Management Information Systems, Moving Business Forward Test Bank

Page 1

Management Information Systems, Moving Business Forward By

Rainer, Watson


Package Title: Assessment Questions Course Title: MIS 1e Chapter Number: 1

Question Type: True/False

1) An information system collects, processes, stores, analyzes, and disseminates information for a specific purpose using a computer. Answer: False Title: Assessment Question 1.01 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

2) Information technology refers to computer-based tools used to support the needs of an organization Answer: True Title: Assessment Question 1.02 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

3) IT is enabling more and more people to communicate, collaborate, and compete, thereby leveling the digital playing field. Answer: False Title: Assessment Question 1.03 Learning Objective 1: LO 1.0.1 Provide a real-world application of the value of becoming an informed user of information systems. Section Reference 1: Introduction Difficulty: Easy


4) You do not have to work in the IT department to benefit from learning about IT Answer: True Title: Assessment Question 1.04 Learning Objective 1: LO 1.0.1 Provide a real-world application of the value of becoming an informed user of information systems. Section Reference 1: Introduction Difficulty: Easy 5) An informed user of IT can enhance his or her organization’s competitive position. Answer: True Title: Assessment Question 1.05 Learning Objective 1: LO 1.1 Begin the process of becoming an informed user of your organizations’ information systems. Section Reference 1: 1.1 Why Should I Study Information Systems? Difficulty: Easy

6) Managing the IS function within an organization is the exclusive responsibility of the IS department. Answer: False Title: Assessment Question 1.06 Learning Objective 1: LO 1.1 Begin the process of becoming an informed user of your organizations’ information systems. Section Reference 1: 1.1 Why Should I Study Information Systems? Difficulty: Medium

7) A systems analyst focuses on designing specifications for new technology. Answer: True Title: Assessment Question 1.07 Learning Objective 1: LO 1.1 Begin the process of becoming an informed user of your organizations’ information systems. Section Reference 1: 1.1 Why Should I Study Information Systems? Difficulty: Easy


8) An auditing manager focuses on the ethical and legal use of information systems. Answer: True Title: Assessment Question 1.08 Learning Objective 1: LO 1.1 Begin the process of becoming an informed user of your organizations’ information systems. Section Reference 1: 1.1 Why Should I Study Information Systems? Difficulty: Medium

9) End-user computer refers to a group of end users working together to manage their interactions with a computer. Answer: False Title: Assessment Question 1.09 Learning Objective 1: LO 1.1 Begin the process of becoming an informed user of your organizations’ information systems. Section Reference 1: 1.1 Why Should I Study Information Systems? Difficulty: Easy

10) Information technology and information systems are the same thing. Answer: False Title: Assessment Question 1.10 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

11) In general, informed users tend to get more value from whatever technologies they use. Answer: True Title: Assessment Question 1.11 Learning Objective 1: LO 1.1 Begin the process of becoming an informed user of your organizations’ information systems. Section Reference 1: 1.1 Why Should I Study Information Systems?


Difficulty: Medium

12) A combination of your high school grades, application essays, letters of recommendation, and Scholastic Aptitude Test (SAT) scores would be considered information. Answer: True Title: Assessment Question 1.12 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

13) A university registrar who uses her experience with university admissions along with your high school grades, application essays, letters of recommendation, and Scholastic Aptitude Test (SAT) scores, would be applying her knowledge in your application process. Answer: True Title: Assessment Question 1.13 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

14) A list of football scores with the names of the teams that played the games would be considered information. Answer: True Title: Assessment Question 1.14 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy


15) Information technology deals with the planning, development, management, and use of management information tools to help people perform all the tasks related to information processing and management. Answer: False Title: Assessment Question 1.15 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy 16) A student’s decision to drop one course and add another would be considered a transaction to the university’s information system but not to its accounting system. Answer: True Title: Assessment Question 1.16 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

17) An ERP system is an interorganizational information system. Answer: False Title: Assessment Question 1.17 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium 18) An organization’s supply chain starts at the supplier and ends at the customer.


Answer: True Title: Assessment Question 1.18 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

19) E-commerce systems are a type of interorganizational information systems. Answer: True Title: Assessment Question 1.19 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium 20) An organization’s IT platform consists of the IT components and IT services. Answer: False Title: Assessment Question 1.20 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

21) IT personnel use the IT infrastructure to develop information systems. Answer: False Title: Assessment Question 1.21 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application.


Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

22) Information is data that have been organized to provide value. Answer: True Title: Assessment Question 1.22 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

23) Knowledge is data that have been organized to convey accumulated learning. Answer: False Title: Assessment Question 1.23 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

24) Digital dashboards are special information systems that that support all managers of the organization. Answer: True Title: Assessment Question 1.24 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

25) The two major determinants of information systems support are the functions that employees perform within organizations and the cost of the information systems.


Answer: False Title: Assessment Question 1.25 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

26) Information systems tend to follow the structure of organizations and they are based on the needs of employees. Answer: True Title: Assessment Question 1.26 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

27) Software is a set of programs that enable the hardware to process data. Answer: True Title: Assessment Question 1.27 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

28) Procedures are the set of instructions about how to use information systems to process information and generate desired output. Answer: True Title: Assessment Question 1.28


Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

29) Enterprise resource planning systems tightly integrate the functional area information systems via a common database. Answer: True Title: Assessment Question 1.29 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

30) Transaction processing systems tightly integrate the functional area information systems via a common database. Answer: False Title: Assessment Question 1.30 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy 31) Transaction processing systems provide the input for the organization’s databases. Answer: True Title: Assessment Question 1.31 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems


Difficulty: Easy 32) An organization’s supply chain describes the flow of materials, information, money, and services from raw material suppliers through factories and warehouses to the end customers. Answer: True Title: Assessment Question 1.32 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

33) Supply chains are composed of only physical product flows. Answer: False Title: Assessment Question 1.33 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

34) If you order a computer from Dell, the process of approving your credit card is an information flow along Dell’s supply chain. Answer: True Title: Assessment Question 1.34 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy


35) Functional area information systems summarize data and prepare reports, and provide the major support for middle-level managers. Answer: True Title: Assessment Question 1.35 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

36) Lower level managers make tactical decisions, which generally deal with activities such as short-term planning, organizing, and control. Answer: False Title: Assessment Question 1.36 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

37) Dashboards provide rapid access to timely information and direct access to structured information in the form of reports. Answer: True Title: Assessment Question 1.37 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

38) Information technology makes managers more productive. Answer: True


Title: Assessment Question 1.38 Learning Objective 1: LO 1.4 List three positive and three negative societal effects of the increased use of information technology. Section Reference 1: 1.4 Why Are Information Systems Important to Society? Difficulty: Easy

39) Information technology increases the number of employees who can report to a single manager. Answer: True Title: Assessment Question 1.39 Learning Objective 1: LO 1.4 List three positive and three negative societal effects of the increased use of information technology. Section Reference 1: 1.4 Why Are Information Systems Important to Society? Difficulty: Easy

40) As computers gain in intelligence and capabilities, the competitive advantage of replacing people with machines is decreasing rapidly. Answer: False Title: Assessment Question 1.40 Learning Objective 1: LO 1.4 List three positive and three negative societal effects of the increased use of information technology. Section Reference 1: 1.4 Why Are Information Systems Important to Society? Difficulty: Easy

41) End user computing is when employees directly use computers in their work. Answer: True Title: Assessment Question 1.41 Learning Objective 1: LO 1.1 Begin the process of becoming an informed user of your organizations’ information systems. Section Reference 1: Managing Information Resources Difficulty: Easy

Question Type: Multiple Choice

42) Which of the following is not a benefit of being an informed user of IT?


a) Understanding what is “behind” applications you use in your organization. b) Providing input to enhance your organization’s applications c) Helping to select new applications d) Keeping abreast of new technologies e) Working in the IT side of the organization. Answer: e Title: Assessment Question 1.42 Learning Objective 1: LO 1.1 Begin the process of becoming an informed user of your organizations’ information systems. Section Reference 1: 1.1 Why Should I Study Information Systems? Difficulty: Easy

43) The title of the executive who is in charge of the people who design and build information systems, the people who use those systems, and the people responsible for managing those systems is the a) CEO b) CFO c) CIO d) CIS e) CIT Answer: c Title: Assessment Question 1.43 Learning Objective 1: LO 1.1 Begin the process of becoming an informed user of your organizations’ information systems. Section Reference 1: 1.1 Why Should I Study Information Systems? Difficulty: Easy

44) What does a systems analyst do? a) Manages an IS service b) Writes computer code. c) Interfaces between end users and programmers d) Forecasts technology trends e) Creates Web sites and pages Answer: c Title: Assessment Question 1.44


Learning Objective 1: LO 1.1 Begin the process of becoming an informed user of your organizations’ information systems. Section Reference 1: 1.1 Why Should I Study Information Systems? Difficulty: Medium

45) Which of the following statements concerning the management of information resources is not true? a) They have an enormous strategic value within an organization and therefore are relied on. b) Information systems are expensive to acquire, operate, and maintain. c) Computers are decentralized throughout the organization, which makes it harder to manage. d) Managing mainframes has become more difficult. e) Managing information resources is divided between the MIS department and end users. Answer: d Title: Assessment Question 1.45 Learning Objective 1: LO 1.1 Begin the process of becoming an informed user of your organizations’ information systems. Section Reference 1: 1.1 Why Should I Study Information Systems? Difficulty: Easy

46) Which of the following is the correct hierarchy from the lowest level to the highest level? a) knowledge, information, data b) information, data, knowledge c) data, information, knowledge d) data, information, experience e) information, experience, wisdom Answer: c Title: Assessment Question 1.46 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium


47) _____ conveys understanding, accumulated learning, and expertise as they apply to a current problem. a) Data b) Information c) Knowledge d) Experience e) Wisdom Answer: c Title: Assessment Question 1.47 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

48) _____ is (are) data that have been organized to have meaning and value to a recipient. a) Insights b) Information c) Knowledge d) Experience e) Wisdom Answer: b Title: Assessment Question 1.48 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

49) The list of all your purchases from Amazon (books bought, price paid, dates) is defined as ___________. a) data b) information


c) knowledge d) experience e) wisdom Answer: b Title: Assessment Question 1.49 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

50) If Amazon uses a list of all your purchases (books bought, price paid, dates) to recommend other books to you, then it is applying its _____. a) data b) information c) knowledge d) experience e) wisdom Answer: c Title: Assessment Question 1.50 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

51) A listing of all courses offered at your university would be considered _____, whereas a listing of all courses required in your major would be considered _____. a) information, data b) knowledge, information c) information, knowledge d) data, information e) data, knowledge Answer: d


Title: Assessment Question 1.51 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

52) You are registering for the next semester at your university. You take into account your major, the courses you need, the prerequisites for each course, the times you take each course, and the professors teaching each section, as well as your work schedule. You are using _____ to select your class schedule. a) information b) knowledge c) experience d) wisdom e) data Answer: b Title: Assessment Question 1.52 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

53) A purchase of books in the college bookstore is ___________. The report at the end of the day showing sales totals for the day is ____________. a) information, knowledge b) information, data c) data, information d) data, database e) data item, business intelligence Answer: c Title: Assessment Question 1.53 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each.


Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium 54) An organization’s information technology architecture: a) provides a guide for current operations. b) provides a blueprint for future directions. c) integrates the information requirements of the organization and all users. d) is analogous to the architecture of a house. e) all of these Answer: e Title: Assessment Question 1.54 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy 55) An organization’s IT components include all of the following except: a) a network. b) programs c) procedures d) a database e) monitors Answer: c Title: Assessment Question 1.55 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

56) A(n) _____________ is a computer program designed to support a specific task or business process.


a) Interface b) Application c) Functional area d) Network e) Database Answer: b Title: Assessment Question 1.56 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

57) _____ is/are the computer hardware, software, and communications technologies that are used by IT personnel to produce IT services. a) IT components b) IT services c) Information technology d) An information system e) A computer-based information system Answer: a Title: Assessment Question 1.57 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy 58) An organization’s _____ consists of the physical facilities, IT components, IT services, and IT management that will support the entire organization. a) information technology architecture b) information technology infrastructure c) information technology d) information system e) computer-based information system


Answer: b Title: Assessment Question 1.58 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

59) IT personnel use _____ to produce _____. a) IT components, IT services b) computer-based information systems, IT architecture c) IT infrastructure, IT architecture d) IT infrastructure, IT platform e) IT components, IT architecture Answer: a Title: Assessment Question 1.59 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

60) The IT infrastructure is comprised of _______ and ________. a) IT components, IT personnel b) IT components, IT services c) IT services, IT personnel d) IT personnel, computer-based information systems e) Computer-based information systems, IT personnel Answer: b Title: Assessment Question 1.60 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application.


Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

61) Which of the following statements is false? a) An application is a computer program designed to support a specific business process. b) Each functional area within an organization has only one application. c) A functional area information system is the same as a departmental information system. d) A functional area information system can obtain data from other functional area information systems. e) App, application, and application program all mean the same thing. Answer: b Title: Assessment Question 1.61 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

62) Enterprise resource planning systems a) were designed to process transactions faster. b) evolved because newer technologies made older systems obsolete. c) use a common database for all functional areas. d) are utilized to conduct site analyses. e) All the above statements are true. Answer: c Title: Assessment Question 1.62 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

63) Knowledge workers


a) handle day-to-day operations within an organization. b) make tactical decisions. c) advise middle managers d) make routine decisions. e) are generalists Answer: c Title: Assessment Question 1.63 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

64) Office automation systems a) support only the clerical staff. b) are comprised of software that is used to develop documents and spreadsheets c) include report generators. d) are a type of interorganizational system. e) are usually developed in-house. Answer: c Title: Assessment Question 1.64 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Hard

65) ___________ include B2B and B2C. a) Enterprise resource planning systems b) Computer-based information systems c) Functional area information systems d) Interorganizational information systems Answer: c Title: Assessment Question 1.65


Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

66) A collection of related files, tables, and so on that stores data and the associations among them is _____. a) hardware b) software c) a database d) a network e) procedures Answer: c Title: Assessment Question 1.66 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

67) A set of programs that enable the hardware to process data is _____. a) hardware b) software c) a database d) a network e) procedures Answer: b Title: Assessment Question 1.67 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy


68) Two information systems that support the entire organization are: a) enterprise resource planning systems, dashboards b) transaction processing systems, office automation systems c) enterprise resource planning systems, transaction processing systems d) expert systems, office automation systems e) expert systems, transaction processing systems Answer: c Title: Assessment Question 1.68 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

69) _____ systems are designed to correct a lack of communications among _____. a) Office automation systems, expert systems b) Transaction processing systems, functional area information systems c) Enterprise resource planning systems, functional area information systems d) Dashboards, office automation systems e) Functional area information systems, enterprise resource planning systems Answer: c Title: Assessment Question 1.69 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

70) When your purchases are swiped over the bar-code reader at the point-of-sale terminals at Wal-Mart, a _____ records the data. a) transaction processing system b) functional area information system c) dashboard d) enterprise resource planning system


e) office automation system Answer: a Title: Assessment Question 1.70 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

71) Supply chain systems are which type of information system? a) departmental information systems b) enterprisewide information systems c) interorganizational information systems d) end-user computing systems e) individual information systems Answer: c Title: Assessment Question 1.71 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

72) Which information system is the most closely associated with the Internet? a) transaction processing systems b) functional area information systems c) electronic commerce systems d) office automation systems e) individual information systems Answer: c Title: Assessment Question 1.72 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each.


Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Easy

73) _____ attempt to duplicate the work of human experts by applying reasoning capabilities. a) Expert systems b) Dashboards c) Functional area information systems d) Decision support systems e) Business intelligence systems Answer: a Title: Assessment Question 1.73 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: Types of Computer-Based Information Systems Difficulty: Easy

74) An information system that analyzes credit card applications and suggests approval or denial is a(n): a) expert system b) dashboard c) functional area information system d) decision support system e) business intelligence system Answer: a Title: Assessment Question 1.74 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: Types of Computer-Based Information Systems Difficulty: Medium


75) Which of the following statements is false? a) IT ultimately decreases the number of managers and experts. b) IT makes managers more productive. c) IT increases the number of employees who can report to a single manager. d) IT reduces stress by giving managers more time to make decisions. e) IT decreases the number of promotional opportunities. Answer: d Title: Assessment Question 1.75 Learning Objective 1: LO 1.3 Discuss three ways in which information technology can impact managers and three ways in which it can impact non-managerial workers. Section Reference 1: 1.3 How Does IT Impact Organizations? Difficulty: Medium

76) Which of the following statements about the potential impact of IT on nonmanagerial workers is true? a) IT will create more jobs than it eliminates. b) Employees will feel a higher degree of loyalty towards their company. c) IT could cause employees to experience a loss of identity. d) The flexibility of IT can minimize stress on the job. Answer: c Title: Assessment Question 1.76 Learning Objective 1: LO 1.3 Discuss three ways in which information technology can impact managers and three ways in which it can impact non-managerial workers. Section Reference 1: 1.3 How Does IT Impact Organizations? Difficulty: Medium

77) Which of the following statements about your future role as a manager is false? a) The people I manage will likely be dispersed geographically. b) The size of my team will likely be smaller than teams of today. c) There will be less emphasis on office politics. d) Many of my decisions will be “real time”. e) I will need IT tools to handle the data I utilize to make decisions. Answer: b Title: Assessment Question 1.77


Learning Objective 1: LO 1.3 Discuss three ways in which information technology can impact managers and three ways in which it can impact non-managerial workers. Section Reference 1: 1.3 How Does IT Impact Organizations? Difficulty: Medium 78) Which of the following statements about IT’s role in society is false? a) IT has created employee flexibility. b) Robots can do many routine tasks. c) Robots can handle unfamiliar situations. d) IT can be used to help doctors diagnose diseases. e) Telepresence robots can act as the eyes and ears of a business manager. Answer: c Title: Assessment Question 1.78 Learning Objective 1: LO 1.4 List three positive and three negative societal effects of the increased use of information technology. Section Reference 1: 1.4 Why Are Information Systems Important to Society? Difficulty: Medium 79) Refer to Opening Case – E-Mealz: Which of the following statements is false? a) Jane could run E-Mealz just as efficiency without technology. b) Jane uses social network sites to promote her business. c) Customers can submit recipes to E-Mealz’s database. d) Customers receive a weekly meal plan and grocery list. e) E.E-Mealz provides nutritional information. Answer: a Title: Assessment Question 1.79 Learning Objective 1: LO 1.0.1 Provide a real-world application of the value of becoming an informed user of information systems. Learning Objective 2: LO 1.0.2 Identify three ways in which you depend on information technology in your daily life. Section Reference 1: Opening Case: E-Mealz Difficulty: Medium 80) Refer to IT’s About Business Section Reference 1: 1.1 – Build Your Own Multinational Company: A digital nomad is a) someone who moves from office to office.


b) someone who uses IT to work remotely. c) someone who lives outside the United States. d) someone who works anonymously. e) someone who has no IT costs. Answer: b Title: Assessment Question 1.80 Learning Objective 1: LO 1.1 Begin the process of becoming an informed user of your organizations’ information systems. Section Reference 1: IT’s About Business 1.1 Difficulty: Medium 81) Refer to IT’s About Business 1.2 – Electronic E-Discovery Software Replaces Lawyers: E-discovery a) is still largely in the experimental stage. involves analyzing files in a law firm. b) searches vast numbers of documents for relevant information. c) does not have any more features than a search engine. d) cannot review e-mails or chat conversations. e) cannot recognize changes in behavior. Answer: b Title: Assessment Question 1.81 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: IT’s About Business 1.2 Difficulty: Medium 82) Refer to Closing Case #1– Revolution! – The revolutions in Tunisia and Egypt a) Succeeded despite a lack of connectivity among protestors. b) Were masterminded by IT programmers. c) Relied heavily on social networks. d) Were carried out by politicians. e) Gained most of their support from older, more experienced segments of the population. Answer: c Title: Assessment Question 1.82


Learning Objective 1: LO 1.5 Summarize the fundamental concepts and skills related to the impact of information systems on individuals, organizations, and society. Section Reference 1: Closing Case 1: Revolution Difficulty: Medium 83) Refer to Closing Case #2– L’Oreal Retools its Information Systems – Which of the following was not a consequence of integrating L’Oreal’s SAP ERP system with FLEXNet? a) ISIS supports all faculty processes while promoting best practices. b) Master data are stored in the company’s central headquarters. c) Upgrades take much less time. d) Quality control has improved. e) Shop workers found the new system stressful. Answer: e Title: Assessment Question 1.83 Learning Objective 1: LO 1.5 Summarize the fundamental concepts and skills related to the impact of information systems on individuals, organizations, and society. Section Reference 1: Closing Case 2: L’Oréal Retools Its Information Systems Difficulty: Medium

Question Type: Short Answer

84) Differentiate between information systems and information technology. Title: Assessment Question 1.84 Learning Objective 1: LO 1.1 Begin the process of becoming an informed user of your organizations’ information systems. Section Reference 1: 1.1 Why Should I Study Information Systems? Difficulty: Medium

85) Differentiate among data, information, and knowledge. Title: Assessment Question 1.85 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium


86) Differentiate between information technology and information technology infrastructure. Title: Assessment Question 1.86 Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

87) Discuss why information systems and information technologies are integral to your lives. Title: Assessment Question 1.87 Learning Objective 1: LO 1.1 Begin the process of becoming an informed user of your organizations’ information systems. Section Reference 1: 1.1 Why Should I Study Information Systems? Difficulty: Medium

88) Discuss three ways in which information technology can impact managers. Title: Assessment Question 1.88 Learning Objective 1: LO 1.3 Discuss three ways in which information technology can impact managers and three ways in which it can impact non-managerial workers. Section Reference 1: 1.3 How Does IT Impact Organizations? Difficulty: Medium

Question Type: Essay

89) Explain how information technology impacts individuals, organizations, and the world. Support your answer with concrete examples. Title: Assessment Question 1.89 Learning Objective 1: LO 1.5 Summarize the fundamental concepts and skills related to the impact of information systems on individuals, organizations, and society. Section Reference 1: Chapter 1 Difficulty: Medium


90) Discuss three positive and three negative societal effects of the increased use of information technology. Title: Assessment Question 1.90 Learning Objective 1: LO 1.4 List three positive and three negative societal effects of the increased use of information technology. Section Reference 1: 1.4 Why Are Information Systems Important to Society? Difficulty: Medium

Question Type: Multiple Choice

91) You have just been hired by the largest manufacturer in your area to join their management trainee program. You enjoyed your “computer course” in college and hope that you’ll be able to put that knowledge to good use. Which of the following might you expect to do during the management training program? a) Code a new application b) Recommend new technologies that might impact the organization c) Design a new application d) Become familiar with tools to support using data for decision making e) Work 9-5 in your office. Answer: d Title: Assessment Question 1.91 Learning Objective 1: LO 1.5 Summarize the fundamental concepts and skills related to the impact of information systems on individuals, organizations, and society. Section Reference 1: Chapter 1 Difficulty: Medium

92) As a manager in your company, you expect to retrieve ______ from operational systems and present it as _________ to your boss, who will react based on his ____________. a) knowledge, information, data b) information, data, knowledge c) data, information, knowledge d) data, information, experience e) information, experience, wisdom Answer: c Title: Assessment Question 1.92


Learning Objective 1: LO 1.2.1 Define the terms data, information, and knowledge, and give examples of each. Learning Objective 2: LO 1.2.2 Define the terms information technology, information system, computer-based information system, and application. Section Reference 1: 1.2 Overview of Computer-Based Information Systems Difficulty: Medium

93) In your new position, you are told that you will be working with a business analyst. What would you expect this work to entail? a) Review computer code b) Explain the business process c) Test programs d) Identify new technology that might benefit the organization e) Create Web sites and pages Answer: b Title: Assessment Question 1.93 Learning Objective 1: LO 1.1 Begin the process of becoming an informed user of your organizations’ information systems. Section Reference 1: 1.1 Why Should I Study Information Systems? Difficulty: Medium


Package Title: Assessment Questions Course Title: MIS 1e Chapter Number: 2

Question Type: True/False

1) Competitive advantage refers to making higher profits. Answer: False Title: Assessment Question 2.01 Learning Objective 1: LO 2.0 Provide a real-world application of how information systems can contribute to organizational strategies and competitive advantage. Section Reference 1: Opening Case: Before the Stores Difficulty: Easy

2) The business environment refers to the industry that a company is in. Answer: False Title: Assessment Question 2.02 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

3) Globalization is the integration and interdependence of many facets of life made possible by rapid advances in information technology. Answer: True Title: Assessment Question 2.03 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

4) The information technology environment is the combination of social, legal, economic, physical, and political factors that affect business activities.


Answer: False Title: Assessment Question 2.04 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

5) In general, labor costs are higher in developed countries than in developing countries. Answer: True Title: Assessment Question 2.05 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

6) Developed countries usually provide greater fringe benefits than developing countries. Answer: True Title: Assessment Question 2.06 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

7) Information technology is facilitating the entry of a wide variety of employees into the workforce. Answer: True Title: Assessment Question 2.07 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy


8) Internet access in the United States is not particularly related to household income. Answer: False Title: Assessment Question 2.08 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

9) In general, government deregulation decreases competition. Answer: False Title: Assessment Question 2.09 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

10) Ethical issues are important because, if handled poorly, they can damage an organization’s image. Answer: True Title: Assessment Question 2.10 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

11) Build-to-stock is a strategy of producing customized products and services. Answer: False Title: Assessment Question 2.11 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each.


Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

12) In mass production, a company produces a large quantity of identical items. Answer: True Title: Assessment Question 2.12 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

13) In mass customization, companies produce items in large quantity, but they tailor the items to meet the desires and needs of individual customers. Answer: True Title: Assessment Question 2.13 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

14) Customer intimacy is the process whereby a business learns as much as possible about its customers to better anticipate and address their needs. Answer: True Title: Assessment Question 2.14 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

15) A growing IT initiative called green IT is enabling organizations to reduce their carbon footprint.


Answer: True Title: Assessment Question 2.15 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

16) The digital divide is the gap between data and knowledge. Answer: False Title: Assessment Question 2.16 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

17) The One Laptop per Child project aims to use technology to revolutionize how the world can educate its children. Answer: True Title: Assessment Question 2.17 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

18) Competitive advantage helps a company function effectively within a market and generate larger-than-average profits. Answer: True Title: Assessment Question 2.18 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems


Difficulty: Easy

19) An information system that helps an organization gain a competitive advantage is called a competitive information system. Answer: False Title: Assessment Question 2.19 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Easy

20) Every competitive organization is driven by the competitive forces identified by Michael Porter. Answer: True Title: Assessment Question 2.20 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Easy

21) Michael Porter concludes that the overall impact of the Internet is to increase competition, which generally diminishes a firm’s profitability. Answer: True Title: Assessment Question 2.21 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Easy

22) The Internet increases traditional barriers to entry into a market.


Answer: False Title: Assessment Question 2.22 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Easy 23) The Internet decreases customers’ bargaining power. Answer: False Title: Assessment Question 2.23 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Easy

24) Information-based industries face the greatest threat from substitutes. Answer: True Title: Assessment Question 2.24 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Easy

25) The music industry is a good example of the extremely low variable costs of digital products. Answer: True Title: Assessment Question 2.25 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one.


Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Easy

26) The introduction of the ATM in the banking industry is an example of the innovation strategy. Answer: True Title: Assessment Question 2.26 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Easy

27) An entry barrier is a long-term competitive advantage. Answer: False Title: Assessment Question 2.27 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Easy

28) The bargaining power of suppliers is low when their buyers have many choices. Answer: True Title: Assessment Question 2.28 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Easy


29) Ted works in his family’s bakery business. They supply bread and rolls to neighboring restaurants, and they have their own-store front where they sell breads, rolls, pastries, cookies and cupcakes. Ted wants to build a web site for the business that will allow customers to order cookies and cupcakes for later pickup. Is this idea a) A strategic information system b) In alignment with the business. c) in support of a cost leadership strategy d) likely to provide long term competitive advantage e) a support activity within the value chain Answer: b Title: Assessment Question 2.29 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium

30) When there are many substitute products, a company can create a competitive advantage by increasing fees. Answer: False Title: Assessment Question 2.30 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Easy 31) Porter’s value chain model is a variation of his competitive advantage framework. Answer: False Title: Assessment Question 2.31 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems


Difficulty: Easy

32) The primary activities in the value chain create the value for which customers are willing to pay. Answer: True Title: Assessment Question 2.32 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Easy 33) It’s a good idea for a company to select two competitive advantage strategies. Answer: False Title: Assessment Question 2.33 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Easy

Question Type: Multiple Choice

34) Which of the following statements is false? a) Competitive advantage is based on some measurement such as cost, quality, or speed. b) Competitive advantage enables a company to function effectively within a market. c) Competitive advantage leads to higher-than-average profits. d) Competitive advantage requires the use of technology. e) Competitive advantage applies to companies of all sizes. Answer: d Title: Assessment Question 2.34 Learning Objective 1: LO 2.0 Provide a real-world application of how information systems can contribute to organizational strategies and competitive advantage.


Section Reference 1: Opening Case: Before the Stores Difficulty: Easy

35) Business pressures on organizations are created when there are changes in a) Social factors b) Economic factors c) Legal factors d) Political factors e) Changes in all of these will create business pressures. Answer: e Title: Assessment Question 2.35 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

36) Market pressures include which of the following? a) the global economy b) weak competition c) a homogeneous workforce d) weak customers e) high-cost offshore labor Answer: a Title: Assessment Question 2.36 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

37) The workforce in developed countries is exhibiting all of the following trends except: a) It is becoming more diversified. b) It includes more women. c) It includes more single parents. d) It includes fewer persons with disabilities.


e) It includes more minority-group members. Answer: d Title: Assessment Question 2.37 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy 38) Today’s customers have ________ . a) less knowledge about products b) less sophistication c) difficulty in finding information about products d) higher expectations e) difficulty in comparing prices Answer: d Title: Assessment Question 2.38 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

39) Which of the following statements concerning technology pressures on modern businesses is true? a) Technology changes so rapidly that organizations should wait before they release new technology-based products. b) New technologies offer alternative service options. c) New technologies will never replace existing technologies. d) The amount of information on the Internet remains stable from year to year. e) The important information on the Internet is fee-based. Answer: b Title: Assessment Question 2.39 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support


Difficulty: Easy

40) Which of the following is not an example of the growing initiative called green IT? a) Designing an IT infrastructure to support sustainability. b) Building systems that monitor carbon throughout the organization. c) Asking vendors about compliance on environmental standards. d) Building computer applications that use less energy e) Designing energy-efficient data centers. Answer: d Title: Assessment Question 2.40 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

41) The digital divide is an example of which type of societal pressure? a) social responsibility b) government regulations c) protection against terrorism d) ethics e) information overload Answer: a Title: Assessment Question 2.41 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

42) Which one of the following statements is false? a) Businesses tend to view government regulations as expensive constraints on their activities. b) Government deregulation reduces competition. c) IT support is essential for compliance with many new regulations. d) IT has been used to identify patterns of behavior associated with terrorist activities.


e) Information ethics can destroy the morale of a company’s employees. Answer: b Title: Assessment Question 2.42 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

43) Which of the following is not a response by organizations to business pressures? a) Delay releases of innovated products. b) Build strategic systems that enable an organization to increase market share or profits. c) Provide tools that satisfy customers so they don’t go to a competitor. d) Manufacture customized goods at a lower cost. e) Conduct business electronically with customers and business partners. Answer: a Title: Assessment Question 2.43 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Medium

44) Producing identical items in large quantities is called: a) strategic systems. b) customer focus. c) continuous improvement. d) mass production. e) mass customization. Answer: d Title: Assessment Question 2.44 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy


45) Producing customized items in large quantities is called: a) strategic systems. b) customer focus. c) continuous improvement. d) mass production. e) mass customization. Answer: e Title: Assessment Question 2.45 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Easy

46) The Bodymetrics body scanner is best characterized as an example of: a) mass production. b) customer focus. c) real-time customer input. d) mass customization. e) continuous improvement. Answer: d Title: Assessment Question 2.46 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Medium 47) Information-based industries are most susceptible to which one of Porter’s five forces? a) threat of entry of new competitors b) bargaining power of suppliers c) bargaining power of customers d) threat of substitute products e) rivalry among existing firms in an industry


Answer: d Title: Assessment Question 2.47 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium

48) Competitive advantage for an organization manifests itself as all of the following except: a) Lower costs b) Higher quality c) Increased time to market d) Increased profits e) Increased speed Answer: c Title: Assessment Question 2.48 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium

49) For most companies, the Web _____ the threat that new competitors will enter the market by _____ traditional barriers to entry. a) decreases, increasing b) increases, decreasing c) increases, increasing d) decreases, decreasing Answer: b Title: Assessment Question 2.49 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one.


Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium

50) _____ is a feature that must be offered by a competing organization in order to survive in the marketplace. a) Competitive advantage b) An entry barrier c) Strategic advantage d) Rapid time-to-market e) One-to-one marketing Answer: b Title: Assessment Question 2.50 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium 51) The threat of competitors’ entering the automobile manufacturing industry is _____ because barriers to entry are so _____. a) low, low b) high, high c) high, low d) low, high Answer: d Title: Assessment Question 2.51 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium


52) The threat of competitors’ entering a market is very high in industries that perform a(n) _____ role and in industries where the primary product or service is _____. a) intermediation, physical b) broker, physical c) sales, financial d) financial, digital e) intermediation, digital Answer: e Title: Assessment Question 2.52 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Hard

53) How does the Internet affect the way you purchase your textbooks? a) The Internet gives you fewer choices. b) The Internet increases your bargaining power. c) The Internet provides you with less information. d) The Internet decreases your bargaining power. e) The Internet increases your switching costs. Answer: b Title: Assessment Question 2.53 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium

54) Buyer power is _____ when buyers have many choices from whom to buy and _____ when buyers have few choices. a) high, the same b) high, low c) low, low d) low, high


e) low, the same Answer: b Title: Assessment Question 2.54 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium

55) The costs of delivering products in the _____ channel are much higher than delivering products in the _____ channel. a) e-commerce, digital b) digital, e-commerce c) digital, physical d) physical, financial e) physical, digital Answer: e Title: Assessment Question 2.55 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium 56) Porter’s competitive forces model helps organizations identify _____, whereas his value chain model helps organizations identify specific _____. a) competitive opportunities, activities b) general strategies, activities c) activities, competitive opportunities d) activities, general strategies e) primary activities, support activities Answer: b Title: Assessment Question 2.56


Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium

57) _____ activities create value for which customers are willing to pay, whereas _____ activities do not add value directly to the firm’s products or services. a) Support, primary b) Human resource management, inbound logistics c) Procurement, operations d) Primary, support e) Accounting, outbound logistics Answer: d Title: Assessment Question 2.57 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium 58) If there are _____ substitutes for an organization’s products or services, then the threat of substitutes is _____. a) many, high b) few, low c) few, high d) many, low e) few, negligible Answer: a Title: Assessment Question 2.58 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium


59) New technologies can produce new products very _____, which _____ the threat from substitute products. a) slowly, decreases b) slowly, increases c) slowly, does not affect d) quickly, increases e) quickly, does not affect Answer: d Title: Assessment Question 2.59 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium

60) The visibility of Internet applications on the Web makes proprietary systems more difficult to keep secret. This is an example of which of Porter’s five forces? a) threat of entry of new competitors b) bargaining power of suppliers c) bargaining power of customers d) threat of substitute products e) rivalry among existing firms in an industry Answer: e Title: Assessment Question 2.60 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium 61) Walmart’s automatic replenishment system, which enables the company to reduce inventory storage requirements, is an example of which strategy for competitive advantage?


a) cost leadership b) differentiation c) innovation d) operational effectiveness e) customer-orientation Answer: a Title: Assessment Question 2.61 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium

62) Which strategy for competitive advantage involves offering different products, services, or product features? a) cost leadership b) differentiation c) innovation d) operational effectiveness e) customer-orientation Answer: b Title: Assessment Question 2.62 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Easy

63) Which strategy for competitive advantage involves introducing new products and putting new features in existing products? a) cost leadership b) differentiation c) innovation d) operational effectiveness e) customer-orientation


Answer: c Title: Assessment Question 2.63 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Easy

64) The introduction of ATM machines by Citibank was a classic example of which strategy for competitive advantage? a) cost leadership b) innovation c) differentiation d) operational effectiveness e) customer-orientation Answer: b Title: Assessment Question 2.64 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Easy 65) Southwest Airlines’ low-cost, short-haul strategy is an example of which strategy for competitive advantage? a) cost leadership b) differentiation c) innovation d) operational effectiveness e) customer-orientation Answer: b Title: Assessment Question 2.65 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one.


Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Easy

66) Which strategy for competitive advantage involves improving the manner in which an organization executes its internal business processes? a) cost leadership b) differentiation c) innovation d) operational effectiveness e) customer-orientation Answer: d Title: Assessment Question 2.66 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Easy

67) When Amazon welcomes you by name back to its Web site on your second visit, it is employing which strategy for competitive advantage? a) cost leadership b) differentiation c) innovation d) operational effectiveness e) customer-orientation Answer: e Title: Assessment Question 2.67 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium


68) IT will impact managers’ jobs in all of the following ways except: a) managers will have time to get into the field b) managers can spend more time planning c) managers can spend more time “putting out fires” d) managers can gather information more quickly e) none of these Answer: c Title: Assessment Question 2.68 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium 69) Porter’s _____ help(s) companies identify general strategies, whereas his _____ help(s) to identify specific activities where companies can use the strategies for greatest impact. a) value chain model, competitive forces model b) primary activities, support activities c) competitive forces model, primary activities d) competitive forces model, value chain model e) value chain model, support activities Answer: d Title: Assessment Question 2.69 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium 70) Which of the following is not an example of business – IT alignment? a) The company goals are clear to every IT and business employee. b) The company ensures that IT employees understand how the company makes money. c) The company views IT as a way to support the business but not as a way to create new revenue streams.


d) IT professionals rotate into business departments. e) The company views customer service as extremely important. Answer: c Title: Assessment Question 2.70 Learning Objective 1: LO 2.3 Define business – information technology alignment, and describe the characteristics of effective alignment. Section Reference 1: 2.3 Business – Information Technology Alignment Difficulty: Medium

71) Which of the following is not a cause of inadequate alignment between IT and business? a) A lack of communication b) Different objectives c) Not understanding each group’s expertise d) Lack of IT knowledge on the part of the business executives e) Lack of funds Answer: e Title: Assessment Question 2.71 Learning Objective 1: LO 2.3 Define business – information technology alignment, and describe the characteristics of effective alignment. Section Reference 1: 2.3 Business – Information Technology Alignment Difficulty: Medium 72) Refer to Opening Case – Before the Stores: What was Before the Store’s competitive advantage? a) It could supply products people wanted. b) It used Fulfillment by Amazon. c) It made it easy for people to find the products they remembered from TV. d) It was on the Web. e) It generated a profit. Answer: c Title: Assessment Question 2.72 Learning Objective 1: LO 2.0 Provide a real-world application of how information systems can contribute to organizational strategies and competitive advantage. Section Reference 1: Opening Case: Before the Stores Difficulty: Medium


73) Refer to IT’s About Business 2.1 – Sleek Audio: Which of Friedman’s flatteners applies to Sleek Audio’s decision to bring its manufacturing back to the United States? a) Offshoring b) Informing c) Work-flow software d) Supply chaining e) The Steroids Answer: d Title: Assessment Question 2.73 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: IT’s About Business 2.1 Difficulty: Medium 74) Refer to IT’s About Business 2.2 – The Internet Facilitates Generosity: Sociologists argue that posting experiences on message boards can actually improve a person’s a) Self-esteem b) Independence c) Wealth d) Free time e) Social status Answer: a Title: Assessment Question 2.74 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: IT’s About Business 2.2 Difficulty: Medium 75) Refer to IT’s About Business 2.3 – Progressive: Progressive’s Name Your Price application is aimed at which of Porter’s five competitive forces? a) threat of entry of new competitors b) bargaining power of suppliers c) bargaining power of customers d) threat of substitute products e) rivalry among existing firms in an industry


Answer: e Title: Assessment Question 2.75 Learning Objective 1: LO 2.3 Define business – information technology alignment, and describe the characteristics of effective alignment. Section Reference 1: IT’s About Business 2.3 Difficulty: Hard 76) Refer to Closing Case #1 – Double Trouble for BP: Which of the following was not one of the IT problems that contributed to BP’s oil spill in 2010? a) The monitoring systems did not supply automatic alerts. b) There were no data to monitor. c) The results of generated by the modeling software were ignored. d) BP did not use technology to report the problem. e) Engineers had to analyze complex data themselves. Answer: b Title: Assessment Question 2.76 Learning Objective 1: LO 2.4 Summarize the fundamental concepts and skills related to developing organizational strategies and competitive advantage. Section Reference 1: Closing Case 1: Double Trouble for BP Difficulty: Hard 77) Refer to Closing Case #2 – Two Financial Giants Merge: When Wells Fargo acquired Wachovia, it faced all of the following issues except: a) Convincing all employees to focus on the overall goal. b) Providing ongoing support for all existing applications during the merger. c) Merging strategic IT applications into one new strategic focus. d) Merging two similar IT cultures. e) Integrating IT by implementing the best existing application in each business area. Answer: d Title: Assessment Question 2.77 Learning Objective 1: LO 2.4 Summarize the fundamental concepts and skills related to developing organizational strategies and competitive advantage. Section Reference 1: Closing Case 2: Two Financial Giants Merge Difficulty: Hard


78) Ted works in his family’s bakery business. They supply bread and rolls to neighboring restaurants, and they have their own store front where they sell breads, rolls, pastries, cookies and cupcakes. Ted wants to start a Cookie Club that gives each member (joining is free) a free cookie after they have purchased a dozen. This idea Reflects which one of Porter’s five competitive forces? a) threat of entry of new competitors b) bargaining power of suppliers c) bargaining power of customers d) threat of substitute products e) rivalry among existing firms in an industry Answer: c Title: Assessment Question 2.78 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium

Question Type: Short Answer

79) Identify the three types of business pressures, and explain how organizations can use IT to respond to each one. Title: Assessment Question 2.79 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Medium 80) Using Porter’s competitive forces model, contrast the bargaining power of suppliers and the bargaining power of customers (buyers). Title: Assessment Question 2.80 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems


Difficulty: Medium

81) What are switching costs, and why would a company care about them? Title: Assessment Question 2.81 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium 82) Differentiate between Porter’s competitive forces model and his value chain model. Title: Assessment Question 2.82 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium 83) Differentiate between primary activities and support activities in Porter’s value chain model. Title: Assessment Question 2.83 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium

84) Evaluate the assertion that an information system by itself can rarely provide a sustainable competitive advantage. Title: Assessment Question 2.84 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems


Difficulty: Medium

Question Type: Essay

85) Explain what a business environment is and what factors within the environment put pressure on the business. Title: Assessment Question 2.85 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Medium

86) Explain how changes in social responsibility, government regulation/deregulation, social programs, protection against terrorism, and ethics put pressure on modern businesses. Title: Assessment Question 2.86 Learning Objective 1: LO 2.1 List and provide examples of the three types of business pressures, and describe one IT response to each. Section Reference 1: 2.1 Business Pressures, Organizational Responses, and Information Technology Support Difficulty: Hard 87) Identify the five forces of Porter’s competitive forces model, and explain how the Internet impacts each one. Title: Assessment Question 2.87 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Hard

88) Discuss why the variable cost of digital products is extremely low. Title: Assessment Question 2.88 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one.


Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Hard

89) Provide an example of each of the five strategies for competitive advantage. (Do not use the examples provided in the book). Title: Assessment Question 2.89 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Hard

Question Type: Multiple Choice 90) Ted works in his family’s bakery business. They supply bread and rolls to neighboring restaurants, and they have their own storefront where they sell breads, rolls, pastries, cookies, and cupcakes. Ted wants to build a Web site for the business that will allow customers to order cookies and cupcakes for later pickup. This idea represents: a) An organizational response to business pressures. b) A technology response to business pressures. c) A response to powerful customers d) A response to globalization. e) An effort to “go green.” Answer: a Title: Assessment Question 2.90 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium 91) Ted works in his family’s bakery business. They supply bread and rolls to neighboring restaurants, and have their own store-front where they sell breads, rolls, pastries, cookies, and cupcakes. Ted thinks he should put free Wi-Fi in the store front


(which seats about 15 people). This idea reflects which one of Porter’s five competitive forces? a) threat of entry of new competitors b) bargaining power of suppliers c) bargaining power of customers d) threat of substitute products e) rivalry among existing firms in an industry Answer: e Title: Assessment Question 2.91 Learning Objective 1: LO 2.2.1 Identify the five competitive forces described by Porter, and explain how the Web impacts each one. Learning Objective 2: LO 2.2.2 Describe the strategies that organizations typically adopt to counter the five competitive forces and achieve competitive advantage. Section Reference 1: 2.2 Competitive Advantage and Strategic Information Systems Difficulty: Medium


Package Title: Assessment Questions Course Title: MIS 1e Chapter Number: 3

Question Type: True/False

1) It is easy to manage all the data coming into an organization. Answer: False Title: Assessment Question 3.01 Learning Objective 1: LO 3.0 Provide a real-world application of data and knowledge management. Section Reference 1: Ruby’s Club Difficulty: Easy

2) The best way to capture the data in an organized format is to use a database. Answer: True Title: Assessment Question 3.02 Learning Objective 1: LO 3.0 Provide a real-world application of data and knowledge management. Section Reference 1: Ruby’s Club Difficulty: Medium

3) Increasing amounts of external data need to be considered in making organizational decisions. Answer: True Title: Assessment Question 3.03 Learning Objective 1: LO 3.1 List three common challenges in managing data and describe one way each can be addressed using data governance. Section Reference 1: 3.1 Managing Data Difficulty: Easy

4) Data rot refers to the quality of the data itself. Answer: False Title: Assessment Question 3.04


Learning Objective 1: LO 3.1 List three common challenges in managing data and describe one way each can be addressed using data governance. Section Reference 1: 3.1 Managing Data Difficulty: Medium

5) It is important for applications and data to be dependent on each other. Answer: False Title: Assessment Question 3.05 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach Difficulty: Easy 6) A negative value for a student’s grade point average is an example of a data integrity problem. Answer: True Title: Assessment Question 3.06 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach Difficulty: Easy

7) An entity is a person, place, thing, or event about which information is maintained. Answer: True Title: Assessment Question 3.07 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach: Designing the Database Difficulty: Easy

8) An attribute is any characteristic or quality that describes a particular entity. Answer: True


Title: Assessment Question 3.08 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach: Designing the Database Difficulty: Easy

9) The secondary key is a field that identifies a record with complete uniqueness. Answer: False Title: Assessment Question 3.09 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach: Designing the Database Difficulty: Easy

10) Entity-relationship diagrams are documents that show the primary and secondary keys associated with a conceptual data model. Answer: False Title: Assessment Question 3.10 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach: Designing the Database Difficulty: Easy 11) You would be an instance of your university’s STUDENT class. Answer: True Title: Assessment Question 3.11 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach: Designing the Database Difficulty: Easy


12) The relational database model is based on the concept of three-dimensional tables. Answer: False Title: Assessment Question 3.12 Learning Objective 1: LO 3.3 List one main advantage and one main disadvantage of relational databases. Section Reference 1: 3.3 Database Management Systems Difficulty: Easy

13) Structured query language is a relational database language that enables users to perform complicated searches with relatively simple statements. Answer: True Title: Assessment Question 3.13 Learning Objective 1: LO 3.3 List one main advantage and one main disadvantage of relational databases. Section Reference 1: 3.3 Database Management Systems Difficulty: Easy

14) The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security. Answer: True Title: Assessment Question 3.14 Learning Objective 1: LO 3.3 List one main advantage and one main disadvantage of relational databases. Section Reference 1: 3.3 Database Management Systems Difficulty: Easy

15) When data are normalized, attributes in the table depend on the primary key and any secondary keys. Answer: False Title: Assessment Question 3.15 Learning Objective 1: LO 3.3 List one main advantage and one main disadvantage of relational databases. Section Reference 1: 3.3 Database Management Systems Difficulty: Easy


16) In a data warehouse, existing data are constantly purged as new data come in. Answer: False Title: Assessment Question 3.16 Learning Objective 1: LO 3.4.1 Identify and explain the advantages of the four characteristics of data warehouses. Learning Objective 2: LO 3.4.2 Demonstrate the use of a multidimensional model to store and analyze data. Section Reference 1: 3.4 Data Warehousing Difficulty: Easy 17) An organization’s data warehouse generally maintains its operational data. Answer: False Title: Assessment Question 3.17 Learning Objective 1: LO 3.4.1 Identify and explain the advantages of the four characteristics of data warehouses. Learning Objective 2: LO 3.4.2 Demonstrate the use of a multidimensional model to store and analyze data. Section Reference 1: 3.4 Data Warehousing Difficulty: Easy

18) Online analytical processing (OLAP) involves the analysis of accumulated data by end users. Answer: True Title: Assessment Question 3.18 Learning Objective 1: LO 3.4.1 Identify and explain the advantages of the four characteristics of data warehouses. Learning Objective 2: LO 3.4.2 Demonstrate the use of a multidimensional model to store and analyze data. Section Reference 1: 3.4 Data Warehousing Difficulty: Easy

19) Data marts are designed for the end-user needs in a strategic business unit or department. Answer: True Title: Assessment Question 3.19


Learning Objective 1: LO 3.4.1 Identify and explain the advantages of the four characteristics of data warehouses. Learning Objective 2: LO 3.4.2 Demonstrate the use of a multidimensional model to store and analyze data. Section Reference 1: 3.4 Data Warehousing Difficulty: Easy

20) Master data are generated and captured by operational systems. Answer: False Title: Assessment Question 3.20 Learning Objective 1: LO 3.1 List three common challenges in managing data and describe one way each can be addressed using data governance. Section Reference 1: 3.1 Managing Data: Data Governance Difficulty: Easy

21) Tacit knowledge is the more objective, rational, and technical types of knowledge. Answer: False Title: Assessment Question 3.21 Learning Objective 1: LO 3.5 List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference 1: 3.5 Knowledge Management Difficulty: Easy

22) Explicit knowledge refers to the cumulative store of subjective learning, which is personal and hard to formalize. Answer: False Title: Assessment Question 3.22 Learning Objective 1: LO 3.5 List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference 1: 3.5 Knowledge Management Difficulty: Easy

Question Type: Multiple Choice

23) Which of the following has (have) the broadest impact on an organization?


a) Decisions about hardware. b) Decisions about software c) Decisions about data. d) Both decisions about hardware and software. e) All of these have an equal impact. Answer: c Title: Assessment Question 3.23 Learning Objective 1: LO 3.0 Provide a real-world application of data and knowledge management. Section Reference 1: Ruby’s Club Difficulty: Easy

24) Which of the following is not a source for external data? a) Commercial databases b) Corporate databases c) Sensors d) Satellites e) Government reports Answer: b Title: Assessment Question 3.24 Learning Objective 1: LO 3.1 List three common challenges in managing data and describe one way each can be addressed using data governance. Section Reference 1: 3.1 Managing Data Difficulty: Easy 25) Which of the following is not a reason why managing data is difficult over time? a) New systems are developed. b) The media the data are stored on becomes problematic. c) New sources of data are created. d) The amount of data increases exponentially. e) All of these are reasons why managing data is difficult over time. Answer: e Title: Assessment Question 3.25 Learning Objective 1: LO 3.1 List three common challenges in managing data and describe one way each can be addressed using data governance. Section Reference 1: 3.1 Managing Data


Difficulty: Medium

26) Not including alphabetic characters in a Social Security Number field is an example of _____ . a) Data isolation. b) Data integrity. c) Data consistency. d) Data redundancy. e) Application/data dependence. Answer: b Title: Assessment Question 3.26 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach Difficulty: Easy

27) _____ occurs when applications cannot access data associated with other applications. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence Answer: a Title: Assessment Question 3.27 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach Difficulty: Easy

28) _____ occurs when the same data are stored in many places. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy


e) Application/Data dependence Answer: d Title: Assessment Question 3.28 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach Difficulty: Easy

29) _____ occurs when various copies of the data agree. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence Answer: c Title: Assessment Question 3.29 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach Difficulty: Easy

30) You have moved to a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management? a) Data redundancy b) Data inconsistency c) Data isolation d) Data security e) Data dependence Answer: b Title: Assessment Question 3.30 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach


Difficulty: Medium

31) Place the following members of the data hierarchy in their correct order: a) Bit – byte – field – record – database – file b) Bit – field – byte – record – file – database c) Byte – bit – record – field – database d) Bit – byte – field – record – file – database e) Bit – record – field – byte – file -- database Answer: d Title: Assessment Question 3.31 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach: Data Hierarchy Difficulty: Easy

32) In the data hierarchy, the smallest element is the _____. a) Record. b) Bit. c) Byte. d) Character. e) File. Answer: b Title: Assessment Question 3.32 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach: Data Hierarchy Difficulty: Easy

33) A(n) _____ is a logical grouping of characters into a word, a small group of words, or a complete number. a) Byte b) Field c) Record d) File


e) Database Answer: b Title: Assessment Question 3.33 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach: Data Hierarchy Difficulty: Easy

34) A(n) _____ is a logical grouping of related fields. a) Byte b) Field c) Record d) File e) Database Answer: c Title: Assessment Question 3.34 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach: Data Hierarchy Difficulty: Easy

35) A(n) _____ is a logical grouping of related records. a) Byte b) Field c) Record d) File e) Database Answer: d Title: Assessment Question 3.35 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach: Data Hierarchy Difficulty: Easy


36) A(n) _____ represents a single character, such as a letter, number, or symbol. a) Byte b) Field c) Record d) File e) Database Answer: a Title: Assessment Question 3.36 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach: Data Hierarchy Difficulty: Easy

37) In a database, the primary key field is used to _____. a) specify an entity b) create linked lists c) identify duplicated data d) uniquely identify a record e) uniquely identify an attribute Answer: d Title: Assessment Question 3.37 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach: Designing the Database Difficulty: Easy

38) _____ are fields in a record that have some identifying information but typically do not identify the record with complete accuracy. a) Primary keys b) Secondary keys c) Duplicate keys d) Attribute keys e) Record keys


Answer: Title: Assessment Question 3.38 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach: Designing the Database Difficulty: Easy 39) As an individual student in your university’s student database, you are a(n) _____ of the STUDENT class. a) instance b) individual c) representative d) entity e) relationship Answer: a Title: Assessment Question 3.39 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach: Designing the Database Difficulty: Medium

40) At your university, students can take more than one class, and each class can have more than one student. This is an example of what kind of relationship? a) one-to-one b) one-to-many c) many-to-one d) many-to-many e) some-to-many Answer: d Title: Assessment Question 3.40 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach: Designing the Database


Difficulty: Easy 41) In a university’s relational database, the student record contains information regarding the student’s last name. The last name is a(n): a) attribute. b) entity. c) primary key. d) object. e) file. Answer: a Title: Assessment Question 3.41 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach: Designing the Database Difficulty: Easy 42. A database management system is primarily a(n) _____. a) file-handling program b) data-modeling program c) interface between applications and a database d) interface between data and a database e) interface between queries and a database Answer: c Title: Assessment Question 3.42 Learning Objective 1: LO 3.3 List one main advantage and one main disadvantage of relational databases. Section Reference 1: 3.3 Database Management Systems Difficulty: Easy

43) In the relational database model, related tables can be joined when they contain common _____. a) primary keys b) rows c) records d) columns e) files


Answer: d Title: Assessment Question 3.43 Learning Objective 1: LO 3.3 List one main advantage and one main disadvantage of relational databases. Section Reference 1: 3.3 Database Management Systems Difficulty: Medium

44) _____ tell the database management system which records are joined with others in related tables. a) Primary keys b) Secondary keys c) Common attributes d) Common files e) Common fields Answer: a Title: Assessment Question 3.44 Learning Objective 1: LO 3.3 List one main advantage and one main disadvantage of relational databases. Section Reference 1: 3.3 Database Management Systems Difficulty: Medium

45) Data dictionaries perform all of the following functions except: a) Providing information on each record. b) Providing information on why attributes are needed in the database. c) Defining the format necessary to enter data into the database. d) Providing information on the name of each attribute. e) Providing information on how often attributes should be updated. Answer: a Title: Assessment Question 3.45 Learning Objective 1: LO 3.3 List one main advantage and one main disadvantage of relational databases. Section Reference 1: 3.3 Database Management Systems Difficulty: Medium

46) In a relational database, every row represents a(n) _____.


a) file b) record c) attribute d) primary key e) secondary key Answer: b Title: Assessment Question 3.46 Learning Objective 1: LO 3.3 List one main advantage and one main disadvantage of relational databases. Section Reference 1: 3.3 Database Management Systems Difficulty: Easy

47) A standardized language used to manipulate data is _____. a) MS-Access b) Oracle c) query-by-example language d) structured query language e) data-manipulation language Answer: d Title: Assessment Question 3.47 Learning Objective 1: LO 3.3 List one main advantage and one main disadvantage of relational databases. Section Reference 1: 3.3 Database Management Systems Difficulty: Easy

48) Data dictionaries provide which of the following advantages to the organization? a) They reduce data inconsistency. b) They enable faster program development. c) They make it easier to modify data and information. d) Only the following: They enable faster program development and they make it easier to modify data and information. e) All of these Answer: e Title: Assessment Question 3.48


Learning Objective 1: LO 3.3 List one main advantage and one main disadvantage of relational databases. Section Reference 1: 3.3 Database Management Systems Difficulty: Easy

49) _____ is a method for analyzing and reducing a relational database to its most streamlined form. a) Structured query b) Normalization c) Query by example d) Joining e) Relational analysis Answer: b Title: Assessment Question 3.49 Learning Objective 1: LO 3.3 List one main advantage and one main disadvantage of relational databases. Section Reference 1: 3.3 Database Management Systems Difficulty: Easy

50) When data are normalized, attributes in the table depend only on the _____. a) secondary key b) common attribute c) primary key d) common row e) common record Answer: C Title: Assessment Question 3.50 Learning Objective 1: LO 3.3 List one main advantage and one main disadvantage of relational databases. Section Reference 1: 3.3 Database Management Systems Difficulty: Easy

51) The data in a data warehouse have which of the following characteristics? a) They are organized by subject. b) They are coded in different formats. c) They are updated in real time.


d) They are typically retained for a defined, but limited, period of time. e) They are organized in a hierarchical structure. Answer: a Title: Assessment Question 3.51 Learning Objective 1: LO 3.4.1 Identify and explain the advantages of the four characteristics of data warehouses. Learning Objective 2: LO 3.4.2 Demonstrate the use of a multidimensional model to store and analyze data. Section Reference 1: 3.4 Data Warehousing Difficulty: Medium

52) The data in a data warehouse: a) are updated constantly in real time. b) are updated in batch mode, approximately once per day. c) are not updated. d) are purged constantly as new data enter. e) are available for MIS analysts, but not users. Answer: c Title: Assessment Question 3.52 Learning Objective 1: LO 3.4.1 Identify and explain the advantages of the four characteristics of data warehouses. Learning Objective 2: LO 3.4.2 Demonstrate the use of a multidimensional model to store and analyze data. Section Reference 1: 3.4 Data Warehousing Difficulty: Medium

53) The process of moving data from various sources into the data warehouse is called: a) uploading. b) extracting, transforming, and loading. c) online transaction processing. d) master data management. e) online analytical processing. Answer: b Title: Assessment Question 3.53 Learning Objective 1: LO 3.4.1 Identify and explain the advantages of the four characteristics of data warehouses.


Learning Objective 2: LO 3.4.2 Demonstrate the use of a multidimensional model to store and analyze data. Section Reference 1: 3.4 Data Warehousing Difficulty: Easy

54) Compared to data warehouses, data marts have which one of the following characteristics? a) They cost less. b) They have longer lead times for implementation. c) They provide for central rather than local control. d) They contain more information. e) They are more difficult to navigate. Answer: a Title: Assessment Question 3.54 Learning Objective 1: LO 3.4.1 Identify and explain the advantages of the four characteristics of data warehouses. Learning Objective 2: LO 3.4.2 Demonstrate the use of a multidimensional model to store and analyze data. Section Reference 1: 3.4 Data Warehousing Difficulty: Medium

55) _____ is a formal approach to managing data consistently across an entire organization. a) Database management b) Enterprise information management c) Data warehousing d) Data governance e) Data mart Answer: d Title: Assessment Question 3.55 Learning Objective 1: LO 3.1 List three common challenges in managing data and describe one way each can be addressed using data governance. Section reference 1: 3.1 Managing Data: Data Governance Difficulty: Easy

56) _____ provide(s) companies with a single version of the truth for their data. a) Data warehouses b) Data marts


c) Databases d) Master data management e) Enterprise information management Answer: d Title: Assessment Question 3.56 Learning Objective 1: LO 3.1 List three common challenges in managing data and describe one way each can be addressed using data governance. Section reference 1: 3.1 Managing Data: Data Governance Difficulty: Easy

57) Organizations are turning to data governance for which of the following reasons? a) They have too little data. b) They are responding to federal regulations. c) Their data are typically structured. d) Their data are usually located in the organization’s databases. e) Data across their organizations are generally consistent. Answer: b Title: Assessment Question 3.57 Learning Objective 1: LO 3.1 List three common challenges in managing data and describe one way each can be addressed using data governance. Section reference 1: 3.1 Managing Data: Data Governance Difficulty: Hard

58) _____ describe the activities of the business, whereas _____ categorize(s), aggregate(s), and evaluate(s) data generated by the organization’s activities. a) Transaction data, master data b) Source data, transaction data c) Operational data, master data d) Master data, source data e) Business dimensional data, databases Answer: a Title: Assessment Question 3.58 Learning Objective 1: LO 3.1 List three common challenges in managing data and describe one way each can be addressed using data governance. Section reference 1: 3.1 Managing Data: Data Governance Difficulty: Medium


59) _____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization’s memory and typically reside inside the organization in an unstructured manner. a) Discovery b) Knowledge management c) Decision support d) Online analytical processing e) Data mining Answer: b Title: Assessment Question 3.59 Learning Objective 1: LO 3.5 List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference 1: 3.5 Knowledge Management Difficulty: Easy

60) _____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem. a) Knowledge, information b) Data, information c) Information, data d) Information, knowledge e) Data, knowledge Answer: a Title: Assessment Question 3.60 Learning Objective 1: LO 3.5 List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference 1: 3.5 Knowledge Management Difficulty: Medium

61) Explicit knowledge has which of the following characteristics? a) objective b) personal c) slow d) costly to transfer e) ambiguous


Answer: a Title: Assessment Question 3.61 Learning Objective 1: LO 3.5 List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference 1: 3.5 Knowledge Management Difficulty: Medium

62) Tacit knowledge has which of the following characteristics? a) codified b) objective c) unstructured d) rational e) technical Answer: c Title: Assessment Question 3.62 Learning Objective 1: LO 3.5 List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference 1: 3.5 Knowledge Management Difficulty: Medium

63) Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge. a) tacit b) explicit c) managerial d) geographical e) cultural Answer: b Title: Assessment Question 3.63 Learning Objective 1: LO 3.5 List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference 1: 3.5 Knowledge Management Difficulty: Medium

64) The most important benefit of knowledge management systems is:


a) They improve customer service. b) They make best practices available to employees. c) They enable the organization to retain scarce knowledge when employees retire. d) They improve employee morale. e) They make product development more efficient. Answer: b Title: Assessment Question 3.64 Learning Objective 1: LO 3.5 List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference 1: 3.5 Knowledge Management Difficulty: Medium

Question Type: Short Answer 65) Discuss why decisions concerning data structure have a broader impact than decisions concerning hardware and software. Title: Assessment Question 3.65 Learning Objective 1: LO 3.0 Provide a real-world application of data and knowledge management. Section Reference 1: Ruby’s Club Difficulty: Medium

66) Discuss the difficulties involved in managing data. Title: Assessment Question 3.66 Learning Objective 1: LO 3.1 List three common challenges in managing data and describe one way each can be addressed using data governance. Section Reference 1: 3.1 Managing Data Difficulty: Medium

67) Define each element of the data hierarchy, in order from smallest to largest. Title: Assessment Question 3.67 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach Difficulty: Medium


68) Discuss the advantages of the database approach. Title: Assessment Question 3.68 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach Difficulty: Medium

69) Describe entity-relationship modeling. Title: Assessment Question 3.69 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach Difficulty: Medium

70) Describe the relational database model. Title: Assessment Question 3.70 Learning Objective 1: LO 3.3 List one main advantage and one main disadvantage of relational databases. Section Reference 1: 3.3 Database Management Systems Difficulty: Medium

71) Describe the characteristics of a data warehouse. Title: Assessment Question 3.71 Learning Objective 1: LO 3.4.1 Identify and explain the advantages of the four characteristics of data warehouses. Learning Objective 2: LO 3.4.2 Demonstrate the use of a multidimensional model to store and analyze data. Section Reference 1: 3.4 Data Warehousing Difficulty: Medium

72) What are the advantages of a data mart? Title: Assessment Question 3.72 Learning Objective 1: LO 3.4.1 Identify and explain the advantages of the four characteristics of data warehouses.


Learning Objective 2: LO 3.4.2 Demonstrate the use of a multidimensional model to store and analyze data. Section Reference 1: 3.4 Data Warehousing Difficulty: Medium

73) Differentiate between explicit knowledge and tacit knowledge. Provide examples of each. Title: Assessment Question 3.73 Learning Objective 1: LO 3.5 List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference 1: 3.5 Knowledge Management Difficulty: Medium

74) Describe the six steps of the knowledge management system cycle. Title: Assessment Question 3.74 Learning Objective 1: LO 3.5 List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference 1: 3.5 Knowledge Management Difficulty: Medium

Question Type: Multiple Choice 75) Refer to IT’s About Business 3.1. – Cell phone owners in Mexico: The cell phone registry is useless because: a) data for some cell phones are missing. b) data for some cell phones are inaccurate. c) very few Mexicans can afford cell phones. d) All the above e) A and B Answer: e Title: Assessment Question 3.75 Learning Objective 1: LO 3.3 List one main advantage and one main disadvantage of relational databases. Section Reference 1: IT’s About Business 3.1 Difficulty: Medium


76) Refer to IT’s About Business 3.2 – Isle of Capri Casinos. Capri Casinos decided it needed a data warehouse for all of the following reasons except: a) to process transactions faster. b) to provide a complete view of the customer. c) to enhance its marketing campaigns d) to provide business users access to business-wide data. e) to determine where to place its slot machines. Answer: a Title: Assessment Question 3.76 Learning Objective 1: LO 3.4.1 Identify and explain the advantages of the four characteristics of data warehouses. Learning Objective 2: LO 3.4.2 Demonstrate the use of a multidimensional model to store and analyze data. Section Reference 1: IT’s About Business 3.2 Difficulty: Hard 77) Refer to Closing Case #1 – Big Data. Which of the following is not a problem created by “Big Data”? a) The data is not reliable. b) The amount of data exceeds the available storage. c) The existing networks can’t handle the volume. d) It is more difficult to protect the data. e) The vast amounts of data make decision making more complicated. Answer: a Title: Assessment Question 3.77 Learning Objective 1: LO 3.6 Summarize the fundamental concepts and skills related to data and knowledge management. Section Reference 1: Closing Case 1: Big Data Difficulty: Medium 78) Refer to Closing Case #2 – CoStar Group. The target audience for CoStar’s aggregated commercial real estate data was a) banks. b) building owners. c) real estate agents. d) builders. e) All the above


Answer: e Title: Assessment Question 3.78 Learning Objective 1: LO 3.6 Summarize the fundamental concepts and skills related to data and knowledge management. Section Reference 1: Closing Case 2: Company Strategy Thrives with Database Strategy Difficulty: Medium

Question Type: Essay

79) Describe the various new sources for data, and provide an example of each. Title: Assessment Question 3.79 Learning Objective 1: LO 3.0 Provide a real-world application of data and knowledge management. Section Reference 1: Opening Case: Crabby Bill’s Difficulty: Hard

80) Explain the six problems that can be minimized using the database approach. Title: Assessment Question 3.80 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach Difficulty: Medium

81) Identify and explain the advantages of the four characteristics of data warehouses. Title: Assessment Question 3.81 Learning Objective 1: LO 3.4.1 Identify and explain the advantages of the four characteristics of data warehouses. Learning Objective 2: LO 3.4.2 Demonstrate the use of a multidimensional model to store and analyze data. Section Reference 1: 3.4 Data Warehousing Difficulty: Medium

82) Differentiate between master data and transaction data. Title: Assessment Question 3.82


Learning Objective 1: LO 3.1 List three common challenges in managing data and describe one way each can be addressed using data governance. Section reference 1: 3.1 Managing Data: Data Governance Difficulty: Hard

83) Why is data governance so important for organizations? Title: Assessment Question 3.83 Learning Objective 1: LO 3.1 List three common challenges in managing data and describe one way each can be addressed using data governance. Section reference 1: 3.1 Managing Data: Data Governance Difficulty: Hard

Question Type: True/False

84) For the following entity-relationship diagram, the Student entity would have the foreign key.

Answer: False Title: Assessment Question 3.84 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach: Designing the Database Difficulty: Easy

Question Type: Multiple Choice

85) For the following entity-relationship diagram, the attributes you would NOT expect to see in the Computer entity are

a) manufacturer. b) type (laptop or desktop). c) memory size. d) disk size.


e) student’s dorm room. Answer: e Title: Assessment Question 3.85 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach: Designing the Database Difficulty: Easy

86) For the following entity-relationship diagram, what could the primary key be in the Grade entity?

a) Primary key in Student entity b) Primary key in Course entity c) Its own primary key. d) Primary key made up of the primary keys in Student entity and Course entity e) It doesn’t need a primary key. Answer: d Title: Assessment Question 3.86 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach: Designing the Database Difficulty: Medium

87) In a jewelry store, a customer places an order for a piece of jewelry (for example, a silver pin in the shape of a tulip). A customer could order more than one piece of jewelry at a time. Which of the following entity-relationship diagrams is true?


Answer: d Title: Assessment Question 3.87 Learning Objective 1: LO 3.2.1 Name six problems minimized by using the database approach. Learning Objective 2: LO 3.2.2 Demonstrate how to interpret relationships depicted in an entityrelationship diagram. Section Reference 1: 3.2 The Database Approach: Designing the Database Difficulty: Medium

88) In data warehouses and data marts, data are stored in a multidimensional structure and visually represented as a data cube. Figure 3.12 is an example of a data cube of sales with the dimensions of product, geographic area, and time period (year). These are called business dimensions. What would the business dimensions be for Walmart’s sales with its many sales transactions for many products in many stores that would allow them to do weekly analysis? a) Customer, product, and month b) Customer, product, store c) Customer, product, store, and month d) Customer, product, store, and week e) Product, store, and week Answer: e


Title: Assessment Question 3.88 Learning Objective 1: LO 3.4.1 Identify and explain the advantages of the four characteristics of data warehouses. Learning Objective 2: LO 3.4.2 Demonstrate the use of a multidimensional model to store and analyze data. Section Reference 1: 3.4 Data Warehousing Difficulty: Medium

Question Type: True/False 89) When you start a job, you are given an employee handbook which contains the company’s tacit knowledge. Answer: False Title: Assessment Question 3.89 Learning Objective 1: LO 3.5 List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference 1: 3.5 Knowledge Management Difficulty: Medium

90) When you start a job, you watch what other employees are doing and ask them to explain why they do it in a particular way. They are sharing their tacit knowledge. Answer: True Title: Assessment Question 3.90 Learning Objective 1: LO 3.5 List two main advantages of using knowledge management, and describe the steps in the knowledge management system cycle. Section Reference 1: 3.5 Knowledge Management Difficulty: Medium


Package Title: Assessment Questions Course Title: MIS 1e Chapter Number: 4

Question Type: True/False

1) A local area network connects two or more communicating devices in a limited geographical area. Answer: True Title: Assessment Question 4.001 Learning Objective 1: LO 4.1 Define the term computer network, and compare and contrast the two major types of networks. Section Reference 1: 4.1 What Is a Computer Network? Difficulty: Easy

2) Network interface cards are special adapters that link an individual device to the communications medium on a local area network. Answer: True Title: Assessment Question 4.002 Learning Objective 1: LO 4.1 Define the term computer network, and compare and contrast the two major types of networks. Section Reference 1: 4.1 What Is a Computer Network? Difficulty: Easy 3) The network interface card typically houses the LAN’s network operating system. Answer: False Title: Assessment Question 4.003 Learning Objective 1: LO 4.1 Define the term computer network, and compare and contrast the two major types of networks. Section Reference 1: 4.1 What Is a Computer Network? Difficulty: Easy

4) Wide-area networks have a large capacity, and they typically use a single communications channel.


Answer: False Title: Assessment Question 4.004 Learning Objective 1: LO 4.1 Define the term computer network, and compare and contrast the two major types of networks. Section Reference 1: 4.1 What Is a Computer Network? Difficulty: Easy

5) Digital signals are continuous waves that transmit information by altering the characteristics of the waves. Answer: False Title: Assessment Question 4.005 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Easy

6) Digital signals have two parameters: frequency and amplitude. Answer: False Title: Assessment Question 4.006 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Easy

7) The U.S. public telephone system was designed as an analog network to carry voice signals. Answer: True Title: Assessment Question 4.007 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Easy


8) Cable media use wires or cables to transmit data and information. Answer: True Title: Assessment Question 4.008 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Easy

9) Twisted-pair wire is the least-used form of communications wiring. Answer: False Title: Assessment Question 4.009 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: medium

10) Cladding is the coating that surrounds fiber-optic cables and prevents light from leaking out of the fiber. Answer: True Title: Assessment Question 4.010 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Medium

11) Systems that use digital subscriber lines (DSL) do not require modems. Answer: False Title: Assessment Question 4.011 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Easy

12) Currently, ATM networks operate only on fiber-optic cable.


Answer: True Title: Assessment Question 4.012 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Medium

13) The Internet is a global network of computer networks. Answer: True Title: Assessment Question 4.013 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy

14) An intranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization. Answer: True Title: Assessment Question 4.014 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy

15) Intranets support discovery, communication, and collaboration inside an organization. Answer: True Title: Assessment Question 4.015 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy

16) An extranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization.


Answer: False Title: Assessment Question 4.016 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy

17) Extranets offer limited accessibility to the intranets of participating companies. Answer: True Title: Assessment Question 4.017 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy

18) An Internet service provider is a company that offers Internet connections for a fee. Answer: True Title: Assessment Question 4.018 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy

19) Internet kiosks are computer terminals located in public places like libraries and airports. Answer: True Title: Assessment Question 4.019 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy

20) A domain name is the official name assigned to an Internet site, consisting of multiple parts, separated by dots, which are translated from right to left in locating the site.


Answer: True Title: Assessment Question 4.020 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy

21) The rightmost part of an Internet name is the top-level specification, or the zone. Answer: True Title: Assessment Question 4.021 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy

22) The World Wide Web is a system with universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture. Answer: True Title: Assessment Question 4.022 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy

23) Uniform resource locators (URLs) point to the address of a specific resource or site on the Web. Answer: True Title: Assessment Question 4.023 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy

24) Uniform resource locators (URLs) are software applications through which users access the Web.


Answer: False Title: Assessment Question 4.024 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy

25) The hypertext transport protocol (HTTP) is the communications standard used to transfer pages across the World Wide Web portion of the Internet. Answer: True Title: Assessment Question 4.025 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy

26) A major problem of the discovery applications of networks is the huge amount of information available. Answer: True Title: Assessment Question 4.026 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

27) Metasearch engines search several engines at once and integrate the findings of the various search engines. Answer: True Title: Assessment Question 4.027 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy


28) The quality of automatic translation of Web pages is usually just as good as human translation. Answer: False Title: Assessment Question 4.028 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

29) Commercial portals are intended for broad audiences and offer fairly routine content. Answer: True Title: Assessment Question 4.029 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

30) Industrywide portals are intended for broad audiences and offer fairly routine content. Answer: False Title: Assessment Question 4.030 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

31) Electronic mail is the largest-volume application running over the Internet. Answer: True Title: Assessment Question 4.031 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

32) With Voice-over-IP, every call opens up a dedicated circuit for the duration of the call.


Answer: False Title: Assessment Question 4.032 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

33) E-learning is conducted only in virtual classrooms, where all coursework is completed online. Answer: False Title: Assessment Question 4.033 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

34) Virtual universities are online universities from which students take classes from home or at an off-site location, via the Internet. Answer: True Title: Assessment Question 4.034 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

35) Employees who telecommute have generally found that the experience enhances their careers. Answer: False Title: Assessment Question 4.035 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy


Question Type: Multiple Choice

36) _____ refers to the range of frequencies available in any communications channel. a) Protocol b) Broadband c) Capacity d) Narrowband e) Bandwidth Answer: e Title: Assessment Question 4.036 Learning Objective 1: LO 4.1 Define the term computer network, and compare and contrast the two major types of networks. Section Reference 1: 4.1 What Is a Computer Network? Difficulty: Easy

37) Which of the following are advantages of computer networks? a) They enable organizations to be more flexible. b) They enable companies to share hardware, computer applications, and data. c) They enable geographically dispersed employees to work together. d) They provide a critical link between businesses and their customers. e) All of these Answer: e Title: Assessment Question 4.037 Learning Objective 1: LO 4.1 Define the term computer network, and compare and contrast the two major types of networks. Section Reference 1: 4.1 What Is a Computer Network? Difficulty: Easy

38) The components of a local area network include which of the following? a) File server b) Client computers c) Wireline or wireless communications media d) Network interface cards e) All of these Answer: e


Title: Assessment Question 4.038 Learning Objective 1: LO 4.1 Define the term computer network, and compare and contrast the two major types of networks. Section Reference 1: 4.1 What Is a Computer Network? Difficulty: Easy

39) Which of the following is not a component of a local area network? a) File server b) Client computers c) Bridge d) Network interface cards e) All of these Answer: c Title: Assessment Question 4.039 Learning Objective 1: LO 4.1 Define the term computer network, and compare and contrast the two major types of networks. Section Reference 1: 4.1 What Is a Computer Network? Difficulty: Medium

40) A _____ connects dissimilar networks. a) Router b) Network interface card c) Bridge d) Gateway e) File server Answer: d Title: Assessment Question 4.040 Learning Objective 1: LO 4.1 Define the term computer network, and compare and contrast the two major types of networks. Section Reference 1: 4.1 What Is a Computer Network? Difficulty: Easy

41) A(n) _____ connects two or more devices in a limited geographical area. a) Local area network b) Wide-area network


c) Personal area network d) Enterprise network e) Value added network Answer: a Title: Assessment Question 4.041 Learning Objective 1: LO 4.1 Define the term computer network, and compare and contrast the two major types of networks. Section Reference 1: 4.1 What Is a Computer Network? Difficulty: Easy

42) A _____ sends messages through several connected LANs or to a wide-area network. a) Router b) Network interface card c) Bridge d) Gateway e) File server Answer: a Title: Assessment Question 4.042 Learning Objective 1: LO 4.1 Define the term computer network, and compare and contrast the two major types of networks. Section Reference 1: 4.1 What Is a Computer Network? Difficulty: Easy

43) A _____ allows a device to physically connect to a local area network’s communications medium. a) File server b) Network interface card c) Network operating system d) Communications channel e) Gateway Answer: c Title: Assessment Question 4.043 Learning Objective 1: LO 4.1 Define the term computer network, and compare and contrast the two major types of networks. Section Reference 1: 4.1 What Is a Computer Network?


Difficulty: Easy

44) All of the following statements concerning wide-area networks are true except: a) They are provided by individual companies. b) They have large capacity. c) They cover large geographical areas. d) They combine multiple communications channels. e) The Internet is an example of a wide-area network. Answer: a Title: Assessment Question 4.044 Learning Objective 1: LO 4.1 Define the term computer network, and compare and contrast the two major types of networks. Section Reference 1: 4.1 What Is a Computer Network? Difficulty: Medium

45) The function of _____ is to convert digital signals to analog signals and vice-versa. a) Modems b) Multiplexers c) Front-end processors d) Servers e) Clients Answer: a Title: Assessment Question 4.045 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Easy

46) _____ signals convey information in wave form, whereas _____ signals convey information in binary form. a) Analog, packet b) Analog, digital c) Digital, packet d) Digital, analog e) Packet, analog


Answer: b Title: Assessment Question 4.046 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Easy

47) _____ are hardware devices that support data transmission and reception across a telecommunications system. a) Integrated services digital networks b) Digital subscriber lines c) Communications channels d) Integrated circuits e) Communications processors Answer: c Title: Assessment Question 4.047 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Easy

48) Which of the following is not a communications channel? a) Fiber-optic cable b) Satellite transmission c) Twisted-pair wire d) Integrated circuits e) Cellular radio Answer: d Title: Assessment Question 4.048 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Easy

49) Which of the following is not a characteristic of twisted-pair wire?


a) Inexpensive b) Easy to work with c) Subject to interference from other electrical sources d) Secure transmissions e) None of these Answer: d Title: Assessment Question 4.049 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Medium

50) The cable medium with the highest bandwidth is: a) Twisted-pair wire b) Coaxial cable c) Fiber-optic cable d) Cellular radio e) Copper cable Answer: c Title: Assessment Question 4.050 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Easy

51) Data are sent through a fiber-optic cable by a(n) _______. a) Optical switch b) Electromagnetic switch c) Laser d) Multiplexer e) Optical modem Answer: c Title: Assessment Question 4.051 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type.


Section Reference 1: 4.2 Network Fundamentals Difficulty: Easy

52) Which data transmission technology requires fiber-optic cable, can transmit up to 2.5 gigabits per second, and is more expensive than DSL? a) Digital subscriber line b) Asynchronous transfer mode c) Synchronous optical network d) T-carrier system e) ISDN Answer: b Title: Assessment Question 4.052 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Medium

53) Which transmission technology is an interface standard for transporting digital signals over fiber-optic lines that enables the integration of transmissions from multiple vendors? a) Digital subscriber line b) Asynchronous transfer mode c) Synchronous optical network d) T-carrier system e) ISDN Answer: c Title: Assessment Question 4.053 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Easy

54) Which of the following is a digital transmission system that defines circuits that operate at different rates, all of which are multiples of the basic 64 Kbps used to transport a single voice call? a) Digital subscriber line b) Asynchronous transfer mode


c) Synchronous optical network d) T-carrier system e) ISDN Answer: d Title: Assessment Question 4.054 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Easy

55) In order to ensure that computers developed by different manufacturers can communicate, _____ have been developed. a) Protocols b) Client/server architectures c) WANs d) Application software packages e) Developmental architectures Answer: a Title: Assessment Question 4.055 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Easy

56) A protocol is: a) A device that handles the switching of voice and data in a local area network. b) A standard set of rules and procedures for the control of communications in a network. c) A communications service for the connection of devices in a local area network. d) The main communications channel in a wide-area network. e) Synonymous with network interface card. Answer: b Title: Assessment Question 4.056 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Easy


57) The part of a network that handles the major traffic is the ________. a) Front end b) Network interface c) Multiplexer d) Backbone e) Front end processor Answer: d Title: Assessment Question 4.057 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Easy

58) Which of the following enables users to send data across sometimes unreliable networks? a) Ethernet b) TCP/IP c) Protocols d) Digital subscriber lines e) Integrated services digital network Answer: b Title: Assessment Question 4.058 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Easy

59) In TCP/IP, IP is responsible for: a) Disassembling and reassembling of packets during transmission. b) Establishing the Internet connection between two computers. c) Moving packets over the network. d) Sequencing the transfer of packets across the network. e) Error checking. Answer: a


Title: Assessment Question 4.059 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Easy

60) Which of the following statements concerning packet switching is not true? a) Packets contain a sequence number. b) Packets are routed through different paths. c) Packets require dedicated circuits. d) Packets use TCP/IP to carry their data. e) Packets contain destination addressing. Answer: c Title: Assessment Question 4.060 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Medium

61) A type of processing that links two or more computers in an arrangement in which some machines provide computing services for user computers is best described as _______. a) Open systems b) Client/server c) Peer-to-peer d) Centralized e) Mainframe-centric Answer: b Title: Assessment Question 4.061 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Easy

62) BitTorrent uses a process called _____, which eliminates file-sharing bottlenecks by having everyone share little pieces of a file at the same time. a) Leeching


b) Collaboration c) Packet switching d) Torrents e) Swarming Answer: e Title: Assessment Question 4.062 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Medium

63) The _____ is a global wide-area network that connects approximately 1 million organizational computer networks. a) Ethernet b) Extranet c) Internet d) Intranet e) World Wide Web Answer: c Title: Assessment Question 4.063 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy

64) A(n) _____ is a network designed to serve the internal informational needs of a single organization. a) Global network b) Extranet c) Internet d) Intranet e) World Wide Web Answer: d Title: Assessment Question 4.064 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet.


Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy

65) A(n) _____ connects parts of the intranets of different organizations and allows secure communications among business partners. a) Global network b) Extranet c) Internet d) Intranet e) World Wide Web Answer: b Title: Assessment Question 4.065 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy

66) Internet service providers connect to one another through _____. a) Internet connection points b) Common carrier connection points c) Network access points d) Network connection points e) An extranet Answer: c Title: Assessment Question 4.066 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy

67) _____ are Internet access points that are located in public places, such as libraries and airports. a) Clients b) Servers c) Internet access computers d) Network computer


e) Internet kiosks Answer: e Title: Assessment Question 4.067 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy

68) Each site on the Internet gets an assigned address, which is a(n) _____. a) TCP address b) IP address c) URL address d) ISO/OSI identifier e) World Wide Web address Answer: c Title: Assessment Question 4.068 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy 69) Consider this domain name, www.business.gsu.edu. The “edu” is the _______. a) Top-level domain b) URL c) Web site locator d) Name of the computer e) Address of the Webmaster Answer: a Title: Assessment Question 4.069 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy 70) Consider this domain name, www.business.gsu.edu. The “gsu” is the __________.


a) Top-level domain b) Name of the organization c) URL d) Name of the specific computer e) Address of the Webmaster Answer: b Title: Assessment Question 4.070 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy 71) Consider this domain name, www.business.gsu.edu. The “business” is the ________. a) Top-level domain b) Name of the organization c) URL d) Name of the specific computer e) Address of the Webmaster Answer: d Title: Assessment Question 4.071 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy

72) Applications offered by the Internet2 include which of the following? a) remote diagnosis b) digital libraries c) distance education d) virtual laboratories e) all of these Answer: e Title: Assessment Question 4.072 Learning Objective 1: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet.


Section Reference 1: 4.3 The Internet and the World Wide Web Difficulty: Easy

73) Networks enable which of the following applications? a) Discovery b) Communications c) Collaboration d) Web services e) All of these Answer: e Title: Assessment Question 4.073 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

74) Which of the following are advantages of computer networks? a) They enable organizations to be more flexible. b) They enable companies to share hardware, computer applications, and data. c) They enable geographically dispersed employees to work together. d) They provide a critical link between businesses and their customers. e) All of these Answer: e Title: Assessment Question 4.074 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Medium

75) Which network application(s) enable(s) users to access information located in databases all over the world? a) Discovery b) Communications c) Collaboration d) Web services e) None of these


Answer: a Title: Assessment Question 4.075 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

76) Which of the following statements about publication of material in foreign languages is not correct? a) It is a competitive necessity. b) It must be accurate. c) It is expensive. d) Content must be localized to the needs of people in local markets. e) It is not yet a major consideration for most companies. Answer: e Title: Assessment Question 4.076 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Medium

77) _____ portals offer content for diverse communities and are intended for broad audiences. a) Industrywide b) Personal c) Affinity d) Corporate e) Commercial Answer: e Title: Assessment Question 4.077 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

78) _____ portals support communities such as hobby groups or political parties.


a) Industrywide b) Personal c) Affinity d) Corporate e) Commercial Answer: c Title: Assessment Question 4.078 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

79) _____ portals coordinate content within relatively narrow organizational and partners’ communities. a) Publishing b) Personal c) Affinity d) Corporate e) Commercial Answer: d Title: Assessment Question 4.079 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

80) Many organizations have implemented corporate portals for which of the following reasons? a) To cut costs b) To free up time for busy managers c) To improve profitability d) To offer customers self-service opportunities e) All of these Answer: e Title: Assessment Question 4.080


Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

81) Portals are an example of which network application? a) Discovery b) Collaboration c) Communications d) Web services e) None of these Answer: a Title: Assessment Question 4.081 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

82) With _____, every call opens up a dedicated circuit for the duration of the call. a) Voice over IP b) Plain old telephone service c) Chat rooms d) Teleconference e) Internet relay chat Answer: b Title: Assessment Question 4.082 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

83) With _____, phone calls are treated as just another kind of data. a) Voice over IP b) Plain old telephone service c) Chat rooms d) Teleconference


e) Internet relay chat Answer: a Title: Assessment Question 4.083 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

84) Skype is an example of _______. a) Teleconference b) Telepresence c) Plain old telephone service d) Voice over IP e) Videoconference Answer: d Title: Assessment Question 4.084 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

85) Workflow, groupware, and telepresence systems are examples of which network application? a) Discovery b) Communications c) Collaboration d) Web services e) None of these Answer: c Title: Assessment Question 4.085 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

86) The newest type of videoconferencing technology is ________.


a) Teleconferencing b) Telepresence c) Work group analysis software d) Workflow software e) Groupware Answer: b Title: Assessment Question 4.086 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

87) In a _____ system, participants are able to seamlessly and electronically share data, voice, images, graphics, and animation. a) Teleconference b) Group decision support c) Telepresence d) Telephone conference call e) Crowdsourcing Answer: c Title: Assessment Question 4.087 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

88) The benefits of e-learning include which of the following? a) Increased content retention b) Current, high-quality content c) Consistency d) Flexibility e) All of these Answer: e Title: Assessment Question 4.088 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an


example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

89) Which of the following is not a disadvantage of telecommuting for employees? a) Fewer opportunities for housebound people b) Possible loss of fringe benefits c) Lower pay (in some cases) d) No workplace visibility e) Slower promotions Answer: a Title: Assessment Question 4.089 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy 90) Refer to Closing Case #1 – The Network Neutrality Wars: Which of the following is not a challenge for achieving net neutrality? a) The amount of video traffic on the Internet is increasing. b) Under current models, the investment required to meet future demand exceeds projected revenue growth. c) Net neutrality might hinder U.S. competitiveness. d) Network providers could censor certain content by slowing down or blocking access. e) Telecommunications and cable companies are in favor of net neutrality. Answer: e Title: Assessment Question 4.090 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Easy

Question Type: Short Answer

91) Differentiate between analog signals and digital signals.


Title: Assessment Question 4.091 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Medium

92) Describe the various communications processors.

Title: Assessment Question 4.092 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Medium

93) Differentiate among twisted-pair wire, coaxial cable, and fiber-optic cable.

Title: Assessment Question 4.093 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Medium

94) Explain what network protocols are and why they are important.

Title: Assessment Question 4.094 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Medium

95) Describe the three basic types of peer-to-peer processing.

Title: Assessment Question 4.095 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Medium


96) Describe the benefits of networks to organizations.

Title: Assessment Question 4.096 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Medium

97) Describe the four network applications.

Title: Assessment Question 4.097 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Medium

98) Describe the various types of portals.

Title: Assessment Question 4.098 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Medium

99) What are the benefits and limitations of telecommuting? For individuals? For organizations?

Title: Assessment Question 4.099 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Medium

Question Type: Essay 100) What does the following statement mean: “Without networks, the computer on your desk


would be merely another productivity tool, just like the typewriter once was”?

Title: Assessment Question 4.100 Learning Objective 1: LO 4.0 Provide a real-world application of a computer network. Learning Objective 2: LO 4.1 Define the term computer network, and compare and contrast the two major types of networks. Learning Objective 3: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Learning Objective 4: LO 4.3 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet. Learning Objective 5: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Learning Objective 6: LO 4.5 Summarize the fundamental concepts and skills related to the application of a computer network. Section Reference 1: Chapter 4 Difficulty: Hard

101) Differentiate among local area networks, wide-area networks, and value-added networks.

Title: Assessment Question 4.101 Learning Objective 1: LO 4.1 Define the term computer network, and compare and contrast the two major types of networks. Section Reference 1: 4.1 What Is a Computer Network? Difficulty: Medium

102) Describe the functions of the TCP/IP protocol.

Title: Assessment Question 4.102 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Medium

103) Differentiate between client/server computing and peer-to-peer processing.

Title: Assessment Question 4.103 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals


Difficulty: Medium

104) What are the implications of telepresence systems? Include in your answer the uncertain safety in many parts of the world.

Title: Assessment Question 4.104 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Hard

105) Discuss the advantages of voice over IP for organizations.

Title: Assessment Question 4.105 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Hard

Question Type: Multiple Choice

106) Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using instore wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. Which type of network does Gal have? a) Client-server b) Mainframe-based c) LAN d) WAN e) Peer-to-peer Answer: c Title: Assessment Question 4.106 Learning Objective 1: LO 4.1 Define the term computer network, and compare and contrast the two major types of networks. Section Reference 1: 4.1 What Is a Computer Network? Difficulty: Medium


107) Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using instore wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. Which type of media does he likely use to connect the point-of-sale terminal to the desktop? a) Twisted-pair wire b) Coaxial cable c) Fiber-optic cable d) Cellular radio e) Copper cable Answer: a Title: Assessment Question 4.107 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Medium

108) Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using instore wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. Which of the following statements is true? a) Gal must have a Web site in order to use his notebook. b) The notebook is on the same network as the point-of-sale terminal. c) Gal must have an ISP in order to access the Internet from his notebook. d) The notebook will work only when the desktop computer is turned on. e) All of these are true. Answer: c Title: Assessment Question 4.108 Learning Objective 1: LO 4.2 Describe the differences among the three types of wireline communications media, and discuss the main advantages and disadvantages of each type. Section Reference 1: 4.2 Network Fundamentals Difficulty: Medium

109) Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using in-


store wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. Which type of network application is being used when a salesperson is looking up items in stock? a) Discovery b) Communications c) Collaboration d) Web services e) None of these Answer: e Title: Assessment Question 4.109 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Medium

110) Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using instore wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. The Web site for the store is www.GalsTunes.net. Which of the following is true? a) Gal must be hosting his Web site on his own desktop computer based on its URL. b) The point-of-sale terminal cannot connect to the Internet. c) Gal must not be selling on his Web site because the top-level domain is “net” and not “com.” d) The desktop computer must also be able to connect to the Internet in order for the notebook to access data from it. e) All of these are true. Answer: b Title: Assessment Question 4.110 Learning Objective 1: LO 4.4 Identify six major categories of network applications, provide an example of each one, and explain how that application supports business functions. Section Reference 1: 4.4 Network Applications Difficulty: Medium


Package Title: Assessment Questions Course Title: MIS 1e Chapter Number: 5

Question Type: True/False 1) A manager’s primary function is strategic planning. Answer: False Title: Assessment Question 5.01 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy 2) The ratio between organizational inputs and outputs is an indication of the organization’s productivity. Answer: True Title: Assessment Question 5.02 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

3) Modern information systems support all three managerial roles. Answer: True Title: Assessment Question 5.03 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

4) In the choice phase of the decision-making process, managers construct a model that simplifies the problem. Answer: False Title: Assessment Question 5.04


Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

5) In the implementation phase of the decision-making process, managers set criteria for the evaluation of alternative potential solutions. Answer: False Title: Assessment Question 5.05 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

6) The number of alternatives to be considered in decisions today is increasing. Answer: True Title: Assessment Question 5.06 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

7) Structured decisions address routine, repetitive problems for which standard solutions exist. Answer: True Title: Assessment Question 5.07 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

8) Human intuition often plays a role in making unstructured decisions. Answer: True Title: Assessment Question 5.08 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy


9) Unstructured decisions require a combination of standard solution procedures and individual judgment. Answer: False Title: Assessment Question 5.09 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

10) Management control is the acquisition and efficient use of resources in accomplishing organizational tasks. Answer: True Title: Assessment Question 5.10 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

11) Targeted marketing is a good example of the discovery of previously unknown or hidden patterns. Answer: False Title: Assessment Question 5.11 Learning Objective 1: LO 5.3 Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference 1: 5.3 Business Intelligence Applications for Data Analysis Difficulty: Easy

12) Decision-support systems support only lower- and middle-level managers. Answer: False Title: Assessment Question 5.12 Learning Objective 1: LO 5.3 Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference 1: 5.3 Business Intelligence Applications for Data Analysis Difficulty: Easy

13) Goal-seeking analysis attempts to find the value of the inputs necessary to achieve a desired level of output.


Answer: True Title: Assessment Question 5.13 Learning Objective 1: LO 5.3 Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference 1: 5.3 Business Intelligence Applications for Data Analysis Difficulty: Easy 14) A group decision support system is an interactive, computer-based system that facilitates a group’s efforts to find solutions to semistructured and unstructured problems. Answer: True Title: Assessment Question 5.14 Learning Objective 1: LO 5.3 Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference 1: 5.3 Business Intelligence Applications for Data Analysis Difficulty: Easy

15) An executive dashboard is very user friendly, supported by graphics, provides exception reporting and drill down, and provides information related to critical success factors. Answer: True Title: Assessment Question 5.15 Learning Objective 1: LO 5.4 Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference 1: 5.4 Business Intelligence Applications for Presenting Results Difficulty: Easy

16) Executive dashboards provide support primarily to analytical, quantitative types of decisions. Answer: False Title: Assessment Question 5.16 Learning Objective 1: LO 5.4 Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference 1: 5.4 Business Intelligence Applications for Presenting Results Difficulty: Easy

17) KPI stands for key process information.


Answer: False Title: Assessment Question 5.17 Learning Objective 1: LO 5.5 Describe corporate performance management, and provide an example of how your university could use CPM. Section Reference 1: 5.5 Business Intelligence in Action: Corporate Performance Management Difficulty: Easy

18) Corporate performance management (CPM) is involved with monitoring and managing an organization’s performance according to its budget. Answer: False Title: Assessment Question 5.18 Learning Objective 1: LO 5.5 Describe corporate performance management, and provide an example of how your university could use CPM. Section Reference 1: 5.5 Business Intelligence in Action: Corporate Performance Management Difficulty: Easy

Question Type: Multiple Choice

19) _____ is the process by which organizational goals are achieved through the use of organizational resources. a) Organizational decision making b) Operations c) Organizational strategy d) Organizational productivity e) Management Answer: e Title: Assessment Question 5.19 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

20) Which of the following is not a basic role of managers? a) interpersonal b) entrepreneurial c) informational d) decisional


Answer: b Title: Assessment Question 5.20 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

21) Being a figurehead and leader is part of the _____ managerial role. a) interpersonal b) entrepreneurial c) informational d) decisional e) confrontational Answer: a Title: Assessment Question 5.21 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

22) Being an entrepreneur, disturbance handler, and negotiator is part of the _____ managerial role. a) interpersonal b) entrepreneurial c) informational d) decisional e) confrontational Answer: d Title: Assessment Question 5.22 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

23) In the _____ phase of the decision-making process, managers examine a situation and identify and define the problem. a) implementation b) choice c) design


d) intelligence e) consideration Answer: d Title: Assessment Question 5.23 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

24) In the _____ phase of the decision-making process, managers construct a model that simplifies the problem. a) implementation b) choice c) design d) intelligence e) consideration Answer: c Title: Assessment Question 5.24 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

25) Success in the _____ phase of the decision-making process results in resolving the original problem, and failure leads to a return to previous phases. a) implementation b) choice c) design d) intelligence e) consideration Answer: a Title: Assessment Question 5.25 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy 26) In the _____ phase of the decision-making process, managers test potential solutions “on paper.”


a) implementation b) choice c) design d) intelligence e) consideration Answer: b Title: Assessment Question 5.26 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

27) Which of the following is not a reason why managers need IT support? a) The number of alternatives is decreasing. b) Decisions must typically be made under time pressure. c) Decisions are becoming more complex. d) There is a growing need to access remote information sources. e) Decision makers are often based in different locations. Answer: a Title: Assessment Question 5.27 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

28) Decisions today are becoming _____ complex, due to _____ uncertainty in the decision environment. a) less, decreased b) more, decreased c) less, increased d) more, increased e) neither more nor less, decreased Answer: d Title: Assessment Question 5.28 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Medium


29) Which of the following is not a characteristic of a structured decision? a) It is routine. b) It is repetitive. c) Human intuition is not involved. d) The first three phases of the decision-making process need not occur in any particular sequence e) Standard solutions exist. Answer: d Title: Assessment Question 5.29 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Medium

30) The type of decision that can be made by following a definite procedure is called a(n) ______ decision. a) structured b) unstructured c) undocumented d) semistructured e) procedural Answer: a Title: Assessment Question 5.30 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

31) ________ decisions are more common at lower organizational levels. a) Structured b) Unstructured c) Undocumented d) Semistructured e) Procedural Answer: a Title: Assessment Question 5.31


Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

32) Rank-and-file employees tend to make more _________ decisions. a) Structured b) Unstructured c) Undocumented d) Semistructured e) Procedural Answer: a Title: Assessment Question 5.32 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

33) Calculating gross pay for hourly workers is an example of ________ decision making. a) Structured b) Unstructured c) Undocumented d) Semistructured e) Procedural Answer: a Title: Assessment Question 5.33 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

34) Which of the following is not a characteristic of unstructured decisions? a) They are complex. b) They typically are fuzzy and unclear. c) Standard solutions exist. d) Human intuition is involved. e) The first three phases of the decision-making process occur in no particular sequence. Answer: c


Title: Assessment Question 5.34 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Medium

35) When there is no well-understood or agreed-on procedure for making a decision, the decision is said to be: a) undocumented b) structured c) unstructured d) semistructured e) documented Answer: c Title: Assessment Question 5.35 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

36) A large foreign automobile manufacturer is considering where to build a new manufacturing plant in the United States. They are making which type of decision? a) structured b) semistructured c) unstructured d) informational e) wisdom Answer: c Title: Assessment Question 5.36 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Medium

37) Which type of decision requires a combination of standard solution procedures and individual judgment? a) structured b) semistructured c) unstructured


d) informational e) wisdom Answer: b Title: Assessment Question 5.37 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy 38) A company’s annual employee evaluation best fits which type of decision? a) unstructured b) structured c) semistructured d) confrontational e) wisdom Answer: c Title: Assessment Question 5.38 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Medium

39) _____ is the efficient and effective execution of specific tasks. a) Operational control b) Management control c) Strategic planning d) Expertise e) Wisdom Answer: a Title: Assessment Question 5.39 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

40) _____ is the acquisition and efficient use of resources in accomplishing organizational goals. a) Operational control


b) Management control c) Strategic planning d) Expertise e) Wisdom Answer: b Title: Assessment Question 5.40 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

41) Computer support is greatest for which of the following problems? a) semistructured and strategic planning b) unstructured and operational control c) structured and operational control d) semistructured and management control e) structured and management control Answer: c Title: Assessment Question 5.41 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy

42) Computer support is least for which of the following problems? a) semistructured and strategic planning b) unstructured and strategic planning c) semistructured and management control d) unstructured and operational control e) structured and strategic planning Answer: b Title: Assessment Question 5.42 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Easy


43) Searching for valuable business information in a database, data warehouse, or data mart is referred to as _____. a) structured queries b) database queries c) data mining d) query by example e) expert system queries Answer: c Title: Assessment Question 5.43 Learning Objective 1: LO 5.3 Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference 1: 5.3 Business Intelligence Applications for Data Analysis Difficulty: Easy

44) _____ provides users with a view of what is happening, whereas _____ addresses why it is happening. a) Multidimensional data analysis, structured query language b) Data mining, multidimensional data analysis c) Data mining, expert system d) Multidimensional data analysis, neural networks e) Multidimensional data analysis, data mining Answer: e Title: Assessment Question 5.44 Learning Objective 1: LO 5.3 Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference 1: 5.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

45) Credit card companies would most likely use which of the following to check for fraudulent credit card use? a) Data mining b) Expert systems c) Neural networks d) Multidimensional data analysis e) Structured query language Answer: a Title: Assessment Question 5.45


Learning Objective 1: LO 5.3 Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference 1: 5.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

46) A company wants to use data from past promotional mailings to identify people who would likely respond favorably to future mailings. This company would most likely use: a) structured query language b) multidimensional data analysis c) neural networks d) expert systems e) data mining Answer: e Title: Assessment Question 5.46 Learning Objective 1: LO 5.3 Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference 1: 5.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

47) Which of the following is not a characteristic of DSSs? a) They support only lower- and middle-level managers. b) They are easy to use and construct. c) They can adapt to changing conditions. d) They usually utilize quantitative models. e) They support all phases of the decision-making process. Answer: a Title: Assessment Question 5.47 Learning Objective 1: LO 5.3 Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference 1: 5.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

48) At the end of a semester, a student knows that she must achieve a grade of 81 or higher on her final exam to get an A in the course. She has just performed what kind of analysis? a) What-if b) Qualitative c) Sensitivity d) Goal-seeking e) Simulation


Answer: d Title: Assessment Question 5.48 Learning Objective 1: LO 5.3 Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference 1: 5.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

49) _____ attempts to find the value of the inputs necessary to achieve a desired level of output. a) What-if analysis b) Qualitative analysis c) Sensitivity analysis d) Goal-seeking analysis e) Simulation Answer: d Title: Assessment Question 5.49 Learning Objective 1: LO 5.3 Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference 1: 5.3 Business Intelligence Applications for Data Analysis Difficulty: Easy

50) Which of the following is not a characteristic of organizational decision support systems? a) They affect multiple organizational units or corporate issues. b) They cut across organizational functions or hierarchical layers. c) They involve computer-based technologies. d) They are standalone systems. e) They involve communications technologies. Answer: d Title: Assessment Question 5.50 Learning Objective 1: LO 5.3 Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference 1: 5.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

51) A(n) _____ provides rapid access to timely information and direct access to management reports. a) decision support system b) expert system c) neural network


d) digital dashboard e) data warehouse Answer: d Title: Assessment Question 5.51 Learning Objective 1: LO 5.4 Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference 1: 5.4 Business Intelligence Applications for Presenting Results Difficulty: Easy

52) Which capability of digital dashboards enables users to obtain the latest data available on key performance indicators or some other metric, ideally in real time? a) Drill-down b) Key performance indicators c) Status access d) Trend analysis e) Exception reporting Answer: c Title: Assessment Question 5.52 Learning Objective 1: LO 5.4 Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference 1: 5.4 Business Intelligence Applications for Presenting Results Difficulty: Easy

53) Which of the following information systems are very user friendly, supported by graphics, and provide exception reporting and drill down? a) decision support systems b) digital dashboards c) functional area information systems d) group decision support systems e) expert systems Answer: b Title: Assessment Question 5.53 Learning Objective 1: LO 5.4 Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference 1: 5.4 Business Intelligence Applications for Presenting Results Difficulty: Easy


54) Digital dashboards provide all of the following capabilities except: a) drill-down b) transaction processing c) status access d) key performance indicators e) exception reporting Answer: b Title: Assessment Question 5.54 Learning Objective 1: LO 5.4 Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference 1: 5.4 Business Intelligence Applications for Presenting Results Difficulty: Medium

55) The management cockpit best exemplifies which type of system? a) decision support system b) expert system c) digital dashboard d) functional area information system e) group decision support system Answer: c Title: Assessment Question 5.55 Learning Objective 1: LO 5.4 Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference 1: 5.4 Business Intelligence Applications for Presenting Results Difficulty: Medium

56) The primary distinguishing characteristic of geographical information systems is: a) every record or digital object has a unique identifier b) every record or digital object is visible to the user c) every record or digital object must be accessed by programmers d) every record or digital object has an identified geographical location e) every record or digital object is encrypted Answer: d Title: Assessment Question 5.56


Learning Objective 1: LO 5.4 Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference 1: 5.4 Business Intelligence Applications for Presenting Results Difficulty: Medium

57) Geocoding involves: a) integrating maps with spatially oriented databases and other databases b) encrypting spatial information c) accessing geographical information d) integrating organizational transactions with spatially oriented databases e) programming spatially oriented databases Answer: a Title: Assessment Question 5.57 Learning Objective 1: LO 5.4 Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference 1: 5.4 Business Intelligence Applications for Presenting Results Difficulty: Medium

58) Today, geographical information systems are being combined with _____ to form geospatial technologies. a) dashboards b) global positioning systems c) decision support systems d) expert systems e) neural networks Answer: b Title: Assessment Question 5.58 Learning Objective 1: LO 5.4 Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference 1: 5.4 Business Intelligence Applications for Presenting Results Difficulty: Medium 59) Refer to the Closing Case #1 – Quality Assurance at Daimler AG: Which of the following best describes Daimler’s Quality Information System (QUIS)? a) Users didn’t have the right tools to access the data. b) Information was easily evaluated together.


c) The platform had excess capacity. d) The data for diagnostics were not available. e) QUIS was used only by garages. Answer: a Title: Assessment Question 5.59 Learning Objective 1: LO 5.6 Summarize the fundamental concepts and skills related to business intelligence. Section Reference 1: Closing Case 1: Quality Assurance Difficulty: Medium 60) Refer to the Opening Case – Adelaide Brighton Cement: Adelaide Brighton Cement decided to use a hosted system called myDIALS for incident hazard and reporting. Which of the following is not a reason for their choice? a) The business intelligence application runs on Adelaide’s servers. b) The BI application runs on myDIALS servers. c) The hosted system involved minimal risk. d) The hosted system was less expensive than an ERP system. e) Implementing the hosted system required no modifications to Adelaide’s existing systems. Answer: a

Title: Assessment Question 5.60 Learning Objective 1: LO 5.0 Provide a real-world application of business intelligence. Section Reference 1: Opening Case: Adelaide Brighton Cement Difficulty: Easy 61) Refer to IT’s About Business 5.1 – Kelley Blue Book: Which of the following is not a by-product of Kelley Blue Book’s use of business intelligence data? a) Integrated their data with third-party data b) Improved the speed of estimates on their Web site c) Helped owners determine the best time to sell d) Enabled owners to forecast car prices e) Quicker turnaround to publish a new book. Answer: e Title: Assessment Question 5.61 Learning Objective 1: LO 5.2 Describe and provide examples of the three different ways that organizations use BI. Section Reference 1: IT’s About Business 5.1 Difficulty: Easy


62) Refer to IT’s About Business 5.2 – Technology at NC State: Which of the following statements concerning IBM’s “Big Data” analytics technology is not true? a) It enabled university professionals to mine large amounts of structured data. b) It made the process of finding partners more difficult due to information overload. c) It successfully interfaced with the university’s database. d) It shortened the triage process. e) It freed up time that enabled university professionals to launch new companies. Answer: b Title: Assessment Question 5.62 Learning Objective 1: LO 5.2 Describe and provide examples of the three different ways that organizations use BI. Section Reference 1: IT’s About Business 5.2 Difficulty: Medium 63) Refer to IT’s About Business 5.3 – 1-800-CONTACTS: Which of the following is true about 1-800CONTACTS’s use of business intelligence technologies? a) The Call Center Incentive index is used to determine the agents’ vacation days. b) The company updates the dashboard daily. c) The executive dashboard provides both current and historical data. d) The call center operators did not respond well to the dashboards. e) The quality of the service calls did not improve despite the implementation of the dashboard. Answer: c Title: Assessment Question 5.63 Learning Objective 1: LO 5.4 Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference 1: IT’s About Business 5.3 Difficulty: Medium 64) Refer to Closing Case #2 –Norfolk Southern: Norfolk Southern used a data warehouse to manage the information that is accessible via business intelligence tools. Which of the following statements about Norfolk Southern’s use of BI tools is not true? a) The data in the data warehouse can be used by all departments in the company. b) Norfolk Southern does not share its data with external customers. c) The data were used to determine where to locate field offices. d) The dashboard application uses visualization technology. e) The data for the data warehouse come from operational systems. Answer: b


Title: Assessment Question 5.64 Learning Objective 1: LO 5.6 Summarize the fundamental concepts and skills related to business intelligence. Section Reference 1: Closing Case 2: Norfolk Southern Difficulty: Medium

Question Type: Essay

65) Describe the three major roles of managers. Title: Assessment Question 5.65 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Medium

66) Explain why managers need IT support. Title: Assessment Question 5.66 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Medium

67) Discuss the information technologies that are available to support managers. Title: Assessment Question 5.67 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Medium

68) Describe the phases in the decision-making process. Title: Assessment Question 5.68 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Medium

69) Describe OLAP, and explain what a data cube is.


Title: Assessment Question 5.69 Learning Objective 1: LO 5.3 Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference 1: 5.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

70) Explain data mining, using examples. Title: Assessment Question 5.70 Learning Objective 1: LO 5.3 Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference 1: 5.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

71) Explain how what-if analysis is employed, using examples. Title: Assessment Question 5.71 Learning Objective 1: LO 5.3 Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference 1: 5.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

72) Explain what data visualization technologies are, using examples. Title: Assessment Question 5.72 Learning Objective 1: LO 5.3 Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference 1: 5.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

73) Describe how your university could use a decision support system in its admissions process. Title: Assessment Question 5.73 Learning Objective 1: LO 5.3 Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference 1: 5.3 Business Intelligence Applications for Data Analysis Difficulty: Hard

74) Discuss the structure of problems, the nature of decisions, and the framework for computerized decision analysis. Title: Assessment Question 5.74 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making.


Section Reference 1: 5.1 Managers and Decision Making Difficulty: Medium

75) Describe how your university could use a geographical information system in its admissions process. What value could your university gain from using such a system? Title: Assessment Question 5.75 Learning Objective 1: LO 5.3 Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference 1: 5.3 Business Intelligence Applications for Data Analysis Difficulty: Hard

76) Speculate on the future of virtual reality applications in higher (college and university) education. Describe some possible applications. Title: Assessment Question 5.76 Learning Objective 1: LO 5.4 Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference 1: 5.4 Business Intelligence Applications for Presenting Results Difficulty: Hard

Question Type: True/False

77) The use of BI is limited to large corporations. Answer: False Title: Assessment Question 5.77 Learning Objective 1: LO 5.2 Describe and provide examples of the three different ways that organizations use BI. Section Reference 1: 5.2 What Is Business Intelligence? Difficulty: Easy

Question Type: Multiple Choice 78) You’ve started an internship at the major hospital in your city. Your boss gave you ten minutes of training on the data warehouse that you have access to. The last thing she told you was to do some analysis on the Visit cube. Which of the following statements is false? a) One dimension of the cube is (probably) day. b) One dimension of the cube is (probably) treatment. c) One dimension of the cube is (probably) doctor.


d) One dimension of the cube is (probably) month. e) One dimension of the cube is (probably) patient. Answer: d Title: Assessment Question 5.78 Learning Objective 1: LO 5.3 Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference 1: 5.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

79) Sally is working for her uncle for the summer in the marketing department of Proctor & Gamble. She tells you she does data mining all day long. Which of the following statements is false? a) Data mining can be used to prove assumptions. b) Data mining is used to identify unknown patterns. c) Data mining can explain why things happened. d) Data mining can predict what will happen. e) Data mining can be used to identify customers. Answer: e Title: Assessment Question 5.79 Learning Objective 1: LO 5.3 Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference 1: 5.3 Business Intelligence Applications for Data Analysis Difficulty: Medium

80) Shawn is doing some budgeting for his new start-up business. He has developed a budget in Excel using formulas, as he was taught to do in college. Which of the following statements is true? a) If Shawn changes one of his assumptions, Excel will automatically recalculate the budget numbers. b) Shawn would use sensitivity analysis to check the impact of changing his price. c) Shawn would use roll-up to review his summary numbers. d) Shawn would use what-if analysis to check the impact of changing his price and the commission he pays his sales people. e) Shawn would use goal-seeking analysis to examine the impact of changing his forecast of units sold. Answer: a Title: Assessment Question 5.80 Learning Objective 1: LO 5.3 Specify the BI applications available to users for data analysis, and provide examples of how each one might be used to solve a business problem at your university. Section Reference 1: 5.3 Business Intelligence Applications for Data Analysis Difficulty: Medium


81) Amanda is working for the CEO of a small company. He asks her to develop a dashboard. Amanda starts thinking about the questions she needs to ask. Which of the following questions is not on Amanda’s list? a) How many levels do you wish to drill down? b) What are your key performance indicators? c) Do you need real-time data? d) Do you want graphs and charts or text? e) Should it run on your iPhone? Answer: c Title: Assessment Question 5.81 Learning Objective 1: LO 5.4 Describe three BI applications that present the results of data analyses to users, and offer examples of how businesses and government agencies can use each of these technologies. Section Reference 1: 5.4 Business Intelligence Applications for Presenting Results Difficulty: Medium

82) Elena is trying to decide whether she should expand her ice cream shop to a bigger space. She decides to be very methodical about it and follow the phases of the decision-making process she learned in college. Which of the following statements is true? a) During the intelligence phrase, Elena will build a model using assumptions about the business. b) During the design phrase, Elena will define the opportunity. c) During the choice phase, Elena will lay out her options. d) During the implementation phase, Elena will implement two of her solutions. e) Elena will use test data to validate her model. Answer: e Title: Assessment Question 5.82 Learning Objective 1: LO 5.1 Identify the phases in the decision-making process, and use a decisionsupport framework to demonstrate how technology supports managerial decision making. Section Reference 1: 5.1 Managers and Decision Making Difficulty: Medium


Package Title: Assessment Questions Course Title: MIS 1e Chapter Number: 6

Question Type: True/False

1) An individual or organization faced with an ethical decision is basically considering whether to break the law. Answer: False Title: Assessment Question 6.01 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Easy

2) A code of ethics is a collection of principles that are intended to guide decision making by members of the organization. Answer: True Title: Assessment Question 6.02 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Easy

3) Improvements in information technologies are leading to a decreasing number of ethical problems. Answer: False Title: Assessment Question 6.03 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Easy

4) When you interview for a job at a company, it is likely that the company will Google you and search social networking sites for information on you. Answer: True Title: Assessment Question 6.04 Learning Objective 1: LO 6.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference 1: 6.2 Privacy Difficulty: Easy

5) The right of privacy is absolute.


Answer: False Title: Assessment Question 6.05 Learning Objective 1: LO 6.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference 1: 6.2 Privacy Difficulty: Easy 6) The individual’s right of privacy supersedes the public’s right to know. Answer: False Title: Assessment Question 6.06 Learning Objective 1: LO 6.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference 1: 6.2 Privacy Difficulty: Easy

7) In general, employees have high legal protection against surveillance by employers. Answer: False Title: Assessment Question 6.07 Learning Objective 1: LO 6.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference 1: 6.2 Privacy Difficulty: Easy

8) The opt-out model of informed consent allows a company to collect personal information until the customers specifically requests otherwise. Answer: True Title: Assessment Question 6.08 Learning Objective 1: LO 6.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference 1: 6.2 Privacy Difficulty: Easy

9) The Platform for Privacy Preferences automatically communicates privacy policies between a commerce Web site and its visitors. Answer: True Title: Assessment Question 6.09 Learning Objective 1: LO 6.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference 1: 6.2 Privacy Difficulty: Easy

10) The flow of information among countries is called transborder data flows.


Answer: True Title: Assessment Question 6.10 Learning Objective 1: LO 6.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference 1: 6.2 Privacy Difficulty: Easy 11) The “safe harbor” framework details how the European Union exports data about U.S. citizens. Answer: False Title: Assessment Question 6.11 Learning Objective 1: LO 6.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference 1: 6.2 Privacy Difficulty: Medium

Question Type: Multiple Choice

12) The ____________ ethical standard states that an ethical action is the one that provides the most good or does the least harm. a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being Answer: d Title: Assessment Question 6.12 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Medium

13) The ____________ ethical standard states that an ethical action is the one that best protects and respects the moral rights of the affected parties. a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being Answer: c Title: Assessment Question 6.13 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.


Section Reference 1: 6.1 Ethical Issues Difficulty: Medium

14) The _____________ ethical standard states that ethical actions treat all human beings equally. a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being Answer: b Title: Assessment Question 6.14 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Easy

15) The _______________ ethical standard states that respect and compassion for all others is the basis for ethical actions. a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being Answer: a Title: Assessment Question 6.15 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Medium

16) Which of the following is not a step in ethical decision making? a) Recognize the ethical issue. b) Get the facts. c) Evaluate alternative actions. d) Make a decision and test it. e) All of these are steps in ethical decision making. Answer: e Title: Assessment Question 6.16 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Medium


17) Various organizations that promote fair and responsible use of information systems often develop a _____. a) Code of ethics b) Strategic plan c) Mission statement d) Responsibility charter e) Goals outline Answer: A Title: Assessment Question 6.17 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Easy

18) What is _____ is not necessarily _____. a) Illegal, unethical b) Ethical, illegal c) Unethical, illegal d) Unethical, legal e) Ethical, legal Answer: c Title: Assessment Question 6.18 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Medium

19) _____ issues involve collecting, storing, and disseminating information about individuals. a) Privacy b) Accuracy c) Transferability d) Property e) Accessibility Answer: a Title: Assessment Question 6.19 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Easy

20) _____ issues involve the authenticity and fidelity of information that is collected and processed. a) Privacy b) Accuracy c) Transferability


d) Property e) Accessibility Answer: b Title: Assessment Question 6.20 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Easy

21) _____ issues involve who may obtain information and how much they should pay for this information. a) Privacy b) Accuracy c) Transferability d) Property e) Accessibility Answer: e Title: Assessment Question 6.21 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Easy

22) _____________ means accepting the consequences of your decisions and actions. a) Privacy b) Responsibility c) Transferability d) Accountability e) Liability Answer: b Title: Assessment Question 6.22 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Easy

23) ______________ determines who is responsible for the actions taken. a) Privacy b) Responsibility c) Transferability d) Accountability e) Liability Answer: d


Title: Assessment Question 6.23 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Easy

24) Which of the following is not an ethical issue related to IT? a) Privacy b) Accuracy c) Accountability d) Property (such as intellectual property) e) Accessibility to information Answer: c Title: Assessment Question 6.24 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Easy

25) ______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. a) Privacy b) Responsibility c) Transferability d) Accountability e) Liability Answer: e Title: Assessment Question 6.25 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Easy

26) Which of the following statements is correct? a) An individual’s right to privacy is absolute. b) Determining and enforcing privacy regulations can be difficult. c) An individual’s right to privacy supersedes the needs of society. d) Advances in information technologies have not affected individual privacy. e) The Internet has increased individuals’ privacy. Answer: b Title: Assessment Question 6.26 Learning Objective 1: LO 6.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference 1: 6.2 Privacy


Difficulty: Medium

27) The process of profiling: a) Increases individual privacy. b) Decreases individual privacy. c) Has no effect on individual privacy. d) Is illegal in more than half of the states. e) Is legal but unethical. Answer: b Title: Assessment Question 6.27 Learning Objective 1: LO 6.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference 1: 6.2 Privacy Difficulty: Medium

28) What is the relationship between advances in information technology and the practice of profiling? a) Advances in IT make it more difficult to profile individuals. b) Advances in IT have no impact on profiling. c) Advances in IT make it more expensive to profile individuals. d) Advances in IT make it easier to profile individuals. Answer: d Title: Assessment Question 6.28 Learning Objective 1: LO 6.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference 1: 6.2 Privacy Difficulty: Medium

29) Which of the following statements is not correct? a) Employees have limited protection against surveillance by employers. b) The large majority of organizations monitor employee Internet usage. c) The large majority of organizations use URL filtering. d) As with normal first-class mail, employers cannot read employee e-mail. e) Employees should be aware that surveillance is legal. Answer: d Title: Assessment Question 6.29 Learning Objective 1: LO 6.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference 1: 6.2 Privacy Difficulty: Medium

30) How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other.


a) The public, the individual b) The public, ethics c) Freedom of speech, privacy d) The individual, freedom of speech e) Ethics, security Answer: c Title: Assessment Question 6.30 Learning Objective 1: LO 6.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference 1: 6.2 Privacy Difficulty: Hard

31) Privacy advocates prefer which model of informed consent? a) Opt-in b) Opt-out c) Either Opt-in or Opt-out d) Neither Opt-in or Opt-out Answer: a Title: Assessment Question 6.31 Learning Objective 1: LO 6.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference 1: 6.2 Privacy Difficulty: Easy

32) Which of the following statements is correct? a) International privacy and security laws are very consistent. b) Consistent international privacy and security laws help companies with their regulatory requirements from country to country. c) Consistent international privacy and security laws enable information to flow freely among countries. d) The absence of consistent international privacy and security laws has led to a complex global legal framework. e) Consistent international privacy and security laws are followed by all countries. Answer: d Title: Assessment Question 6.32 Learning Objective 1: LO 6.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference 1: 6.2 Privacy Difficulty: Medium

33) Data aggregators sell digital dossiers to companies that want to know their customers better. This practice is called ________. a) Customer relationships b) Customer profiling c) Customer intimacy


d) Customer knowledge e) Spying Answer: c Title: Assessment Question 6.33 Learning Objective 1: LO 6.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference 1: 6.2 Privacy Difficulty: Medium

34) Refer to Opening Case -- MidTown Bank: Which of the following statements is false? a) Two employees talking about a customer’s account is an ethical issue. b) Employees talking to friends about people’s bank accounts is an ethical issue. c) Educating employees will solve the problems at the bank. d) ShaNiqua should have told the bank managers. e) Strong information technology security is not the solution. Answer: c Title: Assessment Question 6.34 Learning Objective 1: LO 6.0 Provide a real-world application relating to ethics and privacy in the use of information systems. Section Reference 1: Opening Case: MidTown Bank Difficulty: Medium 35) Refer to IT’s About Business 6.1 -- Big Brother is Watching You: Is the use of privately collected data without a person’s knowledge unethical? Which of the following elements is not increasing the amount of collected data? a) Inexpensive database management software b) Inexpensive digital sensors c) Low-cost digital cameras d) Cell phones with cameras and GPS sensors e) The low cost of storing digital data Answer: a Title: Assessment Question 6.35 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: IT’s About Business 6.1 Difficulty: Medium 36) Refer to IT’s About Business 6.1 -- Big Brother is Watching You: Which of the following statements concerning photo tagging is false? a) Users must assign names to people in photos. b) People do not need to give permission to be tagged. c) Facial-recognition software can only look for similar facial features among the user’s photos. d) Facial-recognition software can look at videos as well as photos. e) Photo tagging cannot be prevented.


Answer: c Title: Assessment Question 6.36 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: IT’s About Business 6.1 Difficulty: Medium 37) Refer to IT’s About Business 6.2 – Your Privacy on Facebook: Which of the following statements concerning Facebook’s privacy polices is false? a) Facebook puts the responsibility of privacy in the hands of the user. b) Facebook has an “off switch” that lets users block all access to their information from third-party applications and Web sites. c) Facebook’s CEO feels that privacy is no longer a social norm. d) Facebook created new “buckets” that could be designated to groups of people. e) Facebook uses an opt-in model. Answer: e Title: Assessment Question 6.37 Learning Objective 1: LO 6.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference 1: IT’s About Business 6.2 Difficulty: Medium

38) Refer to Closing Case #1– What to Do About WikiLeaks? Which of the following statements concerning about WikiLeaks is false? a) Anyone can submit files to WikiLeaks. b) The most controversial exposé involved the U.S. government. c) Governments and companies are using network forensics to identify intruders who break into systems. d) Because of WikiLeaks, governments and companies are trying to use data leak prevention software to prevent unauthorized downloads. e) WikiLeaks is legally protected in the U.S. because it is merely a conduit for the documents. Answer: c Title: Assessment Question 6.38 Learning Objective 1: LO 6.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference 1: IT’s About Business 6.2 Difficulty: Medium

Question Type: Essay

39) Identify and analyze the fundamental ethical issues involved with information technology. Title: Assessment Question 6.39 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues


Difficulty: Medium

40) Discuss the fundamental tenants of ethics: responsibility, accountability, and liability. Title: Assessment Question 6.40 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Medium

41) Explain why something that is unethical might not necessarily be illegal. Title: Assessment Question 6.41 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Medium 42) Discuss the two rules of privacy: The right of privacy is not absolute, and the public’s right to know supersedes the individual’s right to privacy. Title: Assessment Question 6.42 Learning Objective 1: LO 6.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference 1: 6.2 Privacy Difficulty: Medium

43) Compare and contrast the two informed consent models: opt-in and opt-out. Why do companies prefer one over the other? Why do privacy advocates prefer one over the other? Title: Assessment Question 6.43 Learning Objective 1: LO 6.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference 1: 6.2 Privacy Difficulty: Medium

44) Discuss the relationship between surveillance and privacy. Title: Assessment Question 6.44 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Hard

45) Compare and contrast the four widely used stands for ethics: utilitarian, rights, fairness, and common good. Title: Assessment Question 6.45 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues


Difficulty: Medium

46) Discuss the international aspects of privacy. How do these aspects impact transborder data flows? Title: Assessment Question 6.46 Learning Objective 1: LO 6.2 Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there. Section Reference 1: 6.2 Privacy Difficulty: Medium

Question Type: Multiple Choice

47) Shelli runs a small boutique in Tel Aviv. She accepts credit cards and writes the number on her copy of the receipt in case there is a problem later. This practice involves which ethical issue related to IT? a) Privacy b) Accuracy c) Accountability d) Property (such as intellectual property) e) Accessibility to information Answer: a Title: Assessment Question 6.47 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Medium

48) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. A new bakery business down the block wants to buy Shelli’s client list from her. If Shelli does sell the list, which ethical issue related to IT would be involved? a) Privacy b) Accuracy c) Accountability d) Property (such as intellectual property) Answer: a Title: Assessment Question 6.48 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Medium

49) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. She keeps all her client data on her laptop in a password-protected file. Her decision to protect the file reflects which ethical issue related to IT? a) Privacy


b) Accuracy c) Accountability d) Property (such as intellectual property) e) Accessibility to information Answer: e Title: Assessment Question 6.49 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Medium

50) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. Clients fill out a form to join her mailing list. Shelli indicates on the form that client information will not be shared without permission. This policy illustrates which ethical issue related to IT? a) Privacy b) Accuracy c) Accountability d) Property (such as intellectual property) e) Accessibility to information Answer: a Title: Assessment Question 6.50 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Medium

51) Shelli runs a small boutique in Tel Aviv. Her intern just came to her with a new design for her Web site. Shelli really likes the design, and she informs the intern that he is quite the artist. Section reference 1The intern responds that he found the design on the Internet. Shelli replies that they can’t use it. Her decision reflects which ethical issue related to IT? a) Privacy b) Accuracy c) Accountability d) Property (such as intellectual property) e) Accessibility to information Answer: d Title: Assessment Question 6.51 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Medium 52) Shelli runs a small boutique in Tel Aviv. Her intern was checking the boutique’s Facebook page and noticed some negative comments. He deleted them. At the end of the day, when they were closing up, he told Shelli about the comments and what he had done. Shelli was not pleased, and she told him so. Why wasn’t Shelli pleased?


a) She didn’t like hearing anything negative about her store. b) People are free to say what they wish. c) She thought he should ask her before he deleted them. d) He wasn’t supposed to be checking Facebook. e) All of these are reasons for Shelli’s not being pleased. Answer: b Title: Assessment Question 6.52 Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Section Reference 1: 6.1 Ethical Issues Difficulty: Medium


Package Title: Assessment Questions Course Title: MIS 1e Chapter Number: 7

Question Type: True/False

1) Having one backup of your business data is sufficient for security purposes. Answer: False Title: Assessment Question 7.1 Learning Objective 1: LO 7.0 Describe a real-world application of information security. Section Reference 1: Opening Case: Thomas Tax Service Difficulty: Easy

2) The security of each computer on the Internet is independent of the security of all other computers on the Internet. Answer: False Title: Assessment Question 7.2 Learning Objective 1: LO 7.1 Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: 7.1 Introduction to Information Security Difficulty: Easy

3) The computing skills necessary to be a hacker are decreasing. Answer: True Title: Assessment Question 7.3 Learning Objective 1: LO 7.1 Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: 7.1 Introduction to Information Security Difficulty: Easy

4) Human errors cause more than half of the security-related problems in many organizations. Answer: True Title: Assessment Question 7.4 Learning Objective 1: LO 7.2 Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference 1: 7.2 Unintentional Threats to Information Systems Difficulty: Easy

5) The higher the level of an employee in organization, the greater the threat that he or she poses to the organization. Answer: True Title: Assessment Question 7.5 Learning Objective 1: LO 7.2 Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference 1: 7.2 Unintentional Threats to Information Systems Difficulty: Easy

6) Dumpster diving is always illegal because it involves trespassing on private property.


Answer: False Title: Assessment Question 7.6 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Easy

7) Software can be copyrighted. Answer: True Title: Assessment Question 7.7 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Easy

8) Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated. Answer: True Title: Assessment Question 7.8 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Easy

9) Zero-day attacks use deceptive e-mails to acquire sensitive personal information. Answer: False Title: Assessment Question 7.9 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Medium

10) In most cases, cookies track your path through Web sites and are therefore invasions of your privacy. Answer: True Title: Assessment Question 7.10 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Easy

11) Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition (SCADA) systems to cause widespread physical damage. Answer: True Title: Assessment Question 7.11 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Easy

12) Supervisory control and data acquisition (SCADA) systems require human data input.


Answer: False Title: Assessment Question 7.12 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Medium

13) Cyberterrorism is usually carried out by nations. Answer: False Title: Assessment Question 7.13 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Easy

14) IT security is the responsibility of everyone in the organization. Answer: True Title: Assessment Question 7.14 Learning Objective 1: LO 7.4 Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: 7.4 What Companies Are Doing to Protect Information Resources Difficulty: Easy

15) Risk analysis involves determining whether security programs are working. Answer: False Title: Assessment Question 7.15 Learning Objective 1: LO 7.4 Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: 7.4 What Companies Are Doing to Protect Information Resources Difficulty: Medium 16) A password refers to “something the user is.” Answer: False Title: Assessment Question 7.16 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Easy

17) Organizations utilize layers of controls because they face so many diverse threats to information security. Answer: True Title: Assessment Question 7.17 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Medium


18) Public-key encryption uses two different keys, one public and one private. Answer: True Title: Assessment Question 7.18 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Medium 19) Voice recognition is an example of “something a user does” authentication. Answer: True Title: Assessment Question 7.19 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Medium

20) Organizations use authentication to establish privileges to systems operations. Answer: True Title: Assessment Question 7.20 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Medium

21) The area located between two firewalls within an organization is called the demilitarized zone. Answer: True Title: Assessment Question 7.21 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Easy

22) A VPN is a network within the organization. Answer: False Title: Assessment Question 7.22 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Easy

23) A URL that begins with https rather than http indicates that the site transmits using an extra layer of security called transport layer security. Answer: True Title: Assessment Question 7.23


Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Easy

Question Type: Multiple Choice

24) Which of the following is not a consequence of poor information security practices? a) Stolen information b) Stolen identities c) Financial loss d) Loss of service e) All of the above are consequences of poor information security practices. Answer: e Title: Assessment Question 7.24 Learning Objective 1: LO 7.0 Describe a real-world application of information security. Section Reference 1: Opening Case: Thomas Tax Service Difficulty: Easy

25) In its study of various organizations, the Ponemon Institute found that the most common cause of data breaches was: a) weak passwords. b) unattended computers. c) employee negligence. d) contract labor, such as consultants. e) poor antivirus software. Answer: C Title: Assessment Question 7.25 Learning Objective 1: LO 7.0 Describe a real-world application of information security. Section Reference 1: Opening Case: Thomas Tax Service Difficulty: Hard

26) Which of the following factors is not increasing the threats to information security? a) smaller computing devices b) downstream liability c) the Internet d) limited storage capacity on portable devices e.) due diligence Answer: d Title: Assessment Question 7.26 Learning Objective 1: LO 7.1 Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: 7.1 Introduction to Information Security Difficulty: Medium

27) The computing skills necessary to be a hacker are decreasing for which of the following reasons? a) More information systems and computer science departments are teaching courses on hacking so that their graduates can recognize attacks on information assets.


b) Computer attack programs, called scripts, are available for download from the Internet. c) International organized crime is training hackers. d) Cybercrime is much more lucrative than regular white-collar crime. e) Almost anyone can buy or access a computer today. Answer: b Title: Assessment Question 7.27 Learning Objective 1: LO 7.1 Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: 7.1 Introduction to Information Security Difficulty: Hard

28) Rank the following in terms of dollar value of the crime, from highest to lowest. a) robbery – white collar crime – cybercrime b) white collar crime – extortion – robbery c) cybercrime – white collar crime – robbery d) cybercrime – robbery – white collar crime e) white collar crime – burglary – robbery Answer: c Title: Assessment Question 7.28 Learning Objective 1: LO 7.1 Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: 7.1 Introduction to Information Security Difficulty: Medium

29) A _____ is any danger to which an information resource may be exposed. a) vulnerability b) risk c) control d) threat e) compromise Answer: d Title: Assessment Question 7.29 Learning Objective 1: LO 7.1 Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: 7.1 Introduction to Information Security Difficulty: Easy 30) An information system’s _____ is the possibility that the system will be harmed by a threat. a) vulnerability b) risk c) control d) danger e) compromise Answer: a Title: Assessment Question 7.30 Learning Objective 1: LO 7.1 Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: 7.1 Introduction to Information Security


Difficulty: Easy

31) The most overlooked people in information security are: a) consultants and temporary hires. b) secretaries and consultants. c) contract laborers and executive assistants. d) janitors and guards. e) executives and executive secretaries. Answer: d Title: Assessment Question 7.31 Learning Objective 1: LO 7.2 Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference 1: 7.2 Unintentional Threats to Information Systems Difficulty: Easy

32) Employees in which functional areas of the organization pose particularly grave threats to information security? a) human resources, finance b) human resources, management information systems c) finance, marketing d) operations management, management information systems e) finance, management information systems Answer: b Title: Assessment Question 7.32 Learning Objective 1: LO 7.2 Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference 1: 7.2 Unintentional Threats to Information Systems Difficulty: Easy

33) Unintentional threats to information systems include all of the following except: a) malicious software b) tailgating c) power outage d) lack of user experience e) tornados Answer: a Title: Assessment Question 7.33 Learning Objective 1: LO 7.2 Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference 1: 7.2 Unintentional Threats to Information Systems Difficulty: Medium

34) _____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges. a) Tailgating b) Hacking c) Spoofing d) Social engineering e) Spamming Answer: d


Title: Assessment Question 7.34 Learning Objective 1: LO 7.2 Compare and contrast human mistakes and social engineering, providing an example for each. Section Reference 1: 7.2 Unintentional Threats to Information Systems Difficulty: Easy

35) The cost of a stolen laptop includes all of the following except: a) Loss of intellectual property b) Loss of data c) Backup costs d) Loss of productivity e) Replacement cost Answer: c Title: Assessment Question 7.35 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Easy

36) Dumpster diving is: a) always illegal because it is considered trespassing. b) never illegal because it is not considered trespassing. c) typically committed for the purpose of identity theft. d) always illegal because individuals own the material in the dumpster. e) always legal because the dumpster is not owned by private citizens. Answer: c Title: Assessment Question 7.36 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Medium 37) Cybercriminals can obtain the information they need in order to assume another person’s identity by: a) Infiltrating an organization that stores large amounts of personal information. b) Phishing. c) Hacking into a corporate database. d) Stealing mail. e) All of the above are strategies to obtain information to assume another person’s identity. Answer: e Title: Assessment Question 7.37 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Easy

38) A _____ is intellectual work that is known only to a company and is not based on public information. a) copyright b) patent c) trade secret d) knowledge base e)private property


Answer: c Title: Assessment Question 7.38 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Easy 39) A pharmaceutical company’s research and development plan for a new class of drugs would be best described as which of the following? a) Copyrighted material b) Patented material c) A trade secret d) A knowledge base e) Public property Answer: c Title: Assessment Question 7.39 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Easy

40) A _____ is a document that grants the holder exclusive rights on an invention for 20 years. a) copyright b) patent c) trade secret d) knowledge base e) private property notice Answer: b Title: Assessment Question 7.40 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Easy 41) An organization’s e-mail policy has the least impact on which of the following software attacks? a) virus b) worm c) phishing d) zero-day e) spear phishing Answer: d Title: Assessment Question 7.41 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Hard

42) _____ are segments of computer code that attach to existing computer programs and perform malicious acts. a) Viruses b) Worms


c) Trojan horses d) Back doors e) Logic bombs Answer: a Title: Assessment Question 7.42 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Easy

43) _____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated. a) Viruses b) Worms c) Trojan horses d) Back doors e) Logic bombs Answer: c Title: Assessment Question 7.43 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Easy 44) _____ are segments of computer code embedded within an organization’s existing computer programs that activate and perform a destructive action at a certain time or date. a) Viruses b) Worms c) Trojan horses d) Back doors e) Logic bombs Answer: e Title: Assessment Question 7.44 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Easy

45) A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail. a) Zero-day b) Denial-of-service c) Distributed denial-of-service d) Phishing e) Brute force dictionary Answer: d Title: Assessment Question 7.45 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Easy


46) In a _____ attack, a coordinated stream of requests is launched against a target system from many compromised computers at the same time. a) phishing b) zero-day c) worm d) back door e) distributed denial-of-service Answer: e Title: Assessment Question 7.46 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Easy

47) The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious. a) Alien software b) Virus c) Worm d) Back door e) Logic bomb Answer: a Title: Assessment Question 7.47 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Easy

48) Which of the following is (are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers? a) Spyware b) Spamware c) Adware d) Viruses e) Worms Answer: b Title: Assessment Question 7.48 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Easy

49) When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers respond by using _____. a) keyloggers, screen scrapers b) screen scrapers, uninstallers c) keyloggers, spam d) screen scrapers, keyloggers e) spam, keyloggers Answer: a Title: Assessment Question 7.49


Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Medium

50) _____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset. a) Risk management b) Risk analysis c) Risk mitigation d) Risk acceptance e) Risk transference Answer: b Title: Assessment Question 7.50 Learning Objective 1: LO 7.4 Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: 7.4 What Companies Are Doing to Protect Information Resources Difficulty: Easy

51) Which of the following statements is false? a) Credit card companies usually block stolen credit cards rather than prosecute. b) People tend to shortcut security procedures because the procedures are inconvenient. c) It is easy to assess the value of a hypothetical attack. d) The online commerce industry isn’t willing to install safeguards on credit card transactions. e) The cost of preventing computer crimes can be very high. Answer: c Title: Assessment Question 7.51 Learning Objective 1: LO 7.4 Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: 7.4 What Companies Are Doing to Protect Information Resources Difficulty: Easy

52) In _____, the organization takes concrete actions against risks. a) risk management b) risk analysis c) risk mitigation d) risk acceptance e) risk transference Answer: c Title: Assessment Question 7.52 Learning Objective 1: LO 7.4 Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: 7.4 What Companies Are Doing to Protect Information Resources Difficulty: Medium

53) Which of the following is not a strategy for mitigating the risk of threats against information? a) Continue operating with no controls and absorb any damages that occur b) Transfer the risk by purchasing insurance. c) Implement controls that minimize the impact of the threat


d) Install controls that block the risk. e) All of the above are strategies for mitigating risk. Answer: e Title: Assessment Question 7.53 Learning Objective 1: LO 7.4 Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: 7.4 What Companies Are Doing to Protect Information Resources Difficulty: Easy

54) In _____, the organization purchases insurance as a means to compensate for any loss. a) risk management b) risk analysis c) risk mitigation d) risk acceptance e) risk transference Answer: e Title: Assessment Question 7.54 Learning Objective 1: LO 7.4 Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: 7.4 What Companies Are Doing to Protect Information Resources Difficulty: Easy

55. Which of the following statements concerning the difficulties in protecting information resources is not correct? a) Computing resources are typically decentralized. b) Computer crimes often remain undetected for a long period of time. c) Rapid technological changes ensure that controls are effective for years. d) Employees typically do not follow security procedures when the procedures are inconvenient. e) Computer networks can be located outside the organization. Answer: c Title: Assessment Question 7.55 Learning Objective 1: LO 7.4 Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: 7.4 What Companies Are Doing to Protect Information Resources Difficulty: Medium

56) _____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources. a) Access b) Physical c) Data security d) Administrative e) Input Answer: a Title: Assessment Question 7.56 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Easy


57) Access controls involve _____ before _____. a) biometrics, signature recognition b) authentication, authorization c) iris scanning, voice recognition d) strong passwords, biometrics e) authorization, authentication Answer: b Title: Assessment Question 7.57 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Easy

58) Biometrics are an example of: a) something the user is. b) something the user wants. c) something the user has. d) something the user knows. e) something the user does. Answer: a Title: Assessment Question 7.58 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Easy

59) Voice and signature recognition are examples of: a) something the user is. b) something the user wants. c) something the user has. d) something the user knows. e) something the user does. Answer: e Title: Assessment Question 7.59 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Easy

60) Passwords and passphrases are examples of: a) something the user is. b) something the user wants. c) something the user has. d) something the user knows. e) something the user does. Answer: d


Title: Assessment Question 7.60 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Easy

61) Which of the following is not a characteristic of strong passwords? a) They are difficult to guess. b) They contain special characters. c) They are not a recognizable word. d) They are not a recognizable string of numbers e) They tend to be short so they are easy to remember. Answer: e Title: Assessment Question 7.61 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Medium

62) Which of the following is not an example of a weak password? a) IloveIT b) 08141990 c) 9AmGt/* d) Rainer e) Information Security Answer: C Title: Assessment Question 7.62 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Medium 63) Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted’s _____ key, and Ted decrypts the message using his _____ key. a) public, public b) public, private c) private, private d) private, public e) none of these Answer: b Title: Assessment Question 7.63 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Medium

64) Which of the following statements concerning firewalls is not true? a) Firewalls prevent unauthorized Internet users from accessing private networks. b) Firewalls examine every message that enters or leaves an organization’s network.


c) Firewalls filter network traffic according to categories of activities that are likely to cause problems. d) Firewalls filter messages the same way as anti-malware systems do. e) Firewalls are sometimes located inside an organization’s private network. Answer: D Title: Assessment Question 7.64 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Medium

65) In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called _____, the company allows everything to run unless it is not approved. a) whitelisting, blacklisting b) whitelisting, encryption c) encryption, whitelisting d) encryption, blacklisting e) blacklisting, whitelisting Answer: a Title: Assessment Question 7.65 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Medium

66) Organizations use hot sites, warm sites, and cold sites to insure business continuity. Which of the following statements is not true? a) A cold site has no equipment. b) A warm site has no user workstations. c) A hot site needs to be located close to the organization’s offices. d) A hot site duplicates all of the organization’s resources. e) A warm site does not include actual applications. Answer: c Title: Assessment Question 7.66 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Easy 67) Refer to IT’s About Business 7.1 – Virus Attack Hits the University of Exeter. Which of the following statements about the virus attack is true? a) The attack was confined to the Exeter campus. b) Telephone service was not disrupted. c) It took three days to clean infected computers and bring the network back into operation. d) Only the PCs owned by the University had to be scanned. e) The attack did not affect the professors’ ability to run their classes. Answer: C Title: Assessment Question 7.67 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: IT's About Business 7.1: Virus Attack Hits the University of Exeter


Difficulty: Medium 68) Refer to IT’s About Business 7.2 – The Stuxnet Worm: Which of the following statements is true? a) The worm targeted large data warehouses. b) The worm was fairly simplistic. c) The worm spread from Iran to other countries. d) The worm probably only took a month to build. e) The worm specifically targeted nuclear facilities. Answer: e Title: Assessment Question 7.68 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: IT's About Business 7.2: The Stuxnet Worm Difficulty: Medium 69) Refer to IT’s About Business 7.3 – Information Security at City National Bank and Trust: Using the M86 Security software allowed City National Bank and Trust to do all of the following except: a) Apply policy-based standards for e-mail. b) Comply with Sarbanes-Oxley. c) Categorize Web sites and block questionable ones. d) Provide all employees with secure access to external e-mail. e) Prevent employees from downloading potentially dangerous files. Answer: d Title: Assessment Question 7.69 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: IT’s About Business 7.3: Information Security at City National Bank and Trust Difficulty: Medium 70) Refer to Closing Case 1 – Cybercriminals Use Social Networks for Targeted Attacks: Cybercriminals use Facebook for all of the following reasons except: a) It is easy to get into the Facebook code itself. b) People trust messages from their Facebook friends. c) Social networks aren’t closely regulated in corporate network defense systems. d) Many social network users aren’t technology savvy and wouldn’t realize their computer is under the control of outsiders. e) There is a black market for Facebook usernames and passwords. Answer: a Title: Assessment Question 7.70 Learning Objective 1: LO 7.6 Summarize the fundamental concepts and skills related to information security. Section Reference 1: Closing Case 1: Cybercriminals Use Social Networks for Targeted Attacks Difficulty: Medium

Question Type: Essay

71) Compare trade secrets, patents, and copyrights as forms of intellectual property. Answer: Title: Assessment Question 7.71


Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Medium

72) Contrast unintentional and deliberate threats to an information resource. Provide examples of both. Answer: Title: Assessment Question 7.72 Learning Objective 1: LO 7.2 Compare and contrast human mistakes and social engineering, providing an example for each. Learning Objective 2: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.2 Unintentional Threats to Information Systems Section Reference 2: 7.3 Deliberate Threats to Information Systems Difficulty: Medium

73) Contrast the following types of remote attacks: virus, worm, phishing, and spear phishing. Answer: Title: Assessment Question 7.73 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Medium

74) Contrast the following types of attacks created by programmers: Trojan horse, back door, and logic bomb Answer: Title: Assessment Question 7.74 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Medium

75) Contrast spyware and spamware. Answer: Title: Assessment Question 7.75 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Easy

76) Contrast risk acceptance, risk limitation, and risk transference. Answer: Title: Assessment Question 7.76 Learning Objective 1: LO 7.4 Discuss the three risk mitigation strategies, providing an example for each in the context of owning a home. Section Reference 1: 7.4 What Companies Are Doing to Protect Information Resources Difficulty: Medium

77) Describe public key encryption. Answer:


Title: Assessment Question 7.77 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Medium

78) Compare a hot site, a warm site, and a cold site as strategies for business continuity. Answer: Title: Assessment Question 7.78 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Medium

79) Contrast the four types of authentication. Answer: Title: Assessment Question 7.79 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Medium

80) Identify and discuss the factors that are contributing to the increasing vulnerability of organizational information assets. Answer: Title: Assessment Question 7.80 Learning Objective 1: LO 7.1 Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: 7.1 Introduction to Information Security Difficulty: Hard

81) Define identity theft, and explain the types of problems that it creates for the victims. Answer: Title: Assessment Question 7.81 Learning Objective 1: LO 7.3 Describe the nine types of deliberate attacks. Section Reference 1: 7.3 Deliberate Threats to Information Systems Difficulty: Medium

82) Discuss the possible consequences of a terrorist attack on a supervisory control and data acquisition (SCADA) system. Answer: Title: Assessment Question 7.82 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Hard 83) Define the principle of least privilege, and consider how an organization’s senior executives might view the application of this principle.


Answer: Title: Assessment Question 7.83 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Hard

84) Explain why anti-malware software is classified as reactive. Answer: Title: Assessment Question 7.84 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Hard

85) Describe how a digital certificate works. Answer: Title: Assessment Question 7.85 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Hard

Question Type: True/False 86) You start a dog-walking service, and you store your client’s records on your cell phone. You don’t need to worry about information security. Answer: False Title: Assessment Question 7.86 Learning Objective 1: LO 7.1 Identify the five factors that contribute to the increasing vulnerability of information resources, providing an example for each. Section Reference 1: 7.1 Introduction to Information Security Difficulty: Easy

Question Type: Multiple Choice 87) Your company’s headquarters was just hit head on by a hurricane, and the building has lost power. The company sends you to their hot site to minimize downtime from the disaster. Which of the following statements is true? a) The site will not have any servers. b) The site will not have any workstations, so you need to bring your laptop. c) The site is probably in the next town. d) The site should be an almost exact replica of the IT configuration at headquarters. e) The site will not have up-to-date data. Answer: d Title: Assessment Question 7.87


Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Medium

88) You receive an e-mail from your bank informing you that they are updating their records and need your password. Which of the following statements is true? a) The message could be an industrial espionage attack. b) The message could be a phishing attack. c) The message could be a denial of service attack. d) The message could be a back door attack. e) The message could be a Trojan horse attack. Answer: b Title: Assessment Question 7.88 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Medium

89) You start a new job, and the first thing your new company wants you to do is create a user ID and a password. Which of the following would be a strong password? a) The name of the company b) Your last name c) Your birthdate d) Your initials (capitalized) and the number of the floor you are on e) The name of the company spelled backward Answer: e Title: Assessment Question 7.89 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Medium

90) You start a new job, and human resources gives you a ten-page document that outlines the employee responsibilities for information security. Which of the following statements is most likely to be true? a) The document recommends that login passwords be left on a piece of paper in the center desk drawer so that others can use the laptop if necessary. b) You are expected to read the document, and you could be reprimanded if you don’t follow its guidelines. c) You can back up sensitive data to a thumb drive so you can take them home to work with. d) The document indicates that you can leave your laptop unlocked if you leave your desk for less than an hour. e) The document permits you to lend your laptop to your brother for the weekend. Answer: b Title: Assessment Question 7.90 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Easy

Question Type: Essay


91) Tim ventured out into the world of retail by renting a cart at a local mall. His product is personalized coffee mugs. He uses his laptop to track sales and to process credit card sales. He has a customer mailing list that is updated by customers on the laptop as well. At the end of each day, Tim backs up all of his data to a thumb drive and puts the drive into the laptop case with the laptop. Discuss Tim’s information security strategy. Answer: Title: Assessment Question 7.91 Learning Objective 1: LO 7.5 Identify the three major types of controls that organizations can use to protect their information resources, providing an example for each. Section Reference 1: 7.5 Information Security Controls Difficulty: Medium


Package Title: Assessment Questions Course Title: MIS 1e Chapter Number: 8

Question Type: True/False

1) Users of Web 1.0 sites passively receive information from those sites. Answer: True Title: Assessment Question 8.01 Learning Objective 1: LO 8.1 Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference 1: 8.1 Web 2.0 Underlying Technologies Difficulty: Easy

2) Web. 2.0 is a loose collection of information technologies and applications. Answer: True Title: Assessment Question 8.02 Learning Objective 1: LO 8.1 Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference 1: 8.1 Web 2.0 Underlying Technologies Difficulty: Easy

3) Web 2.0 sites are primarily online places to visit. Answer: False Title: Assessment Question 8.03 Learning Objective 1: LO 8.1 Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference 1: 8.1 Web 2.0 Underlying Technologies Difficulty: Easy

4) AJAX is a Web tool that reloads entire Web pages quickly. Answer: False Title: Assessment Question 8.04


Learning Objective 1: LO 8.1 Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference 1: 8.1 Web 2.0 Underlying Technologies Difficulty: Medium

5) A tag is the way a developer describes a piece of information. Answer: False Title: Assessment Question 8.05 Learning Objective 1: LO 8.1 Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference 1: 8.1 Web 2.0 Underlying Technologies Difficulty: Medium

6) RSS stands for Real Simple Subscription. Answer: False Title: Assessment Question 8.06 Learning Objective 1: LO 8.1 Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference 1: 8.1 Web 2.0 Underlying Technologies Difficulty: Medium

7) Geo-tagging refers to tagging information on tour sites. Answer: False Title: Assessment Question 8.07 Learning Objective 1: LO 8.1 Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference 1: 8.1 Web 2.0 Underlying Technologies Difficulty: Medium

8) A wiki is a collection of blogs. Answer: False Title: Assessment Question 8.08 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting.


Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Medium 9) The term “blog” is short for Weblog. Answer: True Title: Assessment Question 8.09 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Easy

10) Blogs cannot contain links to Web sites. Answer: False Title: Assessment Question 8.10 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Medium

11) Blogs are not used internally by organizations. Answer: False Title: Assessment Question 8.11 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Medium

12) Companies monitor blogs for mention of their products. Answer: True Title: Assessment Question 8.12 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Medium


13) One can trust the content of blogs. Answer: False Title: Assessment Question 8.13 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Easy

14) Web 2.0 media sites allow people to share digital media. Answer: True Title: Assessment Question 8.14 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Easy

15) One of the major categories of Web 2.0 sites is blogs. Answer: False Title: Assessment Question 8.15 Learning Objective 1: LO 8.3 Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference 1: 8.3 Categories of Web 2.0 sites. Difficulty: Medium

16) You must be a Web site developer in order to create a mashup. Answer: False Title: Assessment Question 8.16 Learning Objective 1: LO 8.3 Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference 1: 8.3 Categories of Web 2.0 sites. Difficulty: Medium


Question Type: Multiple Choice

17) Which of the following statements concerning Web 2.0 sites is false? a) They harness collective intelligence. b) They deliver functionality as services. c) They feature remixable applications and data. d) They encourage user participation. e) They cannot be used to start a business. Answer: e Title: Assessment Question 8.17 Learning Objective 1: LO 8.1 Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference 1: 8.1 Web 2.0 Underlying Technologies Difficulty: Easy

18) Which of the following statements concerning tagging is true? a) Tag categories are created by software developers. b) Tagging software has built-in rules. c) Tagging can be performed only on Web pages. d) Tags can be given only to text. e) Folksonomies are a version of tagging. Answer: e Title: Assessment Question 8.18 Learning Objective 1: LO 8.1 Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference 1: 8.1 Web 2.0 Underlying Technologies Difficulty: Easy

19) Which of the following statements concerning tagging is false? a) Tags fall into categories. b) Users can pick their own tags. c) Tags can be given to any piece of information or file. d) Tags can be used to retrieve Web content. e) Each user designs a personal set of tagging rules. Answer: a


Title: Assessment Question 8.19 Learning Objective 1: LO 8.1 Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference 1: 8.1 Web 2.0 Underlying Technologies Difficulty: Easy

20) Which of the following statements concerning RSS is false? a) Users can customize the information they want. b) Users can specify how often they want the information. c) Blogs cannot be part of an RSS feed. d) A special reader is needed to display RSS content feeds. e) Subscribers get notifications of changes in content. Answer: c Title: Assessment Question 8.20 Learning Objective 1: LO 8.1 Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference 1: 8.1 Web 2.0 Underlying Technologies Difficulty: Medium

21) Which of the following statements concerning RSS is true? a) Blogs cannot be part of an RSS feed. b) RSS feeds deliver information only from news sites. c) RSS cannot be searched. d) RSS feeds transmit a link to the full text of new content to subscribers. e) A special reader is needed that must be purchased. Answer: d Title: Assessment Question 8.21 Learning Objective 1: LO 8.1 Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference 1: 8.1 Web 2.0 Underlying Technologies Difficulty: Medium

22) With Web 1.0 sites, users _________________, whereas with Web 2.0 sites, users _________________. a) Use HTML, use CCS


b) Passively receive information, participate with the site. c) Use wired connections, use wireless connections. d) Have to know the address of the site, can use search engines to find a site e) Did not have to login to find information, have to login in to find information. Answer: b Title: Assessment Question 8.22 Learning Objective 1: LO 8.1 Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference 1: 8.1 Web 2.0 Underlying Technologies Difficulty: Hard

23) Which of the following is an advantage of tagging? a) Tagging rules are standard within a domain of knowledge. b) Users have to choose from a set of tags so others can find the item. c) Despite the variation in individual rules, the Web collection is rather organized. d) Retrieval finds only the relevant tags to a user’s search. e) Tags use AJAX to speed up searching. Answer: c Title: Assessment Question 8.23 Learning Objective 1: LO 8.1 Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference 1: 8.1 Web 2.0 Underlying Technologies Difficulty: Hard

24) You sign up for an RSS feed from CNN.com. Which of the following would you expect to happen? a) When you sign up, you will need to download print templates. b) You won’t be able to search RSS content. c) You will be able to choose only one topic area. d) You will be notified of updates in the content areas you selected. e) You will get content sent to you via e-mail. Answer: d Title: Assessment Question 8.24 Learning Objective 1: LO 8.1 Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference 1: 8.1 Web 2.0 Underlying Technologies


Difficulty: Hard

25) Which of the following is not an example of Web 2.0 applications? a) Blogs b) Wikis c) Netcasting d) Crowdsourcing e) AJAX Answer: e Title: Assessment Question 8.25 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Medium

26) Many traditional media companies are using ________ to provide a richer version of the stores they cover. a) Blogs b) Netcasts c) RSS feeds d) Tags e) Wikis Answer: a Title: Assessment Question 8.26 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Medium

27) Many companies are using ________ to capture updated product features and specifications. a) Blogs b) Netcasts c) RSS feeds d) Tags e) Wikis


Answer: e Title: Assessment Question 8.27 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Medium

28) Which of the following statements concerning blogging is false? a) Anyone can blog. b) A reader can believe the details in a blog. c) A company can maintain an internal blog site. d) Blogging can be used in marketing. e) Tweets are replacing blogging. Answer: b Title: Assessment Question 8.28 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Hard

29) You just started to work on a project with three other people. You realize that everyone has their own notes, which makes it hard for you to keep track of what has been done and what still needs to be done. Which of the following applications would you suggest the team use? a) Blogs b) Netcasts c) RSS feeds d) Tags e) Wikis Answer: e Title: Assessment Question 8.29 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Medium


30) The comments of consumers in the blogosphere concerning a company’s products are called ____________________. a) Free advertising b) Consumer-generated media. c) Consumer-generated PR d) Rumors e) Reliable feedback Answer: b Title: Assessment Question 8.30 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Medium

31) The reliability of the content in Wikipedia, the online encyclopedia, is questionable because a) All of the administrators are volunteers. b) No author has to identify himself or herself. c) The content is updated all the time. d) It is difficult to test the authenticity of the content due to the fact that anyone can contribute content. e) All of these are reasons why the content is questionable. Answer: d Title: Assessment Question 8.31 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Medium

32) Universities are using ________ to provide students with access to lectures. a) Blogs b) Netcasts c) RSS feeds d) Tags e) Wikis Answer: b


Title: Assessment Question 8.32 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Medium

33) Which of the following statements concerning printing-on-demand as a Web 2.0 application is false? a) New small-book printing machines reduce printing costs. b) Free software can be used to edit and typeset text. c) Printing-on-demand companies also offer distribution. d) Printing-on-demand companies market books for their authors. e) Printing-on-demand is attractive to established authors. Answer: d Title: Assessment Question 8.33 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Easy

34) Which of the following is not an example of crowdsourcing? a) Posting a task that needs to be completed with a price for completion b) Posting personal pictures that can be licensed by interested parties c) Posting a call for new manuscripts d) Asking for feedback on products and make it publically available e) Asking for new product ideas and reward those used Answer: c Title: Assessment Question 8.34 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Easy

35) Which of the following statements concerning social networking Web sites is false? a) Any type of content can be loaded. b) The goal is to help people collaborate.


c) Social networks can be a valuable business tool. d) Users find the social network feeds distracting. e) Social network software provides tools for finding other people online. Answer: d Title: Assessment Question 8.35 Learning Objective 1: LO 8.3 Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference 1: 8.3 Categories of Web 2.0 Sites Difficulty: Medium

36) Which of the following is not a social networking site? a) Facebook b) YouTube c) Flickr d) Wikipedia e) LinkedIn Answer: d Title: Assessment Question 8.36 Learning Objective 1: LO 8.3 Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference 1: 8.3 Categories of Web 2.0 Sites Difficulty: Easy

37) Which of the following statements is false? a) Social networks can be used to achieve strategic objectives. b) The only downside of social networks is the required bandwidth. c) Social networks can be implemented on a secure platform. d) Social networks take the place of traditional employee directories. e) Social networks can offer personal pages as well as business pages. Answer: b Title: Assessment Question 8.37 Learning Objective 1: LO 8.3 Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference 1: 8.3 Categories of Web 2.0 Sites Difficulty: Medium


38) LinkedIn is a _______________________ social networking site that makes money from advertising and services. a) Training b) College c) Business-oriented d) Video-upload e) Blogging Answer: c Title: Assessment Question 8.38 Learning Objective 1: LO 8.3 Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference 1: 8.3 Categories of Web 2.0 Sites Difficulty: Medium 39) Building relationships, anticipating needs, and providing special deals for the community’s members is a function of which category of Web 2.0 applications? a) Social networking b) Aggregators c) Blogs d) Crowdsourcing e) Social commerce Answer: e Title: Assessment Question 8.39 Learning Objective 1: LO 8.3 Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference 1: 8.3 Categories of Web 2.0 Sites Difficulty: Medium

40) Which of the following is an advantage of social commerce over traditional e-commerce? a) Loyalty b) The ability to predict buying habits based on real-time data c) Processing speed d) Crowdsourcing e) Reduced expenses Answer: b


Title: Assessment Question 8.40 Learning Objective 1: LO 8.3 Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference 1: 8.3 Categories of Web 2.0 Sites Difficulty: Medium

41) A Web site that combines content from other Web sites to form new content is called a(n) ______. a) Social network b) Aggregator c) Blog d) E-commerce site e) Mashup Answer: e Title: Assessment Question 8.41 Learning Objective 1: LO 8.3 Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference 1: 8.3 Categories of Web 2.0 Sites Difficulty: Easy

42) Gerry has a dog-walking business, and he wants to help his walkers plan their route. Which of the following should he use? a) Social networking b) Aggregators c) Blogs d) Crowdsourcing e) Mashup Answer: e Title: Assessment Question 8.42 Learning Objective 1: LO 8.3 Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference 1: 8.3 Categories of Web 2.0 Sites Difficulty: Easy 43) Refer to Opening Case – Making Money with YouTube Videos: Which of the following is true about YouTube Partners?


a) YouTube accepts all video creators as partners. b) Partners receive a percentage of advertising sales. c) All of the partners make substantial income by being a partner. d) Partners receive a payment every time one of their videos is viewed. e) All videos belong to YouTube. Answer: b Title: Assessment Question 8.43 Learning Objective 1: LO 8.0 Provide a real-world application of Web 2.0 and social networks. Section Reference 1: Opening Case: Making Money with YouTube Videos Difficulty: Medium 44) Refer to IT’s About Business 8.1 – The Blog del Narco: The Blog del Narco provides news that isn’t reported in the Mexican news media. Yet, the Blog’s content is considered reliable. Why? a) It is reported by a college student. b) The content in the blog is from reliable sources. c) It has proved reliable over time. d) The blogger uses his own laptop. e) All these are reasons why the content is considered reliable. Answer: c Title: Assessment Question 8.44 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: IT’s About Business 8.1 Difficulty: Medium 45) Refer to IT’s About Business 8.2 – Share Your Life in Pictures: Which of the following is false about Web-based photo sharing? a) Early photo-sharing sites were popular because they facilitated printing. b) Newer sites are focusing on pictures from smartphones. c) Some photo sharing sites are focusing on serious photographers. d) It’s easy to protect a photo once it’s posted to a sharing site or social network. e) All these are true about Web-based photo sharing. Answer: d Title: Assessment Question 8.45


Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: IT’s About Business 8.2 Difficulty: Medium 46) Refer to IT’s About Business 8.3 – Online Games Are Big Business: Which of the following is false about the online games played on social network sites? a) The social network site receives payments from the game company. b) All users of the social network site are fine with having games available and part of feeds. c) Playing the games is free. d) Game companies use social network sites to advertise. e) Facebook created its own currency. Answer: b Title: Assessment Question 8.46 Learning Objective 1: LO 8.3 Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference 1: IT’s About Business 8.3 Difficulty: Medium 47) Refer to IT’s About Business 8.4 – Location, Location, Location: Which of the following is false about Foursquare? a) Foursquare is based on GPS-enabled mobile technology. b) A “mayor” icon is given to the person who checks into a location the most often in the last 60 days. c) Foursquare is used by merchants to attract customers with promotions. d) Other social network sites are adding location-based tools. e) Foursquare has no competition. Answer: e Title: Assessment Question 8.47 Learning Objective 1: LO 8.3 Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference 1: IT’s About Business 8.4 Difficulty: Medium 48) Refer to Closing Case #1 – From Social Networks to Social Commerce: Which of the following is false about Groupon?


a) Groupon controls when deals are offered. b) Discounts depend on enough people agreeing to buy the deal. c) Groupon uses social network sites to promote offers. d) Groupon can promote based on where a member lives. e) Groupon Now helps eliminate perishable inventory. Answer: a Title: Assessment Question 8.48 Learning Objective 1: LO 8.4 Summarize the fundamental concepts related to Web 2.0 and social networks. Section Reference 1: Closing Case 1: From Social Networks to Social Commerce Difficulty: Medium 49) Refer to Closing Case #2 – Marketing with Facebook: Which of the following is false about advertising with Facebook? a) Targeting marketing is based on information in the member’s profile. b) Advertising can be text or video. c) Facebook has a high click-through rate. d) Companies set up their own Facebook pages for fans to “like”. e) Facebook’s promise to advertisers is brand awareness. Answer: c Title: Assessment Question 8.49 Learning Objective 1: LO 8.4 Summarize the fundamental concepts related to Web 2.0 and social networks. Section Reference 1: Closing Case 2: Marketing with Facebook Difficulty: Medium

Question Type: Essay

50) What is the difference between Web 1.0 and Web 2.0? Title: Assessment Question 8.50 Learning Objective 1: LO 8.1 Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference 1: 8.1 Web 2.0 Underlying Technologies Difficulty: Medium

51) Explain the three technologies that are used by Web 2.0.


Title: Assessment Question 8.51 Learning Objective 1: LO 8.1 Describe the differences between Web 1.0 and Web 2.0, and explain the benefits of three information technologies used by Web 2.0. Section Reference 1: 8.1 Web 2.0 Underlying Technologies Difficulty: Medium

52) Compare and contrast blogs and wikis. Title: Assessment Question 8.52 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Medium

53) Define crowdsourcing, and explain why it is valuable. Title: Assessment Question 8.53 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Medium

54) Identify and analyze the risks and benefits associated with social networking sites. Title: Assessment Question 8.54 Learning Objective 1: LO 8.3 Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference 1: 8.3 Categories of Web 2.0 Sites Difficulty: Easy

55) Explain how a mashup works (conceptually), and provide some examples of mashups that you have seen. Title: Assessment Question 8.55 Learning Objective 1: LO 8.3 Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference 1: 8.3 Categories of Web 2.0 Sites Difficulty: Medium


56) Discuss the efforts that Wikipedia takes to improve the reliability of its content. Why do many colleges continue to disallow Wikipedia as a cite for scholarly work. Title: Assessment Question 8.56 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Medium

57) Explain how a corporate social networking site would differ (on as many aspects as you can think of) from the personal one so many of us belong to. Title: Assessment Question 8.57 Learning Objective 1: LO 8.3 Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference 1: 8.3 Categories of Web 2.0 Sites Difficulty: Medium

Question Type: Multiple Choice

58) Carter is a member of a team of five students working on a research project that comprises 25% of his overall grade. The team is trying to decide how they can most effectively work together to complete the final paper. Which of the following would work the best for this team? a) A blog b) A discussion board c) A private social networking site d) A Skype video chat e) A wiki Answer: e Title: Assessment Question 8.58 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Medium

59) Sean is organizing a 5K race to support the local food bank. The event takes place in three months. Which of the following would be the best strategy? a) Set up a Twitter account, and tweet some details about the event every couple of hours.


b) Start blogging about all the organizing that is going on. c) Start a business page in Facebook, and let his friends know about it. d) Start putting pictures of the food bank on photo sharing sites and tag with “5K” e) Build a Web page with all of the details. Answer: c Title: Assessment Question 8.59 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Learning Objective 2: LO 8.3 Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference 1: 8.2 Web 2.0 Applications Section Reference 2: 8.3 Categories of Web 2.0 Sites Difficulty: Hard

60) Sean ran a very successful 5K race to support the local food bank. They had 210 runners and raised over $5,000. He wants to continue to do more for the local food bank. Which of the following would be the best use of his time? a) Set up a Twitter account and tweet a story about the food bank every day. b) Start blogging about how the food bank helps people living in the community. c) Use the business page in Facebook that he built for the race and allow people to donate from that page. d) Start putting pictures of the food bank on photo sharing sites and tag with “Food bank” e) Build a Web page with all of the details of the food bank. Answer: b Title: Assessment Question 8.60 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Learning Objective 2: LO 8.3 Discuss the three categories of Web 2.0 sites, and provide at least one example of how each one can improve business efficiency and profitability. Section Reference 1: 8.2 Web 2.0 Applications Section Reference 2: 8.3 Categories of Web 2.0 Sites Difficulty: Hard 61) Greg still follows his high school’s lacrosse team. He set up a meeting with the coach to ask how he could help with recruiting. Which of the following Section Reference 1s would make the most sense from the coach’s point of view? a) Build a wiki with other alums of their seasons. b) Build a fan page in Facebook to alert alums to upcoming games.


c) Go to games and tweet about the action. d) Blog about the games and include his own insights about his experience. e) Post photos of this year’s games on a photo sharing site and tag them with the name of the high school. Answer: d Title: Assessment Question 8.61 Learning Objective 1: LO 8.2 Identify five prominent Web 2.0 applications, and provide at least one example of how each one can be utilized in a business setting. Section Reference 1: 8.2 Web 2.0 Applications Difficulty: Hard


Package Title: Assessment Questions Course Title: MIS 1e Chapter Number: 9

Question Type: True/False

1) In traditional commerce, one or more of the following can be digital: the product or service, the process, and the delivery agent. Answer: False Title: Assessment Question 9.01 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Easy

2) Visiting the Web site of a car manufacturer (e.g., www.gm.com), entering the specifications for the car you want, and then picking up your car at your local dealership is an example of partial electronic commerce. Answer: True Title: Assessment Question 9.02 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Easy

3) eBay is a good example of business-to-consumer electronic commerce. Answer: False Title: Assessment Question 9.03 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Easy

4) Forward auctions are auctions that sellers use as a channel to many potential buyers.


Answer: True Title: Assessment Question 9.04 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Easy

5) Even though B2C EC is much larger by volume, B2B is more complex. Answer: False Title: Assessment Question 9.05 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

6) An electronic storefront is a Web site on the Internet that represents a single store. Answer: True Title: Assessment Question 9.06 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

7) You can make a purchase in a referral mall. Answer: False Title: Assessment Question 9.07 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy 8) Selling products such as books and computers on the Internet may reduce vendors’ selling costs by 20 to 40 percent, with further reductions being difficult because the products must be delivered physically.


Answer: True Title: Assessment Question 9.08 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

9) Virtual banks are those banks that are dedicated only to Internet transactions. Answer: True Title: Assessment Question 9.09 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

10) Channel conflict occurs when click-and-mortar companies have problems with their regular distributors when they sell directly to customers online. Answer: True Title: Assessment Question 9.10 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

11) Internet advertising is impersonal, one-way mass communication. Answer: False Title: Assessment Question 9.11 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

12) Banners are the most common form of advertisement on the Internet.


Answer: True Title: Assessment Question 9.12 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

13) Hacking is the indiscriminate distribution of electronic ads without permission of the receiver. Answer: False Title: Assessment Question 9.13 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

14) Business-to-consumer applications comprise the majority of electronic commerce volume) Answer: False Title: Assessment Question 9.14 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

15) The key mechanisms in the sell-side marketplace are customized electronic catalogs and reverse auctions. Answer: False Title: Assessment Question 9.15 Learning Objective 1: LO 9.3 Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference 1: 9.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Easy

16) The buy-side marketplace is similar to the business-to-consumer model. Answer: False


Title: Assessment Question 9.16 Learning Objective 1: LO 9.3 Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference 1: 9.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Easy

17) Horizontal exchanges connect buyers and sellers across many industries. Answer: True Title: Assessment Question 9.17 Learning Objective 1: LO 9.3 Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference 1: 9.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Easy

18) In most cases, traditional payment systems are not effective for electronic commerce) Answer: True Title: Assessment Question 9.18 Learning Objective 1: LO 9.4 Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference 1: 9.4 Electronic Payments Difficulty: Easy

19) Smart cards can be used as credit cards, debit cards, and/or loyalty cards. Answer: True Title: Assessment Question 9.19 Learning Objective 1: LO 9.4 Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference 1: 9.4 Electronic Payments Difficulty: Easy 20) Each buyer needs only one e-wallet for all merchants. Answer: False Title: Assessment Question 9.20 Learning Objective 1: LO 9.4 Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference 1: 9.4 Electronic Payments Difficulty: Easy


21) E-commerce affects only businesses that sell products online. Answer: False Title: Assessment Question 9.21 Learning Objective 1: LO 9.6 Summarize the fundamental concepts related to e-business and ecommerce. Section Reference 1: Closing Case 1: The Flash Crash Difficulty: Easy 22) Refer to IT’s About Business 9.1: Minecraft’s founder Markus Persson had to do a great deal of marketing to promote his product. Answer: False Title: Assessment Question 9.22 Learning Objective 1: LO 9.0 Provide a real-world application of e-business and e-commerce. Section Reference 1: IT’s About Business 9.1 Difficulty: Easy 23) Refer to IT’s About Business 9.2: Selling luxury items online is as easy as selling books and DVDs. Answer: False Title: Assessment Question 9.23 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: IT’s About Business 9.2 Difficulty Easy 24) Refer to IT’s About Business 9.3: The Jockey Club is losing customers to online competition because its Web site does not enable online betting. Answer. False Title: Assessment Question 9.24 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: IT’s About Business 9.3 Difficulty: Medium


Question Type: Multiple Choice

25) Which of the following is not an effect that E-commerce has had on organizations? a) E-commerce enables smaller businesses to operate in areas dominated by larger companies. b) E-commerce increases the number of potential customers to whom the company can market its products. c) E-commerce is a costly medium for increasing market share. d) E-commerce removes many barriers for start-up businesses. e) E-commerce makes it easy to reach customers around the world. Answer: c Title: Assessment Question 9.25 Learning Objective 1: LO 9.0 Provide a real-world application of e-business and e-commerce. Section Reference 1: Introduction Difficulty: Easy

26) _____, which is a broader concept than _____, is the buying and selling of goods and services, as well as servicing customers, collaborating with business partners, and performing transactions within an organization. a) Business-to-business electronic commerce, business-to-customer electronic commerce b) Electronic commerce, electronic business c) Business-to-customer electronic commerce, business-to-business electronic commerce d) Business-to-business electronic commerce, intrabusiness electronic commerce e) Electronic business, electronic commerce Answer: e Title: Assessment Question 9.26 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Medium

27) The degree of digitization relates to all of the following except: a) the product or service sold b) the process by which the product is produced c) the delivery agent or intermediary d) the size of e-commerce transactions e) none of these Answer: d


Title: Assessment Question 9.27 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Medium

28) In _______ e-commerce, the sellers and buyers are organizations. a) government-to-citizen b) consumer-to-consumer c) business-to-business d) business-to-consumer e) consumer-to-business Answer: c Title: Assessment Question 9.28 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Easy

29) In ________ e-commerce, an organization provides information and services to its workers. a) business-to-employee b) consumer-to-consumer c) consumer-to-business d) business-to-consumer e) government-to-business Answer: a Title: Assessment Question 9.29 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Easy

30) Direct payment of Social Security benefits is an example of ______ e-commerce. a) government-to-citizen b) consumer-to-consumer


c) consumer-to-business d) business-to-consumer e) business-to-business Answer: a Title: Assessment Question 9.30 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Easy 31) If you are an worker managing your fringe benefits over your company’s intranet, you are engaging in _________ e-commerce. a) business-to-business b) business-to-consumer c) consumer-to-consumer d) business-to-employee e) government-to-citizen Answer: d Title: Assessment Question 9.31 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Easy

32) Which of the following statements regarding the relationship between electronic commerce and search is not correct? a) Purchases often follow successful online searches. b) Shopping carts are often abandoned after unsuccessful online searches. c) Retailers will provide fewer product details to avoid information overload for customers. d) Customers will be able to find the closest store offering the product that they want. e) Customers will have more relevant product information in the near future. Answer: c Title: Assessment Question 9.32 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce


Difficulty: Medium

33) In _____ auctions, there is one buyer who wants to buy a product. Suppliers submit bids, and the lowest bid wins. a) forward b) static c) reverse d) physical e) simple Answer: c Title: Assessment Question 9.33 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Easy

34) eBay uses a _____ auction. a) forward b) static c) reverse d) physical e) simple Answer: a Title: Assessment Question 9.34 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Easy

35) _____ auctions employ a request for quotation. a) Forward b) Static c) Reverse d) Physical e) Simple Answer: c


Title: Assessment Question 9.35 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Easy

36) _____ auctions are the most common auction model for large purchases. a) Forward b) Static c) Reverse d) Physical e) Simple Answer: c Title: Assessment Question 9.36 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Easy

37) In which of the following business models do businesses request quotes from suppliers and use B2B with a reverse auction mechanism? a) find-the-best-price b) electronic tendering system c) name-your-own-price d) online direct marketing e) affiliate marketing Answer: b Title: Assessment Question 9.37 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Hard

38) A vendor asks its business partners to place logos or banners on their Web sites. If customers click on a logo, visit the vendor’s site, and make a purchase, then the vendor pays a commission to the partner. This scenario illustrates which business model?


a) find-the-best-price b) electronic tendering system c) name-your-own-price d) online direct marketing e) affiliate marketing Answer: e Title: Assessment Question 9.38 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Medium

39) Which type of electronic commerce is the largest by volume? a) business-to-employee b) consumer-to-consumer c) business-to-business d) business-to-consumer e) none of these Answer: c Title: Assessment Question 9.39 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

40) Which type of electronic commerce does Amazon practice? a) business-to-employee b) consumer-to-consumer c) consumer- to-business d) business-to-consumer e) employee-to-business Answer: d Title: Assessment Question 9.40 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service.


Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

41) _______ e-commerce is also known as e-tailing. a) Business-to-business b) Collaborative commerce c) Intrabusiness d) Business-to-consumer e) Consumer-to-business Answer: d Title: Assessment Question 9.41 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

42) The advantages of electronic commerce for consumers include all of the following except: a) You can buy from home 24 hours per day, 7 days per week. b) You have a wider variety of products to choose from. c) You typically cannot access additional information, so you do not have information overload. d) You can easily compare prices and features. e) You can find unique items. Answer: c Title: Assessment Question 9.42 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium

43) Which of the following is not an electronic commerce application? a) home banking b) buying stocks c) evaluating an employee d) conducting an auction e) buying real estate Answer: c


Title: Assessment Question 9.43 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

44) Which of the following is not an advantage of e-tailing? a) You can buy from home, 24 hours per day. b) You have only a few products to choose from. c) You can obtain detailed information on products. d) You can compare competitors’ products and prices. e) All of these Answer: b Title: Assessment Question 9.44 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium

45) ________ is the process whereby a fully automated electronic commerce transaction eliminates middlemen. a) Disintegration b) Supply chain integration c) Direct sales d) Disintermediation e) Value-added services Answer: d Title: Assessment Question 9.45 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium

46) Cyberbanking offers all of the following advantages except:


a) It is convenient for customers. b) It saves time for customers. c) It includes inexpensive transactions for the bank. d) It can help recruit remote customers. e) It is more expensive for the customer. Answer: e Title: Assessment Question 9.46 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium

47) Which of the following is a problem that e-commerce can cause for the airline industry? a) Too many fares b) Mistakes in fares c) Too few fares d) No fares offered on certain routes e) Too many fares offered on certain routes Answer: b Title: Assessment Question 9.47 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium 48) Refer to IT’s About Business 9.1: Which of the following is not true about Persson’s Minecraft? a) Persson developed Minecraft on his own. b) Minecraft is played through a Web browser. c) Minecraft is distributed by Apple Co. d) Mojang is a mobile version of Minecraft that will be distributed through app stores. e) Minecraft players build landscapes. Answer: c Title: Assessment Question 9.48 Learning Objective 1: LO 9.0 Provide a real-world application of e-business and e-commerce. Section Reference 1: IT’s About Business 9.1 Difficulty: Easy


49) In the opening case, Treat America turned to E-business for all of the following reasons except: a) The company needed to capture extensive data from each vending machine. b) The company wanted a competitive advantage over competitors that simply raised prices. c) The company’s vending machines are unmanned. d) Gas prices are increasing. e) The company’s vending machines are open beyond “normal” business hours. Answer: a Title: Assessment Question 9.49 Learning Objective 1: LO 9.0 Provide a real-world application of e-business and e-commerce. Section Reference 1: Opening Case: Vending Goes Online Difficulty: Easy

50) Difficulties in order fulfillment are most closely associated with which type of electronic commerce? a) business-to-business b) business-to-consumer c) government-to-citizen d) business-to-employee e) mobile commerce Answer: b Title: Assessment Question 9.50 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium

51) Internet advertising improves on traditional advertising in all of the following ways except: a) Internet ads can be updated at any time at minimal cost. b) Internet ads can reach large numbers of potential buyers all over the world. c) Internet ads are always more effective than other types of advertising. d) Internet ads can make effective use of multimedia. e) Internet ads are current. Answer: c Title: Assessment Question 9.51 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service.


Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium

52) A _____ is automatically launched by some trigger and appears behind the active window. a) keyword banner b) random banner c) pop-up ad d) pop-under ad e) text box Answer: d Title: Assessment Question 9.52 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

53) _____ offer(s) consumers incentives to accept advertising and e-mail voluntarily. a) Viral marketing b) Personalized marketing c) Permission marketing d) Paper catalogs e) Direct mail Answer: c Title: Assessment Question 9.53 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

54) _____ refers to online word-of-mouth marketing. a) Permission marketing b) One-to-one marketing c) Personalized marketing d) Viral marketing e) Direct mail Answer: d


Title: Assessment Question 9.54 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Easy

55) In the _____ marketplace model, organizations attempt to sell their products or services to other organizations electronically. a) buy-side b) sell-side c) group purchasing d) desktop purchasing e) electronic exchange Answer: b Title: Assessment Question 9.55 Learning Objective 1: LO 9.3 Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference 1: 9.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Easy

56) The key mechanisms of the _____ marketplace model are forward auctions and electronic catalogs that can be customized for each large buyer. a) buy-side b) sell-side c) group purchasing d) desktop purchasing e) electronic exchange Answer: b Title: Assessment Question 9.56 Learning Objective 1: LO 9.3 Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference 1: 9.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Easy

57) In the _____ marketplace model, EC technology is used to streamline the purchasing process in order to reduce the cost of items purchased, the administrative cost of procurement, and the purchasing cycle time.


a) buy-side b) sell-side c) auctions d) group purchasing e) electronic exchange Answer: a Title: Assessment Question 9.57 Learning Objective 1: LO 9.3 Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference 1: 9.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Easy

58) In the _____ B2B application, the orders of many buyers are aggregated so that they comprise a large volume, in order to merit more seller attention. a) buy-side b) sell-side c) auctions d) group purchasing e) electronic exchange Answer: d Title: Assessment Question 9.58 Learning Objective 1: LO 9.3 Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference 1: 9.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Easy

59) In _____, direct and indirect materials in one industry are purchased on an as-needed basis. a) horizontal exchanges b) vertical exchanges c) buy-side marketplaces d) functional exchanges e) sell-side marketplaces Answer: b Title: Assessment Question 9.59 Learning Objective 1: LO 9.3 Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference 1: 9.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Easy


60) _____ connect buyers and sellers across many industries and are used mainly for indirect materials. a) Horizontal exchanges b) Vertical exchanges c) Buy-side marketplaces d) Functional exchanges e) Sell-side marketplaces Answer: a Title: Assessment Question 9.60 Learning Objective 1: LO 9.3 Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference 1: 9.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Easy

61) All of the following are limitations of traditional payment methods in electronic commerce except: a) Cash cannot be used because there is no face-to-face contact. b) Paying for goods and services via the mail takes more time) c) Not all organizations accept credit cards. d) It is more secure for the buyer to use the telephone than to complete a secure transaction on a computer. e) None of these Answer: d Title: Assessment Question 9.61 Learning Objective 1: LO 9.4 Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference 1: 9.4 Electronic Payments Difficulty: Medium

62) _____ are a payment mechanism that are similar to regular bank checks but are transmitted electronically, with a signature in digital form. a) Electronic checks b) Electronic credit cards c) Electronic cash transactions d) Electronic wallets e) Electronic debit cards Answer: a Title: Assessment Question 9.62


Learning Objective 1: LO 9.4 Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference 1: 9.4 Electronic Payments Difficulty: Easy

63) _____ use credit card numbers, transmitted electronically over the Internet, to pay for goods and services. They are either unencrypted or encrypted, with coded data readable by an intermediary between the buyer’s and seller’s banks. a) Electronic checks b) Electronic credit cards c) Electronic cash transactions d) Electronic wallets e) Electronic debit cards Answer: b Title: Assessment Question 9.63 Learning Objective 1: LO 9.4 Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference 1: 9.4 Electronic Payments Difficulty: Easy

64) _____ are typically used for unplanned B2B purchases for amounts under $2000. a) Electronic checks b) Stored-value money cards c) Purchasing cards d) Smart cards e) Person-to-person payments Answer: c Title: Assessment Question 9.64 Learning Objective 1: LO 9.4 Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference 1: 9.4 Electronic Payments Difficulty: Easy

65) ______ are a form of e-cash that enable you to store a fixed amount of prepaid money and then spend it as necessary. a) Electronic checks b) Stored-value money cards c) Purchasing cards d) Smart cards


e) Person-to-person payments Answer: b Title: Assessment Question 9.65 Learning Objective 1: LO 9.4 Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference 1: 9.4 Electronic Payments Difficulty: Easy

66) _____ contain a chip that can store information and be used for several purposes. a) Electronic checks b) Stored-value money cards c) Purchasing cards d) Smart cards e) Person-to-person payments Answer: d Title: Assessment Question 9.66 Learning Objective 1: LO 9.4 Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference 1: 9.4 Electronic Payments Difficulty: Easy

67) _____ enable two individuals to transfer funds without using a credit card. a) Electronic checks b) Stored-value money cards c) Purchasing cards d) Smart cards e) Person-to-person payments Answer: e Title: Assessment Question 9.67 Learning Objective 1: LO 9.4 Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference 1: 9.4 Electronic Payments Difficulty: Easy

68) _____ are software mechanisms that provide security measures and convenience for electronic commerce purchasing. a) Electronic checks


b) Digital wallets c) Purchasing cards d) Smart cards e) Person-to-person payments Answer: b Title: Assessment Question 9.68 Learning Objective 1: LO 9.4 Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference 1: 9.4 Electronic Payments Difficulty: Easy

69) The practice of using similar but not identical domain names is called _____. a) domain spoofing b) domain masquerading c) domain tasting d) cybersquatting e) domain fraud Answer: c Title: Assessment Question 9.69 Learning Objective 1: LO 9.5 Illustrate the ethical and legal issues relating to electronic commerce with two specific examples of each issue, and describe how you would respond or react to the four examples you have provided. Section Reference 1: 9.5 Ethical and Legal Issues in E-Business Difficulty: Easy

70) _____ refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or trademark belonging to someone else. a) Domain spoofing b) Domain masquerading c) Domain tasting d) Cybersquatting e) Domain fraud Answer: d Title: Assessment Question 9.70 Learning Objective 1: LO 9.5 Illustrate the ethical and legal issues relating to electronic commerce with two specific examples of each issue, and describe how you would respond or react to the four examples you have provided. Section Reference 1: 9.5 Ethical and Legal Issues in E-Business Difficulty: Easy


71) The device that Treat America installed on top of each of their machines communicates the following pieces of data except: a) the amount of money in the machine at any given minute) b) the amount of product inventory remaining. c) whether the machine had been moved. d) the number of customers. e) whether the door had been opened after business hours. Answer: d Title: Assessment Question 9.71 Learning Objective 1: LO 9.0 Provide a real-world application of e-business and e-commerce. Section Reference 1: Opening Case: Vending Goes Online Difficulty: Easy

72) Companies use Web sites for all of the following reasons except: a) To reduce operational and transaction costs. b) To enhance their reputation. c) To sell goods and services. d) To reduce the amount of actual cash they need to deal with. e) To induce people to visit a physical location. Answer: d Title: Assessment Question 9.72 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Easy

Question Type: Essay

73) Differentiate between pure and partial electronic commerce) Provide examples of companies in each category. Title: Assessment Question 9.73 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Medium


74) Discuss the various types of electronic commerce. Title: Assessment Question 9.74 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Medium

75) Differentiate between forward and reverse auctions. Title: Assessment Question 9.75 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Medium

76) Differentiate among sell-side marketplaces, buy-side marketplaces, and electronic exchanges. Title: Assessment Question 9.76 Learning Objective 1: LO 9.3 Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model. Section Reference 1: 9.3 Business-to-Business (B2B) Electronic Commerce Difficulty: Hard

77) Differentiate between electronic storefronts and electronic malls, and provide examples of each. Title: Assessment Question 9.77 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium

78) Discuss the reasons for E-commerce failures. Title: Assessment Question 9.78 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Medium


79) Discuss the benefits and limitations of electronic commerce. Title: Assessment Question 9.79 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Hard

80) Discuss the various business-to-consumer applications (e.g., e-tailing, electronic storefronts, electronic malls). Title: Assessment Question 9.80 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Hard

81) Discuss the various methods of online advertising. Title: Assessment Question 9.81 Learning Objective 1: LO 9.2 Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service. Section Reference 1: 9.2 Business-to-Consumer (B2C) Electronic Commerce Difficulty: Hard

82) Discuss the following electronic commerce business models and give examples of each type: online direct marketing, electronic tendering system, name-your-own-price, find-the-best-price, affiliate marketing, and viral marketing. Title: Assessment Question 9.82 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Medium

83) Describe the various types of electronic payments. Title: Assessment Question 9.83


Learning Objective 1: LO 9.4 Describe the four types of electronic payments, provide a specific example of each one, and explain whether you would use each type. Section Reference 1: 9.4 Electronic Payments Difficulty: Hard

84) What is domain tasting? Should it be made illegal? Title: Assessment Question 9.84 Learning Objective 1: LO 9.5 Illustrate the ethical and legal issues relating to electronic commerce with two specific examples of each issue, and describe how you would respond or react to the four examples you have provided. Section Reference 1: 9.5 Ethical and Legal Issues in E-Business Difficulty: Hard

Question Type: True/False

85) You decide to start a landscaping business called Trim Grass. You type www.TrimGrass.com in a Web browser, and you no page with that name appears. The domain name is therefore available. Answer: False Title: Assessment Question 9.85 Learning Objective 1: LO 9.5 Illustrate the ethical and legal issues relating to electronic commerce with two specific examples of each issue, and describe how you would respond or react to the four examples you have provided. Section Reference 1: 9.5 Ethical and Legal Issues in E-Business Difficulty: Medium

Question Type: Multiple Choice

86) You decide to start a landscaping business called Trim Grass. One of your services will be to perform fertilizer treatments. You will need to buy a great deal of fertilizer for your many clients. You can use all of the following methods to purchase the fertilizer except: a) Forward auction b) Reverse auction c) Name your Own Price d) Electronic Marketplace e) Multichanneling Answer: e Title: Assessment Question 9.86


Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Easy 87) You decide to start a landscaping business called Trim Grass. You created a Web site, but it doesn’t seem to be attracting any clients. So, you decide to explore advertising on the Web) Which of the following advertising methods probably would not be beneficial? a) Banner ads b) Pop-up or pop-under ads c) Spamming d) Permission marketing e) Viral marketing Answer: c Title: Assessment Question 9.87 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Medium

88) You decide to start a landscaping business called Trim Grass. Some of your residential clients would like to pay their bills online) Which of the following methods will not be appropriate for this type of payment? a) Electronic checks b) Electronic credit cards c) Purchasing cards d) Person-to-person payments e) Stored–value money cards Answer: c Title: Assessment Question 9.88 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Easy


89) You decide to start a landscaping business called Trim Grass. You expect to use the Web to help clients find you and communicate with you. You will mow lands, clean flower beds, and pick up leaves in the fall. You will send your clients monthly bills. Which of the following is true? a) Trim Grass is using an e-commerce model. b) Trim Grass is using an e-business model. c) Trim Grass is using a forward auction. d) Trim Grass is an electronic marketplace. e) Trim Grass needs to worry about channel conflict. Answer: b Title: Assessment Question 9.89 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Medium

90) You have been running a landscaping business called Trim Grass for about two years. You have developed a special blend of grass seed for your area that you use when you reseed your clients’ lawns. You are receiving e-mails via your Web site from people who would like to purchase some) You decide to start selling seed online, and you hire someone to rebuild your Web site) Which of the following statements is not true? a) Trim Grass is now multichanneling. b) Trim Grass needs to think about how to ship the seed. c) Trim Grass will have to collect sales tax from all sales. d) Trim Grass will have more expenses. e) Trim Grass will need to consider different advertising methods. Answer: c Title: Assessment Question 9.90 Learning Objective 1: LO 9.1 Describe the six common types of electronic commerce; provide specific personal examples of how you have used or could use B2C, C2C, G2C, and mobile commerce; and offer a specific example of B2B and G2B. Section Reference 1: 9.1 Overview of E-Business and E-Commerce Difficulty: Hard


Package Title: Assessment Questions Course Title: MIS 1e Chapter Number: 10

Question Type: True/False

1) Wireless computing does not really affect productivity. Answer: False Title: Assessment Question 10.01 Learning Objective 1: LO 10.0 Provide a real-world application of wireless, mobile computing, and mobile commerce. Section Reference 1: Opening Case: Tacos, Trucks, and Tweets Difficulty: Easy

2) Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices. Answer: True Title: Assessment Question 10.02 Learning Objective 1: LO 10.0 Provide a real-world application of wireless, mobile computing, and mobile commerce. Section Reference 1: Opening Case: Tacos, Trucks, and Tweets Difficulty: Easy

3) Wireless technologies are not changing the ways that organizations are doing business, but they are enabling organizations to do business faster. Answer: False Title: Assessment Question 10.03 Learning Objective 1: LO 10.0 Provide a real-world application of wireless, mobile computing, and mobile commerce. Section Reference 1: Opening Case: Tacos, Trucks, and Tweets Difficulty: Easy

4) Short message service allows users to send short text messages on digital cell phones. Answer: True


Title: Assessment Question 10.04 Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference 1: 10.1 Wireless Technologies Difficulty: Easy

5) Microwave transmissions are affected by environmental conditions such as storms. Answer: True Title: Assessment Question 10.05 Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference 1: 10.1 Wireless Technologies Difficulty: Easy

6) The higher the orbit of a satellite, the larger its footprint. Answer: True Title: Assessment Question 10.06 Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference 1: 10.1 Wireless Technologies Difficulty: Easy

7) The global positioning system is supported by GEO satellites. Answer: False Title: Assessment Question 10.07 Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference 1: 10.1 Wireless Technologies Difficulty: Easy

8) Radio transmissions are highly secure. Answer: False Title: Assessment Question 10.08


Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference 1: 10.1 Wireless Technologies Difficulty: Easy

9) Bluetooth is a wireless standard that enables temporary, short-range connection between mobile devices. Answer: True Title: Assessment Question 10.09 Learning Objective 1: LO 10.2 Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference 1: 10.2 Wireless Computer Networks and Internet Access Difficulty: Easy

10) A hotspot is a small geographical perimeter within which a wireless access point provides service to a number of users. Answer: True Title: Assessment Question 10.10 Learning Objective 1: LO 10.2 Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference 1: 10.2 Wireless Computer Networks and Internet Access Difficulty: Easy

11) Wi-Fi provides excellent security. Answer: False Title: Assessment Question 10.11 Learning Objective 1: LO 10.2 Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference 1: 10.2 Wireless Computer Networks and Internet Access Difficulty: Easy

12) In a mesh network, the motes transmit their data to a central computer.


Answer: False Title: Assessment Question 10.12 Learning Objective 1: LO 10.4 Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference 1: 10.4 Pervasive Computing Difficulty: Easy

13) Mesh networks are reliable, efficient, and fault tolerant. Answer: True Title: Assessment Question 10.13 Learning Objective 1: LO 10.4 Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference 1: 10.4 Pervasive Computing Difficulty: Easy

14) Personalization means that a mobile device can provide real-time communication, independent of the user’s location. Answer: False Title: Assessment Question 10.14 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Computing and Mobile Commerce Difficulty: Easy

15) A voice portal is a standard Web site that accepts voice commands. Answer: False Title: Assessment Question 10.15 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Computing and Mobile Commerce Difficulty: Easy

16) Mobile wallets enable users to make purchases with a single click from a mobile device.


Answer: True Title: Assessment Question 10.16 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Computing and Mobile Commerce Difficulty: Easy

17) Telemetry is the science that measures physical remoteness by means of wireless transmissions from a remote source to a receiving station. Answer: True Title: Assessment Question 10.17 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Computing and Mobile Commerce Difficulty: Easy

18) Pervasive computing and virtual reality are just different names for the same thing. Answer: False Title: Assessment Question 10.18 Learning Objective 1: LO 10.4 Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference 1: 10.4 Pervasive Computing Difficulty: Easy

19) Two systems being developed to replace bar codes are QR codes and RFID systems. Answer: True Title: Assessment Question 10.19 Learning Objective 1: LO 10.4 Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference 1: 10.4 Pervasive Computing Difficulty: Medium


20) Rogue access points can be set up by employees. Answer: True Title: Assessment Question 10.20 Learning Objective 1: LO 10.5 Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference 1: 10.5 Wireless Security Difficulty: Easy

21) War driving is the act of locating wireless networks while driving around a certain area. Answer: True Title: Assessment Question 10.21 Learning Objective 1: LO 10.5 Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference 1: 10.5 Wireless Security Difficulty: Easy

Question Type: Multiple Choice

22) Individuals are finding it convenient and productive to use wireless devices for which of the following reasons? a) To make use of time that was formerly wasted b) To become more efficient c) Work locations are more flexible d) To be able to allocate working time around personal and professional obligations e) All of these Answer: e Title: Assessment Question 10.22 Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference 1: 10.1 Wireless Technologies Difficulty: Medium

23) Of the following, which is the major problem with smart phones? a) They are too slow.


b) They are too expensive. c) They can be used to compromise security. d) Their screens are too small. e) Their browsers are not fully functional. Answer: c Title: Assessment Question 10.23 Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference 1: 10.1 Wireless Technologies Difficulty: Medium

24) The capabilities of smart phones include all of the following except _________. a) A calculator b) E-mail c) A global positioning system d) Corporate transaction processing e) A full-function Internet browser Answer: d Title: Assessment Question 10.24 Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference 1: 10.1 Wireless Technologies Difficulty: Easy

25) Unfortunately, many managers consider smart phones as only _____, rather than as _____ that can transmit wirelessly. a) Phones, digital cameras b) Phones, pagers c) Digital cameras, phones d) Digital cameras, pagers e) Cheap, expensive devices Answer: a Title: Assessment Question 10.25 Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type.


Section Reference 1: 10.1 Wireless Technologies Difficulty: Medium

26) Microwave transmission systems are used for _____ volume, _____ distance, _____ communications. a) Low, long, broadcast b) Low, short, line-of-sight c) High, long, broadcast d) High, short, broadcast e) High, long, line-of-sight Answer: e Title: Assessment Question 10.26 Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference 1: 10.1 Wireless Technologies Difficulty: Medium

27) Which type of satellite has the largest footprint? a) Low-earth-orbit b) Medium-earth-orbit c) Geostationary d) Polar orbit e) Equatorial orbit Answer: c Title: Assessment Question 10.27 Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference 1: 10.1 Wireless Technologies Difficulty: Easy 28) The area of the earth reached by a satellite’s transmission is referred to as its _____. a) Hotspot b) Coverage c) Footprint d) Zone e) Wireless area


Answer: c Title: Assessment Question 10.28 Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference 1: 10.1 Wireless Technologies Difficulty: Easy

29) The greatest problem with GEO satellites is which of the following? a) Propagation delay b) Expense c) Orbital life d) Size of the footprint e) Relative speed with respect to a point on the earth’s surface Answer: a Title: Assessment Question 10.29 Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference 1: 10.1 Wireless Technologies Difficulty: Easy 30) _____ is a satellite-based tracking system that enables users to determine a person’s position. a) Bluetooth b) Wireless application protocol c) Short message service d) Wi-Fi e) Global positioning system Answer: e Title: Assessment Question 10.30 Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference 1: 10.1 Wireless Technologies Difficulty: Easy

31) Which of the following is not an advantage of radio?


a) No metallic wires are needed. b) Radio waves propagate easily through office walls. c) Radio devices are inexpensive. d) Radio waves do not create electrical interference problems. e) Radio devices are easy to install. Answer: d Title: Assessment Question 10.31 Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference 1: 10.1 Wireless Technologies Difficulty: Medium

32) The main problem with radio transmission is which of the following? a) Radio waves cannot travel through walls. b) When you travel too far from the source, the signal fades. c) Devices are difficult to install. d) Radio waves are slow. e) Devices are expensive to install. Answer: b Title: Assessment Question 10.32 Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference 1: 10.1 Wireless Technologies Difficulty: Medium

33) The most common wireless technology for TV and DVD remote control devices is _______. a) Bluetooth b) Ultra-wideband c) Near-field communications d) WiMAX e) Infrared Answer: e Title: Assessment Question 10.33 Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference 1: 10.1 Wireless Technologies


Difficulty: Easy

34) _____ is a wireless standard that enables temporary, short-range connection between mobile devices. a) Bluetooth b) Wireless application protocol c) Short message service d) Wi-Fi e) Global positioning system Answer: a Title: Assessment Question 10.34 Learning Objective 1: LO 10.2 Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference 1: 10.2 Wireless Computer Networks and Internet Access Difficulty: Easy

35) Which of the following is the most appropriate wireless networking standard for creating personal area networks? a) Wi-Fi b) Cellular radio c) Microwave d) Bluetooth e) WiMAX Answer: d Title: Assessment Question 10.35 Learning Objective 1: LO 10.2 Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference 1: 10.2 Wireless Computer Networks and Internet Access Difficulty: Easy

36) Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in healthcare environments? a) Wi-Fi b) Microwave


c) Ultra-wideband d) Infrared e) Bluetooth Answer: c Title: Assessment Question 10.36 Learning Objective 1: LO 10.2 Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference 1: 10.2 Wireless Computer Networks and Internet Access Difficulty: Medium

37) _____, with the shortest range of any wireless network, is designed to be used with contactless credit cards. a) Near-field communications b) Bluetooth c) Ultra-wideband d) Wi-Fi e) Infrared Answer: a Title: Assessment Question 10.37 Learning Objective 1: LO 10.2 Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference 1: 10.2 Wireless Computer Networks and Internet Access Difficulty: Easy

38) Which of the following statements about Wi-Fi is not correct? a) Wi-Fi provides simple Internet access. b) Laptop PC scans contain chips that can send and receive Wi-Fi signals. c) Many companies offer free Wi-Fi access in their stores. d) Wi-Fi requires encryption for secure transmissions. e) Wi-Fi is expensive to set up. Answer: e Title: Assessment Question 10.38


Learning Objective 1: LO 10.2 Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference 1: 10.2 Wireless Computer Networks and Internet Access Difficulty: Medium

39) Which of the following is not inhibiting faster Wi-Fi expansion? a) Users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network services. b) A lack of security. c) The growth of WiMAX d) Unless the service is free, users have to log on to separate accounts for each hotspot. e) Wi-Fi services may not survive in the face of free hotspot access. Answer: c Title: Assessment Question 10.39 Learning Objective 1: LO 10.2 Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference 1: 10.2 Wireless Computer Networks and Internet Access Difficulty: Hard

40) A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________. a) Transceiver b) Hotspot c) Local reception node d) Wireless network e) GPS location Answer: b Title: Assessment Question 10.40 Learning Objective 1: LO 10.2 Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference 1: 10.2 Wireless Computer Networks and Internet Access Difficulty: Easy


41) Today, most wireless local area networks use the _____ standard, which can transmit up to 54 Mbps and has a range of about 300 feet. a) 802.11a b) 802.11b c) 802.11c d) 802.11g e) WiMAX Answer: d Title: Assessment Question 10.41 Learning Objective 1: LO 10.2 Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference 1: 10.2 Wireless Computer Networks and Internet Access Difficulty: Easy

42) _____ networks use multiple Wi-Fi access points to create a wide area network. a) Mesh b) Pervasive c) Global d) Fixed e) Ubiquitous Answer: a Title: Assessment Question 10.42 Learning Objective 1: LO 10.2 Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference 1: 10.2 Wireless Computer Networks and Internet Access Difficulty: Easy

43) _____ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas. a) Bluetooth b) Cell phones c) A satellite d) Ultra-wideband e) Near-field communications


Answer: b Title: Assessment Question 10.43 Learning Objective 1: LO 10.2 Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference 1: 10.2 Wireless Computer Networks and Internet Access Difficulty: Easy

44) The _____ standard can transmit up to 75 Mbps and has a range of 31 miles. a) Wi-Fi b) 802.11b c) 802.11c d) 802.11g e) WiMAX Answer: e Title: Assessment Question 10.44 Learning Objective 1: LO 10.2 Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference 1: 10.2 Wireless Computer Networks and Internet Access Difficulty: Easy

45) The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________. a) Mobility, broad reach b) Mobility, lack of expense c) Security, broad reach d) Security, mobility e) Broad reach, localization Answer: a Title: Assessment Question 10.45 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Computing and Mobile Commerce Difficulty: Medium


46) With regard to mobile computing, _____ means that it is easy and fast to access the Web and other mobile devices. a) Ubiquity b) Convenience c) Instant connectivity d) B and C e) A, B, and C Answer: d Title: Assessment Question 10.46 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Computing and Mobile Commerce Difficulty: Medium

47) With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services. a) Ubiquity b) Convenience c) Instant connectivity d) Personalization e) Localization of products and services Answer: e Title: Assessment Question 10.47 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Computing and Mobile Commerce Difficulty: Easy

48) The development of mobile commerce is driven by all of the following factors except: a) The widespread availability of mobile devices. b) The cell phone culture. c) Increasing prices. d) Bandwidth improvement. e) It eliminates the need for a PC. Answer: c


Title: Assessment Question 10.48 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Computing and Mobile Commerce Difficulty: Medium

49) Which of the following is not a mobile application in financial services? a) Transaction processing systems b) Mobile banking c) Wireless electronic payment systems d) Micropayments e) Wireless wallets Answer: a Title: Assessment Question 10.49 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Computing and Mobile Commerce Difficulty: Medium

50) Parking meters that you can pay via your mobile telephone are an example of _________. a) Mobile banking b) Wireless electronic payment c) Wireless wallets d) Brokerage service e) Money transfer Answer: b Title: Assessment Question 10.50 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Computing and Mobile Commerce Difficulty: Easy

51) If you buy a hot dog at a concession stand using your contactless credit card, you are using a ________. a) Wireless money transfer b) Wireless wallet


c) Wireless bill payment d) Micropayment e) Wireless electronic payment system Answer: e Title: Assessment Question 10.51 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Computing and Mobile Commerce Difficulty: Medium

52) Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is an example of ________. a) Viral marketing b) Permission advertising c) Geographical advertising d) Location-based advertising e) Direct marketing Answer: d Title: Assessment Question 10.52 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Computing and Mobile Commerce Difficulty: Medium

53) _____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets. a) Location-based services b) Telematics c) Pervasive services d) RFID e) Wi-Fi Answer: b Title: Assessment Question 10.53 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Computing and Mobile Commerce


Difficulty: Easy

54) Sense networks track users via all of the following technologies except _______. a) GPS b) Traffic cameras c) Cell towers d) Wi-Fi networks e) None of these Answer: b Title: Assessment Question 10.54 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Computing and Mobile Commerce Difficulty: Medium

55) _____ is the science that measures physical remoteness by means of wireless transmission from a remote source to a receiving station. a) Telemetry b) Wireless access point c) Near-field communications d) Microwave e) Wireless positioning Answer: a Title: Assessment Question 10.55 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Computing and Mobile Commerce Difficulty: Easy

56) The generic term for technologies that use radio waves to automatically identify individual items is __________. a) Telemetry b) Bar codes c) Shipping labels d) Radio-frequency identification e) Wireless access points Answer: d


Title: Assessment Question 10.56 Learning Objective 1: LO 10.4 Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference 1: 10.4 Pervasive Computing Difficulty: Easy

57) Which of the following is not a limitation of barcodes? a) They require line-of-sight to the scanning device. b) They are printed on paper. c) They identify the manufacturer, product, and item. d) They are difficult to use in a manufacturing plant. e) They are useless in determining expiration date. Answer: c Title: Assessment Question 10.57 Learning Objective 1: LO 10.4 Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference 1: 10.4 Pervasive Computing Difficulty: Medium

58) The major problem with RFID has been _______. a) Expense b) Bandwidth c) Location d) RFID readers e) RFID tags Answer: a Title: Assessment Question 10.58 Learning Objective 1: LO 10.4 Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference 1: 10.4 Pervasive Computing Difficulty: Easy

59) What would be the best use of RFID in a business? a) Transaction processing b) Supply chain management


c) Personnel tracking d) Enabling communications with customers e) Decreasing network costs Answer: b Title: Assessment Question 10.59 Learning Objective 1: LO 10.4 Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference 1: 10.4 Pervasive Computing Difficulty: Medium

60) _____ networks collect data from many points over an extended space. a) Bluetooth b) Ultra-wideband c) Wireless sensor d) WiMAX e) Wi-Fi Answer: c Title: Assessment Question 10.60 Learning Objective 1: LO 10.4 Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference 1: 10.4 Pervasive Computing Difficulty: Easy

61) Which of the following can be used for reading utility meters without a person having to get out of a truck? a) RuBee b) ZigBee c) Wi-Fi d) Near-field communications e) RFID Answer: b Title: Assessment Question 10.61


Learning Objective 1: LO 10.4 Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference 1: 10.4 Pervasive Computing Difficulty: Easy

62) The act of locating wireless local area networks while moving around a city is called ____. a) Eavesdropping b) War driving c) RF jamming d) Cybersquatting e) Installing rogue access devices Answer: b Title: Assessment Question 10.62 Learning Objective 1: LO 10.5 Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference 1: 10.5 Wireless Security Difficulty: Easy

63) A(n) _____ allows unauthorized entry into a wireless network. a) Lack of encryption b) Disgruntled employee c) Open node d) Illegal server e) Rogue access point Answer: e Title: Assessment Question 10.63 Learning Objective 1: LO 10.5 Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference 1: 10.5 Wireless Security Difficulty: Easy

64) _____ refers to efforts by unauthorized users to access data traveling over wireless networks. a) RF jamming b) War driving c) Eavesdropping


d) Telemetry e) Installing rogue access devices Answer: c Title: Assessment Question 10.65 Learning Objective 1: LO 10.5 Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference 1: 10.5 Wireless Security Difficulty: Easy

65) In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions. a) RF jamming b) War driving c) Eavesdropping d) Telemetry e) Installing rogue access devices Answer: a Title: Assessment Question 10.65 Learning Objective 1: LO 10.5 Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference 1: 10.5 Wireless Security Difficulty: Easy

66) Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an _____. a) Unencrypted node b) Evil twin c) Open node d) Illegal server e) Unauthorized rogue access point Answer: b Title: Assessment Question 10.66 Learning Objective 1: LO 10.5 Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference 1: 10.5 Wireless Security


Difficulty: Easy 67) Refer to the Opening Case – Tacos, Trucks, and Tweets?: Kogi BBQ uses Twitter to inform customers: a) What’s on the menu. b) A truck’s location. c) Where street parties are being held. d) How to pay for their tacos. e) Kogi BBQ uses Twitter for all of these reasons. Answer: b Title: Assessment Question 10.67 Learning Objective 1: LO 10.0 Provide a real-world application of wireless, mobile computing, and mobile commerce. Section Reference 1: Opening Case: Tacos, Trucks, and Tweets Difficulty: Easy 68) Refer to IT’s About Business 10.1 – WiMAX Helps the People of Northern Thailand: Which of the following was not an outcome of deploying WiMAX to the villages in Thailand? a) E-books were made accessible. b) Village schools collaborated with one another. c) The Internet became available as a research tool. d) Many villagers used computers for the first time. e) MFL University could hold classes in outlying villages. Answer: e Title: Assessment Question 10.68 Learning Objective 1: LO 10.2 Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference 1: IT’s About Business 10.1 Difficulty: Medium 69) Refer to IT’s About Business 10.2 – Location-Based Services at Shopping Malls: Which of the following statements is false? a) The mall industry expects these services will prevent malls from losing shoppers to online retailers. b) A current mall app helps shoppers remember where they parked.


c) Some current mall apps offer reward points. d) A mall app can be a loyalty program. e) A mall app can offer coupons based on shoppers location within the mall. Answer: a Title: Assessment Question 10.69 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: IT’s About Business 10.2 Difficulty: Medium 70) Refer to IT’s About Business 10.3 – Your Car Becomes a Smartphone: General Motors’ OnStar is an example of ____________ technology. a) Location-based b) Workflow c) Telemetry d) Mobile portal e) None of these Answer: c Title: Assessment Question 10.70 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: IT’s About Business 10.3 Difficulty: Medium 71) Refer to IT’s About Business 10.4 – Protecting an Open Wireless Network at Brigham Young University – Hawaii: Which of the following statements is false? a) BYU-Hawaii had a closed wireless campus network. b) BYU-Hawaii could not track who was using the network. c) BYU-Hawaii did not use Cisco Clean Access because it did not provide a virtual private network capability. d) BYU-Hawaii uses Avenda to provide virtual private networking for off-campus users. e) BYU-Hawaii uses Avenda to evaluate network performance. Answer: a Title: Assessment Question 10.71 Learning Objective 1: LO 10.5 Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business.


Section Reference 1: IT’s About Business 10.4 Difficulty: Easy 72) Refer to Closing Case #1 – The Battle for the Mobile Wallet: Which of the following statements concerning mobile wallets is true? a) Traditional credit card issuers have not shown a serious interest in this technology. b) Individual companies cannot utilize this technology due to its prohibitive price. c) Google has launched a program to manufacture its own smart phone chips. d) Unlike traditional wallets, smart phones can be password protected. e) Consumer advocates endorse mobile systems because they will lead to lower prices. Answer: d Title: Assessment Question 10.72 Learning Objective 1: LO 10.6 Summarize the fundamental concepts and skills related to wireless, mobile computing, and mobile commerce. Section Reference 1: Closing Case 1: The Battle for the Mobile Wallet Difficulty: Medium 73) Refer to Closing Case #2 – A Mobile Application for Home Depot: Which of the following statements concerning IT use at Home Depot is false? a) Home Depot didn’t have information systems that could support a change in corporate strategy. b) Home Depot’s Web site did not provide a seamless shopping experience. c) Home Depot’s Web site was easy to use and user friendly. d) Home Depot upgraded the walkie-talkies that the associates used. e) Contact-less scanners for reading credit card information on customers’ smartphones were installed in Home Depot’s U.S. stores. Answer: c Title: Assessment Question 10.73 Learning Objective 1: LO 10.6 Summarize the fundamental concepts and skills related to wireless, mobile computing, and mobile commerce. Section Reference 1: Closing Case 2: A Mobile Application for Home Depot Difficulty: Easy

Question Type: Essay

74) Discuss the differences between the traditional working environment and the wireless working environment.


Title: Assessment Question 10.74 Learning Objective 1: LO 10.0 Provide a real-world application of wireless, mobile computing, and mobile commerce. Section Reference 1: Introduction Difficulty: Medium

75) Describe the convergence of functions in today’s smart phones. Title: Assessment Question 10.75 Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference 1: 10.1 Wireless Technologies Difficulty: Medium

76) Differentiate among the three types of satellites. Title: Assessment Question 10.76 Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference 1: 10.1 Wireless Technologies Difficulty: Medium

77) Define Bluetooth, and give examples of its uses. Title: Assessment Question 10.77 Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference 1: 10.1 Wireless Technologies Difficulty: Medium

78) Describe the 802.11 family of standards. Title: Assessment Question 10.78 Learning Objective 1: LO 10.2 Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference 1: 10.2 Wireless Computer Networks and Internet Access Difficulty: Medium


79) Explain location-based commerce, and provide examples. Title: Assessment Question 10.79 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Commuting and Mobile Commerce: Mobile Commerce Applications Difficulty: Medium

80) What are micropayments and mobile wallets? Provide examples of their uses. Title: Assessment Question 10.80 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Commuting and Mobile Commerce: Mobile Commerce Applications Difficulty: Medium

81) What are mobile portals and voice portals? Provide examples of their uses. Title: Assessment Question 10.81 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Commuting and Mobile Commerce: Mobile Commerce Applications Difficulty: Medium

82) What is telemetry, and how is it used. Title: Assessment Question 10.82 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Commuting and Mobile Commerce: Mobile Commerce Applications Difficulty: Medium

83) How do wireless sensor networks work, and what are they used for? Title: Assessment Question 10.83 Learning Objective 1: LO 10.4 Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one.


Section Reference 1: 10.4 Pervasive Computing Difficulty: Medium

84) What are the problems with Wi-Fi? Title: Assessment Question 10.84 Learning Objective 1: LO 10.2 Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference 1: 10.2 Wireless Computer Networks and Internet Access Difficulty: Medium

85) What are the two characteristics of mobile computing, and what are the five value-added attributes of mobile computing? Title: Assessment Question 10.85 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Computing and Mobile Commerce Difficulty: Medium

86) Explain the factors that are driving the development of mobile commerce. Title: Assessment Question 10.86 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Computing and Mobile Commerce Difficulty: Hard

87) Describe pervasive computing and the two technologies that provide its infrastructure. Title: Assessment Question 10.87 Learning Objective 1: LO 10.4 Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference 1: 10.4 Pervasive Computing Difficulty: Medium

88) Identify and discuss the four major threats to wireless networks. Title: Assessment Question 10.88


Learning Objective 1: LO 10.5 Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. Section Reference 1: 10.5 Wireless Security Difficulty: Medium

Question Type: Multiple Choice

89) Michaela runs a dog-walking business. She has three employees, and she prides herself in maintaining a high level of customer service. She gets about half of her business from lastminute requests. When she receives such a request, she needs to know where her employees are so that she can identify the nearest one who might be able to do the walk. Significantly, she needs this information before she can confirm the walk with the client. Which of the following technologies will help her obtain this information? a) Radio transmission b) Internet over Satellite c) LEO constellation d) GPS e) Microwave Answer: d Title: Assessment Question 10.89 Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference 1: 10.1 Wireless Technologies Difficulty: Medium

90) Frank and his wife, Paula, run a country store with a special room where husbands can sit while their wives are shopping. The Men’s Corner already has a large-screen TV for sports viewing, but Frank and Paula are considering adding Wi-Fi. Which of the following statements is false? a) Their store would need to have broadband access. b) Their store will need a wireless access point. c) They could charge the customers for the service. d) Wi-Fi is based on radio waves, so they will need a clear line-of-sight into the room. e) They should consider using Wi-Fi Direct. Answer: e Title: Assessment Question 10.90


Learning Objective 1: LO 10.2 Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Section Reference 1: 10.2 Wireless Computer Networks and Internet Access Difficulty: Medium

91) Frank and his wife, Paula, run a country store in a high-foot-traffic area. Which of the following would not be a beneficial use of mobile technology for their store? a) Telemetry b) Location-based c) Wireless payments d) Mobile app loyalty program e) All of these could be used beneficial. Answer: a Title: Assessment Question 10.91 Learning Objective 1: LO 10.3 Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Section Reference 1: 10.3 Mobile Computing and Mobile Commerce Difficulty: Medium

92) Frank and his wife, Paula, run a country store in a high-foot-traffic area. They are trying to understand what the traffic in the store is by using technology. They are considering setting up a wireless sensor network. Which of the following statements is false? a) Motes can be locations throughout the store. b) Once they have created the network, they cannot add additional sensors. c) The data are moved from sensor to sensor to reach a central computer. d) The sensors can tell the direction in which a person is moving. e) The network will need a base station. Answer: d Title: Assessment Question 10.92 Learning Objective 1: LO 10.4 Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one. Section Reference 1: 10.4 Pervasive Computing Difficulty: Medium


93) Frank and his wife, Paula, run a country store with a special room where husbands can sit while their wives are shopping. The Men’s Corner already has a large-screen TV for sports viewing, and they recently added Wi-Fi. Which of the following is not a security issue? a) A rogue access point b) War driving c) Motes d) Eavesdropping e) Radio-frequency jamming Answer: d Title: Assessment Question 10.93 Learning Objective 1: LO 10.1 Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. Section Reference 1: 10.1 Wireless Technologies Difficulty: Medium


Package Title: Assessment Questions Course Title: MIS 1e Chapter Number: 11

Question Type: True/False

1) The functional area information systems are the most fundamental information systems in the organization. Answer: False Title: Assessment Question 11.01 Learning Objective 1: LO 11.1 Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference 1: 11.1 Transaction Processing Systems Difficulty: Easy

2) The data processed by transaction processing systems provide the inputs for other organizational information systems. Answer: True Title: Assessment Question 11.02 Learning Objective 1: LO 11.1 Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference 1: 11.1 Transaction Processing Systems Difficulty: Easy

3) In general, organizations try to automate data entry as much as possible. Answer: True Title: Assessment Question 11.03 Learning Objective 1: LO 11.1 Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference 1: 11.1 Transaction Processing Systems Difficulty: Easy

4) When you make a purchase online, that transaction is an example of batch processing. Answer: False


Title: Assessment Question 11.04 Learning Objective 1: LO 11.2 Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference 1: 11.2 Functional Area Information Systems Difficulty: Medium

5) Functional information systems support the entire enterprise or major portions of it. Answer: False Title: Assessment Question 11.05 Learning Objective 1: LO 11.2 Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference 1: 11.2 Functional Area Information Systems Difficulty: Easy

6) The information systems for Accounting and Finance could contain control and auditing process. Answer: True Title: Assessment Question 11.06 Learning Objective 1: LO 11.2 Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference 1: 11.2 Functional Area Information Systems Difficulty: Easy

7) The POM function within an organization monitors the customer sales activity. Answer: False Title: Assessment Question 11.07 Learning Objective 1: LO 11.2 Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference 1: 11.2 Functional Area Information Systems Difficulty: Easy

8) An example of a transaction in a HRIS application is adding a new employee. Answer: True Title: Assessment Question 11.08


Learning Objective 1: LO 11.2 Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference 1: 11.2 Functional Area Information Systems Difficulty: Easy

9) Information systems can be function-specific. Answer: True Title: Assessment Question 11.09 Learning Objective 1: LO 11.2 Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference 1: 11.2 Functional Area Information Systems Difficulty: Easy

10) Historically, the functional area information systems were developed independently of one another. Answer: True Title: Assessment Question 11.10 Learning Objective 1: LO 11.2 Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference 1: 11.2 Functional Area Information Systems Difficulty: Easy

11) Information silos were particularly efficient when business processes crossed functional boundaries in an organization. Answer: False Title: Assessment Question 11.11 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Easy

12) Business processes may be located within one functional area or may span multiple functional areas. Answer: True Title: Assessment Question 11.12


Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Easy

13) Best practices are the most successful solutions or problem-solving methods for achieving a business objective. Answer: True Title: Assessment Question 11.13 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Easy

14) Enterprise resource management is an enterprise-wide effort to acquire and retain customers. Answer: False Title: Assessment Question 11.14 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Easy

15) Financial management, operations management, and human resource management are extended ERP modules. Answer: False Title: Assessment Question 11.15 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Easy

16) When ERP systems are not appropriate in an organization, then that organization can use an enterprise application integration system. Answer: True


Title: Assessment Question 11.16 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Easy

17) Organizations that use ERP systems are more agile and adaptive. Answer: True Title: Assessment Question 11.17 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Easy

18) Exception reports show a greater level of detail than is included in routine reports. Answer: False Title: Assessment Question 11.18 Learning Objective 1: LO 11.4 Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference 1: 11.4 Reports Difficulty: Easy

19) Key-indicator reports shows data at a greater level of detail. Answer: False Title: Assessment Question 11.19 Learning Objective 1: LO 11.4 Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference 1: 11.4 Reports Difficulty: Easy

20) Drill down reports are produced at scheduled intervals. Answer: False Title: Assessment Question 11.20


Learning Objective 1: LO 11.4 Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference 1: 11.4 Reports Difficulty: Medium

21) An organization has to own all of the information systems it used. Answer: False Title: Assessment Question 11.21 Learning Objective 1: LO 11.0 Provide a real-world application of an information system within an organization. Section Reference 1: Introduction Difficulty: Medium

22) USA Cycling needed an on-demand inventory and warehouse management system that allows suppliers in different locations to manage inventory in a single system. Answer: False Title: Assessment Question 11.22 Learning Objective 1: LO 11.0 Provide a real-world application of an information system within an organization. Section Reference 1: Opening Case: USA Cycling Difficulty: Medium

23) Airgas improved its efficiencies by using SAP, which is a customer relationship management system. Answer: False Title: Assessment Question 11.23 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: IT’s About Business 11.1 Difficulty: Medium

24) A company that implements an ERP system must reworking their business processes to meet the procedures established by their ERP systems to gain significant benefits. Answer: True


Title: Assessment Question 11.24 Learning Objective 1: LO 11.5 Summarize the fundamental concepts and skills related to the roles and functions of information systems within organizations. Section Reference 1: Closing Case 2: Difficulties in Managing Enterprise Resource Planning Systems Difficulty: Medium

Question Type: Multiple Choice

25) Which of the following is true? a) Transactions are only critical to the area they occur in. b) Transactions can only involve one database. c) Transactions can only involve one computer. d) The actual processing of a Transaction has to be standard. e) Transactions generate a small volume of data. Answer: d Title: Assessment Question 11.25 Learning Objective 1: LO 11.1 Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference 1: 11.1 Transaction Processing Systems Difficulty: Medium

26) Which of the following is false? a) Corporate data is supplied by Transaction processing systems. b) Information systems are only used by large organizations. c) Reports from information systems are used in all levels of the organization. d) Data from TPS systems feeds ERP systems. e) Information systems within an organization support internal and external processes. Answer: b Title: Assessment Question 11.26 Learning Objective 1: LO 11.1 Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference 1: 11.1 Transaction Processing Systems Difficulty: Hard

27) Organizational transactions are typically _____ volume, _____, and therefore _____ to computerize.


a) low, repetitive, difficult b) high, repetitive, easy c) high, different, difficult d) low, different, easy e) high, different, easy Answer: b Title: Assessment Question 11.27 Learning Objective 1: LO 11.1 Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference 1: 11.1 Transaction Processing Systems Difficulty: Medium

28) Business transactions that are processed as they occur is an example of a) batch processing b) source data automation c) OLTP d) TPS e) ESS. Answer: c Title: Assessment Question 11.28 Learning Objective 1: LO 11.1 Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference 1: 11.1 Transaction Processing Systems Difficulty: Medium

29) The most fundamental information systems in an organization are: a) office automation systems b) decision support systems c) functional area information systems d) Transaction processing systems e) business intelligence systems Answer: d Title: Assessment Question 11.29 Learning Objective 1: LO 11.1 Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference 1: 11.1 Transaction Processing Systems


Difficulty: Easy

30) When interest is credited to your savings account at your bank, it is called a: a) process b) function c) calculation d) Transaction e) decision Answer: d Title: Assessment Question 11.30 Learning Objective 1: LO 11.1 Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference 1: 11.1 Transaction Processing Systems Difficulty: Medium

31) Crediting interest to your savings account at your bank once a month, it is called a: a) process b) function c) calculation d) Transaction e) decision Answer: a Title: Assessment Question 11.31 Learning Objective 1: LO 11.1 Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference 1: 11.1 Transaction Processing Systems Difficulty: Medium

32) When interest is credited to your savings account at your bank, it is called a: a) process b) function c) calculation d) Transaction e) decision Answer: d


Title: Assessment Question 11.32 Learning Objective 1: LO 11.1 Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference 1: 11.1 Transaction Processing Systems Difficulty: Medium 33) Data that have been processed by the organization’s _____ are inputs into the organization’s database. a) office automation systems b) functional area information systems c) Transaction processing systems d) decision support systems e) digital dashboards Answer: c Title: Assessment Question 11.33 Learning Objective 1: LO 11.1 Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference 1: 11.1 Transaction Processing Systems Difficulty: Easy

34) Which of the following is not a characteristic of a transaction processing system? a) small amounts of data are processed b) sources of data are mainly internal c) low computation complexity d) high level of accuracy, data integrity, and security e) high level of detail Answer: a Title: Assessment Question 11.34 Learning Objective 1: LO 11.1 Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference 1: 11.1 Transaction Processing Systems Difficulty: Easy

35) Which of the following is not an example of a transaction? a) A person hired


b) A payroll check generated c) A service sold d) Printing a report e) Checking out at Walmart Answer: d Title: Assessment Question 11.35 Learning Objective 1: LO 11.1 Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference 1: 11.1 Transaction Processing Systems Difficulty: Hard

36) Which of the following is false? a) TPS need large computers to process the transactions. b) Business transactions can be processed when they occur. c) Business transactions can be processed after they occur. d) Data for transactions can be collected by sensors. e) A transaction is a business event. Answer: a Title: Assessment Question 11.36 Learning Objective 1: LO 11.1 Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference 1: 11.1 Transaction Processing Systems Difficulty: Hard

37) Which of the following is not a function of functional area information systems? a) providing information to managers in the functional areas b) supporting the managerial tasks of planning, organizing, and controlling operations c) providing information mainly in the form of reports d) providing data from business events to the corporate database e) providing analysis capabilities to middle level managers and staff Answer: d Title: Assessment Question 11.37 Learning Objective 1: LO 11.2 Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference 1: 11.2 Functional Area Information Systems Difficulty: Easy


38) Which of the following is not a process within an information system for Accounting and Finance? a) Budgeting b) Managing Currencies c) Inventory management d) Auditing e) Expense management Answer: c Title: Assessment Question 11.38 Learning Objective 1: LO 11.2 Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference 1: 11.2 Functional Area Information Systems Difficulty: Medium

39) Which of the following is not a process within an information system for Human Resource Management? a) Benefits administration b) Firing decisions c) Peer evaluations d) Recruitment e) Training Answer: b Title: Assessment Question 11.39 Learning Objective 1: LO 11.2 Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference 1: 11.2 Functional Area Information Systems Difficulty: Easy

40) Which of the following is false? a) Inventory management determines how much inventory to order. b) Large companies allow their vendors to manage their inventory. c) The POM function within an organization monitors sales. d) Quality control used by manufacturing units uses metrics. e) Computer systems are used to integrate all aspects of product design. Answer: c


Title: Assessment Question 11.40 Learning Objective 1: LO 11.2 Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference 1: 11.2 Functional Area Information Systems Difficulty: Medium

41) Which of the following is false? a) ERP systems are an evolution of functional information systems. b) ERP systems look the same to users as functional information systems. c) ERP systems have much the same functionality as functional information systems. d) ERP systems produce the same reports as functional information systems. e) ERP systems use the same data as functional information systems. Answer: b Title: Assessment Question 11.41 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Medium

42) Enterprise resource planning systems take a(n) _____ view of the overall organization. a) User’s b) Management c) Functional d) Business process e) Transactional Answer: d Title: Assessment Question 11.42 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Medium 43) _____ integrate the planning, management, and use of all of an organization’s resources, and are designed to tightly integrate the functional areas of the organization. a) Transaction processing systems


b) Supply chain management systems c) Functional area information systems d) Enterprise resource planning systems e) Corporate extranets Answer: d Title: Assessment Question 11.43 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Easy

44) Which of the following is false? a) Functional area information systems were usually developed independently. b) Functional area information systems easily communicate with each other. c) ERP systems are designed to integrate business processes. d) ERP systems use a common database. e) ERP systems integrate functional areas within an organization. Answer: b Title: Assessment Question 11.44 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Medium

45) The characteristics of ERP systems include all of the following except: a) integrating the planning, management, and use of all resources of the organization b) providing information necessary to control the business processes of the organization c) including a set of interdependent software modules d) typically fitting an organization’s existing business processes e) they are expensive and time-consuming Answer: d Title: Assessment Question 11.45 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Easy


46) Enterprise resource planning systems are very _____ software products, meaning that companies typically have to change their _____ to accommodate how the software functions. a) unstructured, business processes b) structured, reporting relationships c) structured, accounting processes d) unstructured, inventory control e) structured, business processes Answer: e Title: Assessment Question 11.46 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Medium

47) _____ are interorganizational ERP systems that provide Web-enabled links between an organization’s key business systems and its customers, suppliers, business partners, and others. a) Functional area information systems b) Supply chain management systems c) Transaction processing systems d) Office automation systems e) ERP II systems Answer: e Title: Assessment Question 11.47 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Easy

48) _____ are the most successful solutions or problem-solving methods for achieving a business objective. a) Business functions b) Best practices c) Optimal strategies d) Business processes e) Enterprise solutions Answer: b


Title: Assessment Question 11.48 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Easy

49) The drawbacks of ERP systems include all of the following except: a) They are complex b) They are expensive c) They are time-consuming to implement d) Companies may need to change existing business processes to fit the software e) They consist of modules Answer: e Title: Assessment Question 11.49 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Easy

50) Which of the following was not included in early ERP systems? a) Sales and Marketing b) Inventory Control c) Order Entry d) Distribution e) Raw materials management Answer: a Title: Assessment Question 11.50 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Easy

51) Which of the following is false about ERP II systems? a) They utilize the Web. b) They include human resources processes.


c) Functionality is delivered as e-business suites. d) They support internal- facing applications as well as external-facing applications. e) These ERP systems have no optional modules. Answer: e Title: Assessment Question 11.51 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Easy

52) Which of the following is false? a) Breaking down functional silos makes an organization more adaptive. b) An organization doesn’t have to use the business processes coded into the ERP. c) ERP systems change an organization’s business processes. d) ERP systems are time consuming to implement. e) ERP systems require functional areas to work together. Answer: b Title: Assessment Question 11.52 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Easy

53) Which of the following has not been identified as a reason for ERP implementation failure? a) Failure to include affected employees in planning b) The complexity of the planning c) Lack of documentation d) Insufficient training e) No change management processes Answer: c Title: Assessment Question 11.53 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Medium


54) Which of the following is true? a) Implementing an ERP system will maintain a competitive advantage. b) Implementing an ERP system will allow a company to operate faster than their competition. c) The IT costs of an ERP implementation goes down over time. d) Customizing an ERP system is permitted. e) The benefits of an ERP implementation go down over time. Answer: d Title: Assessment Question 11.54 Learning Objective 1: LO 11.5 Summarize the fundamental concepts and skills related to the roles and functions of information systems within organizations. Section Reference 1: Closing Case 2: Difficulties in Managing Enterprise Resource Planning Systems Difficulty: Medium

55) _____ reports contain special information not found in routine reports. a) Ad hoc b) Summary c) Drill-down d) Key-indicator e) Exception Answer: a Title: Assessment Question 11.55 Learning Objective 1: LO 11.4 Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference 1: 11.4 Reports Difficulty: Easy

56) _____ reports are produced at scheduled intervals. a) Ad hoc b) Routine c) Exception d) Detailed e) Key indicator Answer: b Title: Assessment Question 11.56


Learning Objective 1: LO 11.4 Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference 1: 11.4 Reports Difficulty: Easy

57) _____ reports summarize the performance of critical activities. a) Ad hoc b) Routine c) Exception d) Detailed e) Key indicator Answer: e Title: Assessment Question 11.57 Learning Objective 1: LO 11.4 Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference 1: 11.4 Reports Difficulty: Easy

58) When the chief financial officer of a company wants a report on business units who have spent 10 percent more than their allotted budget, she would be requesting which type of report? a) Ad hoc b) Routine c) Exception d) Detailed e) Key indicator Answer: c Title: Assessment Question 11.58 Learning Objective 1: LO 11.4 Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference 1: 11.4 Reports Difficulty: Medium

59) _____ reports include only information that falls outside certain threshold standards. a) Ad hoc b) Routine c) Exception


d) Detailed e) Key indicator Answer: c Title: Assessment Question 11.59 Learning Objective 1: LO 11.4 Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference 1: 11.4 Reports Difficulty: Easy

60. To effectively manage by exception (i.e., use exception reports), the company must first create: a) performance standards b) best practices c) user information requirements d) a database e) employee evaluation guides Answer: a Title: Assessment Question 11.60 Learning Objective 1: LO 11.4 Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference 1: 11.4 Reports Difficulty: Easy 61) Refer to Opening Case – USA Cycling: SmartTurn is all of the following except a) Software-as-a-Service b) Inventory and warehouse management system. c) restricted to a single location. d) a Transaction Processing system e) A functional Area Information System Answer: c Title: Assessment Question 11.61 Learning Objective 1: LO 11.0 Provide a real-world application of an information system within an organization. Section Reference 1: Opening Case: USA Cycling Difficulty: Medium 62) Refer to IT’s About Business 11.1—SAP at Airgas: Which of the following is false?


a) Airgas saw economic benefits during the conversion process. b) The project will be over its projected cost budget. c) Airgas switched over its supply chain operations to SAP first. d) Airgas used subject-matter experts to identify required functionality in their SAP system. e) Airgas implemented SAP without the help of consultants. Answer: e Title: Assessment Question 11.62 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: IT’s About Business 11.1 Difficulty: Medium 63) Refer to Closing Case #1 – Is Baseball a Science?: Which of the following is false? a) Standards are being developed for baseball fielding metrics. b) Fielding metrics will eliminate the need for specialized coaches. c) Motion-capture software can be used to determine where a fielder was standing when a ball is hit. d) Data collected by the motion-capture software can be used to identify fielders that have fast reaction times. e) Fielding metrics can be used to evaluate players. Answer: b Title: Assessment Question 11.63 Learning Objective 1: LO 11.5 Summarize the fundamental concepts and skills related to the roles and functions of information systems within organizations. Section Reference 1: Closing Case 1: Is Baseball a Science Difficulty: Medium 64) Refer to Closing Case #2 – Difficulties in Managing ERP systems: Which of the following is false? a) Standards are being developed for baseball fielding metrics. b) Fielding metrics will eliminate the need for specialized coaches. c) Motion-capture software can be used to determine where a fielder was standing when a ball is hit. d) Data collected by the motion-capture software can be used to identify fielders that have fast reaction times. e) Fielding metrics can be used to evaluate players. Answer: b Title: Assessment Question 11.64


Learning Objective 1: LO 11.5 Summarize the fundamental concepts and skills related to the roles and functions of information systems within organizations. Section Reference 1: Closing Case 2: Difficulties in Managing Enterprise Resource Planning Systems Difficulty: Medium

Question Type: Essay

65) Differentiate between transaction processing systems and functional area information systems. Title: Assessment Question 11.65 Learning Objective 1: LO 11.1 Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Learning Objective 2: LO 11.2 Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference 1: 11.1 Transaction Processing Systems Section Reference 2: 11.2 Functional Area Information Systems Difficulty: Medium

66) Differentiate between batch processing and online transaction processing. Title: Assessment Question 11.66 Learning Objective 1: LO 11.1 Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference 1: 11.1 Transaction Processing Systems Difficulty: Medium

67) Explain how information systems for accounting and finance support an organization. Title: Assessment Question 11.67 Learning Objective 1: LO 11.2 Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference 1: 11.2 Functional Area Information Systems Difficulty: Medium

68) Explain how information systems for production operations management support an organization. Title: Assessment Question 11.68 Learning Objective 1: LO 11.2 Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference 1: 11.2 Functional Area Information Systems Difficulty: Medium


69) Explain how information systems for human resource management support an organization. Title: Assessment Question 11.69 Learning Objective 1: LO 11.2 Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference 1: 11.2 Functional Area Information Systems Difficulty: Medium

70) Explain how information systems for marketing and sales support an organization. Title: Assessment Question 11.70 Learning Objective 1: LO 11.2 Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference 1: 11.2 Functional Area Information Systems Difficulty: Medium

71) Define enterprise resource planning systems and discuss why they were developed. Title: Assessment Question 11.71 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Medium

72) Describe the various reports that can be obtained from functional area information systems. Title: Assessment Question 11.72 Learning Objective 1: LO 11.4 Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference 1: 11.4 Reports Difficulty: Medium

73) Contrast routine reports and drill-down reports. Title: Assessment Question 11.73 Learning Objective 1: LO 11.4 Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference 1: 11.4 Reports Difficulty: Easy


74) Define source data automation and describe why this process is so important to transaction processing systems. Title: Assessment Question 11.74 Learning Objective 1: LO 11.1 Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference 1: 11.1 Transaction Processing Systems Difficulty: Hard

75) Discuss why functional area information systems would have been built as silos. Explain the limitations of that approach. Title: Assessment Question 11.75 Learning Objective 1: LO 11.2 Define functional area information systems, and provide an example of the support they provide for each functional area of the organization. Section Reference 1: 11.2 Functional Area Information Systems Difficulty: Medium

76) Discuss the reasons why ERP systems evolved and what organizations hope to gain by implementing them. Title: Assessment Question 11.76 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Medium

77) Differentiate between ERP systems and ERP II systems. Title: Assessment Question 11.77 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system. Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Medium

78) What are ad-hoc (on-demand) reports? Why does an organization need to be able to run ad-hoc reports? Title: Assessment Question 11.78 Learning Objective 1: LO 11.3 Explain the purpose of enterprise resource planning systems, and identify four advantages and four drawbacks to implementing an ERP system.


Section Reference 1: 11.3 Enterprise Resource Planning Systems Difficulty: Easy

Question Type: True/False 79) Greg is mowing lawns in the neighborhood for the summer. He does not need an information system. Answer: False Title: Assessment Question 11.79 Learning Objective 1: LO 11.1 Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference 1: 11.1 Transaction Processing Systems Difficulty: Easy

Question Type: Multiple Choice

80) Greg is mowing lawns in the neighborhood for the summer. Which of the following is not an example of a transaction he has in his business? a) Adding a new client to his list. b) Mowing a client’s lawn c) Buying gas for his mower d) Driving to the client’s house e) Getting paid by the client Answer: d Title: Assessment Question 11.80 Learning Objective 1: LO 11.1 Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference 1: 11.1 Transaction Processing Systems Difficulty: Medium

81) Greg is mowing lawns in the neighborhood for the summer. Which type of report would he used to see which of his clients still owe him money? a) Ad hoc b) Summary c) Exception d) Detailed


e) Key indicator Answer: c Title: Assessment Question 11.81 Learning Objective 1: LO 11.4 Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference 1: 11.4 Reports Difficulty: Easy

82) Greg is mowing lawns in the neighborhood for the summer. Which type of report would he used to see which if a particular client still owe him money? a) Ad hoc b) Routine c) Exception d) Detailed e) Key indicator Answer: a Title: Assessment Question 11.82 Learning Objective 1: LO 11.4 Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference 1: 11.4 Reports Difficulty: Easy

Question Type: Essay

83) Greg is mowing lawns in the neighborhood for the summer. How could he use source data automation to make data entry easier? Title: Assessment Question 11.83 Learning Objective 1: LO 11.1 Explain the purposes of transaction processing systems, and provide at least one example of how businesses use these systems. Section Reference 1: 11.1 Transaction Processing Systems Difficulty: Medium

Question Type: Multiple Choice


84) Kathy has taken a job with her ideal company and is excited to start in their sales department. During orientation, she is told that the company is very proud of their ERP system from SAP. Looking at the list of modules the company has, Kathy wonders which one she won’t be using. From the list below, which one would you tell Kathy is the one she won’t be using. a) Customer relationship management b) Human resource management c) Business intelligence d) Operations management e) E-Business Answer: d Title: Assessment Question 11.84 Learning Objective 1: LO 11.4 Discuss the three major types of reports generated by the functional area information systems and enterprise resource planning systems, and provide an example of each type. Section Reference 1: 11.4 Reports Difficulty: Easy


PackageTitle: Assessment Questions CourseTitle: MIS 1e Chapter Number: 12

Question Type: True/False

1) Over time, the customer relationship with vendors has become more personal. Answer: False Title: Assessment Question 12.01 Learning Objective 1: LO 12.0 Provide a real-world application for customer relationship management. Section Reference 1: Introduction Difficulty: Easy

2) Today, customers are becoming increasingly powerful. Answer: True Title: Assessment Question 12.02 Learning Objective 1: LO 12.0 Provide a real-world application for customer relationship management. Section Reference 1: Introduction Difficulty: Easy

3) One problem with interacting with customers over the Web is that the company does not have an opportunity to make a good first impression in person. Answer: True Title: Assessment Question 12.03 Learning Objective 1: LO 12.0 Provide a real-world application for customer relationship management. Section Reference 1: Introduction Difficulty: Easy

4) CRM systems focus on marketing to masses of people. Answer: False Title: Assessment Question 12.04 Learning Objective 1: LO 12.0 Provide a real-world application for customer relationship management. Section Reference 1: Introduction


Difficulty: Easy

5) CRM systems are designed to achieve customer intimacy. Answer: True Title: Assessment Question 12.05 Learning Objective 1: LO 12.0 Provide a real-world application for customer relationship management. Section Reference 1: Introduction Difficulty: Easy

6) The basic idea of CRM is to treat all customers in the same way. Answer: False Title: Assessment Question 12.06 Learning Objective 1: LO 12.1 Define customer relationship management and collaborative CRM, and identify the primary functions of both processes. Section Reference 1: 12.1 Defining Customer Relationship Management Difficulty: Easy

7) CRM means that a company should interact with its customers as a group. Answer: False Title: Assessment Question 12.07 Learning Objective 1: LO 12.1 Define customer relationship management and collaborative CRM, and identify the primary functions of both processes. Section Reference 1: 12.1 Defining Customer Relationship Management Difficulty: Easy

8) Properly designed CRM systems provide a single, enterprisewide view of each customer. Answer: True Title: Assessment Question 12.08 Learning Objective 1: LO 12.1 Define customer relationship management and collaborative CRM, and identify the primary functions of both processes. Section Reference 1: 12.1 Defining Customer Relationship Management Difficulty: Easy


9) In the past, customer data have been located all over the company, typically in the functional areas. Answer: True Title: Assessment Question 12.09 Learning Objective 1: LO 12.1 Define customer relationship management and collaborative CRM, and identify the primary functions of both processes. Section Reference 1: 12.1 Defining Customer Relationship Management Difficulty: Easy

10) Tweets can be used as customer touch points. Answer: True Title: Assessment Question 12.10 Learning Objective 1: LO 12.1 Define customer relationship management and collaborative CRM, and identify the primary functions of both processes. Section Reference 1: 12.1 Defining Customer Relationship Management Difficulty: Easy

11) Transactional CRM systems provide interactive communication with the customer throughout the organization. Answer: False Title: Assessment Question 12.11 Learning Objective 1: LO 12.1 Define customer relationship management and collaborative CRM, and identify the primary functions of both processes. Section Reference 1: 12.1 Defining Customer Relationship Management Difficulty: Easy

12) For purposes of efficiency, customer data are best stored in the functional areas of the organization. Answer: False Title: Assessment Question 12.12 Learning Objective 1: LO 12.1 Define customer relationship management and collaborative CRM, and identify the primary functions of both processes. Section Reference 1: 12.1 Defining Customer Relationship Management Difficulty: Easy

13) Collaborative CRM systems provide interaction with customers throughout the entire organization.


Answer: True Title: Assessment Question 12.13 Learning Objective 1: LO 12.1 Define customer relationship management and collaborative CRM, and identify the primary functions of both processes. Section Reference 1: 12.1 Defining Customer Relationship Management Difficulty: Easy

14) Operational CRM systems support the front-office business processes that directly interact with customers. Answer: True Title: Assessment Question 12.14 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Easy

15) Some companies conduct live chat with customers using a computer with natural language processing software, rather than a real person. Answer: True Title: Assessment Question 12.15 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Easy

16) Sales force automation is a customer-facing application. Answer: True Title: Assessment Question 12.16 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Easy


17) If you have visited Amazon’s Web site previously and then return, Amazon recommends other books that you might like. This is called cross-selling. Answer: True Title: Assessment Question 12.17 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Easy

18) Electronic CRM applications are the same thing as customer-touching CRM. Answer: True Title: Assessment Question 12.18 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Easy

19) Salesforce is the most purchased CRM software. Answer: False Title: Assessment Question 12.19 Learning Objective 1: LO 12.4 Define mobile CRM systems, on-demand CRM systems, and opensource CRM systems, and identify one main advantage and one main drawback of each one. Section Reference 1: 12.4 Other Types of Customer Relationship Management Systems Difficulty: Easy

20) Mobile CRM systems are targeting customers through their laptops. Answer: True Title: Assessment Question 12.20 Learning Objective 1: LO 12.4 Define mobile CRM systems, on-demand CRM systems, and opensource CRM systems, and identify one main advantage and one main drawback of each one. Section Reference 1: 12.4 Other Types of Customer Relationship Management Systems


Difficulty: Easy 21) Open-source CRM software doesn’t have as many features or functions as other DRM software. Answer: False Title: Assessment Question 12.21 Learning Objective 1: LO 12.4 Define mobile CRM systems, on-demand CRM systems, and opensource CRM systems, and identify one main advantage and one main drawback of each one. Section Reference 1: 12.4 Other Types of Customer Relationship Management Systems Difficulty: Easy

Question Type: Multiple Choice

22) Over time, the customer relationship with vendors has become more impersonal for all of the following reasons except: a) people move from farms to cities b) consumers became mobile c) supermarkets and department stores proliferated d) customer relationship management systems were developed e) the Internet grew rapidly Answer: d Title: Assessment Question 12.22 Learning Objective 1: LO 12.0 Provide a real-world application for customer relationship management. Section Reference 1: Introduction Difficulty: Hard

23) Which of the following best describes CRM? a) a process b) a set of technologies c) an information system d) a way of thinking and acting e) a set of decisions Answer: d Title: Assessment Question 12.23


Learning Objective 1: LO 12.1 Define customer relationship management and collaborative CRM, and identify the primary functions of both processes. Section Reference 1: 12.1 Defining Customer Relationship Management Difficulty: Medium

24) Which of the following is an important enabler of CRM? a) recognizing that there are many customer touch points b) recognizing the necessity of treating all customers the same c) recognizing the need for sophisticated CRM information systems d) recognizing the need for sophisticated customer databases e) recognizing the need for a data warehouse Answer: a Title: Assessment Question 12.24 Learning Objective 1: LO 12.1 Define customer relationship management and collaborative CRM, and identify the primary functions of both processes. Section Reference 1: 12.1 Defining Customer Relationship Management Difficulty: Medium

25) Which of the following is not a customer touch point? a) telephone contact b) e-mail c) Web sites d) customer visits to a store e) none of these – all are touch points Answer: e Title: Assessment Question 12.25 Learning Objective 1: LO 12.1 Define customer relationship management and collaborative CRM, and identify the primary functions of both processes. Section Reference 1: 12.1 Defining Customer Relationship Management Difficulty: Medium

26) The complete data on a customer is called: a) a profile b) a record c) a 360-degree view d) a file


e) a consolidated customer map Answer: c Title: Assessment Question 12.26 Learning Objective 1: LO 12.1 Define customer relationship management and collaborative CRM, and identify the primary functions of both processes. Section Reference 1: 12.1 Defining Customer Relationship Management Difficulty: Easy

27) Which of the following is the most important enabler of the 360-degree view of the customer across an organization? a) the organization’s database b) the organization’s data warehouse c) the organization’s CRM systems d) the organization’s collaborative CRM systems e) the organization’s analytical CRM systems Answer: b Title: Assessment Question 12.27 Learning Objective 1: LO 12.1 Define customer relationship management and collaborative CRM, and identify the primary functions of both processes. Section Reference 1: 12.1 Defining Customer Relationship Management Difficulty: Hard

28) _____ systems provide interactive communication with the customer throughout the organization. a) CRM b) Collaborative CRM c) Operational CRM d) Analytical CRM e) Transactional CRM Answer: b Title: Assessment Question 12.28 Learning Objective 1: LO 12.1 Define customer relationship management and collaborative CRM, and identify the primary functions of both processes. Section Reference 1: 12.1 Defining Customer Relationship Management Difficulty: Easy


29) Which of the following statements concerning customer relationship management is false? a) CRM is a customer-driven strategy. b) CRM constitutes a specific use of technology. c) Building long-term relationships with customers creates value for the organization. d) It costs more to bring a customer back from a competitor than it does to keep him or her satisfied in the first place. e) The basic concept behind CRM is to treat different customers differently. Answer: b Title: Assessment Question 12.29 Learning Objective 1: LO 12.1 Define customer relationship management and collaborative CRM, and identify the primary functions of both processes. Section Reference 1: 12.1 Defining Customer Relationship Management Difficulty: Easy

30) Which of the following statements is false? a) Data consolidation and a 360-degree view mean the same thing. b) Data about customers in various functional areas were difficult to share. c) Collaborative CRM systems enable customers to provide direct feedback to the organization d) CRM systems use a data warehouse to make all customer data available to every unit of the business. e) Organizations can use blogs for customer input about their products and services. Answer: a Title: Assessment Question 12.30 Learning Objective 1: LO 12.1 Define customer relationship management and collaborative CRM, and identify the primary functions of both processes. Section Reference 1: 12.1 Defining Customer Relationship Management Difficulty: Easy

31) _____ systems support the front-office business processes which directly interact with customers. a) CRM b) Collaborative CRM c) Operational CRM d) Analytical CRM e) Transactional CRM Answer: c Title: Assessment Question 12.31


Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Hard

32) _____ includes those areas where customers directly interact with the company. a) CRM b) Analytical CRM c) Customer-facing CRM d) Customer-touching CRM e) Transactional CRM Answer: c Title: Assessment Question 12.32 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Easy

33) Which of the follow statements concerning customer interaction centers (CIC) is false? a) A call center is an example of a CIC. b) A Help Desk is an example of a CIC. c) In outboard telesales, the salesperson contacts the customer. d) In inboard telesales, the customer calls the CIC. e) Live chat provides an advantage over telephone conversations. Answer: d Title: Assessment Question 12.33 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Medium

34) When customers help themselves, often through electronic touch points, this process is called: a) CRM


b) analytical CRM c) customer-facing CRM d) customer-touching CRM e) Transactional CRM Answer: d Title: Assessment Question 12.34 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Easy

35) The sales, marketing, and service functions are part of: a) CRM b) analytical CRM c) operational CRM d) collaborative CRM e) Transactional CRM Answer: c Title: Assessment Question 12.35 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Easy 36) In _____, company representatives use multiple communication channels to support their customers’ communications preferences. a) telesales rooms b) group decision support rooms c) videoconferencing centers d) sales team meetings e) customer interaction centers Answer: e Title: Assessment Question 12.36


Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Easy

37) Which of the following allows customers to connect to a company representative and conduct an instant messaging session? a) information help desk b) live chat c) customer interaction center d) teleconference e) videoconference Answer: b Title: Assessment Question 12.37 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Easy

38) _____ is the component of an operational CRM system that automatically records all the aspects in a sales transaction process. a) Inbound telesales b) Outbound telesales c) Sales team efforts d) Sales force automation e) The customer help desk Answer: d Title: Assessment Question 12.38 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Easy


39) _____ is the practice of marketing additional related products to customers based on a previous purchase. a) Bundling b) Up-selling c) Re-selling d) Additional selling e) Cross-selling Answer: e Title: Assessment Question 12.39 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Easy

40) AT&T sells telephone services that include local and long-distance service, voice mail service, caller ID, and digital subscriber line access to the Internet. This is a form of: a) up-selling b) cross-selling c) bundling d) customer relationship management e) customer intimacy Answer: c Title: Assessment Question 12.40 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Medium

41) You are in the market for a small economy car. The salesperson has you drive the economy car, and then hands you the keys to a mid-sized car of the same brand for you to drive. The salesperson is engaged in: a) up-selling b) cross-selling c) bundling d) customer relationship management


e) customer intimacy Answer: a Title: Assessment Question 12.41 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Medium

42) _____ is a sales strategy which the business person will provide customers the opportunity to purchase higher-value related products. a) Bundling b) Up-selling c) Re-selling d) Additional selling e) Cross-selling Answer: b Title: Assessment Question 12.42 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Easy

43) _____ occurs when a business sells a group of products or services together at a lower price than the combined individual prices of the products. a) Bundling b) Up-selling c) Re-selling d) Additional selling e) Cross-selling Answer: a Title: Assessment Question 12.43 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application.


Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Easy

44) _____ is a form of _____. a) Up-selling, re-selling b) Bundling, cross-selling c) Up-selling, bundling d) Cross-selling, re-selling e) Re-selling, additional selling Answer: b Title: Assessment Question 12.44 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Medium

45) _____ are applications and technologies with which customers interact and typically help themselves. a) Customer-facing CRM applications b) Up-selling activities c) Inbound telesales d) Customer-touching applications e) Outbound telesales Answer: d Title: Assessment Question 12.45 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Easy

46) A check-in kiosk at the airport is which type of CRM application? a) Inbound telesales b) Customer-touching c) Outbound telesales


d) Sales e) Customer-facing Answer: b Title: Assessment Question 12.46 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Medium

47) Electronic CRM applications are considered to be which type of CRM application? a) Inbound telesales b) Customer-touching c) Outbound telesales d) Sales e) Customer-facing Answer: b Title: Assessment Question 12.47 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Easy

48) _____ are simple tools for answering repetitive customer questions. a) Personalized Web pages b) Customized products and services c) Frequently asked questions d) E-mail systems e) Automated Section reference 1 systems Answer: c Title: Assessment Question 12.48 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems


Difficulty: Easy

49) Which of the following statements about loyalty programs is false? a) Loyalty programs work when there is a high frequency of repeat purchases. b) Loyalty programs work when there is little personal customization. c) The purpose of loyalty programs is to influence future behavior. d) The purpose of loyalty programs is to reward past behavior e) Loyalty programs are a customer-touching application. Answer: d Title: Assessment Question 12.49 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Medium

50) Which of the following is not a customer-touching CRM application? a) FAQs. b) Loyalty programs. c) Personalized Web Pages d) Automated e-mail Section reference 1. e) Shopping cart Answer: e Title: Assessment Question 12.50 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Easy

51) _____ systems study customer behavior and perceptions to provide business intelligence. a) CRM b) Collaborative CRM c) Operational CRM d) Analytical CRM e) Transactional CRM


Answer: d Title: Assessment Question 12.51 Learning Objective 1: LO 12.3 Define analytical CRM systems, and describe four purposes for which businesses use these systems. Section Reference 1: 12.3 Analytical Customer Relationship Management Systems Difficulty: Easy

52) _____ creates statistical models of customer behavior and the value of customer relationships over time. a) CRM b) Analytical CRM c) Operational CRM d) Collaborative CRM e) Transactional CRM Answer: b

Title: Assessment Question 12.52 Learning Objective 1: LO 12.3 Define analytical CRM systems, and describe four purposes for which businesses use these systems. Section Reference 1: 12.3 Analytical Customer Relationship Management Systems Difficulty: Easy

53) _____ examines customer data in detail for designing and executing targeted marketing campaigns. a) CRM b) Analytical CRM c) Operational CRM d) Collaborative CRM e) Transactional CRM Answer: b

Title: Assessment Question 12.53 Learning Objective 1: LO 12.3 Define analytical CRM systems, and describe four purposes for which businesses use these systems. Section Reference 1: 12.3 Analytical Customer Relationship Management Systems Difficulty: Easy


54) _____ is a CRM system that is hosted by an external vendor in the vendor’s data center. a) Mobile CRM b) Analytical CRM c) Operational CRM d) On-demand CRM e) Customer-facing CRM Answer: d Title: Assessment Question 12.54 Learning Objective 1: LO 12.4 Define mobile CRM systems, on-demand CRM systems, and opensource CRM systems, and identify one main advantage and one main drawback of each one. Section Reference 1: 12.4 Other Types of Customer Relationship Management Systems Difficulty: Easy

55) Potential problems with on-demand CRM include all of the following except: a) It increases costs for the organization. b) The vendor could prove unreliable. c) It is difficult to modify hosted software. d) It may be difficult to integrate hosted software with existing software in the organization. e) Giving strategic data to a vendor is risky. Answer: a Title: Assessment Question 12.55 Learning Objective 1: LO 12.4 Define mobile CRM systems, on-demand CRM systems, and opensource CRM systems, and identify one main advantage and one main drawback of each one. Section Reference 1: 12.4 Other Types of Customer Relationship Management Systems Difficulty: Medium

56) The benefits of open-source CRM include all of the following except: a) It is easy to customize. b) It is favorably priced. c) It has more functionality than in-house CRM systems. d) It updates data and fixes errors rapidly. e) It has extensive support information. Answer: c Title: Assessment Question 12.56


Learning Objective 1: LO 12.4 Define mobile CRM systems, on-demand CRM systems, and opensource CRM systems, and identify one main advantage and one main drawback of each one. Section Reference 1: 12.4 Other Types of Customer Relationship Management Systems Difficulty: Medium 57) Refer to Opening Case – VIP Auto Appearance Center: Some of the advantages that a small business can capitalize on by implementing a CRM include: a) Less paperwork b) Integrated systems c) More efficient billing d) Data to support relationship building e) All of these Answer: e Title: Assessment Question 12.57 Learning Objective 1: LO 12.0 Provide a real-world application for customer relationship management. Section Reference 1: Opening Case: VIP Auto Appearance Center Difficulty: Medium 58) Refer to IT’s About Business 12.1 – An Instantaneous CRM Effort: Which of the following is true? a) Organizations can ignore social media. b) Organizations only need to be followed on Tweeter to be effective. c) An organization has to act on posts about itself on Tweeter and Facebook. d) Tweeter is the only way to monitor customer experiences e) Organizations can put up a Facebook fan page and customers will flock to it. Answer: c Title: Assessment Question 12.58 Learning Objective 1: LO 12.1 Define customer relationship management and collaborative CRM, and identify the primary functions of both processes. Section Reference 1: IT’s About Business 12.1 Difficulty: Medium 59) Refer to IT’s About Business 12.2 – Mobile CRM on a Smart Phone: Which of the following is not true about the Kickback Mobile technology used at Hard Rock Hotel and Casino? a) Customers must download an app to their smart phones. b) Customers must register with credit card information. c) Customers can use the app for room service.


d) Customers can order food and drinks from the pool. e) Kickback is based on a technology called geo-finding. Answer: e Title: Assessment Question 12.59 Learning Objective 1: LO 12.4 Define mobile CRM systems, on-demand CRM systems, and opensource CRM systems, and identify one main advantage and one main drawback of each one. Section Reference 1: IT’s About Business 12.2 Difficulty: Medium 60) Refer to Closing Case #1 – The Next Step in CRM: Which of the following statements is false? a) Taste profiling is used to target ads wherever a person navigates online. b) Persuasion profiling develops strategies to advertise to individuals online. c) People respond to the same pitch across multiple domains. d) Persuasion profiling works only if the individual is aware of it. e) Micro-profiling isolates people from discoveries outside their usual interests. Answer: d Title: Assessment Question 12.60 Learning Objective 1: LO 12.5 Summarize the fundamental concepts and skills related to customer relationship management. Section Reference 1: Closing Case: The Next Step in Customer Relationship Management Difficulty: Medium 61) Refer to Closing Case #2 – Refining the Call Center: The case discusses research that indicates that pairing callers to a call center with like-minded representatives can result in benefits. Which of the following is not one of the benefits? a) Calls will be shorter. b) Representatives can handle more calls. c) Customer satisfaction will improve. d) Fewer accounts will be canceled. e) Customer fallout will be reduced. Answer: e Title: Assessment Question 12.61 Learning Objective 1: LO 12.5 Summarize the fundamental concepts and skills related to customer relationship management. Section Reference 1: Closing Case: Refining the Call Center Difficulty: Medium


Question Type: Essay

62) Describe the various customer touch points in any organization. Which ones are more effective for you as college students? Title: Assessment Question 12.62 Learning Objective 1: LO 12.1 Define customer relationship management and collaborative CRM, and identify the primary functions of both processes. Section Reference 1: 12.1 Defining Customer Relationship Management Difficulty: Medium

63) Describe the various customer-facing applications in an organization. Title: Assessment Question 12.63 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Medium

64) Describe the elements within sales force automation. Title: Assessment Question 12.64 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Medium

65) Contrast operational CRM systems and analytical CRM systems. Title: Assessment Question 12.65 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Medium

66) What are the problems associated with on-demand CRM?


Title: Assessment Question 12.66 Learning Objective 1: LO 12.4 Define mobile CRM systems, on-demand CRM systems, and opensource CRM systems, and identify one main advantage and one main drawback of each one. Section Reference 1: 12.4 Other Types of Customer Relationship Management Systems Difficulty: Medium

67) Describe the reasons that so many companies think mobile CRM is the CRM system of the future. Title: Assessment Question 12.67 Learning Objective 1: LO 12.4 Define mobile CRM systems, on-demand CRM systems, and opensource CRM systems, and identify one main advantage and one main drawback of each one. Section Reference 1: 12.4 Other Types of Customer Relationship Management Systems Difficulty: Medium

68) Discuss the benefits of persuasion profiling Title: Assessment Question 12.68 Learning Objective 1: LO 12.5 Summarize the fundamental concepts and skills related to customer relationship management. Section Reference 1: Closing Case: The Next Step in Customer Relationship Management Difficulty: Medium 69) Describe why the customer – vendor relationship has become more impersonal. Title: Assessment Question 12.69 Learning Objective 1: LO 12.0 Provide a real-world application for customer relationship management. Section Reference 1: Introduction Difficulty: Hard

70) Explain why the concept of a customer relationship management system became necessary. Title: Assessment Question 12.70 Learning Objective 1: LO 12.1 Define customer relationship management and collaborative CRM, and identify the primary functions of both processes. Section Reference 1: 12.1 Defining Customer Relationship Management Difficulty: Medium 71) What is the rationale behind customer-touching applications? Explain four such applications. Title: Assessment Question 12.71


Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Hard

72) Discuss the benefits and limitations of on-demand CRM systems. Title: Assessment Question 12.72 Learning Objective 1: LO 12.4 Define mobile CRM systems, on-demand CRM systems, and opensource CRM systems, and identify one main advantage and one main drawback of each one. Section Reference 1: 12.4 Other Types of Customer Relationship Management Systems Difficulty: Medium

73) What are the benefits of open-source CRM? Title: Assessment Question 12.73 Learning Objective 1: LO 12.4 Define mobile CRM systems, on-demand CRM systems, and opensource CRM systems, and identify one main advantage and one main drawback of each one. Section Reference 1: 12.4 Other Types of Customer Relationship Management Systems Difficulty: Medium

Question Type: True or False

74) Haya noticed that college students needed to dress up for presentations, but they never seemed to have any ties, or at least not very nice ones. She decided to set up a tie store on her campus and offer sports-themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Haya needs to decide on her CRM strategy before she can select her CRM systems. Answer: True Title: Assessment Question 12.74 Learning Objective 1: LO 12.1 Define customer relationship management and collaborative CRM, and identify the primary functions of both processes. Section Reference 1: 12.1 Defining Customer Relationship Management Difficulty: Easy

Question Type: Multiple Choice


75) Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Which of the following customer touch points will give Haya the most information after her first weekend of selling? a) Communication she sends via smart phones. b) She should build a Web site before she begins to sell on campus. c) She should send an e-mail to all students on campus. d) She should put a flyer in every mail box on campus. e) She should physically interact with customers when they visit her store. Answer: e Title: Assessment Question 12.75 Learning Objective 1: LO 12.1 Define customer relationship management and collaborative CRM, and identify the primary functions of both processes. Section Reference 1: 12.1 Defining Customer Relationship Management Difficulty: Easy

76) Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Which of the following should Haya consider during her first month of operation? a) A sales force automation system b) A customer interaction center c) Bundling d) Campaign management e) Purchasing profiles Answer: c Title: Assessment Question 12.76 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Hard


77) Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Which of the following should Haya focus on during her first month of operation? a) Search/comparison capabilities on a web site b) Personalized experiences to make a purchase on a web site c) Customization of ties d) FAQs e) A loyalty program Answer: e Title: Assessment Question 12.77 Learning Objective 1: LO 12.2 Describe the two major components of operational CRM systems, list three applications used in each component, and provide at least one example of how businesses use each application. Section Reference 1: 12.2 Operational Customer Relationship Management Systems Difficulty: Medium

78) Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Haya begins collecting data about her customers by having them sign up for Promotional E-mails at her store. She collects their names and e-mail address on her form. How might she use the customer data? a) Target marketing campaigns b) Cross-sell c) Gain insights into her products d) Perform customer profitability analysis e) Marketing Answer: e Title: Assessment Question 12.78 Learning Objective 1: LO 12.3 Define analytical CRM systems, and describe four purposes for which businesses use these systems. Section Reference 1: 12.3 Analytical Customer Relationship Management Systems Difficulty: Hard


79) Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Haya begins to notice that her sports ties are selling really well. Which of the following should be her next step? a) Target marketing campaigns b) Cross-sell c) Insights into her products d) Customer profitability analysis e) Marketing Answer: a Title: Assessment Question 12.79 Learning Objective 1: LO 12.3 Define analytical CRM systems, and describe four purposes for which businesses use these systems. Section Reference 1: 12.3 Analytical Customer Relationship Management Systems Difficulty: Medium


Package Title: Assessment Questions Course Title: MIS 1e Chapter Number: 13

Question Type: True/False

1) Modern organizations are concentrating on their core competencies and on becoming more flexible and agile. Answer: True Title: Assessment Question 13.01 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains Difficulty: Easy

2) Supply chain visibility is the time between the receipt of incoming goods and the dispatch of finished, outbound products. Answer: False Title: Assessment Question 13.02 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains Difficulty: Easy

3) Sourcing from external suppliers occurs in the upstream portion of the supply chain. Answer: True Title: Assessment Question 13.03 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains Difficulty: Easy

4) Packaging and assembly take place in the downstream portion of the supply chain. Answer: False


Title: Assessment Question 13.04 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains Difficulty: Easy

5) There are typically four flows in the supply chain: materials, information, returns, and financial. Answer: False Title: Assessment Question 13.05 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains Difficulty: Easy

6) The goal of SCM systems is to reduce friction along the supply chain. Answer: True Title: Assessment Question 13.06 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Easy

7) The pull model is make-to-stock. Answer: False Title: Assessment Question 13.07 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Easy

8) The push model begins with a forecast. Answer: True Title: Assessment Question 13.08


Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Easy 9) A company can’t change from a push model to a pull model. Answer: False Title: Assessment Question 13.09 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Easy

10) Overestimating and underestimating demand both create problems for organizations. Answer: True Title: Assessment Question 13.10 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Easy

11) A major source of supply chain uncertainty is the supply forecast. Answer: False Title: Assessment Question 13.11 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Easy

12) The most common solution to supply chain problems is building inventories. Answer: True Title: Assessment Question 13.12 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems.


Section Reference 1: 13.2 Supply Chain Management Difficulty: Easy

13) Horizontal integration is a business strategy in which a company buys its suppliers. Answer: False Title: Assessment Question 13.13 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Easy

14) Just-in-time inventory systems try to maximize inventories to protect against uncertainties along the supply chain. Answer: False Title: Assessment Question 13.14 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Easy

15) Internet protocol data interchange is a communication standard that enables business partners to electronically exchange routine documents. Answer: False Title: Assessment Question 13.15 Learning Objective 1: LO 13.3 Define the terms electronic data interchange (EDI), extranet, and portal, and explain how each of these applications helps support supply chain management. Section Reference 1: 13.3 Information Technology Support for Supply Chain Management Difficulty: Easy

16) Electronic data interchange minimizes paper usage and storage. Answer: True Title: Assessment Question 13.16 Learning Objective 1: LO 13.3 Define the terms electronic data interchange (EDI), extranet, and portal, and explain how each of these applications helps support supply chain management.


Section Reference 1: 13.3 Information Technology Support for Supply Chain Management Difficulty: Easy

17) Electronic data interchange requires only a small initial investment. Answer: False Title: Assessment Question 13.17 Learning Objective 1: LO 13.3 Define the terms electronic data interchange (EDI), extranet, and portal, and explain how each of these applications helps support supply chain management. Section Reference 1: 13.3 Information Technology Support for Supply Chain Management Difficulty: Easy

18) Electronic data interchange is a problem for small businesses. Answer: True Title: Assessment Question 13.18 Learning Objective 1: LO 13.3 Define the terms electronic data interchange (EDI), extranet, and portal, and explain how each of these applications helps support supply chain management. Section Reference 1: 13.3 Information Technology Support for Supply Chain Management Difficulty: Easy

19) Internet-based extranets are much less costly than proprietary networks. Answer: True Title: Assessment Question 13.19 Learning Objective 1: LO 13.3 Define the terms electronic data interchange (EDI), extranet, and portal, and explain how each of these applications helps support supply chain management. Section Reference 1: 13.3 Information Technology Support for Supply Chain Management Difficulty: Easy

Question Type: Multiple Choice

20) Trends that have led to the supply chain concept include all of the following except: a) modern organizations are focusing on their core competencies b) modern organizations are concentrating on becoming more agile and flexible c) modern organizations are buying their suppliers in order to have more transparency along the supply chain


d) modern organizations are relying on other companies to supply necessary goods and services e) modern organizations are relying on an increasing number of suppliers Answer: c Title: Assessment Question 13.20 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains Difficulty: Hard

21) _____ is the ability for all organizations in a supply chain to access or view relevant data on purchased materials as these materials move through their suppliers’ production processes and transportation networks to their receiving docks. a) Supply chain visibility b) Horizontal integration c) Vertical integration d) Supply chain intelligence e) Supply chain integration Answer: a Title: Assessment Question 13.21 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains Difficulty: Medium

22) _____ is the time between the receipt of incoming goods and the dispatch of finished, outbound products. a) Inventory turnover b) Inventory velocity c) Inventory speed d) Inventory time e) Inventory production Answer: b Title: Assessment Question 13.22 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains


Difficulty: Easy

23) A(n) _____ refers to the flow of materials, information, money, and services from raw material suppliers, through factories and warehouses to the end customers. a) demand chain b) business process c) manufacturing process d) supply chain e) enterprise resource process Answer: d Title: Assessment Question 13.23 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains Difficulty: Easy 24) The _____ is comprised of a company’s suppliers, the suppliers’ suppliers, and the processes for managing them. a) suppliers’ chain b) external supply chain c) upstream portion of the supply chain d) downstream portion of the supply chain e) entire supply chain Answer: c Title: Assessment Question 13.24 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains Difficulty: Easy

25) Packaging, assembly, and manufacturing take place in which segment of the supply chain? a) upstream b) internal c) downstream d) external e) none of these


Answer: b Title: Assessment Question 13.25 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains Difficulty: Easy 26) The ________ refers to a company’s organization and processes for distributing and delivering products to its final customers. a) suppliers’ chain b) external supply chain c) upstream portion of the supply chain d) downstream portion of the supply chain e) entire supply chain Answer: d Title: Assessment Question 13.26 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains Difficulty: Easy

27) Distribution or dispersal takes place in which segment of the supply chain? a) upstream b) internal c) downstream d) external e) none of these Answer: c Title: Assessment Question 13.27 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains Difficulty: Easy

28) _____ are the physical products, raw materials, and supplies that flow along a supply chain.


a) Reverse flows b) Reverse logistics c) Material flows d) Information flows e) Financial flows Answer: c Title: Assessment Question 13.28 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains Difficulty: Easy

29) Returned products, recycled products, and disposal of materials or products are called: a) reverse flows b) returns c) material flows d) information flows e) financial flows Answer: a Title: Assessment Question 13.29 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains Difficulty: Easy

30. _____ consist of data that are related to demand, shipments, orders, returns, and schedules. a) Reverse flows b) Reverse logistics c) Material flows d) Information flows e) Financial flows Answer: d Title: Assessment Question 13.30 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains


Difficulty: Easy

31) _____ involve money transfers, payments, credit card information and authorization, payment schedules, e-payments, and credit-related data. a) Reverse flows b) Reverse logistics c) Material flows d) Information flows e) Financial flows Answer: e Title: Assessment Question 13.31 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains Difficulty: Easy

32) The goals of supply chain management include which of the following? a) to reduce uncertainty and risks along the supply chain b) to reduce inventory levels c) to reduce cycle time d) to improve customer service e) all of these Answer: e Title: Assessment Question 13.32 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Medium

33) Which of the following is not a goal of supply chain management? a) to reduce uncertainty along the supply chain b) to decrease inventory levels c) to increase cycle time d) to improve customer service e) to improve business processes


Answer: c Title: Assessment Question 13.33 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Medium

34) Interorganizational information systems result in all of the following except: a) reduced costs of routine business transactions b) improved quality of information flow c) reduced errors d) increased cycle time e) eliminated paper processing Answer: d Title: Assessment Question 13.34 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Easy

35) In the _____, the production process begins with a forecast. a) supply chain model b) inventory model c) pull model d) vertical integration model e) push model Answer: e Title: Assessment Question 13.35 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Easy

36) In the _____, the production process begins with a customer order. a) supply chain model


b) inventory model c) pull model d) vertical integration model e) push model Answer: c Title: Assessment Question 13.36 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Easy

37) The _____ is known as make-to-stock. a) supply chain model b) inventory model c) pull model d) vertical integration model e) push model Answer: e Title: Assessment Question 13.37 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Easy

38) The _____ is known as make-to-order. a) supply chain model b) inventory model c) pull model d) vertical integration model e) push model Answer: c Title: Assessment Question 13.38 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Easy


39) Which of the following models best describes the business model of large automobile manufacturers? a) Supply chain model b) Inventory model c) Pull model d) Vertical integration model e) Push model Answer: e Title: Assessment Question 13.39 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Easy

40) Which of the following is not a problem along the supply chain? a) poor customer service b) high inventory costs c) loss of revenues d) decreased cycle times e) extra cost of expediting shipments Answer: d Title: Assessment Question 13.40 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Medium

41) The _____ refers to erratic shifts in orders up and down the supply chain. a) demand forecast effect b) supply forecast effect c) bullwhip effect d) inventory effect e) customer coordination effect Answer: c


Title: Assessment Question 13.41 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Easy

42) The bullwhip effect results from which of the following? a) poor demand forecast b) price fluctuations c) order batching d) rationing within the supply chain e) all of these Answer: e Title: Assessment Question 13.42 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Medium

43) Which of the following is not responsible for the bullwhip effect? a) poor demand forecast b) price fluctuations c) order batching d) rationing within the supply chain e) poor supply forecast Answer: e Title: Assessment Question 13.43 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Medium

44) Which of the following is not a possible solution to supply chain problems? a) vertical integration b) building inventories


c) information sharing d) horizontal integration e) the bullwhip effect Answer: d Title: Assessment Question 13.44 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Medium

45) _____ is the strategy of purchasing upstream suppliers, in order to ensure availability of supplies. a) Horizontal integration b) Vertical integration c) Just-in-time inventory management d) Supply chain integration e) Customer order integration Answer: b Title: Assessment Question 13.45 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Easy

46) When Walmart sells a package of diapers, the company captures data on that sale at its point-of-sale terminal and transmits those data to the company that makes the diapers. When inventory gets too low, the diaper company restocks the diapers in that Walmart store. This process is called: a) supply chain management b) demand chain management c) vendor-managed inventory d) enterprise resource planning inventory e) just-in-time inventory Answer: c Title: Assessment Question 13.46 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management


Difficulty: Medium

47) The benefits of EDI include which of the following? a) data entry errors are minimized b) length of messages is shorter c) messages are secured d) fosters collaborative relationships e) all of these Answer: e Title: Assessment Question 13.47 Learning Objective 1: LO 13.3 Define the terms electronic data interchange (EDI), extranet, and portal, and explain how each of these applications helps support supply chain management. Section Reference 1: 13.3 Information Technology Support for Supply Chain Management Difficulty: Easy

48) Which of the following is not a benefit of EDI? a) data entry errors are minimized b) length of messages is longer c) messages are secured d) fosters collaborative relationships e) reduced cycle time Answer: b Title: Assessment Question 13.48 Learning Objective 1: LO 13.3 Define the terms electronic data interchange (EDI), extranet, and portal, and explain how each of these applications helps support supply chain management. Section Reference 1: 13.3 Information Technology Support for Supply Chain Management Difficulty: Medium

49) Which of the following is not a limitation of EDI? a) It is inflexible. b) It might require a company to restructure its business processes. c) It is expensive, but ongoing operating costs are low. d) Multiple EDI standards exist. e) It is difficult to make quick changes. Answer: c


Title: Assessment Question 13.49 Learning Objective 1: LO 13.3 Define the terms electronic data interchange (EDI), extranet, and portal, and explain how each of these applications helps support supply chain management. Section Reference 1: 13.3 Information Technology Support for Supply Chain Management Difficulty: Medium

50. The primary goal of extranets is to ______ . a) foster collaboration between and among business partners b) provide security for corporate intranets c) provide effective communications inside corporate intranets d) enable corporate employees to view inventory information for their companies e) enable business partners to better plan mergers and acquisitions Answer: a Title: Assessment Question 13.50 Learning Objective 1: LO 13.3 Define the terms electronic data interchange (EDI), extranet, and portal, and explain how each of these applications helps support supply chain management. Section Reference 1: 13.3 Information Technology Support for Supply Chain Management Difficulty: Medium

51) Extranets use _____ technology to make communication over the Internet more secure. a) telepresence b) anti-malware c) virtual private network d) voice-over IP e) videoconferencing Answer: c Title: Assessment Question 13.51 Learning Objective 1: LO 13.3 Define the terms electronic data interchange (EDI), extranet, and portal, and explain how each of these applications helps support supply chain management. Section Reference 1: 13.3 Information Technology Support for Supply Chain Management Difficulty: Easy

52) The FedEx extranet that allows customers to track the status of a package is an example of which type of extranet? a) a company and its dealers, customers, and/or suppliers


b) an industry’s extranet c) joint venture d) B2B exchange e) B2C exchange Answer: a Title: Assessment Question 13.52 Learning Objective 1: LO 13.3 Define the terms electronic data interchange (EDI), extranet, and portal, and explain how each of these applications helps support supply chain management. Section Reference 1: 13.3 Information Technology Support for Supply Chain Management Difficulty: Medium

53) The Bank of America extranet for commercial loans links lenders, loan brokers, escrow companies, title companies, and others. This is an example of which type of extranet? a) a company and its dealers, customers, and/or suppliers b) an industry’s extranet c) B2C exchange d) B2B exchange e) joint venture Answer: e Title: Assessment Question 13.53 Learning Objective 1: LO 13.3 Define the terms electronic data interchange (EDI), extranet, and portal, and explain how each of these applications helps support supply chain management. Section Reference 1: 13.3 Information Technology Support for Supply Chain Management Difficulty: Medium

54) _____ portals automate the business processes involved in purchasing products between a single buyer and multiple suppliers. a) Distribution b) Corporate c) Affiliate d) Intranet e) Procurement Answer: e Title: Assessment Question 13.54 Learning Objective 1: LO 13.3 Define the terms electronic data interchange (EDI), extranet, and portal, and explain how each of these applications helps support supply chain management.


Section Reference 1: 13.3 Information Technology Support for Supply Chain Management Difficulty: Easy

55) _____ portals automate the business processes involved in selling products from a single supplier to multiple buyers. a) Distribution b) Corporate c) Affiliate d) Intranet e) Procurement Answer: a Title: Assessment Question 13.55 Learning Objective 1: LO 13.3 Define the terms electronic data interchange (EDI), extranet, and portal, and explain how each of these applications helps support supply chain management. Section Reference 1: 13.3 Information Technology Support for Supply Chain Management Difficulty: Easy 56) Refer to Opening Case – Swagelok: Swagelok recognized that they needed to turn towards a supply chain management solution for all of the following reasons except: a) They needed to improve their forecasting processes. b) They needed to improve their distribution processes. c) They needed to operate with reduced inventory levels. d) They needed to help their suppliers improve their own planning processes. e) They couldn’t update their existing software to provide the benefits they needed. Answer: e Title: Assessment Question 13.56 Learning Objective 1: LO 13.0 Provide a real-world application for supply chain management. Section Reference 1: Opening Case: Swagelok Implements an ERP System Difficulty: Medium 57) Refer to IT’s About Business 13.1 – Cisco Moves from Push Model to Pull Model: When Cisco transformed its inventory planning from a push system into a pull system, it took all of the following actions except: a) It gathered data from its suppliers. b) It gathered data from its upstream business partners. c) It designed new forecasting algorithms.


d) It brought together sales and operations personnel to create a common view of demand alerts. e) It created shared data among all the affected departments and customers. Answer: b Title: Assessment Question 13.57 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: IT’s About Business 13.1 Difficulty: Medium 58) Refer to IT’s About Business 13.2– Parts Management at Southwest Airlines: Southwest implemented many modules to address its inventory management needs. Which of the following statements is not true? a) Demand Planner is used to forecast where parts need to be in the system. b) Service Parts Planner is used to plan for inventory replenishment. c) Service Budget Optimizer is used to forecast parts that must be obtained. d) Service Budget Optimizer is used to create bills of materials. e) Service Budget Optimizer is used to create an annual maintenance budget. Answer: e Title: Assessment Question 13.58 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: IT’s About Business 13.2 Difficulty: Medium 59) Refer to Closing Case #1 – Information Technology Helps Cannondale Manage Its Complex Supply Chain: A bill of materials for a product includes all of the following data except: a) The time required to make the final product b) Raw materials and the needed quantity of each one c) Assemblies and the needed quantity of each one d) Components and the needed quantity of each one e) Parts and the needed quantity of each one. Answer: a Title: Assessment Question 13.59 Learning Objective 1: LO 13.4 Summarize the fundamental concepts and skills related to supply chain management.


Section Reference 1: Closing Case 1: Information Technology Helps Cannondale Manage Its Complex Supply Chain Difficulty: Medium 60) Refer to Closing Case #1 – Information Technology Helps Cannondale Manage Its Complex Supply Chain: Which of the following was not one of Cannondale’s objectives when evaluating IT solutions to their manufacturing system? a) Accurate parts flow b) Flexibility c) Timely reporting d) Shared data among all involved e) Web-based interface Answer: e Title: Assessment Question 13.60 Learning Objective 1: LO 13.4 Summarize the fundamental concepts and skills related to supply chain management. Section Reference 1: Closing Case 1: Information Technology Helps Cannondale Manage Its Complex Supply Chain Difficulty: Medium 61) Refer to Closing Case #2 – Supply Chain Management Helps Imperial Sugar after Disaster: Which of the following statements is true? a) The demand-management module from PeopleSoft’s enterprise resource planning system was not adequate for the complexities of Imperial Sugar’s business. b) When the accident happened, Imperial Sugar had enough safety stockpiles to meet demand until the plant could come back on line. c) Imperial Sugar’s demand is very even over time. d) Effective supply chain management did not give Imperial Sugar a competitive advantage. e) There are only a handful of factors that determine the demand for sugar. Answer: a Title: Assessment Question 13.61 Learning Objective 1: LO 13.4 Summarize the fundamental concepts and skills related to supply chain management. Section Reference 1: Closing Case 2: Supply Chain Management Helps Imperial Sugar After Disaster Difficulty: Medium

Question Type: Essay


62) Describe supply chain visibility and explain why it is important to an organization. Title: Assessment Question 13.62 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains Difficulty: Medium

63) Describe inventory velocity and explain why it is important to an organization. Title: Assessment Question 13.63 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains Difficulty: Medium

64) Describe the three flows along a supply chain. Title: Assessment Question 13.64 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains Difficulty: Medium 65) Explain what “upstream” and “downstream” are within a supply chain. Title: Assessment Question 13.65 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains Difficulty: Medium

66) Differentiate between the pull model and the push model. Title: Assessment Question 13.66 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Medium


67) Describe the various methods that companies use to solve problems along their supply chains. Title: Assessment Question 13.67 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Medium

68) What is the bullwhip effect? Title: Assessment Question 13.68 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Medium

69) Explain and contrast just-in-time inventory and vendor-managed inventory. Title: Assessment Question 13.69 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Medium

70) Describe the supply chain of your university. Be sure to include all three segments. Title: Assessment Question 13.70 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Medium

71) Describe vertical integration. How does this concept relate to supply chain management? Title: Assessment Question 13.71 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Hard


72) Define EDI and how it works. Title: Assessment Question 13.72 Learning Objective 1: LO 13.3 Define the terms electronic data interchange (EDI), extranet, and portal, and explain how each of these applications helps support supply chain management. Section Reference 1: 13.3 Information Technology Support for Supply Chain Management Difficulty: Medium

73) Describe the three main types of extranets. Title: Assessment Question 13.73 Learning Objective 1: LO 13.3 Define the terms electronic data interchange (EDI), extranet, and portal, and explain how each of these applications helps support supply chain management. Section Reference 1: 13.3 Information Technology Support for Supply Chain Management Difficulty: Medium

Question Type: True/False

74) Haya noticed that college students needed to dress up for presentations, but they never seemed to have any ties, or at least not very nice ones. She decided to set up a tie store on her campus and offer sports-themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and the student union. The supplier of Haya’s ties is downstream in her supply chain. Answer: False Title: Assessment Question 13.74 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains Difficulty: Medium

Question Type: Multiple Choice

75) Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Which of the following is true about Haya’s supply chain?


a) Haya’s supplier is downstream in her supply chain. b) Haya’s customers are upstream in her supply chain. c) If a customer returns a tie, that is known as reverse logistics. d) Haya has no information flows. e) Haya’s supplier is the only other link in her supply chain. Answer: c Title: Assessment Question 13.75 Learning Objective 1: LO 13.1 Define the term supply chain, and describe the three components and the three flows of a supply chain. Section Reference 1: 13.1 Supply Chains Difficulty: Hard

76) Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Haya orders 40 ties in each of the school colors and 10 in each of four sports. Which of the following is true about Haya’s supply chain? a) Haya is using a push model. b) Haya is using a pull model. c) Haya is experiencing the bullwhip effect. d) Haya has an accurate demand forecast. e) None of these statements are true. Answer: a Title: Assessment Question 13.76 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Hard

77) Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Haya orders 40 ties in each of the school colors and 10 in each of four sports. Which of the following is true about Haya’s supply chain?


a) Haya is using a just-in-time inventory system. b) Haya is using a vendor-managed inventory. c) Haya is building inventories. d) Haya has vertical integration with her upstream supplier. e) Haya is using a pull model. Answer: c Title: Assessment Question 13.77 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Hard

78) Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Haya knows she needs to manage her relationship with her supplier. Which of the following is true? a) Haya should invest in EDI software. b) Haya can use the supplier’s intranet to order. c) Haya should give the supplier access to her VPN. d) Haya can use the supplier’s procurement portal to order merchandise. e) Haya can use the supplier’s extranet to check on her order. Answer: e Title: Assessment Question 13.78 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Hard

79) Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Haya orders 40 ties in each of the school colors and 10 in each of four sports. She almost instantly sells out of all the sport-themed ties. She decides to approach each of the sports teams on campus to see if they would be willing to buy ties “in bulk.” Which of the following is true about Haya’s supply chain?


a) Haya is using a push model. b) Haya is using a pull model. c) Haya is experiencing the bull-whip effect. d) Haya has an accurate demand forecast. e) None of these statements are true. Answer: b Title: Assessment Question 13.79 Learning Objective 1: LO 13.2 Identify two major challenges in setting accurate inventory levels throughout the supply chain, and describe three popular strategies to solve supply chain problems. Section Reference 1: 13.2 Supply Chain Management Difficulty: Hard


Package Title: Assessment Questions Course Title: MIS 1e Chapter Number: 14

Question Type: True/False

1) Organizations typically move slowly to acquire new information technologies due to the risks involved) Answer: False Title: Assessment Question 14.01 Learning Objective 1: LO 14.0 Provide a real-world application related to acquiring an information system. Section Reference 1: Introduction Difficulty: Easy

2) The application portfolio in an organization is a set of recommended applications resulting from the planning and justification process in application development. Answer: True Title: Assessment Question 14.02 Learning Objective 1: LO 14.1 Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference 1: 14.1 Planning for and Justifying IT Applications Difficulty: Easy 3) The IT infrastructure delineates the way an organization’s information resources should be used to accomplish its mission. Answer: False Title: Assessment Question 14.03 Learning Objective 1: LO 14.1 Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference 1: 14.1 Planning for and Justifying IT Applications Difficulty: Easy

4) IT architecture focuses only on the technical aspects of information resources.


Answer: False Title: Assessment Question 14.04 Learning Objective 1: LO 14.1 Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference 1: 14.1 Planning for and Justifying IT Applications Difficulty: Medium

5) The IS operational plan is a set of projects that will be executed by the IS department and by functional area managers. Answer: True Title: Assessment Question 14.05 Learning Objective 1: LO 14.1 Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference 1: 14.1 Planning for and Justifying IT Applications Difficulty: Easy

6) Costs are harder to quantify than benefits. Answer: False Title: Assessment Question 14.06 Learning Objective 1: LO 14.1 Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference 1: 14.1 Planning for and Justifying IT Applications Difficulty: Easy

7) The return on investment (ROI) method of cost-benefit analysis measures the effectiveness of management in generating profits with its available assets. Answer: True Title: Assessment Question 14.07 Learning Objective 1: LO 14.1 Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference 1: 14.1 Planning for and Justifying IT Applications Difficulty: Easy

8) The buy option is particularly attractive if the software vendor allows the company to modify the package to meet its needs.


Answer: True Title: Assessment Question 14.08 Learning Objective 1: LO 14.2 Discuss the four business decisions that companies must make when they acquire new applications. Section Reference 1: 14.2 Strategies for Acquiring IT Applications Difficulty: Easy

9) Insourcing application development is usually less time consuming and less expensive than buying or leasing. Answer: False Title: Assessment Question 14.09 Learning Objective 1: LO 14.2 Discuss the four business decisions that companies must make when they acquire new applications. Section Reference 1: 14.2 Strategies for Acquiring IT Applications Difficulty: Easy

10) Software rental is a method of delivering software in which a vendor hosts the applications and customers use them over a network, typically the Internet. Answer: False Title: Assessment Question 14.10 Learning Objective 1: LO 14.1 Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference 1: 14.1 Planning for and Justifying IT Applications Difficulty: Easy

11) Open-source applications are basically the same as a proprietary application except for licensing, payment, and support. Answer: True Title: Assessment Question 14.11 Learning Objective 1: LO 14.1 Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference 1: 14.1 Planning for and Justifying IT Applications Difficulty: Medium


12) The earlier in the development process that errors are detected, the less expensive they are to correct. Answer: True Title: Assessment Question 14.12 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy

13) The SDLC is relatively inflexible. Answer: True Title: Assessment Question 14.13 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy

14) The SDLC encourages changes to user requirements once they have been established. Answer: False Title: Assessment Question 14.14 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy

15) Technical feasibility determines if the project is an acceptable financial risk and if the organization can afford the expense and time needed to complete the project. Answer: False Title: Assessment Question 14.15 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy


16) Systems analysis describes how a system will solve the business problem, and systems design describes what the system must do to accomplish the task. Answer: False Title: Assessment Question 14.16 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy

17) Adding functions after a project has been initiated is called scope creep. Answer: True Title: Assessment Question 14.17 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy

18) In a direct conversion, the new system is turned on, and the old system is turned off at a later time) Answer: False Title: Assessment Question 14.18 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy

19) Pilot conversion is the process in which the new system is introduced in one part of the organization. Answer: True Title: Assessment Question 14.19 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy


20) Systems maintenance includes debugging and updating a system. Answer: True Title: Assessment Question 14.20 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy

21) Maintenance ends when the new system is implemented and has run long enough for a systems audit. Answer: False Title: Assessment Question 14.21 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy

22) Prototyping allows the users to clarify their information requirements as they use the prototype. Answer: True Title: Assessment Question 14.22 Learning Objective 1: LO 14.4 Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference 1: 14.4 Alternative Methods and Tools for Systems Development Difficulty: Easy

23) Joint application design is used to collect user requirements. Answer: True Title: Assessment Question 14.23 Learning Objective 1: LO 14.4 Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool.


Section Reference 1: 14.4 Alternative Methods and Tools for Systems Development Difficulty: Easy

24) With agile development, a company develops only what it needs right now to be successful. Answer: True Title: Assessment Question 14.24 Learning Objective 1: LO 14.4 Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference 1: 14.4 Alternative Methods and Tools for Systems Development Difficulty: Medium

25) A key principle of the scrum approach for agile development is that users cannot change their minds during a project. Answer: False Title: Assessment Question 14.25 Learning Objective 1: LO 14.4 Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference 1: 14.4 Alternative Methods and Tools for Systems Development Difficulty: Easy

26) Object-oriented development focuses on properties and operations. Answer: True Title: Assessment Question 14.26 Learning Objective 1: LO 14.4 Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference 1: 14.4 Alternative Methods and Tools for Systems Development Difficulty: Medium

27) Outsourcing is the use of outside contractors or external organizations to acquire IT services. Answer: True Title: Assessment Question 14.27


Learning Objective 1: LO 14.5 Analyze the process of vendor and soft ware selection. Section Reference 1: 14.5 Vendor and Software Selection Difficulty: Easy

28) The most difficult task in evaluating a vendor and a software package is to determine the vendor’s financial health and “staying power.” Answer: False Title: Assessment Question 14.28 Learning Objective 1: LO 14.5 Analyze the process of vendor and soft ware selection. Section Reference 1: 14.5 Vendor and Software Selection Difficulty: Medium

29) A request for proposal (RFP) is sent to potential customers. Answer: False Title: Assessment Question 14.29 Learning Objective 1: LO 14.5 Analyze the process of vendor and soft ware selection. Section Reference 1: 14.5 Vendor and Software Selection Difficulty: Easy

30) A service-level agreement (SLa) outlines how work is divided between the company and its vendors. Answer: True Title: Assessment Question 14.30 Learning Objective 1: LO 14.5 Analyze the process of vendor and soft ware selection. Section Reference 1: 14.5 Vendor and Software Selection Difficulty: Medium

Question Type: Multiple Choice

31) The information systems planning process proceeds in which order? a) Organization mission – organization strategic plan – IS strategic plan – new IT architecture b) Organization mission – IS strategic plan – organization strategic plan – IS operational plan b) Organization strategic plan – organization mission – IS strategic plan – new IT architecture d) IT architecture – IS strategic plan – organization strategic plan – organization mission


e) IS development projects – IS operational plan – new IT architecture – organization mission Answer: a Title: Assessment Question 14.31 Learning Objective 1: LO 14.1 Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference 1: 14.1 Planning for and Justifying IT Applications Difficulty: Medium

32) Which of the following is not a part of the typical IS operational plan? a) The mission of the IS function b) The organizational mission c) The IT architecture d) The application portfolio e) The IS function’s estimate of its goals Answer: b Title: Assessment Question 14.32 Learning Objective 1: LO 14.1 Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference 1: 14.1 Planning for and Justifying IT Applications Difficulty: Easy

33) Evaluating the benefits of IT projects is more complex than evaluating their costs for all of the following reasons except: a) Benefits are harder than costs to quantify. b) Benefits tend to be more tangible than costs. c) IT can be used for several different purposes. d) The probability of obtaining a return from an IT investment is based on the probability of implementation success. e) The proposed system may be “cutting edge.” Answer: b Title: Assessment Question 14.33 Learning Objective 1: LO 14.1 Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference 1: 14.1 Planning for and Justifying IT Applications Difficulty: Medium


34) A company’s IT application portfolio is a) A list of existing application the company owns. b) A list of applications that need to be updated. c) A list of applications that need to be removed. d) A list of applications that need to be replaced. e) A list of application to be added or modified. Answer: e Title: Assessment Question 14.34 Learning Objective 1: LO 14.1 Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference 1: 14.1 Planning for and Justifying IT Applications Difficulty: Easy 35) A company’s IT architecture includes all of the following except: a) Hardware and software b) Networks c) Database management systems d) The members of the IT staff e) How IT decisions will be made Answer: d Title: Assessment Question 14.35 Learning Objective 1: LO 14.1 Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference 1: 14.1 Planning for and Justifying IT Applications Difficulty: Easy

36) Which of the following statements about determining the costs and benefits of IT investments is false? a) Some costs are fixed. b) Costs do not end when the system is installed. c) Many IT projects end up being over budget. d) Benefits are hard to quantify because implementing new technology could be used for multiple purposes. e) Benefits are hard to quantify because they are tangible) Answer: e


Title: Assessment Question 14.36 Learning Objective 1: LO 14.1 Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference 1: 14.1 Planning for and Justifying IT Applications Difficulty: Medium

37) Which of the following is not an advantage of the buy option for acquiring IS applications? a) Few types of off-the-shelf software are available, thus limiting confusion. b) The software can be tried out. c) The buy option saves time. d) The company will know what it is getting. e) All of these Answer: a Title: Assessment Question 14.37 Learning Objective 1: LO 14.2 Discuss the four business decisions that companies must make when they acquire new applications. Section Reference 1: 14.2 Strategies for Acquiring IT Applications Difficulty: Easy

38) Which of the following are disadvantages of the buy option for acquiring IS applications? a) The software may not exactly meet the company’s needs. b) The software may be impossible to modify. c) The company will not have control over software improvements. d) The software may not integrate with existing systems. e) All of these Answer: e Title: Assessment Question 14.38 Learning Objective 1: LO 14.2 Discuss the four business decisions that companies must make when they acquire new applications. Section Reference 1: 14.2 Strategies for Acquiring IT Applications Difficulty: Easy 39) Which of the following systems acquisition methods saves the company’s time, enables the company to select software that has been used for similar problems in other organizations, and allows the company to try out the software? a) Systems development life cycle


b) Prototyping c) End-user development d) Buy option e) Object-oriented development Answer: d Title: Assessment Question 14.39 Learning Objective 1: LO 14.2 Discuss the four business decisions that companies must make when they acquire new applications. Section Reference 1: 14.2 Strategies for Acquiring IT Applications Difficulty: Easy 40) Which of the following systems acquisition methods can result in a company’s acquiring software that is controlled by another company, may be difficult to enhance or modify, and may not support the desired business processes? a) Systems development life cycle b) Prototyping c) End-user development d) Buy option e) Component-based development Answer: d Title: Assessment Question 14.40 Learning Objective 1: LO 14.2 Discuss the four business decisions that companies must make when they acquire new applications. Section Reference 1: 14.2 Strategies for Acquiring IT Applications Difficulty: Easy

41) Which of the following systems acquisition methods requires staff to systematically go through every step in the development process and has a lower probability of missing important user requirements? a) Systems development life cycle b) Prototyping c) End-user development d) External acquisition e) Object-oriented development Answer: a Title: Assessment Question 14.41


Learning Objective 1: LO 14.2 Discuss the four business decisions that companies must make when they acquire new applications. Section Reference 1: 14.2 Strategies for Acquiring IT Applications Difficulty: Easy

42) Which of the following systems acquisition methods is time consuming, costly, and may produce excessive documentation? a) Systems development life cycle b) Prototyping c) End-user development d) External acquisition e) Object-oriented development Answer: a Title: Assessment Question 14.42 Learning Objective 1: LO 14.2 Discuss the four business decisions that companies must make when they acquire new applications. Section Reference 1: 14.2 Strategies for Acquiring IT Applications Difficulty: Easy

43) _____ is a method of delivering software in which a vendor hosts the applications and customers access these applications over the Internet. a) Software-as-a-Service b) Prototyping c) Leasing the application d) Service-oriented architecture e) The buy option Answer: a Title: Assessment Question 14.43 Learning Objective 1: LO 14.2 Discuss the four business decisions that companies must make when they acquire new applications. Section Reference 1: 14.2 Strategies for Acquiring IT Applications Difficulty: Easy

44) Which of the following statements is false? a) Companies that use Software-as-a-Service are running applications on the vendor’s hardware. b) Application service providers are similar to Software-as-a-Service providers.


c) Companies that purchase open-source software cannot modify it. d) Outsourcing refers to acquiring IT applications from outside contractors. e) Insourcing refers to building IT applications in-house. Answer: c Title: Assessment Question 14.44 Learning Objective 1: LO 14.2 Discuss the four business decisions that companies must make when they acquire new applications. Section Reference 1: 14.2 Strategies for Acquiring IT Applications Difficulty: Medium

45) Place the stages of the systems development life cycle in order: a) Investigation – analysis – design – programming/testing – implementation – operation/maintenance b) Investigation – design – analysis – programming/testing – implementation – operation/maintenance c) Analysis – design – investigation – operation/maintenance – programming/testing – implementation d) Investigation – analysis – design – programming/testing – operation/maintenance – implementation e) Investigation – implementation – analysis – programming/testing – design – operation/maintenance Answer: a Title: Assessment Question 14.45 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy

46) The _____ that changes are made in the systems development life cycle, the _____ expensive these changes become) a) Sooner, less b) Later, less c) More frequently, more d) More extensively, more e) Sooner, more Answer: a


Title: Assessment Question 14.46 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Medium

47) _____ feasibility determines if the project is an acceptable financial risk and if the organization can afford the expense and time needed to complete the project. a) Technical b) Economic c) Organizational d) Behavioral e) Time Answer: b Title: Assessment Question 14.47 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy

48) _____ feasibility addresses the human issues of an information systems project. a) Technical b) Economic c) Organizational d) Behavioral e) Time Answer: d Title: Assessment Question 14.48 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy 49) _____ feasibility concerns a firm’s policies and politics, power structures, and business relationships. a) Technical


b) Economic c) Organizational d) Behavioral e) Time Answer: c Title: Assessment Question 14.49 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy

50) Which of the following is not a part of systems analysis? a) Defining the business problem b) Identifying the causes of, and solutions to, the business problem c) Identifying the information requirements that the solution must satisfy d) Identifying the technical specifications of the solution e) Gathering information about the existing system Answer: d Title: Assessment Question 14.50 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy

51) In the traditional systems development life cycle, users: a) Are important and ongoing members of the development team throughout the life of the project. b) Are important only in the testing phases of the project. c) Have no input. d) Are important only in the maintenance phase of the project. e) Provide information requirements. Answer: e Title: Assessment Question 14.51 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle


Difficulty: Medium

52) The deliverable of the systems design stage is: a) User requirements. b) Technical system specifications. c) The prototype. d) The source code. e) A working application. Answer: b Title: Assessment Question 14.52 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy

53) Systems design answers the question, _____: a) How will the information system resolve the business problem? b) How much will the information system cost? c) What is the problem the information system must address? d) Who will benefit from use of the information system being developed? e) What is the effective operational life of the system? Answer: a Title: Assessment Question 14.53 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Medium

54) When users ask for added functionality during a systems development project, this is called: a) User-defined software. b) Scope creep. c) Bloatware. d) An out-of-control project. e) A runaway project. Answer: b


Title: Assessment Question 14.54 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy

55) Which of the following statements about scope creep is true? a) Scope creep is relatively cheap, regardless of when it occurs in a project. b) Because scope creep is relatively cheap, successful project managers allow it. c) Because scope creep is expensive, successful project managers will not allow it. d) Because scope creep is expensive, successful project managers limit it. e) Scope creep means that user requirements are being successfully taken care of. Answer: d Title: Assessment Question 14.55 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Medium

56) In the _____ stage of the systems development life cycle, the design specifications are translated into computer code. a) Systems analysis b) Programming c) Systems design d) Prototyping e) Feasibility study Answer: b Title: Assessment Question 14.56 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy

57) ________ conversion is the riskiest type of conversion process. a) Parallel b) Direct


c) Pilot d) Phased e) They all have equal risk. Answer: b Title: Assessment Question 14.57 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy

58) A firm shuts down its old COBOL legacy system and immediately starts up its new PeopleSoft ERP system. This process is called __________ conversion. a) Phased b) Direct c) Parallel d) Pilot e) Timely Answer: b Title: Assessment Question 14.58 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy

59) A firm implements a new information system in one of its plants, assesses the new system’s performance, and then implements the new system in its other plants. This is an example of __________ conversion. a) Phased b) Direct c) Parallel d) Pilot e) Timely Answer: d Title: Assessment Question 14.59


Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy

60) As systems age, maintenance costs _____. a) Decrease b) Increase c) Remain the same d) Are negligible e) Are not considered Answer: b Title: Assessment Question 14.60 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Easy

61) Which of the following systems acquisition methods helps clarify user requirements, promotes genuine user participation, and may produce part of the final system? a) Systems development life cycle b) Prototyping c) End-user development d) External acquisition e) Component-based development Answer: b Title: Assessment Question 14.61 Learning Objective 1: LO 14.4 Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference 1: 14.4 Alternative Methods and Tools for Systems Development Difficulty: Easy

62) Which of the following systems acquisition methods may encourage inadequate problem analysis, is not practical with large numbers of users, and may result in a company’s purchasing a lower-quality system?


a) Systems development life cycle b) Prototyping c) End-user development d) External acquisition e) Component-based development Answer: b Title: Assessment Question 14.62 Learning Objective 1: LO 14.4 Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference 1: 14.4 Alternative Methods and Tools for Systems Development Difficulty: Easy

63) When systems are created rapidly, without a formal development methodology: a) End users can take over the work of MIS analysts. b) The organization quickly outgrows the new system. c) Hardware, software, and quality standards are less important. d) Testing and documentation may be inadequate. e) The organization saves money. Answer: d Title: Assessment Question 14.63 Learning Objective 1: LO 14.4 Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference 1: 14.4 Alternative Methods and Tools for Systems Development Difficulty: Medium

64) As an MIS analyst, you have decided to use a prototyping methodology for a small, Webbased design project. What is the order of steps that you will follow in the project? a) Develop the prototype; use the prototype; revise and enhance the prototype. b) Identify user requirements; develop the prototype; use the prototype; revise and enhance the prototype. c) Develop the prototype; identify user requirements; use the prototype; revise and enhance the prototype. d) Identify user requirements; develop solutions; select the best prototype; implement the prototype. e) Identify user requirements; develop the prototype; revise and enhance the prototype.


Answer: b Title: Assessment Question 14.64 Learning Objective 1: LO 14.4 Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference 1: 14.4 Alternative Methods and Tools for Systems Development Difficulty: Medium

65) The _____ approach to systems development is a group-based tool for collecting user requirements. a) Integrated computer-assisted software engineering b) Joint application design c) Rapid application development d) Prototyping e) Systems development life cycle Answer: b Title: Assessment Question 14.65 Learning Objective 1: LO 14.4 Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference 1: 14.4 Alternative Methods and Tools for Systems Development Difficulty: Easy

66) Which of the following is not an advantage of the joint application design approach to systems development? a) It involves fewer users in the development process. b) It saves time. c) It results in greater user acceptance of the new system. d) It can produce a higher-quality system. e) It provides for greater user participation in the definition of the requirements. Answer: a Title: Assessment Question 14.66 Learning Objective 1: LO 14.4 Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference 1: 14.4 Alternative Methods and Tools for Systems Development Difficulty: Easy


67) Agile development a) Takes a long time. b) Requires little user input. c) Delivers functionality in rapid interactions. d) Focuses on all required functionality at each step of the way. e) Uses the scrum approach to design the system. Answer: c Title: Assessment Question 14.67 Learning Objective 1: LO 14.4 Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference 1: 14.4 Alternative Methods and Tools for Systems Development Difficulty: Medium

68) _____ is a software development methodology that delivers functionality in rapid iterations, usually measured in weeks. a) Agile development b) Prototyping c) The systems development life cycle d) Joint application development e) Component-based development Answer: a Title: Assessment Question 14.68 Learning Objective 1: LO 14.4 Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference 1: 14.4 Alternative Methods and Tools for Systems Development Difficulty: Easy

69) Object-oriented development a) Is similar to traditional development approaches. b) Focuses on the original task to be handled. c) Focuses on the processes that must be modeled to perform that task. d) Focuses on data. e) Identifies the subjects of the new system.


Answer: c Title: Assessment Question 14.69 Learning Objective 1: LO 14.4 Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference 1: 14.4 Alternative Methods and Tools for Systems Development Difficulty: Easy

70) Which of the following systems acquisition methods may eventually require maintenance assistance from the IT department, can produce inadequate documentation, and might result in a company’s acquiring a system with inadequate interfaces to existing systems? a) Systems development life cycle b) Prototyping c) End-user development d) External acquisition e) Component-based development Answer: c Title: Assessment Question 14.70 Learning Objective 1: LO 14.4 Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference 1: 14.4 Alternative Methods and Tools for Systems Development Difficulty: Easy

71) Which of the following is the most difficult and crucial task in evaluating a vendor and a software package? a) Identifying potential vendors b) Determining the evaluation criteria c) Evaluating vendors and packages d) Choosing the vendor and package e) Negotiating a contract Answer: b Title: Assessment Question 14.71 Learning Objective 1: LO 14.5 Analyze the process of vendor and soft ware selection. Section Reference 1: 14.5 Vendor and Software Selection Difficulty: Medium


72) A _____ is sent to potential vendors inviting them to describe their product and how it would meet the firm’s needs. a) Prototype b) Request for proposal c) Technical specification d) Request for bid e) Request for requirements Answer: b Title: Assessment Question 14.72 Learning Objective 1: LO 14.5 Analyze the process of vendor and soft ware selection. Section Reference 1: 14.5 Vendor and Software Selection Difficulty: Easy

73) _____ specify how work is to be divided between the company and its vendors. a) Service-level agreements b) Prototypes c) User requirements d) Vendor requirements e) Feasibility studies Answer: a Title: Assessment Question 14.73 Learning Objective 1: LO 14.5 Analyze the process of vendor and soft ware selection. Section Reference 1: 14.5 Vendor and Software Selection Difficulty: Easy

74) Refer to Opening Case -- Anniston Orthopaedics and Greenway Medical Technologies: Assuming that a contract can be reached and Anniston decides to install Greenway’s software, which is the best implementation approach? a) Pilot b) Piecemeal c) Direct d) Parallel e) Any one of these will be fine. Answer: d


Title: Assessment Question 14.74 Learning Objective 1: LO 14.0 Provide a real-world application related to acquiring an information system. Section Reference 1: Opening Case: Anniston Orthopaedics and Greenway Medical Technologies Difficulty: Medium 75) Refer to IT’s About Business 14.1 – A Disastrous Development Project: Marin County hiring Deloitte Consulting to work with them on the implementation of the new SAP system is called ____________. a) In-sourcing b) Out-sourcing c) Off-shoring d) Hiring part-time employees e) SaaS Answer: b Title: Assessment Question 14.75 Learning Objective 1: LO 14.2 Discuss the four business decisions that companies must make when they acquire new applications. Section Reference 1: IT’s About Business 14.1 Difficulty: Medium 76) Refer IT’s About Business 14.2 – State of Virginia’s Outsourcing Contract: Which of the following is false about the contract the State of Virginia signed with Northrop? a) Virginia outsourced its entire IT function to Northrop b) Northrop was to deploy new applications to improve services to Virginia residents c) The implementation was done using the direct approach d) Many of the problems cited were network and telephone problems. e) Virginia did not provide very strong oversight of Northrop. Answer: c Title: Assessment Question 14.76 Learning Objective 1: LO 14.2 Discuss the four business decisions that companies must make when they acquire new applications. Section Reference 1: IT’s About Business 14.2 Difficulty: Medium


77) Refer to Closing Case #1 – GE Healthcare Switches from Waterfall to Agile: Which of the following is not true about GE Healthcare’s Imaging Solutions’s experience with agile development? a) Imaging Solution started with a cross-functional team and a pilot project. b) Because the operate in a regulated industry they needed to do more initial planning and testing than thought c) They needed to identity cross-team dependencies early in the process. d) The development teams stayed independent. e) Imaging Solutions had to transform its culture. Answer: d Title: Assessment Question 14.77 Learning Objective 1: LO 14.6 Summarize the fundamental concepts and skills related to acquiring information systems and applications. Section Reference 1: Closing Case 1: GE Healthcare Switches from Waterfall to Agile Difficulty: Medium 78) Refer to Closing Case #2 – A tale of Two Software Upgrades: Both JetBlue and WestJet used which implementation approach when they implemented Sabre Holding’s reservation software? a) Pilot b) Piecemeal c) Direct d) Parallel e) Planned Answer: c Title: Assessment Question 14.78 Learning Objective 1: LO 14.6 Summarize the fundamental concepts and skills related to acquiring information systems and applications. Section Reference 1: Closing Case 2: A Tale of Two Software Upgrades Difficulty: Medium

Question Type: Essay

79) Differentiate between the IT strategic plan and the IS operational plan. Title: Assessment Question 14.79


Learning Objective 1: LO 14.1 Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference 1: 14.1 Planning for and Justifying IT Applications Difficulty: Medium

80) Contrast the tangible and intangible benefits of a proposed information system. Title: Assessment Question 14.80 Learning Objective 1: LO 14.1 Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference 1: 14.1 Planning for and Justifying IT Applications Difficulty: Medium

81) Why is it so hard to justify an information system? Title: Assessment Question 14.81 Learning Objective 1: LO 14.1 Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Section Reference 1: 14.1 Planning for and Justifying IT Applications Difficulty: Medium

82) Describe the feasibility study of the SDLC, and discuss why this study is so important. Title: Assessment Question 14.82 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Medium

83) What are the outputs from each of the six steps in the SDLC? Title: Assessment Question 14.83 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Medium

84) Contrast agile development and the SDLC. Title: Assessment Question 14.84


Learning Objective 1: LO 14.4 Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference 1: 14.4 Alternative Methods and Tools for Systems Development Difficulty: Medium

85) Contrast component-based development and the SDLC. Title: Assessment Question 14.85 Learning Objective 1: LO 14.4 Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference 1: 14.4 Alternative Methods and Tools for Systems Development Difficulty: Medium

86) Compare and contrast the various strategies for acquiring IT applications. Title: Assessment Question 14.86 Learning Objective 1: LO 14.2 Discuss the four business decisions that companies must make when they acquire new applications. Section Reference 1: 14.2 Strategies for Acquiring IT Applications Difficulty: Hard

87) Compare and contrast rapid application development and joint application design. Title: Assessment Question 14.87 Learning Objective 1: LO 14.4 Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Section Reference 1: 14.4 Alternative Methods and Tools for Systems Development Difficulty: Medium

88) What are application service providers, and how does using ASPs differ from outsourcing? Title: Assessment Question 14.88 Learning Objective 1: LO 14.5 Analyze the process of vendor and soft ware selection. Section Reference 1: 14.5 Vendor and Software Selection Difficulty: Medium

89) How do application service providers differ from Software-as-a-Service vendors?


Title: Assessment Question 14.89 Learning Objective 1: LO 14.5 Analyze the process of vendor and soft ware selection. Section Reference 1: 14.5 Vendor and Software Selection Difficulty: Medium

90) Describe the vendor selection process for an information system. Title: Assessment Question 14.90 Learning Objective 1: LO 14.5 Analyze the process of vendor and soft ware selection. Section Reference 1: 14.5 Vendor and Software Selection Difficulty: Medium

Question Type: Multiple Choice

91) Jennifer is the owner of a start-up boutique that specializes in hard-to-find dress sizes for women. She has been keeping her financial books by using Excel and by hand) She thinks it’s time to buy an accounting package) What question does she need to answer first? a) How will the accounting package resolve my business problem? b) How much will the accounting package cost? c) What is the problem the accounting package must address? d) Who will benefit from the use of the accounting package? e) What is the effective operational life of the accounting package? Answer: c Title: Assessment Question 14.91 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Medium

92) Jennifer is the owner of a start-up boutique that specializes in hard-to-find dress sizes for women. She has been keeping her financial books by using Excel and by hand) She researched available accounting packages for a business like hers and has decided on Boutique Accounting. What is the best way for Jennifer to implement Boutique Accounting? a) Pilot b) Piecemeal c) Direct d) Parallel e) Any one of these will be fine.


Answer: c Title: Assessment Question 14.92 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Medium

93) Anna works in the sales organization of a mid-size company. The company is evaluating whether it should replace its existing sales support system. At what stage of the SDLC should Anna expect to participate? a) Systems analysis b) Programming c) Systems design d) Prototyping e) Feasibility study Answer: a Title: Assessment Question 14.93 Learning Objective 1: LO 14.3 Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Section Reference 1: 14.3 The Traditional Systems Development Life Cycle Difficulty: Medium

94) Ryan works for a small consulting company. They want to do a better job of tracking their clients and the jobs they have bid on and either won or lost. There are no processes in place right now, and all users (consultants and managers) have different ideas. What is the best systems development approach for Ryan’s company? a) SDLC b) Prototyping c) JAD d) Buy option e) Object-oriented development Answer: c Title: Assessment Question 14.94 Learning Objective 1: LO 14.4 Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool.


Section Reference 1: 14.4 Alternative Methods and Tools for Systems Development Difficulty: Medium

95) Anna works in the sales organization of a mid-size company. The company decided to purchase Sales SME that is offered as a SaaS. What would you expect to see in a SLA with the vendors? a) Price of the software b) Upgrade prices for the software c) Whether the software can be changed by Anna’s company d) Availability guarantees e) Bug reporting process Answer: D Title: Assessment Question 14.95 Learning Objective 1: LO 14.2 Discuss the four business decisions that companies must make when they acquire new applications. Section Reference 1: 14.2 Strategies for Acquiring IT Applications Difficulty: Medium


Package Title: Assessment Questions Course Title: MIS 1e Chapter Number: Plug IT In 1

Question Type: True/False

1) A business process has inputs and outputs Answer: True Title: Assessment Question PI1.01 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Easy

2) The activities of a business process can be measured Answer: True Title: Assessment Question PI1.02 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Easy

3) Business processes can be completed either within a single functional area or across multiple functions. Answer: True Title: Assessment Question PI1.03 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Easy

4) In a cross-functional process, one functional area is responsible for its execution.


Answer: False Title: Assessment Question PI1.04 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Easy

5) The procurement process includes the sales area. Answer: False Title: Assessment Question PI1.05 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Medium 6) An organization’s business processes can create a competitive advantage. Answer: True Title: Assessment Question PI1.06 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Medium

7) A business process always includes information systems. Answer: False Title: Assessment Question PI1.07 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Medium


8) BPR is a strategy for improving the efficiency of an organization’s data collection. Answer: False Title: Assessment Question PI1.08 Learning Objective 1: LO PI1.2 Differentiate between the terms, business process reengineering and business process management. Section Reference 1: PI1.2 Business Process Reengineering and Business Process Management Difficulty: Medium

9) BPM is an implementation of BPR. Answer: False Title: Assessment Question PI1.09 Learning Objective 1: LO PI1.2 Differentiate between the terms, business process reengineering and business process management. Section Reference 1: PI1.2 Business Process Reengineering and Business Process Management Difficulty: Hard 10) BPM can improve an organization’s flexibility. Answer: True Title: Assessment Question PI1.10 Learning Objective 1: LO PI1.2 Differentiate between the terms, business process reengineering and business process management. Section Reference 1: PI1.2 Business Process Reengineering and Business Process Management Difficulty: Medium

Question Type: Multiple Choice

11) Which of the following statements concerning business processes is false? a) A process has inputs. b) A process has outputs. c) A process has activities that can be measured. d) A process creates value. e) A process cannot cross functional area boundaries. Answer: e


Title: Assessment Question PI1.11 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Easy

12) Applying copyrights and trademarks is an example of a(n): a) Accounting Business Process b) Finance Business Process c) Marketing Business Process d) Production Business Process e) Management Information Systems Business Process Answer: c Title: Assessment Question PI1.12 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Medium

13) Reconciling bank accounts is an example of a(n): a) Accounting Business Process b) Finance Business Process c) Marketing Business Process d) Production Business Process e) Management Information Systems Business Process Answer: a Title: Assessment Question PI1.13 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Easy

14) Managing account collections is an example of a(n):


a) Accounting Business Process b) Finance Business Process c) Marketing Business Process d) Production Business Process e) Management Information Systems Business Process Answer: b Title: Assessment Question PI1.14 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Medium

15) Collecting sales tax is an example of a(n): a) Accounting Business Process b) Finance Business Process c) Marketing Business Process d) Production Business Process e) Management Information Systems Business Processes Answer: c Title: Assessment Question PI1.15 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Medium

16) Managing purchasing is an example of a(n): a) Accounting Business Process b) Finance Business Process c) Marketing Business Process d) Production Business Process e) Management Information Systems Business Processes Answer: d Title: Assessment Question PI1.16


Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Medium

17) Managing pay and payroll is an example of a(n): a) Accounting Business Process b) Finance Business Process c) Marketing Business Process d) Human Resources Business Process e) Management Information Systems Business Processes Answer: d Title: Assessment Question PI1.17 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Easy

18) Which of the following processes involves the warehouse, purchasing, and accounting functional areas? a) Procurement b) Fulfillment c) Order entry d) Accounts receivable e) Payroll Answer: a Title: Assessment Question PI1.18 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Easy

19) Which of the following processes involves the warehouse, sales, and accounting functional areas?


a) Procurement b) Fulfillment c) Order entry d) Accounts receivable e) Payroll Answer: b Title: Assessment Question PI1.19 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Easy

20) Information processes perform all of the following roles in business processes except a) Setting standards b) Executing the process c) Capturing and storing process data d) Monitoring process performance e) Detecting problems with the process. Answer: a Title: Assessment Question PI1.20 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Medium

21) For many organizations, business process reengineering a) Is easy to implement b) Is not disruptive to implement c) Has little impact on the organization’s facilities d) Is inexpensive e) Has a major impact on the corporate culture. Answer: e Title: Assessment Question PI1.21


Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Medium

22) Which of the following statements is false? a) BPM is a task-oriented approach. b) BPM can help companies reduce costs. c) BPM can help companies increase revenue. d) BPM can improve customer satisfaction. e) BPM can improve organizational flexibility. Answer: a Title: Assessment Question PI1.22 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Medium

23) Which of the following statements is false? a) BPM begins with process modeling. b) Process modeling is a graphical depiction of all the steps in a process. c) BPM uses Web-enabled technologies for user interfaces. d) Business activity monitoring is used to measure and manage business processes. e) Business activity monitoring is a type of scheduled reporting. Answer: e Title: Assessment Question PI1.23 Learning Objective 1: LO PI1.2 Differentiate between the terms, business process reengineering and business process management. Section Reference 1: PI1.2 Business Process Reengineering and Business Process Management Difficulty: Medium

Question Type: Essay

24) What is a business process?


Title: Assessment Question PI1.24 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Easy

25) What is unique about cross-functional business processes? Title: Assessment Question PI1.25 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Medium

26) Explain the procurement process.

Title: Assessment Question PI1.26 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Medium

27) Explain the fulfillment process. Title: Assessment Question PI1.27 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Medium

28) What is business process reengineering? Title: Assessment Question PI1.28 Learning Objective 1: LO PI1.2 Differentiate between the terms, business process reengineering and business process management. Section Reference 1: PI1.2 Business Process Reengineering and Business Process Management


Difficulty: Easy

29) What is business process management? Title: Assessment Question PI1.29 Learning Objective 1: LO PI1.2 Differentiate between the terms, business process reengineering and business process management. Section Reference 1: PI1.2 Business Process Reengineering and Business Process Management Difficulty: Easy

30) Identify and discuss the three components of business process management. Title: Assessment Question PI1.30 Learning Objective 1: LO PI1.2 Differentiate between the terms, business process reengineering and business process management. Section Reference 1: PI1.2 Business Process Reengineering and Business Process Management Difficulty: Medium

31) Explain the three roles that information systems play in business processes: execute the process, capture and store process data, and monitor process performance. Title: Assessment Question PI1.31 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Medium.

32) How can organizations use an information system to detect problems with a process? Title: Assessment Question PI1.32 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Medium

33) Compare and contrast business process reengineering and business process management. Title: Assessment Question PI1.33


Learning Objective 1: LO PI1.2 Differentiate between the terms, business process reengineering and business process management. Section Reference 1: PI1.2 Business Process Reengineering and Business Process Management Difficulty: Hard

Question Type: Multiple Choice

34) Hyo runs an ice cream store with her family. Which of the following activities is a component of their procurement process? a) Recording their daily sales revenue b) Sending an order to their sugar supplier c) Making the ice cream d) Setting up an employee schedule e) Generating an invoice for their supplier Answer: b Title: Assessment Question PI1.34 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Medium

35) Hyo runs an ice cream store with her family. Which of the following activities is not a component of their procurement process? a) Send an order to a supplier b) Decide what to order c) Record daily sales revenue d) Record goods received e) Send a check to a supplier Answer: c Title: Assessment Question PI1.35 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Medium


36) Hyo runs an ice cream store with her family. Which of the following activities is a component of their fulfillment process? a) Receiving goods from their supplier b) Making ice cream c) Recording daily sales revenue d) Recording goods received e) Making a custom-order ice cream cake Answer: e Title: Assessment Question PI1.36 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Medium

37) Hyo runs an ice cream store with her family. Which of the following is not a component of their fulfillment process? a) Sending an order to their supplier b) Taking an order for a custom-made ice cream cake c) Obtaining the ingredients for a custom-made ice cream cake d) Scheduling the production of ice cream e) Collecting payment for a custom-made ice cream cake Answer: a Title: Assessment Question PI1.37 Learning Objective 1: LO PI1.1 Understand what business processes are and give examples of business processes in the functional areas of an organization, and cross-functional business processes. Section Reference 1: PI1.1 Business Processes Difficulty: Medium


Package Title: Assessment Questions Course Title: MIS 1e Chapter Number: Plug IT In 2

Question Type: True/False

1) Computer technologies become obsolete faster than other technologies in the organization. Answer: True Title: Assessment Question PI2.01 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

2) A mainframe is a type of server. Answer: False Title: Assessment Question PI2.02 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Medium 3) A thin-client system is a desktop computer that doesn’t have locally installed software. Answer: True Title: Assessment Question PI2.03 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

4) Laptop, notebook, and netbook computers cost more than desktops because of their portability. Answer: True


Title: Assessment Question PI2.04 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

5) Each generation of computer hardware has exhibited increased processing power and decreased costs. Answer: True Title: Assessment Question PI2.05 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

6) Minicomputers are relatively small, inexpensive computers that perform the same functions as mainframe computers, but to a limited extent. Answer: True Title: Assessment Question PI2.06 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

7) The mouse is the most common input device. Answer: False Title: Assessment Question PI2.07 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

8) Source data automation uses various technologies to input data with minimal human intervention. Answer: True


Title: Assessment Question PI2.08 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

9) Microcontrollers are computer chips that are embedded in products and technologies of various types and sizes. Answer: False Title: Assessment Question PI2.09 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

10) Computers can run any type of program regardless of the amount and type of memory that the computer has. Answer: False Title: Assessment Question PI2.10 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

11) A byte represents a particular alphanumeric character or simple mathematical operation. Answer: True Title: Assessment Question PI2.11 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

12) Primary storage is the main memory of a computer, in which small amounts of data that will be used immediately are stored.


Answer: True Title: Assessment Question PI2.12 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

13) Random access memory is that part of primary storage that holds a software program (or portion of it) and small amounts of data when they are brought from secondary storage. Answer: True Title: Assessment Question PI2.13 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

14) If your computer loses its power supply, you will lose the contents of your random access memory, because it is volatile. Answer: True Title: Assessment Question PI2.14 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

15) Sequential access is a type of data access most associated with magnetic disks. Answer: False Title: Assessment Question PI2.15 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

16) Digital video disks (DVDs) have higher storage capacities than CD-ROMs.


Answer: True Title: Assessment Question PI2.16 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

17) The cost per megabyte of storage is greater for traditional hard disk storage than for PC memory cards. Answer: False Title: Assessment Question PI2.17 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

18) Software is typically quite complex. Answer: True Title: Assessment Question PI2.18 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy

19) As hardware costs have decreased over the past twenty years, software costs have also decreased. Answer: False Title: Assessment Question PI2.19 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy


20) Software consists of computer programs, which are sequences of instructions for the computer. Answer: True Title: Assessment Question PI2.20 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy

21) Computer hardware and software are designed to be general purpose. Answer: False Title: Assessment Question PI2.21 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy

22) Application software cannot be run on computer hardware without systems software. Answer: True Title: Assessment Question PI2.22 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy

23) Computer code is generally efficient, well designed, and contains very few errors. Answer: False Title: Assessment Question PI2.23 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software


Difficulty: Easy

24) Companies who develop software for sale license that software for use to protect their product from being copied and distributed illegally. Answer: True Title: Assessment Question PI2.24 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy 25) Open systems refers to a model of computer products – hardware, operating systems, and application software – that allow any computing device to be seamlessly connected to and interact with any other computing device. Answer: True Title: Assessment Question PI2.25 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy

26) The operating system supervises the overall operation of the computer. Answer: True Title: Assessment Question PI2.26 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy

27) The user interface is the most sophisticated on enterprise operating systems and the least sophisticated on desktop operating systems. Answer: False


Title: Assessment Question PI2.27 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy

28) Packaged application software addresses a specific or unique business need for a company. Answer: True Title: Assessment Question PI2.28 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy

29) Off-the-shelf application software consists of specific software programs developed for a particular company by a software vendor. Answer: False Title: Assessment Question PI2.29 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy

30) Personal application software consists of widely used packages such as word processing, spreadsheet, communications, and graphics software. Answer: True Title: Assessment Question PI2.30 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy


31) A haptic interface is one that allows the user to feel a sense of touch. Answer: True Title: Assessment Question PI2.31 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy

Question Type: Multiple Choice

32) Which of the following does not affect decisions about hardware? a) power b) appropriateness for the task c) size d) cost e) speed Answer: c Title: Assessment Question PI2.32 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

33) To model the weather or simulate nuclear weapons testing, you would most likely use a(n): a) mainframe computer b) workstation c) supercomputer d) personal computer e) active badge Answer: c Title: Assessment Question PI2.33 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment.


Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

34) An example of a computer system designed to accommodate multiple users simultaneously is a _____. a) microcomputer b) mainframe c) laptop d) palmtop e) wearable computer Answer: b Title: Assessment Question PI2.34 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

35) A _____ is used in large enterprises for extensive computing applications that are accessed by thousands of concurrent users. a) supercomputer b) mainframe c) midrange computer d) microcomputer e) laptop computer Answer: b Title: Assessment Question PI2.35 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

36) Which of the following is not a component of hardware? a) primary and secondary storage b) the operating system c) input and output technologies d) central processing unit


e) communication technologies Answer: b Title: Assessment Question PI2.36 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Medium

37) Which of the following is not a component of the central processing unit? a) registers b) control unit c) secondary storage d) arithmetic-logic unit e) keyboard Answer: c Title: Assessment Question PI2.37 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Medium 38) Gordon Moore (with Moore’s Law) predicted that microprocessor complexity would do which of the following? a) double every year b) double every two years c) increase slowly d) decrease slowly e) decrease rapidly Answer: b Title: Assessment Question PI2.38 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Medium


39) The amount and type of memory that a computer possesses affects which of the following? a) the type of program the computer can run b) the speed of the computer c) the cost of the computer d) the cost of processing data e) all of these Answer: e Title: Assessment Question PI2.39 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

40) The amount and type of memory that a computer possesses affects all the following except: a) the type of program the computer can run b) the speed of the computer c) the cost of the computer d) the cost of processing data e) the speed of data entry Answer: e Title: Assessment Question PI2.40 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Medium

41) Arrange the following in the correct sequence, from smallest to largest: a) megabyte – kilobyte – gigabyte – terabyte – exabyte – petabyte b) exabyte – petabyte – terabyte – gigabyte – megabyte – kilobyte c) kilobyte – megabyte – gigabyte – terabyte – petabyte – exabyte d) petabyte – exabyte – kilobyte – gigabyte – kilobyte – terabyte e) kilobyte – gigabyte – megabyte – exabyte – petabyte – terabyte Answer: c Title: Assessment Question PI2.41


Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

42) Primary storage stores which of the following for very brief periods of time? a) data to be processed by the CPU b) instructions for the CPU as to how to process the data c) operating system programs that manage various aspects of the computer’s operations d) all of these Answer: d Title: Assessment Question PI2.42 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

43) Which of the following is not stored in primary storage? a) data to be processed by the CPU b) instructions for the CPU as to how to process the data c) archival data d) operating system programs e) none of these Answer: c Title: Assessment Question PI2.43 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

44) The part of primary storage that holds a software program (or portion of it) and small amounts of data when they are brought from secondary storage are called: a) read-only memory b) random access memory c) cache memory d) registers


e) flash memory Answer: b Title: Assessment Question PI2.44 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

45) Random access memory is _____ and _____. a) volatile, temporary b) nonvolatile, permanent c) nonvolatile, temporary d) volatile, permanent e) volatile, inexpensive Answer: a Title: Assessment Question PI2.45 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Medium

46) Which of the following is not a type of primary storage? a) random access memory b) registers c) cache d) read-only memory e) optical Answer: e Title: Assessment Question PI2.46 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Medium


47) The type of primary storage, closest to the CPU where the computer can temporarily store blocks of data used most often is called: a) read-only memory b) registers c) random access memory d) cache memory e) flash memory Answer: d Title: Assessment Question PI2.47 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

48) The type of primary storage where certain critical instructions are safeguarded because the storage is nonvolatile and the instructions can be read only by the computer and not changed by the user is called: a) read-only memory b) random access memory c) cache memory d) registers e) flash memory Answer: a Title: Assessment Question PI2.48 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

49) Which of the following is not a characteristic of secondary storage? a) nonvolatile b) more cost effective than primary storage c) slower than primary storage d) can utilize only chips as its medium e) none of these Answer: d


Title: Assessment Question PI2.49 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Medium

50) To access a specific piece of information, _____ are usually faster than _____. a) sequential access storage devices, direct access storage devices b) direct access storage devices, sequential access storage devices c) streaming tape devices, DVDs d) optical storage devices, random access memory e) sequential access storage devices, thumb drives Answer: b Title: Assessment Question PI2.50 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Medium

51) _____ are electronic storage devices that contain no moving parts. a) Hard drives b) Flash memory devices c) Magnetic tape d) DVDs e) CDs Answer: b Title: Assessment Question PI2.51 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

52) Over the past twenty years, hardware costs have _____, while software costs have _____. a) increased, increased b) decreased, decreased


c) decreased, increased d) increased, decreased e) increased, remained level Answer: c Title: Assessment Question PI2.52 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Medium

53) Today, software comprises a larger percentage of the cost of modern computer systems than it did in the early 1950s for which of the following reasons? a) hardware costs have decreased b) hardware performance has increased c) software has become increasingly complex d) building software applications remains slow, complex, and error-prone e) all of these Answer: e Title: Assessment Question PI2.53 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Medium

54) Which of the following is not a reason that today, software comprises a larger percentage of the cost of modern computer systems than it did in the early 1950s? a) hardware costs have increased b) hardware performance has increased c) software has become increasingly complex d) building software applications remains slow, complex, and error-prone e) none of these Answer: a Title: Assessment Question PI2.54


Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Medium

55) Which of the following is not an overall trend in software? a) Increased complexity b) Increased cost c) Increased number of errors d) Increased amount of mainframe software written by users e) Increasingly large percentage of information systems’ costs Answer: d Title: Assessment Question PI2.55 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Medium

56) The overall trends in software include all of the following except: a) increased complexity b) increased cost c) increased number of defects d) increased security e) increasing percentage of cost of modern computer systems Answer: d Title: Assessment Question PI2.56 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy

57) The _____ complexity of software means a _____ potential for errors. a) decreasing, decreasing


b) decreasing, increasing c) increasing, decreasing d) increasing, level e) increasing, increasing Answer: e Title: Assessment Question PI2.58 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Medium

58) _____ are sequences of instructions used to direct the workings of a computer. a) Computer programs b) Microcode instructions c) Assembler commands d) Systems software e) Input/Output instructions Answer: a Title: Assessment Question PI2.58 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy

59) The set of computer programs used to manage hardware resources is called: a) Microsoft Office Suite b) application software c) general software d) systems software e) personal application software Answer: d Title: Assessment Question PI2.59


Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Medium

60) The set of computer instructions that provides specific functionality to a user is called: a) transaction processing software b) application software c) general software d) systems software e) microcode Answer: b Title: Assessment Question PI2.60 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy 61) Which of the following is not a characteristic of today’s typical software? a) efficient b) full of errors c) poorly designed d) expensive e) an art as well as a science Answer: a Title: Assessment Question PI2.61 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Medium

62) The concept of _____ refers to competing computing products working together. a) open source software


b) software-as-a-service c) object oriented software d) application software package e) open systems Answer: e Title: Assessment Question PI2.62 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy

63) In order to protect their software from illegal distribution, vendors often rely on _____. a) encryption b) private security agents c) software licensing d) Internet-based distribution methods e) personal honesty Answer: c Title: Assessment Question PI2.63 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy

64) Which of the following is not an advantage of open-source software? a) produces high quality code b) produces code that can be changed to meet the needs of the users c) bugs are discovered quickly d) support is available only through online communities of core developers e) produces reliable code Answer: d Title: Assessment Question PI2.64


Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Medium

65) Which of the following is not a function of the operating system? a) allocates CPU time and main memory to programs running on the computer b) provides an interface between the user and the hardware c) supervises the overall operation of the computer d) increases the complexity of the system to the user e) none of these Answer: d Title: Assessment Question PI2.65 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Medium

66) The main system control program is the _____. a) operating system b) cache software c) virtual memory d) security monitor e) multithread register Answer: a Title: Assessment Question PI2.66 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy

67) The _____ allows users to exert direct control of icons on the computer screen. a) systems software


b) application software c) graphical user interface d) plug-and-play e) operating system Answer: c Title: Assessment Question PI2.67 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy

68) Which of the following is not offered by desktop operating systems? a) most functionality b) support for the fewest number of users c) most sophisticated interface d) same functionality as mobile operating systems e) application specific software Answer: a Title: Assessment Question PI2.68 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Medium

69) Which of the following is not offered by enterprise operating systems? a) most functionality b) support for the greatest number of users c) most sophisticated interface d) same functionality as desktop operating systems e) application specific software Answer: c Title: Assessment Question PI2.69


Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Medium 70) Creating specific application software using an organization’s own resources is called what? a) outsourcing b) consultant-based development c) in-house development d) contract software e) application service providers Answer: c Title: Assessment Question PI2.70 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy

71) _____ programs are often used when analyzing financial data. a) Database b) Word processing c) Spreadsheet d) Graphics e) Communications Answer: c Title: Assessment Question PI2.71 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy

72) Which of the following are true? a) HTML and XML are the same.


b) XML improves compatibility among different systems. c) HTML controls the data shown on a Web page. d) XML controls where data is shown on a Web page. e) All of these statements are true. Answer: b Title: Assessment Question PI2.72 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Medium

Question Type: Essay

73) Discuss why it is difficult to make hardware decisions today.

Title: Assessment Question PI2.73 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Medium

74) Describe the components that make up hardware.

Title: Assessment Question PI2.74 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Medium

75) What are the types of primary storage?

Title: Assessment Question PI2.75 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Medium


76) Discuss the reasons that software is now more costly than hardware in today’s information systems. Title: Assessment Question PI2.76 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Hard

77) What are the overall trends in software? Title: Assessment Question PI2.77 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Medium

78) Describe the various types of application software. Title: Assessment Question PI2.78 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Medium

79) Describe the importance of software defects. Title: Assessment Question PI2.79 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Medium

80) Compare and contrast supercomputers, mainframes, midrange computers, and microcomputers.


Title: Assessment Question PI2.80 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Medium

81) What are the types of secondary storage? Title: Assessment Question PI2.81 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Medium

82) Describe the factors to be considered for software selection. Title: Assessment Question PI2.82 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Medium

83) Discuss the importance of software licensing. Title: Assessment Question PI2.83 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Medium

Question Type: Multiple Choice

84) Jun is getting ready to open a store in her home town to sell unique lamp bases and shades. What kind of computer does she need at this point? a) mainframe computer b) server c) supercomputer


d) personal computer e) iPad Answer: d Title: Assessment Question PI2.84 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Easy

85) Jun has been in business selling unique lamp bases and shades for two years in her first location. She is getting ready to open a second location two towns over. What kind of computer does she need at this point? a) mainframe computer b) server c) supercomputer d) personal computer e) iPad Answer: b Title: Assessment Question PI2.85 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware Difficulty: Medium

86) Jun really likes your Apple iPad and wants to get one for her lamp business. What kind of computer would the iPad replace? a) mainframe computer b) workstation c) server d) personal computer e) desktop Answer: d Title: Assessment Question PI2.86 Learning Objective 1: LO PI2.1 Analyze the major hardware issues that affect information workers in today’s business environment. Section Reference 1: PI2.1 Introduction to Hardware


Difficulty: Medium

87) Jun is getting ready to open a store in her home town to sell unique lamp bases and shades. She has bought a laptop to use in the store for all of her operating needs. One of the first applications she knows she needs is one to handle her accounting and check book. How might she go about getting such an application for her business? a) open source software b) software-as-a-service c) object oriented software d) application software package e) open systems Answer: d Title: Assessment Question PI2.87 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Easy

88) Jun has bought an accounting package for her business which is selling unique lamp bases and shades. She wants to hire some part time help to assist her in implementing the new software and help her while she gets used to it. Which of the follow areas skill sets would be the most beneficial for this worker to have? a) Business processes b) Operating systems c) Programming languages d) HTML e) open systems Answer: a Title: Assessment Question PI2.88 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Medium


89) Jun has bought an accounting package for her business which is selling unique lamp bases and shades. She and a part time worker are getting up to speed on the package but are having trouble matching her business processes to the software. What does Jun have to do to make the software more effective? a) Change the UI b) Change the way the program works c) Change her business processes to match the software d) Install an updated version of the software e) Hire another part time worker to help Answer: c Title: Assessment Question PI2.89 Learning Objective 1: LO PI2.2 Compare and contrast systems software and application software, and explain how information workers utilize both types of software in the modern business environment. Section Reference 1: PI2.2 Introduction to Software Difficulty: Medium


Package Title: Assessment Questions Course Title: MIS 1e Chapter Number: Plug IT In 3

Question Type: True/False 1) Entering data and programs from user departments to the mainframe was called remote data entry. Answer: False Title: Assessment Question PI3.01 Learning Objective 1: LO PI3.1 Describe the evolution of IT infrastructure. Section Reference 1: PI3.1 Introduction Difficulty: Medium

2) MIS departments embraced the arrival of personal computers in the work place. Answer: False Title: Assessment Question PI3.02 Learning Objective 1: LO PI3.1 Describe the evolution of IT infrastructure. Section Reference 1: PI3.1 Introduction Difficulty: Easy

3) Mainframe computers are no longer being used. Answer: False Title: Assessment Question PI3.03 Learning Objective 1: LO PI3.1 Describe the evolution of IT infrastructure. Section Reference 1: PI3.1 Introduction Difficulty: Easy

4) Companies are building massive data centers called computer floors to meet their processing needs. Answer: False Title: Assessment Question PI3.04 Learning Objective 1: LO PI3.2 Describe a server farm. Section Reference 1: PI3.2 Server Farms


Difficulty: Easy

5) Server farms can be located just about anywhere. Answer: False Title: Assessment Question PI3.05 Learning Objective 1: LO PI3.2 Describe a server farm. Section Reference 1: PI3.2 Server Farms Difficulty: Medium

6) Server virtualization uses software-based partitions to create multiple virtual servers on a single physical server. Answer: True Title: Assessment Question PI3.06 Learning Objective 1: LO PI3.3 Define virtualization, and discuss its advantages. Section Reference 1: PI3.3 Virtualization Difficulty: Medium

7) Grid computing combines processing resources to form a virtual supercomputer. Answer: True Title: Assessment Question PI3.07 Learning Objective 1: LO PI3.4 Define grid computing, and discuss its advantages. Section Reference 1: PI3.4 Grid Computing Difficulty: Easy

8) Any application can run on a grid computing system Answer: False Title: Assessment Question PI3.08 Learning Objective 1: LO PI3.4 Define grid computing, and discuss its advantages. Section Reference 1: PI3.4 Grid Computing Difficulty: Medium

9) Utility computing is also called on-demand computing.


Answer: True Title: Assessment Question PI3.09 Learning Objective 1: LO PI3.5 Define utility computing, and discuss its advantages. Section Reference 1: PI3.5 Utility Computing Difficulty: Easy 10) The “cloud” in cloud computing is composed of computers, the software on those computers, and the network connections among those computers. Answer: True Title: Assessment Question PI3.10 Learning Objective 1: LO PI3.6 Define cloud computing, and analyze its advantages and disadvantages. Section Reference 1: PI3.6 Cloud Computing Difficulty: Easy

11) The primary advantage of cloud computing is that it is easier for users to do their work. Answer: False Title: Assessment Question PI3.11 Learning Objective 1: LO PI3.6 Define cloud computing, and analyze its advantages and disadvantages. Section Reference 1: PI3.6 Cloud Computing Difficulty: Easy

12) Customers that are using software-as-a-service are not using cloud computing. Answer: False Title: Assessment Question PI3.12 Learning Objective 1: LO PI3.6 Define cloud computing, and analyze its advantages and disadvantages. Section Reference 1: PI3.6 Cloud Computing Difficulty: Easy

13) Web macros allow IT professionals to combine features so that applications on almost any device can work together. Answer: False


Title: Assessment Question PI3.13 Learning Objective 1: LO PI3.7 Define and discuss Web services and service-oriented architecture. Section Reference 1: PI3.7 Emerging Software Trends Difficulty: Easy

14) XML makes it easier to exchange data among applications. Answer: True Title: Assessment Question PI3.14 Learning Objective 1: LO PI3.7 Define and discuss Web services and service-oriented architecture. Section Reference 1: PI3.7 Emerging Software Trends Difficulty: Medium

15) XML is a more powerful language than HTML. Answer: True Title: Assessment Question PI3.15 Learning Objective 1: LO PI3.7 Define and discuss Web services and service-oriented architecture. Section Reference 1: PI3.7 Emerging Software Trends Difficulty: Medium

16) XML tags data. Answer: True Title: Assessment Question PI3.16 Learning Objective 1: LO PI3.7 Define and discuss Web services and service-oriented architecture. Section Reference 1: PI3.7 Emerging Software Trends Difficulty: Easy

17) Simple object access protocol (SOAP) defines how messages can be exchanged through the use of HTML. Answer: False


Title: Assessment Question PI3.17 Learning Objective 1: LO PI3.7 Define and discuss Web services and service-oriented architecture. Section Reference 1: PI3.7 Emerging Software Trends Difficulty: Medium

18) Web services description language (WSDL) is used to create XML documents. Answer: True Title: Assessment Question PI3.18 Learning Objective 1: LO PI3.7 Define and discuss Web services and service-oriented architecture. Section Reference 1: PI3.7 Emerging Software Trends Difficulty: Easy

19) UDDI is a registry of descriptions of Web services. Answer: True Title: Assessment Question PI3.19 Learning Objective 1: LO PI3.7 Define and discuss Web services and service-oriented architecture. Section Reference 1: PI3.7 Emerging Software Trends Difficulty: Easy

20) A service-oriented architecture is an IT architecture that makes it possible to build business applications using Web services. Answer: True Title: Assessment Question PI3.20 Learning Objective 1: LO PI3.7 Define and discuss Web services and service-oriented architecture. Section Reference 1: PI3.7 Emerging Software Trends Difficulty: Easy

Question Type: Multiple Choice

21) One of the advantages of a server farm is:


a) It takes less than an hour to add a server to the server farm. b) Running many servers is less expensive. c) If one server fails, an application can be automatically moved to another one. d) Fewer people are required to run many machines. e) Servers can be stacked on top of one another, so less space is needed. Answer: c Title: Assessment Question PI3.21 Learning Objective 1: LO PI3.2 Describe a server farm. Section Reference 1: PI3.2 Server Farms Difficulty: Medium

22) Server virtualization a) Can function only within server farms. b) Uses software to build multiple virtual servers on the same machine. c) Requires changes to applications. d) Requires a license for each virtual server. e) Requires no additional security Answer: b Title: Assessment Question PI3.22 Learning Objective 1: LO PI3.3 Define virtualization, and discuss its advantages. Section Reference 1: PI3.3 Virtualization Difficulty: Easy

23) Which of the following is not a benefit of employing server virtualization? a) Cost savings in space b) Cost savings in energy c) Cost savings in customer service d) Cost savings in maintenance e) Cost savings in personnel Answer: c Title: Assessment Question PI3.23 Learning Objective 1: LO PI3.3 Define virtualization, and discuss its advantages. Section Reference 1: PI3.3 Virtualization Difficulty: Easy


24) Grid computing a) Runs an application on one server. b) Is ideal for transaction processing systems. c) Divides the processing of an application among servers. d) Does not require any special software. e) Is difficult to scale up. Answer: c Title: Assessment Question PI3.24 Learning Objective 1: LO PI3.4 Define grid computing, and discuss its advantages. Section Reference 1: PI3.4 Grid Computing Difficulty: Medium

25) Which of the following is not a benefit of grid computing? a) It enables efficient use of computing resources. b) It enables applications to run faster. c) There is no single point of failure. d) It reduces the number of applications. e) It makes it easier to scale up or down. Answer: d Title: Assessment Question PI3.25 Learning Objective 1: LO PI3.4 Define grid computing, and discuss its advantages. Section Reference 1: PI3.4 Grid Computing Difficulty: Medium

26) Utility computing a) Is the same as grid computing. b) Is called on-demand computing. c) Can be offered by any company with excess resources. d) Charges customers a flat rate. e) Is the same as cloud computing. Answer: b Title: Assessment Question PI3.26 Learning Objective 1: LO PI3.5 Define utility computing, and discuss its advantages. Section Reference 1: PI3.5 Utility Computing Difficulty: Medium


27) Which of the following statements concerning cloud computing is not true? a) Users access computers in the cloud, usually via the Internet. b) The cloud includes computers, software, and a network. c) A cloud can be private or public. d) A cloud is usually a server farm. e) Data are stored on the user’s computer Answer: e Title: Assessment Question PI3.27 Learning Objective 1: LO PI3.6 Define cloud computing, and analyze its advantages and disadvantages. Section Reference 1: PI3.6 Cloud Computing Difficulty: Medium

28) Which of the following is not a disadvantage of cloud computing? a) Privacy b) Security c) Reliability d) Costs e) Loss of control Answer: d Title: Assessment Question PI3.28 Learning Objective 1: LO PI3.6 Define cloud computing, and analyze its advantages and disadvantages. Section Reference 1: PI3.6 Cloud Computing Difficulty: Easy

29) Which of the following is not a service of cloud computing? a) Cloud infrastructure as a service b) Cloud data storage as a service c) Cloud platform as a service d) Cloud software as a service e) All of these services of cloud computing. Answer: b Title: Assessment Question PI3.29


Learning Objective 1: LO PI3.6 Define cloud computing, and analyze its advantages and disadvantages. Section Reference 1: PI3.6 Cloud Computing Difficulty: Medium

30) Which of the following is not a benefit of using Web services? a) New applications can be developed quickly. b) Users can access data without knowing where the data are. c) Organizations can use the Internet infrastructure without having to implement any new technologies. d) Web services enable IT professionals to use shared protocols to build applications. e) Using Web services does not require any new skill sets. Answer: e Title: Assessment Question PI3.30 Learning Objective 1: LO PI3.7 Define and discuss Web services and service-oriented architecture. Section Reference 1: PI3.7 Emerging Software Trends Difficulty: Medium

31) Which of the following is not a key protocol of Web services? a) HTML b) SOAP c) XML d) WSDL e) UDDI Answer: a Title: Assessment Question PI3.31 Learning Objective 1: LO PI3.7 Define and discuss Web services and service-oriented architecture. Section Reference 1: PI3.7 Emerging Software Trends Difficulty: Easy

32) A service-oriented architecture a) Is one in which the servers are supporting multiple mobile devices. b) Enables Web services to be reused across an organization. c) Is a type of cloud computing.


d) Is focused on user response. e) Places servers closest to the primary user. Answer: b Title: Assessment Question PI3.32 Learning Objective 1: LO PI3.7 Define and discuss Web services and service-oriented architecture. Section Reference 1: PI3.7 Emerging Software Trends Difficulty: Medium

Question Type: Essay

33) Discuss virtualization and its advantages Title: Assessment Question PI3.33 Learning Objective 1: LO PI3.3 Define virtualization, and discuss its advantages. Section Reference 1: PI3.3 Virtualization Difficulty: Easy

34) Discuss grid computing and its advantages. Title: Assessment Question PI3.34 Learning Objective 1: LO PI3.4 Define grid computing, and discuss its advantages. Section Reference 1: PI3.4 Grid Computing Difficulty: Easy

35) Compare and contrast grid computing and utility computing. Title: Assessment Question PI3.35 Learning Objective 1: LO PI3.4 Define grid computing, and discuss its advantages. Learning Objective 2: LO PI3.5 Define utility computing, and discuss its advantages. Section Reference 1: PI3.4 Grid Computing Section Reference 2: PI3.5 Utility Computing Difficulty: Medium

36) Discuss Web services.

Title: Assessment Question PI3.36


Learning Objective 1: LO PI3.7 Define and discuss Web services and service-oriented architecture. Section Reference 1: PI3.7 Emerging Software Trends Difficulty: Easy

37) Define cloud computing, and discuss its advantages and disadvantages. Title: Assessment Question PI3.37 Learning Objective 1: LO PI3.6 Define cloud computing, and analyze its advantages and disadvantages. Section Reference 1: PI3.6 Cloud Computing Difficulty: Medium

38) Compare and contrast cloud computing and service-oriented architecture. Title: Assessment Question PI3.38 Learning Objective 1: LO PI3.6 Define cloud computing, and analyze its advantages and disadvantages. Learning Objective 2: LO PI3.7 Define and discuss Web services and service-oriented architecture. Section Reference 1: PI3.6 Cloud Computing Section Reference 2: PI3.7 Emerging Software Trends Difficulty: Medium

39) Define each of the following terms, and explain how they are related: XML, SOAP, WSDL, and UDDI. Title: Assessment Question PI3.39 Learning Objective 1: LO PI3.7 Define and discuss Web services and service-oriented architecture. Section Reference 1: PI3.7 Emerging Software Trends Difficulty: Medium

Question Type: Multiple Choice

40) Hyo runs an ice cream store with her family. Which of the following technologies might be a good source of computing for the store? a) Server farm b) Grid computing c) Cloud computing


d) Utility computing e) Virtualization Answer: c Title: Assessment Question PI3.40 Learning Objective 1: LO PI3.1 Describe the evolution of IT infrastructure. Learning Objective 2: LO PI3.2 Describe a server farm. Learning Objective 3: LO PI3.3 Define virtualization, and discuss its advantages. Learning Objective 4: LO PI3.4 Define grid computing, and discuss its advantages. Learning Objective 5: LO PI3.5 Define utility computing, and discuss its advantages. Learning Objective 6: LO PI3.6 Define cloud computing, and analyze its advantages and disadvantages. Learning Objective 7: LO PI3.7 Define and discuss Web services and service-oriented architecture. Section Reference 1: Plug IT In 3 Difficulty: Medium

41) Travis is the VP of Operations for a company that owns and operates six ski areas around the world. Which of the following might be a good source of computing for the company? a) Server farm b) Grid computing c) Cloud computing d) Utility computing e) Virtualization Answer: c Title: Assessment Question PI3.41 Learning Objective 1: LO PI3.1 Describe the evolution of IT infrastructure. Learning Objective 2: LO PI3.2 Describe a server farm. Learning Objective 3: LO PI3.3 Define virtualization, and discuss its advantages. Learning Objective 4: LO PI3.4 Define grid computing, and discuss its advantages. Learning Objective 5: LO PI3.5 Define utility computing, and discuss its advantages. Learning Objective 6: LO PI3.6 Define cloud computing, and analyze its advantages and disadvantages. Learning Objective 7: LO PI3.7 Define and discuss Web services and service-oriented architecture. Section Reference 1: Plug IT In 3 Difficulty: Medium

42) Paula owns a variety store in a tourist town. The store recently went online, and the response has been remarkable. The store’s current infrastructure is running close to capacity, so handling


the influx of orders is taking much longer than it should. Which of the following suggestions might be the best solution for the company? a) Add another server to their infrastructure. b) Use grid computing to process the orders across many servers. c) Use cloud computing services. d) Use the services of a utility computing provider. e) Convert their existing servers to virtual services. Answer: a Title: Assessment Question PI3.42 Learning Objective 1: LO PI3.1 Describe the evolution of IT infrastructure. Learning Objective 2: LO PI3.2 Describe a server farm. Learning Objective 3: LO PI3.3 Define virtualization, and discuss its advantages. Learning Objective 4: LO PI3.4 Define grid computing, and discuss its advantages. Learning Objective 5: LO PI3.5 Define utility computing, and discuss its advantages. Learning Objective 6: LO PI3.6 Define cloud computing, and analyze its advantages and disadvantages. Learning Objective 7: LO PI3.7 Define and discuss Web services and service-oriented architecture. Section Reference 1: Plug IT In 3 Difficulty: Medium


Package Title: Assessment Questions Course Title: MIS 1e Chapter Number: Plug IT In 4

Question Type: True/False

1) Artificial intelligence is perishable, whereas natural intelligence is permanent from an organizational point of view. Answer: False Title: Assessment Question PI4.01 Learning Objective 1: LO PI4.1 Differentiate between artificial intelligence and human intelligence. Section Reference 1: PI4.1 Introduction to Intelligent Systems Difficulty: Easy

2) It is difficult to document the knowledge of artificial intelligence, but it is easy to document the knowledge of natural intelligence. Answer: False Title: Assessment Question PI4.02 Learning Objective 1: LO PI4.1 Differentiate between artificial intelligence and human intelligence. Section Reference 1: PI4.1 Introduction to Intelligent Systems Difficulty: Easy

3) Expertise refers to the extensive, task-specific knowledge acquired from training, reading, and experience. Answer: True Title: Assessment Question PI4.03 Learning Objective 1: LO PI4.2 Define expert systems, and provide examples of their use. Section Reference 1: PI4.2 Expert Systems Difficulty: Easy

4) Expert systems attempt to mimic human experts by applying expertise in a specific domain. Answer: True


Title: Assessment Question PI4.04 Learning Objective 1: LO PI4.2 Define expert systems, and provide examples of their use. Section Reference 1: PI4.2 Expert Systems Difficulty: Easy

5) An expert system has a knowledge base and an inference engine. Answer: True Title: Assessment Question PI4.05 Learning Objective 1: LO PI4.2 Define expert systems, and provide examples of their use. Section Reference 1: PI4.2 Expert Systems Difficulty: Easy

6) One problem with expert systems is they decrease quality. Answer: False Title: Assessment Question PI4.06 Learning Objective 1: LO PI4.2 Define expert systems, and provide examples of their use. Section Reference 1: PI4.2 Expert Systems Difficulty: Easy

7) A neural network has two layers of interconnected nodes. Answer: False Title: Assessment Question PI4.07 Learning Objective 1: LO PI4.3 Define neural networks, and provide examples of their use. Section Reference 1: PI4.3 Neural Networks Difficulty: Easy

8) Fuzzy logic defines subjective concepts. Answer: True Title: Assessment Question PI4.08 Learning Objective 1: LO PI4.4 Define fuzzy logic, and provide examples of its use. Section Reference 1: PI4.4 Fuzzy Logic Difficulty: Easy


9) Hyo runs an ice cream shop with her family. They need to train someone to close the store at the end of day. This process is an example of which type of intelligent system? a) Expert systems b) Neural network c) Fuzzy logic d) Genetic algorithms e) Intelligent agent Answer: a Title: Assessment Question PI4.09 Learning Objective 1: LO PI4.2 Define expert systems, and provide examples of their use. Section Reference 1: PI4.2 Expert Systems Difficulty: Medium

10) A genetic algorithm finds the combination of inputs that produces the best outputs. Answer: True Title: Assessment Question PI4.10 Learning Objective 1: LO PI4.5 Define genetic algorithms, and provide examples of their use. Section Reference 1: PI4.5 Genetic Algorithms Difficulty: Easy

11) Intelligent agents use expert systems and fuzzy logic to create their behavior. Answer: True Title: Assessment Question PI4.11 Learning Objective 1: LO PI4.6 Define intelligent agents, and provide examples of their use. Section Reference 1: PI4.6 Intelligent Agents Difficulty: Easy

Question Type: Multiple Choice

12) Which of the following is not a characteristic of natural intelligence? a) It is perishable from an organizational point of view. b) It is easy, fast, and inexpensive. c) It is erratic and inconsistent.


d) It is highly creative) e) It makes use of a wide context of experiences. Answer: b Title: Assessment Question PI4.12 Learning Objective 1: LO PI4.1 Differentiate between artificial intelligence and human intelligence. Section Reference 1: PI4.1 Introduction to Intelligent Systems Difficulty: Medium

13) Which of the following is not a characteristic of artificial intelligence? a) It is permanent. b) It is easy, fast, and inexpensive. c) It is highly creative. d) It tends to be effective only in narrow domains. e) It is consistent and thorough. Answer: c Title: Assessment Question PI4.13 Learning Objective 1: LO PI4.1 Differentiate between artificial intelligence and human intelligence. Section Reference 1: PI4.1 Introduction to Intelligent Systems Difficulty: Medium

14) Expert systems: a) solve problems that are too difficult for human experts b) are based on procedural computer programming languages c) work in specific domains d) can apply to any business problem e) share characteristics with mainframe computing Answer: c Title: Assessment Question PI4.14 Learning Objective 1: LO PI4.2 Define expert systems, and provide examples of their use. Section Reference 1: PI4.2 Expert Systems Difficulty: Medium

15) Which of the following statements is false?


a) Expert systems cannot replace decision makers. b) Expert systems apply expertise in a specific domain. c) Expert systems capture the expertise from a domain expert (a person). d) Expert systems can be embedded in larger systems. e) Expert systems follow a logical path towards a recommendation. Answer: a Title: Assessment Question PI4.15 Learning Objective 1: LO PI4.2 Define expert systems, and provide examples of their use. Section Reference 1: PI4.2 Expert Systems Difficulty: Medium

16) Which of the following is not an expert system activity? a) Knowledge acquisition b) Knowledge domain c) Knowledge inferencing d) Knowledge representation e) Knowledge transfer Answer: b Title: Assessment Question PI4.16 Learning Objective 1: LO PI4.2 Define expert systems, and provide examples of their use. Section Reference 1: PI4.2 Expert Systems Difficulty: Medium

17) An inference engine is: a) a data mining strategy used by intelligent agents b) the programming environment of an expert system c) a method of organizing expert system knowledge into chunks d) a methodology used to search through the rule base of an expert system e) the user interface of an expert system Answer: d Title: Assessment Question PI4.17 Learning Objective 1: LO PI4.2 Define expert systems, and provide examples of their use. Section Reference 1: PI4.2 Expert Systems Difficulty: Medium


18) Which of the following statements concerning expert systems is false? a) The knowledge base contains facts. b) The knowledge base contains rules. c) An expert system can explain its recommendation. d) The blackboard displays the recommendation. e) Expert systems cannot learn from their own mistakes. Answer: d Title: Assessment Question PI4.18 Learning Objective 1: LO PI4.2 Define expert systems, and provide examples of their use. Section Reference 1: PI4.2 Expert Systems Difficulty: Medium

19) Which of the following is not a benefit of expert systems? a) increased output and productivity b) capture and dissemination of scarce expertise c) increased decision-making time d) reliability e) works with incomplete, uncertain information Answer: c Title: Assessment Question PI4.19 Learning Objective 1: LO PI4.2 Define expert systems, and provide examples of their use. Section Reference 1: PI4.2 Expert Systems Difficulty: Medium

20) Which of the following is not a limitation of expert systems? a) Expert systems cannot work with incomplete or uncertain data.ans b) A process might contain too many rules to work as an expert system. c) A process might be too vague to work as an expert system. d) Decisions made by expert systems might be a potential liability. e) Expert systems need to learn from their own mistakes. Answer: a Title: Assessment Question PI4.20 Learning Objective 1: LO PI4.2 Define expert systems, and provide examples of their use. Section Reference 1: PI4.2 Expert Systems


Difficulty: Medium

21) _____ refer(s) to computer reasoning that deals with uncertainties by simulating the process of human reasoning. a) Expert systems b) Artificial neural networks c) Speech understanding systems d) Fuzzy logic e) Computer vision systems Answer: d Title: Assessment Question PI4.21 Learning Objective 1: LO PI4.4 Define fuzzy logic, and provide examples of its use. Section Reference 1: PI4.4 Fuzzy Logic Difficulty: Medium 22) Fuzzy logic could be used to define which of the following terms: a) Gender b) Moderate income c) Age d) Address e) Income Answer: b Title: Assessment Question PI4.22 Learning Objective 1: LO PI4.4 Define fuzzy logic, and provide examples of its use. Section Reference 1: PI4.4 Fuzzy Logic Difficulty: Medium

23) Which of the following is not a characteristic of genetic algorithms? a) Selection b) Crossover c) Transformation d) Mutation Answer: c Title: Assessment Question PI4.23 Learning Objective 1: LO PI4.5 Define genetic algorithms, and provide examples of their use.


Section Reference 1: PI4.5 Genetic Algorithms Difficulty: Medium

24) Which of the following statements is false? a) In genetic algorithms, crossover means combining portions of good outcomes. b) Generic algorithms are best suited for decision making where there are thousands of solutions. c) Users have to tell the generic algorithm what constitutes a “good” solution. d) In genetic algorithms, mutation means randomly trying combinations and evaluating the outcome. e) All of these statements are true. Answer: e Title: Assessment Question PI4.24 Learning Objective 1: LO PI4.5 Define genetic algorithms, and provide examples of their use. Section Reference 1: PI4.5 Genetic Algorithms Difficulty: Medium

25) Which of the following statements is false? a) An intelligent agent is a software program. b) Intelligent agents are also called bots. c) Intelligent agents are always helpful. d) Intelligent agents use export systems and fuzzy logic. e) Intelligent agents perform repetitive computer-related tasks. Answer: c Title: Assessment Question PI4.25 Learning Objective 1: LO PI4.6 Define intelligent agents, and provide examples of their use. Section Reference 1: PI4.6 Intelligent Agents Difficulty: Easy

26) Which of the following statements is false? a) Information agents search for information and store it for the user. b) Information agents are used by Google to surf the Web sites in Google’s index. c) Monitoring-and-surveillance agents are also called predictive agents. d) Personal agents take action on behalf of the user. e) User agents automatically fill out forms on the Web from stored information.


Answer: a Title: Assessment Question PI4.26 Learning Objective 1: LO PI4.6 Define intelligent agents, and provide examples of their use. Section Reference 1: PI4.6 Intelligent Agents Difficulty: Easy

Question Type: Essay

27) Compare and contrast expert systems and intelligent agents. Title: Assessment Question PI4.27 Learning Objective 1: LO PI4.3 Define neural networks, and provide examples of their use. Learning Objective 2: LO PI4.4 Define fuzzy logic, and provide examples of its use. Section Reference 1: PI4.3 Neural Networks Section Reference 2: PI4.4 Fuzzy Logic Difficulty: Medium

28) How are neural networks useful to businesses? Title: Assessment Question PI4.28 Learning Objective 1: LO PI4.3 Define neural networks, and provide examples of their use. Learning Objective 2: LO PI4.4 Define fuzzy logic, and provide examples of its use. Section Reference 1: PI4.3 Neural Networks Section Reference 2: PI4.4 Fuzzy Logic Difficulty: Medium

29) How are intelligent agents useful to businesses? Title: Assessment Question PI4.29 Learning Objective 1: LO PI4.3 Define neural networks, and provide examples of their use. Learning Objective 2: LO PI4.4 Define fuzzy logic, and provide examples of its use. Section Reference 1: PI4.3 Neural Networks Section Reference 2: PI4.4 Fuzzy Logic Difficulty: Medium

30) Compare and contrast fuzzy logic and neural networks. Title: Assessment Question PI4.30 Learning Objective 1: LO PI4.3 Define neural networks, and provide examples of their use. Learning Objective 2: LO PI4.4 Define fuzzy logic, and provide examples of its use.


Section Reference 1: PI4.3 Neural Networks Section Reference 2: PI4.4 Fuzzy Logic Difficulty: Medium

31) What are the advantages and disadvantages of artificial intelligence systems? Title: Assessment Question PI4.31 Learning Objective 1: LO PI4.1 Differentiate between artificial intelligence and human intelligence. Section Reference 1: PI4.1 Introduction to Intelligent Systems Difficulty: Hard

32) Describe how your university could use an expert system in its admissions process. Title: Assessment Question PI4.32 Learning Objective 1: LO PI4.2 Define expert systems, and provide examples of their use. Section Reference 1: PI4.2 Expert Systems Difficulty: Hard

33) Contrast the three types of intelligent agents and give examples of how they might be used in business. Title: Assessment Question PI4.33 Learning Objective 1: LO PI4.6 Define intelligent agents, and provide examples of their use. Section Reference 1: PI4.6 Intelligent Agents Difficulty: Hard

Question Type: Multiple Choice

34) Hyo runs an ice cream shop with her family. They have configured their computer to put any e-mail that contains the word “order” into a folder called Possible Orders. This process is an example of which type of intelligent system? a) Expert systems b) Neural network c) Fuzzy logic d) Genetic algorithms e) Intelligent agent Answer: e


Title: Assessment Question PI4.34 Learning Objective 1: LO PI4.6 Define intelligent agents, and provide examples of their use. Section Reference 1: PI4.6 Intelligent Agents Difficulty: Medium

35) Hyo runs an ice cream shop with her family. They just started letting customers fax in their ice cream orders. Sometimes the writing is hard to read, and Hyo’s family has to guess what the customers have ordered based on what flavors the shop has. This process is an example of which type of intelligent system? a) Expert systems b) Neural network c) Fuzzy logic. d) Genetic algorithms e) Intelligent agent. Answer: c Title: Assessment Question PI4.35 Learning Objective 1: LO PI4.6 Define intelligent agents, and provide examples of their use. Section Reference 1: PI4.6 Intelligent Agents Difficulty: Medium


Package Title: Assessment Questions Course Title: MIS 1e Chapter Number: Plug IT In 5

Question Type: True/False

1) A project is a set of related tasks intended to create a specific outcome. Answer: True Title: Assessment Question PI5.01 Learning Objective 1: LO PI5.1 Define a project, define information system project management, and describe the triple constraints of all projects. Section Reference 1: PI5.1 Project Management for Information Systems Projects Difficulty: Easy

2) The scope of a project refers to all of the work required to complete a project successfully. Answer: True Title: Assessment Question PI5.02 Learning Objective 1: LO PI5.1 Define a project, define information system project management, and describe the triple constraints of all projects. Section Reference 1: PI5.1 Project Management for Information Systems Projects Difficulty: Easy

3) The triple constraints of project management are time, personnel, and scope. Answer: False Title: Assessment Question PI5.03 Learning Objective 1: LO PI5.1 Define a project, define information system project management, and describe the triple constraints of all projects. Section Reference 1: PI5.1 Project Management for Information Systems Projects Difficulty: Medium

4) The triple constraints of project management are interrelated. Answer: True Title: Assessment Question PI5.04


Learning Objective 1: LO PI5.1 Define a project, define information system project management, and describe the triple constraints of all projects. Section Reference 1: PI5.1 Project Management for Information Systems Projects Difficulty: Medium

5) The first phase of project management is planning. Answer: False Title: Assessment Question PI5.05 Learning Objective 1: LO PI5.2 Describe the five phases of the project management process. Section Reference 1: PI5.2 The Project Management Process Difficulty: Medium

6) The goals for the project are defined during the initiation phase of project management. Answer: True Title: Assessment Question PI5.06 Learning Objective 1: LO PI5.2 Describe the five phases of the project management process. Section Reference 1: PI5.2 The Project Management Process Difficulty: Easy 7) Uncontrolled changes in a project’s scope are referred to as scope evolution. Answer: False Title: Assessment Question PI5.07 Learning Objective 1: LO PI5.2 Describe the five phases of the project management process. Section Reference 1: PI5.2 The Project Management Process Difficulty: Medium

8) One reason for IS project failure is a lack of commitment by the management that is providing the necessary resources. Answer: True Title: Assessment Question PI5.08 Learning Objective 1: LO PI5.2 Describe the five phases of the project management process. Section Reference 1: PI5.2 The Project Management Process Difficulty: Medium


9) Best practices within the project management discipline are known as the Project Management Knowledge Base. Answer: False Title: Assessment Question PI5.09 Learning Objective 1: LO PI5.3 Describe the five basic process groups and the nine knowledge areas of the project management body of knowledge. Section Reference 1: PI5.3 The Project Management Body of Knowledge Difficulty: Easy

10) The five basic process groups of project management are stand-alone activities. Answer: False Title: Assessment Question PI5.10 Learning Objective 1: LO PI5.3 Describe the five basic process groups and the nine knowledge areas of the project management body of knowledge. Section Reference 1: PI5.3 The Project Management Body of Knowledge Difficulty: Easy

11) Risk management is an integral part of any project. Answer: True Title: Assessment Question PI5.11 Learning Objective 1: LO PI5.3 Describe the five basic process groups and the nine knowledge areas of the project management body of knowledge. Section Reference 1: PI5.3 The Project Management Body of Knowledge Difficulty: Easy

Question Type: Multiple Choice

12) _____ are efforts to create a specific business-related outcome. a) Projects b) Processes c) Transactions d) Prototypes e) Information systems


Answer: a Title: Assessment Question PI5.12 Learning Objective 1: LO PI5.1 Define a project, define information system project management, and describe the triple constraints of all projects. Section Reference 1: PI5.1 Project Management for Information Systems Projects Difficulty: Easy

13) The triple constraints of information systems projects are: a) user requirements, technical specifications, and time b) time, cost, and scope c) cost, stakeholder requirements, and technical specifications d) technical feasibility, behavioral feasibility, and economic feasibility e) scope, user requirements, and economic feasibility Answer: b Title: Assessment Question PI5.13 Learning Objective 1: LO PI5.1 Define a project, define information system project management, and describe the triple constraints of all projects. Section Reference 1: PI5.1 Project Management for Information Systems Projects Difficulty: Easy

14) Which of the following statements is false? a) The triple constraints of information systems projects are interrelated. b) The triple constraints of information systems projects can be involved in trade-offs c) The scope of a project can be increased by using additional time and money. d) The costs and times associated with a project cannot be reduced. e) The triple constraints are unique to information system projects. Answer: d Title: Assessment Question PI5.14 Learning Objective 1: LO PI5.1 Define a project, define information system project management, and describe the triple constraints of all projects. Section Reference 1: PI5.1 Project Management for Information Systems Projects Difficulty: Easy

15) The reasons why so many information system software development projects do not deliver their potential value include all of the following except:


a) Lack of sufficient planning b) Technology compatibility problems c) Management’s failure to provide the necessary resources d) Poorly defined project scope e) Poor definition of user requirements Answer: e Title: Assessment Question PI5.15 Learning Objective 1: LO PI5.1 Define a project, define information system project management, and describe the triple constraints of all projects. Section Reference 1: PI5.1 Project Management for Information Systems Projects Difficulty: Medium

16) Which of the following statements is false? a) Every project has five distinct phases. b) The phases are initiation, planning, execution, monitoring and control, and completion. c) The phases overlap. d) During project initiation, the user defines the problem. e) During project initiation, the resources necessary for the project are secured. Answer: c Title: Assessment Question PI5.16 Learning Objective 1: LO PI5.2 Describe the five phases of the project management process. Section Reference 1: PI5.2 The Project Management Process Difficulty: Medium

17) Which of the following statements does not pertain to the project planning phase? a) Every activity associated with the project objective must be identified and sequenced in this phase. b) Scope creep refers to the uncontrolled changes in the project’s scope. c) Scope creep occurs when users ask for additional functionally after the project is underway. d) A PERT graph could be used to ensure the activities are performed in a logical sequence. e) PERT charts, the critical path method, and Gantt chart tools are used only at the beginning of the project. Answer: e Title: Assessment Question PI5.17 Learning Objective 1: LO PI5.2 Describe the five phases of the project management process. Section Reference 1: PI5.2 The Project Management Process


Difficulty: Medium

18) Which of the following statements is false? a) Users could be involved in the project execution phase. b) Management monitors ongoing activities. c) Management compares project variables with the plan. d) Management identifies corrective actions if necessary. e) The project team decides when a project is complete. Answer: e Title: Assessment Question PI5.18 Learning Objective 1: LO PI5.2 Describe the five phases of the project management process. Section Reference 1: PI5.2 The Project Management Process Difficulty: Medium

19) Which of the following is not usually given as a reason for IT project failures? a) The problem was no longer a problem. b) There was insufficient planning at the start of the project. c) The scope of the project was poorly defined. d) The time allotted to complete the project was insufficient. e) The new technology did not work as planned. Answer: a Title: Assessment Question PI5.19 Learning Objective 1: LO PI5.2 Describe the five phases of the project management process. Section Reference 1: PI5.2 The Project Management Process Difficulty: Medium

20) Which of the following is not an output from the project initiation phase? a) Problem identification b) Goals that are to be achieved c) Details for each activity associated with the objective. d) Cost-benefit analysis e) Risk evaluation Answer: c Title: Assessment Question PI5.20


Learning Objective 1: LO PI5.2 Describe the five phases of the project management process. Section Reference 1: PI5.2 The Project Management Process Difficulty: Medium

21) Which of the following statements concerning the Project Management Body of Knowledge (PMBOK) is true? a) It provides fundamentals of project management for particular types of project. b) Its goal is to provide a common vocabulary within the project management profession. c) Processes are described in terms of goals. d) One of the knowledge areas of PMBOK is project auditing. e) PMBOK does not address staffing decisions. Answer: b Title: Assessment Question PI5.21 Learning Objective 1: LO PI5.3 Describe the five basic process groups and the nine knowledge areas of the project management body of knowledge. Section Reference 1: PI5.3 The Project Management Body of Knowledge Difficulty: Medium

22) Which of the following statements concerning the Project Management Body of Knowledge (PMBOK) is false? a) The project integration knowledge area includes integrated change control processes. b) Quality assurance is included in the project quality knowledge area. c) Project time management and project cost management are independent processes. d) The risk management knowledge area includes risk Section reference 1 planning. e) The procurement knowledge area deals with contractual agreements. Answer: c Title: Assessment Question PI5.22 Learning Objective 1: LO PI5.3 Describe the five basic process groups and the nine knowledge areas of the project management body of knowledge. Section Reference 1: PI5.3 The Project Management Body of Knowledge Difficulty: Medium

Question Type: Essay

23) Describe the triple constraints of all projects.


Title: Assessment Question PI5.23 Learning Objective 1: LO PI5.1 Define a project, define information system project management, and describe the triple constraints of all projects. Section Reference 1: PI5.1 Project Management for Information Systems Projects Difficulty: Easy

24) Describe some of the possible trade-offs among the three constraints. Title: Assessment Question PI5.24 Learning Objective 1: LO PI5.1 Define a project, define information system project management, and describe the triple constraints of all projects. Section Reference 1: PI5.1 Project Management for Information Systems Projects Difficulty: Medium

25) What are runaway projects? Title: Assessment Question PI5.25 Learning Objective 1: LO PI5.2 Describe the five phases of the project management process. Section Reference 1: PI5.2 The Project Management Process Difficulty: Medium

26) Explain the goal of the Project Management Body of Knowledge. Title: Assessment Question PI5.26 Learning Objective 1: LO PI5.3 Describe the five basic process groups and the nine knowledge areas of the project management body of knowledge. Section Reference 1: PI5.3 The Project Management Body of Knowledge Difficulty: Medium

27) Discuss the major reasons that IT projects fail. Title: Assessment Question PI5.27 Learning Objective 1: LO PI5.2 Describe the five phases of the project management process. Section Reference 1: PI5.2 The Project Management Process Difficulty: Medium

28) Explain the nine knowledge areas of the Project Management Body of Knowledge. Title: Assessment Question PI5.28 Learning Objective 1: LO PI5.3 Describe the five basic process groups and the nine knowledge areas of the project management body of knowledge.


Section Reference 1: PI5.3 The Project Management Body of Knowledge Difficulty: Medium

Question Type: Multiple Choice

29) Hyo runs an ice cream shop with her family. They recently decided to buy and implement ice cream shop software called ScoopIT. They want to get it up and running before May 1st because that is when their busy season begins. Being finished by May 1st is one of the triple ________ of project management. a) concerns b) constraints c) challenges d) steps e) goals Answer: b Title: Assessment Question PI5.29 Learning Objective 1: LO PI5.1 Define a project, define information system project management, and describe the triple constraints of all projects. Section Reference 1: PI5.1 Project Management for Information Systems Projects Difficulty: Medium

30) Hyo runs an ice cream shop with her family. They recently decided to buy and implement ice cream shop software called ScoopIT. They want to get it up and running before May 1st because that is when their busy season begins. Which of the following statements is true? a) They won’t have to worry about scope creep. b) They don’t have to generate a Gantt chart. c) They don’t have to test the software. d) They have no alternatives if they are running late on their time plan. e) If they aren’t ready on time, they should consider it a failure. Answer: a Title: Assessment Question PI5.30 Learning Objective 1: LO PI5.2 Describe the five phases of the project management process. Section Reference 1: PI5.2 The Project Management Process Difficulty: Medium


31) Hyo runs an ice cream shop with her family. They recently decided to buy and implement ice cream shop software called ScoopIT. They want to get it up and running before May 1st because that is when their busy season begins. Which of the following statements is false? a) They should break the implementation into tasks. b) A task required for implementation should be assigned to a person. c) The task of testing the program as it is being implemented should be assigned to one person. d) Any tasks required for implementation should be detailed on a timeline. e) The best strategy is to purchase new technology to run the new software. Answer: e Title: Assessment Question PI5.31 Learning Objective 1: LO PI5.2 Describe the five phases of the project management process. Section Reference 1: PI5.2 The Project Management Process Difficulty: Medium


Package Title: Assessment Questions Course Title: MIS 1e Chapter Number: Plug IT In 6

Question Type: True/False

1) As businesses improve their information security, organized crime is turning its attention to consumers. Answer: True Title: Assessment Question PI6.01 Learning Objective 1: LO PI6.1 Explain why it is critical that you protect your information assets. Section Reference 1: PI6.1 How to Protect Your Assets: The Basics Difficulty: Easy

2) Social engineering attacks are a threat at work but typically not at home. Answer: False Title: Assessment Question PI6.02 Learning Objective 1: LO PI6.2 Identify the various behavioral actions you can take to protect your information assets. Section Reference 1: PI6.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy

3) You should ask whether your Social Security number is necessary for identification or if any combination of nine numbers and letters will do just as well. Answer: True Title: Assessment Question PI6.03 Learning Objective 1: LO PI6.2 Identify the various behavioral actions you can take to protect your information assets. Section Reference 1: PI6.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy

4) Using credit cards with your face on them will decrease your information security because clerks will look for your signature.


Answer: False Title: Assessment Question PI6.04 Learning Objective 1: LO PI6.2 Identify the various behavioral actions you can take to protect your information assets. Section Reference 1: PI6.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy

5) Virtual credit cards cannot be used for in-store purchases that require a traditional plastic card. Answer: True Title: Assessment Question PI6.05 Learning Objective 1: LO PI6.2 Identify the various behavioral actions you can take to protect your information assets. Section Reference 1: PI6.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy

6) You should keep close track of your credit card billing cycles. Answer: True Title: Assessment Question PI6.06 Learning Objective 1: LO PI6.2 Identify the various behavioral actions you can take to protect your information assets. Section Reference 1: PI6.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy

7) You should use debit cards because they are directly linked to your bank account and, therefore, you cannot overspend. Answer: False Title: Assessment Question PI6.07 Learning Objective 1: LO PI6.2 Identify the various behavioral actions you can take to protect your information assets. Section Reference 1: PI6.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy

8) Your credit card company bears the liability for fraudulent charges, regardless of when you notify them.


Answer: False Title: Assessment Question PI6.08 Learning Objective 1: LO PI6.2 Identify the various behavioral actions you can take to protect your information assets. Section Reference 1: PI6.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy

9) You should use a Post Office box for your personal mail. Answer: True Title: Assessment Question PI6.09 Learning Objective 1: LO PI6.2 Identify the various behavioral actions you can take to protect your information assets. Section Reference 1: PI6.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy

10) A single-cut shredder is sufficient to shred your documents at home, whereas a cross-cut (confetti) shredder is necessary at work because your work documents are more sensitive. Answer: False Title: Assessment Question PI6.10 Learning Objective 1: LO PI6.2 Identify the various behavioral actions you can take to protect your information assets. Section Reference 1: PI6.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy

11) Companies that provide proactive protection of your personal information allow customers to lock their credit files. Answer: True Title: Assessment Question PI6.11 Learning Objective 1: LO PI6.2 Identify the various behavioral actions you can take to protect your information assets. Section Reference 1: PI6.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy

12) It is possible for criminals to gain information about many people from social networking sites.


Answer: True Title: Assessment Question PI6.12 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Easy

13) It is OK to open an e-mail attachment as long as you know and trust the person who sent the e-mail. Answer: False Title: Assessment Question PI6.13 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Easy

14) You should update your definitions before scanning your system with anti-malware software. Answer: True Title: Assessment Question PI6.14 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Easy

15) One strategy for controlling spam is to set up multiple free e-mail accounts. Answer: True Title: Assessment Question PI6.15 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Easy

Question Type: Multiple Choice


16) A _____ offers you the option of shopping online with a disposable credit card number. a) Credit card b) Debit card c) Driver’s license d) Virtual credit card e) Bank card Answer: d Title: Assessment Question PI6.16 Learning Objective 1: LO PI6.2 Identify the various behavioral actions you can take to protect your information assets. Section Reference 1: PI6.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy

17) Which of the following statements is not correct? a) You should use credit cards with your picture on them. b) You may use virtual credit cards for additional security. c) You should use debit cards whenever possible for additional security. d) You cannot use virtual credit cards for in-store purchases. e) Signatures on credit cards are often impossible to read. Answer: c Title: Assessment Question PI6.17 Learning Objective 1: LO PI6.2 Identify the various behavioral actions you can take to protect your information assets. Section Reference 1: PI6.2 Behavioral Actions to Protect Your Information Assets Difficulty: Medium

18) Your liability with credit cards is typically _____, whereas your liability with debit cards is _____. a) The amount in your bank account, your credit limit b) Your credit limit, the amount in your bank account c) The amount in your bank account, zero d) Your credit limit, zero e) Zero, the amount in your bank account Answer: e


Title: Assessment Question PI6.18 Learning Objective 1: LO PI6.2 Identify the various behavioral actions you can take to protect your information assets. Section Reference 1: PI6.2 Behavioral Actions to Protect Your Information Assets Difficulty: Medium

19) Which of the following statements about companies that provide proactive protection of your information assets is not correct? a) These companies allow their customers to lock their credit files. b) These companies ensure that new lines of credit cannot be opened unless their clients unlock their credit files. c) These companies operate independently of the three major credit reporting agencies. d) Signing up with these companies means that merchants and banks must have verbal or written permission from their customers before opening new credit in their names. e) These companies will proactively monitor their clients’ credit files at the three credit reporting agencies. Answer: c Title: Assessment Question PI6.19 Learning Objective 1: LO PI6.2 Identify the various behavioral actions you can take to protect your information assets. Section Reference 1: PI6.2 Behavioral Actions to Protect Your Information Assets Difficulty: Hard

20) If your identity is stolen, what is the first thing you should do? a) Change all of your credit cards. b) Get a lawyer. c) Open a file with all of your paperwork. d) File a detailed police report. e) Notify the three major credit-reporting agencies. Answer: b Title: Assessment Question PI6.20 Learning Objective 1: LO PI6.2 Identify the various behavioral actions you can take to protect your information assets. Section Reference 1: PI6.2 Behavioral Actions to Protect Your Information Assets Difficulty: Medium


21) A(n) ___________ refers to software installed on your computer that controls communications to and from your computer by permitting or denying communications based on your security settings. a) Proactive monitoring package b) Anti-spyware package c) Content-filtering package d) Anti-malware package e) Personal firewall Answer: e Title: Assessment Question PI6.21 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Medium

22) Personal firewalls perform all of the following functions except: a) They should not respond to Internet requests to ports that are not used for common Internet use. b) They should seek out the origin of malware in an attempt to block it in the future. c) They should alert you to suspicious behavior. d) They should block outbound connections that you do not initiate. e) They should tell you when a program or connection is attempting to do something that you do not want. Answer: b Title: Assessment Question PI6.22 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Medium

23) _____ software logs keystrokes, e-mails, applications, windows, Web sites, Internet connection, passwords, chat conversations, Web cams, and screenshots. a) Firewall b) Anti-malware c) Monitoring d) Content-filtering e) Anti-spyware


Answer: c Title: Assessment Question PI6.23 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Easy

24) Content-filtering software performs all of the following functions except: a) Blocking access to undesirable Web sites. b) Recording all Web sites visited. c) Proactively monitoring computers to protect against malware attacks. d) Recording both sides of chat conversations. e) Enabling users to selectively filter content. Answer: c Title: Assessment Question PI6.24 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Medium

25) Which of the following is not a reason to install proactive intrusion detection and prevention software on your computer? a) Anti-malware software is reactive. b) This software reduces your vulnerability to zero-day attacks. c) Anti-malware software requires you to update malware signatures on a regular basis. d) This software reduces your vulnerability to distributed denial-of-service attacks. e) None of these Answer: d Title: Assessment Question PI6.25 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Hard


26) Which of the following attacks is most closely associated with downloading and installing patches immediately? a) Denial-of-service b) Zero-day attacks c) Distributed denial-of-service d) Viruses e) Worms Answer: b Title: Assessment Question PI6.26 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Hard

27) Methods you should use to protect your portable devices and information include all of the following except: a) Using two-factor authentication. b) Making certain not to leave your portable devices in plain view in a car. c) Keeping your portable devices in an inconspicuous container. d) Encrypting the hard drive of your laptop. e) All of these are legitimate protection methods. Answer: e Title: Assessment Question PI6.27 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Medium

28) A(n) _____ is a computer to which you connect, that in turn connects to the Web site you wish to visit. a) Proxy server b) Internet server c) Intermediate server d) Backbone server e) E-mail server Answer: a


Title: Assessment Question PI6.28 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Easy

29) A _____ cookie either originates on, or is sent to, the Web site that you are currently viewing. a) Tracking b) Monitoring c) Second-party d) Third-party e) First-party Answer: e Title: Assessment Question PI6.29 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Easy

30. A _____ cookie either originates on, or is sent to, a different Web site than the one you are currently viewing. a) Tracking cookie b) Monitoring cookie c) Second-party cookie d) Third-party cookie e) First-party cookie Answer: d Title: Assessment Question PI6.30 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Easy

31) For security in your wireless computing, you should use the _____ encryption standard, rather than the older _____ encryption standard.


a) WPA, WEP b) WPA2, WPA c) WEP, WPA d) WPA2, WEP e) WEP, WPB Answer: d Title: Assessment Question PI6.31 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Easy

Question Type: Essay

32) Describe the functions of anti-malware software on your computer. Title: Assessment Question PI6.32 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Medium

33) What functions should a personal firewall provide for you? Title: Assessment Question PI6.33 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Medium

34) What functions should you expect from monitoring software on your computer? Title: Assessment Question PI6.34 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Medium


35) What functions should you expect from content-filtering software on your computer? Title: Assessment Question PI6.35 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Medium

36) Describe the steps you should take to protect yourself when computing wirelessly. Title: Assessment Question PI6.36 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Medium 37) It’s hard to remember lots of passwords, so why not use just one? Title: Assessment Question PI6.37 Learning Objective 1: LO PI6.2 Identify the various behavioral actions you can take to protect your information assets. Section Reference 1: PI6.2 Behavioral Actions to Protect Your Information Assets Difficulty: Medium

38) Why is it so important to protect your information assets? Title: Assessment Question PI6.38 Learning Objective 1: LO PI6.1 Explain why it is critical that you protect your information assets. Section Reference 1: PI6.1 How to Protect Your Assets: The Basics Difficulty: Hard

39) Discuss the pros and cons of using credit cards vs. debit cards. Title: Assessment Question PI6.39 Learning Objective 1: LO PI6.2 Identify the various behavioral actions you can take to protect your information assets. Section Reference 1: PI6.2 Behavioral Actions to Protect Your Information Assets Difficulty: Hard


40) Discuss the benefits of using the services of companies that provide proactive protection of your personal information. Title: Assessment Question PI6.40 Learning Objective 1: LO PI6.2 Identify the various behavioral actions you can take to protect your information assets. Section Reference 1: PI6.2 Behavioral Actions to Protect Your Information Assets Difficulty: Hard

41) List and explain the actions you should take if your identity is stolen. Title: Assessment Question PI6.41 Learning Objective 1: LO PI6.2 Identify the various behavioral actions you can take to protect your information assets. Section Reference 1: PI6.2 Behavioral Actions to Protect Your Information Assets Difficulty: Hard

42) Discuss the dangers of social networking Web sites. Title: Assessment Question PI6.42 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Hard

Question Type: Multiple Choice

43) Which of the following is a good password? a) Your last name b) Your birth date c) Your mother’s name and her birth date d) Your driver’s license number e) Your social security number Answer: c Title: Assessment Question PI6.43 Learning Objective 1: LO PI6.2 Identify the various behavioral actions you can take to protect your information assets. Section Reference 1: PI6.2 Behavioral Actions to Protect Your Information Assets Difficulty: Easy


44) Your little brother came for a visit and used your laptop. You didn’t think anything of it at the time, but now your laptop is running really slow. Which of the following statements is false? a) It can’t be a worm because your anti-malware software would have blocked it. b) It can’t be a Trojan horse because your anti-spam software would have blocked it. c) It can’t be your brother’s fault because he only visited Web sites, and he didn’t open any files. d) Your brother admits to opening a joke file on his e-mail, but the file was from a good friend, so it can’t be your brother’s fault. e) All of these statements are false. Answer: e Title: Assessment Question PI6.44 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Medium 45) You got careless and left your laptop in a taxi back from the airport. However, you aren’t too worried about your information. Which of the following should not a reason for your attitude? a) You back up all your files every Monday night. b) You encrypt all of your personal information. c) Your operating system requires a password at start-up. d) You have trace software on your laptop. e) You named the file that contains your list of passwords BirthdaysToRemember. Answer: e Title: Assessment Question PI6.45 Learning Objective 1: LO PI6.3 Identify the various computer-based actions you can take to protect your information assets. Section Reference 1: PI6.3 Computer-Based Actions to Protect Your Information Assets Difficulty: Hard


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.