CIS Information Security Flashcards
Unlock all answers in this set
Unlock answersquestion
What are the different types of information?
answer
Levels, formats, granularities
question
Which of the following represents the different information levels?
answer
Individual, department, enterprise
question
Which of the following represents the different information formats?
answer
Document, presentation, spreadsheet, database
question
Which of the following represents the different information granularities?
answer
Detail, summary, aggregate
question
All of the following are characteristics of information except:
answer
Quantity/ The qualities are Transactional,Anylitical,Timeliness
question
What encompasses all of the information contained within a single business process or unit of work and its primary purpose is to support the performance of daily operational tasks?
answer
Transactional information
question
Which of the following is an example of transactional information?
answer
Withdrawing cash from an ATM,Making an airline reservation, Purchasing stock, All of these
question
What encompasses all organizational information and its primary purpose is to support the performance of managerial analysis tasks?
answer
Analytical information
question
Which of the following is an example of transactional information?
answer
Purchasing stocks
question
What is immediate, up-to-date information?
answer
Real-time information
question
What provides real-time information in response to requests?
answer
Real-time systems
question
What is one of the biggest pitfalls associated with real-time information?
answer
It continually changes.
question
Which of the following is not one of the five characteristics common to high-quality information?
answer
Quantity
question
Which of the following implies that aggregate or summary information is in agreement with detailed information?
answer
Consistency
question
Which of the following implies that information is current with respect to the business requirement?
answer
Timeliness
question
What is it called when each transaction, entity, and event is represented only once in the information?
answer
Uniqueness
question
What is a real-time system?
answer
Provides real-time information in response to requests.
question
Organizational information comes at different levels and in different formats and granularities.
answer
TRUE
question
Reports for each salesperson, product, and part are examples of detailed, or fine, information granularities.
answer
TRUE
question
Purchasing stocks is an example of analytical information.
answer
FALSE--Purchasing stocks is an example of transactional information.
question
Transactional information is used when performing operational tasks and repetitive decisions, such as analyzing daily sales reports and production schedules to determine how much inventory to carry.
answer
TRUE
question
Timely information must be up-to-the-second to be accurate.
answer
FALSE--Real-time information can change for each business decision. Some decisions require weekly information, while others require daily information.
question
Which of the following types of information can be found in a database?
answer
Inventory, Transactions, Employees, All of these
question
In the relational database model, what is a person, place, thing, transaction, or event about which information is stored?
answer
Entity
question
In the relational database model, what is a characteristic or property of an entity?
answer
Attribute
question
What are characteristics or properties of an entity called?
answer
Attributes, Fields, Columns, All of these
question
Why do relational databases use primary keys and foreign keys?
answer
To create logical relationships.
question
What is a primary key?
answer
A field (or group of fields) that uniquely identifies a given record in a table.
question
What is a foreign key?
answer
A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
question
All of the following are advantages of database-stored information except:
answer
Increased information redundancy- The actual advantages are Increased flexibility, Increased performance, Increased information integrity
question
Which of the following is incorrect in reference to a database?
answer
Information is accessed by physical structure.
question
What is the physical view of information?
answer
Deals with the physical storage of information on a storage device such as a hard disk.
question
Which of the following is correct in reference to a database?
answer
A database can support many logical views.
question
What refers to how well a system can adapt to increased demands?
answer
Scalability
question
Which of the following measures how quickly a system performs a certain process or transaction?
answer
Performance
question
What is information redundancy?
answer
Duplication of information, Storing the same information in multiple places, Storing duplicate information in multiple places., All of these-answer.
question
What is a problem with redundant information?
answer
It is difficult to determine which values are the most current, It is often inconsistent., , It is difficult to determine which values are the most accurate. All of these.
question
Which of the following is true in regard to eliminating redundant information?
answer
Improves information quality.
question
What are the rules that help ensure the quality of information?
answer
Integrity constraints
question
What are the rules that enforce basic and fundamental information-based constraints
answer
Relational integrity constraints
question
Which of the following is a valid type of integrity constraint?
answer
Business-critical integrity constraint
question
What type of integrity constraint does not allow someone to create an order for a nonexistent customer?
answer
Relational integrity constraint
question
All of the following are relational integrity constraints EXCEPT:
answer
Answer: The system will not allow returns of fresh produce after 15 days past delivery.: -The system will not allow an entry for an order for a nonexistent customer.,The system will not allow shipping a product to a customer who does not have a valid address.,, The system will not allow shipping a nonexistent product to a customer.
question
What is an interactive website kept constantly updated and relevant to the needs of its customers through the use of a database?
answer
Data-driven website
question
What type of website is best to build for a general informational website with static information?
answer
Static website
question
What type of website is best to build for a continually changing information, including press releases, new product information, and updated pricing?
answer
Data-driven website
question
Which of the following is not an advantage of building a data-driven website?
answer
Minimizes or reduces efficiency.
question
What is a forward integration?
answer
Takes information entered into a given system and sends it automatically to all downstream systems and processes.
question
What is a backward integration?
answer
Takes information entered into a given system and sends it automatically to all upstream systems and processes.
question
What is an integration?
answer
Allows separate systems to communicate directly with each other.
question
A foreign key is a field (or group of fields) that uniquely identifies a given record in a table.
answer
FALSE- A primary key is a field (or group of fields) that uniquely identifies a given record in a table.
question
One of the advantages found in a relational database is increased information redundancy.
answer
FALSE--Relational databases reduce information redundancy, not increase information redundancy.
question
Relational integrity constraints are rules that enforce basic and fundamental information-based constraints.
answer
TRUE
question
A data-driven website is an interactive website kept constantly updated and relevant to the needs of its customers through the use of a database.
answer
TRUE
question
Ideally, an organization wants to build only forward integrations.
answer
FALSE- Ideally, an organization wants to build both forward and backward integrations.
question
A data warehouse is a _________ collection of information - gathered from many different ___________ databases - that supports business-analysis activities and decision-making tasks.
answer
logical; operational
question
All of the following are reasons why operational systems are not appropriate for business analysis except:
answer
Operational systems are integrated.
question
Which of the following describes ETL?
answer
A process that extracts information from internal and external databases, A process that transforms information using a common set of enterprise definitions, A process that loads information into a data warehouse. All of these.
question
What is data mining?
answer
Process of analyzing data to extract information not offered by the raw data alone.
question
What does the Data Warehousing Institute estimate that low-quality information costs U.S. businesses annually?
answer
$600 billion
question
When does information cleansing occur in the data warehouse?
answer
During the ETL process and once it is in the data warehouse.
question
Which of the following statements is true regarding customer information?
answer
Customer information can exist in several operational systems, Customer information in each operational system could change, Customer information in each operational system can be different, All of these
question
Which of the following occurs during data cleansing?
answer
Clean missing records, Clean redundant records, Clean inaccurate data, All of these
question
Which of the following statements is true?
answer
The more complete and accurate an organization wants to get its information, the more it costs.
question
What is information that people use to support their decision-making efforts?
answer
Business intelligence
question
Which of the following does not draw a parallel between the challenges in business and the challenges of war?
answer
Accurate and complete information.
question
Why is Ben & Jerry's using business intelligence?
answer
To improve quality.
question
Why is Noodles & Company using business intelligence?
answer
To improve financial analysis.
question
Why would a business use a data warehouse that offers strategic level, external, integrated, and historical information?
answer
Identify trends, Make projections, Decide key business issues, All of these.
question
What is the primary purpose of a data warehouse?
answer
To aggregate information throughout an organization into a single repository in such a way that employees can make decisions and undertake business analysis activities.
question
Lands' End created an organization-wide data warehouse so all its employees could access organizational information. Lands' End soon found out that there could be "too much of a good thing." Many of its employees would not use the data warehouse, because it was simply too big, too complicated, and had too much irrelevant information. Lands' End knew there was valuable information in its data warehouse, and it had to find a way for its employees to easily access the information. What was Lands' End's solution?
answer
Build a data mart.
question
A relational database contains information in a series of two-dimensional tables. How is data contained in a data warehouse and data mart?
answer
Information is multidimensional, meaning it contains layers of columns and rows.
question
What is a dimension?
answer
A particular attribute of information.
question
A dimension is a particular attribute of information. Each layer in a data warehouse or data mart represents information according to an additional dimension. What is the common term for the representation of multidimensional information?
answer
Cube
question
Achieving perfect information is almost impossible. The more complete and accurate an organization wants its information to be, the more it costs. Which two variables are used to determine the trade-off for perfect information?
answer
Accuracy versus completeness.
question
Which of the following is not one of the parallels between challenges in business and those of war?
answer
Using tactical business intelligence
question
What is the primary problem most organizations face today concerning information?
answer
Data rich, information poor
question
What types of BI decisions include predicting sales, determining correct inventory levels, and distribution schedules among outlets, and loss prevention?
answer
Retail and sales BI decisions
question
What types of BI decisions include forecasting levels of bad loans and fraudulent credit card use, credit card spending by new customers, and which kinds of customers will best respond to new loan offers?
answer
Banking BI decisions
question
What types of BI decisions include forecasting claim amounts and medical coverage costs, classifying the most important elements that affect medical coverage; predicting which customers will buy new insurance policies?
answer
Insurance BI decisions
question
Which of the following can use BI to make informed decisions?
answer
Law enforcement industry, Airline industry, Broadcasting industry, All of these
question
Which of the following can use BI to make informed decisions?
answer
All of these
question
The primary purpose of a data warehouse is to perform transactional processes.
answer
FALSE-The primary purpose of a data warehouse is to perform analytical processes.
question
Extraction, transformation, and loading is a process that extracts information from internal databases, transforms the information using a common set of enterprise definitions, and loads the information into an external database.
answer
FALSE--Extraction, transformation, and loading is a process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse
question
A dimension is a particular attribute of information.
answer
TRUE
question
The Data Warehousing Institute estimates that low-quality information costs U.S. businesses $60 billion annually.
answer
FALSE--The Data Warehousing Institute estimates that low-quality information costs U.S. businesses $600 billion annually.
question
The data warehouse is a location for all of a business's information.
answer
FALSE--The data warehouse is not a location for all of a business's information.
question
Which of the following is not a reason for the growth of decision-making information systems?
answer
People no longer have to worry about protecting the corporate asset of organizational information.
question
What can a model accomplish?
answer
Calculate risks, Understand uncertainty, Manipulate time, All of these
question
Which of the following is a quantitative model typically used by a DSS?
answer
Sensitivity analysis, What-if analysis, Goal-seeking analysis, All of these
question
What is the study of the effect that changes in one (or more) part of the model has on other parts of the model?
answer
Sensitivity analysis
question
What finds the inputs necessary to achieve a goal, such as a desired level of output?
answer
Goal-seeking analysis
question
What is consolidation?
answer
Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information.
question
What is drill-down capability?
answer
Enables users to get details, and details of details, of information.
question
What is slice-and-dice capability?
answer
The ability to look at information from different perspectives.
question
What integrates information from multiple components and tailors the information to individual preferences?
answer
Digital dashboard
question
What are various commercial applications of artificial intelligence called?
answer
Intelligent systems
question
What is a category of AI that attempts to emulate the way the human brain works?
answer
Neural network
question
Which of the following is the most commonly used form of AI in the business arena?
answer
Expert system
question
What is a special-purpose, knowledge-based information system that accomplishes specific tasks on behalf of its users?
answer
Intelligent agent
question
What is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem?
answer
Genetic algorithm
question
Which of the following represents the top-down (executives to analysts) organizational levels of information technology systems?
answer
EIS, DSS, TPS
question
Which of the following is an incorrect enterprise view of information technology?
answer
Processing is OLTP for executives and OLAP for analysts.
question
Which of the following is a type of transaction processing system?
answer
Order processing
question
Which of the following is a type of decision support system?
answer
Manufacturing
question
Which system differentiates an executive information system from a decision support system and a transaction processing system?
answer
Stock market information system
question
A genetic algorithm is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem
answer
TRUE
question
The ultimate goal of AI is to build a system that can mimic human intelligence.
answer
TRUE
question
Sensitivity analysis, what-if analysis, and market-basket analysis are the three quantitative models typically used by a DSS.
answer
FALSE-Sensitivity analysis, what-if analysis, and goal-seeking analysis are the three quantitative models typically used by a DSS.
question
Consolidation, drill-down, and slice-and-dice are the three most common capabilities offered in an EIS.
answer
TRUE
question
A shopping bot is one of the simplest examples of an intelligent agent.
answer
TRUE
question
Future managers and workers need to understand the benefits MIS and ebusiness can offer a company, if it wants to take advantage of sustaining technologies.
answer
FALSE--Future managers and workers need to understand the benefits MIS and ebusiness can offer a company, if it wants to take advantage of disrupting technologies.
question
Examples of ebusiness advantages include opening new markets, reducing costs, and expanding global reach.
answer
TRUE
question
Intermediaries occur when a customer sells directly to another customer online, cutting out the intermediary.
answer
FALSE--Disintermediation occurs when a business sells direct to the customer online and cuts out the intermediary.
question
Interactivity measures advertising effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, number of pages viewed, and number of repeat visits to the advertisement.
answer
TRUE
question
Disruptive technology tends to provide us with better, faster, and cheaper products.
answer
FALSE--Sustaining technology tends to provide us with better, faster, and cheaper products.
question
Disruptive and new technologies typically cut into the low end of the marketplace and eventually evolve to displace high-end competitors and their reigning technologies.
answer
TRUE
question
Dell Inc. ranks highest on the list for expecting returns from new investments.
answer
TRUE
question
Information reach refers to the number of people a business can communicate with, on a global basis.
answer
TRUE
question
What is best for an organization's current business could ruin it in the long term.
answer
TRUE
question
Ebusiness is the buying and selling of goods and services over the Internet.
answer
FALSE--Ecommerce is the buying and selling of goods and services over the Internet.
question
Ebusiness is something that a business can just go out and buy.
answer
FALSE--Ebusiness is not something that a business can just go out and buy
question
Which of the following terms implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction?
answer
Digital Darwinism
question
Which of the following produces an improved product, customers are eager to buy, such as a faster car or larger hard drive?
answer
Sustaining technology
question
Which of the following represents a form of disruptive technology?
answer
All of these are included.
question
Which of the following is a challenge of sustaining technology?
answer
Provides a product that does not meet existing customers' future needs.
question
Which of the following is not included in the top five companies that are expecting future growth to be generated from new investments?
answer
Sears
question
The Innovator's Dilemma suggests that established companies can take advantage of ___________ without hindering existing relationships with customers, partners, and stakeholders.
answer
disruptive technologies
question
Which of the following began as an essential emergency military communications system operated by the U.S. Department of Defense Advanced Research Project Agency (DARPA)?
answer
Internet
question
Which of the following terms could you use synonymously when referring to the web?
answer
URL, domain name
question
At a local marketing firm, Steve is the lead web developer and is responsible for working with customers on their web designs, development, and graphics. Which of the following would be a critical skill Steve must have to be able to perform his job?
answer
Understanding that he must create a unique domain name for each client, Being able to work with HTML, Understanding the World Wide Web and how hyperlinks work, All of these.
question
Which of the following is not a reason for the explosive growth of the WWW?
answer
Digital Darwinism.
question
Which term describes the WWW during its first few years of operation between 1991 and 2003?
answer
Web 1.0
question
What is the difference between ecommerce and ebusiness?
answer
Ecommerce is buying and selling of goods or service online. Ebusiness includes ecommerce and all activities related to internal and external business operations.
question
What is the Internet protocol web browsers use to request and display web pages using universal resource locators?
answer
Hypertext transport protocol (HTTP)
question
What allows users to access the WWW?
answer
Web browser
question
Which of the following are types of web browsers?
answer
Internet Explorer and Mozilla's Firefox
question
What caused Polaroid to go bankrupt?
answer
One-hour film processing and digital cameras stole its market share.
question
Many social media sites today allow you to customize your web address, for example, www.facebook.com/Womenwithdrive. What is an alternate name for a web address such as www.apple.com?
answer
Universal resource locator
question
Many industries have been forced to change due to technology advances. Which of the below industries has felt the lowest amount of economic impact from ebusiness?
answer
Waste or recycling industry
question
Universities were among some of the first users of the Internet. What was the Internet first called?
answer
ARPANET
question
Both individuals and organizations have embraced ebusiness to do which of the following?
answer
Enhance productivity, Maximize convenience, Improve communications, All of these.
question
What is the depth and breadth of details contained in a piece of textual, graphic, audio, or video?
answer
Information richness
question
What measures the number of people a firm can communicate with all over the world?
answer
Information reach
question
Which of the below would not be considered an advantage of ebusiness?
answer
Reducing information reach.
question
What is the ability of an organization to tailor its products or services to the customers' specifications?
answer
Mass customization
question
Which of the below would not be considered a company operating in the long tail of a typical sales curve?
answer
Walmart
question
M&M's offers people the opportunity to order the candy in special colors or with customized sayings. How would you classify M's ebusiness strategy?
answer
Mass customization
question
Amazon creates a unique recommendation listing for each customer that revisits its website. How would you classify Amazon's ebusiness strategy?
answer
Personalization
question
Netflix creates a unique recommendation listing for each customer that revisits its website. How would you classify Netflix's ebusiness strategy?
answer
Personalization
question
Nike offers people the opportunity to visit its website to create running shoes in the style and color they choose. How would you classify Nike's ebusiness strategy?
answer
Mass customization
question
What uses the Internet to reassemble buyers, sellers, and other partners in a traditional supply chain in new ways?
answer
Reintermediation
question
When evaluating the business value of disintermediation, the more ____________ that are cut from the distribution chain, the lower the product price.
answer
intermediaries
question
What type of mediation refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness?
answer
Cybermediation
question
A company can reduce its costs by using ebusiness to change its business processes. Which of the following does not represent an example of how a company can reduce its costs through ebusiness?
answer
Researching products to find the lowest price and visiting the store to purchase the item.
question
Which of the below statements is correct?
answer
Just putting up a website does not create an ebusiness.
question
What is the exact pattern of a consumer's navigation through a site?
answer
Clickstream data
question
What is the best way to measure a company's ebusiness success?
answer
Effective MIS metrics, Interactivity, Clickstream data , All of these
question
Which of the following is an ebusiness marketing technique?
answer
Cookies, Pop-up ad, Banner ad, All of these
question
Which type of ebusiness marketing technique induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message's visibility and effect?
answer
Viral marketing
question
Bonnie Flat is a real estate agent who specializes in the luxury home market in the Seattle, Washington area. Bonnie is highly technical and uses many online marketing techniques to increase business. One of the most successful online marketing techniques is to place a box along the top of real estate websites and luxury custom furniture websites. What type of marketing technique is Bonnie using?
answer
A banner ad
question
What is the business strategy that lets a company shorten the order process and add value with reduced costs or a more responsive and efficient service, and occurs when a business sells directly to the customer online?
answer
Disintermediation
question
What measures the number of people a firm can communicate with all over the world?
answer
Information reach
question
Which of the following is an example of a clickstream data metric?
answer
Dates and times of visits, Number of customers with shopping carts, The number of page views, All of these
question
What does digital Darwinism imply?
answer
Organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.
question
Which of the following is an example of a disruptive technology?
answer
Oracle's database software, Sony's transistor-based consumer electronics (transistor radio), Intel's low-end microprocessors, All of these
question
Which of the following is an example of a sustaining technology?
answer
Porsche's faster car
question
Which company is expected to gain the majority of its returns on existing investments?
answer
Phillips Petroleum
question
Which company is expected to gain the majority of its returns on new investments?
answer
Dell
question
Which of the following is a reason for the growth of the World Wide Web?
answer
The microcomputer revolution, Advancements in networking hardware., Web pages being easy to create and flexible., All of these.
question
What is information richness?
answer
The depth and breadth of details contained in a piece of textual, graphic, audio, or video information.
question
What is information reach?
answer
Measures the number of people a firm can communicate with all over the world.
question
What are agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together?
answer
Intermediaries
question
What occurs when a business sells directly to the customer online and cuts out the middle man?
answer
Disintermediation
question
What occurs when steps are added to the value chain as new players find ways to add value to the business process?
answer
Reintermediation
question
What refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Kelkoo and bank account aggregation services such as Citibank?
answer
Cybermediation
question
Websites sometimes deposit on a customer's hard drive a small file containing information about the customer and the customer's web activities. What is that small file called?
answer
Cookie
question
What is the name for a small ad on one website that advertises the products and services of another business, usually another dot-com business?
answer
Banner ad
question
All of the following are types of website visitors except:
answer
Usability visitor----------------Unidentified visitor, Identified visitor, Unique visitor
question
What category of website metrics does stickiness, or visit duration time, belong to?
answer
Visit metric
question
Which type of metric measures when a visitor reaches a website and their computer sends a request to the site's computer server to begin displaying pages?
answer
Hit metric
question
What occurs when a website can know enough about a person's likes and dislikes that it can fashion offers that are more likely to appeal to that person?
answer
Personalization
question
What occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave?
answer
Paradigm shift
question
A click-and-motor business operates on the Internet only, without a physical store.
answer
FALSE-This is the definition of a pure-play (virtual) business, which operates on the Internet only, without a physical store.
question
The majority of eBay's customers are using a business-to-business (B2B) ebusiness model.
answer
FALSE--The majority of eBay's customers are using a consumer-to-consumer (C2C) ebusiness model.
question
Taxonomy is the set of ideas about how all information in a given context should be organized.
answer
FALSE--Information architecture is the set of ideas about how all information in a given context should be organized.
question
A webinar is a form of web conferencing which blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants.
answer
TRUE
question
Many businesses are using instant messaging as a way to answer simple questions quickly and easily.
answer
TRUE
question
Managing consumer trust is not a challenge for ebusiness participants, as the Internet has numerous security technologies in place to completely protect consumers and their online transactions.
answer
FALSE--Managing consumer trust is a challenge facing ebusinesses.
question
The Internet marketplace is free of most forms of traditional sales tax.
answer
TRUE
question
The Internet uses such strong security technologies that ensuring consumer protection is not a challenge for ebusinesses.
answer
FALSE--Ensuring consumer protection is an ebusiness challenge.
question
Content providers are companies that generate revenue by providing digital content, such as news, music, photos, or videos. Examples include Netflix and iTunes.
answer
TRUE
question
Transaction brokers process online sales transactions.
answer
TRUE
question
An ebusiness model is a plan that details how a company creates, delivers, and generates revenues on the Internet.
answer
TRUE
question
Business-to-consumer applies to any business that sells its products or services directly to consumers online.
answer
TRUE
question
What is the difference between a business model and an ebusiness model?
answer
A business model details how a company creates, delivers, and generates revenue. An ebusiness model does all of the same except on the Internet.
question
What are the four main types of ebusiness models?
answer
Business-to-business, business-to-consumer, consumer-to-business, and consumer-to-consumer.
question
What is the difference between a B2C and a C2B?
answer
B2C focuses on business to consumers, and C2B focuses on consumers to business.
question
What is the ebusiness model that applies to customers offering goods and services to each other over the Internet?
answer
C2C
question
What is the ebusiness model that represents 80 percent of all online businesses and is typically more complex, requiring greater security needs?
answer
Business-to-business
question
Which of the following represents businesses buying from and selling to each other over the Internet?
answer
B2B
question
Carfax is an example of a company that sells its products or services directly to its consumers online. Which ebusiness model is Carfax using?
answer
B2C
question
What is another name for an eshop?
answer
Estore or etailer
question
Which category below represents the three common forms of business operations, brick-and-mortar, click-and-mortar, and pure play?
answer
B2C
question
John and Jenny have been saving for two years to take their six children on a vacation to Disneyworld. They are surprised to find out that airline tickets are far more expensive than they had anticipated. They decide to try to find cheaper tickets on Priceline, where they are allowed to set their own price they are willing to pay for the airline tickets. What form of ebusiness model are John and Jenny using?
answer
C2B
question
What type of revenue generation model is Google using when it generates revenue by allowing advertisers to bid on common search terms?
answer
Adwords
question
What is a business that operates in a physical store without an Internet presence?
answer
Brick-and-mortar business
question
What is a pure-play business?
answer
A business that operates only on the Internet without a physical store.
question
What are the three primary models that a B2C business can use to operate?
answer
Brick-and-mortar, click-and-mortar, virtual
question
Which type of ebusiness model is Amazon using?
answer
Pure-play
question
Which type of ebusiness model is Barnes and Noble using?
answer
Click-and-mortar
question
Which type of ebusiness model best describes Barnes & Noble?
answer
Click-and-mortar
question
What is a plan that details how a company creates, delivers, and generates revenues on the Internet?
answer
Ebusiness model
question
Which of the following represents a brick-and-mortar business?
answer
T.J. Maxx
question
All of the following are forms of ebusiness except ______________.
answer
subscription fee
question
Which of the below is not a valid form of ebusiness revenue model?
answer
Service provider-----------------------Examples of ebusiness revenue models are (1) advertising fees, (2) license fees, (3) subscription fees, (4) transaction fees, and (5) value-added services.
question
For the past 20 years, Perry has been an owner of several Coldwell Banker Real Estate franchises. To increase business Perry spends a great deal of money marketing and advertising his businesses online. Perry decides he would like to move beyond just marketing and create an actual ebusiness that acts like a search engine but focuses on only the real estate industry. The main revenue source for Perry's ebusiness will be a charge of $50 a month for each property that is listed on the website. What is the primary revenue model for Perry's new business?
answer
Subscription fees
question
Which of the following represents the connecting and communicating tools supporting and driving ebusiness?
answer
Email, instant messaging, podcasting, content management systems, and video conferencing, and web conferencing.
question
Which of the following represents the primary forms of ebusiness?
answer
Content providers, infomediaries, online marketplaces, portals, service providers, and transaction brokers.
question
Which of the following lists the primary ebusiness revenue models?
answer
Advertising fees, license fees, subscription fees, transaction fees, and value-added service fees.
question
Which of the following lists the categories for ebusiness models?
answer
B2B, B2C, C2C, and C2B.
question
What is an ISP?
answer
Internet service provider, a company that provides access to the Internet for a monthly fee.
question
Which of the below is not an ISP?
answer
Facebook
question
What occurs when a system updates information at the same rate it receives the information?
answer
Real-time communication
question
What is the primary business advantage of using email?
answer
Providing the ability to inform and communicate with many people simultaneously, immediately, and with ease.
question
What is another term for instant messaging?
answer
IMing
question
What is a service that enables instant or real-time communication between people?
answer
IMing
question
What are some of the immediate results businesses found from using instant messaging?
answer
Quickly identify which employees are at their computers, Easily hold simultaneous IM sessions with multiple people, Resolve questions or problems immediately, All of these.
question
What converts an audio broadcast for use by a digital music player?
answer
Podcasting
question
As a trainer for Exempla Healthcare, Tina is faced with many challenges to properly training her new hires. There are over 40 different locations where Exempla employees work across the Chicago metro area. Tina decides to implement some valuable ebusiness tools to help reduce traveling costs, increase speed, and provide flexibility for completing training sessions with all the new hires. Tina primarily uses PowerPoints and videos during her training modules. What is the most effective ebusiness tool for Tina to implement and accomplish all of her training goals?
answer
Webinar
question
Companies use __________ as marketing communication channels, discussing everything from corporate strategies to detailed product overviews.
answer
podcasting
question
Illuminate Live is a lecture program used in schools and is considered a(n) _________ tool.
answer
web conferencing
question
What is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website?
answer
Taxonomy
question
What is the set of ideas about how all information in a given context should be organized?
answer
Information architecture
question
Which of the below is not considered an advantage of a content management system?
answer
Content management systems increase order entry speed.
question
Which ebusiness tool increases the speed of business by allowing the transfer of documents with the same speed as the telephone?
answer
Email
question
What is the ebusiness tool that can increase marketing reach and build customer loyalty through audio broadcasting?
answer
Podcasting
question
Which ebusiness tool plays a crucial role in getting website visitors to view more than just the home page by providing clear navigation choices?
answer
CMS
question
Which of the following is a challenge facing an ebusiness?
answer
Managing Consumer Trust
question
What are the four challenges facing ebusinesses outlined in the text?
answer
Identifying limited market segments, managing consumer trust, ensuring consumer protection, and adhering to taxation rules.
question
Managing consumer trust is a challenge for ebusinesses. Which of the following is a good way to build trust when working with customers over the Internet?
answer
Be accessible to communicate in-person, Be available to communicate in-person, Use customer testimonials that link to your client website, All of these.
question
Internet marketers must develop ___________ to build strong relationships with customers to ensure loyalty.
answer
consumer trust
question
Ben Schultz decides to purchase an iPad on eBay. After the transaction completes and the money is withdrawn from Ben's PayPal account, the iPad never shows up and the email address of the seller bounces. What issue has Ben encountered?
answer
The physical separation of buyer and seller
question
Susan teaches many individuals and business professionals how and why to use social media, and the benefits and challenges to using social media. Of the four ebusiness challenges, which of the following is the most crucial challenge to consider before engaging in social media?
answer
Ensuring consumer protection
question
Many believe that U.S. tax policy should provide a level playing field for traditional retail businesses, mail-order companies, and online merchants. What form of ebusiness challenge is this statement referring to?
answer
Adhering to taxation rules
question
Which of the below statements is accurate when considering the ebusiness challenge of adhering to taxation rules?
answer
Some online companies have to charge sales tax.
question
What is a telecommunications system?
answer
Enables the transmission of data over public or private networks
question
What is a network?
answer
A communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together
question
What is a peer-to-peer network?
answer
Any network without a central file server and in which all computers in the network have access to the public files located on all other workstations
question
What is a client?
answer
A computer that is designed to request information from a server
question
What is designed to connect a group of computers in close proximity to each other such as in an office building, a school, or a home?
answer
Local area network
question
What spans a large geographic area, such as a state, province, or country?
answer
Wide area network
question
What is a large computer network usually spanning a city?
answer
Metropolitan area network
question
Which of the following is not one of the differentiating factors of a network?
answer
Telecommunication system
question
What runs a network, steering information between computers and managing security and users?
answer
Network operating system
question
What is a computer that is designed to request information from a server?
answer
Client
question
What occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer?
answer
Packet-switching
question
What is a router?
answer
An intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination
question
What is network topology?
answer
Refers to the geometric arrangement of the actual physical organization of the computers (and other network devices) in a network
question
What is a client/server network?
answer
A model for applications in which the bulk of the back-end processing, such as performing a physical search of a database, takes place on a server, while the front-end processing, which involves communicating with the users, is handled by the clients
question
What is packet-switching?
answer
Occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer
question
What is interoperability?
answer
The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
question
What is a protocol?
answer
A standard that specifies the format of data as well as the rules to be followed during transmission
question
Which of the following is not a network topology?
answer
Ethernet
question
Which of the following represents the bus topology?
answer
All devices are connected to a central cable or backbone
question
Which of the following represents the ring topology?
answer
All devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it
question
What allows files containing text, programs, graphics, numerical data, and so on to be downloaded off or uploaded onto a network?
answer
File transfer protocol (FTP)
question
What allows the management of networked nodes to be managed from a single point?
answer
Simple network management protocol (SNMP)
question
What is TCP/IP's own messaging system for email?
answer
Simple mail transfer protocol (SMTP)
question
What allows web browsers and servers to send and receive web pages?
answer
Hypertext transfer protocol (HTTP)
question
Which of the following is not a commonly used type of guided media?
answer
Transmission control protocol/Internet protocol
question
What refers to a type of cable composed of four (or more) copper wires twisted around each other within a plastic sheath?
answer
Twisted-pair cable
question
Which of the following represents the TCP/IP four-layer reference model?
answer
Application, transport, Internet, network interfaces
question
How many layers does the OSI model contain?
answer
Seven
question
What is interoperability?
answer
The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
question
File Transfer Protocol (FTP) allows files containing text, programs, graphics, numerical data, and so on to be downloaded off or uploaded onto a network.
answer
TRUE
question
Packet-switching is an intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination.
answer
FALSE-A router is an intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination.
question
Network transmission media refers to the various types of media used to carry the signal between computers.
answer
TRUE
question
Hypertext Transfer Protocol (HTTP) uses TCP/IP technology to transmit voice calls over long-distance telephone lines.
answer
FALSE--Voice over IP (VoIP) uses TCP/IP technology to transmit voice calls over long-distance telephone lines.
question
Simple Mail Transfer Protocol (SMTP) is TCP/IP's own messaging system for email. Telnet Protocol provides terminal emulation that allows a personal computer or workstation to act as a terminal, or access device, for a server.
answer
TRUE
question
Interoperability is the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers.
answer
TRUE
question
Web 2.0 is the next generation of Internet that uses—a more mature, distinctive communications platform characterized by qualities such as collaboration, sharing, and free.
answer
TRUE
question
Source code is software made available free for any third party to review and modify.
answer
FALSE-- This is the definition of open source.
question
The most common form of collective intelligence found outside the organization is crowdsourcing, or the wisdom of the crowd.
answer
TRUE
question
Social media are websites that rely on user participation and user-contributed content, such as Facebook, YouTube, and Digg.
answer
TRUE
question
Social tagging is similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system.
answer
FALSE---Folksonomy is similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system.
question
The three Business 2.0 communication and collaboration tools a business can use to harness the power of people include blogs, wikis, and mashups.
answer
TRUE
question
A wiki - from the Hawaiian word for quick - is a type of a collaborative web page that allows users to add, remove, and change content.
answer
TRUE
question
RSS allows a website to constantly feed information and news to consumers instead of having the consumer search for it.
answer
TRUE
question
Open source and sharing are both advantages and disadvantages of Business 2.0.
answer
TRUE
question
Copyright laws protect collaborative websites like blogs and wikis, allowing users to reuse material freely and easily
answer
FALSE---Copyright infringement is a challenge of the online world, and business 2.0 is seeing more cases and problems with it online.
question
Tim Berners-Lee was one of the founders of the Internet.
answer
TRUE
question
Egovernment involves the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer and all branches of government.
answer
TRUE
question
Web 3.0 refers to static text-based information websites.
answer
FALSE---Web 1.0 refers to static text-based information websites, Web 2.0 is about user-contributed content, and Web 3.0 is based on "intelligent" web applications using natural language processing, machine-based learning and reasoning, and intelligent applications.
question
Mobile banking and mobile sales are both a part of the emerging mbusiness.
answer
TRUE
question
Which of the below is not a characteristic of Business 2.0?
answer
Technical skills are required.-----------------------------Business 2.0 (Web 2.0) encourages user participation and the formation of communities to contribute to the content. Technical skills are no longer required to use and publish information to the web, and new web technologies eliminate entry barriers for online business. Web 2.0 technologies also provide a virtual environment that is vibrant and important to many.
question
What are the four most common Business 2.0 characteristics?
answer
Content sharing through open source, user-contributed content, collaboration inside the organization, and collaboration outside the organization.
question
What is a system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?
answer
Open system
question
Which of the below is not a characteristic associated with Mozilla's Firefox?
answer
Mozilla's Firefox is a prime example of a reputation system.
question
What is Mozilla Firefox?
answer
A competitor to Internet Explorer.
question
What is software whose source code is available free for any third party to review and modify?
answer
Open source
question
Erik is the president and owner of Watch Out, a local website development company that helps clients create and build unique websites. Many of his daily tasks are heavily technical in nature and require a high level of computer programming and Internet knowledge. Which of the below would Erik primarily use when performing his daily tasks?
answer
Source code
question
Ebusiness was characterized by a few companies or users posting content for the masses. What characterizes Business 2.0?
answer
The masses posting content for the masses.
question
What is web content that is created and updated by many users for many users?
answer
User-contributed content
question
eBay buyers voluntarily comment to other users and sellers on the quality of service, promptness of shipping, and their general satisfaction with the product. This is one of the most popular examples of user-generated content and is called a(n) ____________.
answer
reputation system
question
What is the most common form of collective intelligence found inside the organization?
answer
Knowledge management
question
What is the difference between asynchronous and synchronous communication?
answer
Asynchronous is communication that does not occur at the same time. Synchronous communication occurs at the same time.
question
Which of the below is not a characteristic of Business 2.0?
answer
Web browser
question
Which of the following is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information?
answer
Collaboration system
question
Lisa loves her job as an executive recruiter for a large hospital located in Dallas, Texas. Part of Lisa's job requires her to gather industry information, collaborate with partners, compare competitors, and tap into the knowledge of prospective employees, partners, and customers. Which of the below would Lisa use to perform her job?
answer
Collective intelligence
question
Which system supports the capture, organization, and dissemination of knowledge throughout an organization?
answer
Knowledge management system
question
Which of the below focuses on user-generated content?
answer
YouTube, Wikipedia, Netflix, All of these
question
What are the two categories that include intellectual and knowledge-based assets?
answer
Explicit knowledge and tacit knowledge
question
What is the type of knowledge that is contained in people's heads?
answer
Tacit knowledge
question
What is the type of knowledge that consists of anything that can be documented, archived, and codified, often with the help of an MIS department?
answer
Explicit knowledge
question
Which of the following is not an example of explicit knowledge?
answer
Employee opinion
question
What do Netflix and Amazon use to drive their recommendation tools?
answer
User-generated content
question
What are websites that rely on user participation and user-contributed content, such as Facebook, LinkedIn, and YouTube?
answer
Social media
question
What is the practice of expanding your business and social contacts by constructing a personal network?
answer
Social networking
question
What is a locally stored URL or the address of a file or Internet page saved as a shortcut?
answer
Website bookmark
question
Which of the below represents an example of why an employer would use social media?
answer
To find potential job candidates via LinkedIn, To review potential job candidates by viewing their Facebook page., To attract new job candidates via YouTube., All of these.
question
What are the two basic functions that social networking sites provide?
answer
The ability to create and maintain a profile that is your online identity and create connections between other people within the network.
question
Which of the below is not an example of a social bookmarking website?
answer
Facebook
question
What is an SNA?
answer
Social networking analysis
question
What maps group contacts, identifying who knows each other and who works together?
answer
Social networking analysis
question
Many social media websites use _________, or specific keywords or phrases incorporated into website content for means of classification or taxonomy.
answer
tags
question
Social tagging describes the collaborative activity of marking shared online content with keywords or tags as a way to ______________.
answer
Organize it for future navigation, Organize it for future filtering, Organize it for future search, All of these
question
Cell phone manufacturers often refer to their products as mobile devices. Which of the below would not be included in the folksonomy for a cell phone?
answer
Technology platform
question
What is the term that is similar to taxonomy except that crowdsourcing determines the tag or keyword-based classification system?
answer
Folksonomy
question
How do the majority of potential customers find business websites?
answer
Through search terms that match the content.
question
How would a company like Flickr use social tagging on its website?
answer
By allowing users to upload images and tag the images with their own keywords.
question
Using the collective power of a community to identify and classify content significantly _________ content categorization costs.
answer
lowers
question
A social bookmarking site is dedicated to providing all of the following except ________.
answer
to reconnect with colleagues for business progress
question
Which social media site works by allowing content to find the users, instead of the users having to search for the content?
answer
StumbleUpon
question
What is the primary way that social networks work?
answer
Connecting people by matching profile information.
question
What is one simplification that has occurred with Business 2.0?
answer
Improving access to information.
question
Which of the following identifies Business 2.0 communication and collaboration tools?
answer
Blogs, wikis, mashups
question
What is an online journal that allows users to post their own opinions, comments, graphics, and video?
answer
Blog or web log
question
What is one reason that Fortune 500 companies engage in blogging?
answer
To share ideas.
question
Twitter is an example of a __________.
answer
microblogging website
question
What is the practice of sending brief posts, only 140-200 characters long, to a personal blog, either publicly or to a private group of subscribers?
answer
Microblogging
question
Unlike traditional HTML, which of the following lets writers communicate and readers respond on a regular basis through a simple online journal?
answer
Blog
question
What is the difference between a wiki and a blog?
answer
A wiki user can alter the original content of an article, but a blog user can only add information as a comment.
question
What does RSS stand for?
answer
Real Simple Syndication
question
Many websites use _______ to constantly feed news to consumers instead of having the consumer search for the news.
answer
RSS
question
Large wikis, such as Wikipedia, can protect the quality and accuracy of their information by assigning users roles such as __________.
answer
reader, subject matter expert, editor, all of these
question
What describes how products in a network increase in value to users as the number of users increase?
answer
Network effect
question
Which of the following is one of the largest wikis on the web and one of the 10 most popular web destinations?
answer
Wikipedia
question
A company's internal wiki can be a great tool for all of the following except:
answer
Building software applications.
question
What is a website or web application that uses content from more than one source to create a completely new product or service?
answer
Mashup
question
An API is a set of routines, protocols, and tools for ______________.
answer
building software applications
question
What does API stand for?
answer
Application Programming Interface
question
What is the role of a mashup editor?
answer
WYSIWYG, Often it allows the user to drag and drop data points into a web application, To provide a visual interface to build up a mashup., All of these.
question
Which of the following are challenges of Business 2.0?
answer
Information vandalism, Technology dependence, Violations of copyright and plagiarism, All of these
question
What is a potential problem or impact of technology dependence?
answer
Outages create potentially great havoc for people, businesses, and educational institutions that rely heavily on technology., Many have a need to be continuously connected for every activity, which potentially eliminates crucial in-person social skills and could stunt psychological growth., How do people or businesses function if the connection is down?, All of these.
question
Which of the following demonstrates potential issues with Business 2.0 and information vandalism?
answer
Open source allows anyone to be able to edit, damage, or destroy content.
question
One of the most famous examples of wiki vandalism occurred when a false biography entry stated which of the following?
answer
John Seigenthaler Sr. was assistant to Attorney General Robert F. Kennedy in the early 1960s and was involved in Kennedy's assassination as well as JFK's.
question
Which of the following best describes Web 1.0?
answer
Static text-based information websites
question
Which of the following best describes Web 2.0?
answer
Social media and user-generated web content
question
Which of the following best describes Web 3.0?
answer
Based on the "intelligent" web, where applications use natural language processing
question
Which statement below is inaccurate?
answer
Web 2.0 is a simple static website without any interaction with its users.
question
What is a component of Web 3.0 that describes things in a way that computers can understand?
answer
Semantic web
question
Which statement below is incorrect?
answer
The semantic web captures, organizes, and disseminates knowledge (i.e., know-how) throughout an organization.
question
Which of the following is not a topic or feature that is included in Web 3.0?
answer
Social networking
question
What statement below describes Web 3.0's feature that ensures the "integration of legacy devices"?
answer
The ability to use current devices such as iPhones and laptops as credit cards or tickets.
question
The government has taken an active role online. Which of the following is the term that describes the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between government and the citizen-consumer within all the branches of government
answer
Egovernment
question
What website was the primary catalyst for growing electronic government and is the official U.S. gateway to all government information?
answer
FirstGov.gov
question
Which of the following is the example of consumer-to-government (C2G) highlighted in the figure Extended Ebusiness Models?
answer
egov.com
question
What is the ability to purchase goods and services through a wireless Internet-enabled device
answer
Mobile business
question
How would you categorize mobile entertainment, mobile sales, mobile ticketing, and mobile banking?
answer
Mobile business, Mbusiness, Mcommerce, All of these.
question
What is an open system?
answer
A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
question
What company monitors the operation of its vending machines via wireless technology?
answer
Dr Pepper/Seven Up Inc.
question
What technology enables wireless networks to extend as far as 30 miles and transfer information, voice, and video at faster speeds than cable?
answer
WiMAX wireless broadband
question
What technology uses radio waves rather than wires to transmit information across a local area network?
answer
Wireless local area network
question
What refers to any type of electrical or electronic operation that is accomplished without the use of a "hard-wired" connection?
answer
Wireless
question
Mobile technology refers to any type of electrical or electronic operation that is accomplished without the use of a "hard-wired" connection.
answer
FALSE--Wireless technology refers to any type of electrical or electronic operation that is accomplished without the use of a "hard-wired" connection.
question
Wireless means the technology can travel with the user, but it is not necessarily in real time.
answer
FALSE---Mobile means the technology can travel with the user, but it is not necessarily in real time
question
What is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements?
answer
Project management
question
What is a project?
answer
A temporary endeavor undertaken to create a unique product, service, or result.
question
What is a project manager?
answer
An individual who is an expert in project planning and management.
question
Which of the following is a business-related consequence of successful software?
answer
Increased revenues
question
Which of the following is a business-related consequence of software failure?
answer
Decreased productivity, Damage to brand reputation, Incurred liabilities, All of these.
question
What is the systems development life cycle?
answer
The overall process for developing information systems from planning and analysis through implementation and maintenance.
question
What is the overall process for developing information systems from planning and analysis through implementation and maintenance?
answer
Systems development life cycle
question
Which of the following represents the phases in the SDLC?
answer
Plan, analyze, design, develop, test, implement, maintain
question
What is the analysis phase in the SDLC?
answer
Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system.
question
Which phase of the SDLC gathers business requirements?
answer
Analysis
question
What is the design phase in the SDLC?
answer
Involves describing the desired features and operations of the system.
question
What is the implementation phase in the SDLC?
answer
Involves placing the system into production so users can begin to perform actual business operations with the system.
question
Preventing liabilities is a business-related consequence of failed software.
answer
FALSE---Preventing liabilities is a business-related consequence of successful software.
question
The implementation phase involves taking all of the detailed design documents from the design phase and transforming them into the actual system.
answer
FALSE--The development phase involves taking all of the detailed design documents from the design phase and transforming them into the actual system.
question
PMI stands for the Project Management Institute.
answer
TRUE
question
Project management is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements.
answer
TRUE
question
What is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges?
answer
Methodology
question
Which of the following is an issue related to the waterfall methodology?
answer
Flaws in accurately defining and articulating the business problem., Managing costs, resources, and time constraints., Assumes users can specify all business requirements in advance., All of these.
question
What consists of a series of tiny projects?
answer
Iterative development
question
Which methodology aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process with a design point that uses the bare minimum requirements?
answer
Agile methodology
question
Which of the following describes agile?
answer
Fast and efficient, Small and nimble, Lower cost, All of these
question
Which of the following is not a primary form of agile methodology?
answer
SDLC
question
What is an activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance?
answer
Waterfall methodology
question
What emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process?
answer
RAD methodology
question
What breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete?
answer
Extreme programming methodology
question
What is the success rate for a project using the waterfall methodology?
answer
1 in 10
question
Which of the following is a fundamental of the RAD methodology?
answer
Focus initially on creating a prototype that looks and acts like the desired system, Actively involve system users in the analysis, design, and development phases, Accelerate collecting the business requirements through an interactive and iterative construction approach, All of these.
question
Which methodology provides a framework for breaking down the development of software into four gates?
answer
RUP
question
Which of the following is not one of the four gates in the RUP methodology?
answer
Collaboration
question
Which gate in the RUP methodology expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it.
answer
Elaboration
question
Which gate in the RUP methodology includes building and developing the product?
answer
Construction
question
Which methodology is owned by IBM?
answer
RUP
question
Which methodology uses small teams to produce small pieces of deliverable software using sprints, or 30-day intervals, to achieve an appointed goal?
answer
Scrum
question
Which methodology ends each day or begins with a stand-up meeting to monitor and control the development effort?
answer
Scrum
question
How many days is a typical sprint in the scrum methodology?
answer
30 days
question
Which of the following is not one of the tenets in the Agile Alliance's manifesto?
answer
Do not allow changing requirements, especially late in development.
question
Which of the following is not one of the primary principles an organization should follow for successful agile software development?
answer
Test and deliver infrequently.
question
The traditional waterfall methodology is a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.
answer
TRUE
question
A prototype is a smaller-scale representation or working model of the users' requirements or a proposed design for an information system.
answer
TRUE
question
What is the number one reason that IT projects fall behind schedule or fail?
answer
Poor planning or poor project management.
question
What are the three primary variables (or triple constraints) in any project?
answer
Time, cost, scope
question
What is a project deliverable?
answer
Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.
question
What is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house?
answer
Outsourcing
question
What is it called when a company uses organizations from developing countries to write code and develop systems?
answer
Offshore outsourcing
question
Which of the following is a benefit an organization can receive from outsourcing?
answer
Financial savings, Increased technical abilities, , Market agility, All of these
question
Which of the following is the most common function outsourced?
answer
MIS
question
Which of the following is the least common function outsourced?
answer
Marketing/sales
question
Which of the following is the primary reason why companies outsource?
answer
Tap outside sources of expertise.
question
Which of the following is NOT one of the reasons mentioned in the text as reasons companies outsource?
answer
In-house expertise.-------------------- What is : Acquiring core competencies. Achieving financial savings. Rapid growth.
question
Which of the following are the influential driver(s) affecting the growth of outsourcing markets?
answer
Core competencies, Rapid growth, Industry changes, All of these
question
What is the outsourcing option that includes the closest location and direct customer control?
answer
Onshore outsourcing
question
All of the following are challenges of outsourcing except:
answer
Reduced frustration and expense related to hiring and retaining employees in an exceptionally tight job market.--------------------------Contract length. Competitive edge. Confidentiality. Reduced frustration is not a challenge of outsourcing. It is a benefit.
question
Which of the following is an outsourcing challenge caused by contract length?
answer
Difficulties in getting out of a contract, Problems in foreseeing future issues, Problems in reforming an internal IT department, All of these
question
What is a project management office (PMO)?
answer
An internal department that oversees all organizational projects.
question
What is a project milestone?
answer
A key date by which a certain group of activities must be performed.
question
Human resources is the most commonly outsourced function.
answer
FALSE--MIS is the most commonly outsourced function.
question
Outsourcing is a common approach using the professional expertise within an organization to develop and maintain the organization's information technology systems.
answer
FALSE--In-sourcing is a common approach that uses the professional expertise within an organization to develop and maintain the organization's information technology systems.
question
In-sourcing is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.
answer
FALSE-- Outsourcing is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.
question
Offshore outsourcing is using organizations from developing countries to write code and develop systems
answer
TRUE
question
The triple constraint includes time, cost, and quality.
answer
FALSE------------The triple constraint includes time, cost, and scope. All affect quality.
question
The relationships among the triple constraint variables are not dependent.
answer
FALSE
question
Which of the following is one of the 21st-century organizational trends on the business side?
answer
Uncertainty in terms of future business scenarios and economic outlooks. Emphasis on strategic analysis for cost reduction and productivity enhancement. Focus on improved business resiliency via the application of enhanced security. All of these.
question
Which of the following is not one of the primary information technology areas on which organizations are focusing?
answer
Database
question
Which of the following is a benefit a business can receive by deploying the latest in security technology?
answer
Fewer disruptions to organizational systems, Increased productivity of employees, Greater advances in administration, All of these
question
Which of the following is a reason why businesses want to have the appropriate levels of authentication, access control, and encryption?
answer
Only authorized individuals can gain access to the network. Only authorized individuals can access applications for which they are entitled. Individuals cannot understand or alter information while in transit. All of these.
question
What is the ability to purchase goods and services through a wireless Internet-enabled device?
answer
Mobile commerce
question
What is the blending of computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations?
answer
Telematics
question
What is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards?
answer
Electronic tagging
question
What uses active or passive tags in the form of chips or smart labels?
answer
Radio frequency identification
question
Which of the following is one of the new series of business success factors and challenges that are helping to determine marketplace winners and losers?
answer
Organization agility A focus on core competencies and processes Instantaneous business response All of these
question
Which of the following was the original design for the Internet?
answer
Email, Document exchange, Display of static content, All of these
question
Where is the position of IT infrastructure within the organization?
answer
Bottom
question
Which company was the victim of a distributed denial-of-service (DDoS) attack that forced the company to close operations and to eventually transfer over 2,500 customers to a rival organization?
answer
CloudNine Communications
question
Core business relationships and models are dramatically changing, including shifts from which of the following?
answer
The value in material things to the value of knowledge and intelligence
question
What is the practice of buying a domain name and not using the web page but waiting to profit from the trademark?
answer
Domain or cyber squatting
question
IT infrastructure is the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals.
answer
TRUE
question
IT infrastructure, security, ebusiness, and integrations are the four primary information technology areas where organizations are focusing
answer
TRUE
question
The original design of the Internet and the web was for simple email, document exchange, and the display of static content, not for sophisticated and dynamic business applications that require access to back-end systems and databases.
answer
TRUE
question
Telematics is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards.
answer
False-- Electronic tagging is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards.
question
Telematics is the blending of computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations.
answer
TRUE
question
What includes the plans for how an organization will build, deploy, use, and share its data, processes, and MIS assets?
answer
MIS infrastructure
question
What includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals?
answer
Agile MIS infrastructure
question
What is recovery?
answer
The ability to get a system up and running in the event of a system crash, The ability to get a system up and running in the event of a system failure, Restoring the information backup, All of these
question
What is a backup?
answer
An exact copy of a system's information
question
What is failover?
answer
A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
question
What is recovery?
answer
The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
question
What is fault tolerance?
answer
A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
question
What is a separate and fully equipped facility where the company can move immediately after a disaster and resume business?
answer
Hot site
question
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
answer
Disaster recovery plan
question
What refers to how well a system can adapt to increased demands of growth?
answer
Scalability
question
What determines the future environmental infrastructure requirements to ensure high-quality system performance?
answer
Capacity planning
question
What addresses when systems can be accessed by employees, customers, and partners?
answer
Availability
question
Which of the following is a type of backup/recovery media?
answer
DVD, Tape, Disk, All of these
question
What is the primary difference between the different types of backup/recovery media?
answer
Speed, Cost, Expense, All of these
question
What type of backup strategy would you recommend to an organization that deals with large volumes of critical information?
answer
Hourly
question
What type of backup strategy would you recommend to an organization that deals with small amounts of noncritical information?
answer
Weekly
question
What does the disaster recovery cost curve chart(s)?
answer
The cost to the organization of the unavailability of information; The cost to the organization of recovering from a disaster over time; The cost to the organization of the unavailability of technologyL; All of these
question
What is a separate facility that does not have any computer equipment, but is a place where employees can move after a disaster?
answer
Cold site
question
Which of the following is not a characteristic of agile MIS infrastructure?
answer
Integrity
question
What ensures all systems are functioning correctly and providing accurate information?
answer
Reliability
question
What addresses the time frames when systems can be accessed by employees, customers, and partners?
answer
Availability
question
What measures how quickly a system performs a certain process or transaction in terms of efficiency IT metrics of both speed and throughput?
answer
Performance
question
Business continuity planning is a plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption.
answer
TRUE
question
Performance measures how quickly a system performs a certain process or transaction in terms of efficiency IT metrics of both speed and throughput.
answer
TRUE
question
Infrastructure architecture identifies where and how important information, like customer records, is maintained and secured.
answer
FALSE-- Information MIS infrastructure identifies where and how important information, like customer records, is maintained and secured.
question
Fault tolerance is a computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service. Fault tolerance can be provided with software, or embedded in hardware, or provided by some combination.
answer
TRUE
question
The primary characteristics of agile MIS infrastructure include flexibility, scalability, reliability, availability, and performance.
answer
TRUE
question
What is the recommended way to implement information security lines of defense?
answer
People first, technology second
question
Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident?
answer
Insiders
question
What identifies the rules required to maintain information security?
answer
Information security policies
question
Which of the following is not one of the five steps for creating an information security plan?
answer
Revise and test the information security policies
question
What is social engineering?
answer
Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
question
Which of the following is not one of the three primary information security areas?
answer
Detection and resistance
question
What is a method for confirming users' identities?
answer
Authentication
question
What is the most secure type of authentication?
answer
Something the user knows such as a user ID and password; Something the user has such as a smart card or token; Something that is part of the user such as a fingerprint or voice signature; All of these
question
What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?
answer
Smart card
question
What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?
answer
Biometrics
question
Which of the following is not considered a type of biometrics?
answer
None of these- Voice Face Iris
question
What is the most costly and intrusive form of authentication?
answer
Something that is part of the user such as a fingerprint or voice signature
question
Which of the following authentication methods is 100 percent accurate?
answer
None of these(Smart card; Fingerprint authentication; User ID)
question
What are the technologies available to help prevent and build resistance to attacks?
answer
Content filtering, encryption, firewalls
question
What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?
answer
None of these (Biometrics; Encryption; Firewalls)
question
What is spam?
answer
A form of unsolicited email
question
What is encryption?
answer
Scrambles information into an alternative form that requires a key or password to decrypt the information
question
Which of the following can be completed by encryption?
answer
Switch the order of characters; Replace characters with other characters;Use a mathematical formula to convert the information into some sort of code; All of these
question
Where do organizations typically place firewalls?
answer
Between the server and the Internet
question
Which of the following does a firewall perform?
answer
Examines each message that wants entrance to the network; Blocks messages without the correct markings from entering the network; Detects computers communicating with the Internet without approval; All of these
question
What includes a variety of threats such as viruses, worms, and Trojan horses?
answer
Malicious code
question
What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?
answer
Spoofing
question
Which of the following is a program or device that can monitor data traveling over a network?
answer
Sniffer
question
What attacks computer systems by transmitting a virus hoax, with a real virus attached?
answer
Hoaxes
question
What is the most common type of defense within detection and response technologies?
answer
Antivirus software
question
Who works at the request of the system owners to find system vulnerabilities and plug the holes?
answer
White-hat hackers
question
Who breaks into other people's computer systems and just looks around or steals and destroys information?
answer
Black-hat hacker
question
Who finds hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses?
answer
Script kiddies
question
Who are hackers with criminal intent?
answer
Crackers
question
Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?
answer
Cyberterrorists
question
What is a type of virus that spreads itself, not just from file to file, but also from computer to computer?
answer
Worm
question
What floods a website with so many requests for service that it slows down or crashes the site?
answer
Denial-of-service attack
question
Which is a virus that opens a way into the network for future attacks?
answer
Backdoor programs
question
If there is a security breach on your organizational information systems, which information security area is best suited to handle the breach?
answer
Detection and response
question
Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
answer
FALSE---Insiders are legitimate, not illegitimate, users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
question
Information security policies detail how an organization will implement the information security plan.
answer
FALSE--Information security plan details how an organization will implement the information security policies.
question
Tokens are small electronic devices that change user passwords automatically.
answer
TRUE
question
The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
answer
TRUE
question
What are the principles and standards that guide our behavior toward other people?
answer
Ethics
question
What is intangible creative work that is embodied in physical form?
answer
Intellectual property
question
What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?
answer
Copyright
question
What is the assurance that messages and information remain available only to those authorized to view them?
answer
Confidentiality
question
What is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent?
answer
Privacy
question
What is software that is manufactured to look like the real thing and sold as such?
answer
Counterfeit software
question
What is the unauthorized use, duplication, distribution, or sale of copyrighted software?
answer
Pirated software
question
What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?
answer
ePolicies
question
Which of the following describes privacy?
answer
The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.
question
Which of the following describes confidentiality?
answer
The assurance that messages and information are available only to those who are authorized to view them.
question
Which of the following describes ePolicies?
answer
Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
question
Which of the following is not considered an ePolicy?
answer
Security badge policy
question
Which of the following is an example of acting ethically?
answer
None of the above (Individuals copy, use, and distribute software.; Employees search organizational databases for sensitive corporate and personal information.; Individuals hack into computer systems to steal proprietary information.)
question
Which of the following is not included in the four quadrants of ethical and legal behavior?
answer
Legal behavior and ethical behavior; Illegal behavior and ethical behavior; Legal behavior and unethical behavior; All of these
question
What is the ideal type of decision making for people in an organization?
answer
Legal and ethical
question
Which act prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the consumer?
answer
The Bork bill
question
Which act allows any person to examine government records unless it would cause an invasion of privacy?
answer
The Freedom of Information Act
question
Which act restricts what information the federal government can collect?
answer
The Privacy act
question
Which act protects investors by improving the accuracy and reliability of corporate disclosures?
answer
The Sarbanes-Oxley Act
question
Which act strengthened criminal laws governing identity theft?
answer
None of the above(Bork Bill; Sarbanes-Oxley Act; Cable Communications Act)
question
What is the policy that contains general principles to guide computer user behavior?
answer
None of the above(Information privacy policy; Acceptable use policy; Internet use policy)
question
Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?
answer
Ethical computer use policy
question
According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.
answer
Informed, consent
question
If an organization were to have only one policy, which one would it want?
answer
Ethical computer use policy
question
Which policy contains general principles regarding information privacy?
answer
Information privacy policy
question
Which of the following is a classic example of unintentional information reuse?
answer
Social Security number
question
What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet?
answer
Acceptable use policy
question
What is a contractual stipulation that ensures that ebusiness participants do not deny their online actions?
answer
Nonrepudiation
question
Which policy typically contains a nonrepudiation clause?
answer
Acceptable use policy
question
Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being gaining network access?
answer
Acceptable use policy
question
What is one of the major problems with email?
answer
User's expectation of privacy
question
Which of the following is part of the acceptable use policy stipulations?
answer
Not using the service as part of violating any law; Not attempting to break the security of any computer network or user; Not posting commercial messages to groups without prior permission; All of the above.
question
Which of the following is part of the acceptable use policy stipulations?
answer
Not attempting to mail bomb a site
question
What is a mail bomb?
answer
Sending a massive amount of email to a specific person or system that can cause that user's server to stop functioning.
question
Which policy details the extent to which email messages may be read by others?
answer
Email privacy policy
question
Which of the following is not a part of the email privacy policy stipulations?
answer
It informs people that the organization has full control over email once it is transmitted outside the organization.
question
Which of the following describes Workplace MIS monitoring?
answer
Tracking people's activities by such measures as number of keystrokes; Tracking people's activities by such measures as error rate; Tracking people's activities by such measures as number of transactions processed; All of the above.
question
What is a program, when installed on a computer, records every keystroke and mouse click?
answer
Key logger software
question
What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?
answer
Hardware key logger
question
What is a small file deposited on a hard drive by a website containing information about customers and their web activities?
answer
Cookie
question
Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
answer
FALSE0---Privacy is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
question
Ethical computer use policy contains general principles to guide computer user behavior.
answer
TRUE
question
Employee monitoring policies explicitly state how, when, and where the company monitors its employees.
answer
TRUE
question
Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
answer
TRUE
question
What is a business-driven IT architectural approach that supports organizational computing needs with utility-based computing concepts?
answer
Service oriented architecture
question
What are the key technical concepts of SOA?
answer
Services, interoperability, loose coupling
question
What is a SOA service?
answer
A simple business task
question
Which of the following is not part of a typical SOA solution?
answer
Decrease people productivity with better business integration
question
What is the ability to present the resources of a single computer as if it is a collection of separate computers, each with its own virtual CPUs, network interfaces, storage, and operating system?
answer
System virtualization
question
Which of the following reflects Moore's Law?
answer
New generations of chips deliver double the processing power as the previous generation
question
Which of the following is not an additional benefit of virtualization?
answer
Ease of use for customer relationship management systems
question
What is an aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilization, and easier access to data?
answer
Grid Computing
question
What enables organizations to optimize computing and data resources, pool them for large capacity workloads, share them across networks, and enable collaboration?
answer
Grid Computing
question
What refers to resources and applications hosted remotely as a shared service over the Internet?
answer
Cloud Computing
question
What is a model of software deployment, where an application is licensed for use as a service, provided to customers on-demand?
answer
Software as a Service
question
SOA provides the technology underpinnings for working with services that are not just software or hardware, but rather business tasks.
answer
TRUE
question
Services are business tasks.
answer
TRUE
question
What is a technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible?
answer
Cluster analysis
question
What reveals the degree to which variables are related and the nature and frequency of these relationships in the information?
answer
Association detection
question
Which of the following represents market basket analysis?
answer
Analyzes website information; Analyzes checkout scanner information; Detects customers' buying behavior; All of these
question
What is time-series information?
answer
Time-stamped information collected at a particular frequency
question
Which of the following is a form of statistical analysis?
answer
Forecasting
question
What are forecasts?
answer
Predictions made on the basis of time-series information
question
Which company uses statistical analysis to automatically detect potential issues, provide quick and easy access to reports, and perform multidimensional analysis on all warranty information?
answer
Whirlpool
question
Which type of BI manages daily operations and integrates BI with operational systems?
answer
Operational BI
question
Which type of BI conducts short-term analysis to achieve strategic goals?
answer
Tactical BI
question
Which type of BI achieves long-term organizational goals?
answer
Strategic BI
question
Which form of BI has managers and analysts as its primary users?
answer
Operational BI
question
Which form of BI uses the time frame of days to weeks to months?
answer
Tactical BI
question
Which form of BI uses real-time metrics for its data?
answer
Operational BI
question
Which form of BI uses months to years as its time frame?
answer
Strategic BI
question
What is data latency?
answer
The time duration to make data ready for analysis and loading the data into the database
question
What is analysis latency?
answer
The time from which data are made available to the time when analysis is complete
question
What is decision latency?
answer
The time it takes a human to comprehend the analytic result and determine an appropriate action
question
Which of the following is a business benefit of BI?
answer
Up-to-the minute information for everyone
question
Which of the following is one of the four main categories of BI benefits?
answer
Quantifiable benefits
question
Which type of BI benefits includes working time saved in producing reports and selling information to suppliers?
answer
Quantifiable benefits
question
Which type of BI benefits are the results of discoveries made by creative users?
answer
Unpredictable benefits
question
Which type of BI benefits includes improved communication throughout the enterprise, improved job satisfaction of empowered users, and improved knowledge sharing?
answer
Intangible benefits
question
Quantifiable benefits, indirectly quantifiable benefits, unpredictable benefits, and intangible benefits are the four primary categories of BI benefits.
answer
TRUE
question
Data latency is the time from which data are made available to the time when analysis is complete.
answer
FALSE--Analysis latency is the time from which data are made available to the time when analysis is complete.
question
The three forms of BI include operational, tactical, and value-added.
answer
FALSE--The three forms of BI include operational, tactical, and strategic.