organizational point of view. Answer: False Title: Testbank Question TG4.01 Learning Objective 1: LO TG4.1 Differentiate between artificial intelligence and human intelligence. Section Reference 1: TG 4.1 Introduction to Intelligent Systems Difficulty: Easy
2) It is difficult to document the knowledge of artificial intelligence, but it is easy to document the knowledge of natural intelligence. Answer: False Title: Testbank Question TG4.02 Learning Objective 1: LO TG4.1 Differentiate between artificial intelligence and human intelligence. Section Reference 1: TG 4.1 Introduction to Intelligent Systems Difficulty: Easy
3) Expertise refers to the extensive, task-specific knowledge acquired from training, reading, and experience. Answer: True Title: Testbank Question TG4.03 Learning Objective 1: LO TG4.2 Define expert systems, and provide examples of their use. Section Reference 1: TG 4.2 Expert Systems Difficulty: Easy
4) Expert systems attempt to mimic human experts by applying expertise in a specific domain. Answer: True
Title: Testbank Question TG4.04 Learning Objective 1: LO TG4.2 Define expert systems, and provide examples of their use. Section Reference 1: TG 4.2 Expert Systems Difficulty: Easy
5) An expert system has a knowledge base and an inference engine. Answer: True Title: Testbank Question TG4.05 Learning Objective 1: LO TG4.2 Define expert systems, and provide examples of their use. Section Reference 1: TG 4.2 Expert Systems Difficulty: Easy
6) One problem with expert systems is they decrease quality. Answer: False Title: Testbank Question TG4.06 Learning Objective 1: LO TG4.2 Define expert systems, and provide examples of their use. Section Reference 1: TG 4.2 Expert Systems Difficulty: Easy
7) A neural network has two layers of interconnected nodes. Answer: False Title: Testbank Question TG4.07 Learning Objective 1: LO TG4.3 Define neural networks, and provide examples of their use. Section Reference 1: TG 4.3 Neural Networks Difficulty: Easy
8) Fuzzy logic defines subjective concepts. Answer: True Title: Testbank Question TG4.08 Learning Objective 1: LO TG4.4 Define fuzzy logic, and provide examples of its use. Section Reference 1: TG 4.4 Fuzzy Logic Difficulty: Easy
9) A genetic algorithm finds the combination of inputs that produces the best outputs. Answer: True Title: Testbank Question TG4.09 Learning Objective 1: LO TG4.5 Define genetic algorithms, and provide examples of their use. Section Reference 1: TG 4.5 Genetic Algorithms Difficulty: Easy
10) Intelligent agents use expert systems and fuzzy logic to create their behavior. Answer: True Title: Testbank Question TG4.10 Learning Objective 1: LO TG 4.6 Define intelligent agents, and provide examples of their use. Section Reference 1: TG 4.6 Intelligent Agents Difficulty: Easy
Question Type: Multiple Choice
11) Which of the following is not a characteristic of natural intelligence? a) It is perishable from an organizational point of view. b) It is easy, fast, and inexpensive. c) It is erratic and inconsistent. d) It is highly creative. e) It makes use of a wide context of experiences. Answer: b Title: Testbank Question TG4.11 Learning Objective 1: LO TG4.1 Differentiate between artificial intelligence and human intelligence. Section Reference 1: TG 4.1 Introduction to Intelligent Systems Difficulty: Medium
12) Which of the following is not a characteristic of artificial intelligence? a) It is permanent. b) It is easy, fast, and inexpensive. c) It is highly creative.
d) It tends to be effective only in narrow domains. e) It is consistent and thorough. Answer: c Title: Testbank Question TG4.12 Learning Objective 1: LO TG4.1 Differentiate between artificial intelligence and human intelligence. Section Reference 1: TG 4.1 Introduction to Intelligent Systems Difficulty: Medium
13) Expert systems: a) solve problems that are too difficult for human experts b) are based on procedural computer programming languages c) work in specific domains d) can apply to any business problem e) share characteristics with mainframe computing Answer: c Title: Testbank Question TG4.13 Learning Objective 1: LO TG4.2 Define expert systems, and provide examples of their use. Section Reference 1: TG 4.2 Expert Systems Difficulty: Medium
14) Which of the following statements is false? a) Expert systems cannot replace decision makers. b) Expert systems apply expertise in a specific domain. c) Expert systems capture the expertise from a domain expert (a person). d) Expert systems can be embedded in larger systems. e) Expert systems follow a logical path towards a recommendation. Answer: a Title: Testbank Question TG4.14 Learning Objective 1: LO TG4.2 Define expert systems, and provide examples of their use. Section Reference 1: TG 4.2 Expert Systems Difficulty: Medium
15) Which of the following is not an expert system activity?
a) Knowledge acquisition b) Knowledge domain c) Knowledge inferencing d) Knowledge representation e) Knowledge transfer Answer: b Title: Testbank Question TG4.15 Learning Objective 1: LO TG4.2 Define expert systems, and provide examples of their use. Section Reference 1: TG 4.2 Expert Systems Difficulty: Medium
16) An inference engine is: a) a data mining strategy used by intelligent agents b) the programming environment of an expert system c) a method of organizing expert system knowledge into chunks d) a methodology used to search through the rule base of an expert system e) the user interface of an expert system Answer: d Title: Testbank Question TG4.16 Learning Objective 1: LO TG4.2 Define expert systems, and provide examples of their use. Section Reference 1: TG 4.2 Expert Systems Difficulty: Medium
17) Which of the following statements concerning expert systems is false? a) The knowledge base contains facts. b) The knowledge base contains rules. c) An expert system can explain its recommendation. d) The blackboard displays the recommendation. e) Expert systems cannot learn from their own mistakes. Answer: d Title: Testbank Question TG4.17 Learning Objective 1: LO TG4.2 Define expert systems, and provide examples of their use. Section Reference 1: TG 4.2 Expert Systems Difficulty: Medium
18) Which of the following is not a benefit of expert systems? a) increased output and productivity b) capture and dissemination of scarce expertise c) increased decision-making time d) reliability e) works with incomplete, uncertain information Answer: c Title: Testbank Question TG4.18 Learning Objective 1: LO TG4.2 Define expert systems, and provide examples of their use. Section Reference 1: TG 4.2 Expert Systems Difficulty: Medium
19) Which of the following is not a limitation of expert systems? a) Expert systems cannot work with incomplete or uncertain data.ans b) A process might contain too many rules to work as an expert system. c) A process might be too vague to work as an expert system. d) Decisions made by expert systems might be a potential liability. e) Expert systems need to learn from their own mistakes. Answer: a Title: Testbank Question TG4.19 Learning Objective 1: LO TG4.2 Define expert systems, and provide examples of their use. Section Reference 1: TG 4.2 Expert Systems Difficulty: Medium
20) _____ refer(s) to computer reasoning that deals with uncertainties by simulating the process of human reasoning. a) Expert systems b) Artificial neural networks c) Speech understanding systems d) Fuzzy logic e) Computer vision systems Answer: d Title: Testbank Question TG4.20 Learning Objective 1: LO TG4.4 Define fuzzy logic, and provide examples of its use. Section Reference 1: TG 4.4 Fuzzy Logic
Difficulty: Medium
21) Fuzzy logic could be used to define which of the following terms: a) Gender b) Moderate income c) Age d) Address e) Income Answer: b Title: Testbank Question TG4.21 Learning Objective 1: LO TG4.4 Define fuzzy logic, and provide examples of its use. Section Reference 1: TG 4.4 Fuzzy Logic Difficulty: Medium
22) Which of the following is not a characteristic of genetic algorithms? a) Selection b) Crossover c) Transformation d) Mutation Answer: c Title: Testbank Question TG4.22 Learning Objective 1: LO TG4.5 Define genetic algorithms, and provide examples of their use. Section Reference 1: TG 4.5 Genetic Algorithms Difficulty: Medium
23) Which of the following statements is false? a) In genetic algorithms, crossover means combining portions of good outcomes. b) Generic algorithms are best suited for decision making where there are thousands of solutions. c) Users have to tell the generic algorithm what constitutes a “good” solution. d) In genetic algorithms, mutation means randomly trying combinations and evaluating the outcome. e) All of these statements are true. Answer: e Title: Testbank Question TG4.23
Learning Objective 1: LO TG4.5 Define genetic algorithms, and provide examples of their use. Section Reference 1: TG 4.5 Genetic Algorithms Difficulty: Medium
24) Which of the following statements is false? a) An intelligent agent is a software program. b) Intelligent agents are also called bots. c) Intelligent agents are always helpful. d) Intelligent agents use export systems and fuzzy logic. e) Intelligent agents perform repetitive computer-related tasks. Answer: c Title: Testbank Question TG4.24 Learning Objective 1: LO TG 4.6 Define intelligent agents, and provide examples of their use. Section Reference 1: TG 4.6 Intelligent Agents Difficulty: Easy
25) Which of the following statements is false? a) Information agents search for information and store it for the user. b) Information agents are used by Google to surf the Web sites in Google’s index. c) Monitoring-and-surveillance agents are also called predictive agents. d) Personal agents take action on behalf of the user. e) User agents automatically fill out forms on the Web from stored information. Answer: a Title: Testbank Question TG4.25 Learning Objective 1: LO TG 4.6 Define intelligent agents, and provide examples of their use. Section Reference 1: TG 4.6 Intelligent Agents Difficulty: Easy
Question Type: Essay
26) Compare and contrast expert systems and intelligent agents. Title: Testbank Question TG4.26 Learning Objective 1: LO TG4.3 Define neural networks, and provide examples of their use. Learning Objective 2: LO TG4.4 Define fuzzy logic, and provide examples of its use. Section Reference 1: TG 4.3 Neural Networks
Section Reference 2: TG 4.4 Fuzzy Logic Difficulty: Medium
27) How are neural networks useful to businesses? Title: Testbank Question TG4.27 Learning Objective 1: LO TG4.3 Define neural networks, and provide examples of their use. Learning Objective 2: LO TG4.4 Define fuzzy logic, and provide examples of its use. Section Reference 1: TG 4.3 Neural Networks Section Reference 2: TG 4.4 Fuzzy Logic Difficulty: Medium
28) How are intelligent agents useful to businesses? Title: Testbank Question TG4.28 Learning Objective 1: LO TG4.3 Define neural networks, and provide examples of their use. Learning Objective 2: LO TG4.4 Define fuzzy logic, and provide examples of its use. Section Reference 1: TG 4.3 Neural Networks Section Reference 2: TG 4.4 Fuzzy Logic Difficulty: Medium
29) Compare and contrast fuzzy logic and neural networks. Title: Testbank Question TG4.29 Learning Objective 1: LO TG4.3 Define neural networks, and provide examples of their use. Learning Objective 2: LO TG4.4 Define fuzzy logic, and provide examples of its use. Section Reference 1: TG 4.3 Neural Networks Section Reference 2: TG 4.4 Fuzzy Logic Difficulty: Medium
30) What are the advantages and disadvantages of artificial intelligence systems? Title: Testbank Question TG4.30 Learning Objective 1: LO TG4.1 Differentiate between artificial intelligence and human intelligence. Section Reference 1: TG 4.1 Introduction to Intelligent Systems Difficulty: Hard
31) Describe how your university could use an expert system in its admissions process. Title: Testbank Question TG4.31
Learning Objective 1: LO TG4.2 Define expert systems, and provide examples of their use. Section Reference 1: TG 4.2 Expert Systems Difficulty: Hard
32) Contrast the three types of intelligent agents and give examples of how they might be used in business. Title: Testbank Question TG4.32 Learning Objective 1: LO TG 4.6 Define intelligent agents, and provide examples of their use. Section Reference 1: TG 4.6 Intelligent Agents Difficulty: Hard
Question Type: Multiple Choice
33) Hyo runs an ice cream shop with her family. They need to train someone to close the store at the end of day. This process is an example of which type of intelligent system? a) Expert systems b) Neural network c) Fuzzy logic d) Genetic algorithms e) Intelligent agent Answer: a Title: Testbank Question TG4.33 Learning Objective 1: LO TG4.2 Define expert systems, and provide examples of their use. Section Reference 1: TG 4.2 Expert Systems Difficulty: Medium
34) Hyo runs an ice cream shop with her family. They have configured their computer to put any e-mail that contains the word “order” into a folder called Possible Orders. This process is an example of which type of intelligent system? a) Expert systems b) Neural network c) Fuzzy logic d) Genetic algorithms e) Intelligent agent Answer: e
Title: Testbank Question TG4.34 Learning Objective 1: LO TG 4.6 Define intelligent agents, and provide examples of their use. Section Reference 1: TG 4.6 Intelligent Agents Difficulty: Medium
35) Hyo runs an ice cream shop with her family. They just started letting customers fax in their ice cream orders. Sometimes the writing is hard to read, and Hyo’s family has to guess what the customers have ordered based on what flavors the shop has. This process is an example of which type of intelligent system? a) Expert systems b) Neural network c) Fuzzy logic. d) Genetic algorithms e) Intelligent agent. Answer: c Title: Testbank Question TG4.35 Learning Objective 1: LO TG 4.6 Define intelligent agents, and provide examples of their use. Section Reference 1: TG 4.6 Intelligent Agents Difficulty: Medium