TESTBANK Louis Magguilli
EXPERIENCING MIS Fourth Canadian Edition David M. Kroenke Andrew Gemino Peter Tingling
Experiencing MIS, Cdn. Ed., 4e (Kroenke) Chapter 1 Information Systems and You 1) MIS only matters to MIS majors and not to students in other business disciplines. Answer: FALSE Diff: 1 Type: TF Page Ref: 7 Topic: Q7 Skill: RECALL 2) Information systems are not created for the sheer joy of exploring technology. Answer: TRUE Diff: 1 Type: TF Page Ref: 7; 9 Topic: Q7 Skill: RECALL 3) You must be a technology wizard to achieve the company's goals and objectives using IT. Answer: FALSE Diff: 2 Type: TF Page Ref: 8 Topic: Q5 Skill: RECALL 4) Moore's Law can be expressed as "the speed of a computer chip doubles every 20 months." Answer: TRUE Diff: 1 Type: TF Page Ref: 14 Topic: Q6 Skill: RECALL 5) In the next decade unlimited storage will be almost free. Answer: TRUE Diff: 2 Type: TF Page Ref: 18 Topic: Q6 Skill: APPLIED 6) Google uses a function called "content extraction" for Gmail accounts to understand the content of users' e-mails. Answer: TRUE Diff: 2 Type: TF Page Ref: 17 Topic: Q1 Skill: RECALL 7) Information system is a group of components that interact to produce information. Answer: TRUE Diff: 1 Type: TF Page Ref: 10 Topic: Q1 Skill: RECALL
1 Copyright © 2016 Pearson Canada Inc.
8) Information systems must include the use of a computer. Answer: FALSE Diff: 1 Type: TF Page Ref: 6 Topic: Q1 Skill: RECALL 9) According to Industry Canada, Canada's ICT industry has grown faster than the country's overall GDP since 2002. Answer: TRUE Diff: 1 Type: TF Page Ref: 12 Topic: Q4 Skill: RECALL 10) Information technology (IT) refers to methods, inventions, standards, and products. Answer: TRUE Diff: 1 Type: TF Page Ref: 10 Topic: Q1 Skill: RECALL 11) Most managers will get involved in purchasing computer hardware and building systems. Answer: FALSE Diff: 1 Type: TF Page Ref: 7 Topic: Q5 Skill: APPLIED 12) MIS stands for "Management Information Sciences." Answer: FALSE Diff: 1 Type: TF Page Ref: 3 Topic: Q1 Skill: RECALL 13) MIS is embedded in an IT system. Answer: FALSE Diff: 1 Type: TF Page Ref: 10 Topic: Q3 Skill: RECALL 14) Information systems are created to solve business needs. Answer: TRUE Diff: 1 Type: TF Page Ref: 7 Topic: Q2 Skill: APPLIED
2 Copyright © 2016 Pearson Canada Inc.
15) Email is an example of an information system. Answer: TRUE Diff: 1 Type: TF Page Ref: 13 Topic: Q1 Skill: RECALL 16) To gain a competitive advantage it is important that one be an IT developer. Answer: FALSE Diff: 2 Type: TF Page Ref: 13 & 14 Topic: Q5 Skill: APPLIED 17) An important skill in business is to be able to identify opportunities for innovation through the use of information systems. Answer: TRUE Diff: 2 Type: TF Page Ref: 13 & 14 Topic: Q5 Skill: APPLIED 18) MIS is the development and use of information systems to help organizations accomplish their goals and objectives. Answer: TRUE Diff: 1 Type: TF Page Ref: 7 Topic: Q2 Skill: RECALL 19) Most innovative uses of IT have already been invented. Answer: FALSE Diff: 1 Type: TF Page Ref: VARIOUS IMPLIED Topic: Q4 Skill: APPLIED 20) The decreasing price and increasing power of computer chips is one of the main drivers for improvements in information systems. Answer: TRUE Diff: 2 Type: TF Page Ref: 16 Topic: Q6 Skill: APPLIED 21) Moore's Law states that the number of circuits (Microprocessor Transistors) will double every four years. Answer: FALSE Diff: 2 Type: TF Page Ref: 15 Topic: Q6 Skill: RECALL
3 Copyright © 2016 Pearson Canada Inc.
22) Understanding the implications of technological change allows for greater effectiveness of business professionals. Answer: TRUE Diff: 2 Type: TF Page Ref: 18 Topic: Q6 Skill: RECALL 23) A combination of business and technology skills can open a number of doors in the new Canadian economy. Answer: TRUE Diff: 2 Type: TF Page Ref: VARIOUS Topic: Q6 Skill: APPLIED 24) This class is solely about learning how to use Excel and Access. Answer: FALSE Diff: 2 Type: TF Page Ref: 18 Topic: Q7 Skill: RECALL 25) According to "Outlook on Human Resources in the ICT Labour Market: 2008 - 2015" satisfactory communications and other business skills are important core skills for individuals looking for a career in this industry sector. Answer: TRUE Diff: 1 Type: TF Page Ref: 14 Topic: Q5 Skill: RECALL 26) You can maximize the value of this course by personalizing the material Answer: TRUE Diff: 2 Type: TF Page Ref: 22 Topic: Q7 Skill: RECALL 27) The basic premise of Moore's law is A) IT makes people more efficient. B) the density of transistors on a computer chip doubles roughly every 20 months. C) people tend to want more information than they need. D) IT makes people more productive. E) computer memory is getting bigger. Answer: B Diff: 2 Type: MC Page Ref: 15 Topic: Q6 Skill: RECALL
4 Copyright © 2016 Pearson Canada Inc.
28) Social Networking sites generate revenue through A) government subsidy. B) subscription fees. C) social networking sites do not generate revenue. D) advertising. E) corporate sponsorship. Answer: D Diff: 1 Type: MC Page Ref: 8 Topic: Q2 Skill: APPLIED 29) Which of the following is an example of a social networking site? A) YouTube B) Yahoo.ca C) Facebook.com D) Wikipedia E) Google.ca Answer: C Diff: 1 Type: MC Page Ref: 8 Topic: Q2 Skill: RECALL 30) Which of the following is NOT considered a function of a social networking site? A) A repository for personal profiles B) Video sharing C) Searching for new / unused books D) Indirect selling of products E) Searching for friends Answer: C Diff: 1 Type: MC Page Ref: 9 Topic: Q1 Skill: APPLIED 31) What is an Information System? A) An information system is a group of components that interact to produce information. B) Computer hardware and software C) Software development process D) A framework describing human computer interaction E) An information gathering application Answer: A Diff: 2 Type: MC Page Ref: 6 Topic: Q1 Skill: RECALL
5 Copyright © 2016 Pearson Canada Inc.
32) How does IT differ from IS? A) IT costs money while IS doesn't. B) IT is a newer word for IS. C) IT refers to methods, invention, standards and products while IS is a system of hardware, software, data, procedures and people that produces information. D) IT and IS are the same. E) IT doesn't matter but IS does. Answer: C Diff: 2 Type: MC Page Ref: 10 Topic: Q3 Skill: APPLIED 33) Which of the following best describes the five-component framework of IS? A) Hardware, software, data, procedures, and people B) Networks, software, servers, programmers, and managers C) Applications, people, standards, budgets, and software D) Storage, processing, input, output, and control E) Applications, processes, processing, data, and standards Answer: A Diff: 2 Type: MC Page Ref: 7 Topic: Q1 Skill: RECALL 34) Information systems exists to help businesses to A) save money. B) better organize our lives. C) be more profitable. D) be more competitive. E) achieve goals and objectives. Answer: E Diff: 1 Type: MC Page Ref: 7 Topic: Q2 Skill: RECALL 35) As a business professional, one needs to look at information systems only through the lens of A) business need. B) technology. C) cost savings. D) software. E) business processes. Answer: A Diff: 2 Type: MC Page Ref: 14 Topic: Q5 Skill: APPLIED
6 Copyright © 2016 Pearson Canada Inc.
36) Which of the following is the federal government agency responsible for categorizing industry sectors and collecting information about them? A) Industry Canada B) Bank of Canada C) Ministry of Finance D) Canada Revenue Agency E) Ministry of Defense Answer: A Diff: 1 Type: MC Page Ref: 11 Topic: Q4 Skill: RECALL 37) According to Industry Canada, the Canadian ICT sector in 2011 included over A) 23,000 companies. B) 33,000 companies. C) 40,000 companies. D) 10,000 companies. E) 28,000 companies. Answer: B Diff: 3 Type: MC Page Ref: 11 Topic: Q4 Skill: RECALL 38) According to Industry Canada, how much did the Canada's ICT sector add to the Canadian Gross Domestic Product in 2011? A) 67.2 billion B) 1.1 billion C) 27.6 billion D) 150.5 billion E) 125.0 billion Answer: A Diff: 2 Type: MC Page Ref: 11 Topic: Q4 Skill: RECALL 39) According to Industry Canada, the average annual growth rate in the Canadian ICT sector since 2007 has been around A) 6.2%. B) the GDP growth rate. C) 1.6%. D) 4.2%. E) 8.1%. Answer: C Diff: 3 Type: MC Page Ref: 10 Topic: Q4 Skill: RECALL 7 Copyright © 2016 Pearson Canada Inc.
40) What was the approximate number of Canadian workers employed by the ICT sector in 2011 according to Industry Canada? A) 563,000 B) 422,000 C) 592,000 D) 420,000 E) 233,000 Answer: A Diff: 2 Type: MC Page Ref: 12 Topic: Q4 Skill: RECALL 41) How much did the average Canadian ICT worker earned in 2011 according to Industry Canada? A) $90,000 B) $19,000 C) $75,000 D) $68,000 E) $59,000 Answer: D Diff: 2 Type: MC Page Ref: 12 Topic: Q4 Skill: RECALL 42) Which of the following segments of the ICT sector in Canada is responsible for the majority of this sectors revenue, according to Industry Canada? A) Software B) Manufacturing C) Services D) Export E) Hardware Answer: C Diff: 2 Type: MC Page Ref: 12 Topic: Q4 Skill: RECALL 43) Google uses Gmail's "content extraction" to A) track all the online activities of Gmail users. B) target advertising to Gmail users. C) sell advertising. D) find out the interests of Gmail users. E) track IP addresses. Answer: B Diff: 2 Type: MC Page Ref: 16 Topic: Q6 Skill: RECALL 8 Copyright © 2016 Pearson Canada Inc.
44) Gordon Moore is one of the founders of A) Intel Corporation. B) Adobe Systems. C) Cisco Systems. D) Microsoft Corporation. E) National Semiconductors. Answer: A Diff: 1 Type: MC Page Ref: 15 Topic: Q6 Skill: RECALL 45) Moore's Law states that A) the complexity of the microprocessor will drop by 50% every 20 months. B) the number of transistors on a microprocessor doubles every 12 months. C) the price of a computer doubles every 12 months. D) the density of circuits on an integrated chip will double approximately every 2 years. E) the price of a microprocessor decreases by 50% every 20 months. Answer: D Diff: 1 Type: MC Page Ref: 14 & 15 Topic: Q6 Skill: RECALL 46) Which ratio has decreased over the years due to Moore's Law? A) Speed/reliability B) Price/performance C) Transistor/performance D) Price/Megahertz E) Cost/benefit Answer: B Diff: 2 Type: MC Page Ref: 15 Topic: Q6 Skill: RECALL 47) Which of the following will essentially be free within the next decade? A) Web sites B) Data storage C) Routers D) PCs E) Networks Answer: B Diff: 1 Type: MC Page Ref: 17 Topic: Q6 Skill: RECALL
9 Copyright © 2016 Pearson Canada Inc.
48) Hal Varian suggests that mobility devices will change "what it means to go to work." What does he mean by this? A) There will be less work. B) Networks are a thing of the past. C) You will have to go to the work. D) You will deal with work at home. E) The work will come to you. Answer: E Diff: 2 Type: MC Page Ref: 17 Topic: Q6 Skill: APPLIED 49) Which of the following is an example of a company that offers a large amount of free IT resources? A) Wal-Mart B) Amazon C) Google D) Gartner E) Pearson Publishing Answer: C Diff: 2 Type: MC Page Ref: VARIOUS Topic: Q5 Skill: APPLIED 50) What does ICT stand for? A) Information Communications Terminology B) Information Computing Technology C) Information Communications Technology D) Industrial Communications Technology E) Industrial Computing Technology Answer: C Diff: 1 Type: MC Page Ref: 14 Topic: Q5 Skill: RECALL 51) Which of the following are NOT the responsibilities of the user of an Information System? A) Backing up data B) Programming the system C) Learning how to employ the system to accomplish your goals D) Helping recover the system E) Protecting the security of the system and its data Answer: B Diff: 3 Type: MC Page Ref: VARIOUS Topic: Q5 Skill: APPLIED
10 Copyright © 2016 Pearson Canada Inc.
52) The Running Room web site A) handles online purchases. B) provides unique services that are not available in stores. C) provides discussion groups. D) provides information efficiently to customers. E) all of the above. Answer: E Diff: 3 Type: MC Page Ref: 21 Topic: Q5, Q6 Skill: APPLIED 53) ________ is (are) often the most important part of an information system. A) People B) Processes C) Hardware D) Data E) Software Answer: A Diff: 2 Type: MC Page Ref: VARIOUS Topic: Q5 Skill: APPLIED 54) MIS can be defined as A) the development and use of information systems that achieve business goals and objectives. B) the use of information systems to develop business strategies. C) the use of information systems that achieve business goals and objectives. D) the development of information systems that helps a business to save money. E) the development and use of information systems to cut cost. Answer: A Diff: 1 Type: MC Page Ref: 7 Topic: Q2 Skill: RECALL 55) The critical difference between information systems and information technology is? A) The computers B) The way computers are used C) The people D) The information and data E) The computer programs Answer: C Diff: 3 Type: MC Page Ref: 10 Topic: Q3 Skill: APPLIED
11 Copyright © 2016 Pearson Canada Inc.
56) Google's use of "content extraction" with Gmail is a concern for? A) Academics B) Google C) Privacy advocates D) Governments E) Competitors Answer: C Diff: 3 Type: MC Page Ref: 16 Topic: Q6 Skill: APPLIED 57) According to Industry Canada, the percentage of software and computer service companies in the Canadian ICT section in 2011 was A) 87%. B) 6%. C) 23%. D) 17%. E) 49%. Answer: A Diff: 2 Type: MC Page Ref: 12 Topic: Q4 Skill: RECALL 58) According to Industry Canada, the total number of jobs in the Canadian ICT sector in 2011 was about A) 522,000. B) 171,000. C) 717,000. D) 63,000. E) 480,000. Answer: A Diff: 2 Type: MC Page Ref: 12 Topic: Q5 Skill: RECALL 59) Which of the following sectors in Canada's ICT industry had the greatest amount of employment in Canada in 2011, according to Industry Canada? A) Law enforcement B) Manufacturing C) Pharmaceutical Research D) Education E) Software and computer services industries Answer: E Diff: 2 Type: MC Page Ref: 12 Topic: Q4 Skill: RECALL 12 Copyright © 2016 Pearson Canada Inc.
60) According to Industry Canada, what is the percentage of the Canadian workforce have a university degree? A) 29% B) 23% C) 53% D) 43% E) 47% Answer: C Diff: 3 Type: MC Page Ref: 12 Topic: Q4 Skill: RECALL 61) According to Industry Canada, the average earnings of a software and computer services worker in Canada in 2011 is A) about $62 000. B) about $85 000. C) about $72 000. D) about $55 000. E) about $67 000. Answer: C Diff: 3 Type: MC Page Ref: 12 Topic: Q4 Skill: RECALL 62) According to Industry Canada, in 2011 the percentage of Canadian ICT workers who have a university degree is A) 45%. B) 40%. C) 41%. D) 43%. E) 42%. Answer: A Diff: 3 Type: MC Page Ref: 12 Topic: Q4 Skill: RECALL 63) All of the following are components of an information system EXCEPT A) procedures. B) culture. C) people. D) software. E) hardware. Answer: B Diff: 2 Type: MC Page Ref: 6 Topic: Q1 Skill: RECALL 13 Copyright © 2016 Pearson Canada Inc.
64) According to Moore's Law, an integrated chip's circuit density should ________ every 20 months. A) grow 50% B) decrease 50% C) increase 1% D) grow 100% E) gradually increase Answer: D Diff: 3 Type: MC Page Ref: 15 Topic: Q6 Skill: APPLIED 65) Network effects and lock-in of certain technologies affect which ratio? A) Values received decreases as the number of users increase. B) Values received increases as the number of users increase. C) Price increases as availability increases. D) Benefits decrease as the number of users increase. E) Values received increases as the costs increase. Answer: B Diff: 2 Type: MC Page Ref: 15 Topic: Q6 Skill: RECALL 66) It is expected that the complexity of computer chips will ________ over the next decade. A) stay about the same B) obey Moore's Law C) shrink D) continue to grow slowly E) grow more dramatically Answer: B Diff: 2 Type: MC Page Ref: 15 Topic: Q6 Skill: RECALL 67) An information system helps businesses achieve A) its goals and objectives. B) parity. C) waking up employees. D) security. E) fairness. Answer: A Diff: 1 Type: MC Page Ref: 7 Topic: Q2 Skill: RECALL
14 Copyright © 2016 Pearson Canada Inc.
68) Information technology focuses on the hardware, software, and ________ components of an information system. A) data B) security C) procedures D) software E) people Answer: A Diff: 2 Type: MC Page Ref: 10 Topic: Q3 Skill: RECALL 69) Information technology only becomes useful when it is combined with the people and ________ components of an information system. A) process B) software C) hardware D) data E) procedure Answer: E Diff: 2 Type: MC Page Ref: 10 Topic: Q3 Skill: RECALL 70) One example of a simple information system that business people use would be A) instant messaging. B) a hard drive. C) a cell phone. D) a keyboard. E) a wireless mouse. Answer: A Diff: 2 Type: MC Page Ref: 13 Topic: Q3 Skill: APPLIED 71) A blog would be an example of A) IT procedures. B) an information technology. C) an information system. D) an email system. E) an infrastructure system. Answer: C Diff: 3 Type: MC Page Ref: 9 Topic: Q3 Skill: APPLIED
15 Copyright © 2016 Pearson Canada Inc.
72) The "ICT Labour Trends Outlook" report of 2010 indicates there is a dramatic need for individuals with core skills that include A) communications skills. B) non-technical skills. C) basic computer skills. D) accounting skills. E) marketing skills. Answer: A Diff: 3 Type: MC Page Ref: 14 Topic: Q4 Skill: RECALL 73) Hal Varian notes that for business people A) the ability to handle data will be important for decades to come. B) learning about technology is not important. C) information technology does not change business. D) basic computer skills will be important for decades to come. E) information systems do not affect the way we work. Answer: A Diff: 3 Type: MC Page Ref: 10 Topic: Q6 Skill: APPLIED 74) A secondary focus of this class is A) learning to use Access in everyday tasks. B) learning to integrate tools like Excel and Access. C) learning how to use tools like Excel and Access to accomplish a business purpose. D) learning to use Excel to store data. E) to understand Information Systems. Answer: C Diff: 3 Type: MC Page Ref: 18 Topic: Q7 Skill: APPLIED 75) David Ticoll suggests that A) we will continue to see a divide between the real and the virtual world. B) we have already seen the pinnacle of network development. C) the technology trends of today will make performance-enhancing innovations available in almost every industry. D) we will continue to have problems in finding the hidden meaning from data. E) the cost of storage will almost be free in the next decade. Answer: E Diff: 3 Type: MC Page Ref: 18 Topic: Q6 Skill: APPLIED
16 Copyright © 2016 Pearson Canada Inc.
76) Social media applications include A) email. B) spreadsheets. C) videos. D) databases. E) social networking sites. Answer: E Diff: 1 Type: MC Page Ref: 8 Topic: Q2 Skill: RECALL 77) The ________ sector revenues in Canada in 2011 were $67 billion. Answer: ICT Diff: 2 Type: SA Page Ref: 11 Topic: Q4 Skill: RECALL 78) Moore's Law tells us that the ________ ratio of computers has fallen dramatically for years. Answer: price/performance Diff: 2 Type: SA Page Ref: 11 Topic: Q4 Skill: RECALL 79) The term ________ is used to refer to computer components that are not hardware. Answer: software Diff: 1 Type: SA Page Ref: 6 Topic: Q1 Skill: RECALL 80) When using an information system, you will have responsibilities for protecting the ________ of the system and its data. Answer: security Diff: 2 Type: SA Page Ref: 8 Topic: Q2 Skill: RECALL 81) The definition of MIS is that information systems exist to help businesses achieve their ________. Answer: goals and objectives Diff: 3 Type: SA Page Ref: 7 Topic: Q2 Skill: APPLIED
17 Copyright © 2016 Pearson Canada Inc.
82) The Running Room has used its web site to increase its ________ to customers. Answer: reach Diff: 2 Type: SA Page Ref: 18 Topic: Q6 Skill: RECALL 83) Moore's Law states that the number of ________ per square inch on an integrated chip doubles every 20 months. Answer: transistors Diff: 2 Type: SA Page Ref: 15 Topic: Q6 Skill: RECALL 84) Moore's Law has proved generally accurate for more than ________ years. Answer: 50 Diff: 1 Type: SA Page Ref: 15 Topic: Q6 Skill: RECALL 85) ________ is a group of components that interact to produce information. Answer: MIS Diff: 1 Type: SA Page Ref: 6 Topic: Q1 Skill: RECALL 86) The ICT sector in Canada, has had ________ the overall growth of the national GDP since 2002. Answer: twice Diff: 2 Type: SA Page Ref: 11 Topic: Q4 Skill: RECALL 87) MIS stands for ________. Answer: management information system Diff: 1 Type: SA Page Ref: 7 Topic: Q1 Skill: RECALL 88) ________ are defined as the development and use of information systems that help businesses to achieve their goals and objectives. Answer: Information Systems Diff: 1 Type: SA Page Ref: 8 Topic: Q2 Skill: RECALL
18 Copyright © 2016 Pearson Canada Inc.
89) A(n) ________ is a group of components designed to produce information. Answer: information Diff: 1 Type: SA Page Ref: 6 Topic: Q1 Skill: RECALL 90) Every information system can be thought of as consisting of ________ components. Answer: five Diff: 2 Type: SA Page Ref: 6 Topic: Q1 Skill: APPLIED 91) Every information system contains hardware, software, people, data and ________. Answer: procedures Diff: 2 Type: SA Page Ref: 6 Topic: Q1 Skill: RECALL 92) Every information system contains hardware, software, people, ________, and procedures. Answer: data Diff: 2 Type: SA Page Ref: 6 Topic: Q1 Skill: RECALL 93) The study of MIS is not just about learning to use spreadsheets and databases, but about learning how to use these tools to accomplish a(n) ________ purpose. Answer: business Diff: 2 Type: SA Page Ref: 13 Topic: Q5 Skill: APPLIED 94) Information technology (IT) concerns only the hardware, software, and ________ components of an information system. Answer: data Diff: 2 Type: SA Page Ref: 10 Topic: Q3 Skill: RECALL 95) Although simple, e-mail would be an example of a(n) ________. Answer: information system Diff: 2 Type: SA Page Ref: 6 Topic: Q3 Skill: APPLIED
19 Copyright © 2016 Pearson Canada Inc.
96) Changes in technology have advanced to a point where the content of an individual's email can now be used to determine the advertising that individual sees in their web mail account. This has resulted in ________ concerns. Answer: privacy Diff: 3 Type: SA Page Ref: 16 Topic: Q6 Skill: APPLIED 97) To understand MIS you need to both understand and relate ________ and technology to one another. Answer: business Diff: 3 Type: SA Page Ref: 13 Topic: Q5 Skill: APPLIED 98) The ability to use basic information systems is ________ in today's work environment. Answer: essential Diff: 2 Type: SA Page Ref: 13 Topic: Q5 Skill: APPLIED 99) To gain a competitive advantage in today's work place your skills need to go beyond the basic use of ________. Answer: information systems Diff: 3 Type: SA Page Ref: 13 Topic: Q5 Skill: APPLIED 100) In the next decade David Ticoll suggests that ________ will almost be free. Answer: unlimited storage Diff: 2 Type: SA Page Ref: 17 Topic: Q6 Skill: RECALL 101) The collision of the real world and the virtual world will be the result of cheap, reliable, and widely available ________. Answer: networks Diff: 2 Type: SA Page Ref: 18 Topic: Q6 Skill: APPLIED 102) You can maximize the value of this course by ________ the material. Answer: personalizing Diff: 2 Type: SA Page Ref: 22 Topic: Q7 Skill: RECALL 20 Copyright © 2016 Pearson Canada Inc.
103) What does Moore's law have to do with the amount of data being generated today? Do you see this trend continuing? Answer: Gordon Moore's famous observation was made in 1965. It projects the doubling of transistors every couple of years. Moore's Law has been maintained and still holds true today. With respect to storage devices, their capacity has been growing just as rapidly which, in turn, is driving down the price of storage. So now it is feasible to have many exabytes of storage for things like audio and video files. Yes this will most definitely continue to expand, and it is difficult to see where it will end, but things like real time video feeds and real time virtual reality simulations will take huge amounts of processing power and memory in order to store them. Diff: 3 Type: ES Topic: Q6 Skill: APPLIED
Page Ref: 15
104) Why is it important for business professionals to know about MIS? Answer: The decisions concerning what functions should be included in corporate information systems is too important to be simply left to the techies. Every business professional should have some knowledge about MIS so that they can be intelligent users and help the system designers to design better systems. Knowing what systems are capable of doing will help when they are interviewed by the systems analysts to determine what the system requirements of the new system will be. They will also have to frequently interact with techies in order to help debug existing systems and even to generate ideas for new applications to improve the company's competitive position. Diff: 2 Type: ES Page Ref: 18 Topic: Q6 Skill: APPLIED 105) How is IT different from an information system? Why is this important? Answer: Whereas IT is concerned with computer hardware, software, and data, which are certainly part of an information system, an information system is a broader concept than IT by itself. Information systems include IT, but also focus on the people that use it and the procedures for using it properly. This is important because IT is just a tool and to get the most out of it, we need to realize that people have to be trained and that proper procedures for using it have to be in place. Diff: 3 Type: ES Page Ref: 10 Topic: Q3 Skill: RECALL 106) Explain the difference between Information Technology (IT) and Information Systems (IS). Answer: Information technology and information systems are two closely related terms, but they are different. Information technology refers to methods, inventions, standards, and products. As the term implies, IT refers to raw technology, and it concerns only the hardware, software, and data components of an information system. In contrast, an information system is a system of hardware, data, procedures, and people that produce information. Diff: 2 Type: ES Page Ref: 10 Topic: Q3 Skill: RECALL 21 Copyright © 2016 Pearson Canada Inc.
107) Describe the functions of a social networking site. Answer: Social Networking sites provides users with the ability not only to create his/her own personal profile, but also to link this profile to friends, family, team members, and other web acquaintances with similar sites. Diff: 3 Type: ES Page Ref: VARIOUS Topic: Q1, Q2 Skill: APPLIED 108) List what the 5 component framework of Information Systems entail? Answer: The 5 component framework of Information Systems consist of hardware, software, data, procedures, and people. Diff: 3 Type: ES Page Ref: 6 Topic: Q1 Skill: RECALL 109) What are the responsibilities of a user of Information Systems? Answer: In addition to learning how to use a system, a user is also responsible for protecting the security of the system and its data. When the system fails, a user will have tasks to perform while the system is down, as well as tasks accomplish to help recover the system correctly and quickly. Diff: 3 Type: ES Page Ref: VARIOUS Topic: Q5 Skill: APPLIED 110) Describe the essence of Moore's Law. Answer: In 1965, Gordon Moore said that because of technology improvements in electronic chip design and manufacturing, "The number of transistors per square inch on an integrated chip doubles roughly every 2 years (20 months)." Diff: 3 Type: ES Page Ref: 14 Topic: Q6 Skill: APPLIED 111) What is the definition of MIS? Answer: MIS is the development and use of information systems that help businesses achieve their goals and objectives. This definition has three key elements: development and use, information systems, and business goals and objectives. Diff: 2 Type: ES Page Ref: 7 Topic: Q1 Skill: RECALL
22 Copyright © 2016 Pearson Canada Inc.
112) Describe an example of a company taking advantage of IT resources to further its business interests. Answer: Google uses "content extraction" to better it target its advertising on Gmail to users that may more likely be interested in the ads that they are being shown. The Running Room is using the web to create a better sense of community among its online customers. Diff: 3 Type: ES Page Ref: VARIOUS Topic: Q5 Skill: RECALL 113) What are the required qualifications for those who would like to take advantage of the jobs created by the software and computer services industry? Answer: It is a knowledge-intensive industry where approximately half of all workers process university degrees. Students in the Canadian economy who are working toward becoming business professionals cannot ignore the importance of understanding and working with information systems. Diff: 3 Type: ES Page Ref: 12 Topic: Q4 Skill: APPLIED
23 Copyright © 2016 Pearson Canada Inc.
Experiencing MIS, Cdn. Ed., 4e (Kroenke) Chapter 2 Business Processes and Decision Making 1) Business processes are synonymous with business systems. Answer: TRUE Diff: 1 Type: TF Page Ref: 26 Topic: Q2 Skill: RECALL 2) You should always ask yourself "how can I use my time in school to enhance those skills I already have?" Answer: TRUE Diff: 2 Type: TF Page Ref: 44 Topic: Q8 Skill: RECALL 3) The inventory management process includes placing orders and receiving goods into inventory. Answer: TRUE Diff: 1 Type: TF Page Ref: 26 Topic: Q2 Skill: APPLIED 4) In the payment process, the invoice is compared to the purchase order. Answer: TRUE Diff: 3 Type: TF Page Ref: 27 Topic: Q2 Skill: APPLIED 5) A copy of the purchase order is sent to the customer. Answer: FALSE Diff: 2 Type: TF Page Ref: 27 Topic: Q2 Skill: RECALL 6) A business process consists of activities, resources, facilities, and information. Answer: TRUE Diff: 1 Type: TF Page Ref: 28 Topic: Q3 Skill: RECALL 7) Any item of value can be considered to be a potential resource for a business process. Answer: TRUE Diff: 1 Type: TF Page Ref: 28 Topic: Q3 Skill: RECALL 1 Copyright © 2016 Pearson Canada Inc.
8) Activities transform resources and data into different kinds of resources and data. Answer: FALSE Diff: 2 Type: TF Page Ref: 28 Topic: Q3 Skill: RECALL 9) An inventory database would be considered to be an example of a facility in the inventory management process. Answer: TRUE Diff: 2 Type: TF Page Ref: 28 Topic: Q3 Skill: RECALL 10) The fact that it rained 1.2 inches today is an example of information. Answer: FALSE Diff: 2 Type: TF Page Ref: 28 Topic: Q3 Skill: APPLIED 11) The fact that the sun rose this morning at 6:25 a.m. is an example of data. Answer: TRUE Diff: 2 Type: TF Page Ref: 29 Topic: Q4 Skill: APPLIED 12) Data is another word for information. Answer: FALSE Diff: 2 Type: TF Page Ref: 29 Topic: Q4 Skill: APPLIED 13) When data is presented with a meaningful context, it becomes information. Answer: TRUE Diff: 1 Type: TF Page Ref: 29 Topic: Q4 Skill: RECALL 14) The information that is the output of one process can be viewed as a data input to another process. Answer: TRUE Diff: 2 Type: TF Page Ref: 29 Topic: Q4 Skill: APPLIED
2 Copyright © 2016 Pearson Canada Inc.
15) Each activity within a business process must use one, and only one, information system. Answer: FALSE Diff: 2 Type: TF Page Ref: 28 Topic: Q3 Skill: RECALL 16) It is good business practice for a payment activity to have a single person assigned to approve payments and generate checks. Answer: FALSE Diff: 3 Type: TF Page Ref: 33 Topic: Q6 Skill: RECALL 17) Strategic decisions involve long term actions whose consequences may not be realized for years. Answer: TRUE Diff: 2 Type: TF Page Ref: 36 Topic: Q7 Skill: RECALL 18) A structured decision involves an understood and accepted method for making the decision. Answer: TRUE Diff: 2 Type: TF Page Ref: 36 Topic: Q7 Skill: RECALL 19) A transaction processing system helps managers allocate and utilize resources. Answer: FALSE Diff: 2 Type: TF Page Ref: 35 Topic: Q7 Skill: RECALL 20) During intelligence gathering, the decision makers determine what is to be decided, what the criteria for the decision will be, and what data are available. Answer: TRUE Diff: 3 Type: TF Page Ref: 37 Topic: Q7 Skill: RECALL 21) While weather is an unstructured phenomenon, weather forecasting is an example of structured decision making. Answer: TRUE Diff: 3 Type: TF Page Ref: 37 Topic: Q7 Skill: APPLIED
3 Copyright © 2016 Pearson Canada Inc.
22) The quality of your thinking is a large part of the quality of the information system. Answer: TRUE Diff: 2 Type: TF Page Ref: 39 Topic: Q8 Skill: RECALL 23) The review step may lead to another decision and another iteration of the decision making process. Answer: TRUE Diff: 2 Type: TF Page Ref: 37 Topic: Q7 Skill: RECALL 24) Your mind and your thinking are not merely a component of the information systems you use; they are the most important component. Answer: TRUE Diff: 1 Type: TF Page Ref: 37 Topic: Q8 Skill: RECALL 25) Information needs to be just barely sufficient for the purpose for which it is generated. Answer: TRUE Diff: 2 Type: TF Page Ref: 30 Topic: Q4 Skill: RECALL 26) For information to be worth its cost, there must be an appropriate relationship between the cost of information and its value. Answer: TRUE Diff: 2 Type: TF Page Ref: 30 Topic: Q4 Skill: RECALL 27) A business process is A) a network of activities used to accomplish business goals. B) a set of required steps in a production process. C) a network of activities, resources, facilities, and information that interact to achieve some business function. D) a set of actives in a value chain. E) a set of activities in a supply chain. Answer: C Diff: 2 Type: MC Page Ref: 27 Topic: Q2 Skill: RECALL
4 Copyright © 2016 Pearson Canada Inc.
28) An information system must produce information that is A) worth its cost, relevant, barely sufficient, accurate. B) relevant, timely, all encompassing, worth its cost. C) just barely sufficient, only a year old, worth its cost. D) timely and accurate. E) accurate and worth its cost. Answer: A Diff: 3 Type: MC Page Ref: 29 Topic: Q4 Skill: RECALL 29) Which of the following are characteristics of good information? A) Worth its cost, timely, relevant, all encompassing B) Timely, expensive but complete, relevant C) Relevant, not many important errors, worth its cost D) Timely, expensive but complete, accurate E) Timely, relevant, worth its cost, barely sufficient, accurate Answer: E Diff: 3 Type: MC Page Ref: 29 Topic: Q4 Skill: APPLIED 30) Relevant information refers to information that is A) worth the value paid to generate it. B) useful to both the context and the subject at hand. C) good for the purpose for which it is generated. D) produced in time for its intended use. E) correct and complete. Answer: B Diff: 2 Type: MC Page Ref: 29 Topic: Q4 Skill: RECALL 31) Just barely sufficient information refers to information that is A) correct and complete. B) produced in time for its intended use. C) good for the purpose for which it is generated. D) not useful to the decision being made. E) useful to both the context and the subject at hand. Answer: C Diff: 2 Type: MC Page Ref: 29 Topic: Q4 Skill: RECALL
5 Copyright © 2016 Pearson Canada Inc.
32) "Worth its cost" refers to information A) that is produced in time for its intended use. B) that is good for the purpose for which it is generated. C) that is collected in a low-cost manner. D) that has an appropriate relationship between its cost and its value. E) that is useful to both the context and the subject at hand. Answer: D Diff: 2 Type: MC Page Ref: 29 Topic: Q4 Skill: RECALL 33) Operational decisions refer to A) the control of resources and activities over a time period of less than one month. B) day-to-day activities. C) an understood and accepted method for making decisions. D) the allocation and utilization of resources. E) broader-scope, organizational issues. Answer: B Diff: 2 Type: MC Page Ref: 35 Topic: Q7 Skill: RECALL 34) Managerial decisions refer to A) day-to-day activities. B) broader-scope, organizational issues. C) an understood and accepted method for making decisions. D) the allocation and utilization of resources. E) the control of resources and activities. Answer: D Diff: 2 Type: MC Page Ref: 35 Topic: Q7 Skill: RECALL 35) Strategic decision refer to A) the allocation and utilization of resources. B) broader-scope, organizational issues. C) day-to-day activities. D) transactions details. E) an understood and accepted method for making decisions. Answer: B Diff: 2 Type: MC Page Ref: 35 Topic: Q7 Skill: RECALL
6 Copyright © 2016 Pearson Canada Inc.
36) A Transaction Processing System supports A) transactional decisions. B) operational decisions. C) strategic decisions. D) executive decisions. E) managerial decisions. Answer: B Diff: 1 Type: MC Page Ref: 35 Topic: Q7 Skill: RECALL 37) A Management Information System supports A) operational decisions. B) managerial decisions. C) strategic decisions. D) unstructured decisions. E) executive decisions. Answer: B Diff: 1 Type: MC Page Ref: 35 Topic: Q7 Skill: RECALL 38) Operational Decisions involve A) long term actions. B) short term actions. C) allocation of resources. D) product line development. E) staffing quotas. Answer: B Diff: 1 Type: MC Page Ref: 36 Topic: Q7 Skill: RECALL 39) An understood and accepted method for making decisions is used to make A) managerial decisions. B) operational decisions. C) strategic decisions. D) executive decisions. E) structured decisions. Answer: E Diff: 3 Type: MC Page Ref: 38 Topic: Q7 Skill: RECALL
7 Copyright © 2016 Pearson Canada Inc.
40) An unstructured decision making process A) is one for which there is an agreed upon decision-making method. B) is one for which there is no documentation required. C) is one for which there are no structured steps. D) is one for which there are no formal procedures. E) is one for which there is no agreed-on decision-making method. Answer: E Diff: 3 Type: MC Page Ref: 36 Topic: Q7 Skill: RECALL 41) The step in a decision making process where decision markers determine what is to be decided, what the criteria for the decision will be, and what data are available is called A) alternatives formulation. B) decision analysis. C) intelligence gathering. D) the review step. E) the choice step. Answer: C Diff: 2 Type: MC Page Ref: 37 Topic: Q7 Skill: RECALL 42) The stage in a decision making process where decision makers lay out various alternatives is called A) decision analysis. B) intelligence gathering. C) alternatives formulation. D) the choice step. E) the review step. Answer: C Diff: 2 Type: MC Page Ref: 37 Topic: Q7 Skill: RECALL 43) The stage in a decision making process which a decision maker analyze the alternatives and selected one is called A) alternatives formulation. B) the choice step. C) intelligence gathering. D) decision step. E) the review step. Answer: B Diff: 2 Type: MC Page Ref: 37 Topic: Q7 Skill: RECALL 8 Copyright © 2016 Pearson Canada Inc.
44) An activity can be defined as A) the carrying out of a business procedure. B) a series of steps in a business process. C) an action that supports a business strategy. D) transforming resources and information of one type into resources and information of another type. E) action performed by an actor. Answer: D Diff: 3 Type: MC Page Ref: 28 Topic: Q3 Skill: RECALL 45) Items of value are referred to as A) money. B) valuables. C) resources. D) facilities. E) equipment. Answer: C Diff: 2 Type: MC Page Ref: 28 Topic: Q3 Skill: RECALL 46) The HELM system improves efficiency by eliminating A) computers aboard tugboats. B) multiple dispatcher log sheets. C) multiple data entries for each job. D) accurate paper work. E) the large number of people involved in completing a job. Answer: C Diff: 1 Type: MC Page Ref: 39 Topic: Q8 Skill: APPLIED 47) Knowledge derived from data can be described as A) wisdom. B) information. C) knowledge. D) data. E) context. Answer: B Diff: 3 Type: MC Page Ref: 29 Topic: Q4 Skill: RECALL
9 Copyright © 2016 Pearson Canada Inc.
48) Recorded facts or figures is (are) A) context. B) information. C) data. D) knowledge. E) processed information. Answer: C Diff: 2 Type: MC Page Ref: 29 Topic: Q4 Skill: RECALL 49) Data presented in a meaningful context can be described as A) processed information. B) knowledge. C) information. D) processed knowledge. E) processed data. Answer: C Diff: 2 Type: MC Page Ref: 29 Topic: Q4 Skill: RECALL 50) Which of the following is arguably the most important component of an Information System? A) Software B) Hardware C) Processes D) Information E) People Answer: E Diff: 3 Type: MC Page Ref: 32 Topic: Q6 Skill: APPLIED 51) The review step A) is when the organization makes a decision. B) is when the organization makes a decision and may lead to another decision. C) may lead to another decision. D) is when the organization reviews the results of the decision. E) is when the organization reviews the results of the decision and may lead to another decision. Answer: E Diff: 2 Type: MC Page Ref: 37 Topic: Q7 Skill: APPLIED
10 Copyright © 2016 Pearson Canada Inc.
52) Which of the following is a structured decision? A) Fortune telling B) Performance appraisals C) Stock marketing forecasting D) Predicting the Super Bowl winner E) Weather forecasting Answer: E Diff: 3 Type: MC Page Ref: 36 Topic: Q7 Skill: APPLIED 53) Which of the following is an unstructured decision? A) Allocating furniture and equipment to employees B) Weather forecasting C) Determining the future book value of assets D) Stock marketing forecasting E) Airline pricing Answer: D Diff: 3 Type: MC Page Ref: 36 Topic: Q7 Skill: APPLIED 54) Which of the following is a managerial decision? A) Which invoices should be paid today? B) Determining next year's IT budget C) Should we extend credit to a customer? D) Determining how many daily transactions have occurred in a specified period E) Should our firm acquire a competing firm? Answer: B Diff: 3 Type: MC Page Ref: 35 Topic: Q7 Skill: APPLIED 55) Which of the following is an operational decision? A) Determining next year's IT budget B) Should we extend credit to a customer? C) What are our production goals for the next three months? D) Which invoices should be paid today? E) Should our firm acquire a competing firm? Answer: D Diff: 2 Type: MC Page Ref: 35 Topic: Q7 Skill: RECALL
11 Copyright © 2016 Pearson Canada Inc.
56) Which of the following is a strategic decision? A) Should we extend credit to a customer? B) Determining next year's IT budget C) What wage should we pay a particular employee? D) Should our firm acquire a competing firm? E) Which invoices should be paid today? Answer: D Diff: 2 Type: MC Page Ref: 37 Topic: Q7 Skill: RECALL 57) Which is the following is most useful to a company? A) Knowledge B) Observations C) Decisions D) Information E) Data Answer: A Diff: 3 Type: MC Page Ref: 37 Topic: Q7 Skill: APPLIED 58) The average wage for a factory worker is an example of (a) A) data. B) business process. C) knowledge. D) strategy. E) decision. Answer: C Diff: 3 Type: MC Page Ref: 29 Topic: Q4 Skill: APPLIED 59) The statement that Jeff Parks earns less than half the average hourly wage of the Garden Department is A) policy. B) strategy. C) data. D) information. E) decision. Answer: D Diff: 3 Type: MC Page Ref: 29 Topic: Q4 Skill: APPLIED
12 Copyright © 2016 Pearson Canada Inc.
60) Which systems are typically used during the alternatives formulation step? A) Word processors B) Digital imaging systems C) Presentation software D) Statistics packages E) Collaborative systems Answer: E Diff: 3 Type: MC Page Ref: 37 Topic: Q7 Skill: APPLIED 61) Which systems are typically used to analysis data and information during the choice step? A) Word processing packages B) Financial modeling tools C) Databases D) Digital imagining packages E) Presentation software Answer: B Diff: 3 Type: MC Page Ref: 37 Topic: Q7 Skill: APPLIED 62) Customer numbers and their names would be an example of the ________ component of an order management information system. A) software B) information C) procedure D) hardware E) people Answer: B Diff: 2 Type: MC Page Ref: 28 Topic: Q3 Skill: RECALL 63) Business systems are sometimes referred to as business A) networks. B) models. C) channels. D) processes. E) webs. Answer: D Diff: 2 Type: MC Page Ref: 26 Topic: Q2 Skill: RECALL
13 Copyright © 2016 Pearson Canada Inc.
64) A business process is a network of information, resources, facilities, and A) hardware. B) activities. C) systems. D) data. E) knowledge. Answer: B Diff: 2 Type: MC Page Ref: 28 Topic: Q3 Skill: RECALL 65) In the inventory management process, quality inspection would be viewed as a(n) A) activity. B) information output. C) data input. D) resource. E) facility. Answer: A Diff: 2 Type: MC Page Ref: 28 Topic: Q3 Skill: APPLIED 66) An activity can be ________ or ________ and sometimes blended, depending on how the procedures are executed. A) external, internal B) manual, automated C) internal, automated D) automated, integrated E) integrated, manual Answer: B Diff: 2 Type: MC Page Ref: 28 Topic: Q3 Skill: RECALL 67) In an automated activity the computer hardware receives its instructions from (the) A) version control program. B) network protocols. C) people. D) software. E) Web services. Answer: D Diff: 2 Type: MC Page Ref: 28 Topic: Q3 Skill: RECALL
14 Copyright © 2016 Pearson Canada Inc.
68) Because they have input into the inventory management process, both suppliers and customers are viewed as A) information outputs. B) data inputs C) resources. D) facilities. E) activities. Answer: C Diff: 3 Type: MC Page Ref: 28 Topic: Q3 Skill: RECALL 69) The truck that delivers the orders to the receiving and stocking activity would be viewed in the inventory management process as a(n) A) facility. B) information output. C) activity. D) resource. E) data input Answer: A Diff: 2 Type: MC Page Ref: 28 Topic: Q3 Skill: RECALL 70) Inventories, databases, factories, and equipment are all examples of A) resources. B) information. C) transactions. D) facilities. E) activities. Answer: D Diff: 2 Type: MC Page Ref: 28 Topic: Q3 Skill: RECALL 71) The on-time performance of all your vendors for a specific item would be an example of A) inventory B) data. C) communication. D) information. E) resource. Answer: D Diff: 2 Type: MC Page Ref: 29 Topic: Q4 Skill: APPLIED
15 Copyright © 2016 Pearson Canada Inc.
72) For General Motors, the quantity of tire rims received would be an example of A) communication. B) knowledge. C) data. D) information. E) resource. Answer: C Diff: 2 Type: MC Page Ref: 29 Topic: Q4 Skill: APPLIED 73) In an information system, the software and ________ components are both sets of instructions. A) data B) software C) people D) procedure E) hardware Answer: D Diff: 2 Type: MC Page Ref: 32 Topic: Q6 Skill: RECALL 74) Business processes generate information by combining key data in a specific A) context. B) activity. C) procedure. D) relevance. E) process. Answer: A Diff: 2 Type: MC Page Ref: 29 Topic: Q4 Skill: APPLIED 75) In an information system the people and ________ components are considered to be actors since they can take specific actions. A) hardware B) data C) people D) procedure E) software Answer: A Diff: 2 Type: MC Page Ref: 32 Topic: Q6 Skill: RECALL
16 Copyright © 2016 Pearson Canada Inc.
76) ________ would be one of the factors that lead to designing fully automated systems. A) High skill employee positions B) Tasks that require significant employee data inputs C) Low turnover employee positions D) High turnover employee positions E) Tasks that require significant human judgement Answer: D Diff: 3 Type: MC Page Ref: 33 Topic: Q6 Skill: RECALL 77) ________ is (are) instructions for hardware and ________ is (are) instructions for people. A) Procedures, software B) Software, processes C) Data, processes D) Machine instructions, user manuals E) Software, procedures Answer: E Diff: 2 Type: MC Page Ref: 32 Topic: Q6 Skill: RECALL 78) If you do not know what to do with the information that your IS produces (even if it is a perfectly functioning IS) A) you likely started with faulty data. B) you probably have the wrong communications software. C) ask a techie for a translation. D) you can still make decisions based on that information. E) you are wasting your time and money. Answer: E Diff: 3 Type: MC Page Ref: 39 Topic: Q8 Skill: APPLIED 79) Business Process Modeling Notation provides ________ graphical elements that can be used to document a process. Answer: four Diff: 2 Type: SA Page Ref: 28 Topic: Q3 Skill: RECALL 80) Human resources personnel say that ________ is one of the most effective ways of finding a job. Answer: networking Diff: 2 Type: SA Page Ref: 44 Topic: Q8 Skill: RECALL 17 Copyright © 2016 Pearson Canada Inc.
81) A ________ lists the items ordered and the quantity requested of each item. Answer: purchase order Diff: 2 Type: SA Page Ref: 27 Topic: Q2 Skill: RECALL 82) The ________ process works to balance the demands from customers with the inventory purchased from suppliers. Answer: inventory management Diff: 2 Type: SA Page Ref: 27 Topic: Q2 Skill: RECALL 83) When stock in inventory hits a critical point, it is called the ________ point. Answer: reorder Diff: 2 Type: SA Page Ref: 27 Topic: Q2 Skill: RECALL 84) The most common definition of information is that it is derived from data, where data is defined as ________. Answer: recorded facts Diff: 2 Type: SA Page Ref: 29 Topic: Q4 Skill: RECALL 85) Good information is based on ________ and correct data. Answer: complete Diff: 2 Type: SA Page Ref: 29 Topic: Q4 Skill: RECALL 86) ________ information is produced in time for its intended use. Answer: timely Diff: 2 Type: SA Page Ref: 29 Topic: Q4 Skill: RECALL 87) Information should be ________ to both the context and the subject. Answer: relevant Diff: 2 Type: SA Page Ref: 30 Topic: Q4 Skill: RECALL
18 Copyright © 2016 Pearson Canada Inc.
88) For information to be ________ there must be an appropriate relationship between the cost of information and its value. Answer: worth its cost Diff: 2 Type: SA Page Ref: 30 Topic: Q4 Skill: RECALL 89) Software and procedure components are both sets of ________. Answer: instructions Diff: 2 Type: SA Page Ref: 32 Topic: Q6 Skill: RECALL 90) ________ decisions concern the allocation and utilization of resources. Answer: Managerial Diff: 2 Type: SA Page Ref: 35 Topic: Q7 Skill: RECALL 91) An employee's name and number would be an example of ________. Answer: data Diff: 2 Type: SA Page Ref: 29 Topic: Q4 Skill: RECALL 92) The average compensation for sales agents in a company would be an example of ________. Answer: information Diff: 2 Type: SA Page Ref: 29 Topic: Q4 Skill: RECALL 93) ________ are raw, unprocessed facts such as inventory levels. Answer: Data Diff: 2 Type: SA Page Ref: 29 Topic: Q4 Skill: RECALL 94) ________ is the process of moving human work to the computer side of the information system. Answer: Automation Diff: 2 Type: SA Page Ref: 33 Topic: Q6 Skill: RECALL
19 Copyright © 2016 Pearson Canada Inc.
95) Data becomes information when it has a(n) ________. Answer: context Diff: 2 Type: SA Page Ref: 29 Topic: Q4 Skill: RECALL 96) The fact that oil costs $74.25 a barrel is an example of ________. Answer: data Diff: 2 Type: SA Page Ref: 29 Topic: Q4 Skill: APPLIED 97) ________ is the bridge between the human and computer components of an information system. Answer: Data Diff: 2 Type: SA Page Ref: 29 Topic: Q4 Skill: RECALL 98) The way in which you run a program such as a spreadsheet program is called a(n) ________. Answer: procedure Diff: 3 Type: SA Page Ref: 32 Topic: Q6 Skill: APPLIED 99) Instructions for how a computer should perform specific tasks is (are) called ________. Answer: software Diff: 2 Type: SA Page Ref: 32 Topic: Q6 Skill: RECALL 100) From a business process view, order placement in an inventory management process would be a(n) ________. Answer: activity Diff: 3 Type: SA Page Ref: 28 Topic: Q3 Skill: APPLIED 101) A customer acts as a(n) ________ in the inventory management process. Answer: resource Diff: 3 Type: SA Page Ref: 28 Topic: Q3 Skill: RECALL
20 Copyright © 2016 Pearson Canada Inc.
102) A network of activities, resources, facilities, and information that interact to achieve some business function is a(n) ________. Answer: business process Diff: 2 Type: SA Page Ref: 27 Topic: Q2 Skill: RECALL 103) From a business process viewpoint, a warehouse that stores inventory would be a(n) ________. Answer: facility Diff: 2 Type: SA Page Ref: 28 Topic: Q3 Skill: RECALL 104) The payment ________ transforms invoice information into payment information. Answer: activity Diff: 3 Type: SA Page Ref: 28 Topic: Q3 Skill: APPLIED 105) An example of a(n) ________ payment activity is seen when an accounts payable clerk receives and checks the accuracy of invoices against the purchase orders before issuing a payment. Answer: manual Diff: 2 Type: SA Page Ref: 34 Topic: Q6 Skill: RECALL 106) Provide an example of a managerial decision. Answer: Any decisions that involves the allocation and utilization of resources. Typical managerial decisions are: How much should we budget for computer hardware and programs for department A next year? How many engineers should we assign to project B? Diff: 3 Type: ES Page Ref: 35 Topic: Q7 Skill: APPLIED 107) Provide an example of an operational decision. Answer: Operational decisions concern day-to-day actives. Typical operational decisions are: How many widgets should we order from vendor A? Should we extend credit to vendor B? Which invoices should we pay today? Diff: 3 Type: ES Page Ref: 37 Topic: Q7 Skill: APPLIED
21 Copyright © 2016 Pearson Canada Inc.
108) Provide an example of a strategic decision. Answer: Strategic decisions concern broader-scope, organizational issues. Typical decisions at the strategic levels are: Should we start a new product line? Should we open a centralized warehouse in Calgary? Diff: 3 Type: ES Page Ref: 36 Topic: Q7 Skill: APPLIED 109) Provide an example of an unstructured decision. Answer: An unstructured decision process is one for which there is no agreed-on decisionmaking method. Predicting the future direction fo the economy or the stock market is a famous example. Diff: 3 Type: ES Page Ref: 36 Topic: Q7 Skill: APPLIED 110) Provide an example of a structured decision. Answer: A structured decision is one for which there is an understood and accepted method for making the decision. A formula for computing the reorder quantity of an item in inventory is an example of a structured decision process. Diff: 3 Type: ES Page Ref: 36 Topic: Q7 Skill: APPLIED 111) Describe the types of systems used during the intelligence gathering step. Answer: During intelligence gathering, email and video conferences facilitate communication among the decision markers. Also, during the first phase, decision makers use query and reporting systems as well as other types of data analysis applications to obtain relevant data. Diff: 3 Type: ES Page Ref: 37 Topic: Q7 Skill: RECALL 112) Describe the types of systems used during the choice step. Answer: During the choice step, analysis applications such as spreadsheets and financial and other modelling applications help decision makers to analyze alternatives. Diff: 3 Type: ES Page Ref: 37 Topic: Q7 Skill: RECALL 113) Describe the types of systems used during the implementation step. Answer: The implementation stage involves the use of communications applications, and all types of information systems can be used during review. Diff: 3 Type: ES Page Ref: 37 Topic: Q7 Skill: RECALL
22 Copyright © 2016 Pearson Canada Inc.
114) What does a transaction processing system support? Answer: A transaction processing system supports operational decisions. Diff: 2 Type: ES Page Ref: 35 Topic: Q7 Skill: RECALL 115) Describe the types of systems used during the review step. Answer: During the review step, communications applications, analysis applications such as spreadsheets and financial and query and reporting systems help decision makers to analyze alternatives. Diff: 2 Type: ES Page Ref: 36 Topic: Q7 Skill: RECALL 116) What is meant by a business process? Give an example. Answer: A business process is defined as being a network of activities, resources, facilities, and information that interact to achieve some business function. Sometimes they are also referred to as business systems. The text describes an example of the inventory management process which starts with Purchasing activities and ends with the Payment activity. Other common processes might include the sales order management process and the employee recruiting process. Diff: 2 Type: ES Page Ref: 26 Topic: Q2 Skill: RECALL 117) What is data and how is it different from information? Answer: Data are simply the raw recorded facts and figures. Data is one of the five basic components of an information system. The system turns data into information by classifying, summarizing, sorting it and giving it a meaningful context. Diff: 3 Type: ES Page Ref: 29 Topic: Q4 Skill: APPLIED 118) What are the components of a business process? Give examples of each. Answer: The components of a business process include activities, resources, facilities, and information. Activities transform resources and information from one type into another. This happens when a clerk checks a customer credit rating before entering in a sales order for that customer. Resources are items of interest to the process. They interact with the process but are not under direct control of the organization. These could be customers and vendors. Facilities include databases, inventories, factories and equipment. Information is what activities use to determine how to transform the inputs they receive into outputs they produce. Diff: 3 Type: ES Page Ref: 28 Topic: Q3 Skill: APPLIED
23 Copyright © 2016 Pearson Canada Inc.
Experiencing MIS, Cdn. Ed., 4e (Kroenke) Chapter 3 Productivity, Innovation, and Strategy 1) Primary activities are activities where value is added directly to the product. Answer: TRUE Diff: 1 Type: TF Page Ref: 64 Topic: Q3 Skill: RECALL 2) The increasing reliance on the web for information has created a digital divide between those who have Internet access and those who do not. Answer: TRUE Diff: 1 Type: TF Page Ref: 80 Topic: Q6 Skill: RECALL 3) Threat of government regulation is one of the five forces in Porter's model. Answer: FALSE Diff: 2 Type: TF Page Ref: 67 Topic: Q4 Skill: RECALL 4) Sustaining technologies are changes in technology that maintain the rate of improvement in customer value. Answer: TRUE Diff: 2 Type: TF Page Ref: 69 Topic: Q5 Skill: RECALL 5) Disruptive technologies introduce a very new package of attributes to the accepted mainstream products. Answer: TRUE Diff: 2 Type: TF Page Ref: 69 Topic: Q5 Skill: RECALL 6) An organization responds to the structure of its industry by choosing a competitive strategy. Answer: TRUE Diff: 2 Type: TF Page Ref: 68 Topic: Q4 Skill: RECALL 7) The productivity paradox suggests IT investments do not create business value. Answer: TRUE Diff: 2 Type: TF Page Ref: 60 Topic: Q1 Skill: RECALL 1 Copyright © 2016 Pearson Canada Inc.
8) The CCICT has now merged with the Better Business Bureau to further the awareness and development of business technology skills. Answer: FALSE Diff: 2 Type: TF Page Ref: 62-63 Topic: Q2 Skill: APPLIED 9) A value chain is a network of activities that improve the effectiveness of a good or service. Answer: TRUE Diff: 2 Type: TF Page Ref: 63 Topic: Q3 Skill: RECALL 10) Porter's concept of a business chain is crucial for developing a competitive strategy. Answer: FALSE Diff: 3 Type: TF Page Ref: 65 Topic: Q3 Skill: RECALL 11) As defined by Porter, a value chain is a network of value creating activities. Answer: TRUE Diff: 1 Type: TF Page Ref: 65 Topic: Q3 Skill: RECALL 12) Sales and service would be examples of supporting activities in Porter's value chain model. Answer: FALSE Diff: 2 Type: TF Page Ref: 65 Topic: Q3 Skill: RECALL 13) Accounting functions like accounts receivables would be an example of a supporting activity in Porter's value chain model. Answer: TRUE Diff: 2 Type: TF Page Ref: 65 Topic: Q3 Skill: APPLIED 14) An organization's goals and objectives are determined by the structure of its value chain. Answer: FALSE Diff: 3 Type: TF Page Ref: 65 Topic: Q3 Skill: APPLIED
2 Copyright © 2016 Pearson Canada Inc.
15) One way of assessing the structure of the adventure travel industry is to apply Porter's Five Forces Model. Answer: TRUE Diff: 2 Type: TF Page Ref: 69 Topic: Q4 Skill: APPLIED 16) In a large city, the threat of new entrants for the sandwich shop business is probably high. Answer: TRUE Diff: 2 Type: TF Page Ref: 68 Topic: Q4 Skill: APPLIED 17) Among its suppliers, Wal-Mart is famous for not having much bargaining power. Answer: FALSE Diff: 2 Type: TF Page Ref: 68 Topic: Q4 Skill: APPLIED 18) Porter identified five fundamental competitive strategies. Answer: FALSE Diff: 2 Type: TF Page Ref: 68 Topic: Q4 Skill: RECALL 19) According to Porter's model, four competitive forces determine industry profitability. Answer: FALSE Diff: 2 Type: TF Page Ref: 68 Topic: Q4 Skill: RECALL 20) The bargaining power of customers is one of the competitive forces identified by Porter. Answer: TRUE Diff: 2 Type: TF Page Ref: 68 Topic: Q4 Skill: RECALL 21) The bargaining power of customers is one of the competitive strategies identified by Porter. Answer: FALSE Diff: 2 Type: TF Page Ref: 68 Topic: Q4 Skill: RECALL
3 Copyright © 2016 Pearson Canada Inc.
22) Some competitive advantages are less sustainable than others. Answer: TRUE Diff: 1 Type: TF Page Ref: 68 Topic: Q4 Skill: RECALL 23) The systems chosen to support a particular competitive strategy may be evaluated according to the support they give that strategy. Answer: TRUE Diff: 3 Type: TF Page Ref: VARIOUS Topic: Q4, Q6 Skill: APPLIED 24) A call centre used for customer service would be an example of a support activity in the value chain. Answer: FALSE Diff: 3 Type: TF Page Ref: 65 Topic: Q3 Skill: APPLIED 25) In Porter's Five Forces Model the linkages depict how competitive forces are deployed in an organization. Answer: FALSE Diff: 3 Type: TF Page Ref: 67 Topic: Q4 Skill: RECALL 26) Switching costs are those associated with network switches. Answer: FALSE Diff: 2 Type: TF Page Ref: 71 Topic: Q6 Skill: RECALL 27) An information system that allows suppliers to view a company's inventory in real-time would provide a competitive advantage due to product differentiation. Answer: FALSE Diff: 3 Type: TF Page Ref: 68 Topic: Q6 Skill: APPLIED 28) General Motors' OnStar system was developed so that car drivers could easily get help in emergency situations. This would be an example of an information system being used to differentiate a product. Answer: TRUE Diff: 3 Type: TF Page Ref: 69 Topic: Q4 Skill: APPLIED 4 Copyright © 2016 Pearson Canada Inc.
29) Which of the following is an example of a primary activity in a value chain? A) A manager preparing a production schedule B) A CFO preparing a budget C) An accountant preparing an income statement D) A computer technician backing up a file server E) A worker spray painting a car Answer: E Diff: 3 Type: MC Page Ref: 65 Topic: Q3 Skill: APPLIED 30) A primary activity in a value chain is best described as A) an activity that uses only raw materials. B) an activity that involves customer service and sales. C) an activity that requires the use of information systems. D) an activity which value is directly added to a product. E) the first activity in which value is created. Answer: D Diff: 2 Type: MC Page Ref: 64 Topic: Q3 Skill: RECALL 31) The physically assembly of a notebook computer is considered to be A) a support activity in a value chain. B) a production activity in a value chain. C) a primary activity in a value chain. D) a secondary activity in a value chain. E) a value adding activity in a value chain. Answer: C Diff: 2 Type: MC Page Ref: 64 Topic: Q3 Skill: APPLIED 32) Which of the following is an example of a supporting activity in a value chain? A) An accountant filing an income tax statement B) Assembling a product C) Product package design D) A bottle of wine being shipped to a warehouse E) Product safety tests Answer: A Diff: 2 Type: MC Page Ref: 65 Topic: Q3 Skill: APPLIED
5 Copyright © 2016 Pearson Canada Inc.
33) A supporting activity in a value chain is best described as A) information technology related activities. B) activities that do not require manual labor. C) activities that support the primary activities in a value chain. D) activities that add no value to a value chain. E) maintenance related activities. Answer: C Diff: 2 Type: MC Page Ref: 65 Topic: Q3 Skill: RECALL 34) The observed lack of productivity from IT investments is most likely the result of A) measurement errors. B) inflation. C) declining interest rates. D) the introduction of new technologies. E) continued drops in hardware prices. Answer: A Diff: 3 Type: MC Page Ref: 61 Topic: Q1 Skill: RECALL 35) The Productivity Paradox refers to A) increased spending on IT leading to decreased worker productivity. B) the evidence that suggests IT is irrelevant to worker productivity. C) increased IT investment leading to more sustainable competitive advantage. D) the lack of evidence of an increase in worker productivity associated with the massive increase in IT spending. E) falling computer prices due to increased processor speed. Answer: D Diff: 2 Type: MC Page Ref: 60 Topic: Q1 Skill: APPLIED 36) The difficulty in measuring productivity is largely due to A) the lack of measuring tools. B) the difficulty of measuring intangible benefits. C) an increasingly service-based economy. D) IT creating intangible benefits. E) the intangible benefits of IT in an increasingly service-based economy. Answer: E Diff: 3 Type: MC Page Ref: 61 Topic: Q1 Skill: RECALL
6 Copyright © 2016 Pearson Canada Inc.
37) The measure of the value that Canadian workers generate per hour is A) Innovation Quotient. B) Labour Productivity. C) Corporate Valuation. D) Divested Ratio. E) One of Porter's Five Forces. Answer: B Diff: 3 Type: MC Page Ref: 60 Topic: Q1 Skill: APPLIED 38) IT investments can generate value by A) limiting the opportunities for creating competitive advantages. B) decreasing productivity. C) creating larger and larger service based economies. D) limiting the ways corporations can compete. E) creating more efficient and effective business processes that lead to lower prices. Answer: E Diff: 3 Type: MC Page Ref: 61 Topic: Q1 Skill: APPLIED 39) Increasing efficiency means A) generating better quality products with less resources. B) maximizing the cost of production. C) shorter production times. D) accomplishing business processes with less input and/or higher speeds. E) higher speed processes at the cost of more resources and lower quality. Answer: D Diff: 2 Type: MC Page Ref: 63 Topic: Q3 Skill: RECALL 40) "Doing things right" refers to A) efficiency. B) value creation. C) effectiveness. D) social responsibility. E) sustainability. Answer: A Diff: 2 Type: MC Page Ref: 63 Topic: Q3 Skill: RECALL
7 Copyright © 2016 Pearson Canada Inc.
41) "Doing the right things" refers to A) efficiency. B) social responsibility. C) improved quality. D) effectiveness. E) sustainability. Answer: D Diff: 2 Type: MC Page Ref: 63 Topic: Q3 Skill: RECALL 42) A value chain (is) A) a group of activities that improve the effectiveness of a good or service. B) describes how a product moves through a distribution channel. C) a group of activities that improve the efficiency of a good or service. D) describes total amount of money spent on making a product. E) describes the transactions that occur between the vendor and the consumer. Answer: A Diff: 2 Type: MC Page Ref: 63 Topic: Q3 Skill: RECALL 43) Margin can be defined as A) the difference between the total cost of raw materials and the list price of a product. B) the difference of the price a customer is willing to pay and how much the company actually collects. C) the difference of the price a customer is willing to pay and the price a seller is willing to sell at. D) the difference between the selling price and the list price. E) the difference of the price a customer is willing to pay and the cost of moving the good or service through its value chain. Answer: E Diff: 2 Type: MC Page Ref: 64 Topic: Q3 Skill: RECALL 44) Which of the following is NOT a force in the Porter's five forces model? A) Threat of substitute products B) Bargaining power of suppliers C) Bargaining power of customers D) Threat of new entries E) Threat of government regulations Answer: E Diff: 2 Type: MC Page Ref: 67 Topic: Q4 Skill: RECALL 8 Copyright © 2016 Pearson Canada Inc.
45) Which of the following is the best example of the bargaining power of suppliers? A) The customer's flexibility to switch suppliers at any time B) The ability of a dominant microprocessor manufacturer to set industry standards and charge premium prices C) The ability to negotiate better terms with a commodity producer after a competitive bidding process D) The ability of a customer to shop around for suppliers E) The inability for a customer to terminate a supply contract Answer: B Diff: 3 Type: MC Page Ref: 68 Topic: Q4 Skill: APPLIED 46) Which of the following is a fundamental competitive strategy suggested by Porter? A) Growing the diversity of the products and / or service offered B) Providing the best customer service C) Creating alliance partners D) Developing innovative products E) Differentiating its products Answer: E Diff: 3 Type: MC Page Ref: 68 Topic: Q4 Skill: RECALL 47) Which of Porter's five forces best describes the decline of film based photography? A) Threat of substitute products B) Bargaining power of suppliers C) Threat of new entry D) Bargaining power of customers E) Rivalry among existing firms Answer: A Diff: 2 Type: MC Page Ref: 67 Topic: Q4 Skill: APPLIED 48) High switching cost refers to A) a service charge that discourages customers from switching service providers. B) a strategy employed by companies to prevent customers from renegotiating service contracts. C) an illegal tactic that prevents customers from leaving by charging a prohibitive service termination fee. D) a strategy employed by companies to lock in customers by making it difficult or expensive to switch to another product. E) a strategy used by telecom providers to retain customers. Answer: D Diff: 2 Type: MC Page Ref: 71 Topic: Q6 Skill: RECALL 9 Copyright © 2016 Pearson Canada Inc.
49) Which of the following best describes Bower and Christensen's idea of a sustaining technology? A) A technology innovation that increases the rate of improvement in customer value B) A technology innovation that provides a very new package of attributes from the accepted mainstream products C) A technology innovation that ensures environmental sustainability D) A technology innovation that decreases the rate of improvement in customer value E) A technology innovation that maintains the rate of improvement in customer value Answer: E Diff: 2 Type: MC Page Ref: 69 Topic: Q5 Skill: RECALL 50) Which of the following can be considered a sustaining technology? A) An internal antenna for cell phones B) A BlackBerry device C) MP3 file format D) A typewriter E) A photocopier Answer: A Diff: 3 Type: MC Page Ref: 69 Topic: Q5 Skill: APPLIED 51) Disruptive technologies refer to A) technological innovations that increase the value of existing products in an incremental way. B) technological innovations that cause major disruptions in IT operations. C) technological innovations that decrease the value of existing products. D) technological innovations that repackage attributes of existing products in a totally new way. E) technological innovations that set a new standard, like high-definition television. Answer: D Diff: 2 Type: MC Page Ref: 69 Topic: Q5 Skill: RECALL 52) Which of the following can be best described as a disruptive technology? A) Vulcanized rubber tires B) Compact discs C) Digital music players D) Liquid crystal displays E) Portable computers Answer: C Diff: 2 Type: MC Page Ref: 69 Topic: Q5 Skill: RECALL 10 Copyright © 2016 Pearson Canada Inc.
53) Which of the following can create a barrier to entry? A) Small capital investment required B) Patents C) Minimal training needed D) Can be done from home E) Low labour costs Answer: B Diff: 2 Type: MC Page Ref: 71 Topic: Q6 Skill: RECALL 54) In "IT doesn't Matter," Nicholas Carr argues that A) disruptive technologies tend to be commoditized over time and hence provides less strategic advantage. B) companies are spending too much money on IT. C) there are no productivity gains for any amount of IT investments. D) the marginal benefits of an IT investment decreases over time. E) technology adds no value to companies. Answer: A Diff: 3 Type: MC Page Ref: 72 Topic: Q7 Skill: RECALL 55) Sustained competitive advantage requires A) companies to find a distinctive way to compete. B) the elimination of the dominant firm. C) companies to seek patent protection for their products. D) the creation of barriers of entry. E) companies to use more than one competitive strategies. Answer: A Diff: 2 Type: MC Page Ref: 73 Topic: Q7 Skill: RECALL 56) Information systems can change industry structure by A) using sustaining technologies. B) using technologies that have become commodities. C) using competitive strategies. D) using the Internet. E) using disruptive technologies. Answer: E Diff: 2 Type: MC Page Ref: 70 Topic: Q5 Skill: RECALL
11 Copyright © 2016 Pearson Canada Inc.
57) A company can use products to create competitive advantage by A) differentiating its products. B) raising prices. C) adding products to its product line. D) increasing brand awareness. E) lowering prices. Answer: A Diff: 2 Type: MC Page Ref: 71 Topic: Q6 Skill: RECALL 58) A company can create competitive advantage by A) lowering switching costs. B) refusing alliances. C) staying with the "tried and true" processes that competitors use. D) reducing barriers to entry. E) adding technology to its business process. Answer: E Diff: 3 Type: MC Page Ref: 72 Topic: Q7 Skill: APPLIED 59) How can competitive advantage through IT be sustained? A) Competitive advantage through IT cannot be sustained. B) By using as much proprietary technologies as possible C) By making all employees sign nondisclosure agreements D) By suing any competitor whom your firm suspect is copying its systems E) By integrating all value creation processes into the organization Answer: E Diff: 3 Type: MC Page Ref: 73 Topic: Q7 Skill: APPLIED 60) Which of the following makes it difficult for a company to copy a rival's information systems? A) The data is different in the two organizations. B) It is difficult to duplicate business processes. C) Technology may not be available for sale. D) Mastering the art of integrating technology and people E) Talent is hard to recruit. Answer: D Diff: 3 Type: MC Page Ref: 73 Topic: Q7 Skill: APPLIED
12 Copyright © 2016 Pearson Canada Inc.
61) In the context of Porter's five forces model, customer's bargaining power refers to A) a customer's ability to create barriers to entry. B) a customer's ability to alter his/her value chain. C) a customer's ability to integrate IT. D) a customer's ability to negotiate better prices. E) a customer's ability to create substitutes. Answer: D Diff: 2 Type: MC Page Ref: 67 Topic: Q4 Skill: APPLIED 62) Which of the following best describes the introduction of a disruptive technology in Canada? A) The introduction of high definition TV B) The introduction of movies on DVDs C) The introduction of satellite radio D) The introduction of digital projection in theatres E) The introduction of automatic teller machines Answer: E Diff: 3 Type: MC Page Ref: 70 Topic: Q5 Skill: APPLIED 63) The network of activities that improve the effectiveness of a good or service is called A) a value chain. B) a supplier network. C) competitive strategies. D) a supply chain. E) a value web. Answer: A Diff: 2 Type: MC Page Ref: 63 Topic: Q3 Skill: RECALL 64) What term is given to Robert Solow's quote, "We see computers everywhere except in the productivity statistics"? A) The productivity divide B) The digital divide C) The efficiency paradox D) The productivity gap E) The productivity paradox Answer: E Diff: 2 Type: MC Page Ref: 60 Topic: Q1 Skill: RECALL
13 Copyright © 2016 Pearson Canada Inc.
65) A network of value-creating activities is called a A) business strategy. B) value network. C) value chain. D) competitive advantage. E) primary value activities. Answer: C Diff: 2 Type: MC Page Ref: 63 Topic: Q3 Skill: RECALL 66) ________ is an example of a primary activity in Porter's value chain model. A) New IS development B) Shipping and receiving C) HR planning D) Strategic planning E) Accounting Answer: B Diff: 2 Type: MC Page Ref: 65 Topic: Q3 Skill: RECALL 67) ________ is an example of a support activity in Porter's value chain model. A) HR benefits management B) Production C) Raw materials acquisition D) Customer service E) Sales Answer: A Diff: 3 Type: MC Page Ref: 65 Topic: Q3 Skill: RECALL 68) Receiving and storing raw materials for production would be an example of a(n) ________ in Porter's value chain model. A) support activity B) primary activity C) linkage D) integrated activity E) complex activity Answer: B Diff: 2 Type: MC Page Ref: 65 Topic: Q3 Skill: RECALL
14 Copyright © 2016 Pearson Canada Inc.
69) Finding a vendor and negotiating a price for raw materials for production would be an example of a(n) ________ in Porter's value chain model. A) linkage B) integrated activity C) complex D) support activity E) primary activity Answer: D Diff: 2 Type: MC Page Ref: 63 Topic: Q3 Skill: RECALL 70) According to Porter's model of the value chain, the use of IS can make ________ more effective or efficient. A) primary activities B) complex calculations C) supporting activities D) importing and exporting E) linked departments Answer: C Diff: 2 Type: MC Page Ref: 65 Topic: Q3 Skill: RECALL 71) Ideally, a competitive advantage should be A) industry-wide. B) short term. C) reproducible. D) shared with partners. E) sustainable. Answer: E Diff: 2 Type: MC Page Ref: 73 Topic: Q7 Skill: RECALL 72) The threat of new entrants in an industry is high when A) entry and exit costs are low. B) entry costs are high. C) distribution channels are few. D) entry and exit costs are high. E) few suppliers exist. Answer: A Diff: 3 Type: MC Page Ref: 68 Topic: Q4 Skill: APPLIED
15 Copyright © 2016 Pearson Canada Inc.
73) Porter's five competitive forces include new vendors, suppliers, substitute vendors, customers and A) finance. B) rivalry of firms. C) economic pressures. D) efficiency of production. E) marketing. Answer: B Diff: 2 Type: MC Page Ref: 67 Topic: Q4 Skill: RECALL 74) ________ would be an example of using an information system to gain competitive advantage. A) Automating the general ledger system B) Developing a web service to share information with a supply chain partner C) Using PowerPoint for company presentations D) Using instant messaging while at work E) Printing internal reports in color Answer: B Diff: 3 Type: MC Page Ref: 71 Topic: Q6 Skill: APPLIED 75) Competitive ________ refers to a significant and sustainable benefit to a company over its competition. A) commerce B) strategy C) planning D) advantage E) disintermediation Answer: D Diff: 1 Type: MC Page Ref: 73 Topic: Q7 Skill: RECALL 76) ________ is an example of a support activity in Porter's value chain model. A) Goods production B) Warranty service C) Finished goods inventory management D) Payroll management E) Raw material acquisition Answer: D Diff: 2 Type: MC Page Ref: 65 Topic: Q3 Skill: RECALL 16 Copyright © 2016 Pearson Canada Inc.
77) If Goodyear Tires buys a rubber plantation, this is an example of A) departmental integration. B) quality controls. C) backward integration. D) value chain management. E) reducing complexity. Answer: C Diff: 3 Type: MC Page Ref: 64 Topic: Q3 Skill: APPLIED 78) If a diamond mine buys a diamond cutting operation this is an example of A) departmental integration. B) backward integration. C) economy of scale. D) forward integration. E) supporting activity. Answer: D Diff: 3 Type: MC Page Ref: 64 Topic: Q3 Skill: APPLIED 79) Each value chain consists of one or more business A) activities. B) linkages C) processes. D) systems. E) partners. Answer: C Diff: 2 Type: MC Page Ref: 63 Topic: Q3 Skill: RECALL 80) An organization responds to the structure of its industry by choosing a (n) ________. Answer: competitive strategy Diff: 2 Type: SA Page Ref: 68 Topic: Q4 Skill: RECALL 81) Labour productivity is the ________ of the Gross Domestic Product of a country divided by the total paid hours worked by the people of that country. Answer: ration Diff: 2 Type: SA Page Ref: 60 Topic: Q1 Skill: RECALL
17 Copyright © 2016 Pearson Canada Inc.
82) ________ activities are activities where value is added directly to the product. Answer: Primary Diff: 2 Type: SA Page Ref: 64 Topic: Q3 Skill: RECALL 83) A(n) ________ chain is a network of activities that improve the effectiveness of a good or service. Answer: value Diff: 1 Type: SA Page Ref: 63 Topic: Q3 Skill: RECALL 84) ________ technologies introduce a very new package of attributes to the accepted mainstream products. Answer: Disruptive Diff: 1 Type: SA Page Ref: 69 Topic: Q5 Skill: RECALL 85) ________ technologies are changes in technology that maintain the rate of improvement in customer value. Answer: Sustaining Diff: 1 Type: SA Page Ref: 69 Topic: Q5 Skill: RECALL 86) Organizations can lock in customers by making it difficult or expensive for customers to switch to another product. This is called establishing ________. Answer: high switching costs Diff: 2 Type: SA Page Ref: 71 Topic: Q6 Skill: RECALL 87) The difference between the price the customer is willing to pay and the cost the company incurs in moving the goods or services through the value chain is called the ________. Answer: margin Diff: 2 Type: SA Page Ref: 64 Topic: Q3 Skill: RECALL 88) Organizations can gain competitive advantage by reducing ________. Answer: costs Diff: 1 Type: SA Page Ref: 72 Topic: Q6 Skill: RECALL 18 Copyright © 2016 Pearson Canada Inc.
89) When a firm like Bell offers free anti-spam protection to their customers, they are trying to gain a competitive advantage by ________ their customers. Answer: locking in Diff: 3 Type: SA Page Ref: 71 Topic: Q6 Skill: APPLIED 90) When FedEx developed the package tracking application, they were trying to gain competitive advantage through IT ________. Answer: innovation Diff: 3 Type: SA Page Ref: 77 Topic: Q6 Skill: APPLIED 91) A system that reduces ________ for a company can result in significant competitive advantage. Answer: costs Diff: 2 Type: SA Page Ref: 68 Topic: Q4 Skill: RECALL 92) The increasing reliance on the web for information has created a(n) ________ between those who have Internet access and those who do not. Answer: digital divide Diff: 2 Type: SA Page Ref: 80 Topic: Q1 Skill: RECALL 93) Describe the ways in which companies gain a competitive advantage over other companies seeking the same customers. Answer: Companies can gain competitive advantage by following one of Porter's four competitive strategies. For example, a company can focus on being the cost leader (e.g., Walmart), or it can focus on differentiating its products from those of the competition (e.g., Apple). Furthermore, the company can use the cost or differentiation strategy across an industry, or it can focus its strategy on a particular industry segment. Diff: 2 Type: ES Page Ref: 68 Topic: Q4 Skill: RECALL 94) Companies want to create ________ in order to lock in their customers. Answer: switching costs Diff: 2 Type: SA Page Ref: 71 Topic: Q6 Skill: RECALL
19 Copyright © 2016 Pearson Canada Inc.
95) Companies that make it difficult or expensive for customers to change to another product are increasing ________ for potential competitors. Answer: barriers to entry Diff: 3 Type: SA Page Ref: 71 Topic: Q6 Skill: APPLIED 96) An entry barrier makes it more ________ for new competition to enter the market. Answer: difficult Diff: 1 Type: SA Page Ref: 71 Topic: Q6 Skill: RECALL 97) A strategic ________ with other organizations can be used to establish standards, reduce purchasing costs, and jointly promote products. Answer: alliance Diff: 2 Type: SA Page Ref: 72 Topic: Q6 Skill: RECALL 98) By providing customers with the addresses and easy e-mail access between senders and receivers, a shipping company can reduce their customers' costs and ________ customers to their services. Answer: lock in Diff: 3 Type: SA Page Ref: 71 Topic: Q6 Skill: APPLIED 99) An innovative shipping information system for a small package delivery company helps to ________ its package delivery service from competitors that do not have a similar system. Answer: differentiate Diff: 2 Type: SA Page Ref: 77 Topic: Q6 Skill: APPLIED 100) ________ are difficult and expensive to enforce. Answer: Patents Diff: 1 Type: SA Page Ref: 72 Topic: Q7 Skill: RECALL 101) According to Nicholas Carr the more ________ a technology the less competitive advantage it offers. Answer: ubiquitous Diff: 2 Type: SA Page Ref: 72 Topic: Q7 Skill: RECALL 20 Copyright © 2016 Pearson Canada Inc.
102) If I use my time wisely in school to create new skills, enhance the ones I have, and differentiate my skills from others, I am developing my ________. Answer: competitive advantage Diff: 2 Type: SA Page Ref: 70 Topic: Q5 Skill: APPLIED 103) If I show a prospective employer that I have a unique set of skills that are especially suited to the job opening that they have, I am demonstrating that I have a(n) ________ over other candidates. Answer: competitive advantage Diff: 2 Type: SA Page Ref: 71 Topic: Q6 Skill: RECALL 104) Everett Rogers defined ________ as the process by which an innovation gets communicated to members of a social system. Answer: diffusion of innovation Diff: 2 Type: SA Page Ref: 70 Topic: Q5 Skill: RECALL 105) Describe the five stages through which the diffusion of an innovation occurs suggested by Rogers. Answer: The stages through which the diffusion of innovation happens are: 1) Knowledge: Occurs when a person hears of the innovation for first time. 2) Persuasion: Occurs when the person becomes interested in the innovation and wants to learn more about it. 3) Decision: Occurs when the person has collected all the information necessary to make the decision of whether or not adopt the innovation. 4) Implementation: Occurs when the person has decided to pursue the innovation. 5) Confirmation: Occurs when the person has used the innovation in its full potential and is happy about it. Diff: 2 Type: ES Page Ref: 70 Topic: Q5 Skill: RECALL 106) The ________ stage in the diffusion of innovation happens when considering the pros and cons of purchasing an iPhone. Answer: decision Diff: 2 Type: SA Page Ref: 70 Topic: Q5 Skill: RECALL
21 Copyright © 2016 Pearson Canada Inc.
107) ________ of innovation is a way of thinking about the adoption of new technologies. Answer: Diffusion Diff: 2 Type: SA Page Ref: 70 Topic: Q5 Skill: RECALL 108) What is meant by the "value chain"? How does it apply to information systems? Answer: The value chain is a series of activities that include inbound logistics, operations, outbound logistics, marketing and sales, and service. It is a tool for modeling how an organization adds "value" that a customer is willing to pay for. The generic value chain has five primary and four support activities. By modeling the value chain and its linkages, Porter started a movement towards more integrated, cross-departmental business systems. Companies use the value chain to analyze how they add value and compare it to their competition. Combined with Porter's other work on competitive advantage, they can examine how IT can be used on each of the value chain activities to add value. Diff: 3 Type: ES Page Ref: 65 Topic: Q3 Skill: APPLIED 109) What are sustaining technologies? Answer: Sustaining technologies are changes in technology that maintain the rate of improvement in customer value. Diff: 2 Type: ES Page Ref: 69 Topic: Q5 Skill: RECALL 110) What is a value chain? Answer: A value chain is a network of activities that improve the effectiveness (or value) of a good or service. Diff: 1 Type: ES Page Ref: 63 Topic: Q3 Skill: RECALL 111) What is meant by effectiveness? Answer: Increased effectiveness means that the company considers offering either new or improved goods or services that the customer values. Diff: 2 Type: ES Page Ref: 63 Topic: Q3 Skill: RECALL 112) What are primary activities? Answer: Primary activities are activities where value is added directly to the product. Diff: 2 Type: ES Page Ref: 64 Topic: Q3 Skill: RECALL
22 Copyright © 2016 Pearson Canada Inc.
113) What is meant by increasing efficiency? Answer: Increasing efficiency means that business processes can be accomplished either more quickly or with fewer resources and facilities (or both). Diff: 2 Type: ES Page Ref: 63 Topic: Q3 Skill: RECALL 114) How can IT increase productivity? Answer: Productivity for organizations can be increased either through increased efficiency or effectiveness. Diff: 3 Type: ES Page Ref: 63 Topic: Q3 Skill: APPLIED 115) What are three ways that value can be created by Information Technology investments? Answer: 1) through productivity gains, 2) altering the structure of competition, 3) more efficient operations which reduce cost to final customer. Diff: 3 Type: ES Page Ref: 65 Topic: Q3 Skill: APPLIED 116) What are the primary activities in Porter's value chain model? Give an example of an IS application that supports each of these activities. Answer: The generic value chain has five primary and four support activities. The primary activities of the value chain include inbound logistics, operations, outbound logistics, marketing and sales, and service. For inbound and outbound logistics one example application might be RFID. For operations, computer-controlled machines would be an example along with MRP. Outbound logistics systems might include shipping and planning. A sales and marketing example could include an order entry system, and for service, there are equipment maintenance systems. Diff: 3 Type: ES Page Ref: 64 Topic: Q3 Skill: RECALL
23 Copyright © 2016 Pearson Canada Inc.
117) Describe Porter's Five Forces Model for Competition. How can IS be used in this model? Answer: Porter's model is based on the insight that a corporate strategy should meet the opportunities and threats in the organization's external environment. Competitive strategy should be based on an understanding of industry structures and the way they change. Porter has identified five competitive forces that shape every industry and every market. These forces determine the intensity of competition and hence the profitability and attractiveness of an industry. The objective of corporate strategy should be to modify these competitive forces in a way that improves the position of the organization. Porter's model supports analysis of the driving forces in an industry. Based on the information derived from the Five Forces Analysis, management can decide how to influence or to exploit particular characteristics of their industry. The cost and complexity of an ERP or CRM can act as a barrier to new entrants. The disintermediation of Web-based SCM can decrease the bargaining power of suppliers and increase that of customer. Auctions like eBay can also increase the threat of substitute vendors and put pressure on prices. Diff: 3 Type: ES Page Ref: 66 Topic: Q4 Skill: APPLIED 118) When ATMs first came out, they provided a significant competitive advantage because they helped banks to differentiate themselves from others. Today, almost all banks provide access to these, so it is considered to be a standard service. How could you reengineer a bank's ATM system in order to gain competitive advantage today? Answer: An ATM is one example of an automated information system. When they were first introduced they were an important innovation, that helped reduce costs of banking transactions and helped differentiate one bank from another. Nowadays, it is not enough for a bank to simply offer ATM service, but that they can be updated so that they provide additional statements for free or little charge such as lists of the 10 prior transactions. One of the biggest issues with ATMs is the fees charged. If you can reduce the cost of the ATM so that it is free to your customers this would certainly give your bank an advantage. If the cost of using a competing system were high, this would also help lock in the customers. Other services that could be offered might be making loan payments, supporting multiple languages, or transfer funds between accounts. Diff: 3 Type: ES Page Ref: 69 Topic: Q5 Skill: APPLIED
24 Copyright © 2016 Pearson Canada Inc.
Experiencing MIS, Cdn. Ed., 4e (Kroenke) Chapter 4 Hardware and Software 1) A megabyte is 1024 Gigabytes. Answer: FALSE Diff: 1 Type: TF Page Ref: 114 Topic: Q3 Skill: RECALL 2) A terabyte is larger than a petabyte in terms of computer storage. Answer: FALSE Diff: 2 Type: TF Page Ref: 114 Topic: Q3 Skill: RECALL 3) A bit is a character of data. Answer: FALSE Diff: 2 Type: TF Page Ref: 114 Topic: Q3 Skill: RECALL 4) A gigabyte or GB is 1024 MB. Answer: TRUE Diff: 1 Type: TF Page Ref: 114 Topic: Q3 Skill: RECALL 5) The term "byte" stands for binary digit. Answer: FALSE Diff: 2 Type: TF Page Ref: 114 Topic: Q3 Skill: RECALL 6) The term "bit" stands for binary digit. Answer: TRUE Diff: 1 Type: TF Page Ref: 113 Topic: Q3 Skill: RECALL 7) A byte is a group of 8 bits. Answer: TRUE Diff: 2 Type: TF Page Ref: 114 Topic: Q3 Skill: RECALL
1 Copyright © 2016 Pearson Canada Inc.
8) Memory that is permanent is called "volatile" memory. Answer: FALSE Diff: 1 Type: TF Page Ref: 115 Topic: Q3 Skill: RECALL 9) The CPU reads instructions and data from memory via the data bus. Answer: TRUE Diff: 1 Type: TF Page Ref: 114 Topic: Q3 Skill: RECALL 10) One of the main disadvantages of Solid State Device memory is the high failure rate due to its many moving parts. Answer: FALSE Diff: 1 Type: TF Page Ref: 113 Topic: Q3 Skill: RECALL 11) The most frequently used data is stored in cache memory. Answer: TRUE Diff: 1 Type: TF Page Ref: 114 Topic: Q3 Skill: RECALL 12) Deleting a file on a computer means it can never be recovered under any circumstances. Answer: FALSE Diff: 3 Type: TF Page Ref: 115 Topic: Q3 Skill: APPLIED 13) The speed of a CPU is measured bits per second. Answer: FALSE Diff: 1 Type: TF Page Ref: 112 Topic: Q3 Skill: RECALL 14) Hardware is electronic components that are used to input, process, output and store data. Answer: TRUE Diff: 1 Type: TF Page Ref: 111 Topic: Q3 Skill: RECALL
2 Copyright © 2016 Pearson Canada Inc.
15) A printer is an example of an input hardware device. Answer: FALSE Diff: 1 Type: TF Page Ref: 113 Topic: Q3 Skill: RECALL 16) A CPU is sometimes called the "brain" of the computer. Answer: TRUE Diff: 1 Type: TF Page Ref: 112 Topic: Q3 Skill: RECALL 17) The CPU in an example of an output device. Answer: FALSE Diff: 2 Type: TF Page Ref: 112 Topic: Q3 Skill: RECALL 18) A tablet PC screen is an example of an input device. Answer: TRUE Diff: 2 Type: TF Page Ref: 112 Topic: Q3 Skill: RECALL 19) The CPU is an example of a processing hardware device. Answer: TRUE Diff: 2 Type: TF Page Ref: 112 Topic: Q3 Skill: RECALL 20) A zettabyte is larger than a kilobyte. Answer: TRUE Diff: 1 Type: TF Page Ref: 114 Topic: Q3 Skill: RECALL 21) The CPU stores results of computations on the hard drive. Answer: FALSE Diff: 2 Type: TF Page Ref: 112 Topic: Q3 Skill: RECALL 22) Main memory is also called optical storage. Answer: FALSE Diff: 2 Type: TF Page Ref: 112 Topic: Q3 Skill: RECALL 3 Copyright © 2016 Pearson Canada Inc.
23) The type of CPU required will often depend on the type of computing done. Answer: TRUE Diff: 1 Type: TF Page Ref: 112 Topic: Q3 Skill: RECALL 24) The data bus connects the CPU to the output devices such as the monitor. Answer: FALSE Diff: 3 Type: TF Page Ref: 114 Topic: Q3 Skill: RECALL 25) Main memory is an example of volatile memory. Answer: TRUE Diff: 2 Type: TF Page Ref: 114 Topic: Q3 Skill: RECALL 26) When the computer is turned on, the operating system is loaded into main memory. Answer: TRUE Diff: 2 Type: TF Page Ref: 114 Topic: Q3 Skill: RECALL 27) Optical disks are an example of main memory. Answer: FALSE Diff: 1 Type: TF Page Ref: 112 Topic: Q3 Skill: RECALL 28) Magnetic and optical disks are considered to be nonvolatile memory. Answer: TRUE Diff: 1 Type: TF Page Ref: 113 Topic: Q3 Skill: RECALL 29) Volatile memory devices maintain their contents without the power being on. Answer: FALSE Diff: 2 Type: TF Page Ref: 115 Topic: Q3 Skill: RECALL
4 Copyright © 2016 Pearson Canada Inc.
30) Main memory holds the program instructions for applications that are currently being processed. Answer: TRUE Diff: 1 Type: TF Page Ref: 114 Topic: Q3 Skill: RECALL 31) When multiple programs are running, the CPU uses memory swapping as each program is used. Answer: TRUE Diff: 3 Type: TF Page Ref: 115 Topic: Q3 Skill: APPLIED 32) When you work on a spreadsheet program like Excel, the program is loaded into main memory for processing. Answer: TRUE Diff: 2 Type: TF Page Ref: 115 Topic: Q3 Skill: RECALL 33) Cache memory helps speed up the overall throughput of the CPU. Answer: TRUE Diff: 3 Type: TF Page Ref: 114 Topic: Q3 Skill: RECALL 34) The speed of a CPU is measured in dots per second. Answer: FALSE Diff: 2 Type: TF Page Ref: 112 Topic: Q3 Skill: RECALL 35) One way to stay informed about technology changes in your area of business is to get involved as a user representative on technology committees in your organization. Answer: TRUE Diff: 1 Type: TF Page Ref: 133 Topic: Q1 Skill: RECALL 36) Technology change is a fact of life and each person can choose how to relate to it. Answer: TRUE Diff: 1 Type: TF Page Ref: 133 Topic: Q1 Skill: RECALL
5 Copyright © 2016 Pearson Canada Inc.
37) Sometimes virus attacks are brought on by the negligence and ignorance of the user. Answer: TRUE Diff: 3 Type: TF Page Ref: 126 Topic: Q7 Skill: APPLIED 38) Software vendors intentionally leave security holes in their software so they can charge for patches and fixes later. Answer: FALSE Diff: 2 Type: TF Page Ref: 126 Topic: Q7 Skill: APPLIED 39) A macro virus propagates using the Internet or other computer network, and becomes so overwhelming that the network becomes unusable. Answer: FALSE Diff: 2 Type: TF Page Ref: 126 Topic: Q7 Skill: RECALL 40) As software vendors discover security holes in their products they continually issue modifications called "hole repairs." Answer: FALSE Diff: 2 Type: TF Page Ref: 126 Topic: Q7 Skill: RECALL 41) A ________ is the smallest piece of data in this list. A) byte B) field C) file D) table E) record Answer: A Diff: 2 Type: MC Page Ref: 114 Topic: Q3 Skill: RECALL
6 Copyright © 2016 Pearson Canada Inc.
42) The Y2K problem refers to A) the inability of all computers to function after year 2000. B) a manufacturing flaw in some Intel processors in 1998. C) the use of 4 digits to represent the year in early computers. D) the use of 2 digits to represent the year in early computers. E) the use of the 1929 rule to determine the first two digits of the year. Answer: D Diff: 2 Type: MC Page Ref: 110 Topic: Q2 Skill: RECALL 43) The first digital computing devices were invented in the A) 1930s. B) 1940s. C) 1950s. D) 1960s. E) 1870s. Answer: B Diff: 2 Type: MC Page Ref: 106 Topic: Q2 Skill: RECALL 44) University of Toronto installed the first digital computer in Canada in A) 1950. B) 1952. C) 1954. D) 1956. E) 1958. Answer: B Diff: 2 Type: MC Page Ref: 107 Topic: Q2 Skill: RECALL 45) Technology defined as shared or virtual storage that is flexible and available anywhere, anytime and on any device is known as A) Static Elicitation. B) Mainframe Centric. C) Cloud Computing. D) Fixed Technology. E) Multiple Topologies. Answer: C Diff: 2 Type: MC Page Ref: 110 Topic: Q2 Skill: RECALL
7 Copyright © 2016 Pearson Canada Inc.
46) Which of the following is an example of an output device? A) A mouse B) A set of headphones C) A scanner D) A computer keyboard E) A microphone Answer: B Diff: 1 Type: MC Page Ref: 111 Topic: Q3 Skill: RECALL 47) Which of the following is an example of an output device? A) A microphone B) A computer keyboard C) A laser printer D) A mouse E) A scanner Answer: C Diff: 1 Type: MC Page Ref: 111 Topic: Q3 Skill: RECALL 48) What of the following is NOT a function of the central processing unit? A) Stores results in memory B) Performs arithmetic and logical comparisons C) Stores data D) Performs calculations E) Selects instructions Answer: C Diff: 2 Type: MC Page Ref: 112 Topic: Q3 Skill: RECALL 49) As predicted by Moore's Law, the capacity of storage devices is ________ as the costs ________. A) decreasing; decrease B) increasing; increase C) decreasing; stay the same D) increasing; stay the same E) increasing; decrease Answer: E Diff: 2 Type: MC Page Ref: 110 Topic: Q2 Skill: RECALL
8 Copyright © 2016 Pearson Canada Inc.
50) Which of the following is an example of optical storage media? A) Memory chip B) DVD disc C) A USB memory key D) Cache E) A hard drive Answer: B Diff: 1 Type: MC Page Ref: 113 Topic: Q3 Skill: RECALL 51) A kilobyte is a collection of A) 512 bytes. B) 1024 bytes. C) 1024 megabytes. D) 1024 gigabytes. E) 8 bytes. Answer: B Diff: 2 Type: MC Page Ref: 114 Topic: Q3 Skill: RECALL 52) Bytes consist of ________ bits of memory. A) 2 B) 12 C) 8 D) 4 E) 6 Answer: C Diff: 2 Type: MC Page Ref: 114 Topic: Q3 Skill: RECALL 53) Instructions move from main memory into the CPU via the (a) A) network card. B) memory chip. C) operating system. D) data channel. E) cache. Answer: D Diff: 2 Type: MC Page Ref: 114 Topic: Q3 Skill: RECALL
9 Copyright © 2016 Pearson Canada Inc.
54) Which of the following is an example of an operating system? A) Glass Fish B) Java C) Unix D) Boot Camp E) VMware Fusion Answer: C Diff: 2 Type: MC Page Ref: 118 Topic: Q6 Skill: RECALL 55) Volatile memory means that A) such devices are fragile. B) such devices are susceptible to electromagnetic interference. C) these devices maintain their contents as soon as the content is added to them. D) the contents are lost once power is off. E) these devices are cheaper than non-volatile memory. Answer: D Diff: 2 Type: MC Page Ref: 115 Topic: Q3 Skill: RECALL 56) When you purchase a copy of Microsoft Windows A) you are buying an operating system. B) you are buying an application that runs on Mac. C) you are buying an application program. D) you are buying a graphics program. E) you are buying a suite of office programs. Answer: A Diff: 2 Type: MC Page Ref: 118 Topic: Q3 Skill: RECALL 57) Software applications that provides capabilities common across all organizations and industries are called A) horizontal market applications. B) supply chain management applications. C) value chain management applications. D) enterprise resource planning applications. E) operating systems software. Answer: A Diff: 2 Type: MC Page Ref: 121 Topic: Q5 Skill: RECALL
10 Copyright © 2016 Pearson Canada Inc.
58) Vertical market software refers to A) industry specific software. B) supply chain management software. C) enterprise resource planning software. D) productivity software. E) value chain management software. Answer: A Diff: 2 Type: MC Page Ref: 121 Topic: Q5 Skill: RECALL 59) Which device listed below is an example of an input hardware device? A) Printer B) DVD drive C) CPU D) Speaker E) Touch screen Answer: E Diff: 1 Type: MC Page Ref: 112 Topic: Q3 Skill: RECALL 60) Which device listed below is an example of an output hardware device? A) Touch screen B) Keyboard C) Bar code scanner D) Magnetic tape E) Printer Answer: E Diff: 1 Type: MC Page Ref: 111 Topic: Q3 Skill: RECALL 61) Which device listed below is an example of a processing hardware device? A) Main memory B) Keyboard C) Printer D) Magnetic tape E) Touch screen Answer: A Diff: 3 Type: MC Page Ref: 112 Topic: Q3 Skill: RECALL
11 Copyright © 2016 Pearson Canada Inc.
62) Which device listed below is an example of a storage hardware device? A) Keyboard B) Bar code scanner C) Mouse D) Printer E) Optical disk Answer: E Diff: 2 Type: MC Page Ref: 112 Topic: Q3 Skill: RECALL 63) Linux is an example of A) an application. B) horizontal-market software. C) vertical-market software. D) one-of-a-kind application. E) operating system software. Answer: E Diff: 2 Type: MC Page Ref: 119 Topic: Q5 Skill: RECALL 64) ________ software consists of programs that perform business functions like general ledger and accounting. A) Operating system B) Firmware C) Tailor-made D) Application E) Vertical-market software Answer: D Diff: 1 Type: MC Page Ref: 120 Topic: Q5 Skill: RECALL 65) A computer monitor is an example of A) data. B) hardware. C) a DSS. D) spaceware. E) software. Answer: B Diff: 1 Type: MC Page Ref: 115 Topic: Q3 Skill: RECALL
12 Copyright © 2016 Pearson Canada Inc.
66) Users employ ________ computers for work processing, spreadsheets, and database access. A) operating B) custom C) client D) server E) dumb terminal Answer: C Diff: 2 Type: MC Page Ref: 116 Topic: Q4 Skill: RECALL 67) The ________ system manages the computer's resources. A) open source B) application C) software D) operating E) information Answer: D Diff: 2 Type: MC Page Ref: 118 Topic: Q5 Skill: RECALL 68) A virus delivers a(n) ________ when its program deletes programs and data. A) worm B) packet C) payload D) bomb E) MB Answer: C Diff: 2 Type: MC Page Ref: 126 Topic: Q7 Skill: RECALL 69) One-of-a-kind application software is A) operating software. B) software that runs printers. C) designed for a specific, unique need. D) like a web-browser. E) memory-swapping software. Answer: C Diff: 3 Type: MC Page Ref: 122 Topic: Q5 Skill: RECALL
13 Copyright © 2016 Pearson Canada Inc.
70) ________ is installed in special, read-only memory in devices like printers or communication devices. A) Firmware B) Application C) Vertical-market D) Operating system E) BIOS Answer: A Diff: 2 Type: MC Page Ref: 123 Topic: Q5 Skill: RECALL 71) A ________ is a virus that is attached to Word and Excel files. A) time bomb B) worm C) Macro-virus D) Trojan horse E) zombie Answer: C Diff: 2 Type: MC Page Ref: 126 Topic: Q7 Skill: RECALL 72) A ________ is a virus that replicates itself over the Internet and other networks. A) patch B) macro C) time bomb D) worm E) Trojan horse Answer: D Diff: 2 Type: MC Page Ref: 126 Topic: Q7 Skill: RECALL 73) Volatile memory ________ data when the power is turned off. A) removes B) saves C) corrects D) backs up E) loses Answer: E Diff: 2 Type: MC Page Ref: 115 Topic: Q3 Skill: RECALL
14 Copyright © 2016 Pearson Canada Inc.
74) A bar code scanner is an example of a(n) A) processing device. B) input device. C) storage device. D) optical device. E) output device. Answer: B Diff: 2 Type: MC Page Ref: 112 Topic: Q3 Skill: RECALL 75) Main memory is an example of A) cache memory. B) non-volatile memory. C) input memory. D) volatile memory. E) optical memory. Answer: D Diff: 2 Type: MC Page Ref: 115 Topic: Q3 Skill: RECALL 76) Data moves between main memory and the CPU via (the) A) CPU. B) instruction set. C) data bus. D) main memory. E) data application. Answer: C Diff: 2 Type: MC Page Ref: 114 Topic: Q3 Skill: RECALL 77) A ________ is a computer infected by a worm virus. A) payload B) worm C) zombie D) time bomb E) Trojan horse Answer: C Diff: 2 Type: MC Page Ref: 126 Topic: Q7 Skill: RECALL
15 Copyright © 2016 Pearson Canada Inc.
78) One ________ is equivalent to 1024 GB. A) megabyte B) gigaflop C) gigabyte D) terabyte E) kilobyte Answer: D Diff: 2 Type: MC Page Ref: 114 Topic: Q3 Skill: RECALL 79) Data in the CPU is processed in the form of A) bytes. B) pixels. C) characters. D) dots. E) bits. Answer: E Diff: 3 Type: MC Page Ref: 114 Topic: Q3 Skill: APPLIED 80) A bit has a value of A) 0 or 1. B) 0. C) 11010. D) 1024. E) 1. Answer: A Diff: 1 Type: MC Page Ref: 113 Topic: Q3 Skill: RECALL 81) The ________ of a CPU is measured in hertz. A) dot pitch B) seek time C) data bus D) clock speed E) size Answer: D Diff: 2 Type: MC Page Ref: 112 Topic: Q3 Skill: RECALL
16 Copyright © 2016 Pearson Canada Inc.
82) The operating system employs ________ so that users can run multiple applications and files at the same time. A) main memory B) seek time C) patches D) rotational delay E) memory swapping Answer: E Diff: 3 Type: MC Page Ref: 115 Topic: Q3 Skill: RECALL 83) ________ is designed to increase the overall throughput of the CPU. A) Cache memory B) Non-volatile memory C) Volatile memory D) Seek time E) Main memory Answer: A Diff: 3 Type: MC Page Ref: 114 Topic: Q3 Skill: RECALL 84) Perhaps falsely, ________ is generally regarded as one of the more difficult operating systems to learn to use. A) Unix B) Windows XP C) Mac OS X D) Windows Vista E) Linux Answer: A Diff: 2 Type: MC Page Ref: 118 Topic: Q5 Skill: APPLIED 85) When one buys an operating system like Windows 7, you are actually buying (a) software A) upgrade. B) licence. C) version. D) copyright. E) rights. Answer: B Diff: 2 Type: MC Page Ref: 118 Topic: Q5 Skill: RECALL
17 Copyright © 2016 Pearson Canada Inc.
86) A spreadsheet program is an example of A) operating system software. B) firmware. C) vertical-market software. D) horizontal-market software. E) system software. Answer: D Diff: 2 Type: MC Page Ref: 121 Topic: Q5 Skill: RECALL 87) A grocery scanning check out system is an example of A) firmware. B) system software. C) operating system software. D) horizontal-market software. E) vertical-market software. Answer: E Diff: 3 Type: MC Page Ref: 121 Topic: Q5 Skill: APPLIED 88) Business people who prefer to ignore technology and leave technology knowledge strictly to the technology professionals are giving the (a) ________ to others in the industry. A) information systems B) appropriate timing C) competitive advantage D) software edge E) customer management edge Answer: C Diff: 2 Type: MC Page Ref: 132 Topic: Q1 Skill: RECALL 89) Reading articles about technology trends specific to your business, attending workshops on technology trends, and reading technology ads are all examples of A) ways of staying current on technology. B) ways of staying current in your business. C) vendor retrieval. D) looking for a technology job. E) customer management trends. Answer: A Diff: 2 Type: MC Page Ref: 132 Topic: Q1 Skill: RECALL
18 Copyright © 2016 Pearson Canada Inc.
90) Software vendors should make it easy for users to download and apply ________ to fix known holes in their software. A) encryption keys B) repairs C) patches D) viruses E) bugs Answer: C Diff: 2 Type: MC Page Ref: 126 Topic: Q7 Skill: APPLIED 91) To keep from getting a virus on your computer, be sure never to download files, programs, or attachments from ________ web sites. A) private B) hijacked C) pirated D) unknown E) commercial Answer: D Diff: 2 Type: MC Page Ref: 126 Topic: Q7 Skill: APPLIED 92) Cloud computing may be more efficient because A) it uses several computers to address a single problem. B) it adds to the ability to store data. C) customers only pay for what they use, and updates are done automatically. D) it is resident on your computer. E) it is available only during business hours. Answer: C Diff: 2 Type: MC Page Ref: 117 Topic: Q4 Skill: APPLIED 93) Customer relationship management can be delivered over the Internet through the use of A) grid computing. B) thick clients. C) server farms. D) cloud computing. E) thin clients. Answer: D Diff: 2 Type: MC Page Ref: 117 Topic: Q4 Skill: RECALL
19 Copyright © 2016 Pearson Canada Inc.
94) An application that needs only a browser is called a (n) A) cloud application. B) thin client. C) open source application. D) query optimization. E) ease of use program. Answer: B Diff: 2 Type: MC Page Ref: 124 Topic: Q5 Skill: RECALL 95) Grid computing use software to A) create a private network of computers at a school or company. B) share operating systems among a number of computers. C) coordinate all the activities in a large collection of computers. D) allow multiple operating systems to operate on a single computer. E) divide and apportion pieces of a program among several computers to solve a single problem. Answer: E Diff: 3 Type: MC Page Ref: 117 Topic: Q4 Skill: RECALL 96) The ________ of a given CPU will be halved every 18 months according to Moore's Law. Answer: price Diff: 2 Type: SA Page Ref: 110 Topic: Q2 Skill: RECALL 97) The clock speed of the CPU is measured in ________, or cycles per second. Answer: hertz Diff: 2 Type: SA Page Ref: 112 Topic: Q3 Skill: RECALL 98) Gigahertz (GHz) stands for ________ of cycles per second. Answer: billions Diff: 2 Type: SA Page Ref: 112 Topic: Q3 Skill: RECALL 99) Users of cloud computing ________ the usage of computers from third-party providers. Answer: rent Diff: 2 Type: SA Page Ref: 117 Topic: Q4 Skill: RECALL
20 Copyright © 2016 Pearson Canada Inc.
100) Software that is installed often in special, read-only memory in devices like printers or communication devices is called ________. Answer: firmware Diff: 3 Type: SA Page Ref: 123 Topic: Q4 Skill: RECALL 101) Computer programs like QuickBooks that perform a specific business function are called ________ software. Answer: application Diff: 2 Type: SA Page Ref: 117 Topic: Q5 Skill: RECALL 102) ________ application software serves the needs of a specific industry. Answer: Vertical market Diff: 2 Type: SA Page Ref: 121 Topic: Q5 Skill: RECALL 103) ________ application software like a word processor application provides common capabilities across all organizations and industries. Answer: Horizontal-market Diff: 2 Type: SA Page Ref: 121 Topic: Q5 Skill: RECALL 104) Software that is tailor-made for special applications is called ________ software. Answer: custom Diff: 2 Type: SA Page Ref: 122 Topic: Q5 Skill: RECALL 105) A ________ stipulates how a program may be used by the purchaser. Answer: licence Diff: 2 Type: SA Page Ref: 120 Topic: Q5 Skill: RECALL
21 Copyright © 2016 Pearson Canada Inc.
106) Linux is an operating system developed loosely knit group of programmers. What is the name for this group? Can you describe two benefits of using this type of software? Answer: The name for the loosely unit group of programmers is "open-source community." These programmers act mostly as volunteers in creating software. In that sense, this community owns the software, Linux. The benefits of using this software are that it is free. There is no licence associated with it. Another benefit is that the source code can be modified to user needs. Also, since it's software owned by a community, there are permanent updates and enhancements to the software. Diff: 3 Type: ES Page Ref: 120 Topic: Q5 Skill: APPLIED 107) ________ computers have been used primarily by graphic artists and workers in the arts community. Answer: Macintosh Diff: 1 Type: SA Page Ref: 119 Topic: Q4 Skill: RECALL 108) ________ was developed by Bell Labs and is generally regarded as more difficult to use than Windows or Mac OS. Answer: Unix Diff: 2 Type: SA Page Ref: 119 Topic: Q4 Skill: RECALL 109) ________ is a version of Unix that was developed by the open source community. Answer: Linux Diff: 2 Type: SA Page Ref: 119 Topic: Q4 Skill: RECALL 110) ________ memory helps speed up the overall throughput of the CPU. Answer: Cache Diff: 2 Type: SA Page Ref: 114 Topic: Q3 Skill: RECALL 111) The CPU reads instructions and data from ________ via the data bus. Answer: memory Diff: 3 Type: SA Page Ref: 114 Topic: Q3 Skill: RECALL
22 Copyright © 2016 Pearson Canada Inc.
112) ________ viruses attach themselves to Word, Excel, or other type of documents. Answer: Macro Diff: 2 Type: SA Page Ref: 126 Topic: Q7 Skill: RECALL 113) The ________ is a computer program that controls all of the computer's resources. Answer: Operating System Diff: 2 Type: SA Page Ref: 114 Topic: Q3 Skill: RECALL 114) ________ like the heartbleed security bug are typically weaknesses in system design that can be exploited by knowledgeable people. Answer: System Vulnerabilities Diff: 2 Type: SA Page Ref: 126 Topic: Q7 Skill: RECALL 115) Viruses that are specifically programmed to spread are called ________. Answer: worms Diff: 2 Type: SA Page Ref: 126 Topic: Q7 Skill: RECALL 116) ________ is the program code that is delivered by a virus to cause harmful actions. Answer: Payload Diff: 3 Type: SA Page Ref: 126 Topic: Q7 Skill: RECALL 117) A ________ is a virus that propagates using the Internet or other computer network. Answer: worm Diff: 2 Type: SA Page Ref: 126 Topic: Q7 Skill: RECALL 118) A(n) ________ is equal to 1024 MB. Answer: gigabyte (GB) Diff: 2 Type: SA Page Ref: 114 Topic: Q3 Skill: RECALL
23 Copyright © 2016 Pearson Canada Inc.
119) Vendors issue ________ to fix security holes in their programs. Answer: patches Diff: 3 Type: SA Page Ref: 126 Topic: Q7 Skill: RECALL 120) 1024 GB of data is also referred to as a(n) ________. Answer: terabyte (TB) Diff: 2 Type: SA Page Ref: 114 Topic: Q3 Skill: RECALL 121) To represent the term "MIS" in a binary language would require ________ bytes of information. Answer: three Diff: 3 Type: SA Page Ref: 114 Topic: Q3 Skill: APPLIED 122) A byte is equivalent to one ________ of information. Answer: character Diff: 2 Type: SA Page Ref: 114 Topic: Q3 Skill: RECALL 123) The collection of instructions that a computer can process is called the computer's________. Answer: instruction set Diff: 2 Type: SA Page Ref: 116 Topic: Q4 Skill: RECALL 124) The need to minimize data volume to reduce the costs of storage was one reason for the ________ problem. Answer: Y2K Diff: 3 Type: SA Page Ref: 110 Topic: Q2 Skill: RECALL 125) According to most software licence agreements, vendors are not ________ for any security holes in the software that might leave their customers vulnerable to attack. Answer: accountable Diff: 3 Type: SA Page Ref: 126 Topic: Q7 Skill: APPLIED
24 Copyright © 2016 Pearson Canada Inc.
126) Every computer should have an active copy of a(n) ________ programs. Answer: Antivirus Diff: 2 Type: SA Page Ref: 126 Topic: Q7 Skill: APPLIED 127) A(n) ________ is equal to 1024 gigabytes. Answer: terabyte Diff: 3 Type: SA Page Ref: 114 Topic: Q3 Skill: RECALL 128) Some larger corporations and government organizations still use ________ computers. Answer: mainframe Diff: 2 Type: SA Page Ref: 107 Topic: Q2 Skill: RECALL 129) What is firmware? Answer: Firmware is computer software that is installed into devices like printers, print servers, and various types of communication devices. Diff: 2 Type: ES Page Ref: 123 Topic: Q5 Skill: RECALL 130) How are computer viruses different from worms? Answer: A virus is a computer program that replicates itself; a worm is a virus that propagates using the Internet or other computer network. Diff: 3 Type: ES Page Ref: 126 Topic: Q7 Skill: APPLIED 131) Explain the functions of BIOS. Answer: BIOS is an important piece of firmware that checks to make sure the memory and input devices are functional before the operating system is loaded. Diff: 3 Type: ES Page Ref: 123 Topic: Q5 Skill: APPLIED
25 Copyright © 2016 Pearson Canada Inc.
132) Why will knowing the basics about modern information technology help you in business? Answer: Knowing the basics about modern information technology (IT) (e.g., hardware, software, and networking) will not only help you be a more knowledgeable consumer of technology but also will help you be on top on the new advancements in your respective industry of interest. This understanding will allow you to recognize its positive and negative effects on society, and foresee the future. Indeed, knowing about modern IT may help you change the structure of your industry. (Refer to Porter's four competitive strategies on how IT can possibly do this in Chapter 3.) Diff: 3 Type: ES Page Ref: 106 Topic: Q1 Skill: APPLIED 133) Briefly describe how a computer works. Answer: The CPU (central processing unit) is the major actor. To run a program or process data, the CPU must first transfer the program or data from disk to main memory. Then, to execute an instruction, it moves the instruction from main memory into the CPU via the data channel or bus. The CPU has a small amount of very fast memory called a cache. The CPU keeps frequently used instructions in the cache. Having a large cache makes the computer faster, but cache is expensive. Main memory of the computer contains program instructions and instructions for the operating system, which is a program that controls the computer's resources as well as a block of data. Main memory is too small to hold all of the programs and data that a user may want to process. CPU loads programs into memory in chunks. When the user requested additional processing, the CPU loaded another piece of code. Diff: 3 Type: ES Page Ref: 114 Topic: Q3 Skill: APPLIED 134) How does the Microsoft licensing model differ from an open source licence? Answer: Microsoft licenses its software to its customers, users buy the right to use the program, but do not own the program. Open source software is owned by the community that develops it, that includes every user potentially. There is no fee to use open source software. Diff: 3 Type: ES Page Ref: 119 Topic: Q5 Skill: APPLIED 135) What are the difference in functions between a client computer and a server computer? Answer: User uses client computers for word processing, spreadsheets, database access, and so forth. Most client computers also have software that enables them to connect to a network. Server computers publish web sites, sell goods, host databases, and provide other functions. Diff: 3 Type: ES Page Ref: 124 Topic: Q5 Skill: APPLIED
26 Copyright © 2016 Pearson Canada Inc.
136) What are two major categories of software? Give an example of each. Answer: At the highest level, one should think of both operating systems (or system software) and application software. An example of a common operating system would, of course, be Windows XP. An example of an application program is MS Word with the MS Office application suite. Other examples of application software could be general ledger, payables, order entry, purchasing, etc. Diff: 3 Type: ES Page Ref: 121 Topic: Q5 Skill: APPLIED 137) Describe the functions of an operating system software. Answer: An operating system is a program that controls the computers resources and is responsible for loading and unloading programs. Diff: 2 Type: ES Page Ref: 114 Topic: Q3 Skill: APPLIED 138) What are the differences between volatile and nonvolatile memory? Give an example of each. Why is this important to know in business? Answer: Volatile memory is impermanent as compared to nonvolatile memory which is relatively permanent. This simply means that when the electric power that flows through the circuits is turned off, the data represented in the volatile memory disappears whereas the nonvolatile memory will retain the data. The main examples are RAM which is volatile and ROM which is nonvolatile. This is important to know in business so that we save our important data in a non-volatile memory format when we are done. Diff: 3 Type: ES Page Ref: 115 Topic: Q3 Skill: APPLIED 139) How is data represented and processed in the CPU? Answer: Computers use bits to represent data. A bit, or binary digit, has a value of zero or one. These bits are used to represent both computer instructions and also data and are processed in the CPU. They are loaded from the magnetic disk into main memory and then into the memory registers of the CPU where the instructions are fetched, decoded, and then executed. The results are stored in more registers and then moved back to main memory via the data bus. Diff: 3 Type: ES Page Ref: 114 Topic: Q3 Skill: APPLIED
27 Copyright © 2016 Pearson Canada Inc.
140) Describe three different types of viruses and how they work. Answer: A Trojan horse virus masquerades as a game, music file, or a useful program that users want to download and then delivers a malicious payload. A macro virus attaches to a Word, Excel, or other type of document file. Then when the file is opened, it places itself in the start up file of that particular application and then infects every file the application processes after that. Worm viruses use the Internet or other computer network to spread and propagate. They can choke networks with a high volume of traffic to make the network unusable. Diff: 3 Type: ES Page Ref: 126 Topic: Q7 Skill: APPLIED 141) What is an operating system? How does it perform memory swapping and why is this important for business? Answer: Operating system software is software that works behind the scenes of the computer to manage all the computer resources, including the CPU, main memory, and the input and output from other devices. When a user attempts to use multiple applications and multiple files, they must all be loaded into main memory. When the capacity of main memory is reached, the operating system will remove some applications and data from main memory to make room for the new program or file that was invoked. If the user jumps to one of the applications that was removed from main memory, the operating system will "page" it back into main memory as needed. This will result in slower processing of the data and applications. Diff: 3 Type: ES Page Ref: 114 Topic: Q3 Skill: APPLIED 142) What is the difference between off-the-shelf and custom software? What are the advantages and disadvantages of custom software? Answer: Off-the-shelf software is purchased and then may be modified to fit the particular need. Custom software is programmed from scratch to meet the needs of the company. Custom software development can be difficult and risky. Software development projects are hard to manage and are often 200 to 300 percent over budget and late. It may be that the needs of the organization are so unusual that no packaged system comes close to meeting those needs. If the potential gain in competitive advantage is great, it may be enough to justify the risk. It is also risky because many other existing applications may have to be modified in order to be integrated with the custom application. If the original developers of the system leave the organization, there must be good documentation of the custom system in order for other people to properly maintain it. Diff: 3 Type: ES Page Ref: 122 Topic: Q5 Skill: APPLIED
28 Copyright © 2016 Pearson Canada Inc.
143) What are the different categories of hardware? Give an example of each. Answer: If we look at the basic functions of hardware, they can be categorized into input, output, processing, and storage devices. Input hardware includes keyboards, light pens, and mice; output devices are monitors and printers; processing hardware would include the CPU and main memory; and storage hardware would include magnetic and optical disk. Diff: 3 Type: ES Page Ref: 111 Topic: Q3 Skill: APPLIED 144) Some people say that technology changes too quickly and that they don't want any more features on the hardware and software that they use. Discuss the downside and the upside of this argument. Answer: While it is certainly true that software and hardware companies tend to overwhelm markets with their continual release of new and improved products, it difficult for them not to do this. They are under pressure to keep their firm's growth at high levels and so need to release new and improved products. Then there are some power users who demand new products. And if companies don't keep advancing their own technologies, they will be perceived as laggards in the industry rather than leaders. It is dangerous from a user standpoint to buy one version of software or hardware, learn it thoroughly, and then refuse to upgrade. Eventually these products will no longer be supported by the vendors and won't run on any available computers. There is a lot of marketing hype around new technology products, it is important to try and see through the, but it is equally important to keep up with advances in technology. Diff: 3 Type: ES Page Ref: 132 Topic: Q1 Skill: APPLIED 145) Describe how you would stay informed about changes in technology. Answer: For today's professionals, there is no other option except immersing oneself in the new changes in technology. There are different ways in which you can do this: 1) reading material that contains this type of information (e.g., CNET News and ZDNet); 2) attending professional events that combine your specialty with technology (e.g., if you are banker, attend sessions on technology trends for bankers); and 3) getting involved as a user representative in technology committees within your organization if possible (i.e., if your company is implementing an ERP, you can take part as technology champion or reviewer). Diff: 3 Type: ES Page Ref: 132 Topic: Q1 Skill: APPLIED
29 Copyright © 2016 Pearson Canada Inc.
146) Explain why it is important for a manager to know how computers work. Answer: Computers can be bought with different amounts of memory and different configurations and, of course, their costs also vary with it. For that reason, it's important for managers to understand the basics of how computers work so that they can help with the decision-making process when choosing the computers needed in the organization. For example, managers should at least be able to understand that the ability and capacity of certain computers to process a given amount of work in a set period depend on more factors than just the speed of the processor. And thus, they should be able to select the right computers for the information storage and processing needs of their organizations. This knowledge would also help these managers increase their negotiating skills with technology vendors. Diff: 3 Type: ES Page Ref: 115 Topic: Q3 Skill: APPLIED 147) Why is cloud computing theoretically more efficient than traditional computing? Answer: Cloud computing is more efficient because users pay only for what they use. Hardware and software are not purchased and then not used. In cloud computing hardware and software is rented only when it is necessary and this makes cloud computing more efficient. Diff: 3 Type: ES Page Ref: 117 Topic: Q4 Skill: APPLIED
30 Copyright © 2016 Pearson Canada Inc.
Experiencing MIS, Cdn. Ed., 4e (Kroenke) Chapter 5 Database and Content Management 1) A database is a self-describing collection of integrated records. Answer: TRUE Diff: 1 Type: TF Page Ref: 139 Topic: Q4 Skill: RECALL 2) Special data called structured data describes the structure of the database. Answer: FALSE Diff: 1 Type: TF Page Ref: 142 Topic: Q4 Skill: RECALL 3) Metadata is data about data. Answer: TRUE Diff: 1 Type: TF Page Ref: 142 Topic: Q4 Skill: RECALL 4) The name of the field, its datatype, and description are examples of metadata. Answer: TRUE Diff: 2 Type: TF Page Ref: 142 Topic: Q4 Skill: RECALL 5) A DBMS is software that helps manage the operating system. Answer: FALSE Diff: 2 Type: TF Page Ref: 149 Topic: Q5 Skill: RECALL 6) A database application system consists of forms, reports, and database programs. Answer: TRUE Diff: 1 Type: TF Page Ref: 143 Topic: Q5 Skill: RECALL 7) Most large companies develop their own DBMSs. Answer: FALSE Diff: 2 Type: TF Page Ref: 143 Topic: Q5 Skill: RECALL
1 Copyright © 2016 Pearson Canada Inc.
8) IBM makes a DBMS called SQL-Server. Answer: FALSE Diff: 2 Type: TF Page Ref: 143 Topic: Q5 Skill: RECALL 9) MySQL is an open source DBMS product. Answer: TRUE Diff: 1 Type: TF Page Ref: 143 Topic: Q5 Skill: RECALL 10) Oracle makes a DBMS packaged called DB2. Answer: FALSE Diff: 2 Type: TF Page Ref: 143 Topic: Q5 Skill: RECALL 11) SQL Server is an open-source DBMS package that is free for most database applications. Answer: FALSE Diff: 2 Type: TF Page Ref: 143 Topic: Q5 Skill: RECALL 12) A DBMS and a database are two different things. Answer: TRUE Diff: 1 Type: TF Page Ref: 143 Topic: Q5 Skill: RECALL 13) A DBMS is a collection of tables, relationships, and metadata. Answer: FALSE Diff: 2 Type: TF Page Ref: 143 Topic: Q5 Skill: RECALL 14) SQL is an international standard language for processing a database. Answer: TRUE Diff: 2 Type: TF Page Ref: 144 Topic: Q5 Skill: RECALL 15) SQL stands for "Standard Query Language." Answer: FALSE Diff: 2 Type: TF Page Ref: 144 Topic: Q5 Skill: RECALL 2 Copyright © 2016 Pearson Canada Inc.
16) SQL can be used to add a new column to a table. Answer: TRUE Diff: 2 Type: TF Page Ref: 144 Topic: Q5 Skill: APPLIED 17) A database can have one and only one application. Answer: FALSE Diff: 2 Type: TF Page Ref: 145 Topic: Q6 Skill: RECALL 18) A database application can have one or more users. Answer: TRUE Diff: 1 Type: TF Page Ref: 145 Topic: Q6 Skill: RECALL 19) A database form translates inputted changes into a SQL query in order for the database to process them. Answer: TRUE Diff: 3 Type: TF Page Ref: 144 Topic: Q5 Skill: APPLIED 20) Many people find it easier to store data using a spreadsheet than a database. Answer: TRUE Diff: 1 Type: TF Page Ref: 138 Topic: Q3 Skill: RECALL 21) The only remaining personal DBMS today is Paradox. Answer: FALSE Diff: 2 Type: TF Page Ref: 150 Topic: Q7 Skill: RECALL 22) A spreadsheet is just another type of relational database. Answer: FALSE Diff: 2 Type: TF Page Ref: 141 Topic: Q4 Skill: APPLIED
3 Copyright © 2016 Pearson Canada Inc.
23) Personal DBMS can handle over 100 users. Answer: FALSE Diff: 2 Type: TF Page Ref: 150 Topic: Q7 Skill: RECALL 24) Spreadsheets usually track only one "theme," but databases usually involved more than one "theme." Answer: TRUE Diff: 2 Type: TF Page Ref: 138 Topic: Q3 Skill: RECALL 25) Employees usually insert content directly into a company's website without a controlling editor. Answer: FALSE Diff: 2 Type: TF Page Ref: 137 Topic: Q2 Skill: APPLIED 26) ________ is a form of creative endeavor that can be protected through a trademark, patent, copyright, industrial design, or integrated circuit topography. A) Innovative design B) Intellectual property C) Creative writing D) Programming E) Digital design Answer: B Diff: 1 Type: MC Page Ref: 136 Topic: Q1 Skill: RECALL 27) What does CMS stand for? A) Content Management System B) Copy Management System C) Customer Management System D) Customer Manipulation System E) Content Manipulation System Answer: A Diff: 1 Type: MC Page Ref: 137 Topic: Q2 Skill: RECALL
4 Copyright © 2016 Pearson Canada Inc.
28) A ________ is a self-describing collection of integrated records. A) column B) table C) row D) field E) database Answer: E Diff: 1 Type: MC Page Ref: 139 Topic: Q4 Skill: RECALL 29) A group of similar rows or records is called a A) database. B) table. C) instance. D) attribute. E) column. Answer: B Diff: 1 Type: MC Page Ref: 139 Topic: Q4 Skill: RECALL 30) ________ describe(s) the structure of the database. A) Metadata B) Tables C) Columns D) A relationship diagram E) Fields Answer: A Diff: 2 Type: MC Page Ref: 139 Topic: Q4 Skill: RECALL 31) A database consists of A) rows, tables, instructions. B) metadata, keyboard, relationships. C) tables, instructions, relationships. D) relationships, rows tables. E) CPU, tables, rows. Answer: D Diff: 3 Type: MC Page Ref: 139 Topic: Q4 Skill: RECALL
5 Copyright © 2016 Pearson Canada Inc.
32) A ________ is a column or group of columns that identifies a unique row in a table. A) record B) relationship C) row D) key E) field Answer: D Diff: 2 Type: MC Page Ref: 140 Topic: Q4 Skill: RECALL 33) ________ are keys in a different table from the one in which they reside. A) Secondary keys B) Simple keys C) Special keys D) Primary keys E) Foreign keys Answer: E Diff: 3 Type: MC Page Ref: 141 Topic: Q4 Skill: RECALL 34) ________ is a formal name for a table. A) File B) Database C) Collection D) Metadata E) Relation Answer: E Diff: 2 Type: MC Page Ref: 141 Topic: Q4 Skill: RECALL 35) A relational database refers to A) databases that have related objects related by similar attributes. B) a set of tables that contains similar content. C) a set of files that have similar names. D) databases that carry data in the form of tables with individual primary keys. E) databases that carry data in the form of tables and that represent relationships using foreign keys. Answer: E Diff: 2 Type: MC Page Ref: 141 Topic: Q5 Skill: RECALL
6 Copyright © 2016 Pearson Canada Inc.
36) Which of the following are NOT considered to be metadata? A) Field properties B) Description C) File name D) Data type E) Field name Answer: C Diff: 2 Type: MC Page Ref: 141 Topic: Q4 Skill: APPLIED 37) ________ consists of forms, formatted reports, queries, and application programs. A) A database application B) A DBMS program C) A Visual Basic application D) A database E) A Windows application Answer: A Diff: 1 Type: MC Page Ref: 143 Topic: Q5 Skill: RECALL 38) Which of the following is a personal DBMS product? A) Microsoft Access B) Oracle C) SQL. D) Microsoft SQL Server E) IBM DB2. Answer: A Diff: 1 Type: MC Page Ref: 150 Topic: Q7 Skill: RECALL 39) Which of the following is an international standard language for processing a database? A) VBA B) C++ C) Visual Basic D) Standard Query Language E) Structured Query Language Answer: E Diff: 2 Type: MC Page Ref: 144 Topic: Q5 Skill: RECALL
7 Copyright © 2016 Pearson Canada Inc.
40) A database applications is a collection of programs, forms, reports and A) Queries. B) Tables. C) Metadata. D) Keys. E) Printers. Answer: A Diff: 2 Type: MC Page Ref: 145 Topic: Q6 Skill: RECALL 41) ________ are used to display formatted data and to generate paper copies of the data. A) Tables B) Forms C) Views D) Reports E) Queries Answer: D Diff: 2 Type: MC Page Ref: 147 Topic: Q6 Skill: RECALL 42) Which of the following techniques is used to resolve the lost-update problem? A) Preemptive updating B) Sharing C) Task switching D) Locking E) Multitasking Answer: D Diff: 2 Type: MC Page Ref: 149 Topic: Q6 Skill: RECALL 43) Which of the following is a file extension name of a graphics file? A) .wav B) .mov C) .mpg D) .pdf E) .bmp Answer: E Diff: 2 Type: MC Page Ref: 136 Topic: Q1 Skill: RECALL
8 Copyright © 2016 Pearson Canada Inc.
44) Which of the following is a file extension name of an audio file? A) .pdf B) .wav C) .mov D) .bmp E) .mpg Answer: B Diff: 1 Type: MC Page Ref: 136 Topic: Q1 Skill: RECALL 45) Which of the following is a file extension name of a video file? A) .wav B) .mpg C) .doc D) .pdf E) .bmp Answer: B Diff: 1 Type: MC Page Ref: 136 Topic: Q1 Skill: RECALL 46) Which of the following is a file extension name of a word-processing document? A) .mpg B) .docx C) .bmp D) .xlsx E) .wav Answer: B Diff: 1 Type: MC Page Ref: 136 Topic: Q1 Skill: RECALL 47) Which of the following are NOT users of a content management system? A) Customers B) Web masters C) Copy editors D) Managers E) Employees Answer: A Diff: 3 Type: MC Page Ref: 137 Topic: Q2 Skill: RECALL
9 Copyright © 2016 Pearson Canada Inc.
48) The company that digitized the Oxford English Dictionary is called A) IBM. B) Nortel. C) Microsoft. D) Open Text. E) Research in Motion. Answer: D Diff: 1 Type: MC Page Ref: 137 Topic: Q2 Skill: RECALL 49) Columns are also called A) rows. B) databases. C) fields. D) relations. E) tables. Answer: C Diff: 1 Type: MC Page Ref: 139 Topic: Q4 Skill: RECALL 50) In a relational database, a collection of related records is a(n) A) row. B) attribute. C) table. D) column. E) field. Answer: C Diff: 2 Type: MC Page Ref: 139 Topic: Q4 Skill: RECALL 51) A collection of records in a relational database can be called a A) matrix. B) column. C) field. D) row. E) relation. Answer: E Diff: 2 Type: MC Page Ref: 141 Topic: Q4 Skill: RECALL
10 Copyright © 2016 Pearson Canada Inc.
52) The company Open Text provides companies with "cloud based" A) sales management software. B) document management software. C) Microsoft Office. D) data storage. E) accounting software. Answer: B Diff: 3 Type: MC Page Ref: 137 Topic: Q2 Skill: RECALL 53) Many users prefer to avoid database applications altogether and simply store their data in a(n) A) mattress. B) file. C) old can. D) spreadsheet. E) encrypted table. Answer: D Diff: 2 Type: MC Page Ref: 138 Topic: Q3 Skill: RECALL 54) ________ software assists in creating, maintaining, and manipulating databases. A) DMS B) KMS C) DBMS D) MIS E) DBM Answer: C Diff: 3 Type: MC Page Ref: 143 Topic: Q5 Skill: RECALL 55) Content management is indexing the right information, processing, sorting it, and then A) getting it printed when needed. B) hiring good programmers. C) editing right employee input. D) making it available in the right format at the right time. E) giving it to employees with "strong" passwords. Answer: D Diff: 3 Type: MC Page Ref: 136 Topic: Q2 Skill: RECALL
11 Copyright © 2016 Pearson Canada Inc.
56) ________ is a record in a relational database. A) A field B) A table C) A column D) A row E) A key Answer: D Diff: 2 Type: MC Page Ref: 139 Topic: Q4 Skill: RECALL 57) ________ is an example of a personal DBMS. A) Access B) SQL Server C) DB2 D) SQL E) Oracle Answer: A Diff: 2 Type: MC Page Ref: 139 Topic: Q4 Skill: RECALL 58) ________ is an example of an enterprise DBMS. A) Access B) DB2 C) FoxPro D) Quattro Pro E) Paradox Answer: B Diff: 2 Type: MC Page Ref: 143 Topic: Q5 Skill: RECALL 59) MySQL is popular because it is a(n) ________ DBMS. A) open-source B) work-group C) personal D) enterprise E) powerful Answer: A Diff: 2 Type: MC Page Ref: 143 Topic: Q5 Skill: RECALL
12 Copyright © 2016 Pearson Canada Inc.
60) One example of a DBMS is A) SQL Server. B) .NET. C) Java. D) OEM. E) Excel. Answer: A Diff: 2 Type: MC Page Ref: 143 Topic: Q5 Skill: RECALL 61) SQL is a A) query language. B) database system. C) 3GL. D) 2GL. E) programming language. Answer: A Diff: 2 Type: MC Page Ref: 144 Topic: Q5 Skill: RECALL 62) A(n) ________ DBMS is designed to process large organizational and workgroup databases. A) object-oriented B) network C) relational D) personal E) enterprise Answer: E Diff: 2 Type: MC Page Ref: 149 Topic: Q7 Skill: RECALL 63) SQL stands for A) Structured Query Language. B) Standard Query Language. C) Structured Question Language. D) Simple Query Language. E) Standard Question Language. Answer: A Diff: 2 Type: MC Topic: Q5 Skill: RECALL
Page Ref: 144
13 Copyright © 2016 Pearson Canada Inc.
64) ________ is an international standard language for processing a database. A) VBA B) SQL C) Java D) .NET E) MySQL Answer: B Diff: 2 Type: MC Page Ref: 144 Topic: Q5 Skill: RECALL 65) The ________ problem is unique to a multi-user database environment. A) redundancy B) lost-update C) locked file D) security E) data integrity Answer: B Diff: 3 Type: MC Page Ref: 149 Topic: Q6 Skill: RECALL 66) Users process data in the database using A) files. B) logic. C) programs. D) reports. E) queries. Answer: E Diff: 3 Type: MC Page Ref: 143 Topic: Q5 Skill: APPLIED 67) The name of the field, the data type, and number of characters allowed are examples of A) attributes. B) characters. C) content. D) overhead. E) metadata. Answer: E Diff: 2 Type: MC Page Ref: 142 Topic: Q4 Skill: RECALL
14 Copyright © 2016 Pearson Canada Inc.
68) ________ describe(s) the structure of a database. A) Logic B) Metadata C) Models D) Protocols E) Content Answer: B Diff: 2 Type: MC Page Ref: 142 Topic: Q4 Skill: RECALL 69) In today's business world content is just not about collection and distribution. It is also about A) the accuracy of the content. B) the organization of the content. C) the content management system. D) the relevance of the content. E) presenting the content appropriately for the audience. Answer: E Diff: 2 Type: MC Page Ref: 136 Topic: Q1 Skill: RECALL 70) In the early days of corporate websites, employees were allowed to add content directly to the sites. Today this practice is not acceptable because A) of the lack of consistency in both look and accuracy of the web site. B) employees lack the skills to add content to web sites due to the greater sophistication of the software used today for corporate web sites. C) companies with web sites now have copy editors to prepare web site content. D) most companies use content management systems today. E) most web sites are driven by database management systems. Answer: A Diff: 3 Type: MC Page Ref: 137 Topic: Q2 Skill: RECALL 71) Modern content management systems A) seek out documents located across an organization and actively manage access to the content. B) manage only media files. C) archive documents. D) organize content for corporate web sites. E) manage all aspects of corporate data. Answer: A Diff: 3 Type: MC Page Ref: 137 Topic: Q2 Skill: RECALL
15 Copyright © 2016 Pearson Canada Inc.
72) Content is closely related to A) intellectual property. B) words. C) software. D) property in the broadest sense. E) organized materials. Answer: A Diff: 2 Type: MC Page Ref: 136 Topic: Q1 Skill: RECALL 73) One of the DMBS administrative functions includes A) building the database. B) backing up the database. C) collecting user requirements for the database. D) planning the database. E) entering new data into the database. Answer: B Diff: 3 Type: MC Page Ref: 145 Topic: Q5 Skill: RECALL 74) A database differs from a spreadsheet by A) involving lists of a single theme. B) having only columns. C) having lists of multiple rows and columns. D) involving lists of multiple themes. E) having only rows. Answer: D Diff: 3 Type: MC Page Ref: 138 Topic: Q3 Skill: APPLIED 75) In databases, names of clients can be troublesome since they may not be A) relevant. B) simple. C) reconciled. D) unique. E) normalized. Answer: D Diff: 3 Type: MC Page Ref: 146 Topic: Q6 Skill: RECALL
16 Copyright © 2016 Pearson Canada Inc.
76) In a relational database application, a(n) ________ key is used to link one table with another. A) primary B) index C) secondary D) foreign E) composite Answer: D Diff: 2 Type: MC Page Ref: 141 Topic: Q4 Skill: RECALL 77) Some employees are frustrated with database applications or are unwilling to share their data, so they prefer to store their data in a(n) ________ instead of a database application. Answer: spreadsheet Diff: 2 Type: SA Page Ref: 138 Topic: Q3 Skill: RECALL 78) If a user stores their data in a spreadsheet, it is unavailable to other users unless it is stored in the company's ________. Answer: CMS Diff: 3 Type: SA Page Ref: 137 Topic: Q2 Skill: RECALL 79) ________ describes the data in a database. Answer: metadata Diff: 2 Type: SA Page Ref: 142 Topic: Q4 Skill: RECALL 80) ________ DBMS like DB2 are designed for large, corporate database applications. Answer: Enterprise Diff: 1 Type: SA Page Ref: 149 Topic: Q7 Skill: RECALL 81) For applications that need to process databases over the Internet, the application serves as an intermediary between the ________ and the database. Answer: web server Diff: 2 Type: SA Page Ref: 148 Topic: Q6 Skill: RECALL
17 Copyright © 2016 Pearson Canada Inc.
82) Characters of information are represented by individual ________. Answer: bytes Diff: 1 Type: SA Page Ref: 140 Topic: Q4 Skill: RECALL 83) A(n) ________ is software that is used to create, process, and administer a database. Answer: DBMS Diff: 2 Type: SA Page Ref: 143 Topic: Q5 Skill: RECALL 84) A(n) ________ is another name for a table in relational database terms. Answer: relation Diff: 2 Type: SA Page Ref: 141 Topic: Q4 Skill: RECALL 85) ________ is a query language that is portable between all relational DBMSs. Answer: SQL Diff: 2 Type: SA Page Ref: 144 Topic: Q5 Skill: RECALL 86) ________ database products like MS Access are designed for individual users or small workgroups of no more than 15 users. Answer: Personal Diff: 2 Type: SA Page Ref: 150 Topic: Q7 Skill: RECALL 87) If your database produces inaccurate results that don't seem to have a cause, your database may be having ________ problems. Answer: lost-update Diff: 3 Type: SA Page Ref: 149 Topic: Q6 Skill: RECALL 88) A web ________ helps to enable a company to standardize the look and feel of a web site. Answer: CMS Diff: 2 Type: SA Page Ref: 137 Topic: Q2 Skill: RECALL
18 Copyright © 2016 Pearson Canada Inc.
89) A collection of columns or fields is called rows or ________. Answer: records Diff: 1 Type: SA Page Ref: 139 Topic: Q4 Skill: RECALL 90) A group of similar rows or records is called a file or a(n) ________. Answer: table Diff: 1 Type: SA Page Ref: 139 Topic: Q4 Skill: RECALL 91) Bytes are grouped into columns or ________. Answer: fields Diff: 1 Type: SA Page Ref: 139 Topic: Q4 Skill: RECALL 92) A ________ is a self-describing collection of integrated records. Answer: database Diff: 1 Type: SA Page Ref: 139 Topic: Q4 Skill: RECALL 93) A database is a collection of tables, ________, and metadata. Answer: relationships Diff: 2 Type: SA Page Ref: 139 Topic: Q4 Skill: RECALL 94) Data type and description are examples of ________. Answer: metadata Diff: 2 Type: SA Page Ref: 142 Topic: Q4 Skill: RECALL 95) The purpose of a database is to keep track of things that involve more than one ________. Answer: theme Diff: 2 Type: SA Page Ref: 138 Topic: Q3 Skill: RECALL 96) A(n) ________ is a special name for a question that is asked in a database application. Answer: query Diff: 2 Type: SA Page Ref: 144 Topic: Q5 Skill: RECALL 19 Copyright © 2016 Pearson Canada Inc.
97) A database is a collection of tables, metadata, and ________. Answer: relationships Diff: 2 Type: SA Page Ref: 143 Topic: Q5 Skill: RECALL 98) Setting up the database security is a part of database ________. Answer: administration Diff: 2 Type: SA Page Ref: 145 Topic: Q5 Skill: RECALL 99) When a database form is processed to add a new record to a table, the DBMS converts the contents of the form into a(n) ________ statement. Answer: SQL Diff: 3 Type: SA Page Ref: 144 Topic: Q5 Skill: RECALL 100) To prevent the lost-update problem, the DBMS should have some type of ________ mechanism. Answer: locking Diff: 3 Type: SA Page Ref: 149 Topic: Q6 Skill: RECALL 101) Forms and reports are usually part of a database ________. Answer: application Diff: 2 Type: SA Page Ref: 147 Topic: Q6 Skill: RECALL 102) What are the differences between a database and a spreadsheet? Answer: A spreadsheet table is organized into rows and columns and is typically used to track related data across two dimensions (e.g. student grades on course assignments), whereas a database is a three-dimensional storage structure—think of a series of two-dimensional tables linked together (e.g. course scheduling for faculty and students). A database has metadata to structure the data of the database. Spreadsheets are simple to set up and understand. However, a database is preferable in cases where the user needs to keep track of three or more things— customers, sales, suppliers, and other transactions—and databases are better when data involves more than one topic or theme. Spreadsheets work best when the data involves just one topic or theme. Diff: 3 Type: ES Page Ref: 138 Topic: Q3 Skill: APPLIED
20 Copyright © 2016 Pearson Canada Inc.
103) Explain the difference between a primary key and a foreign key. Answer: A primary key is a column or group of columns that has a unique value for each row in a table. Foreign keys are primary keys from a different table than the one in which they reside. Diff: 3 Type: ES Page Ref: 141 Topic: Q4 Skill: APPLIED 104) What is a database application? Answer: A database application consists of forms, formatted reports, queries, and application programs. Each of these in turn calls on the database management system to process the database tables. Diff: 2 Type: ES Page Ref: 143 Topic: Q5 Skill: RECALL 105) Discuss the challenges for a multiuser database application. Answer: Multiple users may try to update the same record at the same time, which can make for a lost-update problem. To prevent this problem, some type of locking must be used to coordinate the activities of users. Diff: 3 Type: ES Page Ref: 149 Topic: Q6 Skill: APPLIED 106) Describe the use of a content management system. Answer: When an employee wants to place some content on the organizations web site he or she will access the content management system. The web CMS is usually located on the company's web site server. The employee typically loads the raw content into the CMS. Copy editors then review the document and make necessary changes. They then pass the content on to layout editors, who prepare how the content will be presented. The content and presentation are stored with the help of a DBMS. The manager in charge of the web site will then review the content and presentation and publish the work to the public web site. Diff: 3 Type: ES Page Ref: 137 Topic: Q2 Skill: RECALL 107) Name three different DBMS packages available today. Answer: IBM DB2, Oracle, Microsoft SQL Server, MySQL. Diff: 1 Type: ES Page Ref: 143 Topic: Q5 Skill: RECALL 108) What is the difference between a DBMS and a database? Answer: A DBMS is a software program that helps to build, control and maintain a database; a database is a collection of tables, relationships, and metadata. Diff: 2 Type: ES Page Ref: 143 Topic: Q5 Skill: RECALL 21 Copyright © 2016 Pearson Canada Inc.
109) What is metadata? Give an example. Why is it important? Answer: Metadata is data "about" data. Metadata describes the structure of the database and its contents. Examples include the names and descriptions of the fields, the various aliases for them throughout the database, the dates that they were created and modified, the data types, the field widths, and whether it's a key or indexed. Metadata is important because it helps the DBMS to automate some data management tasks. However, as the amount of metadata grows it takes up more memory and must be managed itself. Diff: 3 Type: ES Page Ref: 142 Topic: Q4 Skill: APPLIED 110) What is a DBMS? What are the advantages and disadvantages of using a DBMS? Answer: DBMS stands for Database Management System. There are many different kinds but the relational DBMS (RDBMS) is by far the most popular today. A DBMS is useful because it helps database developers create tables and relationships, manage the metadata, process the database with queries, and administer the user access and security. It standardizes data access in the organization and simplifies data maintenance. Data can be quite complex and quite expensive to manage. If the centralized data store is not archived and backed up properly, the impact of lost corporate data will be more severe than in an older situation where there were a lot of redundant databases. Diff: 3 Type: ES Page Ref: 143 Topic: Q5 Skill: APPLIED 111) It is often said that much of corporate data resides in various unrelated spreadsheet files or, "spreadsheet silos." What are these concepts and why are they a problem? Answer: Millions of business users rely daily on spreadsheets for business intelligence (BI) functions such as data manipulation, data visualization, presentation graphics, forecasting, and so on. For many users, spreadsheets are a form of reporting, and pivot tables a type of data analysis. When users modify the data in spreadsheets and add new data, soon the data in the spreadsheet looks nothing like the source data. This creates problems for sharing the data with others and it generates inconsistent versions of the data in the organization. Diff: 3 Type: ES Page Ref: 138 Topic: Q3 Skill: APPLIED
22 Copyright © 2016 Pearson Canada Inc.
112) What is meant by a relational database? What are the advantages of relational database technology? Answer: Relational databases store data in tables and use shared fields (primary and foreign keys) in order to show the relationships between tables. Relational databases are based on strong fundamental theory and limit the amount of data redundancy and data errors. A relational database can enforce data and referential integrity constraints. They are the most popular type of DBMS available because they capture all the possible types of relationships and they are fairly easy to learn and implement. There are many skilled IT specialists in this field so it is fairly easy to find support for this technology. Diff: 3 Type: ES Page Ref: 141 Topic: Q4 Skill: APPLIED 113) What is SQL? Why is it so important for DBMS? Give an example. Answer: SQL stands for "Structured Query Language," and this is the standard query language for all DBMSs. It is a 4GL so it is fairly English-like and easy to learn. A knowledge of generic SQL can be transferred to any of the popular DBMSs easily. There are SQL commands for creating tables, manipulating data, and for maintaining the data. A standard format for a data manipulation type of query is: SELECT field 1, field 2, ….field n FROM table 1, table 2, ….table m WHERE condition 1, condition 2, ….condition p is true So a typical query might be: SELECT CustomerNumber, CustomerName FROM Customer WHERE Province = ‘AB' Diff: 3 Type: ES Page Ref: 144 Topic: Q5 Skill: APPLIED 114) What is the difference between a personal DBMS and an enterprise DBMS? Give an example of each. Answer: A personal DBMS is designed for smaller, simpler database applications. It can be used for personal or small workgroup applications with fewer than 100 users, usually less than 15. Most of the time a personal DBMS is used by a single user for a stand-alone application. The most popular example is MS Access. Enterprise DBMSs like DB2 from IBM process large organizational or workgroup database applications. They may have thousands of users with multiple applications distributed across various networks. They have more sophisticated network and security capabilities than a personal DBMS. Diff: 3 Type: ES Page Ref: 149-150 Topic: Q7 Skill: APPLIED
23 Copyright © 2016 Pearson Canada Inc.
115) If you are a database administrator and you uncover some suspicious transactions in one of your database applications, what should you do? Answer: Everyone should be aware that fraud does happen, it is more likely to be due to an employee than an outsider. The first thing to be aware of is you must not speak casually about this situation with anyone. It is important to begin carefully to collect as much data as possible on the situation and document all the names and dates. As soon as possible you should speak with a member of the senior management, possibly a CIO or CFO since the CFO is usually in charge of financial controls. If the matter continues for very long and looks complicated, you should consider contacting your own lawyer to protect your own interests. Diff: 3 Type: ES Page Ref: 145 Topic: Q5 Skill: APPLIED
24 Copyright © 2016 Pearson Canada Inc.
Experiencing MIS, Cdn. Ed., 4e (Kroenke) Chapter 6 Networks and Collaboration 1) At company social events, talking to people you don't know will help expand your business network only if you know how these new acquaintances can help you. Answer: FALSE Diff: 2 Type: TF Page Ref: 226 Topic: Q1 Skill: RECALL 2) According to the text, networking "weak" ties is not the best strategy for increasing the number of people in your network. Answer: FALSE Diff: 3 Type: TF Page Ref: 227 Topic: Q1 Skill: RECALL 3) Effective collaboration results are greater that any results produced by individuals working alone. Answer: TRUE Diff: 1 Type: TF Page Ref: 197 Topic: Q1 Skill: RECALL 4) A Local Area Network (LAN) would be used to connect computers located in Calgary and Montreal. Answer: FALSE Diff: 2 Type: TF Page Ref: 199 Topic: Q2 Skill: RECALL 5) An ISP functions as a gateway to the Internet. Answer: TRUE Diff: 1 Type: TF Page Ref: 205 Topic: Q5 Skill: RECALL 6) The 802.11b standard is the dominant WLAN standard today. Answer: FALSE Diff: 2 Type: TF Page Ref: 203 Topic: Q3 Skill: APPLIED
1 Copyright © 2016 Pearson Canada Inc.
7) The fastest WLAN standard in use today is 802.11n. Answer: TRUE Diff: 2 Type: TF Page Ref: 202 Topic: Q3 Skill: RECALL 8) An analog signal is a digital format. Answer: FALSE Diff: 2 Type: TF Page Ref: 207 Topic: Q5 Skill: RECALL 9) A modem converts a TCP/IP signal to a wireless format. Answer: FALSE Diff: 2 Type: TF Page Ref: 209 Topic: Q5 Skill: RECALL 10) DSL stands for digital signal line and operates on the same lines as voice telephones and dial-up modems. Answer: FALSE Diff: 2 Type: TF Page Ref: 208 Topic: Q5 Skill: RECALL 11) An Access Point converts wired LAN to wireless LAN. Answer: TRUE Diff: 2 Type: TF Page Ref: 209 Topic: Q5 Skill: RECALL 12) Generally speaking, analog signals are better than digital signals. Answer: FALSE Diff: 2 Type: TF Page Ref: 208 Topic: Q5 Skill: RECALL 13) DSL (Digital Subscriber Line) modems require special cables for transmission. Answer: FALSE Diff: 2 Type: TF Page Ref: 208 Topic: Q5 Skill: RECALL
2 Copyright © 2016 Pearson Canada Inc.
14) Coaxial cable lines offer faster transmission speeds than optical fibre lines. Answer: FALSE Diff: 2 Type: TF Page Ref: 203 Topic: Q3 Skill: RECALL 15) Twisted pair copper lines are used in DSL modems. Answer: TRUE Diff: 2 Type: TF Page Ref: 209 Topic: Q5 Skill: RECALL 16) Satellite transmission is often part of a Wide Area Network (WAN). Answer: TRUE Diff: 3 Type: TF Page Ref: 203 Topic: Q3 Skill: RECALL 17) A Virtual Private Network (VPN) is a type of WAN. Answer: TRUE Diff: 2 Type: TF Page Ref: 215 Topic: Q7 Skill: RECALL 18) VPN stands for "Visual Protocol Network." Answer: FALSE Diff: 1 Type: TF Page Ref: 214 Topic: Q7 Skill: RECALL 19) A tunnel is a virtual, private pathway over a public or shared network from the VPN client to the VPN server. Answer: TRUE Diff: 2 Type: TF Page Ref: 215 Topic: Q7 Skill: RECALL 20) VPNs enable remote access with public Internet lines. Answer: TRUE Diff: 3 Type: TF Page Ref: 215 Topic: Q7 Skill: RECALL
3 Copyright © 2016 Pearson Canada Inc.
21) ISPs cannot commit to offer performance-level guarantees to users. Answer: FALSE Diff: 2 Type: TF Page Ref: 208 Topic: Q5 Skill: RECALL 22) A web crawler is used to find and collect URLs. Answer: TRUE Diff: 2 Type: TF Page Ref: 216 Topic: Q8 Skill: RECALL 23) HTTPS is a protocol for secure communication over the Internet. Answer: TRUE Diff: 2 Type: TF Page Ref: 214 Topic: Q7 Skill: RECALL 24) With symmetric encryption, different keys are used; one key encodes the message, and the other key decodes the message. Answer: FALSE Diff: 2 Type: TF Page Ref: 214 Topic: Q7 Skill: RECALL 25) In symmetric encryption, the same key is used to encode and to decode. Answer: TRUE Diff: 1 Type: TF Page Ref: 214 Topic: Q7 Skill: RECALL 26) The network effect is the effect that the larger the number of people using the network the more valuable the network. Answer: TRUE Diff: 1 Type: TF Page Ref: 198 Topic: Q1 Skill: RECALL 27) Networks like LinkedIn are not limited in their growth. Answer: FALSE Diff: 3 Type: TF Page Ref: 199 Topic: Q1 Skill: APPLIED
4 Copyright © 2016 Pearson Canada Inc.
28) GPS satellites operate using radio signals. Answer: FALSE Diff: 2 Type: TF Page Ref: 199 Topic: Q1 Skill: RECALL 29) Workflow Control is required in collaborative work so that one worker's work does not interfere with another worker's work. Answer: TRUE Diff: 2 Type: TF Page Ref: 197 Topic: Q1 Skill: RECALL 30) Communication skills and culture are critical factors in collaboration efforts. Answer: TRUE Diff: 1 Type: TF Page Ref: 197 Topic: Q1 Skill: RECALL 31) Smart phones combine powerful processors with only voice applications. Answer: FALSE Diff: 2 Type: TF Page Ref: 204 Topic: Q4 Skill: RECALL 32) In most LANs, the DHCP server assigns A) printer drivers. B) IP addresses. C) security warnings. D) routing signals. E) connections to the modem. Answer: B Diff: 2 Type: MC Page Ref: 206 Topic: Q5 Skill: RECALL 33) Which of the following is an example of a protocol? A) GPS B) SDSL C) DNS D) WAN E) IEEE 802.3 Answer: E Diff: 2 Type: MC Page Ref: 202 Topic: Q3 Skill: RECALL 5 Copyright © 2016 Pearson Canada Inc.
34) 1 Mbps stands for A) 1 048 576 bit per second. B) 1 000 000 000 bit per second. C) 1 073 741 824 bit per second. D) 1 000 000 bit per second. E) 1 000 bit per second. Answer: D Diff: 2 Type: MC Page Ref: 202 Topic: Q3 Skill: RECALL 35) A network that reside in a single geographic location on the premises of the company is called a(n) A) LAN. B) SAN. C) Internet. D) WAN. E) Ethernet. Answer: A Diff: 1 Type: MC Page Ref: 199 Topic: Q2 Skill: RECALL 36) Which of the following connects computers at different geographic locations? A) PTSN B) WAN C) SAN D) Ethernet E) LAN Answer: B Diff: 1 Type: MC Page Ref: 199 Topic: Q2 Skill: RECALL 37) A ________ is a set of rules that two communicating devices follow. A) LAN B) WAN C) language D) standard E) protocol Answer: E Diff: 1 Type: MC Page Ref: 200 Topic: Q3 Skill: RECALL
6 Copyright © 2016 Pearson Canada Inc.
38) MAC stands for A) Maximum Access Control. B) Medium Access Control. C) Media Access Controls. D) Media Address Control. E) Media Access Control. Answer: E Diff: 2 Type: MC Page Ref: 200 Topic: Q3 Skill: RECALL 39) Joel wants to connect his 5 home PCs together. Which of the following cables would best suit the purpose? A) Phone wires B) Unshielded twisted pair C) Shield twisted pair cable D) Coaxial cable E) Optical fibre cables Answer: B Diff: 2 Type: MC Page Ref: 201 Topic: Q3 Skill: RECALL 40) Optical fibre cables carry signals with A) x-rays. B) electronic signals. C) light rays. D) magnetic waves. E) radio waves. Answer: C Diff: 1 Type: MC Page Ref: 201 Topic: Q3 Skill: RECALL 41) The 802.11n standard allows speeds up to A) 216 Mbps. B) 248 Mbps. C) 256 Mbps. D) 54 Mbps. E) 108 Mbps. Answer: B Diff: 1 Type: MC Page Ref: 202 Topic: Q3 Skill: RECALL
7 Copyright © 2016 Pearson Canada Inc.
42) Which of the following is the device that allows users to connect to a wireless network? A) A hub B) A router C) A wireless gateway D) A switch E) An access point Answer: E Diff: 2 Type: MC Page Ref: 203 Topic: Q3 Skill: RECALL 43) The difference between a SDSL connection and a ADSL connection is A) ADSL lines have different upload and download speeds. B) data transmission and voice transmission can occur at the same time with ADSL and not with SDSL. C) DSL lines have different upload and download speeds. D) ADSL and SDSL are the same. E) data transmission and voice transmission can occur at the same time with SDSL and not with ADSL. Answer: A Diff: 2 Type: MC Page Ref: 208 Topic: Q5 Skill: RECALL 44) DSL lines that have different upload and download speeds are called? A) Analog connection lines B) Asymmetric digital subscriber lines C) Sympathetic ratio lines D) Canop digiframs E) Universal differentials Answer: B Diff: 2 Type: MC Page Ref: 208 Topic: Q5 Skill: RECALL 45) Cable Modems provide high speed data transmission using A) random access filter lines. B) four point distributor. C) telephone lines. D) television cable lines. E) dual overhead cams. Answer: D Diff: 2 Type: MC Page Ref: 208 Topic: Q5 Skill: RECALL
8 Copyright © 2016 Pearson Canada Inc.
46) Which of the following offers the same fast speed with both upload and download? A) Dialup B) Cable modem connection C) PSTN connection D) ADSL E) SDSL Answer: E Diff: 2 Type: MC Page Ref: 208 Topic: Q5 Skill: RECALL 47) A(n) ________ uses the Internet or a private internet to create the appearance of private point-to-point connections. A) ADSL B) YNPN C) VPN D) PSTN E) SDSL Answer: C Diff: 1 Type: MC Page Ref: 214 Topic: Q7 Skill: RECALL 48) What is a web crawler? A) A software program that browses the web in a very methodical way B) A software program that keeps track of changes on web sites C) A software program that searches the web for content D) A person who does research on behalf of law enforcement E) A person who does research on the web on behalf of companies Answer: A Diff: 2 Type: MC Page Ref: 216 Topic: Q8 Skill: RECALL 49) Which of the following is an example of a packet switched network? A) SAN B) The Internet C) Ethernet D) LAN E) WLAN Answer: B Diff: 2 Type: MC Page Ref: 212 Topic: Q6 Skill: RECALL
9 Copyright © 2016 Pearson Canada Inc.
50) The Advanced Research Projects Agency Network (ARPANET) is funded by A) US Department of Defense. B) IBM. C) US Department of Commerce. D) Microsoft. E) NASA. Answer: A Diff: 1 Type: MC Page Ref: 212 Topic: Q6 Skill: RECALL 51) A ________ must be used to convert an analog signal to a digital one, when trying to transmit data over a typical phone line. A) fibre optic switch B) modem C) frame relay D) tunnel E) SOHO Answer: B Diff: 2 Type: MC Page Ref: 207 Topic: Q5 Skill: RECALL 52) A computer ________ is a collection of computers that communicate with one another through transmission media. A) server B) system C) application D) database E) network Answer: E Diff: 1 Type: MC Page Ref: 199 Topic: Q2 Skill: RECALL 53) A(n) ________ uses the Internet or other networks to create the appearance of private pointto-point connections. A) SMTP B) ATM C) VPN D) Ethernet E) URL Answer: C Diff: 2 Type: MC Page Ref: 215 Topic: Q7 Skill: RECALL 10 Copyright © 2016 Pearson Canada Inc.
54) ________ is the most popular LAN standard. A) 802.11g B) UML C) Ethernet D) TCP/IP E) OSI Answer: C Diff: 1 Type: MC Page Ref: 202 Topic: Q3 Skill: RECALL 55) ________ lines are most useful when an organization has large amounts of traffic between two sites. A) Twisted pair B) optic fibre C) Private D) Leased E) WAN Answer: D Diff: 3 Type: MC Page Ref: 209 Topic: Q5 Skill: RECALL 56) ________ consist of connected computers at a single organizational site. A) Tunnels B) WLANs C) LANs D) VPNs E) WANs Answer: C Diff: 2 Type: MC Page Ref: 199 Topic: Q2 Skill: RECALL 57) Mobile banking and mobile ticket purchases are examples of A) packet processing. B) advanced SDSL. C) optical fibre cables. D) the network effect. E) m-commerce. Answer: E Diff: 2 Type: MC Page Ref: 204 Topic: Q4 Skill: RECALL
11 Copyright © 2016 Pearson Canada Inc.
58) A(n) ________ connects computers at different geographic locations. A) WlAN B) LAN C) GPS SYSTEM D) WAN E) root server Answer: D Diff: 2 Type: MC Page Ref: 199 Topic: Q2 Skill: RECALL 59) The ________ is a network of networks. A) Internet B) intranet C) WAN D) LAN E) transmission network Answer: A Diff: 2 Type: MC Page Ref: 200 Topic: Q2 Skill: RECALL 60) The computers on ________ are usually within a kilometre of each other. A) a WAN B) a root server C) the Internet D) a LAN E) a system Answer: D Diff: 1 Type: MC Page Ref: 200 Topic: Q2 Skill: RECALL 61) DSL connection is implemented in ________ media. A) optical fibre cable B) UTP C) wireless D) Ethernet E) transmission Answer: B Diff: 3 Type: MC Page Ref: 201 Topic: Q3 Skill: RECALL
12 Copyright © 2016 Pearson Canada Inc.
62) Computers and printers on a LAN are connected to a ________ to communicate and transmit messages on the LAN. A) routing table B) switch C) root server D) http server E) TLD Answer: B Diff: 3 Type: MC Page Ref: 200 Topic: Q3 Skill: RECALL 63) IEEE 802.3 is the most popular LAN ________ in use today. A) switch B) architecture C) protocol D) encryption E) TLD Answer: C Diff: 1 Type: MC Page Ref: 202 Topic: Q3 Skill: RECALL 64) ________ transmits signals using light rays. A) Coaxial cable B) Radiowaves C) Microwaves D) Optical fibre cable E) UTP Answer: D Diff: 2 Type: MC Page Ref: 201 Topic: Q3 Skill: RECALL 65) In order for a printer or laptop to connect to a wireless LAN they must have a A) PPP. B) NIC. C) WNIC. D) browser. E) switch. Answer: C Diff: 3 Type: MC Page Ref: 202 Topic: Q3 Skill: RECALL
13 Copyright © 2016 Pearson Canada Inc.
66) The use of ________ allows us to be connected with anything, anywhere, and at any time. A) NICs. B) switch. C) routing tables. D) smartphones. E) access point. Answer: D Diff: 2 Type: MC Page Ref: 204 Topic: Q4 Skill: RECALL 67) A(n) ________ provides you with a legitimate Internet address and serves as your gateway to the Internet. A) SMTP B) VPN C) switch D) TCP/IP E) ISP Answer: E Diff: 1 Type: MC Page Ref: 205 Topic: Q5 Skill: RECALL 68) ________ is the fastest WLAN standard today. A) 802.11b B) 802.3 C) 802.11a D) 802.11n E) 802.11g Answer: D Diff: 3 Type: MC Page Ref: 202 Topic: Q3 Skill: RECALL 69) ________ is good for homes and small businesses because they receive more data than they transmit. A) DSL B) UTP C) Optical fibre D) SDSL E) ADSL Answer: E Diff: 3 Type: MC Page Ref: 208 Topic: Q5 Skill: RECALL
14 Copyright © 2016 Pearson Canada Inc.
70) WWANs A) are no bigger than a kilometer across. B) are bigger than WLANs but slower. C) are run on optical fibre. D) use the 10/100/1000 standard. E) are bigger than WLANs and use cellular networks. Answer: E Diff: 2 Type: MC Page Ref: 208 Topic: Q5 Skill: RECALL 71) ________ provide the fastest data transmission speeds. A) Optical fibre cables B) Microwaves C) UTP D) Twisted pair lines E) Coaxial cables Answer: A Diff: 2 Type: MC Page Ref: 203 Topic: Q3 Skill: RECALL 72) In the TCP/IP system, Layer 4 is used to A) describe the communications equipment. B) pass data between programs and the transport layer. C) control packet organization. D) control the wireless devices in the network. E) open the connections and maintain them. Answer: B Diff: 3 Type: MC Page Ref: 210 Topic: Q6 Skill: RECALL 73) ________ make(s) the internet efficient and resilient. A) Network Address Translation Protocol. B) VPNs C) File Transfer Protocols. D) Web browsers E) Packet switching Answer: E Diff: 2 Type: MC Page Ref: 212 Topic: Q6 Skill: RECALL
15 Copyright © 2016 Pearson Canada Inc.
74) A DSL modem that is always connected is ________ than a dial-up modem. A) more latent B) more robust C) more practical D) faster E) more secure Answer: D Diff: 2 Type: MC Page Ref: 208 Topic: Q5 Skill: RECALL 75) Which of the following applies to asymmetric encryption? A) One key encodes the message, one key decodes the message. B) It is used in IM. C) It is simpler than symmetric encryption. D) It is faster than symmetric encryption. E) Only one key is used. Answer: A Diff: 2 Type: MC Page Ref: 214 Topic: Q7 Skill: RECALL 76) HTTPS and SSL/TLS utilize which of the following? A) A combination of public key/private key and symmetric encryption B) A combination of public key/private key and asymmetric encryption C) Private keys only D) Asymmetric encryption E) Public keys only Answer: A Diff: 3 Type: MC Page Ref: 214 Topic: Q7 Skill: RECALL 77) According to the text, "weak ties" can A) connect us to the same number of people as strong links. B) hinder our networking abilities. C) be a hindrance for connecting to everyone in six degrees. D) be crucial to connecting you to everyone in six degrees. E) be impossible in social settings. Answer: D Diff: 2 Type: MC Page Ref: 228 Topic: Q1 Skill: APPLIED
16 Copyright © 2016 Pearson Canada Inc.
78) The Internet is a A) LAN. B) WAN. C) ISP. D) HTPP. E) DSL. Answer: B Diff: 1 Type: MC Page Ref: 206 Topic: Q5 Skill: RECALL 79) When using Google Docs in a collaborative group project, workflow control ensures A) all members know how to use the applications. B) all members have access to the applications. C) the network is up and functioning. D) one member's work does not interfere with another member's work. E) the project work gets completed. Answer: D Diff: 3 Type: MC Page Ref: 198 Topic: Q1 Skill: APPLIED 80) Many organization use collaboration because A) it takes advantages of business graduates excellent communication skills. B) the infrastructure to use collaboration exist in the organization. C) it makes for more effective business processes. D) workflow control software exists. E) the results can be greater than the results produced by a single individual. Answer: E Diff: 2 Type: MC Page Ref: 197 Topic: Q1 Skill: RECALL 81) By expanding your personal professional network on LinkedIn A) you are creating a local network. B) you are taking advantage of network externalities. C) you are taking advantages of your professional contacts. D) you are taking advantages of technology. E) you have joined the trend of collaboration. Answer: B Diff: 3 Type: MC Page Ref: 198 Topic: Q1 Skill: APPLIED
17 Copyright © 2016 Pearson Canada Inc.
82) Smartphones A) are cellular phones. B) are enabling new applications, such as T-commerce. C) are enabling Internet connections through only Wi-Fi. D) are small computers with a restricted variety of services. E) have not seen any real agreement as to what they exactly are. Answer: E Diff: 3 Type: MC Page Ref: 204 Topic: Q4 Skill: RECALL 83) Any text sent via https is ________ and therefore is relatively safe. Answer: encrypted Diff: 2 Type: SA Page Ref: 214 Topic: Q7 Skill: RECALL 84) A(n) ________ uses the Internet or other network to create the appearance of private, pointto-point connections. Answer: VPN Diff: 2 Type: SA Page Ref: 215 Topic: Q7 Skill: RECALL 85) Network devices have two addresses; a physical MAC address and a logical ________. Answer: IP address Diff: 3 Type: SA Page Ref: 206; 200 Topic: Q5 Skill: APPLIED 86) A collection of computers that communicate with one another via transmission media is called a(n) ________. Answer: network Diff: 1 Type: SA Page Ref: 199 Topic: Q2 Skill: RECALL 87) A(n) ________ is a device that converts digital signals to analog signals. Answer: modem Diff: 1 Type: SA Page Ref: 207 Topic: Q5 Skill: RECALL
18 Copyright © 2016 Pearson Canada Inc.
88) A(n) ________ connects computers that reside in a single geographic location. Answer: LAN Diff: 1 Type: SA Page Ref: 199 Topic: Q2 Skill: RECALL 89) On of the four critical factors in the effectiveness of collaboration is ________ management. Answer: content Diff: 3 Type: SA Page Ref: 197 Topic: Q1 Skill: RECALL 90) Computers at different geographic locations are connected with a(n) ________. Answer: WAN Diff: 1 Type: SA Page Ref: 199 Topic: Q2 Skill: RECALL 91) A network of networks is known as a(n) ________. Answer: internet Diff: 1 Type: SA Page Ref: 200 Topic: Q2 Skill: RECALL 92) The ________ is a unique identifier built into the NIC when it is manufactured. Answer: MAC address Diff: 3 Type: SA Page Ref: 200 Topic: Q3 Skill: RECALL 93) A(n) ________ connects printers, and computers to a LAN and has a unique identifier. Answer: switch Diff: 3 Type: SA Page Ref: 200 Topic: Q3 Skill: RECALL 94) At least one access point is required for a(n) ________ network. Answer: wireless Diff: 3 Type: SA Page Ref: 203 Topic: Q3 Skill: RECALL
19 Copyright © 2016 Pearson Canada Inc.
95) A WAN alternative that uses the Internet or a private internet to create the appearance of private point-to-point connections is called a(n) ________. Answer: VPN Diff: 3 Type: SA Page Ref: 203 Topic: Q3 Skill: RECALL 96) A(n) ________ is a virtual private pathway over a public or shared network from the VPN client to the VPN server. Answer: tunnel Diff: 3 Type: SA Page Ref: 215 Topic: Q7 Skill: RECALL 97) To ensure security, VPN client software ________ the original message so that its contents are hidden. Answer: encrypts Diff: 2 Type: SA Page Ref: 215 Topic: Q7 Skill: APPLIED 98) A(n) ________ is a tool used to encrypt data. Answer: key Diff: 2 Type: SA Page Ref: 214 Topic: Q7 Skill: RECALL 99) In general, the people you know the least, contribute the ________ to your social network. Answer: most Diff: 1 Type: SA Page Ref: 227-228 Topic: Q1 Skill: APPLIED 100) In social network theory, ________ ties often contribute the most to your social network. Answer: weak Diff: 2 Type: SA Page Ref: 228 Topic: Q1 Skill: RECALL 101) Every business, every organization, needs to be thinking about the ubiquitous and cheap ________ that is growing exponentially. Answer: connectivity Diff: 3 Type: SA Page Ref: 222 Topic: Q1 Skill: RECALL
20 Copyright © 2016 Pearson Canada Inc.
102) Knowing the basic terminology of computer networks and how they work makes you a more informed ________ of computer networks. Answer: user Diff: 2 Type: SA Page Ref: 197 Topic: Q1 Skill: APPLIED 103) Collaboration involves ________ and communication and often makes use of computer networks. Answer: coordination Diff: 3 Type: SA Page Ref: 197 Topic: Q1 Skill: RECALL 104) Copper wire, optical fibre, and radio frequencies can be referred to as ________. Answer: transmission media Diff: 2 Type: SA Page Ref: 199 Topic: Q2 Skill: RECALL 105) When deciding if a search engine will be efficient in getting search results, consider breadth of coverage and the ordering of ________. Answer: results Diff: 3 Type: SA Page Ref: 217 Topic: Q8 Skill: RECALL 106) Since most search engines are operated by private for-profit companies, one must also consider the effect of ________ on their positioning in search results. Answer: advertisers Diff: 3 Type: SA Page Ref: 217 Topic: Q8 Skill: RECALL 107) ________ applications allow mobile phones to conduct certain types of transactions. Answer: M-Commerce Diff: 1 Type: SA Page Ref: 204 Topic: Q4 Skill: RECALL
21 Copyright © 2016 Pearson Canada Inc.
108) What is the difference between a network and a human network and why is the second very important? Answer: A computer network is a collection of computers that communicate with one another over transmission lines. The three basic types of networks are LANs, WANs, and internets. A human network is a collection of social connections. Most successful professionals build their own human networks because they know that there are many people that can help them in various situations and who may likewise need their help. These professionals attend social events, collect and pass out cards, and engage in pleasant conversation to expand their networks. Helping each other serves to strengthen the personal bonds of your network when you know you can rely on someone in certain situations (e.g., finding information, getting a job). Diff: 2 Type: ES Page Ref: 225 Topic: Q1 Skill: APPLIED 109) What is the difference between a LAN and a WAN? Give an example of how each one could be used in business. Answer: A local area network (LAN) connects computers that reside in a single geographic location on the premises of the company that operates the LAN. Wide area networks (WANs) connect computers at different geographic locations. The computers in two separate company sites can be connected using a WAN. With a LAN the number of connected computers can range from two to several hundred, but they are still in a single location (usually within a building or floor of a building). Most small businesses have a LAN in place in their office that connects them. A university campus uses a backbone (usually fibre optic) and connects all the different buildings on the campus and possibly multiple campuses on the university's WAN. Diff: 2 Type: ES Page Ref: 199 Topic: Q2 Skill: APPLIED 110) What is a NIC and a WNIC? Why are they important in a LAN? Answer: A NIC is a Network Interface Card and a WNIC is a Wireless Network Interface Card. Each device that is connected to a LAN must have a NIC so that the device can send and receive messages with its unique address. In a wireless LAN the devices connect via a WNIC instead of a regular NIC. Diff: 2 Type: ES Page Ref: 200 Topic: Q3 Skill: RECALL 111) What is a VPN and how does it work? Give an example of how it is used in business. Answer: VPN stands for a "virtual private network." This is one alternative to a WAN. A VPN takes advantage of the Internet or leased lines to create the appearance of private, point-to-point connections. Being "virtual" simply means that it appears to exist to the users, but does not actually exist. In business, if a manufacturer needs to maintain a steady connection to their suppliers, they might set up a VPN with them. This is because they are more stable and offer much better security, yet they are relatively inexpensive and quite flexible and easy to set up. Diff: 2 Type: ES Page Ref: 214-215 Topic: Q7 Skill: APPLIED 22 Copyright © 2016 Pearson Canada Inc.
112) Describe two different WAN alternatives. Answer: By definition a WAN connects computers that are at physically separate sites. Connecting to the Internet, either through a dial-up, DSL, or cable modem is an example of one WAN topology. If higher speeds, greater bandwidth and higher security are needed, many large corporations will use a PSDN, or public switched data network. This is a combination of computers and leased lines set up by a vendor who sells time on them to corporations. Diff: 3 Type: ES Page Ref: 203 Topic: Q3 Skill: RECALL 113) Public key/private key is a special version of asymmetric encryption that is very popular on the Internet. Describe what is meant by both public key and private key. How are they used on the Internet to provide security? Answer: In cryptography, a public key is a value provided by some designated authority as an encryption key. When the public key is combined with a private key, it can be used to effectively encrypt messages and digital signatures. The use of combined public and private keys is known as asymmetric cryptography. A system for using public keys is called a public key infrastructure (PKI). In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange encrypted messages. In traditional secret key cryptography, a key would be shared by the communicators so that each could encrypt and decrypt messages. The risk in this system is if either party loses the key or it is stolen, the system is broken. A more recent alternative is to use a combination of public and private keys. Diff: 3 Type: ES Page Ref: 214 Topic: Q7 Skill: APPLIED 114) The Internet has probably decreased the number of degrees that separate us from everyone else. Why is this so? Could it also increase our separation? Why or why not? Answer: This is a question with many right answers. The student should simply demonstrate an understanding and consideration of the material. Certainly the Internet has caused an unprecedented increase in the connections among people for personal as well as professional reasons. Depending on the size of your mailing list, one stroke of a key can send an e-mail to thousands of people. A Web page can generate even more connections with little effort. This means an increase in efficiency in terms of time spent per connection made. The quality of the connection however, may be lacking. Students could argue that meeting people in person may often be much more effective than e-mail, depending on the situation. Even phone conversations can be more effective in certain relationships. Maybe our time spent on the Internet actually limits our direct connection to people. Diff: 3 Type: ES Page Ref: 227-228 Topic: Q1 Skill: APPLIED
23 Copyright © 2016 Pearson Canada Inc.
115) What is the Domain Name System? Answer: The purpose of a DNS is to convert human-friendly URLs into computer-friendly IP addresses. Diff: 1 Type: ES Page Ref: 207 Topic: Q5 Skill: RECALL 116) What is a packet-filtering firewall? Answer: A packet-filtering firewall examine each part of a message and determine whether or let that part pass. To make this decision, it examines the source address, the destination address(es), and other data. Packet-filtering firewalls can prohibit outsiders from starting a session with any user behind the firewall. They can disallow traffic from particular sites, such as known hacker addresses. Diff: 2 Type: ES Page Ref: 213 Topic: Q7 Skill: RECALL 117) What is the difference between a private IP and a public IP? Answer: Public IP addresses are used on the Internet. Private IP addresses are used only by the company that operates the private network or intranet. Diff: 1 Type: ES Page Ref: 207 Topic: Q5 Skill: RECALL 118) What is the purpose of a DHCP server? Answer: A DHCP server assigns an IP number for a computer to use. Diff: 2 Type: ES Page Ref: 207 Topic: Q5 Skill: RECALL 119) What are the typical options for a home user to connect to the Internet? Answer: 1) Dial-up connection 2) ADSL connection 3) Cable modem connection 4) wireless network Diff: 1 Type: ES Page Ref: 207-208 Topic: Q5 Skill: RECALL
24 Copyright © 2016 Pearson Canada Inc.
120) What are the components of a LAN? Answer: A LAN is a group of computers connected together on a single company site, usually located within a kilometer or so. A LAN usually has computers and printers connected via a switch, which receives and transmits messages on the LAN. Each device on a LAN has a network interface card (NIC) that connects the device's circuitry to the network cable. Newer machines have onboard NICs, which is a NIC built into the computer. Each NIC has a unique identifier, which is called the MAC (media access control) address. The computers, printers, switches, and other devices on a LAN are connected using one of two media. Most connections are made using unshielded twisted pair (UTP) cable. Other connections that required higher speed use optical fibre cables. Diff: 2 Type: ES Page Ref: 200 Topic: Q3 Skill: RECALL 121) Describe how a VPN works. Answer: A VPN uses the Internet or a private internet to create the appearance of private pointto-point connections. Diff: 2 Type: ES Page Ref: 214 Topic: Q7 Skill: RECALL
25 Copyright © 2016 Pearson Canada Inc.
Experiencing MIS, Cdn. Ed., 4e (Kroenke) Chapter 7 Competitive Advantage and Business Processes 1) One way to gain competitive advantage using information systems is through business process. Answer: TRUE Diff: 1 Type: TF Page Ref: 232 Topic: Q1 Skill: RECALL 2) It is illegal to use a shared supply chain management system to infer what your competitor's inventory levels are. Answer: FALSE Diff: 3 Type: TF Page Ref: 232 Topic: Q1 Skill: APPLIED 3) Using MIS, one way to gain competitive advantage is to enhance the product or service by applying technological change. Answer: TRUE Diff: 2 Type: TF Page Ref: 232 Topic: Q1 Skill: RECALL 4) Functional silos are designed to work independently of one another. Answer: TRUE Diff: 1 Type: TF Page Ref: 233 Topic: Q2 Skill: RECALL 5) Cross-functional systems facilitate work of a single department or business function. Answer: FALSE Diff: 2 Type: TF Page Ref: 234 Topic: Q2 Skill: RECALL 6) Supplier relationship management is a business process for managing all contacts between the organization and its supplies. Answer: TRUE Diff: 1 Type: TF Page Ref: 246 Topic: Q8 Skill: RECALL
1 Copyright © 2016 Pearson Canada Inc.
7) In the last 10 years, all companies have entirely switched from functional systems to fully integrated or cross-functional systems. Answer: FALSE Diff: 3 Type: TF Page Ref: 237 Topic: Q2 Skill: RECALL 8) With functional silos, management must query separate functional systems and integrate the data manually. Answer: TRUE Diff: 1 Type: TF Page Ref: 234 Topic: Q2 Skill: RECALL 9) With functional systems, one of the biggest problems is duplicated data. Answer: TRUE Diff: 2 Type: TF Page Ref: 235 Topic: Q2 Skill: RECALL 10) Functional systems often lead to disjointed processes and increased expenses. Answer: TRUE Diff: 1 Type: TF Page Ref: 235 Topic: Q2 Skill: RECALL 11) Independent, isolated systems are good for making businesses more efficient today. Answer: FALSE Diff: 2 Type: TF Page Ref: 235 Topic: Q2 Skill: RECALL 12) ERP systems integrate sales, orders, inventory, manufacturing, customer service, human resources, and accounting. Answer: TRUE Diff: 1 Type: TF Page Ref: 241 Topic: Q6 Skill: RECALL 13) Order entry is usually found in the accounting functional systems. Answer: FALSE Diff: 2 Type: TF Page Ref: 235 Topic: Q2 Skill: RECALL
2 Copyright © 2016 Pearson Canada Inc.
14) A general ledger application would be an example of a process-based system. Answer: FALSE Diff: 3 Type: TF Page Ref: 235 Topic: Q2 Skill: RECALL 15) Most organizations today have a mixture of functional and integrated systems. Answer: TRUE Diff: 1 Type: TF Page Ref: 234 Topic: Q2 Skill: RECALL 16) Customer Relationship Management (CRM) is an example of a cross-functional system. Answer: TRUE Diff: 2 Type: TF Page Ref: 243 Topic: Q7 Skill: RECALL 17) Enterprise Resource Planning software uses one database to connect the functional areas. Answer: TRUE Diff: 1 Type: TF Page Ref: 241 Topic: Q6 Skill: RECALL 18) Enterprise Application Integration uses an interface to access the individual functional databases. Answer: TRUE Diff: 1 Type: TF Page Ref: 238 Topic: Q3 Skill: RECALL 19) Customer service is typically part of the marketing and sales function. Answer: FALSE Diff: 2 Type: TF Page Ref: 235 Topic: Q2 Skill: RECALL 20) The operations function handles order entry and inventory management. Answer: TRUE Diff: 2 Type: TF Page Ref: 235 Topic: Q2 Skill: RECALL
3 Copyright © 2016 Pearson Canada Inc.
21) It is not possible to improve business processes without technological change. Answer: FALSE Diff: 1 Type: TF Page Ref: 236 Topic: Q3 Skill: RECALL 22) EAI leaves the functional systems and databases basically intact. Answer: TRUE Diff: 2 Type: TF Page Ref: 237 Topic: Q3 Skill: RECALL 23) Either EAI or ERP can be used to integrate functional systems. Answer: TRUE Diff: 2 Type: TF Page Ref: 237 Topic: Q3 Skill: RECALL 24) The user interface for Enterprise Application Integration systems and Enterprise Resource Planning systems look completely different to the end user. Answer: FALSE Diff: 2 Type: TF Page Ref: 238 Topic: Q3 Skill: RECALL 25) Business process design is well understood and the outcomes are fairly certain once the changes are begun. Answer: FALSE Diff: 3 Type: TF Page Ref: 239 Topic: Q4 Skill: APPLIED 26) In a functional system, the data required to answer queries from and about customers is contained within the order management system so links to other systems are not necessary. Answer: FALSE Diff: 3 Type: TF Page Ref: 236 Topic: Q2 Skill: APPLIED 27) Isolated systems can lead to inefficiency and higher organizational costs. Answer: TRUE Diff: 2 Type: TF Page Ref: 236 Topic: Q2 Skill: RECALL
4 Copyright © 2016 Pearson Canada Inc.
28) Porter's concept of the "process chain" is crucial for developing a competitive strategy. Answer: FALSE Diff: 2 Type: TF Page Ref: 234 Topic: Q2 Skill: RECALL 29) Most employees welcome and embrace changes caused by business process redesign. Answer: FALSE Diff: 3 Type: TF Page Ref: 238 Topic: Q4 Skill: APPLIED 30) Grand & Toy has expanded its business model by offering services through the web in the last decade. Answer: TRUE Diff: 2 Type: TF Page Ref: 232 Topic: Q1 Skill: RECALL 31) Functional systems in Porter's Value Chain are usually comprised of A) HR, Accounting, Operations, Sales. B) Accounting, Payroll, HR, Sales. C) Operations, Advertising, HR, Sales. D) Accounting, Advertising, Payroll, Marketing. E) Primary activities and Support Activities. Answer: A Diff: 3 Type: MC Page Ref: 234 Topic: Q2 Skill: RECALL 32) Originally the ________ supported the work of a single department or function. A) calculation systems B) cross-function systems C) departmental systems D) inter-organizational systems E) functional systems Answer: E Diff: 2 Type: MC Page Ref: 233 Topic: Q2 Skill: RECALL
5 Copyright © 2016 Pearson Canada Inc.
33) Systems that are designed to support activities across departmental boundaries are called A) calculation systems. B) functional systems. C) cross-departmental systems. D) inter-organizational systems. E) operating systems. Answer: C Diff: 1 Type: MC Page Ref: 235 Topic: Q2 Skill: RECALL 34) Systems that are used by two or more related companies are referred to as A) functional systems. B) calculation systems. C) inter-organizational systems. D) operating systems. E) departmental systems. Answer: C Diff: 1 Type: MC Page Ref: 234 Topic: Q2 Skill: RECALL 35) Which of the following are examples of accounting functional systems? A) Lead tracking B) Inventory management C) Sales forecasting D) Manufacturing operations E) Accounts receivable Answer: E Diff: 2 Type: MC Page Ref: 235 Topic: Q2 Skill: RECALL 36) Which of the following is (are) TRUE statements with functional systems? A) Improved data results B) Improved data integrity C) Better communications D) Increased profitability E) Isolated systems Answer: E Diff: 2 Type: MC Page Ref: 235 Topic: Q2 Skill: RECALL
6 Copyright © 2016 Pearson Canada Inc.
37) Which of the following is a (are) consequence(s) of a disjoint system? A) Efficiency B) Greater supply of integrated enterprise information C) Decreased cost D) Cohesive business processes E) Lower profits Answer: E Diff: 2 Type: MC Page Ref: 235 Topic: Q2 Skill: RECALL 38) Which of the following is a rationale for business process design? A) Existing functional systems are flawed and should be improved. B) New and more efficient business processes that integrate the activities of all departments involved in a value chain should be created. C) Business processes are inefficient and do not integrate with other departments. D) Existing business processes are returning a good ROI and should be kept running like this. E) Existing systems do not support the value chain and therefore need to be improved. Answer: B Diff: 2 Type: MC Page Ref: 237 Topic: Q3 Skill: RECALL 39) ________ support the business processes of attracting, selling, managing, delivering, and supporting customers. A) Enterprise Resource Planning Systems B) Value Chain Management Systems C) Supplier Relationship Management Systems D) Supply Chain Management Systems E) Customer Relationship Management Systems Answer: E Diff: 2 Type: MC Page Ref: 243 Topic: Q7 Skill: RECALL 40) ________ support all of the primary business processes as well as the human resources and accounting support processes. A) Customer Relationship Management Systems B) Supply Chain Management Systems C) Enterprise Resource Planning Systems D) Value Chain Management Systems E) Supplier Relationship Management Systems Answer: C Diff: 2 Type: MC Page Ref: 241 Topic: Q6 Skill: RECALL 7 Copyright © 2016 Pearson Canada Inc.
41) When a company purchases an "Industry Standard Process" from a vendor like SAP, the company often has to A) lay off staff to conform to the new standards. B) change the way to company operates to conform to the software. C) buy more equipment to conform to the software needs. D) hire more staff to use the software more efficiently. E) wait years for a payback. Answer: B Diff: 3 Type: MC Page Ref: 239 Topic: Q5 Skill: RECALL 42) When a company purchases an "Industry Standard Process" from a vendor like SAP, the company may benefit A) by gaining "best practices" it would otherwise have developed on its own. B) because employees will conform with the changes rapidly and be more efficient. C) because customers will demand lower prices. D) hardly ever. E) because the company will have a unique application that will generate competitive advantage. Answer: A Diff: 3 Type: MC Page Ref: 239 Topic: Q5 Skill: APPLIED 43) ERP systems handle A) mainly HR functions. B) mainly sales tracking. C) only accounting. D) sales and accounting. E) all of the company's functions. Answer: D Diff: 3 Type: MC Page Ref: 241 Topic: Q6 Skill: RECALL 44) The elimination of the middle layer in a supply chain is called A) disintermediation. B) intermediation. C) reintermediation re-intermediation. D) normalization. E) price elasticity. Answer: A Diff: 2 Type: MC Page Ref: 245 Topic: Q8 Skill: RECALL
8 Copyright © 2016 Pearson Canada Inc.
45) ________ is a business process for managing all contacts between an organization and its suppliers. A) SRM B) CRM C) BRM D) KRM E) FRM Answer: A Diff: 2 Type: MC Page Ref: 245 Topic: Q8 Skill: RECALL 46) Functional applications are sometimes call A) islands of automation. B) inefficient systems. C) isolated silos. D) functional islands. E) functional silos. Answer: E Diff: 2 Type: MC Page Ref: 233 Topic: Q2 Skill: RECALL 47) ________ are used by non-manufacturers, such as distributors and retailers. A) Human resource systems B) Manufacturing systems C) Accounting systems D) Operations systems E) Marketing and sales systems Answer: D Diff: 3 Type: MC Page Ref: 233 Topic: Q2 Skill: APPLIED 48) Which of the following is a function of a manufacturing system? A) Order entry B) Customer service C) Scheduling D) Order management E) Inventory management Answer: C Diff: 2 Type: MC Page Ref: 235 Topic: Q2 Skill: RECALL
9 Copyright © 2016 Pearson Canada Inc.
49) Which of the following is involved in supply chain management? A) SRM B) CRM C) VRM D) CRM and VRM E) SRM and CRM Answer: E Diff: 2 Type: MC Page Ref: 246 Topic: Q8 Skill: RECALL 50) Which of the following is NOT a driver of supply chain management performance? A) Information B) Transportation C) Facilities D) Hardware E) Inventory Answer: D Diff: 2 Type: MC Page Ref: 246 Topic: Q8 Skill: RECALL 51) ERP uses A) integration to manage the 5 different databases in a typical company. B) pull-push production planning. C) customized programming to adapt to the purchaser's way of doing business. D) one centralized database. E) undocumented, brand new software. Answer: D Diff: 3 Type: MC Topic: Q5 Skill: RECALL
Page Ref: 241
52) Which of the following contains the elements of the customer life cycle? A) Marketing, Customer acquisition, Relationship management, Customer service B) Customer acquisition, Loss/churn, Accounts receivable, Customer service C) Loss /churn, Relationship management, Marketing, Accounts receivable D) Relationship management, Accounts payable, Loss/churn, Marketing E) Loss/Churn, Relationship management, Customer acquisition, Marketing Answer: E Diff: 2 Type: MC Page Ref: 243 Topic: Q7 Skill: RECALL
10 Copyright © 2016 Pearson Canada Inc.
53) The purpose of relationship management applications is to A) extend social marketing effectiveness. B) reduce accounts receivable. C) advertise promotions in a timely way. D) get new customers. E) maximize the value of the existing customer base. Answer: E Diff: 2 Type: MC Page Ref: 243 Topic: Q7 Skill: RECALL 54) Sales management applications support A) the maximization of the value of the customer. B) sales to existing customers. C) network marketing. D) database conversion E) prospecting for new customers. Answer: B Diff: 2 Type: MC Page Ref: 244 Topic: Q7 Skill: RECALL 55) Interorganizational systems that enable companies to efficiently handle the flow of goods from suppliers to customer are known as A) application software. B) disintermediating systems. C) competitive advantages. D) CRM systems. E) supply chain management systems. Answer: E Diff: 2 Type: MC Page Ref: 245 Topic: Q8 Skill: RECALL 56) The internet and database management systems have allowed manufacturers like Dell to sell directly to consumers. This is called A) direct marketing. B) B2G sales. C) disintermediation. D) integrated CRM. E) eBay. Answer: C Diff: 2 Type: MC Page Ref: 245 Topic: Q8 Skill: RECALL
11 Copyright © 2016 Pearson Canada Inc.
57) The only source of revenue in the supply chain is the A) sales department. B) cash register. C) end consumer. D) purchasing department. E) manufacturer. Answer: C Diff: 3 Type: MC Page Ref: 246 Topic: Q8 Skill: RECALL 58) Functional applications are sometimes called functional A) automation. B) silos. C) islands. D) confusion. E) integration. Answer: B Diff: 2 Type: MC Page Ref: 233 Topic: Q2 Skill: RECALL 59) Systems that span functional ________ are known as cross-functional systems. A) departments B) processes C) systems D) boundaries E) functions Answer: D Diff: 1 Type: MC Page Ref: 234 Topic: Q2 Skill: RECALL 60) Inventory management systems are usually found in the ________ functional area. A) sales and marketing. B) operations. C) human resources. D) accounting and finance. E) manufacturing. Answer: B Diff: 1 Type: MC Page Ref: 235 Topic: Q2 Skill: RECALL
12 Copyright © 2016 Pearson Canada Inc.
61) Payroll is an application that is traditionally run in the functional area of A) sales and marketing. B) human resources. C) manufacturing. D) operations. E) accounting and finance. Answer: B Diff: 1 Type: MC Page Ref: 235 Topic: Q2 Skill: RECALL 62) The general ledger (GL) is an application that is traditionally run in the functional area of A) sales and marketing. B) manufacturing. C) operations. D) human resources. E) accounting and finance. Answer: E Diff: 1 Type: MC Page Ref: 235 Topic: Q2 Skill: RECALL 63) Order entry is an application that is traditionally run in the functional area of A) human resources. B) accounting and finance. C) manufacturing. D) operations. E) sales and marketing. Answer: D Diff: 1 Type: MC Page Ref: 235 Topic: Q2 Skill: RECALL 64) ________ combines functional systems by using software bridges to connect different functional systems. A) EAI B) ERP C) CRM D) SAP R/3 E) MIS Answer: A Diff: 2 Type: MC Page Ref: 237 Topic: Q3 Skill: RECALL
13 Copyright © 2016 Pearson Canada Inc.
65) Lead tracking is an application that is traditionally run in the functional area of A) operations. B) sales and marketing. C) manufacturing. D) accounting and finance. E) human resources. Answer: B Diff: 1 Type: MC Page Ref: 235 Topic: Q2 Skill: RECALL 66) SAP is one of the leading vendors of ________ software. A) ERP B) SCM C) CRM D) DBMS E) CASE Answer: A Diff: 2 Type: MC Page Ref: 241 Topic: Q6 Skill: RECALL 67) Software that integrates sales, orders, inventory, manufacturing, customer service, human resources, and accounting is called A) ERP systems. B) vapour ware. C) DBMS. D) CAM. E) MPS. Answer: A Diff: 2 Type: MC Page Ref: 241 Topic: Q6 Skill: RECALL 68) One of the problems of functional systems is that data stored for different functional areas may be inconsistent and A) incomplete. B) redundant. C) outdated. D) not integrated E) disjointed. Answer: B Diff: 2 Type: MC Page Ref: 235 Topic: Q2 Skill: RECALL
14 Copyright © 2016 Pearson Canada Inc.
69) When functional systems are isolated, business processes are A) redundant. B) disjointed. C) incomplete. D) not integrated. E) outdated. Answer: B Diff: 2 Type: MC Page Ref: 235 Topic: Q2 Skill: RECALL 70) If the order entry system defines part numbers using a 6-digit code and the inventory system defines part numbers using an 8 digit code, the data must be ________ in order for the two systems to share data. A) recombined B) imported C) restructured D) updated E) converted Answer: E Diff: 3 Type: MC Page Ref: 236 Topic: Q2 Skill: RECALL 71) Oracle, Microsoft, and SAP are all examples of ________ software vendors. A) MRP B) CRM C) ERP D) SCM E) CASE Answer: C Diff: 2 Type: MC Page Ref: 241 Topic: Q6 Skill: RECALL 72) An example of integrated, cross functional information system would be A) CASE. B) CAM. C) CAO. D) CRM. E) CAD. Answer: D Diff: 2 Type: MC Page Ref: 243 Topic: Q7 Skill: RECALL
15 Copyright © 2016 Pearson Canada Inc.
73) A hotel that is experiencing a slow period could use a(n) ________ to market promotions to its best customers. A) flyer campaign B) general ledger program C) twitter account D) facebook page E) integrated CRM application Answer: E Diff: 3 Type: MC Page Ref: 244 Topic: Q7 Skill: RECALL 74) Business process management is all about A) CRM. B) installing SAP R/3 to gain industry standard processes. C) shortening your supply chain. D) accomplishing the same activities with less resource cost. E) becoming a cost leader under Porter's models. Answer: D Diff: 3 Type: MC Page Ref: 237 Topic: Q3 Skill: RECALL 75) ________ systems link up all the processes that touch the customer. A) MRP B) CASE C) CRM D) ERP E) SRM Answer: C Diff: 2 Type: MC Page Ref: 243 Topic: Q7 Skill: RECALL 76) Business process design projects are expensive and difficult because A) business processes are often complex. B) of legacy technology. C) of legal issues. D) poor business processes are inefficient. E) business processes are complex and poor business processes are inefficient. Answer: A Diff: 3 Type: MC Page Ref: 239 Topic: Q4 Skill: RECALL
16 Copyright © 2016 Pearson Canada Inc.
77) The movement of business process design came about because systems developers began to wonder how they could A) improve existing functional systems. B) develop customer management relationship systems. C) use networks to go beyond just automating functional applications. D) use systems to automate the supply chain. E) integrate several different areas in an entire value chain. Answer: E Diff: 3 Type: MC Page Ref: 237 Topic: Q3 Skill: RECALL 78) When implementing a system such as SAP companies must (can) A) experience substantial change. B) save money. C) experience its primary benefits from the software D) adhere to industry standard processes. E) continue to use all their own business process standards. Answer: D Diff: 2 Type: MC Page Ref: 241 Topic: Q6 Skill: RECALL 79) The greatest advantages of a CRM system is that A) organizations can prioritize sales time and effort. B) it can use sales management applications. C) customer-touching processes can be linked to one another. D) all the data is stored in a single database. E) sales people can potentially increase sales. Answer: C Diff: 3 Type: MC Page Ref: 243 Topic: Q7 Skill: RECALL 80) When adopting an ERO, the organization gains benefits because A) ERP has process blueprints. B) ERP allows the organization to gain the benefit of processes that have already been proven successful. C) ERP integrates all the activities in the organization and makes the organization successful. D) ERP allows the organization to standardize all of the corporate data. E) ERP places all the corporate data into a single database and makes business process more successful. Answer: B Diff: 2 Type: MC Page Ref: 242 Topic: Q6 Skill: RECALL 17 Copyright © 2016 Pearson Canada Inc.
81) SRM applications support these three basic processes A) approve, enter, pay. B) book, receive, attend. C) attract, qualify, convert. D) invoice, inventory and payment. E) source, purchase and settle. Answer: E Diff: 3 Type: MC Page Ref: 246 Topic: Q8 Skill: RECALL 82) Companies selling to other companies or to government need to fully A) integrate CRM and SRM systems. B) reach a wider audience. C) integrate ERP systems into their business models. D) become electronic exchanges. E) incorporate non-merchant ecommerce. Answer: A Diff: 3 Type: MC Page Ref: 246 Topic: Q8 Skill: APPLIED 83) In the auto industry, supply chain management applications will include A) SRM, inventory and CRM. B) customer tracking, production, and advertising. C) SRM and CRM only. D) ERP. E) production capacity. Answer: A Diff: 3 Type: MC Page Ref: 246 Topic: Q8 Skill: APPLIED 84) In the settlement phase of an SRM application the SRM is linked to A) the financial management application or module. B) operations and manufacturing department. C) the company's web ordering system. D) the supplier's bank account. E) the inventory management application. Answer: A Diff: 3 Type: MC Page Ref: 247 Topic: Q8 Skill: APPLIED
18 Copyright © 2016 Pearson Canada Inc.
85) ________ is software that integrates all of the processes that touch a customer. Answer: CRM Diff: 2 Type: SA Page Ref: 243 Topic: Q7 Skill: RECALL 86) A(n) ________ system stores all customer data in one place. Answer: CRM Diff: 2 Type: SA Page Ref: 243 Topic: Q7 Skill: RECALL 87) EAI applications store data in (a) ________ database(s). Answer: multiple Diff: 2 Type: SA Page Ref: 238 Topic: Q3 Skill: RECALL 88) Systems that integrate all of an organization's core processes are called ________ systems. Answer: ERP Diff: 2 Type: SA Page Ref: 238 Topic: Q3 Skill: RECALL 89) One of the most successful vendors of ERP software is the German firm ________. Answer: SAP Diff: 1 Type: SA Page Ref: 241 Topic: Q6 Skill: RECALL 90) Business application software from large companies usually has ________ processes. Answer: industry standard Diff: 3 Type: SA Page Ref: 239 Topic: Q5 Skill: RECALL 91) Four major factors, or drivers, affect supply chain performance: facilities, inventory, transportation, and ________. Answer: information Diff: 2 Type: SA Page Ref: 246 Topic: Q8 Skill: RECALL
19 Copyright © 2016 Pearson Canada Inc.
92) ________ were developed to solve the problems associated with functional silos. Answer: Cross-functional systems Diff: 2 Type: SA Page Ref: 234 Topic: Q2 Skill: RECALL 93) To compete internationally, organizations must eventually achieve the efficiencies of crossfunctional, ________ systems. Answer: process-based Diff: 3 Type: SA Page Ref: 234 Topic: Q2 Skill: RECALL 94) ________ systems include HR, Accounting and Finance, Marketing and Sales, Operations, and Manufacturing. Answer: Functional Diff: 1 Type: SA Page Ref: 233 Topic: Q2 Skill: RECALL 95) Personnel performance assessments are tasks that are supported by the ________ functional systems. Answer: human resources (HR) Diff: 2 Type: SA Page Ref: 235 Topic: Q2 Skill: RECALL 96) Cash management is a task that is supported by ________ functional systems. Answer: accounting Diff: 2 Type: SA Page Ref: 235 Topic: Q2 Skill: RECALL 97) ________ systems are functional systems that store data about potential customers, their product interests, and contacts with them by sales personnel for lead-tracking purposes. Answer: Marketing and sales Diff: 2 Type: SA Page Ref: 235 Topic: Q2 Skill: RECALL 98) When a salesperson enters a customer order and verifies the customer's credit they are using a functional application from the ________ systems. Answer: operations Diff: 2 Type: SA Page Ref: 235 Topic: Q2 Skill: RECALL 20 Copyright © 2016 Pearson Canada Inc.
99) ________ can save the organization substantial costs of designing a new process. Answer: Industry standard processes Diff: 2 Type: SA Page Ref: 239 Topic: Q5 Skill: RECALL 100) There are three factors of information: purpose, ________, and means. Answer: availability Diff: 2 Type: SA Page Ref: 248 Topic: Q7 Skill: RECALL 101) The ________ of ERP systems erodes if all companies use the same "industry standard" processes. Answer: competitive advantage Diff: 2 Type: SA Page Ref: 237 Topic: Q6 Skill: RECALL 102) It is the combination of people, procedures, hardware, software, and data that creates ________. Answer: sustainable advantage Diff: 2 Type: SA Page Ref: 242 Topic: Q6 Skill: RECALL 103) ________ systems are used by two or more related companies. Answer: Inter-organizational Diff: 2 Type: SA Page Ref: 234 Topic: Q2 Skill: RECALL 104) The purpose of ________ management applications is to maximize the value of the existing customer base. Answer: relationship Diff: 2 Type: SA Page Ref: 244 Topic: Q2 Skill: RECALL 105) Integrated CRM applications store data in a ________ database. Answer: single Diff: 1 Type: SA Page Ref: 244 Topic: Q7 Skill: RECALL
21 Copyright © 2016 Pearson Canada Inc.
106) With a(n) ________ system, people in the functional areas use the software to send and receive data directly from the central database. Answer: ERP Diff: 2 Type: SA Page Ref: 238 Topic: Q3 Skill: RECALL 107) Diagrams that show business processes show the flow and logic of one set of processes; these are referred to as ________. Answer: blueprints Diff: 3 Type: SA Page Ref: 239 Topic: Q4 Skill: RECALL 108) Because all customer data resides in a single location in a CRM system, all CRM processes can be ________ to one another. Answer: linked Diff: 2 Type: SA Page Ref: 243 Topic: Q7 Skill: RECALL 109) In an ERP, the processes displayed in the business ________ have been tried and tested by hundreds of organizations. Answer: blueprints Diff: 2 Type: SA Page Ref: 242 Topic: Q5 Skill: RECALL 110) What is an enterprise resource planning system? Answer: Enterprise resource planning systems support all of the primary business processes as well as the human resources and accounting support processes. Diff: 2 Type: ES Page Ref: 241 Topic: Q5 Skill: RECALL 111) What are the steps in the customer life cycle? Answer: Marketing, customer acquisition, relationship management, and loss/churn. Diff: 3 Type: ES Page Ref: 243 Topic: Q7 Skill: RECALL 112) What is an industry standard process? Answer: An industry standard process is embedded is a business process that is embedded in enterprise application software. Diff: 2 Type: ES Page Ref: 239 Topic: Q5 Skill: RECALL 22 Copyright © 2016 Pearson Canada Inc.
113) What is a SRM system? Answer: A supplier relationship management is a business process for managing all contacts between an organization and its suppliers. Diff: 2 Type: ES Page Ref: 246 Topic: Q8 Skill: RECALL 114) What is a CRM system? Answer: Customer relationship management (CRM) systems support the business processes of attracting, selling, managing, delivering, and supporting customers. Diff: 2 Type: ES Page Ref: 243 Topic: Q7 Skill: RECALL 115) What is a supply chain? Answer: A supply chain is a network of organizations and facilities that transforms raw materials into products delivered to customers. Diff: 1 Type: ES Page Ref: 245 Topic: Q8 Skill: RECALL 116) What is the difference between a CRM and a traditional functional application? Answer: The difference between CRM systems and traditional functional applications is that CRM addresses all activities and events that touch the customer and provides a single repository for data about all customer interactions. With functional systems, data about customers are sprinkled in databases all over the organization. Some customer data exist in customer management databases, some in order entry databases, some in customer service databases, and so forth. CRM systems store all customer data in one place and make it possible to access all data about the customer. Diff: 3 Type: ES Page Ref: 243 Topic: Q7 Skill: APPLIED 117) It is said that adopting a system such as SAP R/3 may trigger a reduction in competitive advantage through the spread of industry standard processes. Explain why this may happen and identify the important difference that may mitigate this reduction. Answer: Adopting a system such as SAP/3 may cause a reduction in competitive advantage through the spread of industry standard processes because the organization is imitating other organization's processes instead of developing/improving its own. Therefore, it seems to provide not much differentiation from other organizations. However, as we have learned, information systems do not only refer to the hardware, software, and procedures, but also data and people. Thus, the organization's competitive advantage depends on the good combination of these five components. Also, industry standard process can help an organization improve their processes by realizing the best practices of its competitors. Diff: 3 Type: ES Page Ref: 239 Topic: Q5 Skill: APPLIED 23 Copyright © 2016 Pearson Canada Inc.
118) As all the companies in an industry move to more integrated information systems how can they still reap a competitive advantage from them? Does adopting the standard business blueprint still provide a competitive advantage? Answer: Although many companies raced to implement an ERP system prior to Y2K, there was considerable variation in the level and quality of the integration of the business processes that they achieved. There is still a lot of room for improvement. Companies hope to build on these integrated systems not only by improving the processes, but also by adding wireless access, Web-enabling them, and integrating other new technologies like RFID tags and scanning applications. Some very large companies even have multiple ERP systems that are difficult to integrate between their different business units. There is potential for integration on an even larger, corporate scale. There is some debate today about whether ERP systems have become so prevalent that they have become commoditized and don't offer any differentiation in industry. ERP vendors have tried to counter this by expanding their offerings to support things like archiving and specialized reporting. They now offer to go back and perform process tune-ups and even optimizing things like the supply chain. Diff: 3 Type: ES Page Ref: 242 Topic: Q6 Skill: APPLIED 119) Give an example of an application from each of the five categories of functional systems. Answer: Marketing and Sales: Sales forecasting Operations: Inventory management Manufacturing: Scheduling Human resources: Payroll and compensation Accounting and finance: Accounts receivable Diff: 2 Type: ES Page Ref: 235 Topic: Q2 Skill: RECALL 120) Describe how an ERP supports each of the primary activities in Porter's value chain model. Answer: The generic value chain has five primary and four support activities. The primary activities of the value chain include inbound logistics, operations, outbound logistics, marketing and sales, and service. An ERP allows for the linking of these activities together so that data from the primary and support activities can be combined in the decision making process. Diff: 3 Type: ES Page Ref: 234 Topic: Q2 Skill: APPLIED
24 Copyright © 2016 Pearson Canada Inc.
121) Inter-organizational information systems such as SCM, SRM, and Web-based systems have the potential for providing significant competitive advantage today. While this is good in theory, what potential problems does it present? Answer: The adoption of inter-organizational information systems involves multiples departments; that is, its implementation demands the organization to invest enough time in a thorough understanding of the system a priori. One potential problem that may arise is that data are not properly corrected (e.g., accurate information, normalized data) and entered in the system. This problem may cause the system to fail because the ultimate goal of these systems is the exchange of accurate and reliable information. Another issue is people's resistance to using the new system and the change. If users are not given a proper training in the benefits, use, and purpose of the system as well as not given the opportunity to get involved in the implementation stages, users start losing faith in the usefulness of the information system. Diff: 3 Type: ES Page Ref: 242 Topic: Q6 Skill: APPLIED
25 Copyright © 2016 Pearson Canada Inc.
Experiencing MIS, Cdn. Ed., 4e (Kroenke) Chapter 8 Decision Making and Business Intelligence 1) Online transaction processing (OLTP) systems are the backbone of all cross-functional systems in a company. Answer: TRUE Diff: 1 Type: TF Page Ref: 263 Topic: Q2 Skill: RECALL 2) Data-mining systems use heuristic techniques to process data to find hidden patterns and relationships among the data. Answer: FALSE Diff: 2 Type: TF Page Ref: 271 Topic: Q4 Skill: RECALL 3) A reporting system is designed to provide the right information, to the right user, at the right time. Answer: TRUE Diff: 1 Type: TF Page Ref: 268 Topic: Q4 Skill: RECALL 4) A data-mining system uses statistical analysis to enable fundraisers to predict who will donate to a cause. Answer: TRUE Diff: 2 Type: TF Page Ref: 268 Topic: Q4 Skill: RECALL 5) Data-mining is about probabilities not certainties. So sometimes a good model may look bad because of a string of bad luck. Answer: TRUE Diff: 2 Type: TF Page Ref: 280 Topic: Q7 Skill: RECALL 6) Reporting systems are programs that read data from a variety of sources, process that data, produce and deliver formatted reports to users. Answer: TRUE Diff: 2 Type: TF Page Ref: 271 Topic: Q4 Skill: RECALL
1 Copyright © 2016 Pearson Canada Inc.
7) Fine data are highly summarized. Answer: FALSE Diff: 1 Type: TF Page Ref: 261 Topic: Q1 Skill: RECALL 8) Coarse data are highly summarized. Answer: TRUE Diff: 1 Type: TF Page Ref: 261 Topic: Q1 Skill: RECALL 9) Clickstream data is very fine data. Answer: TRUE Diff: 1 Type: TF Page Ref: 261 Topic: Q1 Skill: RECALL 10) Generally it is better to have data that is too fine rather than too coarse. Answer: TRUE Diff: 1 Type: TF Page Ref: 261 Topic: Q1 Skill: RECALL 11) Systems that focus on making data collected in OLTP to support decision making are often referred to as knowledge management systems. Answer: FALSE Diff: 2 Type: TF Page Ref: 263 Topic: Q3 Skill: RECALL 12) Systems that focus on making data collected in OLTP to support decision making are often referred to as expert systems. Answer: FALSE Diff: 2 Type: TF Page Ref: 263 Topic: Q3 Skill: RECALL 13) Systems that focus on making data collected in OLTP to support decision making are often referred to as decision support systems. Answer: TRUE Diff: 2 Type: TF Page Ref: 263 Topic: Q3 Skill: RECALL
2 Copyright © 2016 Pearson Canada Inc.
14) OLTP provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. Answer: FALSE Diff: 2 Type: TF Page Ref: 262 Topic: Q3 Skill: RECALL 15) OLAP provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. Answer: TRUE Diff: 2 Type: TF Page Ref: 262 Topic: Q3 Skill: RECALL 16) With cluster analysis, analysts create a model or hypothesis before running the analysis. Answer: FALSE Diff: 2 Type: TF Page Ref: 272 Topic: Q7 Skill: APPLIED 17) With supervised data mining, analysts create a model or hypothesis before running the analysis. Answer: TRUE Diff: 2 Type: TF Page Ref: 272 Topic: Q7 Skill: RECALL 18) Neural networks are a supervised data-mining technique. Answer: TRUE Diff: 2 Type: TF Page Ref: 273 Topic: Q7 Skill: RECALL 19) Cluster analysis measures the impact of a set of variables on another variable. Answer: FALSE Diff: 2 Type: TF Page Ref: 272 Topic: Q7 Skill: RECALL 20) Regression analysis measures the impact of a set of variables on another variable. Answer: TRUE Diff: 2 Type: TF Page Ref: 272 Topic: Q7 Skill: RECALL
3 Copyright © 2016 Pearson Canada Inc.
21) A data warehouse is a data collection that is created to address the needs of a particular business function, problem, or opportunity. Answer: FALSE Diff: 2 Type: TF Page Ref: 268 Topic: Q6 Skill: RECALL 22) A data mart is a data collection that is created to address the needs of a particular business function, problem, or opportunity. Answer: TRUE Diff: 1 Type: TF Page Ref: 270 Topic: Q6 Skill: RECALL 23) Problematic data are termed dirty data. Answer: TRUE Diff: 1 Type: TF Page Ref: 260 Topic: Q1 Skill: RECALL 24) Problematic data are termed missing values. Answer: FALSE Diff: 1 Type: TF Page Ref: 260 Topic: Q1 Skill: RECALL 25) The data resource challenge refers to the lack of data to support decision making. Answer: FALSE Diff: 2 Type: TF Page Ref: 260 Topic: Q3 Skill: RECALL 26) Market-basket analysis is a data-mining system, which computes correlations based on past orders to determine items that are frequently purchased together. Answer: TRUE Diff: 2 Type: TF Page Ref: 268 Topic: Q6 Skill: RECALL 27) Experts systems encapsulate knowledge and use if/then rules to support decisions. Answer: TRUE Diff: 2 Type: TF Page Ref: 268 Topic: Q4 Skill: RECALL
4 Copyright © 2016 Pearson Canada Inc.
28) With supervised data mining, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. Answer: TRUE Diff: 2 Type: TF Page Ref: 272 Topic: Q7 Skill: RECALL 29) Discovering patterns and relationships in data is the purpose of data mining. Answer: TRUE Diff: 2 Type: TF Page Ref: 273 Topic: Q7 Skill: RECALL 30) Managers suffer more from an overabundance of irrelevant data. Answer: TRUE Diff: 1 Type: TF Page Ref: 259 Topic: Q1 Skill: RECALL 31) Big Data is a very specifically defined concept that is relatively inexpensive. Answer: FALSE Diff: 1 Type: TF Page Ref: 274-275 Topic: Q7 Skill: RECALL 32) The total amount of data generated by 2010 is estimated to be A) 330 petabytes. B) 3.3 zettabytes. C) 33 petabytes. D) 3.3 exabytes. E) 0.33 yottabytes. Answer: D Diff: 2 Type: MC Page Ref: 260 Topic: Q1 Skill: RECALL 33) The hyper abundance of information is sometimes called A) data abundance. B) Moore's Law. C) the Ackoff principle. D) information overload. E) dirty data. Answer: D Diff: 1 Type: MC Page Ref: 259 Topic: Q1 Skill: RECALL 5 Copyright © 2016 Pearson Canada Inc.
34) Data ________ refers to the degree of summarization or detail. A) relevance B) granularity C) integrity D) clarity E) quality Answer: B Diff: 2 Type: MC Page Ref: 261 Topic: Q2 Skill: RECALL 35) If you are collecting data electronically and processing the transaction online, then you are using (a) ________. A) online analytical processing (OLAP) B) online transaction processing (OLTP) C) data warehouse D) data-mining E) database management system (DBMS) Answer: B Diff: 1 Type: MC Page Ref: 261 Topic: Q2 Skill: RECALL 36) A person's clicking behavior on the web is termed as their A) mouse trails. B) webstream. C) clickstream. D) web tracks. E) link journey. Answer: C Diff: 1 Type: MC Page Ref: 261 Topic: Q1 Skill: RECALL 37) Problematic data are termed A) problem data. B) irrelevant data. C) incorrect data. D) dirty data. E) untrustworthy data. Answer: D Diff: 1 Type: MC Page Ref: 260 Topic: Q1 Skill: RECALL
6 Copyright © 2016 Pearson Canada Inc.
38) While data may be collected in OLTP, the fact that data may not be used to improve decision making refers to (the) A) data overload challenge. B) information overload. C) data resource challenge. D) data integrity challenge. E) knowledge challenge. Answer: C Diff: 2 Type: MC Page Ref: 263 Topic: Q3 Skill: RECALL 39) A ________ is a data collection that is created to address the needs of a particular business function, problem, or opportunity. A) database B) data mart C) data-mine D) data depot E) data warehouse Answer: B Diff: 2 Type: MC Page Ref: 270 Topic: Q6 Skill: RECALL 40) The purpose of a business intelligence system is to provide information that A) improves decision making. B) can be summarized. C) is less granular. D) follows privacy legislation. E) has only one level of complexity. Answer: A Diff: 2 Type: MC Page Ref: 268 Topic: Q4 Skill: RECALL 41) ________ is the application of statistical techniques to find patterns and relationships in data and to predict outcomes. A) Data mining B) Data warehousing C) Data depositing D) Data marting E) Databasing Answer: A Diff: 3 Type: MC Page Ref: 271 Topic: Q4 Skill: RECALL 7 Copyright © 2016 Pearson Canada Inc.
42) With ________, analysts do not create a model or hypothesis before running the analysis. Instead, they apply the data-mining technique to the data and observe the results. A) regression analysis B) supervised data mining C) neural networks D) cluster analysis E) unsupervised data mining Answer: E Diff: 2 Type: MC Page Ref: 272 Topic: Q7 Skill: RECALL 43) ________ measure(s) the impact of a set of variables on another variable. A) Supervised data mining B) Regression analysis C) Unsupervised data mining D) Neural networks E) Cluster analysis Answer: B Diff: 2 Type: MC Page Ref: 272 Topic: Q7 Skill: RECALL 44) ________ is a statistical technique that can identify groups of entities that have similar characteristics. A) Regression analysis B) Data mining C) Cluster analysis D) Character analysis E) Supervised data mining Answer: C Diff: 2 Type: MC Page Ref: 272 Topic: Q7 Skill: RECALL 45) If transactions are entered and processed immediately upon entry, then the system is operating in A) transaction time. B) batch mode. C) unprotected mode. D) online mode. E) real time. Answer: E Diff: 1 Type: MC Page Ref: 261 Topic: Q2 Skill: RECALL 8 Copyright © 2016 Pearson Canada Inc.
46) A phone number of 123-456-7890 and an age of 999 are examples of ________ in a database. A) granularity B) OLTP C) incorrect data labels D) dirty data E) too many attributes Answer: D Diff: 3 Type: MC Page Ref: 260 Topic: Q1 Skill: RECALL 47) ________ integrate data from multiple sources, and process those data by sorting, grouping, summing, averaging, and comparing. A) Reporting systems B) Supplier Relationship Management systems C) Business intelligence systems D) Expert Systems E) Customer Relationship Management systems Answer: A Diff: 1 Type: MC Page Ref: 268 Topic: Q4 Skill: RECALL 48) ________ process data using sophisticated statistical techniques like regression analysis and decision tree analysis. A) CRM systems B) Data-mining systems C) Business intelligence systems D) Reporting systems E) Expert Systems Answer: B Diff: 2 Type: MC Page Ref: 268 Topic: Q4 Skill: RECALL
9 Copyright © 2016 Pearson Canada Inc.
49) ________ create value from intellectual capital by collecting and sharing human knowledge of products, product uses, best practices, and other critical knowledge with employees, managers, customers, suppliers, and other who need it. A) CRM applications B) Expert Systems C) Business intelligence systems D) Data mining systems E) Knowledge management systems Answer: E Diff: 2 Type: MC Page Ref: 268 Topic: Q4 Skill: RECALL 50) ________ encapsulate the knowledge of human experts in the form of if-then rules. A) Data mining systems B) Expert Systems C) Business intelligence applications D) Reporting systems E) CRM systems Answer: B Diff: 1 Type: MC Page Ref: 268 Topic: Q4 Skill: RECALL 51) The purpose of (a) ________ is to extract and clean data from operational systems and other sources. A) cluster analysis B) data mart C) data warehouse D) regression analysis E) data mining Answer: C Diff: 1 Type: MC Page Ref: 271 Topic: Q5 Skill: RECALL 52) In 2002, a total of ________ petabytes of new data were created. A) 304 B) 330 C) 3.3 D) 403 E) 430 Answer: D Diff: 2 Type: MC Page Ref: 259 Topic: Q1 Skill: RECALL 10 Copyright © 2016 Pearson Canada Inc.
53) ________ provides the ability to sum, count, average, and perform other simple arithmetic operation on groups of data. A) Online database processing (OLDP) B) Online transaction processing (OLTP) C) Online data processing (OLDP) D) Online record processing (OLRP) E) Online analytic processing (OLAP) Answer: E Diff: 2 Type: MC Page Ref: 262 Topic: Q3 Skill: RECALL 54) An OLAP report has A) measures and dimensions. B) averages. C) dimensions. D) measures and averages. E) measures. Answer: A Diff: 2 Type: MC Page Ref: 262 Topic: Q3 Skill: RECALL 55) Systems that focus on making data collected in OLTP useful for allowing multiple decision makers to collaborate are often referred to as A) Executive Information Systems. B) Data Mining Systems. C) Expert Systems. D) Knowledge Management Systems. E) Decision Support Systems. Answer: E Diff: 2 Type: MC Page Ref: 263 Topic: Q3 Skill: RECALL 56) ________ analysis is a data-mining system which computes correlation of items on past orders to determine items that are frequently purchased together. A) Market-basket B) Marketing C) Value chain D) Data-mining E) Shopping cart Answer: A Diff: 2 Type: MC Page Ref: 268 Topic: Q7 Skill: RECALL 11 Copyright © 2016 Pearson Canada Inc.
57) If you need to identify groups of entities that have similar characteristics, you need to perform (a) A) cluster analysis. B) regression analysis. C) neural network analysis. D) online analytical processing. E) grouping analysis. Answer: A Diff: 3 Type: MC Page Ref: 272 Topic: Q7 Skill: APPLIED 58) Which of the following systems fosters innovation, improves customer service, and increases organizational responsiveness by sharing knowledge of products, product uses, and best practices? A) Market-basket Analysis B) Regression Analysis Systems C) Data-mining Systems D) Knowledge Management Systems E) Expert Systems Answer: D Diff: 3 Type: MC Page Ref: 268 Topic: Q4 Skill: RECALL 59) Which of the following is an assumption about information systems that Ackoff disputed? A) Computer speed doubles every 18 months. B) There is too much uncertainty in making any decision. C) Managers have no problem making decisions if they get the data they need. D) Managers that make decisions do not get irrelevant data. E) There is too much information. Answer: C Diff: 3 Type: MC Page Ref: 259 Topic: Q1 Skill: APPLIED 60) Which of the following is an assumption about information systems that Ackoff disputed? A) There is too much uncertainty in making any decision. B) Decisions are poor because managers lack relevant information. C) Computer speed doubles every 18 months. D) There is too much information. E) Mangers suffer from a lack of perfect data. Answer: B Diff: 3 Type: MC Page Ref: 259 Topic: Q1 Skill: APPLIED 12 Copyright © 2016 Pearson Canada Inc.
61) Which of the following is an assumption about information systems that Ackoff disputed? A) Managers are aware of the data they need. B) There is too much information. C) There is too much uncertainty in making any decisions. D) Computer speed doubles every 18 months. E) Managers suffer from a lack of training. Answer: A Diff: 3 Type: MC Page Ref: 259 Topic: Q1 Skill: APPLIED 62) Why does the exponential growth in data matter? A) There was too little data before. B) Managers know what data they need. C) Information overload is a blessing. D) Getting the right information at the right time can improve decisions. E) You can make money with data. Answer: D Diff: 3 Type: MC Page Ref: 254 Topic: Q1 Skill: APPLIED 63) It is usually better to have data granularity that is ________ rather than too coarse. A) dirty data B) missing values C) inconsistent D) more recent E) too fine Answer: E Diff: 1 Type: MC Page Ref: 261 Topic: Q1 Skill: RECALL 64) The data processing strategy that waits for many transactions to pile up before they are processed is called A) LDAP. B) delayed processing. C) batch processing. D) OLTP. E) OLAP. Answer: C Diff: 1 Type: MC Page Ref: 259 Topic: Q2 Skill: RECALL
13 Copyright © 2016 Pearson Canada Inc.
65) ________ systems are the backbone of all functional, cross-functional, and interorganizational systems in an organization. A) OLAP B) Batch processing C) OLTP D) LDAP E) Real time Answer: C Diff: 2 Type: MC Page Ref: 260 Topic: Q2 Skill: RECALL 66) Thomas Davenport noted that a major grocery chain used less than ________ percent of its scanner data A) 1 B) 2 C) 3 D) 4 E) 5 Answer: B Diff: 3 Type: MC Page Ref: 260 Topic: Q3 Skill: RECALL 67) Which of the following is a synonym for data-mining? A) Data discovery B) Cluster analysis C) Data mart D) Data parsing E) Knowledge discovery in databases Answer: E Diff: 3 Type: MC Page Ref: 271 Topic: Q4 Skill: APPLIED 68) Experts in a communications company believe that cell phone usage on weekends is determined by the age of the customer and the number of months the customer has the cell phone account. Which of the following technique could be used to analyze the data? A) Regression analysis B) Unsupervised data-mining C) Neural networks D) Cluster analysis E) Market-based analysis Answer: A Diff: 3 Type: MC Page Ref: 270 Topic: Q7 Skill: APPLIED 14 Copyright © 2016 Pearson Canada Inc.
69) Data that resides in different sources or is incompatible with the intended purpose is an example of A) inconsistent data. B) missing values. C) dirty data. D) non-integrated data. E) clickstream data. Answer: D Diff: 2 Type: MC Page Ref: 261 Topic: Q1 Skill: RECALL 70) When an area code changes in a database, the phone number for a given customer before the change will not match the customer's number after the change. This is an example of A) too fine data. B) too coarse data. C) missing values. D) incomplete or inaccurate data. E) inconsistent data. Answer: E Diff: 3 Type: MC Page Ref: 260 Topic: Q1 Skill: RECALL 71) Clickstream data is often ________ and much of it has to be discarded. A) incomplete or inaccurate data. B) too coarse. C) inconsistent data. D) missing value. E) too fine. Answer: E Diff: 3 Type: MC Page Ref: 261 Topic: Q1 Skill: RECALL
15 Copyright © 2016 Pearson Canada Inc.
72) A nonprofit organization can process a donation without knowing the donor's gender or age, but a data mining application that looks at differences in donation behaviours based on gender would be impaired. This data problem is known as A) too fine data. B) missing values. C) inconsistent data. D) incomplete or inaccurate data. E) too coarse data. Answer: B Diff: 2 Type: MC Page Ref: 254 Topic: Q1 Skill: RECALL 73) Highly summarized data is known as being A) coarse. B) fine. C) inconsistent. D) too summarized. E) too comprehensive. Answer: A Diff: 2 Type: MC Page Ref: 261 Topic: Q1 Skill: RECALL 74) Clickstream data is A) a record of customer's or visitor's behavior on a website. B) not used for market basket predictions. C) inconsistent. D) too summarized. E) the end result of data mining. Answer: A Diff: 2 Type: MC Page Ref: 261 Topic: Q1 Skill: RECALL 75) It is better to have data that is too fine than too coarse because fine data can be converted to coarse data by A) separating the data into its constituent parts. B) using regression analysis. C) placing the data into a data mart. D) summing and combining the data. E) placing the data into a data warehouse. Answer: D Diff: 2 Type: MC Page Ref: 261 Topic: Q1 Skill: RECALL 16 Copyright © 2016 Pearson Canada Inc.
76) In an OLAP system a measure is (are) A) a data item of interest. B) a report. C) data items that are summed. D) processed data. E) a characteristic of a dimension. Answer: A Diff: 2 Type: MC Page Ref: 262 Topic: Q3 Skill: RECALL 77) To realize a competitive advantage from data an organization must A) collect the data. B) view data as a liability. C) use the data to make better decisions. D) view data as an asset. E) analyze the data. Answer: C Diff: 2 Type: MC Page Ref: 268 Topic: Q4 Skill: RECALL 78) The decision to use batch or real time processing should depend upon A) the nature of the transactions and the needs of the organization. B) the nature of the transactions. C) the needs to the organization. D) the existing infrastructure of the organization. E) the needs to the organization and the existing infrastructure of the organization. Answer: A Diff: 2 Type: MC Page Ref: 263 Topic: Q2 Skill: RECALL 79) Billy Beane is generally credited with introducing A) new methods of scouting players for the National Hockey League. B) scientific and statistical techniques that capture more data for major league baseball. C) market-basket analysis in major league baseball. D) developing OLTP software. E) real-time processing to business processes Answer: B Diff: 2 Type: MC Page Ref: 260 Topic: Q4 Skill: RECALL
17 Copyright © 2016 Pearson Canada Inc.
80) By sharing knowledge companies can A) improve the decision making of non-experts. B) mine data better. C) foster innovation. D) have more complete information systems. E) automate decision making. Answer: C Diff: 2 Type: MC Page Ref: 268 Topic: Q4 Skill: RECALL 81) Your local burger joint wants to reap the benefits of improved decision making by using its sales data. In order to do this, it must A) use reporting systems as part of its complete information systems. B) incorporate data-mining products as part of its complete information systems. C) follow best practices and adopt an ERP. D) adopt an expert system into its existing information system. E) adopt knowledge management systems into its existing information system. Answer: B Diff: 3 Type: MC Page Ref: 268 Topic: Q4 Skill: RECALL 82) An RFM analysis is a A) data-mining system. B) way of recording an individual customer's spending habits. C) way of analyzing and ranking customers according to their purchasing patterns. D) way of recording a customer's most recent purchases. E) way of analyzing a customer's most recent purchases. Answer: C Diff: 2 Type: MC Page Ref: 268 Topic: Q4 Skill: RECALL 83) Data-mining techniques include A) supplier relationship management. B) data warehousing. C) data marting. D) market basket analysis. E) customer relationship management. Answer: D Diff: 2 Type: MC Page Ref: 270 Topic: Q7 Skill: RECALL
18 Copyright © 2016 Pearson Canada Inc.
84) In most cases, data-mining systems are used to make A) assessments. B) predictions. C) solutions. D) decisions. E) relationships. Answer: B Diff: 2 Type: MC Page Ref: 273 Topic: Q7 Skill: RECALL 85) ________ systems integrate data from a variety of sources, process that data, and produce and deliver formatted reports to users. A) Data-mining B) Reporting C) Web service D) XML E) RFP Answer: B Diff: 2 Type: MC Page Ref: 268 Topic: Q4 Skill: RECALL 86) Before it can be loaded into the data warehouse, operational data must be extracted and A) sorted. B) filtered. C) dimensioned. D) processed. E) cleaned. Answer: E Diff: 2 Type: MC Page Ref: 271 Topic: Q5 Skill: RECALL 87) A data warehouse contains a special database that stores the ________, which records its source, history, and format of the data. A) dimensional data B) clickstream data C) metadata D) media format E) dirty data Answer: C Diff: 3 Type: MC Page Ref: 270 Topic: Q5 Skill: RECALL
19 Copyright © 2016 Pearson Canada Inc.
88) A data warehouse will usually consist of A) large air-conditioned buildings. B) thousands of boxes of paper files. C) A few fast severs and very large storage devices. D) the same data as the company's operational data. E) only government related information. Answer: C Diff: 2 Type: MC Page Ref: 271 Topic: Q5 Skill: RECALL 89) Sometimes, large organizations break out ________ from their data warehouses so they can be used for a specific functional area of the organization like marketing or finance. A) special groupings B) Web services C) database servers D) OLAP applications E) data marts Answer: E Diff: 2 Type: MC Page Ref: 270 Topic: Q6 Skill: RECALL 90) ________ is a problem that occurs when data-mining is used to create overly complex models that are not suited to making accurate predictions. A) Inconsistent data B) Overfitting C) Model degradation D) Dirty data E) Clean data Answer: B Diff: 3 Type: MC Page Ref: 273 Topic: Q7 Skill: APPLIED 91) It is almost certain that in reality, when you take on a data-mining project, the data will be A) dirty. B) full of viruses. C) formatted properly. D) buggy. E) inconsistent. Answer: A Diff: 2 Type: MC Page Ref: 260 Topic: Q1 Skill: APPLIED
20 Copyright © 2016 Pearson Canada Inc.
92) ________ refers to the degree of summarization or detail. Answer: Data granularity Diff: 2 Type: SA Page Ref: 261 Topic: Q1 Skill: RECALL 93) Customer's web clicking behavior is called ________. Answer: clickstream data Diff: 2 Type: SA Page Ref: 261 Topic: Q1 Skill: RECALL 94) While data may be collected in OLTP, the data may not be used to improve decision making. We refer to this as the ________. Answer: data resource challenge Diff: 2 Type: SA Page Ref: 263 Topic: Q3 Skill: RECALL 95) Systems that focus on making data collected in OLTP useful for decision making are often referred to as ________. Answer: decision support systems Diff: 2 Type: SA Page Ref: 263 Topic: Q3 Skill: RECALL 96) An OLAP report has ________ and dimensions. Answer: measures Diff: 2 Type: SA Page Ref: 263 Topic: Q3 Skill: RECALL 97) ________ integrate data from multiple sources, and they process those data by sorting, grouping, summing, averaging, and comparing. Answer: Reporting Systems Diff: 2 Type: SA Page Ref: 268 Topic: Q4 Skill: RECALL 98) ________ systems process data using sophisticated statistical techniques like regression analysis and decision tree analysis. Answer: Data-mining Diff: 2 Type: SA Page Ref: 268 Topic: Q4 Skill: RECALL
21 Copyright © 2016 Pearson Canada Inc.
99) ________ systems create value from intellectual capital by collecting and sharing human knowledge of products, product uses, best practices, and other critical knowledge with employees, managers, customers, suppliers, and others who need it. Answer: Knowledge management Diff: 2 Type: SA Page Ref: 268 Topic: Q5 Skill: RECALL 100) ________ encapsulate the knowledge of human experts in the form of if/then rules. Answer: Expert systems Diff: 2 Type: SA Page Ref: 268 Topic: Q4 Skill: RECALL 101) The purpose of a(n) ________ is to extract and clean data from operational systems and other sources. Answer: data warehouse Diff: 2 Type: SA Page Ref: 271 Topic: Q5 Skill: RECALL 102) ________ is data about data. Answer: Metadata Diff: 1 Type: SA Page Ref: 270 Topic: Q5 Skill: RECALL 103) A(n) ________ is a data collection that is made to address the needs of a particular business function, problem, or opportunity. Answer: data mart Diff: 2 Type: SA Page Ref: 270 Topic: Q6 Skill: RECALL 104) ________ is the application of statistical techniques to find patterns and relationships among data and to classify and predict. Answer: Data mining Diff: 2 Type: SA Page Ref: 268 Topic: Q4 Skill: RECALL 105) ________ is a statistical technique that identify groups of entities that have similar characteristics. Answer: Cluster analysis Diff: 2 Type: SA Page Ref: 272 Topic: Q7 Skill: RECALL 22 Copyright © 2016 Pearson Canada Inc.
106) ________ analysis measures the impact of a set of variables on another variable. Answer: Regression Diff: 2 Type: SA Page Ref: 272 Topic: Q7 Skill: RECALL 107) With________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. Answer: supervised data mining Diff: 2 Type: SA Page Ref: 272 Topic: Q7 Skill: RECALL 108) Many organizations create a special facility called a(n) ________ by extracting operational data and cleaning it up for more sophisticated data analysis. Answer: data warehouse Diff: 2 Type: SA Page Ref: 271 Topic: Q5 Skill: RECALL 109) ________ is a data-mining system which computes correlations of items on past orders to determine items that are frequently purchased together. Answer: Market basket Diff: 2 Type: SA Page Ref: 268 Topic: Q7 Skill: RECALL 110) When creating a data warehouse that will be used for BI, programs first must extract, ________ and prepare the operational data. Answer: clean Diff: 2 Type: SA Page Ref: 271 Topic: Q5 Skill: RECALL 111) When data sets have missing values or invalid entries it is called ________ data. Answer: dirty Diff: 2 Type: SA Page Ref: 260 Topic: Q1 Skill: RECALL 112) If a part number is changed, but the data in the data warehouse does not reflect this change the data is said to be ________. Answer: inconsistent Diff: 2 Type: SA Page Ref: 260 Topic: Q1 Skill: RECALL 23 Copyright © 2016 Pearson Canada Inc.
113) ________ refers to the relative level of detail that data represents. Answer: Granularity Diff: 2 Type: SA Page Ref: 261 Topic: Q1 Skill: RECALL 114) If the granularity of the data is too fine, it is easy to make it ________ by summing and combining. Answer: coarser Diff: 2 Type: SA Page Ref: 261 Topic: Q1 Skill: RECALL 115) With ________, data miners do not create a model or hypothesis before running the analysis. Answer: unsupervised data mining Diff: 2 Type: SA Page Ref: 272 Topic: Q7 Skill: RECALL 116) ________ is the problem of having many data points and generating the same number of equations to predict those points. Answer: Overfitting Diff: 3 Type: SA Page Ref: 280 Topic: Q7 Skill: RECALL 117) For developing BI applications, it is generally better to have too ________ a granularity rather than too coarse. Answer: fine Diff: 3 Type: SA Page Ref: 261 Topic: Q1 Skill: RECALL 118) A ________ is a subset of a data warehouse that addresses a particular component or functional area of the business. Answer: data mart Diff: 2 Type: SA Page Ref: 270 Topic: Q6 Skill: RECALL 119) There are two general categories of data-mining techniques; supervised and ________. Answer: unsupervised Diff: 2 Type: SA Page Ref: 272 Topic: Q7 Skill: RECALL 24 Copyright © 2016 Pearson Canada Inc.
120) ________ can be described as "knowledge discovery in databases." Answer: Data-mining Diff: 3 Type: SA Page Ref: 272 Topic: Q7 Skill: APPLIED 121) ________ data mining happens when analysts create a data model or hypothesis before running the analysis. Answer: Supervised Diff: 2 Type: SA Page Ref: 272 Topic: Q7 Skill: RECALL 122) ________ analysis that identifies groups of entities with similar characteristics is a common unsupervised data-mining technique. Answer: Cluster Diff: 3 Type: SA Page Ref: 272 Topic: Q7 Skill: RECALL 123) ________ analysis is the most common kind of supervised data-mining technique. Answer: Regression Diff: 3 Type: SA Page Ref: 272 Topic: Q7 Skill: APPLIED 124) ________ are another popular data-mining technique, which were originally based on the physiological analogy of how the neurons in the brain process huge amounts of data. Answer: Neural networks Diff: 3 Type: SA Page Ref: 273 Topic: Q7 Skill: RECALL 125) ________ projects are risky because you never know how they will turn out. Even with a good model, bad luck may prevail. Answer: Data mining Diff: 3 Type: SA Page Ref: 280 Topic: Q7 Skill: APPLIED
25 Copyright © 2016 Pearson Canada Inc.
126) What is unsupervised data mining? Answer: In unsupervised data mining, analysts do not create a model or hypothesis before running the analysis. Instead, they apply the data mining technique to the data and observe the results. With this method, analysts create hypotheses after the analysis to explain the patterns found. Diff: 2 Type: ES Page Ref: 272 Topic: Q7 Skill: RECALL 127) What is supervised data mining? Answer: In supervised data mining, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate the parameters of the model. For example, suppose marketing experts in a communications company believe cell phone usage on weekends is determined by the age of the customer and the number of months the customer has had the cell phone account. A data-mining analyst could then do an analysis that estimates the impact of customer and account age. Diff: 2 Type: ES Page Ref: 272 Topic: Q7 Skill: RECALL 128) What is online transaction processing? Answer: If you are collecting data electronically and processing the transactions online, then you are using an online transaction processing (OLTP) system. Diff: 2 Type: ES Page Ref: 261 Topic: Q2 Skill: RECALL 129) What is online analytic processing? Answer: OLAP provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. The remarkable characteristic of OLAP reports is that their format is dynamic. The viewer of the report can change the report's structure–hence the term online. Diff: 2 Type: ES Page Ref: 263 Topic: Q3 Skill: RECALL 130) What is clickstream data? Answer: It is possible to capture the customers' clicking behaviour on the Internet. This is clickstream data. Diff: 2 Type: ES Page Ref: 261 Topic: Q1 Skill: RECALL
26 Copyright © 2016 Pearson Canada Inc.
131) Using specific examples, describe data granularity. Answer: Data granularity refers to the degree of detail in the data. Coarse data are highly summarized; fine data express precise details. Diff: 3 Type: ES Page Ref: 261 Topic: Q1 Skill: APPLIED 132) What are the three assumptions that Ackoff disagreed with? Answer: One of the erroneous assumptions was that managers have no problem making decisions if they get the data they need. Another of the erroneous assumptions was that decisions are poor because managers lack relevant information. Another erroneous assumption Ackoff suggested was that managers are aware of the data they need. Diff: 2 Type: ES Page Ref: 259 Topic: Q1 Skill: RECALL 133) What is a data mart? Answer: A data mart is a data collection that is created to address the needs of a particular business function, problem, or opportunity. Diff: 2 Type: ES Page Ref: 270 Topic: Q6 Skill: RECALL 134) Describe the data resource challenge. Answer: While data may be collected in OLTP, the data may not be used to improve decision making. We refer to this as the data resource challenge. Diff: 3 Type: ES Page Ref: 263 Topic: Q3 Skill: RECALL 135) Is it better to have data that is too fine or too coarse? Explain. Answer: Generally, it is better to have too fine a granularity than too coarse. If the granularity is too fine, the data can be made coarser by summing and combining. Only analysts' labour and computer processing are required. If the granularity is too coarse, however, there is no way to separate the data into constituent parts. Diff: 2 Type: ES Page Ref: 261 Topic: Q1 Skill: APPLIED
27 Copyright © 2016 Pearson Canada Inc.
136) What is the purpose of business intelligence? What kind of BI tools are there? Answer: Business intelligence (BI) is a category of applications and technologies for gathering, storing, analyzing, and providing access to data to help enterprise users make better business decisions. BI tools include reporting and data mining. Reporting tools are programs that read data from a variety of sources, process that data, produce reports, and deliver those reports to the users who need them. Data-mining tools use statistical techniques to process data in order to find hidden patterns and relationships. Diff: 3 Type: ES Page Ref: 268 Topic: Q4 Skill: APPLIED 137) Operational data may not be suitable for more sophisticated analyses. What are the problems with operational data? What is a data warehouse and how is it designed to go beyond these issues? Answer: Basic reports and simple OLAP analyses can be made directly from operational data. However, operational data may be unsuited for more sophisticated analyses, particularly data mining because there are missing values or inconsistencies with the data. This is why most large companies extract and clean the data and put it into a separate data warehouse. Some dirty data may have illogical entries for gender, phone number, age, etc. Purchased data often have missing values or values that are out of an allowed range. More difficult, to correct is data that has become inconsistent over time, because it does not reflect changes in the real world, such as new postal codes, area codes, addresses, income levels, etc. For a data-mining application, a few erroneous data points are worse than no data at all, because errors will introduce bias into the analysis. The level of granularity can also be an issue. The analysis can only go to the level of detail at which the data was originally collected. If a company wants to track sales of candy, they must decide what the granularity of the data will be for each item; i.e., will it be by the case, the box, or the individual candy bar. A data warehouse is a separate facility where the data is extracted, cleaned, and integrated into a single format so that it can support these more complex data-mining applications. Diff: 3 Type: ES Page Ref: 271 Topic: Q5 Skill: APPLIED
28 Copyright © 2016 Pearson Canada Inc.
138) What is meant by supervised and unsupervised data mining? Describe one example of each technique. Answer: Data mining is the application of statistical techniques to find patterns and relationships among data and to classify and predict. It represents a convergence of research in fields such as computer science, statistics, and database design. With unsupervised data mining, analysts do not create a model or hypothesis before running the analysis. The data-mining techniques are simply run on the data and the results observed. Cluster analysis is the most common unsupervised technique, since it statistically organizes the data in clusters or groups that share similar characteristics. These may or may not be obvious to the users. Pharmaceutical companies will do this to examine which type of physicians have different prescribing patterns to help them market better to the different groups. With supervised data mining, a model of what factors the users want to test for is developed prior to the analysis. Regression analysis is the most common example of this. It tests a chosen set of variables to see how well they can act as predictors of future behaviour. Diff: 3 Type: ES Page Ref: 272 Topic: Q7 Skill: APPLIED 139) What are some of the obstacles to developing data-mining applications in the real world? Does this mean that data-mining projects should be avoided? Answer: In the real world there are many obstacles to doing a successful data-mining project that one might not expect. In the first place, it must be expected that all data sets will have dirty data in them. A lot of time will have to be spent just cleaning up data sets with missing values, values that are impossible or just unusable data. Data will also have to be integrated from multiple sources and this will take a substantial amount of time. A more severe problem is that the variables considered important at the beginning of the project may not be the ones that are considered crucial at the end of the project. At that point it may be too late to change variables and collect the data to test them. In the same vein, models can be created to fit any data set. This is called overfitting, and while accurate, these models will not be of much use in predicting new cases that come up. Then there is the problem with deploying the resulting analysis. Managers may have too high expectations about the results and if the model has a few bad results in a row purely due to random luck, the users may lose faith in it and abandon it too soon. All this just means that appropriate caution should be taken when developing and implementing them. Diff: 3 Type: ES Page Ref: 280 Topic: Q7 Skill: APPLIED
29 Copyright © 2016 Pearson Canada Inc.
Experiencing MIS, Cdn. Ed., 4e (Kroenke) Chapter 9 Ecommerce, Social Networking, and Web 2.0 1) Ecommerce is the buying and selling of goods and services over public and private computer networks. Answer: TRUE Diff: 1 Type: TF Page Ref: 284 Topic: Q1 Skill: RECALL 2) Checking the weather on theweathernetwork.com or yahoo.ca is an example of ecommerce. Answer: FALSE Diff: 1 Type: TF Page Ref: 284 Topic: Q1 Skill: RECALL 3) Modern consumers often know more about a product or service than does the person facilitating the sale. Answer: TRUE Diff: 1 Type: TF Page Ref: 284 Topic: Q1 Skill: RECALL 4) Ecommerce may require interconnectedness of the entire ERP process. Answer: TRUE Diff: 2 Type: TF Page Ref: 284 Topic: Q1 Skill: RECALL 5) When embarking on ecommerce, companies need not worry about customer security and privacy. Answer: FALSE Diff: 2 Type: TF Page Ref: 285 Topic: Q1 Skill: RECALL 6) Merchant companies take title to the goods they sell. Answer: TRUE Diff: 1 Type: TF Page Ref: 285 Topic: Q1 Skill: RECALL 7) Nonmerchant companies take title to the goods they sell. Answer: FALSE Diff: 1 Type: TF Page Ref: 285 Topic: Q1 Skill: RECALL 1 Copyright © 2016 Pearson Canada Inc.
8) Generally speaking, merchant companies include B2C, B2B and B2G enterprises. Answer: TRUE Diff: 2 Type: TF Page Ref: 285 Topic: Q1 Skill: RECALL 9) B2C, or business-to-consumer engages in sales between a supplier and a retail customer. Answer: FALSE Diff: 1 Type: TF Page Ref: 285 Topic: Q1 Skill: RECALL 10) A manufacturer that sells office goods hardware to city hall over the internet is engaging in B2G commerce. Answer: TRUE Diff: 2 Type: TF Page Ref: 285 Topic: Q1 Skill: APPLIED 11) Dell Computer engages in B2B, B2C and B2G online commerce. Answer: TRUE Diff: 2 Type: TF Page Ref: 285 Topic: Q1 Skill: APPLIED 12) Online auctions such as e-Bay are the most common form of nonmerchant ecommerce. Answer: TRUE Diff: 2 Type: TF Page Ref: 286 Topic: Q1 Skill: RECALL 13) Priceline.com is an example of an electronic exchange used by consumers. Answer: TRUE Diff: 2 Type: TF Page Ref: 286 Topic: Q1 Skill: RECALL 14) Disintermediation is the elimination of sales taxes when selling on line. Answer: FALSE Diff: 2 Type: TF Page Ref: 286 Topic: Q1 Skill: RECALL
2 Copyright © 2016 Pearson Canada Inc.
15) Disintermediation can have the overall effect of increasing margins for manufacturers and lowering consumer prices. Answer: TRUE Diff: 2 Type: TF Page Ref: 287 Topic: Q2 Skill: RECALL 16) Ecommerce can be used to determine price elasticity. Answer: TRUE Diff: 1 Type: TF Page Ref: 287 Topic: Q1 Skill: RECALL 17) Social Capital adds value in four ways: Information, Influence, Employment, Personal reinforcement. Answer: FALSE Diff: 2 Type: TF Page Ref: 290 Topic: Q2 Skill: RECALL 18) You gain social capital by adding more friends to your network and strengthening relationships. Answer: TRUE Diff: 2 Type: TF Page Ref: 291 Topic: Q2 Skill: RECALL 19) The people you know least can contribute the most to your network. Answer: TRUE Diff: 2 Type: TF Page Ref: 292 Topic: Q2 Skill: RECALL 20) One advantage of IT is the ability to keep track of many more people and enhance personalization. Answer: TRUE Diff: 2 Type: TF Page Ref: 294 Topic: Q2 Skill: RECALL 21) The Web 2.0 business model relies on software licensing to provide software as a service. Answer: FALSE Diff: 2 Type: TF Page Ref: 295 Topic: Q3 Skill: RECALL
3 Copyright © 2016 Pearson Canada Inc.
22) Web 2.0 applications need to be installed on the user's computer before the application can be used. Answer: FALSE Diff: 2 Type: TF Page Ref: 295 Topic: Q3 Skill: RECALL 23) Advertising rates can be changed automatically hour by hour under Web 2.0 by using Google's AdWords. Answer: TRUE Diff: 1 Type: TF Page Ref: 297 Topic: Q3 Skill: RECALL 24) When a user modifies Google's My Maps, this is a Web 2.0 feature called mashups. Answer: TRUE Diff: 2 Type: TF Page Ref: 297 Topic: Q3 Skill: RECALL 25) It could be said that traditional web sites are about participation and Web 2.0 is about publishing. Answer: FALSE Diff: 2 Type: TF Page Ref: 297 Topic: Q3 Skill: APPLIED 26) Ecommerce can be defined as A) using google to find clothing. B) sending text advertising. C) a store that has a website. D) buying and selling over computer networks. E) online dating. Answer: D Diff: 1 Type: MC Page Ref: 284 Topic: Q1 Skill: RECALL
4 Copyright © 2016 Pearson Canada Inc.
27) When making a purchase, modern consumers are more likely to A) shop at a physical store. B) use a single information channel. C) know little about the product or service. D) know just as much about the product or service as the sales staff. E) require more help making a purchase decision. Answer: D Diff: 2 Type: MC Page Ref: 284 Topic: Q1 Skill: RECALL 28) Ecommerce is considered a(n) ________ of electronic business. A) necessity B) sub-set C) precursor D) cause E) irrelevant factor Answer: B Diff: 1 Type: MC Page Ref: 284 Topic: Q1 Skill: RECALL 29) To be successful, ecommerce will likely require ________ of the entire enterprise resource planning process. A) showrooming B) interconnectedness C) dismantling D) conversion to SQL E) management understanding Answer: B Diff: 2 Type: MC Page Ref: 284 Topic: Q1 Skill: RECALL 30) Organizations need to ensure that all aspects of the business operate smoothly before A) using an ERP application. B) hiring IT people. C) the enterprise management systems are securely connected to the internet. D) selling goods on line. E) the business opens. Answer: C Diff: 2 Type: MC Page Ref: 284 Topic: Q1 Skill: RECALL
5 Copyright © 2016 Pearson Canada Inc.
31) Merchant companies A) sell goods and services on consignment. B) act as clearing houses or exchanges. C) are a throwback to the 1800s. D) own the goods they sell. E) sell goods only to government. Answer: D Diff: 2 Type: MC Page Ref: 285 Topic: Q1 Skill: RECALL 32) Nonmerchant companies A) usually don't need ERP applications. B) engage in disintermediation. C) arrange the sale of goods without actually owning the goods. D) sell services they own. E) do not deal with the public. Answer: C Diff: 2 Type: MC Page Ref: 285 Topic: Q1 Skill: RECALL 33) Merchant companies usually consist of A) B2B, B2G, and C2C types of ecommerce. B) B2B, B2G and B2C types of ecommerce. C) B2B, B2C and C2C types of ecommerce. D) B2C and C2C types of ecommerce. E) C2C and B2B types of ecommerce. Answer: B Diff: 2 Type: MC Page Ref: 285 Topic: Q1 Skill: APPLIED 34) In the ecommerce realm, business to consumer applications first captured the attention of A) Revenue Canada. B) Dell Computer. C) mail-order businesses. D) auction houses. E) the auto industry. Answer: C Diff: 2 Type: MC Page Ref: 285 Topic: Q1 Skill: RECALL
6 Copyright © 2016 Pearson Canada Inc.
35) eBay.ca would be an example of A) B2C nonmerchant ecommerce. B) B2G merchant ecommerce. C) B2B merchant ecommerce. D) B2C merchant ecommerce. E) B2G and B2B nonmerchant ecommerce. Answer: A Diff: 3 Type: MC Page Ref: 286 Topic: Q1 Skill: APPLIED 36) An ecommerce nonmerchant that provides goods and services at a stated price and arranges for delivery is known as A) data warehouse. B) clearinghouse. C) agent. D) B2B mediator. E) reseller. Answer: B Diff: 3 Type: MC Page Ref: 286 Topic: Q1 Skill: RECALL 37) Electronic exchanges are web sites that A) sell goods and services at a large discount. B) match buyers and sellers. C) allow consumers to bid against one another online. D) provide information for a fee. E) store data from any person or business. Answer: B Diff: 2 Type: MC Page Ref: 286 Topic: Q1 Skill: RECALL 38) Priceline.com is an example of a(n) A) cloud based storage service. B) ERP. C) electronic exchange. D) merchant company. E) price elasticity solution. Answer: C Diff: 2 Type: MC Page Ref: 286 Topic: Q1 Skill: RECALL
7 Copyright © 2016 Pearson Canada Inc.
39) Disintermediation occurs when A) a merchant becomes a nonmerchant. B) governments stop buying services on line. C) electronic exchanges fail to make a match. D) IT systems fail. E) a manufacturer sells directly to the end user. Answer: E Diff: 2 Type: MC Page Ref: 286 Topic: Q1 Skill: RECALL 40) Surprisingly, disintermediation is giving way in some business models to re-intermediation. An example of this is A) Dell.ca. B) google.ca. C) Expert Systems. D) travelocity.ca. E) rbauction.com. Answer: D Diff: 2 Type: MC Page Ref: 287 Topic: Q1 Skill: RECALL 41) For the consumer, ecommerce improves the flow of A) price information. B) database structures. C) business intelligence. D) social capital. E) physical capital. Answer: A Diff: 1 Type: MC Page Ref: 287 Topic: Q1 Skill: RECALL 42) For the vendor ecommerce produces new information about A) manufacturer's profits. B) price elasticity. C) disintermediation. D) merchant companies. E) nonmerchant companies. Answer: B Diff: 1 Type: MC Page Ref: 287 Topic: Q1 Skill: RECALL
8 Copyright © 2016 Pearson Canada Inc.
43) Economic factors to be considered by vendors who want to engage in ecommerce include A) increases in customer service, logistics and manufacturing expenses. B) showrooming, lower taxation and customer service expenses. C) increased competition and fewer customers. D) channel conflict and lower logistics expenses. E) showrooming and higher customer service expenses. Answer: E Diff: 1 Type: MC Page Ref: 288 Topic: Q1 Skill: RECALL 44) When Dell computers sells to a federal agency this is called A) C2C ecommerce. B) B2G ecommerce. C) C2G ecommerce. D) B2B ecommerce. E) Customer Relationship Management. Answer: B Diff: 1 Type: MC Page Ref: 285 Topic: Q1 Skill: RECALL 45) When a cottage owner rents her cottage to another person using kijiji.ca this is an example of A) G2G ecommerce. B) B2B ecommerce. C) C2C ecommerce. D) B2C ecommerce. E) B2G ecommerce. Answer: C Diff: 1 Type: MC Page Ref: 285 Topic: Q1 Skill: RECALL 46) When a consumer looks at a product at a bricks and mortar store, then purchases the product on line this is called A) price conflict. B) online elasticity. C) merchant ecommerce. D) showrooming. E) channel conflict. Answer: D Diff: 1 Type: MC Page Ref: 288 Topic: Q1 Skill: RECALL
9 Copyright © 2016 Pearson Canada Inc.
47) Future Shop mitigates showrooming by A) not having products in the store that can be purchased online at other stores. B) using high pressure sales tactics in the store. C) discouraging customers from taking pictures of goods. D) Online record processing. E) Encouraging customers to browse in person and buy online. Answer: E Diff: 2 Type: MC Page Ref: 289 Topic: Q1 Skill: RECALL 48) According to Nan Lin, social capital is created by A) investing in social relations with the expectations of returns in the marketplace. B) the opening up of a twitter account by a company. C) doing a speech for your department meeting. D) using email to contact your acquaintances. E) any online activity that involves networking. Answer: A Diff: 2 Type: MC Page Ref: 290 Topic: Q2 Skill: RECALL 49) According to Lin, social capital adds value in these ways: A) provides information, gives opportunity to influence, lends social credential, reinforces image. B) increased customer feedback, more effective CRM systems, lower customer acquisition costs. C) greater employee engagement, better long range planning. D) more opportunity to influence, more effective CRM, increased customer feedback in B2C situations. E) increased human capital, lower costs for physical capital, reduced supplier power. Answer: A Diff: 2 Type: MC Page Ref: 290 Topic: Q2 Skill: RECALL 50) More opportunities to influence and reinforced image and position are benefits to increase A) social capital. B) advertising. C) value chain management. D) data-mining. E) information flow Answer: A Diff: 2 Type: MC Page Ref: 290 Topic: Q2 Skill: RECALL
10 Copyright © 2016 Pearson Canada Inc.
51) The value of a social capital varies depending on a network's A) number of relationships, the strength of those relationships and the resources controlled. B) average age of the members, the interests of the network and the physical location of members. C) relationship strengths, the physical location of members, the age of the members. D) the resources controlled by the network, the age of members, and interests of members E) group analysis of members, strength of relationships, numbers of members. Answer: A Diff: 3 Type: MC Page Ref: 290 Topic: Q2 Skill: RECALL 52) Contrary to common thinking, network theory suggests that ________ contributes the most to the growth of social networks. A) strong relationships B) better credentials C) "frenemies" D) weak relationships E) high school relationships Answer: D Diff: 2 Type: MC Page Ref: 291 Topic: Q2 Skill: APPLIED 53) When it comes to social networks, if a company hires sales people, has a strong customer support system, and engages in public relations, the company is building A) a strong brand. B) word of mouth. C) social capital. D) sales leads. E) customer loyalty. Answer: C Diff: 2 Type: MC Page Ref: 292 Topic: Q2 Skill: APPLIED 54) Information systems impact social networking by A) letting us see people with the same qualifications within a company. B) improving search capabilities and reducing the trade-off between richness and reach. C) allowing people to find class reunions, meetings, and jobs. D) being available 24 hours a day for important contacts. E) strengthening weak ties. Answer: B Diff: 3 Type: MC Page Ref: 294 Topic: Q2 Skill: RECALL 11 Copyright © 2016 Pearson Canada Inc.
55) The term Web 2.0 was first popularized by A) Tim O'Reilly B) Bill Gates. C) Larry Ellison. D) Andrew Gemino. E) Warren Buffet. Answer: A Diff: 2 Type: MC Page Ref: 294 Topic: Q3 Skill: RECALL 56) Web 2.0 relies on ________ to drive revenues. A) video sales B) software licensing C) information storage D) advertising E) .mpg sales Answer: D Diff: 2 Type: MC Page Ref: 294 Topic: Q3 Skill: RECALL 57) ________ are companies that exemplify Web 2.0. A) Google, Microsoft and Oracle B) Microsoft, Intuit, and YouTube C) Microsoft, Sage and Intel D) Sage, Oracle and Java E) Google, Amazon and eBay Answer: E Diff: 1 Type: MC Page Ref: 294 Topic: Q3 Skill: RECALL 58) Web 2.0 applications are A) installed on users' computers. B) installed on users' networks. C) installed on users' computers and networks. D) thin clients. E) seldom updated. Answer: D Diff: 1 Type: MC Page Ref: 295 Topic: Q3 Skill: RECALL
12 Copyright © 2016 Pearson Canada Inc.
59) On some websites, users can give each other customer support or even participate in the creation of solutions, designs and products. This phenomenon is called A) the web 2.0 solver effect. B) group processing. C) crowdsourcing. D) parallel processing. E) real-time marketing Answer: C Diff: 2 Type: MC Page Ref: 296 Topic: Q3 Skill: RECALL 60) Crowdsourcing combines ________, viral marketing, and open-source design. A) thin clients B) social networking C) ERP D) mashups E) licensed software Answer: B Diff: 2 Type: MC Page Ref: 295 Topic: Q3 Skill: RECALL 61) The result of combining outputs from two or more websites is called A) crowdsourcing. B) social networking. C) B2C ecommerce. D) data parsing. E) a mashup. Answer: E Diff: 2 Type: MC Page Ref: 296 Topic: Q3 Skill: RECALL 62) With Web 2.0 advertising rates can be changed A) hour by hour. B) weekly. C) monthly. D) every two months. E) when the contract is renewed. Answer: A Diff: 1 Type: MC Page Ref: 297 Topic: Q3 Skill: RECALL
13 Copyright © 2016 Pearson Canada Inc.
63) With per click advertising the advertiser only has to pay the host site when A) the customer buys something. B) the customer lands on the host site page. C) the customer asks a question. D) the customer reads the advertisement. E) the customer clicks on the link. Answer: E Diff: 2 Type: MC Page Ref: 297 Topic: Q3 Skill: RECALL 64) AdSense and other similar services use the host organization's ________ to insert matching ads. A) postal code B) phone number C) name D) home city E) site content Answer: E Diff: 1 Type: MC Page Ref: 297 Topic: Q3 Skill: RECALL 65) Google's My Maps is an example of a(n) A) pay per use application. B) mashup application. C) user downloaded database. D) social network E) weak relationship Answer: B Diff: 1 Type: MC Page Ref: 297 Topic: Q3 Skill: RECALL 66) What Web 3.0 will look like and do is pretty much A) unpredictable. B) a function of internet speed. C) going to rest with google. D) already done by Facebook. E) up to nonmerchant companies. Answer: A Diff: 2 Type: MC Page Ref: 297 Topic: Q4 Skill: RECALL
14 Copyright © 2016 Pearson Canada Inc.
67) By using Track My Pizza, Domino's has had a(n) ________ increase in online orders. A) 18% B) $2.00 C) 36% D) 100% E) 200% Answer: D Diff: 1 Type: MC Page Ref: 298-299 Topic: Q4 Skill: RECALL 68) Under Web 2.0 information systems that deal with ________ still require some level of control. A) AdSense B) social networks C) pizza delivery D) financial or material assets E) placing data into a data warehouse Answer: D Diff: 2 Type: MC Page Ref: 298 Topic: Q3 Skill: RECALL 69) Advertisers can actually purchase search words from Google by using A) AdWords. B) SEO optimization. C) social networks. D) mashups. E) crowdsourcing. Answer: A Diff: 2 Type: MC Page Ref: 296 Topic: Q3 Skill: RECALL 70) Viral marketing is the term used when A) news is spread by repeated sending of a message from one person to others who repeat the cycle. B) users get tired of the message. C) an ad campaign increases sales less than 2%. D) an ad pops up when the user goes to a new web page. E) drug companies advertise cold medicine. Answer: A Diff: 2 Type: MC Page Ref: 295 Topic: Q3 Skill: RECALL
15 Copyright © 2016 Pearson Canada Inc.
71) Channel conflict, increased logistics expense, and showrooming are all possible drawbacks of A) ecommerce. B) social networking. C) licensed software. D) having a big store. E) price elasticity. Answer: A Diff: 2 Type: MC Page Ref: 286 Topic: Q1 Skill: RECALL 72) Business literature defines ________ types of capital. A) 2 B) 3 C) 4 D) 5 E) 6 Answer: B Diff: 1 Type: MC Page Ref: 290 Topic: Q2 Skill: RECALL 73) Compared to traditional processing, Web 2.0 processing is characterized by A) software as a product, extensive advertising and publishing. B) controlled, fixed interface, viral marketing and software as a free service. C) viral marketing, software as a free service, mashups encouraged. D) product value fixed, user participation, software as a product. E) publishing, organic interfaces, value increases with more users. Answer: C Diff: 3 Type: MC Page Ref: 293 Topic: Q3 Skill: RECALL 74) Compared to Web 2.0 processing, traditional processing is characterized by A) software as a product, extensive advertising and user participation. B) controlled, fixed interface, product value fixed, software as a product. C) viral marketing, software as a free service, mashups encouraged. D) product value fixed, user participation, software as a product. E) publishing, organic interfaces, value increases with more users. Answer: B Diff: 3 Type: MC Page Ref: 294 Topic: Q3 Skill: RECALL
16 Copyright © 2016 Pearson Canada Inc.
75) If a web sites value increases with the number of users and the amount of use, this is a Web 2.0 characteristic called A) the bigger is better effect. B) the mirage effect. C) the network effect. D) the Amazon effect. E) the Google effect. Answer: C Diff: 3 Type: MC Page Ref: 295 Topic: Q3 Skill: RECALL 76) ________ is the buying and selling of goods and services over public and private computer networks. Answer: Ecommerce Diff: 2 Type: SA Page Ref: 284 Topic: Q1 Skill: RECALL 77) ________ companies take title to the goods they sell. Answer: Merchant Diff: 2 Type: SA Page Ref: 285 Topic: Q1 Skill: RECALL 78) ________ companies do not take title to the goods they sell. Answer: Nonmerchant Diff: 2 Type: SA Page Ref: 285 Topic: Q1 Skill: RECALL 79) Online auctions such as eBay are the most common form of nonmerchant ________. Answer: commerce Diff: 2 Type: SA Page Ref: 286 Topic: Q1 Skill: RECALL 80) ________ is the elimination intermediaries between vendors and buyers. Answer: Disintermediation Diff: 2 Type: SA Page Ref: 286 Topic: Q1 Skill: RECALL
17 Copyright © 2016 Pearson Canada Inc.
81) When a user modifies Google's My Maps, this is a Web 2.0 feature called ________. Answer: Mashups Diff: 2 Type: SA Page Ref: 297 Topic: Q3 Skill: RECALL 82) Ecommerce can be used to determine price ________. Answer: elasticity Diff: 1 Type: SA Page Ref: 287 Topic: Q1 Skill: RECALL 83) ________ ecommerce concerns sales between a supplier and a retail customer or consumer. Answer: B2C Diff: 2 Type: SA Page Ref: 285 Topic: Q1 Skill: RECALL 84) An ecommerce nonmerchant that provides goods and services at a stated price and arranges for delivery is known as a ________. Answer: clearinghouse Diff: 2 Type: SA Page Ref: 286 Topic: Q1 Skill: RECALL 85) ________ occurs when a customer explores a product in a physical store then purchases the product on the internet. Answer: Showrooming Diff: 2 Type: SA Page Ref: 289 Topic: Q1 Skill: RECALL 86) If a manufacturer decides to sell online and the retailer loses business as a result, this is called ________ conflict. Answer: channel Diff: 1 Type: SA Page Ref: 288 Topic: Q1 Skill: RECALL 87) ________ make money by connecting buyers and sellers over the internet and taking a commission from the seller. Answer: Electronic exchanges Diff: 3 Type: SA Page Ref: 286 Topic: Q1 Skill: RECALL
18 Copyright © 2016 Pearson Canada Inc.
88) ________ ecommerce refers to sales between companies. Answer: B2B Diff: 2 Type: SA Page Ref: 285 Topic: Q1 Skill: RECALL 89) those that sell to ________. Answer: government Diff: 2 Type: SA Page Ref: 285 Topic: Q1 Skill: RECALL 90) The number of companies engaged in B2B and B2G commerce far exceeds those engaging in ________ commerce. Answer: B2C Diff: 3 Type: SA Page Ref: 285 Topic: Q1 Skill: RECALL 91) Online auctions are considered to be ________ ecommerce companies. Answer: nonmerchant Diff: 2 Type: SA Page Ref: 286 Topic: Q1 Skill: APPLIED 92) When a manufacturer decides to sell goods directly online, and "cuts out the middleman," the manufacturer will likely see an ________ in logistics and customer service costs. Answer: increase Diff: 2 Type: SA Page Ref: 288 Topic: Q1 Skill: APPLIED 93) ________ is the investment in social relations with the expectation of returns in the marketplace. Answer: Social capital Diff: 2 Type: SA Page Ref: 10 Topic: Q3 Skill: RECALL 94) ________ is the investment in human knowledge and skills for future profit. Answer: Human capital Diff: 2 Type: SA Page Ref: 290 Topic: Q2 Skill: RECALL
19 Copyright © 2016 Pearson Canada Inc.
95) ________ adds value by providing information, increasing opportunity to influence, increasing social credentials, and reinforcing professional image. Answer: Social capital Diff: 2 Type: SA Page Ref: 290 Topic: Q2 Skill: RECALL 96) ________ relationships contribute most to the growth of social networks. Answer: Weak Diff: 2 Type: SA Page Ref: 291 Topic: Q2 Skill: RECALL 97) Web 2.0 applications do not require an installation on the users' computers. This type of program is called a ________ client. Answer: thin Diff: 2 Type: SA Page Ref: 295 Topic: Q3 Skill: RECALL 98) More opportunities to influence and reinforced image and position are benefits of increased ________. Answer: social capital Diff: 3 Type: SA Page Ref: 291 Topic: Q2 Skill: APPLIED 99) Software as a free service is a characteristic of ________. Answer: Web 2.0 Diff: 2 Type: SA Page Ref: 294 Topic: Q3 Skill: RECALL 100) One friend sending a message to many friends who in turn send that message to more friends is a phenomenon known as ________. Answer: viral marketing Diff: 2 Type: SA Page Ref: 295 Topic: Q3 Skill: RECALL
20 Copyright © 2016 Pearson Canada Inc.
101) Explain the difference between merchant and nonmerchant companies and give an example of each. Answer: Merchant companies are defined as those that take title to the goods they sell: They buy goods and resell them. Example: Amazon.comNonmerchant companies are those that arrange for the purchase and sale of goods without ever owning or taking title to those goods. Example: eBay.com Diff: 3 Type: ES Page Ref: 285 Topic: Q1 Skill: APPLIED 102) List 5 issues facing manufacturers who wish to start selling directly to consumers via ecommerce. Answer: 1) Channel conflict 2) Price conflict 3) Logistics expense 4) Customer service expense 5) Taxation Diff: 3 Type: ES Page Ref: 288 Topic: Q1, Q2 Skill: RECALL 103) What is showrooming and what is the danger of showrooming to retailers? Answer: Showrooming occurs when a customer learns about or tries a product or service in the high cost bricks-and-mortar retail store while completing the sales transaction at the low-cost Internet sales channel of another retailer. The brick-and-mortar store is deprived of the profits from the sale. Diff: 2 Type: ES Page Ref: 289 Topic: Q1 Skill: RECALL 104) What is social capital and how does it add value for the individual? Answer: Social capital is the investment in social relations with the expectation of returns in the marketplace. Social capital adds value in four ways: 1) Information 2) Influence 3) Social credentials 4) Personal reinforcement Diff: 3 Type: ES Page Ref: 290 Topic: Q2 Skill: RECALL
21 Copyright © 2016 Pearson Canada Inc.
105) Using specific examples, describe how social networks add value to business. Answer: Social networks add familiarity and personal connections to a business or an organization though the addition of interpersonal interactions. A buyer who is evaluating a purchase can have a better perspective of a company by reviewing the LinkedIn entries of employees of that organization. Endorsements on social networks also increases a company’s perceived worth. Diff: 3 Type: ES Page Ref: 292 Topic: Q2 Skill: APPLIED 106) What specific benefits does IS and IT bring to social networking? Answer: Three considerations are (1) improved search capabilities, (2) reduction in the trade-off of richness and reach, and (3) network effects. Search capabilities are important to social networking because they enable us to quickly sort through large amounts of data and find the specific people or relationship that we are interested in. Technology is the ability to keep track of many more people and enhance personalization. Network effects can be seen where a network of 10 people is five times more valuable than a network of two people. As a network grows, the benefit or utility that each person adds tends to increase. Diff: 2 Type: ES Page Ref: 293 Topic: Q2 Skill: APPLIED 107) List 5 characteristics that differ between Web 2.0 to the "traditional" internet. Give your own definition of Web 2.0. Answer: 1) The integration and interaction of products and services, such as smartphones. 2) User-created content. 3) Social networking. 4) Location and context-based services. 5) Dynamic marketplaces. Web 2.0 is user interactive versus the “traditional Web” which was information content based. Diff: 3 Type: ES Page Ref: 294 Topic: Q3 Skill: APPLIED
22 Copyright © 2016 Pearson Canada Inc.
108) What is a mashup? Give an example of a mashup. Answer: Mashups result when the output from two or more websites is combined into a single user experience. Google’s My Maps is an excellent mashup example. Google publishes Google Maps and provides tools for users to make custom modifications to those maps. Thus, users mash the Google Maps product with their own knowledge. One user demonstrated the growth of gang activity to the local police by mapping new graffiti sites on Google Maps. Other users share their experiences or photos of hiking trips and other travel. Diff: 2 Type: ES Page Ref: 297 Topic: Q3 Skill: RECALL 109) Describe the term "network effects" and give two instances where network effects are important to business. Answer: Network effects is the growth of the worth of a connection due to the increase of number of new connections provided. One example is establishing a new connection to a person is a different department creates a connection to all the people that person knows. This increases the possible intellectual resources beyond that one new connection. Another example is the positive view provided to an organization that is perceived to have many connectors to other businesses. This organization will be seen as valuable possible resource to other organizations. Diff: 3 Type: ES Page Ref: 295 Topic: Q3 Skill: APPLIED 110) Give three examples of how Web 2.0 advertising is more beneficial to companies advertising on the internet compared to traditional internet advertising techniques. Answer: 1) Targeted advertising. 2) Up-to-date information. 3) Ability to capitalize on current trends. Diff: 3 Type: ES Page Ref: 297 Topic: Q3 Skill: APPLIED
23 Copyright © 2016 Pearson Canada Inc.
Experiencing MIS, Cdn. Ed., 4e (Kroenke) Chapter 10 Acquiring Information Systems Through Projects 1) Information technology project management (ITPM) is the collection of techniques and methods that project managers use to plan, coordinate, and complete IT projects. Answer: TRUE Diff: 1 Type: TF Page Ref: 312 Topic: Q2 Skill: RECALL 2) Business managers are most involved in SDLC during Phase 1 and Phase 2. Answer: TRUE Diff: 2 Type: TF Page Ref: 317 Topic: Q5 Skill: APPLIED 3) Systems development is primarily a technical task for programmers and hardware designers. Answer: FALSE Diff: 2 Type: TF Page Ref: 317 Topic: Q5 Skill: RECALL 4) In most cases, companies will purchase and customize off-the-shelf information systems. Answer: TRUE Diff: 2 Type: TF Page Ref: 320 Topic: Q1 Skill: RECALL 5) Studies indicate that information systems projects are often delivered late, over budget and do not fulfill all requirements. Answer: TRUE Diff: 2 Type: TF Page Ref: 315 Topic: Q4 Skill: RECALL 6) SDLC is described as a waterfall method, which makes the whole process relatively easy to go back and change a phase once you have begun the next phase. Answer: FALSE Diff: 3 Type: TF Page Ref: 317 Topic: Q6 Skill: RECALL
1 Copyright © 2016 Pearson Canada Inc.
7) Software developers are usually good at planning for vacations, sick days, and other things needed for the project besides writing software. Answer: FALSE Diff: 2 Type: TF Page Ref: 332 Topic: Q7 Skill: RECALL 8) Some systems are so tightly integrated that they cannot be installed in phases. Answer: TRUE Diff: 2 Type: TF Page Ref: 323 Topic: Q6 Skill: RECALL 9) Systems development is exclusively a technical task undertaken by programmers. Answer: FALSE Diff: 1 Type: TF Page Ref: 321 Topic: Q5 Skill: RECALL 10) The IT industry has over 50 years of experience acquiring and developing information systems, and over those years, methodologies have emerged that successfully deal with systems development. Answer: TRUE Diff: 1 Type: TF Page Ref: 317 Topic: Q5 Skill: RECALL 11) Many development methods exist, including rapid application development (RAD), objectoriented systems development (OOD), and extreme programming (XP). Answer: TRUE Diff: 1 Type: TF Page Ref: 317 Topic: Q5 Skill: RECALL 12) The IT industry developed the SDLC in the school of hard knocks. Answer: TRUE Diff: 1 Type: TF Page Ref: 316 Topic: Q5 Skill: RECALL 13) Feasibility has four dimensions: cost, schedule, technical, and organizational. Answer: TRUE Diff: 1 Type: TF Page Ref: 321 Topic: Q5 Skill: RECALL
2 Copyright © 2016 Pearson Canada Inc.
14) Commercial-off-the-shelf (COTS) software will never fit organizational requirements exactly. Answer: TRUE Diff: 2 Type: TF Page Ref: 321 Topic: Q6 Skill: RECALL 15) A test plan consists of sequences of actions that users will take when using the new system. Answer: TRUE Diff: 2 Type: TF Page Ref: 324 Topic: Q6 Skill: RECALL 16) "Buy it and customize it" is the most common method for acquiring software applications. Answer: TRUE Diff: 2 Type: TF Page Ref: 310 Topic: Q1 Skill: RECALL 17) Acquiring software is the same as acquiring information systems. Answer: FALSE Diff: 1 Type: TF Page Ref: 313 Topic: Q1 Skill: RECALL 18) A project is a temporary endeavour undertaken to create a unique product, service, or result. Answer: TRUE Diff: 2 Type: TF Page Ref: 313 Topic: Q2 Skill: RECALL 19) Organizations are looking for business professionals who have knowledge, skills, and personal qualities that will allow them to lead and support the effective and competitive use of information systems. Answer: TRUE Diff: 2 Type: TF Page Ref: 312 Topic: Q2 Skill: RECALL 20) Most findings state that the success rate of IT projects is 80%. Answer: FALSE Diff: 1 Type: TF Page Ref: 315 Topic: Q4 Skill: RECALL
3 Copyright © 2016 Pearson Canada Inc.
21) PMBOK was developed by the Project Management Institute. Answer: TRUE Diff: 1 Type: TF Page Ref: 313 Topic: Q2 Skill: RECALL 22) The SDLC can be described as a 5-phase process. Answer: TRUE Diff: 1 Type: TF Page Ref: 316 Topic: Q5 Skill: RECALL 23) Waterfall methods involve a sequence of non-repetitive tasks. Answer: TRUE Diff: 3 Type: TF Page Ref: 324 Topic: Q6 Skill: RECALL 24) In an ASP agreement, an organization contracts a vendor to rent applications on a fee for service basis. Answer: TRUE Diff: 2 Type: TF Page Ref: 327 Topic: Q7 Skill: RECALL 25) The ________ approach is the classic process used to develop information systems. A) extreme programming (XP) B) object-oriented systems development (OOD) C) rapid application development (RAD) D) systems development life cycle (SDLC) E) agile programming (AP) Answer: D Diff: 1 Type: MC Page Ref: 316 Topic: Q4 Skill: RECALL 26) The five phases of the SDLC approach after the initial system definition phase are A) requirements analysis, system definition, component design, implementation, and conversion. B) requirements analysis, implementation, design, and system upgrade. C) requirements analysis, system definition, component design, implementation, and system maintenance. D) requirements analysis, system definition, implementation, design and training. E) requirements analysis, system definition, implementation, component design, and training. Answer: C Diff: 2 Type: MC Page Ref: 316 Topic: Q5 Skill: RECALL 4 Copyright © 2016 Pearson Canada Inc.
27) The first step of the system definition stage of the SDLC is to A) talk to users about requirements. B) assess feasibility. C) identify team members. D) determine the schedule and budget for the project. E) define the goals and scope of the new system. Answer: E Diff: 2 Type: MC Page Ref: 317 Topic: Q5 Skill: RECALL 28) ________ refers to whether existing information technology is likely to be able to meet the needs of the new system. A) Cost feasibility B) Technical feasibility C) People feasibility D) Organizational feasibility E) Schedule feasibility Answer: B Diff: 1 Type: MC Page Ref: 316 Topic: Q5 Skill: RECALL 29) To determine if the proposed information system is justified economically, organizations must assess the A) technical feasibility. B) acceptance feasibility. C) schedule feasibility. D) cost feasibility. E) organizational feasibility. Answer: D Diff: 2 Type: MC Page Ref: 321 Topic: Q5 Skill: RECALL 30) ________ concerns whether the new information system will fit with the organization's culture, charter, or legal requirements. A) Technical feasibility B) Schedule feasibility C) Organizational feasibility D) People feasibility E) Cost feasibility Answer: C Diff: 1 Type: MC Page Ref: 321 Topic: Q5 Skill: RECALL 5 Copyright © 2016 Pearson Canada Inc.
31) If the proposed information system violated antitrust laws, this should be discovered in the ________ study of the system definition phase. A) technical feasibility B) regulatory feasibility C) schedule feasibility D) organizational feasibility E) cost feasibility Answer: D Diff: 2 Type: MC Page Ref: 321 Topic: Q5 Skill: APPLIED 32) The primary purpose of the ________ phase of the SDLC approach is to manage the scope of the IT project. A) system definition B) component design C) implementation D) system maintenance E) requirements analysis Answer: E Diff: 2 Type: MC Page Ref: 321 Topic: Q5 Skill: RECALL 33) Alternative system designs are evaluated against the system requirements in the ________ phase of the SDLC approach. A) requirements analysis B) system maintenance C) component design D) implementation E) system definition Answer: C Diff: 2 Type: MC Page Ref: 321 Topic: Q6 Skill: RECALL
6 Copyright © 2016 Pearson Canada Inc.
34) The initial system definition phase is followed by the ________ phase of the SDLC approach. A) implementation B) component design C) system definition D) requirements analysis E) system maintenance Answer: D Diff: 2 Type: MC Page Ref: 316 Topic: Q5 Skill: RECALL 35) The set of approved user requirements is the main input into the ________ phase of the SDLC approach. A) component design B) system definition C) requirements analysis D) implementation E) system maintenance Answer: A Diff: 2 Type: MC Page Ref: 316 Topic: Q5 Skill: RECALL 36) Teams of systems analysts and users determine the job descriptions and functions of people who will use the new system in the ________ phase of the SDLC. A) component design B) system definition C) requirements analysis D) implementation E) system maintenance Answer: A Diff: 2 Type: MC Page Ref: 321 Topic: Q6 Skill: RECALL 37) In a ________ installation, the new system runs alongside the old one until it has been tested and is fully operational. A) phased B) pilot C) plunge D) big-bang E) parallel Answer: E Diff: 2 Type: MC Page Ref: 324 Topic: Q6 Skill: RECALL 7 Copyright © 2016 Pearson Canada Inc.
38) A ________ installation is the riskiest because the old system is turned off and the new system is turned on. A) big-bang B) phased C) plunge D) pilot E) parallel Answer: C Diff: 2 Type: MC Page Ref: 323 Topic: Q6 Skill: RECALL 39) The last stage of testing is the ________ test, where future system users try out the new system. A) acceptance B) beta C) technical D) PQA E) gamma Answer: B Diff: 2 Type: MC Page Ref: 324 Topic: Q6 Skill: RECALL 40) If a company installs and tests only a portion of the new system, then repeatedly installs and tests portions of the new system until it is complete, this known as a ________ conversion. A) phased B) plunge C) parallel D) big-bang E) pilot Answer: A Diff: 2 Type: MC Page Ref: 324 Topic: Q6 Skill: RECALL 41) During the maintenance phase, IS personnel may create A) service packs, new releases and patches. B) plans for database design and related structures. C) component design outlines. D) ways to motivate employees. E) cost and schedule feasibility studies. Answer: A Diff: 2 Type: MC Page Ref: 324 Topic: Q6 Skill: RECALL 8 Copyright © 2016 Pearson Canada Inc.
42) The approach to system conversion whereby a new system that is to be used in more than one business is first implemented in a single unit so that it may be tested and debugged before implementing it in the other business units is called A) plunge. B) pilot. C) phased. D) parallel. E) big-bang. Answer: B Diff: 2 Type: MC Page Ref: 324 Topic: Q6 Skill: RECALL 43) Which of the following is the main activity of the maintenance phase of the SDLC? A) Programming interfaces B) Obtaining requirements C) Installing hardware D) Fixing problems or adapting to changes E) Training Answer: D Diff: 2 Type: MC Page Ref: 324 Topic: Q6 Skill: RECALL 44) Software vendors often bundle large bunches of fixes for low priority problems into groups called A) technical fixes. B) enterprise packs. C) patches. D) service patches. E) service packs. Answer: E Diff: 2 Type: MC Page Ref: 324 Topic: Q6 Skill: RECALL 45) Wallace and Keil identified ________ risks inherent in IT projects. A) 41 B) 52 C) 25 D) 5 E) 21 Answer: B Diff: 2 Type: MC Page Ref: 316 Topic: Q4 Skill: RECALL 9 Copyright © 2016 Pearson Canada Inc.
46) The single most important criterion for information systems success is A) to ensure that the system definition phase is done correctly. B) to avoid waterfall situations. C) for users to take ownership of their systems. D) to make sure the system is feasible. E) identify the capabilities of the off-the-shelf- software. Answer: C Diff: 2 Type: MC Page Ref: 315 Topic: Q5 Skill: RECALL 47) The main problem of the SDLC approach to systems development is the ________ nature of the process. This refers to the fact that each phase is meant to be completed and not repeated as the project moves on to the next phase. A) drawn out B) complex C) continuous D) waterfall E) stop-and-start Answer: D Diff: 3 Type: MC Page Ref: 324 Topic: Q6 Skill: RECALL 48) If the requirements analysis process becomes very long and drawn-out that the requirements document is obsolete and too complex, this can lead to the problem of A) unclear specifications. B) analysis paralysis. C) poor documentation. D) schedule conflict. E) lost updates. Answer: B Diff: 2 Type: MC Page Ref: 324 Topic: Q6 Skill: RECALL 49) Precise estimate costs for IT projects are difficult to develop because A) rapid application development (RAD) changes part way through the project. B) management thinks it is a negotiation between the business and IT. C) programmers look to increase earnings during the process. D) technology is continually changing. E) agile programming is not a fully developed system. Answer: D Diff: 2 Type: MC Page Ref: 315 Topic: Q4 Skill: RECALL 10 Copyright © 2016 Pearson Canada Inc.
50) System conversion methods include A) plunge, parallel, open, phased. B) parallel, open, phased, pilot. C) Synchronized, plunge, pilot, parallel. D) open, synchronized, phased, pilot. E) parallel, pilot, plunge, phased. Answer: E Diff: 2 Type: MC Page Ref: 324 Topic: Q6 Skill: RECALL 51) Senior management often justifies reducing the time schedules for system projects by A) saying that they want to reduce the budget. B) saying that the tighter schedules make workers work more efficiently. C) saying that they want to look good to their bosses. D) saying that the workers lack proper motivation. E) saying that angry employees work better. Answer: B Diff: 3 Type: MC Page Ref: 332 Topic: Q7 Skill: RECALL 52) ________ and business analysts are active throughout the systems development process and play a key role in moving the project through the systems development process. A) Systems analysts B) Programmers C) Developers D) CIO E) Mangers Answer: A Diff: 2 Type: MC Page Ref: 316 Topic: Q5 Skill: RECALL 53) Application service providers are companies that A) perform hardware updates. B) do employee background checks. C) give legal advice. D) provide programmers for in-house development. E) rent software to organizations. Answer: E Diff: 2 Type: MC Page Ref: 327 Topic: Q7 Skill: RECALL
11 Copyright © 2016 Pearson Canada Inc.
54) System development is a process for creating and ________ information systems. A) maintaining B) upgrading C) proposing D) programming E) brainstorming Answer: A Diff: 2 Type: MC Page Ref: 316 Topic: Q5 Skill: RECALL 55) The first risk associated with outsourcing IT projects is A) loss of control. B) increased quality. C) non-existent. D) increased costs. E) shorter delivery time. Answer: A Diff: 2 Type: MC Page Ref: 327 Topic: Q7 Skill: RECALL 56) Outsourcing IT services may lead to problems with A) vendor companies increasing prices and/or vendor mismanagement. B) determining a project budget. C) managing changes in technology. D) determining requirements. E) plunge installation. Answer: A Diff: 2 Type: MC Page Ref: 327 Topic: Q6 Skill: RECALL 57) Application Service Providers ________ software applications to other companies. A) rent B) outsource C) write outsource D) give E) award Answer: A Diff: 2 Type: MC Page Ref: 327 Topic: Q7 Skill: RECALL
12 Copyright © 2016 Pearson Canada Inc.
58) Acquiring software is A) a highly involved process. B) the same as acquiring new information systems. C) not the same as acquiring new information systems. D) a difficult process. E) accomplished by the outsourcing group. Answer: C Diff: 3 Type: MC Page Ref: 313 Topic: Q1 Skill: RECALL 59) Projects often begin with A) resources. B) a schedule. C) a set of goals or objectives. D) a sponsor. E) a project manager. Answer: C Diff: 2 Type: MC Page Ref: 312 Topic: Q2 Skill: RECALL 60) Information technology project management is a A) certification process to create a unique product, service, or result. B) collection of techniques and methods to plan, coordinate, and complete IT projects. C) project management knowledge bank. D) series of rules that regulate IT projects. E) set of best practices from managing technology IT projects. Answer: B Diff: 2 Type: MC Page Ref: 312 Topic: Q2 Skill: RECALL 61) Information Technology Project Management skills are central to the skills needed by organizations to ________ (to) an increasingly complex business environment. A) keep up B) manage C) adapt D) remain competitive in E) forge ahead in Answer: C Diff: 3 Type: MC Page Ref: 315 Topic: Q2 Skill: RECALL
13 Copyright © 2016 Pearson Canada Inc.
62) Organizations that understand the ________ before acquiring new applications are more likely to be successful in integrating software compared to organizations that think software equals systems. A) data B) risks C) costs D) business strategy E) threats Answer: C Diff: 2 Type: MC Page Ref: 311 Topic: Q1 Skill: RECALL 63) PMBOK first published in 1996 is now in its ________ edition. A) first B) second C) third D) fourth E) fifth Answer: D Diff: 1 Type: MC Page Ref: 311 Topic: Q2 Skill: RECALL 64) An example of an information technology project management (ITPM) tool is A) flow charts. B) testing charts. C) PERT charts. D) GIANT charts. E) CRM charts. Answer: C Diff: 1 Type: MC Page Ref: 312 Topic: Q2 Skill: RECALL 65) According to PMBOK there are ________ process groups in any project A) seven B) five C) four D) six E) eight Answer: B Diff: 2 Type: MC Page Ref: 312 Topic: Q2 Skill: RECALL
14 Copyright © 2016 Pearson Canada Inc.
66) The process groups in PMBOK are related to the notion of (a) A) extreme programming. B) agile programming. C) systems development lifecycle. D) prototyping. E) normalization. Answer: C Diff: 3 Type: MC Page Ref: 312 Topic: Q2 Skill: APPLIED 67) The process groups in PMBOK can be related to the ________ project management areas. A) 5 B) 6 C) 8 D) 9 E) 7 Answer: D Diff: 2 Type: MC Page Ref: 312 Topic: Q2 Skill: RECALL 68) Systems development often aims at a(n) ________ target. A) intermediary B) stationary C) moving D) progressive E) intermittent Answer: C Diff: 2 Type: MC Page Ref: 315 Topic: Q4 Skill: RECALL 69) Goals and scope identification usually occur (at the) ________ (of) a project A) during B) start C) beginning D) half way point E) end Answer: C Diff: 2 Type: MC Page Ref: 312 Topic: Q2 Skill: RECALL
15 Copyright © 2016 Pearson Canada Inc.
70) Employers are looking for individuals who have the knowledge and skills to ________ information technology. A) be comfortable with B) use C) develop D) innovate through E) avoid Answer: D Diff: 2 Type: MC Page Ref: 315 Topic: Q5 Skill: RECALL 71) The single most important criterion for information systems success is for users to take ________ of their systems. A) on the success B) on the use C) on the task of development D) on the growth E) ownership Answer: E Diff: 2 Type: MC Page Ref: 315 Topic: Q5 Skill: RECALL 72) ________ is the second phase of the SDLC. A) Requirement analysis B) Component design C) Maintenance D) implementation E) System definition Answer: A Diff: 1 Type: MC Page Ref: 316 Topic: Q5 Skill: RECALL 73) ________ is the fourth phase of the SDLC. A) Component design B) Requirement analysis C) Maintenance D) System definition E) Implementation Answer: E Diff: 1 Type: MC Page Ref: 316 Topic: Q5 Skill: RECALL
16 Copyright © 2016 Pearson Canada Inc.
74) The most common method for acquiring software applications is ________. Answer: customization Diff: 2 Type: SA Page Ref: 310 Topic: Q1 Skill: RECALL 75) "The time required to perform a task expands to the time available to do it" is A) an old proverb. B) Fubini's Law. C) Moore's Law. D) Jackson's Law. E) Parkinson's Law. Answer: E Diff: 1 Type: MC Page Ref: 323 Topic: Q7 Skill: RECALL 76) A critical aspect throughout the system development process is ________. Answer: user involvement Diff: 2 Type: SA Page Ref: 316 Topic: Q5 Skill: RECALL 77) In the SDLC, the first major task of the project team is to define the ________ of the project. Answer: scope and goals Diff: 2 Type: SA Page Ref: 316 Topic: Q5 Skill: RECALL 78) It may be necessary to create a(n) ________ if the new system will involve a new database or extensive changes to an existing database. Answer: data model Diff: 3 Type: SA Page Ref: 317 Topic: Q5 Skill: RECALL 79) Project feasibility has ________ dimensions. Answer: four Diff: 2 Type: SA Page Ref: 316 Topic: Q5 Skill: RECALL 80) The primary output of the system definition phase of the SDLC is the ________. Answer: project plan Diff: 3 Type: SA Page Ref: 315 Topic: Q5 Skill: RECALL 17 Copyright © 2016 Pearson Canada Inc.
81) Determining the network and operating systems that need to be used would be part of the ________ phase of the SDLC. Answer: component design Diff: 3 Type: SA Page Ref: 321 Topic: Q6 Skill: RECALL 82) An approved set of ________ is the main output of the requirements analysis phase of the SDLC. Answer: user requirements Diff: 2 Type: SA Page Ref: 316 Topic: Q6 Skill: RECALL 83) A(n) ________ describes the correct and incorrect actions that users will take when using the new system. Answer: test plan Diff: 3 Type: SA Page Ref: 322 Topic: Q6 Skill: RECALL 84) System ________ is the process of moving the business activity from the old system to the new system. Answer: conversion Diff: 2 Type: SA Page Ref: 322 Topic: Q6 Skill: RECALL 85) Companies like Oracle often release ________ versions of their software for users to test. Answer: beta Diff: 1 Type: SA Page Ref: 322 Topic: Q6 Skill: RECALL 86) In a(n) ________ installation, the organization implements the entire system on a limited portion of the business. Answer: pilot Diff: 1 Type: SA Page Ref: 322 Topic: Q6 Skill: RECALL
18 Copyright © 2016 Pearson Canada Inc.
87) The riskiest system conversion from a hardware and software failure point of view is a(n) ________ installation. Answer: plunge Diff: 2 Type: SA Page Ref: 323 Topic: Q6 Skill: RECALL 88) ________ consists of constructing the test plan with the advice and assistance of users. Answer: PQA Diff: 2 Type: SA Page Ref: 322 Topic: Q6 Skill: RECALL 89) Software developers write ________ to fix high priority system failures. Answer: patches Diff: 2 Type: SA Page Ref: 324 Topic: Q6 Skill: RECALL 90) Fixes for hundreds or even thousands of low-priority product problems are applied using a(n) ________. Answer: service pack Diff: 2 Type: SA Page Ref: 324 Topic: Q6 Skill: RECALL 91) The work of analysis and design is often completed by business analysts and ________. Answer: systems analysts Diff: 2 Type: SA Page Ref: 316 Topic: Q5 Skill: RECALL 92) The lack of a good model is an important ________ to recognize in IT projects. Answer: risk Diff: 2 Type: SA Page Ref: 315 Topic: Q4 Skill: RECALL 93) ________ is the first phase of the SDLC approach. Answer: System definition Diff: 2 Type: SA Page Ref: 316 Topic: Q5 Skill: RECALL
19 Copyright © 2016 Pearson Canada Inc.
94) "The time required to perform a task ________ to the time available to do it." Answer: expands Diff: 1 Type: SA Page Ref: 332 Topic: Q7 Skill: RECALL 95) ________ is the process of hiring another organization to perform a service. Answer: Outsourcing Diff: 1 Type: SA Page Ref: 325 Topic: Q7 Skill: RECALL 96) During the ________ phase of the SDLC process, developers construct, test, and install the components of the IS. Answer: implementation Diff: 2 Type: SA Page Ref: 321 Topic: Q6 Skill: RECALL 97) After outsourcing a service, lack of ________ within the company will make it difficult to bring the outsourced service back in-house. Answer: knowledge Diff: 2 Type: SA Page Ref: 327 Topic: Q7 Skill: RECALL 98) One style of conversion involves shutting down the old system Friday at close of business and starting up the new system Monday at open of business. This is called a ________ installation. Answer: plunge Diff: 3 Type: SA Page Ref: 323 Topic: Q6 Skill: APPLIED 99) With a ________ the old system and the new system are run side by side until the new system is tested and fully operational. Answer: parallel installation Diff: 2 Type: SA Page Ref: 322 Topic: Q6 Skill: RECALL 100) Buy it and ________ is the most common method for acquiring software applications. Answer: customize it Diff: 2 Type: SA Page Ref: 310 Topic: Q1 Skill: RECALL 20 Copyright © 2016 Pearson Canada Inc.
101) In the SDLC, acquisition begins with a ________ process that identifies the need for a new system. Answer: business planning Diff: 3 Type: SA Page Ref: 316 Topic: Q5 Skill: RECALL 102) What are the steps to acquire information system? Answer: 1) System definition 2) Requirements analysis 3) Component design 4) Implementation 5) System maintenance Diff: 2 Type: ES Page Ref: 316 Topic: Q5 Skill: RECALL 103) What is an IT project? Answer: Projects often begin with a scope, or an objective. Projects usually have a start and an end date and temporarily use resources (such as people, office space, and computers) to accomplish the project. Projects often tend to be unique in that they do not happen over and over again but happen only once. Perhaps most importantly, the objective of the project is to accomplish something new, so projects often represent change in an organization. Diff: 2 Type: ES Page Ref: 312 Topic: Q3 Skill: RECALL 104) What are three areas that affect IT project risk? Answer: First it shows that IT project performance has to be evaluated on not only whether the project was on budget and on time (project process performance), but also whether the expected benefits from the project were realized (project product performance). In addition, the model shows two pathways that the authors describe as the "forces of evil" and the "forces of good" in IT projects. Diff: 3 Type: ES Page Ref: 315 Topic: Q4 Skill: RECALL
21 Copyright © 2016 Pearson Canada Inc.
105) What is ITPM? Answer: Information technology project management (ITPM) is the collection of techniques and methods that project managers use to plan, coordinate, and complete IT projects. The tools of ITPM are basically the same tools used in any project management. These tools include planning tools such as work breakdown structures, budgeting methods, graphical scheduling methods such as PERT (Program Evaluation Review Technique) and Gantt charts, risk management techniques, communication planning, and high-tech team development. Diff: 2 Type: ES Page Ref: 312 Topic: Q2 Skill: RECALL 106) Why are project management skills important nowadays? Answer: The business environment continues to change rapidly. A company must be able to respond and adapt to these changes. Project management skills allow the individual to orchestrate and successfully complete these changes. Diff: 2 Type: ES Page Ref: 313 Topic: Q2 Skill: RECALL 107) What are the phases of the SDLC? When is it good to use the SDLC and when is it NOT appropriate? Answer: In the system definition phase, a team will define the new system, assess its feasibility, and begin planning the project. In the requirements analysis phase the specific features and functions of the new system will be determined. Next, each of the five components of the new IS will be designed. The implementation phase is where the new system is built, tested, and conversion from the old to the new occurs. The final phase is the maintenance phase where bugs are fixed and enhancements are made. The SDLC approach is recommended if the system is complex and consists of many modules, because extra care must be applied in documenting requirements and the manner in which components will be integrated, to ensure smooth and successful development. Diff: 3 Type: ES Page Ref: 315 Topic: Q5 Skill: APPLIED
22 Copyright © 2016 Pearson Canada Inc.
108) Why is the system definition phase the most important? Why is this phase so difficult to get right? Answer: It is the most important because if the requirements are wrong, the system will be wrong and it will be difficult to correct the system later in the process. It is hard to get right because there are so many competing ideas about what the new system should do. Analysts must interview many users who may not be able to communicate effectively about what they think the new system should be like. Users are usually focused on the tasks they are currently doing at the time of the interview with little thought for tasks at the other times of the quarter. If it is a long project, the requirements may be obsolete and be out of date by the time it comes to implement them. Requirements also tend to focus on hardware and software and forget about the procedures and impact on people. Diff: 3 Type: ES Page Ref: 315 Topic: Q5 Skill: APPLIED 109) What are the different system conversion strategies and when are they appropriate? Answer: There are four different types of system conversion strategies. These include the system pilot, the phased approach, a parallel conversion, and the plunge conversion. In the pilot approach, the organization chooses one department or business unit in which to implement and test the entire system. This reduces the risk by limiting exposure while giving a thorough testing of the system under actual loads and situations. The phased conversion is a way of installing pieces of the new system across the whole organization. Some systems such as ERP and CRM don't lend themselves to this piecemeal approach. The parallel approach is the most secure because both the new and the old system will be run at the same time until the new system is fully tested and debugged. This is quite expensive since the organization will have to bear the costs of running two entire systems, but a good option when security needs are high. The plunge method is the riskiest and is sometimes called the "cold turkey" approach. The old system is turned off and the new one is turned on. This method should only used in the most crucial systems where the old system is totally insufficient and ready to crash at any moment. Diff: 3 Type: ES Page Ref: 322 Topic: Q6 Skill: APPLIED
23 Copyright © 2016 Pearson Canada Inc.
110) What are the risks of outsourcing IT systems? Answer: One risk is the possibility of loss of control over the service. Outsourcing puts the vendor in the driver’s seat. In addition, the outsource vendor may change its pricing strategy over time. Initially, an organization obtains a competitive bid from several outsource vendors. However, as the winning vendor learns more about the business and as relationships develop between the organization’s employees and those of the vendor, it becomes difficult for other firms to compete for subsequent contracts. The vendor becomes the de facto sole source and, with little competitive pressure, may increase its prices. Another problem is that an organization can find itself paying for another organization’s mismanagement, with little recourse. Another risk concerns ending the agreement. There is no easy exit. Diff: 3 Type: ES Page Ref: 324 Topic: Q7 Skill: APPLIED 111) In the opinion of many system developers, both the project manager and the senior management have a "fantasy world" view of project schedules. Why is this and what can be done to alleviate it? Answer: There are many pitfalls to estimating project schedules. On the project developer's end, many software developers are too optimistic and try to schedule projects as if everything will go as planned, which seldom happens. Often they do not schedule time for vacations, sick days, and learning new technologies needed for the project. Even if they come up with a realistic schedule, upper management often reduces the schedule, thinking that a tighter time frame will motivate employees to work more efficiently. If managers have experienced delays in the past, they often mentally add a month or so to the official schedule. As a result, no one really believes the schedule as officially posted. Diff: 3 Type: ES Page Ref: 332 Topic: Q7 Skill: APPLIED 112) Why is it so difficult to estimate the costs of system development? Answer: It is hard to estimate the costs of some projects because they may involve aspects that have never been tried before and they may involve more risk. Project development is highly knowledge-intensive. If one key person leaves the job or is unable to perform, the project schedule may become longer. If user requirements are not specified accurately, users may find that the proposed system doesn't solve their problems. So they will need to make lots of changes later in the project, which will increase the cost. They will most likely try to make the vendor pay for these extras. Diff: 3 Type: ES Page Ref: 315 Topic: Q4 Skill: APPLIED
24 Copyright © 2016 Pearson Canada Inc.
Experiencing MIS, Cdn. Ed., 4e (Kroenke) Chapter 11 Structure, Governance, and Ethics 1) Competitive strategy is supported through activities in the value chain, which consist of collection of business processes supported by information systems. Answer: TRUE Diff: 2 Type: TF Page Ref: 351 Topic: Q3 Skill: RECALL 2) Competitive strategy is supported by operational plans. Answer: FALSE Diff: 2 Type: TF Page Ref: 351 Topic: Q3 Skill: APPLIED 3) The triple bottom line for organizations includes measuring profitability, social performance and employee satisfaction. Answer: FALSE Diff: 3 Type: TF Page Ref: 360 Topic: Q8 Skill: RECALL 4) The Zachman framework describes competitive forces in an industry. Answer: FALSE Diff: 2 Type: TF Page Ref: 352 Topic: Q3 Skill: RECALL 5) John Zachman developed the Zachman framework while he worked for IBM. Answer: TRUE Diff: 1 Type: TF Page Ref: 352 Topic: Q3 Skill: RECALL 6) The Zachman framework divides systems into two dimensions: one is based on six reasons for communication; the other is based on stakeholder groups. Answer: TRUE Diff: 2 Type: TF Page Ref: 352 Topic: Q3 Skill: RECALL
1 Copyright © 2016 Pearson Canada Inc.
7) The matching of organizational objectives with IT architecture takes advantage of IT capabilities as they develop. Answer: TRUE Diff: 3 Type: TF Page Ref: 353 Topic: Q4 Skill: RECALL 8) Alignment is the matching of business objectives with IT architecture. Answer: TRUE Diff: 1 Type: TF Page Ref: 353 Topic: Q4 Skill: RECALL 9) Bill 198 is commonly known as Budget Measures Act. Answer: TRUE Diff: 1 Type: TF Page Ref: 355 Topic: Q5 Skill: RECALL 10) Bill 198 is commonly known as the Sarbanes-Oxley Act. Answer: FALSE Diff: 1 Type: TF Page Ref: 355 Topic: Q5 Skill: RECALL 11) The Certified Information Systems Auditor (CISA) certification is recognized globally and has been earned by more than 90 000 professionals. Answer: TRUE Diff: 2 Type: TF Page Ref: 356 Topic: Q6 Skill: RECALL 12) The purpose of an information systems audit is to verify organizations' information systems policies and procedures. Answer: TRUE Diff: 2 Type: TF Page Ref: 356 Topic: Q6 Skill: RECALL 13) An IT architecture is like a plan for a city that lays out the street network. Answer: TRUE Diff: 2 Type: TF Page Ref: 351 Topic: Q3 Skill: RECALL
2 Copyright © 2016 Pearson Canada Inc.
14) Green IT practices include using the "sleep" mode of your computer, recycling of computers, and buying energy-efficient electronics. Answer: TRUE Diff: 2 Type: TF Page Ref: 360 Topic: Q8 Skill: APPLIED 15) For business organizations, governance is often designed to work toward the development of consistent, cohesive management policies and verifiable internal processes. Answer: TRUE Diff: 2 Type: TF Page Ref: 354 Topic: Q5 Skill: RECALL 16) Effectively managing information systems to support business objectives is an easy process. Answer: FALSE Diff: 1 Type: TF Page Ref: 351 Topic: Q3 Skill: RECALL 17) An enterprise architect's job is to plan and manage an organization's information systems. Answer: FALSE Diff: 2 Type: TF Page Ref: 349 Topic: Q3 Skill: RECALL 18) IT architecture has many standards. Answer: FALSE Diff: 1 Type: TF Page Ref: 352 Topic: Q3 Skill: RECALL 19) Wal-Mart spends more that the industry average on information technology. Answer: TRUE Diff: 2 Type: TF Page Ref: 353 Topic: Q4 Skill: RECALL 20) Supporting business objectives with appropriate IT investments is a critical part of IT management. Answer: TRUE Diff: 2 Type: TF Page Ref: 353 Topic: Q4 Skill: RECALL
3 Copyright © 2016 Pearson Canada Inc.
21) The need to report and disclose IS operational information will require all employees to become familiar with the issues facing IT management. Answer: TRUE Diff: 2 Type: TF Page Ref: 357 Topic: Q6 Skill: RECALL 22) E-cycling is one of the most important issues in green IT. Answer: TRUE Diff: 1 Type: TF Page Ref: 360 Topic: Q8 Skill: RECALL 23) Green IT means using information technology resources to better support the triple bottom line. Answer: TRUE Diff: 1 Type: TF Page Ref: 360 Topic: Q8 Skill: RECALL 24) Whistle blowers have shown us that it is quite acceptable to "do what your boss says" or "do what your system tells you" when it comes to ethical situations Answer: FALSE Diff: 2 Type: TF Page Ref: 359 Topic: Q7 Skill: RECALL 25) Information systems ethics is about A) people involved in the system. B) money involved in the system. C) software involved in the system. D) hardware involved in the system. E) PIPEDA. Answer: A Diff: 2 Type: MC Page Ref: 358 Topic: Q7 Skill: RECALL
4 Copyright © 2016 Pearson Canada Inc.
26) Which of the following are sets of ethical principles? A) Sarbanes-Oxley Act B) GAAP C) IFRS D) Canada's Charter of Rights and Freedoms E) The Budget Measures Act Answer: D Diff: 2 Type: MC Page Ref: 358 Topic: Q7 Skill: RECALL 27) The ongoing process which involves fitting IT architecture to business objective is called A) Sarbanes-Oxley Act. B) IT Strategy. C) alignment. D) Zachman Framework. E) governance. Answer: C Diff: 2 Type: MC Page Ref: 353 Topic: Q4 Skill: RECALL 28) The ________ department usually manages the computers, computer centres, networks, and communication media. A) IT B) finance C) operations D) legal E) CIO's Answer: C Diff: 2 Type: MC Page Ref: 345 Topic: Q1 Skill: RECALL 29) In an ideal world, the information systems that a company uses would support the ________ of the company. A) strategy B) information technology C) business ethics D) data collection E) online transaction processing Answer: A Diff: 2 Type: MC Page Ref: 351 Topic: Q3 Skill: RECALL
5 Copyright © 2016 Pearson Canada Inc.
30) The Canadian legislation that is similar to the Sarbanes-Oxley Act in the US is the A) Budget Measures Act. B) Financial Regulations Act. C) Business Measures Act. D) Business Code Act. E) CSox Act. Answer: A Diff: 2 Type: MC Page Ref: 355 Topic: Q5 Skill: RECALL 31) The Zachman framework divides systems into two dimensions: one is based on reasons for communication and the other is based on ________. Answer: stakeholder groups Diff: 1 Type: SA Page Ref: 352 Topic: Q3 Skill: RECALL 32) Which of the following are in the stakeholder groups listed in the Zachman framework? A) Owner, planner, designer, government, worker B) Worker, government, designer, planner, owner C) Designer, the public, planner, owner, worker D) Planner, government, shareholder, worker, designer E) Shareholder, planner, designer, builder, worker Answer: E Diff: 3 Type: MC Page Ref: 352 Topic: Q3 Skill: APPLIED 33) Sarbanes-Oxley and Bill 198 apply to A) COBIT. B) computer based information systems. C) income taxes. D) publicly traded companies. E) privately held Canadian corporations. Answer: D Diff: 2 Type: MC Page Ref: 355 Topic: Q5 Skill: RECALL
6 Copyright © 2016 Pearson Canada Inc.
34) Under Bill 198 both management and the ________ face criminal liability if internal controls are defective. A) planner B) designer C) employees D) external auditor E) president Answer: D Diff: 2 Type: MC Page Ref: 355 Topic: Q5 Skill: APPLIED 35) Which of the following is the most important indicator of alignment? A) Return on investment in IT B) Investment level in IT C) Communication among IT executives D) Communication between IT and business executives E) Funding of IT Answer: D Diff: 2 Type: MC Page Ref: 354 Topic: Q4 Skill: RECALL 36) The term ________ suggests some committee or political party has the ability to decide on expectations for performance, to authorize appropriate resources and power to meet expectation, and perhaps eventually to verify whether expectation have been met. A) architecture B) alignment C) governance D) process redesign E) management Answer: C Diff: 2 Type: MC Page Ref: 354 Topic: Q5 Skill: RECALL 37) The focus of an ________ is placed on the information resources that are used to collect, store, process, and retrieve information. A) security audit B) information systems audit C) external audit D) information technology audit E) internal audit Answer: B Diff: 2 Type: MC Page Ref: 356 Topic: Q6 Skill: RECALL 7 Copyright © 2016 Pearson Canada Inc.
38) Most jobs in the ICT industry require a mix of ________ and technical skills. A) selling B) programming C) financial D) legal E) interpersonal Answer: E Diff: 1 Type: MC Page Ref: 348 Topic: Q2 Skill: RECALL 39) The ________ certification is recognized globally and has been earned by more than 90 000 professionals. Members have job titles like is auditor, consultant, IS security professional, regulator, chief information officer, and internal auditor. A) Certified Systems Auditor (CSA) B) COBIT Auditor C) Certified Auditor (CA) D) Systems Auditor (SA) E) Certified Information Systems Auditor (CISA) Answer: E Diff: 3 Type: MC Page Ref: 356 Topic: Q6 Skill: RECALL 40) COBIT stands for A) Common Observations for Information Technology. B) Control Objectives for Information and Related Technology. C) Common Objectives for Business Information Technology. D) Control Objectives for Information Technology. E) Control Objects for Information Technology. Answer: B Diff: 2 Type: MC Topic: Q6 Skill: RECALL
Page Ref: 356
41) What is the relationship between an organization's competitive strategy and information system planning? Answer: An organization's competitive strategy is supported through activities in the value chain, which consists of a collection of business processes supported by information systems. That is, information systems should help organizations achieve that strategy. Diff: 3 Type: ES Page Ref: 351 Topic: Q3 Skill: RECALL
8 Copyright © 2016 Pearson Canada Inc.
42) The IT structure is like a A) city building. B) city plan. C) enterprise project. D) enterprise design. E) governmental design. Answer: B Diff: 3 Type: MC Page Ref: 351 Topic: Q3 Skill: APPLIED 43) What is information technology architecture? A) A set of photographs of all an organization's existing hardware B) A basic framework for all the computers, systems, and information management that support organizational services C) An IT plan that incorporates all an organization's existing IT investments D) A diagram of all an organization's servers E) A diagram of all an organization's networks Answer: B Diff: 2 Type: MC Page Ref: 351 Topic: Q3 Skill: RECALL 44) Alignment is not only about planning and building frameworks, but also about A) effectiveness in productivity. B) effectiveness in communication. C) efficiency in productivity. D) effectiveness in governance. E) efficiency in computing. Answer: B Diff: 2 Type: MC Page Ref: 354 Topic: Q4 Skill: APPLIED 45) The function of COBIT is to A) provide a framework for SDLC. B) enforce the law on corporate IT governance. C) lobbying on behalf of the IT industry. D) help organizations get the best from their IT investments. E) draft legislation. Answer: D Diff: 2 Type: MC Page Ref: 356 Topic: Q6 Skill: RECALL
9 Copyright © 2016 Pearson Canada Inc.
46) What is the role of the ISACA? A) Providing a set of tools and guidelines for whistleblowers B) Enforcing the law on corporate IT governance C) Providing a framework for best IT practices D) Enforcing the control of IT standards E) Developing knowledge and standards relating to IT audits and IS governance Answer: E Diff: 3 Type: MC Page Ref: 356 Topic: Q6 Skill: RECALL 47) Why should business professionals care about IS governance? A) It is required by law. B) It increases job performance. C) It covers environmental issues. D) Actually, only the board of directors should care about IS governance. E) It enhances firm reputation. Answer: A Diff: 3 Type: MC Page Ref: 357 Topic: Q6 Skill: RECALL 48) Moving downward in the Zachman framework provides higher levels of A) outsourcing. B) feasibility. C) perspectives. D) detail. E) alignment. Answer: D Diff: 2 Type: MC Page Ref: 352 Topic: Q3 Skill: RECALL 49) Though it may seem obvious, one of the hardest things to do when planning how your organization will use information systems is to A) export applications to a Web platform. B) align IS with organizational strategy. C) outsource some of the functions. D) get quotes from vendors. E) develop the business strategy. Answer: B Diff: 3 Type: MC Page Ref: 353 Topic: Q4 Skill: APPLIED
10 Copyright © 2016 Pearson Canada Inc.
50) The triple bottom line includes A) energy efficiency, recycling, and hazardous materials measures. B) financial, IT, and HR measures. C) stock, social, and environmental performance. D) financial, social, and environmental performance. E) shareholder, financial, and social measures. Answer: D Diff: 2 Type: MC Page Ref: 360 Topic: Q8 Skill: RECALL 51) Part of Green IT means using IT to support (the) A) energy star programs. B) triple bottom line. C) people and the environment. D) environment. E) energy efficiency programs. Answer: B Diff: 3 Type: MC Page Ref: 360 Topic: Q8 Skill: APPLIED 52) If all computers sold in the USA where energy star rated, the energy savings per year would be A) equivalent to 4 million vehicles. B) $3 billion. C) $5 billion. D) equivalent to 3.5 million houses. E) $2 billion. Answer: E Diff: 2 Type: MC Page Ref: 360 Topic: Q8 Skill: RECALL 53) Companies involved in the ________ industry face government regulatory restrictions. A) energy star B) e-energy C) e-waste D) technology governance E) paper recycling Answer: C Diff: 2 Type: MC Page Ref: 360 Topic: Q8 Skill: RECALL
11 Copyright © 2016 Pearson Canada Inc.
54) E-cycling should be considered in a company's IS ________ procedures. A) ethics B) buying C) alignment D) auditing E) planning Answer: D Diff: 3 Type: MC Page Ref: 360 Topic: Q8 Skill: APPLIED 55) EPEAT is a tool based on ________ criteria that measure a product's efficiency and sustainability attributes. A) 27 B) 30 C) 24 D) 25 E) 28 Answer: E Diff: 2 Type: MC Page Ref: 360 Topic: Q8 Skill: RECALL 56) If described in one word, IS ethics are about understanding our A) thoughts. B) thinking. C) wishing. D) culture. E) choices. Answer: E Diff: 2 Type: MC Page Ref: 358 Topic: Q7 Skill: RECALL 57) In terms of ethics, advances in information technology bring about new ________ for an organization. A) choices B) understandings C) problems D) risks E) opportunities Answer: A Diff: 3 Type: MC Page Ref: 358 Topic: Q7 Skill: APPLIED
12 Copyright © 2016 Pearson Canada Inc.
58) Information systems audits focus on A) deficiencies in information systems reporting. B) hardware and software. C) how well information systems align with business strategies. D) the information resources used to collect, retrieve, store, and process information. E) financial and account records. Answer: D Diff: 3 Type: MC Page Ref: 356 Topic: Q6 Skill: RECALL 59) In Canada, ________ has an agreement with ISACA to recognize a designated specialist in information systems auditing. A) CASB B) CGA C) CICA D) CMA E) CSA Answer: C Diff: 1 Type: MC Page Ref: 356 Topic: Q6 Skill: RECALL 60) Graduating business students can be successful in the ICT industry, if they are A) keeping up to date with information systems knowledge. B) intimately familiar with the SOX Act. C) ignoring information systems. D) intimately familiar with the details of COBIT E) familiar with issues facing information technology and can communicate. Answer: E Diff: 3 Type: MC Page Ref: 348 Topic: Q2 Skill: APPLIED 61) One reason that governance is important is A) to ensure that an organization's internal processes can't be verified. B) to maintain the benefits of an organization's IT investments. C) to develop reporting structures and review processes. D) to develop inconsistent management policies. E) to ensure that an organization produces good results while working to avoid bad results. Answer: E Diff: 2 Type: MC Page Ref: 354 Topic: Q5 Skill: APPLIED
13 Copyright © 2016 Pearson Canada Inc.
62) One example of internal controls is A) leaving all financial decisions to the sole discretion of the CFO. B) having budgets that aren't reconciled against the plan. C) allowing a single individual to complete the payment cycle in a payment system. D) relying solely on a computerized accounting system to make payments. E) the separation of duties for authorizing and making payments. Answer: E Diff: 3 Type: MC Page Ref: 355 Topic: Q5 Skill: APPLIED 63) Successful companies find ways to share knowledge and ________ between the IT department and the business functions. A) frustrations B) information C) people D) data E) plans Answer: A Diff: 2 Type: MC Page Ref: 354 Topic: Q4 Skill: RECALL 64) The challenge in developing systems that effectively support business objectives include A) a required understanding of the business process. B) a required understanding of the business process and the technological architecture of underlying information systems. C) a required understanding of the business process and information management. D) a required understanding of the technological architecture of underlying information systems. E) a required understanding of information management. Answer: B Diff: 3 Type: MC Page Ref: 351 Topic: Q3 Skill: RECALL 65) In developing architecture a(n) ________ must consider things like organizational objectives, information flows, databases and supporting technology. A) CISA B) test engineer C) Zachman black belt D) CIO E) enterprise architect Answer: E Diff: 3 Type: MC Page Ref: 351 Topic: Q3 Skill: RECALL 14 Copyright © 2016 Pearson Canada Inc.
66) Wal-Mart's main strategy is A) to pursue a product differentiation strategy. B) to focus on being a low price retailer. C) to focus on being a "high tech" retailer. D) to focus on a specific niche market. E) to pursue a strategy that focuses on partnering with other retailers. Answer: B Diff: 2 Type: MC Page Ref: 353 Topic: Q4 Skill: RECALL 67) According to Reich and Benbasat (1996), effective alignment occurred in organizations that developed a climate of supporting A) the sharing of domain knowledge and common business practices. B) the sharing of domain knowledge. C) common business practices. D) information management innovation. E) common business practices and information management innovation. Answer: A Diff: 3 Type: MC Page Ref: 353 Topic: Q4 Skill: RECALL 68) IS governance is primarily associated with A) information management of an organization. B) legal compliance with the Budget Measures Act. C) Improving the benefits of an organization's IT investment in the long run. D) social and environmental performance of an organization. E) the duties of the CIO. Answer: C Diff: 2 Type: MC Page Ref: 354 Topic: Q5 Skill: RECALL 69) Bill 198 affects mainly A) production systems. B) operational information systems. C) databases. D) data warehouses. E) accounting information systems. Answer: E Diff: 2 Type: MC Page Ref: 355 Topic: Q5 Skill: RECALL
15 Copyright © 2016 Pearson Canada Inc.
70) IS governance in the future will require that all ________ have input into important IS decisions. A) shareholders B) stakeholders C) management personnel D) C-Suite members E) board members Answer: B Diff: 1 Type: MC Page Ref: 356 Topic: Q5 Skill: RECALL 71) ISACA has become a leader in A) IT alignment. B) financial and accounting audits. C) developing new information systems. D) IT audits and IT governance. E) IS architecture development. Answer: D Diff: 2 Type: MC Page Ref: 356 Topic: Q6 Skill: RECALL 72) A financial audit can be defined as an examination and verification of a company's ________ and accounting records by an accredited professional. Answer: financial Diff: 1 Type: SA Page Ref: 356 Topic: Q6 Skill: RECALL 73) The ________ framework is one of the most popular IT architecture frameworks. Answer: Zachman Diff: 1 Type: SA Page Ref: 352 Topic: Q3 Skill: RECALL 74) ________ is a plan for all the computers, systems, and information management in a firm. Answer: IT architecture Diff: 1 Type: SA Page Ref: 351 Topic: Q3 Skill: RECALL
16 Copyright © 2016 Pearson Canada Inc.
75) A model such as Porter's Five Forces can help to determine the ________ for an organization. Answer: competitive strategy Diff: 2 Type: SA Page Ref: 351 Topic: Q3 Skill: RECALL 76) Effectively managing information systems to support business objectives is a ________ process. Answer: difficult Diff: 3 Type: SA Page Ref: 351 Topic: Q3 Skill: RECALL 77) Stakeholder groups in the Zachman framework include ________, owner, designer, builder, implementer, and worker. Answer: planner Diff: 3 Type: SA Page Ref: 352 Topic: Q3 Skill: RECALL 78) A(n) ________ audit is analogous to a financial audit. Answer: information systems Diff: 3 Type: SA Page Ref: 356 Topic: Q6 Skill: RECALL 79) The development of a(n) ________ can be critical when organizations are considering significant change. Answer: enterprise architecture Diff: 3 Type: SA Page Ref: 352 Topic: Q3 Skill: RECALL 80) The first step in understanding how business objectives can be supported by information systems is by defining the ________. Answer: IS architecture Diff: 3 Type: SA Page Ref: 352 Topic: Q3 Skill: RECALL 81) A firm that matches its organizational objectives with its IT architecture is said to be in ________. Answer: alignment Diff: 3 Type: SA Page Ref: 353 Topic: Q4 Skill: RECALL 17 Copyright © 2016 Pearson Canada Inc.
82) To align organizational strategy with information systems, you need to match the IT ________ with organizational objectives. Answer: architecture Diff: 3 Type: SA Page Ref: 353 Topic: Q4 Skill: RECALL 83) Bill 198 is known as the ________. Answer: Budget Measure Act Diff: 1 Type: SA Page Ref: 355 Topic: Q5 Skill: RECALL 84) The SOX act and Bill 198 both require management to create ________ sufficient to produce reliable financial statements and to protect an organization's assets. Answer: internal controls Diff: 3 Type: SA Page Ref: 355 Topic: Q5 Skill: RECALL 85) An example of internal controls would be the ________ of duties and authorities. Answer: separation Diff: 3 Type: SA Page Ref: 355 Topic: Q5 Skill: RECALL 86) The goal of IS ________ is to improve the benefits of an organization's IT investments over time. Answer: governance Diff: 2 Type: SA Page Ref: 355 Topic: Q5 Skill: RECALL 87) IT can no longer appear to be a(n) ________ box to the organization's external stakeholders. Answer: black Diff: 3 Type: SA Page Ref: 355 Topic: Q5 Skill: RECALL 88) Situations created by companies like Enron and Worldcom where instrumental in the creation of the ________ Act in the USA. Answer: Sarbanes-Oxley Diff: 2 Type: SA Page Ref: 355 Topic: Q5 Skill: RECALL 18 Copyright © 2016 Pearson Canada Inc.
89) Companies adopt COBIT's framework in order to follow industry ________ practices. Answer: best Diff: 2 Type: SA Page Ref: 356 Topic: Q6 Skill: APPLIED 90) As a CIO, one of your primary responsibilities is to make sure that your information systems are ________ with your business objectives. Answer: aligned Diff: 3 Type: SA Page Ref: 346 Topic: Q1 Skill: APPLIED 91) Green IT allows an organization to improve its ________ line. Answer: triple bottom Diff: 2 Type: SA Page Ref: 360 Topic: Q8 Skill: RECALL 92) In many instances ________ is simply a common sense approach. Answer: green IT Diff: 2 Type: SA Page Ref: 360 Topic: Q8 Skill: RECALL 93) When you use the sleep mode on your computer, you provide a(n) ________ savings to your company. Answer: energy Diff: 2 Type: SA Page Ref: 360 Topic: Q8 Skill: RECALL 94) A Green IT plan should include a plan on how to ________ old electronics. Answer: e-cycle Diff: 1 Type: SA Page Ref: 360 Topic: Q8 Skill: RECALL 95) In general, laptops use ________ power than desktop computer. Answer: less Diff: 1 Type: SA Page Ref: 360 Topic: Q8 Skill: RECALL
19 Copyright © 2016 Pearson Canada Inc.
96) What is alignment? Answer: MIS researchers have suggested that alignment should be viewed as an ongoing process: fitting IT architecture to business objectives is a challenge that continually evolves. The alignment process works to take advantage of IT capabilities as they develop while at the same time maintaining a balance between business objectives and IT architecture. What is important to recognize is that what works for one organization as a balance may not work for another. Alignment depends on business goals, the organizational context, and the state of IT architecture in an organization. Diff: 2 Type: ES Page Ref: 353 Topic: Q4 Skill: RECALL 97) What is the Zachman Framework? Answer: The Zachman framework was conceived by John Zachman at IBM in the 1980s. The framework divides systems into two dimensions: one is based on six reasons for communication (what–data, how–function, where–network, who–people, when–time, why–motivation), the other is based on stakeholder groups (Planner, Owner, Designer, Builder, implementer, and Worker). The intersection of these two dimensions helps to provide a relatively holistic view of the enterprise. Diff: 2 Type: ES Page Ref: 352 Topic: Q3 Skill: RECALL 98) What is information systems governance? Answer: Governance suggests some committee or political party has the ability to decide on expectations for performance, to authorize appropriate resources and power to meet expectations, and perhaps eventually to verify whether expectations have been met. In publicly traded organizations, one purpose of governance is to ensure, on the behalf of shareholders of a firm, that an organization produces good results while working to avoid bad results. For business organizations, governance is often designed to work toward the development of consistent, cohesive management policies and verifiable internal processes. Managing at a corporate level often involves establishing the way in which boards oversee a corporation, and establishing the rules that apply to issues such as sourcing, privacy, security, and internal investments. The goal of IS governance is to improve the benefits of an organization's IT investment over time. Reporting structures and review processes can be established and can work over a period of time to improve quality, reduce service costs and delivery time, reduce IT risks, and better support business processes. Diff: 2 Type: ES Page Ref: 354 Topic: Q5 Skill: RECALL
20 Copyright © 2016 Pearson Canada Inc.
99) Why is information systems governance important? Answer: The increased need to report and disclose IS operational information will require employees at all levels of an organization to become more familiar with the issues facing information technology management. While this familiarity comes at a cost, the increased exposure to IT issues should improve the ability of organizations to use information technology more effectively and efficiently. An argument can be made that the result of increased reporting compliance should be improved alignment between organizational strategy and business objectives. Since compliance issues will remain for the foreseeable future, business students across all functions will improve from increased knowledge of IT issues. Diff: 3 Type: ES Page Ref: 354 Topic: Q5 Skill: APPLIED 100) What are Information System Ethics? Answer: It may seem as through there are few limits to the use of information technology and information systems to develop competitive advantage. But there are limits. For example, certain uses of IT may be against the law, and illegal behaviour has legal consequences. Another important limit for future business students to recognize is the limits placed on behaviour by ethics. Actions may not be illegal but they may be unethical. It is important to understand the difference. Diff: 3 Type: ES Page Ref: 357 Topic: Q7 Skill: RECALL 101) What are the three factors that make up the triple bottom line? Answer: 1) Financial performance 2) Social performance 3) Environmental performance Diff: 2 Type: ES Page Ref: 360 Topic: Q8 Skill: RECALL 102) How does government regulation of e-waste affect a company that uses technology? Answer: Government regulation of e-waste means that the disposal of technology is and will become more difficult than it has in the past. With these regulations in place companies using technology will need to plan not only for acquisition of technology but also for its disposal. Diff: 3 Type: ES Page Ref: 360 Topic: Q8 Skill: APPLIED
21 Copyright © 2016 Pearson Canada Inc.
103) What factors have brought IS governance and governance in general to the forefront of business planning? Answer: The action of companies like Enron and Worldcom along with their auditing firms in the late 1990s and early part of this century have brought corporate actions under the scrutiny of the government and the public in general. Legislation, criminal charges, and civil legal actions have made companies consider their actions more closely than ever before. Many organizations' boards of directors have mandated strong governance policies based on the fear of criminal and personal liability. Diff: 3 Type: ES Page Ref: 356 Topic: Q6 Skill: RECALL 104) If your company agrees to collaborate on a supply chain relationship with another firm. During the collaboration, you discover by mistake, they have given you access to all their inventory and sales data. You look at this and find that you can see the prices and quantities of products they are buying from all their other suppliers. This can give you an enormous advantage in competing for their business. What should you do? Answer: Many of the choices fall between unethical and illegal. One thing that you should keep in mind is that you want to establish a long-term relationship with this partner. Price is only one factor in influencing their decision to work with you. You could gather a little information here and there; enough that would enable you to know when to raise and lower your prices in order to beat out your competition. That you have unauthorized access even through their mistake could be construed as illegal or unethical at best. You should keep in mind that all systems like this will have an audit function. Once it is discovered the system has bugs in it, a good DBA can easily go in and uncover any unusual queries and data access (such as yours). So take the ethical and legal way from the beginning and prove to be an honest and trustworthy business partner from the very beginning. By revealing the security flaws in their system, it is likely that they will reward you with a closer and more profitable relationship in the long run. Diff: 3 Type: ES Page Ref: 357 Topic: Q7 Skill: APPLIED 105) What does the task of aligning business objectives with information systems entail? Answer: The main task is that of creating an information systems architecture that fully supports the business objectives of the organization. There is a need to make sure that business strategy, organizational strategy, and information strategy are balanced with one another and that each is supportive of the other. Diff: 3 Type: ES Page Ref: 353 Topic: Q4 Skill: RECALL
22 Copyright © 2016 Pearson Canada Inc.
Experiencing MIS, Cdn. Ed., 4e (Kroenke) Chapter 12 Managing Information Security and Privacy 1) Phishing is when someone sends an e-mail pretending to be a legitimate company and asking for confidential data, such as account numbers. Answer: TRUE Diff: 1 Type: TF Page Ref: 373 Topic: Q3 Skill: RECALL 2) Spoofing is a technique for intercepting computer communications. Answer: FALSE Diff: 1 Type: TF Page Ref: 373 Topic: Q3 Skill: RECALL 3) People who intentionally gain unauthorized access to computer systems are called hackers. Answer: TRUE Diff: 1 Type: TF Page Ref: 374 Topic: Q3 Skill: RECALL 4) Drive-by sniffers take computers with wireless connections through an area and search for unprotected wireless networks. Answer: TRUE Diff: 1 Type: TF Page Ref: 373 Topic: Q3 Skill: RECALL 5) Denial of service always occurs because of malicious attacks on the system. Answer: FALSE Diff: 2 Type: TF Page Ref: 374 Topic: Q3 Skill: RECALL 6) When a hacker floods a web server with millions of bogus service requests so that it cannot service legitimate requests, this is called a denial of service attack. Answer: TRUE Diff: 2 Type: TF Page Ref: 374 Topic: Q3 Skill: RECALL
1 Copyright © 2016 Pearson Canada Inc.
7) Any action, device, procedure, technique, or other measure that reduces a system's vulnerability to a threat is a safeguard. Answer: TRUE Diff: 1 Type: TF Page Ref: 375 Topic: Q3 Skill: RECALL 8) Despite warnings, users have a tendency to write their passwords on sticky notes next to the computer. Answer: TRUE Diff: 1 Type: TF Page Ref: 376 Topic: Q4 Skill: RECALL 9) Smart cards are convenient and easy to use since they don't require any PIN numbers for authentication. Answer: FALSE Diff: 2 Type: TF Page Ref: 376 Topic: Q4 Skill: RECALL 10) A retinal scan would be considered a biometric authentication technique. Answer: TRUE Diff: 2 Type: TF Page Ref: 376 Topic: Q4 Skill: RECALL 11) Biometric authentication has been around for some time, and because of weaknesses is not likely to see much usage in the future. Answer: FALSE Diff: 2 Type: TF Page Ref: 376 Topic: Q4 Skill: RECALL 12) Technical safeguards involve the hardware and software components of an information system. Answer: TRUE Diff: 2 Type: TF Page Ref: 375 Topic: Q4 Skill: RECALL 13) Malware protection is an example of a technical safeguard. Answer: TRUE Diff: 2 Type: TF Page Ref: 375 Topic: Q4 Skill: RECALL 2 Copyright © 2016 Pearson Canada Inc.
14) Encryption is one of several technical safeguards. Answer: TRUE Diff: 2 Type: TF Page Ref: 375 Topic: Q4 Skill: RECALL 15) Malware is used in denial of service attacks. Answer: FALSE Diff: 2 Type: TF Page Ref: 375 Topic: Q3 Skill: RECALL 16) Most anti-malware programs check e-mail attachments for malware code. Answer: TRUE Diff: 2 Type: TF Page Ref: 378 Topic: Q4 Skill: RECALL 17) Data safeguards are designed to protect computer networks. Answer: FALSE Diff: 2 Type: TF Page Ref: 378 Topic: Q5 Skill: RECALL 18) To protect against lost or sabotaged encryption keys, a trusted party should keep a copy of the key. Answer: TRUE Diff: 2 Type: TF Page Ref: 378 Topic: Q5 Skill: RECALL 19) Even if a potential new hire will not have access to sensitive data and systems, they should be extensively screened for security purposes. Answer: TRUE Diff: 2 Type: TF Page Ref: 380 Topic: Q6 Skill: RECALL 20) Care must be taken when terminating employees because they may take harmful and malicious actions. Answer: TRUE Diff: 1 Type: TF Page Ref: 380 Topic: Q6 Skill: RECALL
3 Copyright © 2016 Pearson Canada Inc.
21) Hardened web sites use special versions of the operating systems and functions that are not required by the application. Answer: TRUE Diff: 3 Type: TF Page Ref: 382 Topic: Q6 Skill: RECALL 22) Help desks have not been the source of many security problems in the past. Answer: FALSE Diff: 2 Type: TF Page Ref: 384 Topic: Q6 Skill: RECALL 23) If you ever receive notification that your password has been reset when you did not request a reset, immediately contact your IS department. Answer: TRUE Diff: 1 Type: TF Page Ref: 384 Topic: Q6 Skill: RECALL 24) The best safeguard against a natural disaster is to have a safe location. Answer: TRUE Diff: 2 Type: TF Page Ref: 387 Topic: Q7 Skill: RECALL 25) Following a disaster, hot sites provide office space, but customers themselves must come and provide and install the equipment needed to continue operations. Answer: FALSE Diff: 3 Type: TF Page Ref: 387 Topic: Q7 Skill: RECALL 26) Viruses and worms don't spread very quickly so it is not essential to move cautiously when one is discovered by someone in your organization. Answer: FALSE Diff: 1 Type: TF Page Ref: 388 Topic: Q8 Skill: RECALL 27) Backup and recovery, passwords, and encryption are human safeguards. Answer: FALSE Diff: 2 Type: TF Page Ref: 375 Topic: Q3 Skill: RECALL
4 Copyright © 2016 Pearson Canada Inc.
28) Bloggers have not yet had much of an impact on the main stream media. Answer: FALSE Diff: 2 Type: TF Page Ref: 395 Topic: Q6 Skill: RECALL 29) About ninety percent of all viruses are spread via A) spreadsheets. B) AOL. C) technology. D) network worms. E) email. Answer: E Diff: 1 Type: MC Page Ref: 377 Topic: Q4 Skill: RECALL 30) Since most organizations are protected by a(n) ________, it is not surprising that most viruses spread via e-mail. A) data dictionary B) antivirus program C) biometric authentication device D) firewall E) white-hat hacker Answer: D Diff: 3 Type: MC Page Ref: 378 Topic: Q4 Skill: RECALL 31) Be sure and purchase your antispyware program from a(n) ________ vendor, because some free programs in the past were actually malware programs in disguise. A) reasonable B) reputable C) entrepreneurial D) inexpensive E) illegitimate Answer: B Diff: 2 Type: MC Page Ref: 377 Topic: Q4 Skill: RECALL
5 Copyright © 2016 Pearson Canada Inc.
32) Users should scan their computers with anti-malware programs at least A) once a year. B) biannually. C) once a week. D) daily. E) once a month. Answer: C Diff: 2 Type: MC Page Ref: 377 Topic: Q4 Skill: RECALL 33) ________, which are the patterns that exist in malware code, should be downloaded and updated frequently. A) Software updates B) Service packs C) Malware patterns D) Network patches E) Malware definitions Answer: E Diff: 2 Type: MC Page Ref: 377 Topic: Q4 Skill: RECALL 34) It is possible for some malware to install itself on your computer by you doing nothing more than opening a(n) A) web page. B) file. C) e-mail D) computer. E) account. Answer: A Diff: 2 Type: MC Page Ref: 378 Topic: Q4 Skill: RECALL 35) Organizations should protect sensitive data by storing it in ________ form. A) compressed B) secure C) digital D) encrypted E) standardized Answer: D Diff: 2 Type: MC Page Ref: 378 Topic: Q5 Skill: RECALL
6 Copyright © 2016 Pearson Canada Inc.
36) Because encryption keys can be lost or destroyed, a copy of the key should be stored with a trusted third party called a(n) A) key account. B) white-hat hacker. C) key escrow. D) authentication certifier. E) control account. Answer: C Diff: 3 Type: MC Page Ref: 378 Topic: Q5 Skill: RECALL 37) The purpose of a(n) ________ is to protect databases and other organizational data. A) data warehouse B) data security group C) operations group D) data safeguard E) steering committee Answer: D Diff: 2 Type: MC Page Ref: 378 Topic: Q5 Skill: RECALL 38) Organizations should store at least some of the ________ of the database contents off the premises, possibly in a remote location. A) backups B) company information C) malware definitions D) smaller parts Answer: A Diff: 2 Type: MC Page Ref: 379 Topic: Q5 Skill: RECALL 39) ________ to (for) the physical computers that run the DBMS and all devices that store database data should be carefully controlled. A) References B) Access C) Design plans D) Connections E) Documentation Answer: B Diff: 2 Type: MC Page Ref: 379 Topic: Q5 Skill: RECALL
7 Copyright © 2016 Pearson Canada Inc.
40) ________ safeguards involve the people and procedure components of information systems. A) Human B) Data C) Technical D) Malware E) Firewall Answer: A Diff: 2 Type: MC Page Ref: 379 Topic: Q6 Skill: RECALL 41) In order to prioritize their activities and protect an organization from possible risk and loss, security personnel must document the position ________ of all employees. A) riskiness B) data access C) controls D) level E) sensitivity Answer: E Diff: 3 Type: MC Page Ref: 379 Topic: Q6 Skill: RECALL 42) ________ considerations should be part of the hiring process. A) Weight B) Position C) Gender D) Age E) Security Answer: E Diff: 1 Type: MC Page Ref: 380 Topic: Q6 Skill: RECALL 43) A company should clearly define the security ________ for each position. A) accounts B) levels C) responsibilities D) backups E) safeguards Answer: C Diff: 2 Type: MC Page Ref: 380 Topic: Q6 Skill: RECALL
8 Copyright © 2016 Pearson Canada Inc.
44) When an employee is terminated, system administrators should receive advance notice so they can A) plan for security changes. B) get the employees computer. C) remove accounts and passwords. D) fight over the person's office. E) plan a termination party. Answer: C Diff: 2 Type: MC Page Ref: 381 Topic: Q6 Skill: RECALL 45) The best way to safeguard a web site from public users is to ________ the web site against an attack. A) secure B) prepare C) defend D) harden E) update Answer: D Diff: 3 Type: MC Page Ref: 382 Topic: Q6 Skill: RECALL 46) Some of the biggest security threats are from ________ employees. A) disinterested B) disgruntled C) self-motivated D) happy E) contrarian Answer: B Diff: 1 Type: MC Page Ref: 378 Topic: Q5 Skill: RECALL 47) The existence of ________ user accounts is a serious security threat. A) unused B) network C) meta D) employee E) modified Answer: A Diff: 2 Type: MC Page Ref: 382 Topic: Q6 Skill: RECALL
9 Copyright © 2016 Pearson Canada Inc.
48) ________ are the primary means of authentication. A) Encrypted keys B) Network administrators C) Passwords D) Single sign-on E) Facial scans Answer: C Diff: 1 Type: MC Page Ref: 378 Topic: Q5 Skill: RECALL 49) Because they kept giving out passwords to users who claimed to have forgotten them, ________ were a serious security risk in the organization. A) interns B) help desks C) data administrators D) executives E) developers Answer: B Diff: 2 Type: MC Page Ref: 384 Topic: Q6 Skill: RECALL 50) Firewalls produce ________ of their activities, which include lists of all dropped packets, and attempts to gain unauthorized access. A) programs B) logs C) graphics D) calls E) accounts Answer: B Diff: 3 Type: MC Page Ref: 385 Topic: Q6 Skill: RECALL 51) Computing infrastructure should be located in ________ buildings designed to house expensive and critical equipment. A) central B) air-conditioned C) high-tech D) fire-resistant E) easily accessible Answer: D Diff: 2 Type: MC Page Ref: 387 Topic: Q7 Skill: RECALL 10 Copyright © 2016 Pearson Canada Inc.
52) A ________ is a remote processing centre run by a commercial disaster-recovery service that provides all the equipment needed to continue operations after a disaster. A) web farm B) development site C) cold site D) hot site E) server farm Answer: D Diff: 2 Type: MC Page Ref: 387 Topic: Q7 Skill: RECALL 53) When an employee notices a virus on his machine, the ________ plan should specify what to do. A) antivirus B) security C) technology D) company E) incident response Answer: E Diff: 3 Type: MC Page Ref: 388 Topic: Q7 Skill: RECALL 54) A(n) ________ is someone who pretends to be a legitimate company and sends e-mail requesting confidential data. A) hacker B) phisher C) spoofer D) hawker E) employee Answer: B Diff: 2 Type: MC Page Ref: 373 Topic: Q3 Skill: RECALL 55) ________ is a technique for intercepting computer communications. A) Spoofing B) Hacking C) Pretexting D) Phishing E) Sniffing Answer: E Diff: 3 Type: MC Page Ref: 373 Topic: Q3 Skill: RECALL 11 Copyright © 2016 Pearson Canada Inc.
56) In order to intercept communications on ________ networks, drive-by sniffers simply drive or walk around with computers with wireless connections. A) commercial B) LAN C) wireless D) ISP E) WAN Answer: C Diff: 3 Type: MC Page Ref: 373 Topic: Q3 Skill: RECALL 57) ________ is one of the fastest-growing crimes in Canada because it is relatively easy to do. A) phishing B) Hacking C) Spoofing D) PIPEDA E) Identity theft Answer: E Diff: 2 Type: MC Page Ref: 370 Topic: Q1 Skill: RECALL 58) A hacker can launch a denial of service attack against a web server by ________ it with millions of bogus service requests. A) programming B) flooding C) denying D) hacking E) probing Answer: B Diff: 2 Type: MC Page Ref: 374 Topic: Q3 Skill: RECALL 59) Passwords have weaknesses because users often choose simple passwords, which ________ systems can easily guess. A) security B) intrusion C) antivirus D) malware E) biometric Answer: B Diff: 3 Type: MC Page Ref: 376 Topic: Q4 Skill: RECALL 12 Copyright © 2016 Pearson Canada Inc.
60) A(n) ________ card has a microchip on it that is loaded with identifying data. A) smart B) debit C) credit D) ATM E) identity Answer: A Diff: 3 Type: MC Page Ref: 376 Topic: Q4 Skill: RECALL 61) Users often resist biometric identification because they feel it is A) expensive. B) ineffective. C) too technical. D) invasive. E) hard to use. Answer: D Diff: 2 Type: MC Page Ref: 376 Topic: Q4 Skill: RECALL 62) The web site ________ lists simple things to do to lower your risk of identity theft. A) www.wordpress.com B) www.google.ca C) www.safecanada.com D) www.priv.gc.da E) www.equifax.com Answer: C Diff: 2 Type: MC Page Ref: 371 Topic: Q2 Skill: RECALL 63) PIPEDA stands for A) Personal Information Protection and Electronic Disclosure Act. B) Personal Information Protection and Effective Disclosures Act. C) Personal Information Protection and Electronic Disclosures Act. D) Personal Information Protection and Electronic Documents Act. E) Personal Information Protection and Electronic Disclosure Actions. Answer: D Diff: 2 Type: MC Page Ref: 373 Topic: Q3 Skill: RECALL
13 Copyright © 2016 Pearson Canada Inc.
64) PIPEDA gives individuals the right to know why an organization is ________ their personal information. A) collecting and disclosing B) collecting and changing C) collecting, using or disclosing D) changing E) using and disclosing Answer: C Diff: 3 Type: MC Page Ref: 373 Topic: Q3 Skill: RECALL 65) According to PIPEDA every organization needs to identify anyone in the organization who is responsible for ________ personal information. A) using B) safeguarding C) disclosing D) collecting E) maintaining Answer: B Diff: 3 Type: MC Page Ref: 373 Topic: Q3 Skill: APPLIED 66) The popularity and efficacy of search engines like Google have created a source of A) entertainment. B) inadvertent information disclosure. C) phishing. D) pretexting. E) sniffing. Answer: B Diff: 2 Type: MC Page Ref: 373 Topic: Q3 Skill: RECALL 67) If you suspect an organization has inappropriately disclosed your personal information to a 3rd party, you can lodge a complaint with A) Industry Canada. B) RCMP. C) the local police. D) Revenue Canada. E) Office of the Privacy Commissioner of Canada. Answer: E Diff: 2 Type: MC Page Ref: 371 Topic: Q2 Skill: RECALL 14 Copyright © 2016 Pearson Canada Inc.
68) Security policy establishment is the responsibility of A) middle managers. B) the CEO. C) corporate lawyers. D) senior management. E) the IT department. Answer: D Diff: 2 Type: MC Page Ref: 375 Topic: Q3 Skill: RECALL 69) Adware is ________ than spyware. A) more serious B) less annoying C) more malicious D) more benign E) harder to get rid of Answer: D Diff: 3 Type: MC Page Ref: 377 Topic: Q4 Skill: RECALL 70) After installing anti-virus and antispyware, what is the best way to avoid malware? A) Encrypt your work. B) Give your friend your passwords. C) Shut the computer down at the end of the day. D) Open all email by double clicking. E) Don't open email attachments from unknown sources. Answer: E Diff: 3 Type: MC Page Ref: 377 Topic: Q4 Skill: APPLIED 71) ________ is an organization-wide function that is in charge of developing data policies and enforcing data standards. A) Data contents protection B) Data safeguarding C) Data integrity D) Data administration E) Data rights administration Answer: D Diff: 2 Type: MC Page Ref: 378 Topic: Q5 Skill: RECALL
15 Copyright © 2016 Pearson Canada Inc.
72) User accounts should be given (the) ________ to perform their jobs. A) least possible privileges needed B) most possible privileges needed C) administrator privileges D) user privileges E) company standard privileges Answer: A Diff: 2 Type: MC Page Ref: 379 Topic: Q6 Skill: RECALL 73) Enforcement consists of ________ interdependent factors. A) 4 B) 2 C) 5 D) 3 E) 6 Answer: D Diff: 2 Type: MC Page Ref: 382 Topic: Q6 Skill: RECALL 74) Hardening is actually a(n) ________ safeguard. A) technical B) security C) data D) human E) accountability Answer: A Diff: 3 Type: MC Page Ref: 382 Topic: Q6 Skill: RECALL 75) A company establishes data rights and responsibilities and educates employees on how to backup and recover the database, but the company still needs to address the ________ safeguards. A) inadvertent B) security C) human D) data E) technical Answer: E Diff: 3 Type: MC Page Ref: 375 Topic: Q3 Skill: APPLIED
16 Copyright © 2016 Pearson Canada Inc.
76) A security incident reporting plan should ________ all incident reports. A) centralize B) generalize C) standardize D) decentralize E) prioritize Answer: A Diff: 2 Type: MC Page Ref: 388 Topic: Q8 Skill: RECALL 77) When an incident is reported, ________ is (are) of the essence. A) the response B) preparation C) speed D) a systematic approach E) actions Answer: C Diff: 2 Type: MC Page Ref: 388 Topic: Q8 Skill: RECALL 78) The sources of security problems are human error, malicious activity, and ________. Answer: disasters Diff: 1 Type: SA Page Ref: 372 Topic: Q3 Skill: RECALL 79) Pretexting is the same as ________ in the world of malicious computer activities. Answer: spoofing Diff: 1 Type: SA Page Ref: 373 Topic: Q3 Skill: RECALL 80) E-mail spoofing, where a hacker uses e-mail to pretend to be someone else, is another name for ________. Answer: phishing Diff: 1 Type: SA Page Ref: 373 Topic: Q3 Skill: RECALL 81) ________ occurs when an intruder uses another site's IP address as if it were their own. Answer: IP spoofing Diff: 2 Type: SA Page Ref: 373 Topic: Q3 Skill: RECALL 17 Copyright © 2016 Pearson Canada Inc.
82) Unauthorized data disclosure can occur by simple human ________ when someone inadvertently releases data in violation of a policy. Answer: error Diff: 1 Type: SA Page Ref: 372 Topic: Q3 Skill: RECALL 83) Phishing is an example of unauthorized data ________. Answer: disclosure Diff: 2 Type: SA Page Ref: 373 Topic: Q3 Skill: RECALL 84) A(n) ________ is an operation or person that spoofs legitimate companies in an attempt to illegally capture credit card or bank account numbers. Answer: phisher Diff: 2 Type: SA Page Ref: 373 Topic: Q3 Skill: RECALL 85) When someone calls and pretends to be from a credit card company in order to check the validity of your credit card number, they are most likely engaging in ________. Answer: pretexting Diff: 2 Type: SA Page Ref: 373 Topic: Q3 Skill: RECALL 86) Phishing is usually initiated via a(n) ________. Answer: e-mail Diff: 2 Type: SA Page Ref: 373 Topic: Q3 Skill: RECALL 87) Sometimes, just opening a web page can install ________ on your computer. Answer: malware Diff: 2 Type: SA Page Ref: 378 Topic: Q4 Skill: RECALL 88) With wired networks, sniffing requires a(n) ________ connection to the network. Answer: physical Diff: 2 Type: SA Page Ref: 373 Topic: Q3 Skill: RECALL
18 Copyright © 2016 Pearson Canada Inc.
89) ________ is a technique for intercepting computer communications. Answer: Sniffing Diff: 2 Type: SA Page Ref: 373 Topic: Q3 Skill: RECALL 90) Drive-by sniffers simply take computers with ________ connections through an area and search for unprotected networks. Answer: wireless Diff: 2 Type: SA Page Ref: 383 Topic: Q1 Skill: RECALL 91) ________ occurs when a person gains unauthorized access to a computer system. Answer: Hacking Diff: 1 Type: SA Page Ref: 374 Topic: Q3 Skill: RECALL 92) By starting a computationally intense application at the wrong time, users can inadvertently shut down a network or web server resulting in a(n) ________. Answer: denial of service Diff: 3 Type: SA Page Ref: 374 Topic: Q3 Skill: RECALL 93) A computer ________ is a program that infiltrates networks and generates so much artificial traffic that it virtually shuts down the network for legitimate traffic. Answer: worm Diff: 2 Type: SA Page Ref: 374 Topic: Q3 Skill: RECALL 94) An organization's security ________ has three components: senior management involvement, safeguards, and an incident response. Answer: program Diff: 2 Type: SA Page Ref: 374 Topic: Q3 Skill: RECALL 95) A(n) ________ has a microchip, which is loaded with authenticating data. Answer: smart card Diff: 1 Type: SA Page Ref: 376 Topic: Q4 Skill: RECALL
19 Copyright © 2016 Pearson Canada Inc.
96) A(n) ________ must be entered when using a smart card in order to provide authentication. Answer: PIN Diff: 1 Type: SA Page Ref: 376 Topic: Q4 Skill: RECALL 97) Fingerprints and facial features are used to provide authentication for ________ security devices. Answer: biometric Diff: 1 Type: SA Page Ref: 376 Topic: Q4 Skill: RECALL 98) Operating systems today have the capability to ________ users to multiple networks and servers. Answer: authenticate Diff: 3 Type: SA Page Ref: 376 Topic: Q4 Skill: RECALL 99) Some new operating systems offer a feature called ________, which remembers your data once you enter it the first time and authenticates you to other machines in the network. Answer: single sign-on Diff: 2 Type: SA Page Ref: 376 Topic: Q4 Skill: RECALL 100) ________ programs can be installed on the user's computer without the user's knowledge or permission. Answer: Spyware Diff: 2 Type: SA Page Ref: 377 Topic: Q4 Skill: RECALL 101) One aspect of security programs is how an organization establishes ________ that provide checks and balances for the people in charge of sensitive data and applications. Answer: controls Diff: 3 Type: SA Page Ref: 373 Topic: Q3 Skill: APPLIED 102) Enforcement consists of three interdependent factors: (1) responsibility, (2) accountability and (3) ________. Answer: compliance Diff: 2 Type: SA Page Ref: 380 Topic: Q5 Skill: APPLIED 20 Copyright © 2016 Pearson Canada Inc.
103) What is an unauthorized data disclosure? Answer: Unauthorized data disclosure can occur by human error when someone inadvertently releases data in violation of policy. An example at a university would be a new department administrator who posts student names, numbers, and grades in a public place, when the releasing of names and grades violates provincial law. Another example is employees who unknowingly or carelessly release proprietary data to competitors or to the media. Diff: 2 Type: ES Page Ref: 372 Topic: Q3 Skill: RECALL 104) What is pretexting? Answer: Pretexting occurs when someone deceives by pretending to be someone else. A common scam involves a telephone caller who pretends to be from a credit card company and claims to be checking the validity of credit card numbers: "I'm checking your MasterCard number; it begins 5181. Can you verify the rest of the number?" All MasterCard numbers start with 5181; the caller is attempting to steal a valid number. Diff: 2 Type: ES Page Ref: 373 Topic: Q3 Skill: RECALL 105) What is phishing? Answer: Phishing is a technique for obtaining unauthorized data that uses pretexting via email. The phisher pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, social insurance numbers, account passwords, and so forth. Phishing compromises legitimate brands and trademarks. Diff: 2 Type: ES Page Ref: 373 Topic: Q3 Skill: RECALL 106) What is spoofing? Answer: Spoofing is another term for someone pretending to be someone else. If you pretend to be your professor, you are spoofing your professor. IP spoofing occurs when an intruder uses another site's IP address as if it were that other site. Email spoofing is a synonym for phishing. Diff: 2 Type: ES Page Ref: 373 Topic: Q3 Skill: RECALL 107) What is sniffing? Answer: Sniffing is a technique for intercepting computer communications. With wired networks, sniffing requires a physical connection to the network. With wireless networks, no such connection is required: drive-by sniffers simply take computers with wireless connections through an area and search for unprotected wireless networks. Diff: 2 Type: ES Page Ref: 373 Topic: Q3 Skill: RECALL
21 Copyright © 2016 Pearson Canada Inc.
108) What are the three general sources of IS security threats? Which one is the most dangerous? Which one is the easiest to plan for? Answer: The three sources of security threats are from human errors, malicious activities, and natural disasters. The most dangerous in terms of losses to corporations is still without a doubt, human error, though the potential cost of hackers can be significantly higher. It is easiest to plan for natural disasters because much of this involves just planning for the right location. Diff: 3 Type: ES Page Ref: 372 Topic: Q3 Skill: APPLIED 109) Unauthorized data disclosure is a major type of security problem. How do the different sources of threats exploit this problem? Answer: Unauthorized data disclosure can occur through human error, hacker activity, and from natural disasters. There have been a number of cases where companies have mistakenly released customer names on Web sites and through other means. More serious is the growth in the number of phishers who pretend to be someone else and send e-mail messages trying to get access to credit card and bank account data. Some versions of this are called pretexting, spoofing, e-mail spoofing, and IP spoofing. Sniffing is a technique where hackers intercept regular network and wireless network traffic. Sensitive data may also be inadvertently released during a natural disaster crisis. Diff: 3 Type: ES Page Ref: 372 Topic: Q3 Skill: APPLIED 110) What is a denial of service security problem? How does this result from actions by the various sources of security threats? Answer: For telecommunications applications and especially Web sites, there is a significant risk that servers are so overwhelmed with service requests, that they cannot serve legitimate requests. A denial of service can be the result of human error by inadvertently running applications that are too complicated for the network or by too many users making requests at the same time. Hackers have written programs such as network worms that are designed to exploit this flaw and shut networks down by flooding the networks with traffic. Some crime organizations have been known to try to extort money from firms by threatening to do this. Natural disasters can cause networks to go down, also resulting in a denial of service. Diff: 3 Type: ES Page Ref: 374 Topic: Q3 Skill: APPLIED
22 Copyright © 2016 Pearson Canada Inc.
111) What is a technical safeguard? Describe two of these. Answer: Technical safeguards involve the hardware and software components of an information system and how they can be used to prevent security problems. Smart cards are like credit cards but they have chips on them that hold a lot more data than the magnetic strips. This data is used to identify the user who is required to enter a PIN in order to be authenticated. Biometric authentication is similar except that it uses unique personal characteristics such as fingerprints, retinal scans, or facial features that can be scanned by a computer and matched in a database. This technology is still in the early stages of adoption, but holds a lot of promise for the future. Diff: 3 Type: ES Page Ref: 375 Topic: Q3 Skill: RECALL 112) What is the idea of a single sign-on for multiple systems? What are the benefits and negatives associated with single-sign on? Answer: Some advanced operating systems and applications such as enterprise portals, require users to login once and then have the ability to store this information and login the user into any other servers or applications that are part of the allowed network of servers. Users like this because it reduces the time and annoyance of having to remember a whole bunch of different passwords for each server and application. It also reduces the amount of time the password is traveling the network and so reduces the probability that it will be intercepted. The only bad thing is when a hacker does get in, the damage can be much more severe since there are no safeguards in place once the hacker is into the system. Diff: 3 Type: ES Page Ref: 376 Topic: Q4 Skill: APPLIED 113) What is meant by the term "malware"? How can we safeguard against it? Answer: Short for malicious software, malware is software designed specifically to damage or disrupt a system. Malware can be a virus, spyware, adware, or a Trojan horse. Sometimes you don't even know you have it on your machine. If your machine gets really slow and has an inordinate number of pop-ups and suspicious changes to the browser homepage or taskbar, then you probably have some form of malware. The most obvious safeguard is to install antivirus and anti-spyware programs. Be careful to get one from a reputable vendor, since malware has been disguised as antivirus programs that you can get for free. Once installed you should set it to scan your computer frequently, at least once a week. To keep it current you must frequently update your malware definitions. Be sure that you don't open any e-mail attachments from unknown email addresses, since this is the most common way to get malware on your computer. Diff: 3 Type: ES Page Ref: 376 Topic: Q4 Skill: RECALL
23 Copyright © 2016 Pearson Canada Inc.
Experiencing MIS, Cdn. Ed., 4e (Kroenke) Application Extension 2a Introduction to Business Process Modelling with MS Visio 1) The goal of business process modeling is to provide a description of a process. Answer: TRUE Diff: 1 Type: TF Page Ref: 47 Topic: Q1 Skill: RECALL 2) A company creates value just by creating a model of a business process. Answer: FALSE Diff: 1 Type: TF Page Ref: 48 Topic: Q1 Skill: RECALL 3) One of the added values a business process model provides is the notion of making individuals process aware. Answer: TRUE Diff: 2 Type: TF Page Ref: 48 Topic: Q1 Skill: APPLIED 4) MS Visio files can be identified by their .psd filename extension. Answer: FALSE Diff: 2 Type: TF Page Ref: 48 Topic: Q2 Skill: RECALL 5) Data flow diagrams, UML and systems flowcharts are common process modeling techniques. Answer: TRUE Diff: 2 Type: TF Page Ref: 49 Topic: Q2 Skill: RECALL 6) Data flow diagramming is used by approximately 60% of all data modeling practitioners. Answer: TRUE Diff: 2 Type: TF Page Ref: 49 Topic: Q2 Skill: RECALL 7) The most commonly used process modeling application is MS Visio, which is used by approximately 74% of all practitioners. Answer: TRUE Diff: 2 Type: TF Page Ref: 49 Topic: Q2 Skill: RECALL 1 Copyright © 2016 Pearson Canada Inc.
8) In MS Visio the data store symbolizes a place where you would purchase IS applications. Answer: FALSE Diff: 1 Type: TF Page Ref: 51 Topic: Q3 Skill: RECALL 9) DFDs use a set of relatively simple shapes as representations of parts of a business process. Answer: TRUE Diff: 1 Type: TF Page Ref: 51 Topic: Q3 Skill: RECALL 10) There are three basic rules for drawing a DFD. Answer: TRUE Diff: 2 Type: TF Page Ref: 51 Topic: Q3 Skill: RECALL 11) Every process should have at least two data flow connectors coming into it and least two data flow connectors coming out of it. Answer: FALSE Diff: 2 Type: TF Page Ref: 51 Topic: Q3 Skill: RECALL 12) An external entity should be connected directly to a data store. Answer: FALSE Diff: 1 Type: TF Page Ref: 51 Topic: Q3 Skill: RECALL 13) A data store must be connected to a process. Answer: TRUE Diff: 1 Type: TF Page Ref: 51 Topic: Q3 Skill: RECALL 14) Levelling reveals increasing amounts of detail. Answer: TRUE Diff: 1 Type: TF Page Ref: 51 Topic: Q3 Skill: RECALL
2 Copyright © 2016 Pearson Canada Inc.
15) In DFD, the Top Process or Level 0 diagram does not provide much detail about the process. Answer: TRUE Diff: 1 Type: TF Page Ref: 52 Topic: Q3 Skill: RECALL 16) The primary goal of business process modeling is to create A) a series of accounting checks and balances. B) a description of a flow of events or information in a business. C) a 3-D computer representation of a product. D) a list of people involved in customer service. E) competitive advantage. Answer: B Diff: 2 Type: MC Page Ref: 47 Topic: Q1 Skill: RECALL 17) For any organization, creating new value may include getting its people more involved in process knowledge. This is called making individuals A) educated. B) company citizens. C) process aware. D) alert. E) lean. Answer: C Diff: 2 Type: MC Page Ref: 48 Topic: Q1 Skill: RECALL 18) Process models can create ________ when they help individuals develop an improved understanding of the process as a whole and become more process aware. A) new products B) economies of scale C) job security D) information E) value Answer: E Diff: 2 Type: MC Page Ref: 48 Topic: Q1 Skill: RECALL
3 Copyright © 2016 Pearson Canada Inc.
19) Applications that support the development of business process models are referred to as A) modeling tools. B) worksheets. C) information systems. D) graphics programs. E) props. Answer: A Diff: 2 Type: MC Page Ref: 48 Topic: Q2 Skill: RECALL 20) ________ include data flow diagrams, systems flowcharts, UML and BPMN. A) Storage views B) System layouts C) Information tables D) Process modeling techniques E) Data marts Answer: D Diff: 2 Type: MC Page Ref: 49 Topic: Q2 Skill: RECALL 21) Data flow diagrams are used by approximately ________ of all process modeling practitioners. A) 78% B) 55% C) 18% D) 42% E) 60% Answer: E Diff: 2 Type: MC Page Ref: 49 Topic: Q2 Skill: RECALL 22) Process modeling practitioners most often use A) Oracle Developer. B) Page Layout. C) Rational Rose. D) MS Visio. E) MS Excel. Answer: D Diff: 2 Type: MC Page Ref: 49 Topic: Q2 Skill: RECALL
4 Copyright © 2016 Pearson Canada Inc.
23) DFD shapes include A) process, octagons and interface. B) interface, neural, and connector. C) connector, data store and process. D) Page layout, process and interface. E) Insert, delete and type over. Answer: C Diff: 2 Type: MC Page Ref: 50 Topic: Q3 Skill: RECALL 24) The data store symbolizes a place where data is A) either stored or retrieved. B) edited and corrected. C) audited and collated. D) collected and mined. E) scrubbed and normalized. Answer: A Diff: 3 Type: MC Page Ref: 51 Topic: Q3 Skill: RECALL 25) There are ________ rules for combining shapes. A) new B) three C) dozens of D) no E) data driven Answer: B Diff: 2 Type: MC Page Ref: 51 Topic: Q3 Skill: RECALL 26) A data store cannot be directly ________ an external entity. A) purchased from B) listed with C) stored by D) connected to E) leased from Answer: D Diff: 3 Type: MC Page Ref: 51 Topic: Q3 Skill: RECALL
5 Copyright © 2016 Pearson Canada Inc.
27) Business processes can be quite complex. Data flow diagrams use ________ to display the various details of the process. A) plates B) levels C) numbers D) data stores E) connects Answer: B Diff: 3 Type: MC Page Ref: 51 Topic: Q3 Skill: APPLIED 28) Data flow diagrams are constructed by using A) a set of process references. B) four shapes and three rules. C) information systems. D) relative process references. E) activities and resources. Answer: B Diff: 1 Type: MC Page Ref: 50 Topic: Q3 Skill: RECALL 29) To create a new level after level 0, in MS Visio, we have to insert a new A) date. B) premise. C) diagram. D) number. E) person. Answer: C Diff: 2 Type: MC Page Ref: 52 Topic: Q3 Skill: RECALL 30) Scheduling employees to support an international figure skating contest would be an example of ________ that could be mapped by a process modeling tool. A) a process B) a set of variables C) a spreadsheet D) payroll E) security system Answer: A Diff: 2 Type: MC Page Ref: 52 Topic: Q3 Skill: APPLIED
6 Copyright © 2016 Pearson Canada Inc.
31) MS Visio files have the file extension A) (.exe). B) (.osd). C) (.vsd). D) (.DFD). E) (.doc). Answer: C Diff: 2 Type: MC Page Ref: 48 Topic: Q2 Skill: RECALL 32) Every process should have at least one data flow ________ coming into it and out of it. A) diagram B) entity C) positive D) connector E) MS Visio file Answer: D Diff: 1 Type: MC Page Ref: 51 Topic: Q3 Skill: RECALL 33) Data stores cannot be directly connected to an external A) data store. B) entity. C) process. D) connector. E) flow. Answer: B Diff: 3 Type: MC Page Ref: 51 Topic: Q3 Skill: RECALL 34) A data store can be connected to an external entity A) at the end of the year. B) if the external entity is secure. C) if the external entity is connected to another data store. D) through a process. E) after an IS audit. Answer: D Diff: 3 Type: MC Page Ref: 51 Topic: Q3 Skill: RECALL
7 Copyright © 2016 Pearson Canada Inc.
35) The interface represents a(n) ________ that exists outside the process. A) absolute name B) person or thing C) cell reference D) date E) data point Answer: B Diff: 2 Type: MC Page Ref: 51 Topic: Q3 Skill: RECALL 36) ________ UML and systems flowcharts are common process modelling techniques. Answer: Flow Diagrams Diff: 1 Type: SA Page Ref: 49 Topic: Q1 Skill: RECALL 37) In DFDs, the ________ symbolizes a place where data is either stored or retrieved. Answer: data store Diff: 1 Type: SA Page Ref: 51 Topic: Q1 Skill: RECALL 38) ________ reveals increasing amounts of detail. Answer: Levelling Diff: 2 Type: SA Page Ref: 51 Topic: Q3 Skill: RECALL 39) There are ________ basic rules for drawing a Data Flow Diagram. Answer: three Diff: 2 Type: SA Page Ref: 51 Topic: Q3 Skill: RECALL 40) One of the added values a business process model provides is the notion of making individuals ________. Answer: process aware Diff: 2 Type: SA Page Ref: 48 Topic: Q1 Skill: RECALL 41) There are ________ simple shapes used in Data Flow Diagrams. Answer: four Diff: 2 Type: SA Page Ref: 50 Topic: Q3 Skill: RECALL 8 Copyright © 2016 Pearson Canada Inc.
42) Process models can create ________ when they help individuals develop an improved understanding of the process as a whole and become more process aware. Answer: value Diff: 2 Type: SA Page Ref: 48 Topic: Q1 Skill: RECALL 43) ________ is the most popular application used by data modeling practitioners. Answer: MS Visio Diff: 2 Type: SA Page Ref: 49 Topic: Q2 Skill: RECALL 44) The lowest amount of detail shown in a DFD is the Level 0 or ________. Answer: top process Diff: 2 Type: SA Page Ref: 51 Topic: Q3 Skill: RECALL 45) Business process ________ can be seen as the creation of a diagram that provides an overview of a flow of events. Answer: modeling Diff: 2 Type: SA Page Ref: 47 Topic: Q1 Skill: RECALL 46) Describe how business process modelling can add value to an organization. Be sure to include and define the term "process aware." Answer: Business process modelling provides an organization with the big picture of its processes so that everyone involved in each process can have a wider and more inclusive perspective of the flow of events that occur towards the delivery of the final product or service. This modelling enhances communication and thus make individuals process aware. When people are process aware, they are expected to view their actions in the light of the larger business process, and they think of ways to improve the processes they are involved in. Diff: 2 Type: ES Page Ref: 48 Topic: Q1 Skill: APPLIED
9 Copyright © 2016 Pearson Canada Inc.
47) List the rules that apply to combining shapes in data flow diagrams. Answer: Rule 1: Every process should have at least one data flow connector coming into it and at least one data flow connector out of it. Rule 2: An external entity cannot be directly connected to a data store. Rule 3: A data store cannot be directly connected to another data store. A data store must be connected to a process. Diff: 3 Type: ES Page Ref: 51 Topic: Q3 Skill: RECALL 48) Define the four shapes in a data flow diagram and give a real-life example of each. Answer: 1) PROCESS: example — computing accounts receivables from invoices. 2) INTERFACE: Example — vendors that supply raw material. 3) DATA STORE: example — name of the database repository used in the model. 4) CONNECTOR: example — supplies material for production. Diff: 3 Type: ES Page Ref: 50 Topic: Q3 Skill: APPLIED
10 Copyright © 2016 Pearson Canada Inc.
Experiencing MIS, Cdn. Ed., 4e (Kroenke) Application Extension 3a Introduction to Microsoft Excel 2013 1) Before the advent of computers accountants used paper spreadsheets. Answer: TRUE Diff: 1 Type: TF Page Ref: 83 Topic: Q1 Skill: RECALL 2) Today the term spreadsheet almost always refers to electronic models. Answer: TRUE Diff: 1 Type: TF Page Ref: 83 Topic: Q1 Skill: RECALL 3) The Save As option allows you to rename the current file. Answer: TRUE Diff: 1 Type: TF Page Ref: 85 Topic: Q1 Skill: RECALL 4) The tabs in Excel control the contents of the ribbon. Answer: TRUE Diff: 1 Type: TF Page Ref: 85 Topic: Q1 Skill: RECALL 5) The FORMULAS tab in Excel is used to format your page. Answer: FALSE Diff: 1 Type: TF Page Ref: 86 Topic: Q1 Skill: RECALL 6) Cells are identified by their column letters and row numbers. Answer: TRUE Diff: 2 Type: TF Page Ref: 89 Topic: Q1 Skill: RECALL 7) Cells can only store numbers. Answer: FALSE Diff: 2 Type: TF Page Ref: 86 Topic: Q1 Skill: RECALL
1 Copyright © 2016 Pearson Canada Inc.
8) The flexibility of cells is an important factor in making a spreadsheet a powerful tool. Answer: TRUE Diff: 2 Type: TF Page Ref: 89 Topic: Q1 Skill: RECALL 9) When you build a formula it must begin with an "=." Answer: TRUE Diff: 2 Type: TF Page Ref: 95 Topic: Q2 Skill: RECALL 10) Text can be used in arithmetic formulas. Answer: FALSE Diff: 2 Type: TF Page Ref: 89 Topic: Q2 Skill: RECALL 11) "2B" would be a cell reference. Answer: FALSE Diff: 1 Type: TF Page Ref: 83 Topic: Q1 Skill: RECALL 12) "/" is the sign used for multiplication. Answer: FALSE Diff: 1 Type: TF Page Ref: 96-97 Topic: Q2 Skill: RECALL 13) If you key in January and February in cells C1 and C2 and then select both cells and drag down, Excel will fill in with March, April, May and so on. Answer: TRUE Diff: 1 Type: TF Page Ref: 89 Topic: Q1 Skill: RECALL 14) The "Fill" capability in Excel can create more formulas with less work. Answer: TRUE Diff: 2 Type: TF Page Ref: 95 Topic: Q2 Skill: RECALL
2 Copyright © 2016 Pearson Canada Inc.
15) To increase a cells value by 10%, it is best to reference the cell with a value of 10% in the formula. Answer: TRUE Diff: 3 Type: TF Page Ref: 87 Topic: Q2 Skill: RECALL 16) "C8" is an absolute reference. Answer: FALSE Diff: 2 Type: TF Page Ref: 89 Topic: Q2 Skill: RECALL 17) Formatting cells allows the user to better see the type of data that is in a cell. Answer: TRUE Diff: 2 Type: TF Page Ref: 93 Topic: Q3 Skill: RECALL 18) Formatting options are shown on the Home tab ribbon. Answer: TRUE Diff: 2 Type: TF Page Ref: 93 Topic: Q3 Skill: RECALL 19) A cell is identified by using a A) column number and a row number. B) column letter and a row number. C) position number. D) column letter and a row letter. E) column number and a row letter. Answer: B Diff: 2 Type: MC Page Ref: 86 Topic: Q1 Skill: RECALL 20) Spreadsheets store information in A) rows. B) locations. C) cells. D) columns. E) boxes. Answer: C Diff: 1 Type: MC Page Ref: 89 Topic: Q1 Skill: RECALL 3 Copyright © 2016 Pearson Canada Inc.
21) Workbooks are made up of multiple pages called A) text. B) arithmetic symbols. C) formulas. D) numbers. E) worksheets. Answer: E Diff: 2 Type: MC Page Ref: 89 Topic: Q1 Skill: RECALL 22) The first thing a user should do once they start to work within an Excel file is to A) save the workbook. B) create a new worksheet. C) add text. D) create the model. E) add formulas. Answer: A Diff: 1 Type: MC Page Ref: 84 Topic: Q1 Skill: RECALL 23) To place a graph on your spreadsheet you would use the ________ tab. A) View B) Page Layout C) Home D) Insert E) Data Answer: D Diff: 2 Type: MC Page Ref: 86 Topic: Q4 Skill: RECALL 24) To insert new rows, click on the row ________ which you want the new rows. A) below B) above C) next to D) to the left of E) inside Answer: B Diff: 2 Type: MC Page Ref: 90 Topic: Q3 Skill: RECALL
4 Copyright © 2016 Pearson Canada Inc.
25) You can format your worksheet using icons on the ________ tab. A) View B) Insert C) Data D) Home E) Page Layout Answer: D Diff: 2 Type: MC Page Ref: 86 Topic: Q3 Skill: RECALL 26) If you need to sort and filter data you would use tools on the ________ tab. A) Review B) Page Layout C) Insert D) Data E) Home Answer: D Diff: 2 Type: MC Page Ref: 86 Topic: Q1 Skill: RECALL 27) To create complex formulas you would use tools on the ________ tab. A) Home B) Data C) Formula D) Page Layout E) Insert Answer: C Diff: 2 Type: MC Page Ref: 86 Topic: Q1 Skill: RECALL 28) During the "fill" function when you move the mouse over top of the handle on the cell the mouse icon changes to a(n) A) + sign. B) * sign. C) ? sign. D) ! sign. E) - sign. Answer: A Diff: 2 Type: MC Page Ref: 88-89 Topic: Q2 Skill: RECALL
5 Copyright © 2016 Pearson Canada Inc.
29) To increase the size of text in a cell, go to the ________ Section of the Home Tab. A) Alignment B) Styles C) Number D) Font E) Editing Answer: D Diff: 2 Type: MC Page Ref: 93 Topic: Q3 Skill: RECALL 30) If you want to apply the same "growth rate" to a number of formulas in different cells you would use a(n) A) asynchronous reference. B) absolute reference. C) intact reference. D) relative reference. E) synchronous reference Answer: B Diff: 2 Type: MC Page Ref: 87 Topic: Q2 Skill: RECALL 31) It is ________ best to use references to cell rather than number in your spreadsheet formulas. A) rarely B) never C) sometimes D) always E) usually Answer: D Diff: 2 Type: MC Page Ref: 95 Topic: Q2 Skill: RECALL 32) The most frequently used tools and selections can be found in the ________ tab. A) INSERT B) DATA C) CELLS D) HOME E) VIEW Answer: D Diff: 2 Type: MC Page Ref: 85 Topic: Q2 Skill: RECALL
6 Copyright © 2016 Pearson Canada Inc.
33) To display a preview in Excel click the FILE button and then the ________ button. A) Share B) Info C) Print D) Export E) Open Answer: C Diff: 2 Type: MC Page Ref: 97 Topic: Q3 Skill: RECALL 34) Spreadsheets were a ________ factor in the early adoption of personal computers. A) small B) nonC) minimal D) major E) minor Answer: D Diff: 1 Type: MC Page Ref: 87 Topic: Q1 Skill: RECALL 35) The ________ key allows you to edit a cell's content. A) F4 B) F2 C) F5 D) F1 E) F3 Answer: B Diff: 2 Type: MC Page Ref: 86 Topic: Q2 Skill: RECALL 36) When there are two formulas to choose from to type into a cell, choose the formula that is A) easier to enter. B) more correct. C) longer. D) flexible. E) shorter. Answer: D Diff: 3 Type: MC Page Ref: 96 Topic: Q2 Skill: RECALL
7 Copyright © 2016 Pearson Canada Inc.
37) ________ spreadsheets were used prior to the advent of computers. Answer: Paper Diff: 1 Type: SA Page Ref: 83 Topic: Q1 Skill: RECALL 38) The term spreadsheet usually refers to ________ models, today. Answer: electronic Diff: 1 Type: SA Page Ref: 83 Topic: Q1 Skill: RECALL 39) Cells are identified by their ________ letters and row numbers. Answer: column Diff: 2 Type: SA Page Ref: 83 Topic: Q1 Skill: RECALL 40) A formula always begins with a(n) ________ sign. Answer: equals Diff: 2 Type: SA Page Ref: 84 Topic: Q2 Skill: RECALL 41) "B2" would be a cell ________. Answer: reference Diff: 2 Type: SA Page Ref: 95 Topic: Q1 Skill: RECALL 42) A(n) ________ is used for multiplication in formulas. Answer: * or asterisk Diff: 2 Type: SA Page Ref: 96 Topic: Q2 Skill: APPLIED 43) The formatting options are show on the ________ ribbon. Answer: Home tab Diff: 2 Type: SA Page Ref: 85 Topic: Q3 Skill: RECALL 44) The ________ capability of Excel allows the users to create more formulas with less work. Answer: fill Diff: 2 Type: SA Page Ref: 89 Topic: Q2 Skill: RECALL 8 Copyright © 2016 Pearson Canada Inc.
45) Describe how you would enter a new formula that adds the value of two cells into and Excel spreadsheet. Answer: You would first click on the cell that the formula is required in and then enter the = sign to start the formula. Form this point you could type in the formula using the cell names and the + sign for an addition formula or click on the first cell then enter the + sign and click on the second cell to enter the formula. An example would be "=A1+B1" entered in cell "C1." Diff: 2 Type: ES Page Ref: 94-95 Topic: Q2 Skill: APPLIED 46) How does a user rename a worksheet tab? Answer: If the user double clicks the worksheet tab the name becomes editable and the user can type the new name and hit enter. Diff: 2 Type: ES Page Ref: 83 Topic: Q1 Skill: APPLIED
9 Copyright © 2016 Pearson Canada Inc.
Experiencing MIS, Cdn. Ed., 4e (Kroenke) Application Extension 5a Database Design 1) A physical representation of a database is called a data model. Answer: FALSE Diff: 2 Type: TF Page Ref: 160 Topic: Q2 Skill: RECALL 2) A data model describes the data and relationships that will be stored in the database. Answer: TRUE Diff: 2 Type: TF Page Ref: 160 Topic: Q2 Skill: RECALL 3) The data model should summarize the data requirements as derived from interviews with the end users. Answer: TRUE Diff: 3 Type: TF Page Ref: 162 Topic: Q2 Skill: APPLIED 4) The Object-Relationship (OR) technique is the most popular one for creating a data model. Answer: FALSE Diff: 2 Type: TF Page Ref: 142 (small print reference) Topic: Q3 Skill: RECALL 5) Once the entities have been defined, the data model can be implemented directly on the DBMS. Answer: FALSE Diff: 2 Type: TF Page Ref: 161 Topic: Q2 Skill: RECALL 6) "Address" would be a likely attribute of a customer entity in a database application. Answer: TRUE Diff: 2 Type: TF Page Ref: 161 Topic: Q2 Skill: RECALL 7) "Name" would be a good identifier for a customer entity in a database application. Answer: FALSE Diff: 3 Type: TF Page Ref: 161 Topic: Q3 Skill: APPLIED 1 Copyright © 2016 Pearson Canada Inc.
8) "PartNumber" would be a good identifier for a part entity in a database application. Answer: TRUE Diff: 3 Type: TF Page Ref: 161 Topic: Q3 Skill: RECALL 9) Each entity should have one unique identifier. Answer: TRUE Diff: 2 Type: TF Page Ref: 161 Topic: Q3 Skill: RECALL 10) In E-R diagrams, entities are represented with rectangles. Answer: TRUE Diff: 2 Type: TF Page Ref: 162 Topic: Q3 Skill: RECALL 11) The notation N:N indicates a many-to-many relationship. Answer: FALSE Diff: 2 Type: TF Page Ref: 162 Topic: Q3 Skill: RECALL 12) In E-R diagrams, attributes can be represented with crow's feet. Answer: FALSE Diff: 3 Type: TF Page Ref: 162 Topic: Q3 Skill: RECALL 13) Normalization is a process that helps ensure that the tables from the database design process are well structured. Answer: TRUE Diff: 2 Type: TF Page Ref: 164 Topic: Q4 Skill: RECALL 14) In a 1:N type of relationship, the foreign key is stored on the "1" side. Answer: FALSE Diff: 3 Type: TF Page Ref: 166 Topic: Q4 Skill: RECALL
2 Copyright © 2016 Pearson Canada Inc.
15) E-R diagrams are too cumbersome for use in database design discussions. Answer: FALSE Diff: 3 Type: TF Page Ref: 166 Topic: Q4 Skill: RECALL 16) An entity is something you want to track. Answer: TRUE Diff: 2 Type: TF Page Ref: 161 Topic: Q3 Skill: RECALL 17) A data model should show how users see their "world." Answer: TRUE Diff: 2 Type: TF Page Ref: 160 Topic: Q2 Skill: RECALL 18) Users validate and approve the data model prior to its transformation into a database design. Answer: TRUE Diff: 2 Type: TF Page Ref: 160 Topic: Q2 Skill: RECALL 19) Users need to verify the data model for correctness. Answer: TRUE Diff: 1 Type: TF Page Ref: 160 Topic: Q2 Skill: RECALL 20) Any mistake in the data modeling stage will come back to haunt you. Answer: TRUE Diff: 2 Type: TF Page Ref: 160 Topic: Q2 Skill: APPLIED 21) At times you may not place a field in a table because it can be readily computed in forms or reports. Answer: TRUE Diff: 2 Type: TF Page Ref: 171 Topic: Q6 Skill: RECALL
3 Copyright © 2016 Pearson Canada Inc.
22) Normalization is a trade-off between the elimination of data duplication and processing speed. Answer: TRUE Diff: 3 Type: TF Page Ref: 165 Topic: Q4 Skill: RECALL 23) When a student can have more than one adviser it is a N:M relationship. Answer: TRUE Diff: 1 Type: TF Page Ref: 162 Topic: Q4 Skill: RECALL 24) When two rows in a database are supposed to refer to the same thing and they do not, you have a data integrity problem. Answer: TRUE Diff: 2 Type: TF Page Ref: 164 Topic: Q4 Skill: RECALL 25) The easiest time to change a database design is during the data modeling stage. Answer: TRUE Diff: 1 Type: TF Page Ref: 168 Topic: Q5 Skill: RECALL 26) UML stands for A) Unified Modeling Language. B) Unified Metadata Language. C) United Metadata Language. D) Universal Metadata Language. E) Universal Modeling Language. Answer: A Diff: 1 Type: MC Page Ref: 160 Topic: Q3 Skill: RECALL
4 Copyright © 2016 Pearson Canada Inc.
27) ________ is the process of converting poorly structured tables into two or more wellstructured tables. A) Sharing B) Reengineering C) Normalization D) Decentralization E) Redesigning Answer: C Diff: 1 Type: MC Page Ref: 164 Topic: Q4 Skill: RECALL 28) "One department can have many advisers" is an example of A) a one-to-many relationship. B) maximum cardinality relationship. C) a minimum cardinality relationship. D) a one-to-one relationship. E) a many-to-many relationship. Answer: A Diff: 1 Type: MC Page Ref: 162 Topic: Q3 Skill: RECALL 29) Entities have ________ that describes characteristics of the entity. A) relations B) properties C) attributes D) names E) files Answer: C Diff: 1 Type: MC Page Ref: 161 Topic: Q3 Skill: RECALL 30) Entities have an ________ which is an attribute whose value is associated with one and only one entity instance. A) index B) agenda C) attribute D) initial E) identifier Answer: E Diff: 2 Type: MC Page Ref: 161 Topic: Q3 Skill: RECALL
5 Copyright © 2016 Pearson Canada Inc.
31) A person, place or object would be represented in a database application as a(n) A) entity. B) record. C) table. D) class. E) object. Answer: A Diff: 1 Type: MC Page Ref: 161 Topic: Q3 Skill: RECALL 32) A(n) ________ diagram is like a blueprint of a database application. A) flowchart B) O-O C) workflow D) Entity-Relationship (E-R) E) O-R Answer: D Diff: 2 Type: MC Page Ref: 162 Topic: Q3 Skill: RECALL 33) ________ is (are) the most popular diagramming tool(s) for database applications. A) O-O B) E-R diagrams C) Flowcharts D) Workflows E) UML Answer: B Diff: 2 Type: MC Page Ref: 162 Topic: Q3 Skill: RECALL 34) In a relational database, each entity is described by A) characters. B) data. C) bytes. D) attributes. E) records. Answer: D Diff: 2 Type: MC Page Ref: 161 Topic: Q3 Skill: RECALL
6 Copyright © 2016 Pearson Canada Inc.
35) When creating tables for an entity, the identifier of the entity becomes the ________ of the table. A) master column. B) key. C) index attribute. D) foreign key. E) index field. Answer: B Diff: 2 Type: MC Page Ref: 166 Topic: Q4 Skill: RECALL 36) If the same data element is stored differently in another table, this is said to be an issue of A) inaccurate data. B) entity integrity. C) data repetition. D) normalization. E) data integrity. Answer: E Diff: 3 Type: MC Page Ref: 165 Topic: Q4 Skill: RECALL 37) A(n) ________ data model captures the entities and their relationships in a database application. A) workflow B) O-O C) Semantic Object D) E-R E) flowchart Answer: D Diff: 2 Type: MC Page Ref: 160 Topic: Q3 Skill: RECALL 38) An example of a one-to-many type of relationship might be A) an employee cannot be assigned a computer. B) an employee can be assigned an office. C) an employee can be assigned more than one computer. D) an employee can be assigned one and only one computer. E) an employee is assigned a company car. Answer: C Diff: 2 Type: MC Page Ref: 162 Topic: Q3 Skill: APPLIED
7 Copyright © 2016 Pearson Canada Inc.
39) The most confusing type of a relationship is the ________ relationship. A) 1:N B) M:M C) N:M D) 1:1 E) N:1 Answer: C Diff: 2 Type: MC Page Ref: 163 Topic: Q3 Skill: RECALL 40) ________ is used to indicate a many-to-many relationship. A) N:M B) 1:M C) M:N D) M:M E) 1:1 Answer: A Diff: 1 Type: MC Page Ref: 162 Topic: Q3 Skill: RECALL 41) ________ would be the best identifier attribute for an employee table. A) Birth Date B) Social Insurance number C) Last Name D) Phone number E) First Name and Last Name Answer: B Diff: 2 Type: MC Page Ref: 161 Topic: Q3 Skill: APPLIED 42) ________ is the last step in developing a database application. A) Designing the tables with the keys B) Getting the information requirements C) Reviewing the data model with users D) Creating the database E) Creating a data model Answer: D Diff: 2 Type: MC Page Ref: 160 Topic: Q2 Skill: RECALL
8 Copyright © 2016 Pearson Canada Inc.
43) If a student is allowed to have multiple majors and advisers are assigned to multiple students, these would be examples of ________ relationships. A) M:N B) N:1 C) 1:1 D) N:M E) 1:N Answer: D Diff: 2 Type: MC Page Ref: 162 Topic: Q3 Skill: RECALL 44) The ________ shows the number of entities that can be involved in a relationship. A) E-R B) UML C) data integrity D) workflow E) cardinality Answer: E Diff: 1 Type: MC Page Ref: 163 Topic: Q3 Skill: RECALL 45) ________ is the process of converting poorly-structured tables into two or more wellstructured tables. A) Application development B) Normalization C) Structuring D) Clarification E) Conversion Answer: B Diff: 1 Type: MC Page Ref: 164 Topic: Q4 Skill: RECALL 46) Database practitioners classify tables into various ________ depending on the type of data integrity problems to which they might be subject. A) layers B) categories C) normal forms D) strata E) types Answer: C Diff: 3 Type: MC Page Ref: 165 Topic: Q4 Skill: RECALL 9 Copyright © 2016 Pearson Canada Inc.
47) In a one-to-many relationship, the foreign key is stored in the table that is on the ________ side of the relationship. A) weak B) many C) many-to many D) one E) cardinal Answer: B Diff: 2 Type: MC Page Ref: 167 Topic: Q4 Skill: RECALL 48) A N:M relationship is represented with a(n) A) intersection table. B) entity. C) composite table. D) linking field. E) index field. Answer: A Diff: 3 Type: MC Page Ref: 168 Topic: Q4 Skill: RECALL 49) The cardinality of the relationship between a employer and its employees is A) 1:N. B) M:N. C) N:M. D) 1:1. E) N:1. Answer: A Diff: 1 Type: MC Page Ref: 163 Topic: Q3 Skill: RECALL 50) A 1:N relationship relates ________ record(s) to ________ record(s) in a database. A) many, one B) one, three C) one, one D) many, many E) one, many Answer: E Diff: 1 Type: MC Page Ref: 163 Topic: Q3 Skill: RECALL
10 Copyright © 2016 Pearson Canada Inc.
51) Understanding how to interpret E-R diagrams will help you interpret ________ with a bit of study. A) flow diagrams B) relational models C) UML models D) O-O models E) workflow models Answer: C Diff: 2 Type: MC Page Ref: 160 Topic: Q3 Skill: RECALL 52) On difficulty with designing database is the ________ number of possibilities of what to include. A) small B) minimal C) large D) fixed E) known Answer: C Diff: 1 Type: MC Page Ref: 160 Topic: Q2 Skill: RECALL 53) Database developers ________ as the first step in development. A) interview users B) create a relational model C) create an E-R diagram D) create a data model E) write queries Answer: A Diff: 1 Type: MC Page Ref: 159 Topic: Q2 Skill: RECALL 54) There is (are) ________ style(s) of E-R diagrams. A) 2 B) one C) several D) 15 E) 10 Answer: C Diff: 2 Type: MC Page Ref: 163 Topic: Q3 Skill: RECALL
11 Copyright © 2016 Pearson Canada Inc.
55) Tables are transformed into ________ to remove duplicate data and other problems. A) regular design B) normalized design C) regular form D) normal form E) relational form Answer: D Diff: 2 Type: MC Page Ref: 165 Topic: Q4 Skill: RECALL 56) On the many side of a relationship you place the ________ of the ________ relationship to represent the relationships in the database. A) foreign key, one side B) primary key, one side C) index key, one side D) primary key, many side E) foreign key, many side Answer: B Diff: 3 Type: MC Page Ref: 167 Topic: Q4 Skill: RECALL 57) When you place data into a database you need to place (the) ________ records first. A) first B) foreign key C) primary key D) any E) indexed Answer: C Diff: 3 Type: MC Page Ref: 166 Topic: Q4 Skill: RECALL 58) The user's review of the data model is A) done after the database is programmed B) treated as a casual process C) not necessary D) not usually done E) crucial Answer: E Diff: 2 Type: MC Page Ref: 169 Topic: Q5 Skill: RECALL
12 Copyright © 2016 Pearson Canada Inc.
59) In an automobile table the ________ would make the best table key. A) model B) a combination of make and model C) make D) license plate number E) VIN Answer: E Diff: 2 Type: MC Page Ref: 166 Topic: Q4 Skill: APPLIED 60) A crow's foot diagram is a type of A) relationship map. B) data model. C) E-R diagram. D) UML model. E) normalization model. Answer: C Diff: 1 Type: MC Page Ref: 163 Topic: Q3 Skill: RECALL 61) ________ is a process for ensuring that the tables in a database design are efficient and wellstructured. Answer: Normalization Diff: 2 Type: SA Page Ref: 164 Topic: Q4 Skill: RECALL 62) ________ is the second most popular data modeling technique. Answer: UML Diff: 3 Type: SA Page Ref: 160 Topic: Q3 Skill: RECALL 63) An E-R data model captures both the entities involved and the ________ between the entities. Answer: relationships Diff: 3 Type: SA Page Ref: 160 Topic: Q3 Skill: RECALL 64) The easiest time to make changes to the database structure is during the ________ phase. Answer: data modeling Diff: 2 Type: SA Page Ref: 168 Topic: Q5 Skill: RECALL 13 Copyright © 2016 Pearson Canada Inc.
65) A(n) ________ is an attribute or group of attributes whose value is associated with one and only one entity instance. Answer: identifier Diff: 2 Type: SA Page Ref: 161 Topic: Q3 Skill: RECALL 66) ________ is the notation used to describe a many-to-many relationship. Answer: N:M Diff: 1 Type: SA Page Ref: 162 Topic: Q3 Skill: RECALL 67) ________ cardinality indicates the most entities that can be involved in a relationship. Answer: Maximum Diff: 2 Type: SA Page Ref: 163 Topic: Q3 Skill: RECALL 68) In an E-R data model, the crow's feet symbol is used to indicate the ________ side of the relationship. Answer: many Diff: 2 Type: SA Page Ref: 163 Topic: Q3 Skill: RECALL 69) The number of entities that can be involved in a relationship in a data model is called the ________. Answer: cardinality Diff: 2 Type: SA Page Ref: 163 Topic: Q3 Skill: RECALL 70) The foreign key is put on the ________ side of a one-to-many relationship. Answer: many Diff: 2 Type: SA Page Ref: 166 Topic: Q4 Skill: RECALL 71) In order to represent a(n) ________ type of relationship, a third table is created using the keys from the two entities being related. Answer: N:M Diff: 3 Type: SA Page Ref: 163 Topic: Q3 Skill: RECALL 14 Copyright © 2016 Pearson Canada Inc.
72) When a table contains inaccurate data for the same data elements in a table, it is said that the data in the table lacks ________. Answer: integrity Diff: 2 Type: SA Page Ref: 164 Topic: Q4 Skill: RECALL 73) A(n) ________ is a characteristic of an entity. Answer: attribute Diff: 1 Type: SA Page Ref: 161 Topic: Q3 Skill: RECALL 74) A crow's foot diagram is a type of ________. Answer: E-R diagram Diff: 1 Type: SA Page Ref: 163 Topic: Q3 Skill: RECALL 75) Entities have ________ with one another. Answer: relationships Diff: 1 Type: SA Page Ref: 161 Topic: Q3 Skill: RECALL 76) A(n) ________ is an attribute or group of attributes whose value is associated with one and only one entity instance. Answer: identifier Diff: 2 Type: SA Page Ref: 161 Topic: Q3 Skill: RECALL 77) A(n) ________ is something users want to track. Answer: entity Diff: 1 Type: SA Page Ref: 161 Topic: Q3 Skill: RECALL 78) ________ form removes duplicate data and other problems from a table. Answer: Normal Diff: 2 Type: SA Page Ref: 165 Topic: Q4 Skill: RECALL
15 Copyright © 2016 Pearson Canada Inc.
79) The easiest time to change a database is during the ________ stage. Answer: data modeling Diff: 2 Type: SA Page Ref: 168 Topic: Q5 Skill: RECALL 80) ________ problems can occur when data is duplicated. Answer: Data integrity Diff: 2 Type: SA Page Ref: 165 Topic: Q4 Skill: RECALL 81) Data ________ problems make your database unreliable. Answer: integrity Diff: 2 Type: SA Page Ref: 166 Topic: Q4 Skill: APPLIED 82) Entities have a(an) ________, which is an attribute whose value is related to one and only one entity instance. Answer: Identifier Diff: 1 Type: SA Page Ref: 159 Topic: Q2 Skill: RECALL 83) Describe how normalization works. Answer: Normalization is the process of converting poorly structured tables into two or more well-structured tables. Diff: 3 Type: ES Page Ref: 164 Topic: Q4 Skill: RECALL
16 Copyright © 2016 Pearson Canada Inc.
84) What are the stages in developing a database application? At what point is it easiest to make changes? Answer: Once a suitable application has been identified, the information requirements of the various users need to be identified. This entails interviewing the users about the reports, forms, and screens of data they need to access. A skilled database designer then identifies all the entities, attributes, and relationships needed and arrives at a data model for the application using E-R or possible UML, as the data modeling tool. This data model is then converted into a set of tables with primary and foreign keys that capture all the relationships previously identified in the data model. This set of tables is then normalized so that it is not subject to all the various anomalies that poorly designed databases have, and then the tables and attributes are created using the target DBMS for the application. Users will be involved in testing the system at all points of the development process, but as a rule, it is usually easiest to make changes earlier in the process. That is why it is important to test the data model with a wide range of queries and reports to make sure that it meets all the user requirements, since it is harder to change the database once it is implemented in the DBMS. Diff: 3 Type: ES Page Ref: 160 Topic: Q2 Skill: RECALL 85) What are the different types of relationships represented in a data model? How are these captured by the use of keys? Answer: There are four different types of relationships that have to be modeled in a data model; a 1:1, 1:N, N:1 and the most complex, N:M (many-to-many). In a 1:N and N:1 type of relationship, the foreign key is stored on the "many" side. In a 1:1 relationship, it can be stored on either side of the relationship. If the designer feels that the relationship may eventually change to a 1:N type, then the key should be stored on the potential "many" side. In a N:M type of relationship, a new intersection table is created using the identifier from each of the linked tables to form a new "composite" key. Diff: 2 Type: ES Page Ref: 162 Topic: Q3 Skill: APPLIED 86) What are the different keys used for in relational databases? How do they maintain the integrity of the information in the database applications? Answer: The primary key is also known as the identifier. This is the field or collection of fields that serves to uniquely identify a specific record. Setting the primary key enables the DBMS to maintain what is called entity integrity, which prevents any duplicates from being stored in that table. This key can also be stored as a field in other related tables. As such, it is known as a foreign key and helps to maintain referential integrity. This means that if a related record is deleted or modified, the DBMS will know that the other record will also have to be deleted or modified. Diff: 3 Type: ES Page Ref: VARIOUS Topic: VARIOUS Skill: APPLIED
17 Copyright © 2016 Pearson Canada Inc.
87) Describe an E-R diagram. Answer: An E-R diagram is a high level data model of a database that list the following components: 1. Entities and their attributes including the potential primary keys of the entity 2. The relationships between the entities and their cardinalities Diff: 3 Type: ES Page Ref: 162 Topic: Q3 Skill: RECALL
18 Copyright © 2016 Pearson Canada Inc.
Experiencing MIS, Cdn. Ed., 4e (Kroenke) Application Extension 5b Using Microsoft Access 2013 1) A data entry form in Access can be created using the Form tool in the Create tab ribbon. Answer: TRUE Diff: 2 Type: TF Page Ref: 184 Topic: Q3 Skill: RECALL 2) Data entry forms in Access are used to generate reports. Answer: FALSE Diff: 2 Type: TF Page Ref: 185 Topic: Q3 Skill: RECALL 3) Before creating a database in Access, you should develop a data model based on the user requirements. Answer: TRUE Diff: 1 Type: TF Page Ref: 175 Topic: Q1 Skill: RECALL 4) Access allows users to create tables in a design view. Answer: TRUE Diff: 2 Type: TF Page Ref: 177 Topic: Q1 Skill: RECALL 5) The most common data type for fields in tables is always the "number" data type. Answer: FALSE Diff: 3 Type: TF Page Ref: 180 Topic: Q1 Skill: APPLIED 6) Forms allow users to view and maintain data in a database. Answer: TRUE Diff: 2 Type: TF Page Ref: 186 Topic: Q3 Skill: APPLIED 7) The relationships window allows users to define the relationships between tables. Answer: TRUE Diff: 2 Type: TF Page Ref: 181 Topic: Q2 Skill: RECALL
1 Copyright © 2016 Pearson Canada Inc.
8) Access does not allow users to create queries in SQL. Answer: FALSE Diff: 2 Type: TF Page Ref: 187 Topic: Q4 Skill: RECALL 9) Access provides a graphical user interface for creating database queries. Answer: TRUE Diff: 1 Type: TF Page Ref: 187 Topic: Q4 Skill: RECALL 10) A quick way of creating reports in Access is to use the Report Wizard. Answer: TRUE Diff: 2 Type: TF Page Ref: 190 Topic: Q5 Skill: RECALL 11) In the table design mode in Access the field and data type are required to create an attribute. Answer: TRUE Diff: 2 Type: TF Page Ref: 178 Topic: Q1 Skill: APPLIED 12) A primary key is indicated by a small key icon next to the field name in the design mode of the table. Answer: TRUE Diff: 1 Type: TF Page Ref: 180 Topic: Q1 Skill: RECALL 13) Relationships can be assigned using the Relationships tool that is found on the Database Tools tab of the ribbon. Answer: TRUE Diff: 2 Type: TF Page Ref: 181 Topic: Q2 Skill: RECALL 14) Relationships are created in the relationships window by clicking on the primary key in one table and dragging it to the related field in another table. Answer: TRUE Diff: 2 Type: TF Page Ref: 181 Topic: Q2 Skill: RECALL
2 Copyright © 2016 Pearson Canada Inc.
15) A subform allows multiple records to be displayed that are related to the record displayed in the main form. Answer: TRUE Diff: 3 Type: TF Page Ref: 186 Topic: Q3 Skill: APPLIED 16) A question one asks of the database is known as a(n) A) result. B) form. C) query. D) report. E) table. Answer: C Diff: 1 Type: MC Page Ref: 187 Topic: Q4 Skill: RECALL 17) In MS Access, ________ is a term that refers to the attributes that are described in the data model. A) table B) data C) field D) application E) key Answer: C Diff: 2 Type: MC Page Ref: 178 Topic: Q1 Skill: RECALL 18) In MS Access, the ________ data type is used to generate a unique primary key. A) text B) integer C) currency D) number E) autonumber Answer: E Diff: 3 Type: MC Page Ref: 180 Topic: Q1 Skill: APPLIED
3 Copyright © 2016 Pearson Canada Inc.
19) When creating a new table in Access, the primary key is set by clicking on the ________ icon. A) drive B) switch C) exclamation mark D) relationship E) key Answer: E Diff: 2 Type: MC Page Ref: 180 Topic: Q1 Skill: RECALL 20) When defining a relationship between two tables in Access, it is important to be sure to drag the correct ________ in the right direction and lay it on the other table. A) relationship B) attribute C) window D) key E) table Answer: B Diff: 3 Type: MC Page Ref: 181 Topic: Q2 Skill: RECALL 21) ________ are used by the user to enter data in to an Access database. A) Queries B) Modules C) Tables D) Forms E) Reports Answer: D Diff: 2 Type: MC Page Ref: 184 Topic: Q3 Skill: RECALL 22) ________ ask questions about the data. A) Reports B) Queries C) Modules D) Forms E) Tables Answer: B Diff: 2 Type: MC Page Ref: 187 Topic: Q4 Skill: RECALL
4 Copyright © 2016 Pearson Canada Inc.
23) You build the links between tables using the ________ window. A) relationships B) relationship wizard C) database diagram D) mapping E) database relationships Answer: A Diff: 2 Type: MC Page Ref: 181 Topic: Q2 Skill: RECALL 24) The second column at the top of the table design window contains the ________ of the field. A) field name B) field size C) properties D) data type E) description Answer: D Diff: 2 Type: MC Page Ref: 179 Topic: Q1 Skill: RECALL 25) The properties of each field are set at the ________ of the table design window. A) top B) centre C) bottom D) left E) right Answer: C Diff: 3 Type: MC Page Ref: 179 Topic: Q1 Skill: RECALL 26) Access' graphical query interface translates statements into ________. A) VBA B) ASP C) query D) SQL E) C++ Answer: D Diff: 3 Type: MC Page Ref: 187 Topic: Q4 Skill: RECALL
5 Copyright © 2016 Pearson Canada Inc.
27) The description in the table design window is used for ________. A) additional data type information B) formatting fields C) documentation D) setting properties E) additional field name information Answer: C Diff: 2 Type: MC Page Ref: 178 Topic: Q1 Skill: RECALL 28) In Access, entities are called ________. A) columns B) rows C) fields D) tables E) queries Answer: D Diff: 2 Type: MC Page Ref: 178 Topic: Q1 Skill: RECALL 29) A report ________ can be used to create a report. A) wizard B) queries C) tables D) modules E) forms Answer: A Diff: 1 Type: MC Page Ref: 190 Topic: Q5 Skill: RECALL 30) The ________ keyword tells Access to present the text data in alphabetical order. A) order B) table C) plus D) red E) Ascending Answer: E Diff: 3 Type: MC Page Ref: 187 Topic: Q4 Skill: APPLIED
6 Copyright © 2016 Pearson Canada Inc.
31) Access displays the ________of a field as help text on forms. A) description B) data type C) name D) colour E) attribute Answer: A Diff: 3 Type: MC Page Ref: 178 Topic: Q1 Skill: RECALL 32) ________ is one of many reserved words in the Access environment. A) "Value" B) "Data" C) "Colour" D) "Name" E) "Variable" Answer: D Diff: 3 Type: MC Page Ref: 180 Topic: Q1 Skill: RECALL 33) It is possible to create a primary key composed of ________ columns or fields. A) relational B) linked C) number D) multiple E) text Answer: D Diff: 3 Type: MC Page Ref: 180 Topic: Q1 Skill: APPLIED 34) The key icon can be found in the ________ tab ribbon. A) Design B) Create C) Datasheet D) Home E) Database Tools Answer: A Diff: 2 Type: MC Page Ref: 180 Topic: Q1 Skill: RECALL
7 Copyright © 2016 Pearson Canada Inc.
35) In an ________ field, Access creates values for the user. A) number B) hyperlink C) long integer D) text E) Autonumber Answer: E Diff: 3 Type: MC Page Ref: 181 Topic: Q1 Skill: APPLIED 36) In a query of two or more tables Access will show A) all the relevant records in both/all tables. B) only records in the parent table. C) only records that have matching values in all the tables. D) only records that do not have matching records in all the tables. E) every record in one table joined to each record in the other table. Answer: C Diff: 3 Type: MC Page Ref: 187 Topic: Q4 Skill: RECALL 37) To create a data entry form in Access, you can use the default table display or you can use the form ________. Answer: generator Diff: 2 Type: SA Page Ref: 184 Topic: Q3 Skill: RECALL 38) Database forms allow the users to view, add, update or ________ data in the underlying tables. Answer: delete Diff: 1 Type: SA Page Ref: 185 Topic: Q3 Skill: RECALL 39) To run a ________ click on the red exclamation point labeled Run. Answer: query Diff: 1 Type: SA Page Ref: 187 Topic: Q5 Skill: RECALL
8 Copyright © 2016 Pearson Canada Inc.
40) MS Access makes it easy to generate database queries by providing an easy-to-use ________ that generates SQL statements automatically. Answer: graphical interface Diff: 2 Type: SA Page Ref: 187 Topic: Q4 Skill: RECALL 41) In order to execute a query in MS Access, create the query and then click on the ________ icon. Answer: exclamation mark Diff: 2 Type: SA Page Ref: 187 Topic: Q4 Skill: RECALL 42) Forms allow a user to view and maintain the ________ in a database. Answer: data Diff: 2 Type: SA Page Ref: 185 Topic: Q3 Skill: RECALL 43) Queries in Access are translated into ________ by the query graphical interface. Answer: SQL Diff: 2 Type: SA Page Ref: 187 Topic: Q4 Skill: RECALL 44) Access provides a graphical ________ for creating queries. Answer: user interface Diff: 2 Type: SA Page Ref: 187 Topic: Q4 Skill: RECALL 45) To create a report from two tables you can use the ________. Answer: Report Wizard Diff: 2 Type: SA Page Ref: 190 Topic: Q5 Skill: RECALL 46) In a form you can ________ over any data you wish to change. Answer: type Diff: 2 Type: SA Page Ref: 186 Topic: Q3 Skill: RECALL
9 Copyright © 2016 Pearson Canada Inc.
47) What are data entry forms used for and how are they created in MS Access? Answer: In order to help users view the data and update it by entering new data, making changes, and deleting data, there are a variety of form options in Access. First, by clicking on the table itself in the Object Window, users can then view and modify data directly in the table. Another way is to use the Form Wizard in Access to guide you through the creation of a more customized form. There is also a form editor that will give developers even more control over the look and feel and content on the form. Diff: 3 Type: ES Page Ref: 185 Topic: Q3 Skill: RECALL 48) Why are queries so useful and how are they created in MS Access? Answer: Creating database queries shows the true power of relational databases. Queries can be used to make powerful calculations and link up large amounts of data in multiple tables in creative ways that will help users. MS Access helps novice users to learn how to make queries by using its graphic interface, called Query By Example (QBE). This tool provides a grid for users to click and drag the fields they want. Then it converts the QBE information into SQL commands for execution. For more advanced users, Access provides a SQL editor tool which allows developers to write and edit queries directly in SQL. It is helpful sometimes to work through the logic of more complex queries. In Access it is simple to go back and forth between the QBE editor and the SQL editor. Diff: 3 Type: ES Page Ref: 187 Topic: Q4 Skill: RECALL 49) What are reports used for and how are they created in MS Access? Answer: Reports allow users to place summarized data either from tables or queries on paper in creative formats. They allow users to communicate better and turn data into information. In Access reports are best made by using the report wizard which allows users to build reports from 2 or more tables or queries. In many instances reports are built from queries, putting them into well formatted printouts. Diff: 3 Type: ES Page Ref: 190 Topic: Q5 Skill: RECALL
10 Copyright © 2016 Pearson Canada Inc.
Experiencing MIS, Cdn. Ed., 4e (Kroenke) Application Extension 10a Introduction to Microsoft Project 1) MS Project is a full-service project management process software. Answer: TRUE Diff: 1 Type: TF Page Ref: 334 Topic: Q1 Skill: RECALL 2) MS Project is best describes as a spreadsheet product. Answer: FALSE Diff: 2 Type: TF Page Ref: 334 Topic: Q1 Skill: RECALL 3) Project provides a variety of screens to capture the full picture of the project. Answer: TRUE Diff: 1 Type: TF Page Ref: 334 Topic: Q1 Skill: RECALL 4) It is not difficult to show all aspects of a project in a single screen. Answer: FALSE Diff: 2 Type: TF Page Ref: 334 Topic: Q1 Skill: RECALL 5) The resource view shows all the tasks associated with a project and how long they are expected to last. Answer: FALSE Diff: 2 Type: TF Page Ref: 335 Topic: Q1 Skill: RECALL 6) You can create subtasks within the tasks of a project. Answer: TRUE Diff: 1 Type: TF Page Ref: 337 Topic: Q2 Skill: RECALL 7) You need to create dependencies when one task can not be completed until another task has been completed. Answer: TRUE Diff: 2 Type: TF Page Ref: 337 Topic: Q2 Skill: RECALL 1 Copyright © 2016 Pearson Canada Inc.
8) Dependent tasks are either predecessors or successors. Answer: TRUE Diff: 2 Type: TF Page Ref: 337 Topic: Q2 Skill: RECALL 9) Dependencies are reflected in the Gantt chart screen. Answer: TRUE Diff: 2 Type: TF Page Ref: 337 Topic: Q2 Skill: RECALL 10) The resource sheet allows you to enter people that will be working on a project to the project. Answer: TRUE Diff: 2 Type: TF Page Ref: 340 Topic: Q3 Skill: RECALL 11) Resources cannot be added to the tasks shown in the Gantt chart. Answer: FALSE Diff: 2 Type: TF Page Ref: 341 Topic: Q3 Skill: RECALL 12) The resource usage view would allow a project manager to better control resources like overtime. Answer: TRUE Diff: 2 Type: TF Page Ref: 343 Topic: Q3 Skill: RECALL 13) MS Project allows a project manager to control resources. Answer: TRUE Diff: 2 Type: TF Page Ref: 340 Topic: Q3 Skill: RECALL 14) MS Project allows a project manager to create tasks. Answer: TRUE Diff: 1 Type: TF Page Ref: 336 Topic: Q2 Skill: RECALL
2 Copyright © 2016 Pearson Canada Inc.
15) A Tracking Gantt allows a project manager to track the progress of a project against a baseline. Answer: TRUE Diff: 2 Type: TF Page Ref: 335 Topic: Q2 Skill: RECALL 16) MS Project is best described as a ________ product. A) spreadsheet B) database C) presentation D) scheduling E) calendar Answer: B Diff: 1 Type: MC Page Ref: 334 Topic: Q1 Skill: RECALL 17) MS Project stores information about A) budgets, resources, and employee SINs. B) resources, tasks, and customer buying history. C) tasks, resources, and work contracts. D) schedules, emails, and budgets. E) budgets, resources, and tasks. Answer: E Diff: 2 Type: MC Page Ref: 334 Topic: Q1 Skill: RECALL 18) The default view of MS Project is the A) resource sheet. B) tasks view. C) budgets view. D) resource usage view. E) Gantt chart view. Answer: E Diff: 2 Type: MC Page Ref: 334 Topic: Q1 Skill: RECALL
3 Copyright © 2016 Pearson Canada Inc.
19) When you create subtasks the tasks associated with those subtasks automatically get A) the duration of the longest subtask. B) the dependencies of the subtasks. C) the total of the subtasks' durations. D) the subtasks' ancestors. E) the predecessors of the subtasks. Answer: A Diff: 3 Type: MC Page Ref: 337 Topic: Q2 Skill: RECALL 20) The ________ is located on the far left hand side of the screen. A) quick navigator B) resource sheet C) project window D) navigator E) project navigator Answer: A Diff: 2 Type: MC Page Ref: 340 Topic: Q3 Skill: RECALL 21) MS Project is a full-service project management software because it focuses on A) organizing tasks. B) providing access to project documentation. C) managing schedules. D) tracking employee hours. E) providing support for the project management process. Answer: E Diff: 3 Type: MC Page Ref: 334 Topic: Q1 Skill: APPLIED 22) In the Gantt chart the arrows that point to the bars indicate A) incomplete tasks. B) activities. C) resources. D) dependencies between activities. E) complete tasks. Answer: D Diff: 2 Type: MC Page Ref: 335 Topic: Q1 Skill: RECALL
4 Copyright © 2016 Pearson Canada Inc.
23) In the resource view you see ________ available to the project. A) people B) equipment C) information technology D) money E) facilities Answer: A Diff: 2 Type: MC Page Ref: 335 Topic: Q1 Skill: RECALL 24) The resource usage view allows the project manager to check A) projected versus actual costs. B) time to completion. C) all of the tasks. D) all of the subtasks. E) expected work date and hours for an employee. Answer: E Diff: 2 Type: MC Page Ref: 335 Topic: Q1 Skill: RECALL 25) All project management begins with A) an annual budget. B) an understanding of project management. C) an understanding of the scheduling application. D) an understanding of the tasks that need to be accomplished. E) availability of resources. Answer: D Diff: 2 Type: MC Page Ref: 336 Topic: Q2 Skill: RECALL 26) Subtasks are created and undone using the ________ keys. A) ctrl B) arrow C) alt D) tab E) shift Answer: D Diff: 2 Type: MC Page Ref: 337 Topic: Q2 Skill: RECALL
5 Copyright © 2016 Pearson Canada Inc.
27) A predecessor is a A) task that must happen at the same time as another task. B) resource that must be used before another resource. C) task that must happen before another task. D) task that must happen after another task. E) view in MS Project. Answer: C Diff: 1 Type: MC Page Ref: 337 Topic: Q2 Skill: RECALL 28) Dependencies are crucial for A) scheduling tasks. B) creating predecessors. C) creating successors. D) creating meaningful schedules. E) scheduling resources. Answer: E Diff: 2 Type: MC Page Ref: 335 Topic: Q1 Skill: APPLIED 29) The data entry in the resource sheet is the same as for the A) calendar. B) resource usage sheet. C) tracking Gantt chart. D) task usage sheet. E) Gantt chart. Answer: E Diff: 2 Type: MC Page Ref: 340 Topic: Q3 Skill: RECALL 30) MS Project is a full-service ________ process software. Answer: project management Diff: 1 Type: SA Page Ref: 334 Topic: Q1 Skill: RECALL 31) MS Project is best described as a(n) ________ product. Answer: database Diff: 2 Type: SA Page Ref: 334 Topic: Q1 Skill: RECALL
6 Copyright © 2016 Pearson Canada Inc.
32) It is ________ to show all the aspects of a project in a single screen. Answer: difficult Diff: 2 Type: SA Page Ref: 334 Topic: Q1 Skill: RECALL 33) ________ happens when some tasks cannot be completed until other tasks are completed. Answer: Dependency Diff: 3 Type: SA Page Ref: 337 Topic: Q2 Skill: RECALL 34) Dependencies are reflected in the ________ screen. Answer: Gantt chart Diff: 2 Type: SA Page Ref: 335 Topic: Q2 Skill: RECALL 35) MS Project allows a project manager to ________ resources. Answer: control Diff: 2 Type: SA Page Ref: 340 Topic: Q3 Skill: RECALL 36) All project management begins with an understanding of the ________ that need to be accomplished. Answer: tasks Diff: 2 Type: SA Page Ref: 336 Topic: Q2 Skill: RECALL 37) MS Project is a sophisticated relational ________ that stores information about tasks, resources, schedules, baselines, and budgets. Answer: database Diff: 2 Type: SA Page Ref: 336 Topic: Q1 Skill: RECALL 38) Task duration times are based on the time needs of ________. Answer: subtasks Diff: 3 Type: SA Page Ref: 336 Topic: Q2 Skill: RECALL
7 Copyright © 2016 Pearson Canada Inc.
39) The resource usage view shows how active each of your ________ will be over the course of the project. Answer: project members Diff: 2 Type: SA Page Ref: 341 Topic: Q3 Skill: RECALL 40) Why is MS Project considered a full-service product? Answer: It provides strong support for the project management process. It has a large number of tools to manage projects and is able to store and show information about tasks, resources, schedules, baselines, and budgets. It also has screens that focus on one or two specific aspects of projects at a time. Diff: 3 Type: ES Page Ref: 334 Topic: Q1 Skill: RECALL 41) What is the advantage of using a Gantt chart? Answer: A Gantt chart lists all the tasks associated with projects along with the sub tasks associated with each task. It includes task durations and a calendar of tasks based on on the duration of the sub tasks and the resources used in the sub tasks. A Gantt chat allows one to see the tasks that are happening and how much further the project has to go before completion. Diff: 3 Type: ES Page Ref: 335 Topic: Q1 Skill: APPLIED 42) What is a dependency between two tasks? Answer: Dependency happens when one task can not be completed until other tasks are completed. One task becomes a predecessor and the other the successor. Diff: 3 Type: ES Page Ref: 335 Topic: Q1 Skill: RECALL
8 Copyright © 2016 Pearson Canada Inc.