CIS Information Security Flashcards

question

What are the different types of information?
answer

Levels, formats, granularities
question

Which of the following represents the different information levels?
answer

Individual, department, enterprise
question

Which of the following represents the different information formats?
answer

Document, presentation, spreadsheet, database
question

Which of the following represents the different information granularities?
answer

Detail, summary, aggregate
question

All of the following are characteristics of information except:
answer

Quantity/ The qualities are Transactional,Anylitical,Timeliness
question

What encompasses all of the information contained within a single business process or unit of work and its primary purpose is to support the performance of daily operational tasks?
answer

Transactional information
question

Which of the following is an example of transactional information?
answer

Withdrawing cash from an ATM,Making an airline reservation, Purchasing stock, All of these
question

What encompasses all organizational information and its primary purpose is to support the performance of managerial analysis tasks?
answer

Analytical information
question

Which of the following is an example of transactional information?
answer

Purchasing stocks
question

What is immediate, up-to-date information?
answer

Real-time information
question

What provides real-time information in response to requests?
answer

Real-time systems
question

What is one of the biggest pitfalls associated with real-time information?
answer

It continually changes.
question

Which of the following is not one of the five characteristics common to high-quality information?
answer

Quantity
question

Which of the following implies that aggregate or summary information is in agreement with detailed information?
answer

Consistency
question

Which of the following implies that information is current with respect to the business requirement?
answer

Timeliness
question

What is it called when each transaction, entity, and event is represented only once in the information?
answer

Uniqueness
question

What is a real-time system?
answer

Provides real-time information in response to requests.
question

Organizational information comes at different levels and in different formats and granularities.
answer

TRUE
question

Reports for each salesperson, product, and part are examples of detailed, or fine, information granularities.
answer

TRUE
question

Purchasing stocks is an example of analytical information.
answer

FALSE–Purchasing stocks is an example of transactional information.
question

Transactional information is used when performing operational tasks and repetitive decisions, such as analyzing daily sales reports and production schedules to determine how much inventory to carry.
answer

TRUE
question

Timely information must be up-to-the-second to be accurate.
answer

FALSE–Real-time information can change for each business decision. Some decisions require weekly information, while others require daily information.
question

Which of the following types of information can be found in a database?
answer

Inventory, Transactions, Employees, All of these
question

In the relational database model, what is a person, place, thing, transaction, or event about which information is stored?
answer

Entity
question

In the relational database model, what is a characteristic or property of an entity?
answer

Attribute
question

What are characteristics or properties of an entity called?
answer

Attributes, Fields, Columns, All of these
question

Why do relational databases use primary keys and foreign keys?
answer

To create logical relationships.
question

What is a primary key?
answer

A field (or group of fields) that uniquely identifies a given record in a table.
question

What is a foreign key?
answer

A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
question

All of the following are advantages of database-stored information except:
answer

Increased information redundancy- The actual advantages are Increased flexibility, Increased performance, Increased information integrity
question

Which of the following is incorrect in reference to a database?
answer

Information is accessed by physical structure.
question

What is the physical view of information?
answer

Deals with the physical storage of information on a storage device such as a hard disk.
question

Which of the following is correct in reference to a database?
answer

A database can support many logical views.
question

What refers to how well a system can adapt to increased demands?
answer

Scalability
question

Which of the following measures how quickly a system performs a certain process or transaction?
answer

Performance
question

What is information redundancy?
answer

Duplication of information, Storing the same information in multiple places, Storing duplicate information in multiple places., All of these-answer.
question

What is a problem with redundant information?
answer

It is difficult to determine which values are the most current, It is often inconsistent., , It is difficult to determine which values are the most accurate. All of these.
question

Which of the following is true in regard to eliminating redundant information?
answer

Improves information quality.
question

What are the rules that help ensure the quality of information?
answer

Integrity constraints
question

What are the rules that enforce basic and fundamental information-based constraints
answer

Relational integrity constraints
question

Which of the following is a valid type of integrity constraint?
answer

Business-critical integrity constraint
question

What type of integrity constraint does not allow someone to create an order for a nonexistent customer?
answer

Relational integrity constraint
question

All of the following are relational integrity constraints EXCEPT:
answer

Answer: The system will not allow returns of fresh produce after 15 days past delivery.: -The system will not allow an entry for an order for a nonexistent customer.,The system will not allow shipping a product to a customer who does not have a valid address.,, The system will not allow shipping a nonexistent product to a customer.
question

What is an interactive website kept constantly updated and relevant to the needs of its customers through the use of a database?
answer

Data-driven website
question

What type of website is best to build for a general informational website with static information?
answer

Static website
question

What type of website is best to build for a continually changing information, including press releases, new product information, and updated pricing?
answer

Data-driven website
question

Which of the following is not an advantage of building a data-driven website?
answer

Minimizes or reduces efficiency.
question

What is a forward integration?
answer

Takes information entered into a given system and sends it automatically to all downstream systems and processes.
question

What is a backward integration?
answer

Takes information entered into a given system and sends it automatically to all upstream systems and processes.
question

What is an integration?
answer

Allows separate systems to communicate directly with each other.
question

A foreign key is a field (or group of fields) that uniquely identifies a given record in a table.
answer

FALSE- A primary key is a field (or group of fields) that uniquely identifies a given record in a table.
question

One of the advantages found in a relational database is increased information redundancy.
answer

FALSE–Relational databases reduce information redundancy, not increase information redundancy.
question

Relational integrity constraints are rules that enforce basic and fundamental information-based constraints.
answer

TRUE
question

A data-driven website is an interactive website kept constantly updated and relevant to the needs of its customers through the use of a database.
answer

TRUE
question

Ideally, an organization wants to build only forward integrations.
answer

FALSE- Ideally, an organization wants to build both forward and backward integrations.
question

A data warehouse is a _________ collection of information – gathered from many different ___________ databases – that supports business-analysis activities and decision-making tasks.
answer

logical; operational
question

All of the following are reasons why operational systems are not appropriate for business analysis except:
answer

Operational systems are integrated.
question

Which of the following describes ETL?
answer

A process that extracts information from internal and external databases, A process that transforms information using a common set of enterprise definitions, A process that loads information into a data warehouse. All of these.
question

What is data mining?
answer

Process of analyzing data to extract information not offered by the raw data alone.
question

What does the Data Warehousing Institute estimate that low-quality information costs U.S. businesses annually?
answer

$600 billion
question

When does information cleansing occur in the data warehouse?
answer

During the ETL process and once it is in the data warehouse.
question

Which of the following statements is true regarding customer information?
answer

Customer information can exist in several operational systems, Customer information in each operational system could change, Customer information in each operational system can be different, All of these
question

Which of the following occurs during data cleansing?
answer

Clean missing records, Clean redundant records, Clean inaccurate data, All of these
question

Which of the following statements is true?
answer

The more complete and accurate an organization wants to get its information, the more it costs.
question

What is information that people use to support their decision-making efforts?
answer

Business intelligence
question

Which of the following does not draw a parallel between the challenges in business and the challenges of war?
answer

Accurate and complete information.
question

Why is Ben & Jerry’s using business intelligence?
answer

To improve quality.
question

Why is Noodles & Company using business intelligence?
answer

To improve financial analysis.
question

Why would a business use a data warehouse that offers strategic level, external, integrated, and historical information?
answer

Identify trends, Make projections, Decide key business issues, All of these.
question

What is the primary purpose of a data warehouse?
answer

To aggregate information throughout an organization into a single repository in such a way that employees can make decisions and undertake business analysis activities.
question

Lands’ End created an organization-wide data warehouse so all its employees could access organizational information. Lands’ End soon found out that there could be “too much of a good thing.” Many of its employees would not use the data warehouse, because it was simply too big, too complicated, and had too much irrelevant information. Lands’ End knew there was valuable information in its data warehouse, and it had to find a way for its employees to easily access the information. What was Lands’ End’s solution?
answer

Build a data mart.
question

A relational database contains information in a series of two-dimensional tables. How is data contained in a data warehouse and data mart?
answer

Information is multidimensional, meaning it contains layers of columns and rows.
question

What is a dimension?
answer

A particular attribute of information.
question

A dimension is a particular attribute of information. Each layer in a data warehouse or data mart represents information according to an additional dimension. What is the common term for the representation of multidimensional information?
answer

Cube
question

Achieving perfect information is almost impossible. The more complete and accurate an organization wants its information to be, the more it costs. Which two variables are used to determine the trade-off for perfect information?
answer

Accuracy versus completeness.
question

Which of the following is not one of the parallels between challenges in business and those of war?
answer

Using tactical business intelligence
question

What is the primary problem most organizations face today concerning information?
answer

Data rich, information poor
question

What types of BI decisions include predicting sales, determining correct inventory levels, and distribution schedules among outlets, and loss prevention?
answer

Retail and sales BI decisions
question

What types of BI decisions include forecasting levels of bad loans and fraudulent credit card use, credit card spending by new customers, and which kinds of customers will best respond to new loan offers?
answer

Banking BI decisions
question

What types of BI decisions include forecasting claim amounts and medical coverage costs, classifying the most important elements that affect medical coverage; predicting which customers will buy new insurance policies?
answer

Insurance BI decisions
question

Which of the following can use BI to make informed decisions?
answer

Law enforcement industry, Airline industry, Broadcasting industry, All of these
question

Which of the following can use BI to make informed decisions?
answer

All of these
question

The primary purpose of a data warehouse is to perform transactional processes.
answer

FALSE-The primary purpose of a data warehouse is to perform analytical processes.
question

Extraction, transformation, and loading is a process that extracts information from internal databases, transforms the information using a common set of enterprise definitions, and loads the information into an external database.
answer

FALSE–Extraction, transformation, and loading is a process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse
question

A dimension is a particular attribute of information.
answer

TRUE
question

The Data Warehousing Institute estimates that low-quality information costs U.S. businesses $60 billion annually.
answer

FALSE–The Data Warehousing Institute estimates that low-quality information costs U.S. businesses $600 billion annually.
question

The data warehouse is a location for all of a business’s information.
answer

FALSE–The data warehouse is not a location for all of a business’s information.
question

Which of the following is not a reason for the growth of decision-making information systems?
answer

People no longer have to worry about protecting the corporate asset of organizational information.
question

What can a model accomplish?
answer

Calculate risks, Understand uncertainty, Manipulate time, All of these
question

Which of the following is a quantitative model typically used by a DSS?
answer

Sensitivity analysis, What-if analysis, Goal-seeking analysis, All of these
question

What is the study of the effect that changes in one (or more) part of the model has on other parts of the model?
answer

Sensitivity analysis
question

What finds the inputs necessary to achieve a goal, such as a desired level of output?
answer

Goal-seeking analysis
question

What is consolidation?
answer

Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information.
question

What is drill-down capability?
answer

Enables users to get details, and details of details, of information.
question

What is slice-and-dice capability?
answer

The ability to look at information from different perspectives.
question

What integrates information from multiple components and tailors the information to individual preferences?
answer

Digital dashboard
question

What are various commercial applications of artificial intelligence called?
answer

Intelligent systems
question

What is a category of AI that attempts to emulate the way the human brain works?
answer

Neural network
question

Which of the following is the most commonly used form of AI in the business arena?
answer

Expert system
question

What is a special-purpose, knowledge-based information system that accomplishes specific tasks on behalf of its users?
answer

Intelligent agent
question

What is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem?
answer

Genetic algorithm
question

Which of the following represents the top-down (executives to analysts) organizational levels of information technology systems?
answer

EIS, DSS, TPS
question

Which of the following is an incorrect enterprise view of information technology?
answer

Processing is OLTP for executives and OLAP for analysts.
question

Which of the following is a type of transaction processing system?
answer

Order processing
question

Which of the following is a type of decision support system?
answer

Manufacturing
question

Which system differentiates an executive information system from a decision support system and a transaction processing system?
answer

Stock market information system
question

A genetic algorithm is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem
answer

TRUE
question

The ultimate goal of AI is to build a system that can mimic human intelligence.
answer

TRUE
question

Sensitivity analysis, what-if analysis, and market-basket analysis are the three quantitative models typically used by a DSS.
answer

FALSE-Sensitivity analysis, what-if analysis, and goal-seeking analysis are the three quantitative models typically used by a DSS.
question

Consolidation, drill-down, and slice-and-dice are the three most common capabilities offered in an EIS.
answer

TRUE
question

A shopping bot is one of the simplest examples of an intelligent agent.
answer

TRUE
question

Future managers and workers need to understand the benefits MIS and ebusiness can offer a company, if it wants to take advantage of sustaining technologies.
answer

FALSE–Future managers and workers need to understand the benefits MIS and ebusiness can offer a company, if it wants to take advantage of disrupting technologies.
question

Examples of ebusiness advantages include opening new markets, reducing costs, and expanding global reach.
answer

TRUE
question

Intermediaries occur when a customer sells directly to another customer online, cutting out the intermediary.
answer

FALSE–Disintermediation occurs when a business sells direct to the customer online and cuts out the intermediary.
question

Interactivity measures advertising effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, number of pages viewed, and number of repeat visits to the advertisement.
answer

TRUE
question

Disruptive technology tends to provide us with better, faster, and cheaper products.
answer

FALSE–Sustaining technology tends to provide us with better, faster, and cheaper products.
question

Disruptive and new technologies typically cut into the low end of the marketplace and eventually evolve to displace high-end competitors and their reigning technologies.
answer

TRUE
question

Dell Inc. ranks highest on the list for expecting returns from new investments.
answer

TRUE
question

Information reach refers to the number of people a business can communicate with, on a global basis.
answer

TRUE
question

What is best for an organization’s current business could ruin it in the long term.
answer

TRUE
question

Ebusiness is the buying and selling of goods and services over the Internet.
answer

FALSE–Ecommerce is the buying and selling of goods and services over the Internet.
question

Ebusiness is something that a business can just go out and buy.
answer

FALSE–Ebusiness is not something that a business can just go out and buy
question

Which of the following terms implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction?
answer

Digital Darwinism
question

Which of the following produces an improved product, customers are eager to buy, such as a faster car or larger hard drive?
answer

Sustaining technology
question

Which of the following represents a form of disruptive technology?
answer

All of these are included.
question

Which of the following is a challenge of sustaining technology?
answer

Provides a product that does not meet existing customers’ future needs.
question

Which of the following is not included in the top five companies that are expecting future growth to be generated from new investments?
answer

Sears
question

The Innovator’s Dilemma suggests that established companies can take advantage of ___________ without hindering existing relationships with customers, partners, and stakeholders.
answer

disruptive technologies
question

Which of the following began as an essential emergency military communications system operated by the U.S. Department of Defense Advanced Research Project Agency (DARPA)?
answer

Internet
question

Which of the following terms could you use synonymously when referring to the web?
answer

URL, domain name
question

At a local marketing firm, Steve is the lead web developer and is responsible for working with customers on their web designs, development, and graphics. Which of the following would be a critical skill Steve must have to be able to perform his job?
answer

Understanding that he must create a unique domain name for each client, Being able to work with HTML, Understanding the World Wide Web and how hyperlinks work, All of these.
question

Which of the following is not a reason for the explosive growth of the WWW?
answer

Digital Darwinism.
question

Which term describes the WWW during its first few years of operation between 1991 and 2003?
answer

Web 1.0
question

What is the difference between ecommerce and ebusiness?
answer

Ecommerce is buying and selling of goods or service online. Ebusiness includes ecommerce and all activities related to internal and external business operations.
question

What is the Internet protocol web browsers use to request and display web pages using universal resource locators?
answer

Hypertext transport protocol (HTTP)
question

What allows users to access the WWW?
answer

Web browser
question

Which of the following are types of web browsers?
answer

Internet Explorer and Mozilla’s Firefox
question

What caused Polaroid to go bankrupt?
answer

One-hour film processing and digital cameras stole its market share.
question

Many social media sites today allow you to customize your web address, for example, www.facebook.com/Womenwithdrive. What is an alternate name for a web address such as www.apple.com?
answer

Universal resource locator
question

Many industries have been forced to change due to technology advances. Which of the below industries has felt the lowest amount of economic impact from ebusiness?
answer

Waste or recycling industry
question

Universities were among some of the first users of the Internet. What was the Internet first called?
answer

ARPANET
question

Both individuals and organizations have embraced ebusiness to do which of the following?
answer

Enhance productivity, Maximize convenience, Improve communications, All of these.
question

What is the depth and breadth of details contained in a piece of textual, graphic, audio, or video?
answer

Information richness
question

What measures the number of people a firm can communicate with all over the world?
answer

Information reach
question

Which of the below would not be considered an advantage of ebusiness?
answer

Reducing information reach.
question

What is the ability of an organization to tailor its products or services to the customers’ specifications?
answer

Mass customization
question

Which of the below would not be considered a company operating in the long tail of a typical sales curve?
answer

Walmart
question

M&M’s offers people the opportunity to order the candy in special colors or with customized sayings. How would you classify M’s ebusiness strategy?
answer

Mass customization
question

Amazon creates a unique recommendation listing for each customer that revisits its website. How would you classify Amazon’s ebusiness strategy?
answer

Personalization
question

Netflix creates a unique recommendation listing for each customer that revisits its website. How would you classify Netflix’s ebusiness strategy?
answer

Personalization
question

Nike offers people the opportunity to visit its website to create running shoes in the style and color they choose. How would you classify Nike’s ebusiness strategy?
answer

Mass customization
question

What uses the Internet to reassemble buyers, sellers, and other partners in a traditional supply chain in new ways?
answer

Reintermediation
question

When evaluating the business value of disintermediation, the more ____________ that are cut from the distribution chain, the lower the product price.
answer

intermediaries
question

What type of mediation refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness?
answer

Cybermediation
question

A company can reduce its costs by using ebusiness to change its business processes. Which of the following does not represent an example of how a company can reduce its costs through ebusiness?
answer

Researching products to find the lowest price and visiting the store to purchase the item.
question

Which of the below statements is correct?
answer

Just putting up a website does not create an ebusiness.
question

What is the exact pattern of a consumer’s navigation through a site?
answer

Clickstream data
question

What is the best way to measure a company’s ebusiness success?
answer

Effective MIS metrics, Interactivity, Clickstream data , All of these
question

Which of the following is an ebusiness marketing technique?
answer

Cookies, Pop-up ad, Banner ad, All of these
question

Which type of ebusiness marketing technique induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message’s visibility and effect?
answer

Viral marketing
question

Bonnie Flat is a real estate agent who specializes in the luxury home market in the Seattle, Washington area. Bonnie is highly technical and uses many online marketing techniques to increase business. One of the most successful online marketing techniques is to place a box along the top of real estate websites and luxury custom furniture websites. What type of marketing technique is Bonnie using?
answer

A banner ad
question

What is the business strategy that lets a company shorten the order process and add value with reduced costs or a more responsive and efficient service, and occurs when a business sells directly to the customer online?
answer

Disintermediation
question

What measures the number of people a firm can communicate with all over the world?
answer

Information reach
question

Which of the following is an example of a clickstream data metric?
answer

Dates and times of visits, Number of customers with shopping carts, The number of page views, All of these
question

What does digital Darwinism imply?
answer

Organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.
question

Which of the following is an example of a disruptive technology?
answer

Oracle’s database software, Sony’s transistor-based consumer electronics (transistor radio), Intel’s low-end microprocessors, All of these
question

Which of the following is an example of a sustaining technology?
answer

Porsche’s faster car
question

Which company is expected to gain the majority of its returns on existing investments?
answer

Phillips Petroleum
question

Which company is expected to gain the majority of its returns on new investments?
answer

Dell
question

Which of the following is a reason for the growth of the World Wide Web?
answer

The microcomputer revolution, Advancements in networking hardware., Web pages being easy to create and flexible., All of these.
question

What is information richness?
answer

The depth and breadth of details contained in a piece of textual, graphic, audio, or video information.
question

What is information reach?
answer

Measures the number of people a firm can communicate with all over the world.
question

What are agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together?
answer

Intermediaries
question

What occurs when a business sells directly to the customer online and cuts out the middle man?
answer

Disintermediation
question

What occurs when steps are added to the value chain as new players find ways to add value to the business process?
answer

Reintermediation
question

What refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Kelkoo and bank account aggregation services such as Citibank?
answer

Cybermediation
question

Websites sometimes deposit on a customer’s hard drive a small file containing information about the customer and the customer’s web activities. What is that small file called?
answer

Cookie
question

What is the name for a small ad on one website that advertises the products and services of another business, usually another dot-com business?
answer

Banner ad
question

All of the following are types of website visitors except:
answer

Usability visitor—————-Unidentified visitor, Identified visitor, Unique visitor
question

What category of website metrics does stickiness, or visit duration time, belong to?
answer

Visit metric
question

Which type of metric measures when a visitor reaches a website and their computer sends a request to the site’s computer server to begin displaying pages?
answer

Hit metric
question

What occurs when a website can know enough about a person’s likes and dislikes that it can fashion offers that are more likely to appeal to that person?
answer

Personalization
question

What occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave?
answer

Paradigm shift
question

A click-and-motor business operates on the Internet only, without a physical store.
answer

FALSE-This is the definition of a pure-play (virtual) business, which operates on the Internet only, without a physical store.
question

The majority of eBay’s customers are using a business-to-business (B2B) ebusiness model.
answer

FALSE–The majority of eBay’s customers are using a consumer-to-consumer (C2C) ebusiness model.
question

Taxonomy is the set of ideas about how all information in a given context should be organized.
answer

FALSE–Information architecture is the set of ideas about how all information in a given context should be organized.
question

A webinar is a form of web conferencing which blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants.
answer

TRUE
question

Many businesses are using instant messaging as a way to answer simple questions quickly and easily.
answer

TRUE
question

Managing consumer trust is not a challenge for ebusiness participants, as the Internet has numerous security technologies in place to completely protect consumers and their online transactions.
answer

FALSE–Managing consumer trust is a challenge facing ebusinesses.
question

The Internet marketplace is free of most forms of traditional sales tax.
answer

TRUE
question

The Internet uses such strong security technologies that ensuring consumer protection is not a challenge for ebusinesses.
answer

FALSE–Ensuring consumer protection is an ebusiness challenge.
question

Content providers are companies that generate revenue by providing digital content, such as news, music, photos, or videos. Examples include Netflix and iTunes.
answer

TRUE
question

Transaction brokers process online sales transactions.
answer

TRUE
question

An ebusiness model is a plan that details how a company creates, delivers, and generates revenues on the Internet.
answer

TRUE
question

Business-to-consumer applies to any business that sells its products or services directly to consumers online.
answer

TRUE
question

What is the difference between a business model and an ebusiness model?
answer

A business model details how a company creates, delivers, and generates revenue. An ebusiness model does all of the same except on the Internet.
question

What are the four main types of ebusiness models?
answer

Business-to-business, business-to-consumer, consumer-to-business, and consumer-to-consumer.
question

What is the difference between a B2C and a C2B?
answer

B2C focuses on business to consumers, and C2B focuses on consumers to business.
question

What is the ebusiness model that applies to customers offering goods and services to each other over the Internet?
answer

C2C
question

What is the ebusiness model that represents 80 percent of all online businesses and is typically more complex, requiring greater security needs?
answer

Business-to-business
question

Which of the following represents businesses buying from and selling to each other over the Internet?
answer

B2B
question

Carfax is an example of a company that sells its products or services directly to its consumers online. Which ebusiness model is Carfax using?
answer

B2C
question

What is another name for an eshop?
answer

Estore or etailer
question

Which category below represents the three common forms of business operations, brick-and-mortar, click-and-mortar, and pure play?
answer

B2C
question

John and Jenny have been saving for two years to take their six children on a vacation to Disneyworld. They are surprised to find out that airline tickets are far more expensive than they had anticipated. They decide to try to find cheaper tickets on Priceline, where they are allowed to set their own price they are willing to pay for the airline tickets. What form of ebusiness model are John and Jenny using?
answer

C2B
question

What type of revenue generation model is Google using when it generates revenue by allowing advertisers to bid on common search terms?
answer

Adwords
question

What is a business that operates in a physical store without an Internet presence?
answer

Brick-and-mortar business
question

What is a pure-play business?
answer

A business that operates only on the Internet without a physical store.
question

What are the three primary models that a B2C business can use to operate?
answer

Brick-and-mortar, click-and-mortar, virtual
question

Which type of ebusiness model is Amazon using?
answer

Pure-play
question

Which type of ebusiness model is Barnes and Noble using?
answer

Click-and-mortar
question

Which type of ebusiness model best describes Barnes & Noble?
answer

Click-and-mortar
question

What is a plan that details how a company creates, delivers, and generates revenues on the Internet?
answer

Ebusiness model
question

Which of the following represents a brick-and-mortar business?
answer

T.J. Maxx
question

All of the following are forms of ebusiness except ______________.
answer

subscription fee
question

Which of the below is not a valid form of ebusiness revenue model?
answer

Service provider———————–Examples of ebusiness revenue models are (1) advertising fees, (2) license fees, (3) subscription fees, (4) transaction fees, and (5) value-added services.
question

For the past 20 years, Perry has been an owner of several Coldwell Banker Real Estate franchises. To increase business Perry spends a great deal of money marketing and advertising his businesses online. Perry decides he would like to move beyond just marketing and create an actual ebusiness that acts like a search engine but focuses on only the real estate industry. The main revenue source for Perry’s ebusiness will be a charge of $50 a month for each property that is listed on the website. What is the primary revenue model for Perry’s new business?
answer

Subscription fees
question

Which of the following represents the connecting and communicating tools supporting and driving ebusiness?
answer

Email, instant messaging, podcasting, content management systems, and video conferencing, and web conferencing.
question

Which of the following represents the primary forms of ebusiness?
answer

Content providers, infomediaries, online marketplaces, portals, service providers, and transaction brokers.
question

Which of the following lists the primary ebusiness revenue models?
answer

Advertising fees, license fees, subscription fees, transaction fees, and value-added service fees.
question

Which of the following lists the categories for ebusiness models?
answer

B2B, B2C, C2C, and C2B.
question

What is an ISP?
answer

Internet service provider, a company that provides access to the Internet for a monthly fee.
question

Which of the below is not an ISP?
answer

Facebook
question

What occurs when a system updates information at the same rate it receives the information?
answer

Real-time communication
question

What is the primary business advantage of using email?
answer

Providing the ability to inform and communicate with many people simultaneously, immediately, and with ease.
question

What is another term for instant messaging?
answer

IMing
question

What is a service that enables instant or real-time communication between people?
answer

IMing
question

What are some of the immediate results businesses found from using instant messaging?
answer

Quickly identify which employees are at their computers, Easily hold simultaneous IM sessions with multiple people, Resolve questions or problems immediately, All of these.
question

What converts an audio broadcast for use by a digital music player?
answer

Podcasting
question

As a trainer for Exempla Healthcare, Tina is faced with many challenges to properly training her new hires. There are over 40 different locations where Exempla employees work across the Chicago metro area. Tina decides to implement some valuable ebusiness tools to help reduce traveling costs, increase speed, and provide flexibility for completing training sessions with all the new hires. Tina primarily uses PowerPoints and videos during her training modules. What is the most effective ebusiness tool for Tina to implement and accomplish all of her training goals?
answer

Webinar
question

Companies use __________ as marketing communication channels, discussing everything from corporate strategies to detailed product overviews.
answer

podcasting
question

Illuminate Live is a lecture program used in schools and is considered a(n) _________ tool.
answer

web conferencing
question

What is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website?
answer

Taxonomy
question

What is the set of ideas about how all information in a given context should be organized?
answer

Information architecture
question

Which of the below is not considered an advantage of a content management system?
answer

Content management systems increase order entry speed.
question

Which ebusiness tool increases the speed of business by allowing the transfer of documents with the same speed as the telephone?
answer

Email
question

What is the ebusiness tool that can increase marketing reach and build customer loyalty through audio broadcasting?
answer

Podcasting
question

Which ebusiness tool plays a crucial role in getting website visitors to view more than just the home page by providing clear navigation choices?
answer

CMS
question

Which of the following is a challenge facing an ebusiness?
answer

Managing Consumer Trust
question

What are the four challenges facing ebusinesses outlined in the text?
answer

Identifying limited market segments, managing consumer trust, ensuring consumer protection, and adhering to taxation rules.
question

Managing consumer trust is a challenge for ebusinesses. Which of the following is a good way to build trust when working with customers over the Internet?
answer

Be accessible to communicate in-person, Be available to communicate in-person, Use customer testimonials that link to your client website, All of these.
question

Internet marketers must develop ___________ to build strong relationships with customers to ensure loyalty.
answer

consumer trust
question

Ben Schultz decides to purchase an iPad on eBay. After the transaction completes and the money is withdrawn from Ben’s PayPal account, the iPad never shows up and the email address of the seller bounces. What issue has Ben encountered?
answer

The physical separation of buyer and seller
question

Susan teaches many individuals and business professionals how and why to use social media, and the benefits and challenges to using social media. Of the four ebusiness challenges, which of the following is the most crucial challenge to consider before engaging in social media?
answer

Ensuring consumer protection
question

Many believe that U.S. tax policy should provide a level playing field for traditional retail businesses, mail-order companies, and online merchants. What form of ebusiness challenge is this statement referring to?
answer

Adhering to taxation rules
question

Which of the below statements is accurate when considering the ebusiness challenge of adhering to taxation rules?
answer

Some online companies have to charge sales tax.
question

What is a telecommunications system?
answer

Enables the transmission of data over public or private networks
question

What is a network?
answer

A communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together
question

What is a peer-to-peer network?
answer

Any network without a central file server and in which all computers in the network have access to the public files located on all other workstations
question

What is a client?
answer

A computer that is designed to request information from a server
question

What is designed to connect a group of computers in close proximity to each other such as in an office building, a school, or a home?
answer

Local area network
question

What spans a large geographic area, such as a state, province, or country?
answer

Wide area network
question

What is a large computer network usually spanning a city?
answer

Metropolitan area network
question

Which of the following is not one of the differentiating factors of a network?
answer

Telecommunication system
question

What runs a network, steering information between computers and managing security and users?
answer

Network operating system
question

What is a computer that is designed to request information from a server?
answer

Client
question

What occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer?
answer

Packet-switching
question

What is a router?
answer

An intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination
question

What is network topology?
answer

Refers to the geometric arrangement of the actual physical organization of the computers (and other network devices) in a network
question

What is a client/server network?
answer

A model for applications in which the bulk of the back-end processing, such as performing a physical search of a database, takes place on a server, while the front-end processing, which involves communicating with the users, is handled by the clients
question

What is packet-switching?
answer

Occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer
question

What is interoperability?
answer

The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
question

What is a protocol?
answer

A standard that specifies the format of data as well as the rules to be followed during transmission
question

Which of the following is not a network topology?
answer

Ethernet
question

Which of the following represents the bus topology?
answer

All devices are connected to a central cable or backbone
question

Which of the following represents the ring topology?
answer

All devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it
question

What allows files containing text, programs, graphics, numerical data, and so on to be downloaded off or uploaded onto a network?
answer

File transfer protocol (FTP)
question

What allows the management of networked nodes to be managed from a single point?
answer

Simple network management protocol (SNMP)
question

What is TCP/IP’s own messaging system for email?
answer

Simple mail transfer protocol (SMTP)
question

What allows web browsers and servers to send and receive web pages?
answer

Hypertext transfer protocol (HTTP)
question

Which of the following is not a commonly used type of guided media?
answer

Transmission control protocol/Internet protocol
question

What refers to a type of cable composed of four (or more) copper wires twisted around each other within a plastic sheath?
answer

Twisted-pair cable
question

Which of the following represents the TCP/IP four-layer reference model?
answer

Application, transport, Internet, network interfaces
question

How many layers does the OSI model contain?
answer

Seven
question

What is interoperability?
answer

The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
question

File Transfer Protocol (FTP) allows files containing text, programs, graphics, numerical data, and so on to be downloaded off or uploaded onto a network.
answer

TRUE
question

Packet-switching is an intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination.
answer

FALSE-A router is an intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination.
question

Network transmission media refers to the various types of media used to carry the signal between computers.
answer

TRUE
question

Hypertext Transfer Protocol (HTTP) uses TCP/IP technology to transmit voice calls over long-distance telephone lines.
answer

FALSE–Voice over IP (VoIP) uses TCP/IP technology to transmit voice calls over long-distance telephone lines.
question

Simple Mail Transfer Protocol (SMTP) is TCP/IP’s own messaging system for email. Telnet Protocol provides terminal emulation that allows a personal computer or workstation to act as a terminal, or access device, for a server.
answer

TRUE
question

Interoperability is the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers.
answer

TRUE
question

Web 2.0 is the next generation of Internet that uses—a more mature, distinctive communications platform characterized by qualities such as collaboration, sharing, and free.
answer

TRUE
question

Source code is software made available free for any third party to review and modify.
answer

FALSE– This is the definition of open source.
question

The most common form of collective intelligence found outside the organization is crowdsourcing, or the wisdom of the crowd.
answer

TRUE
question

Social media are websites that rely on user participation and user-contributed content, such as Facebook, YouTube, and Digg.
answer

TRUE
question

Social tagging is similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system.
answer

FALSE—Folksonomy is similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system.
question

The three Business 2.0 communication and collaboration tools a business can use to harness the power of people include blogs, wikis, and mashups.
answer

TRUE
question

A wiki – from the Hawaiian word for quick – is a type of a collaborative web page that allows users to add, remove, and change content.
answer

TRUE
question

RSS allows a website to constantly feed information and news to consumers instead of having the consumer search for it.
answer

TRUE
question

Open source and sharing are both advantages and disadvantages of Business 2.0.
answer

TRUE
question

Copyright laws protect collaborative websites like blogs and wikis, allowing users to reuse material freely and easily
answer

FALSE—Copyright infringement is a challenge of the online world, and business 2.0 is seeing more cases and problems with it online.
question

Tim Berners-Lee was one of the founders of the Internet.
answer

TRUE
question

Egovernment involves the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer and all branches of government.
answer

TRUE
question

Web 3.0 refers to static text-based information websites.
answer

FALSE—Web 1.0 refers to static text-based information websites, Web 2.0 is about user-contributed content, and Web 3.0 is based on “intelligent” web applications using natural language processing, machine-based learning and reasoning, and intelligent applications.
question

Mobile banking and mobile sales are both a part of the emerging mbusiness.
answer

TRUE
question

Which of the below is not a characteristic of Business 2.0?
answer

Technical skills are required.—————————–Business 2.0 (Web 2.0) encourages user participation and the formation of communities to contribute to the content. Technical skills are no longer required to use and publish information to the web, and new web technologies eliminate entry barriers for online business. Web 2.0 technologies also provide a virtual environment that is vibrant and important to many.
question

What are the four most common Business 2.0 characteristics?
answer

Content sharing through open source, user-contributed content, collaboration inside the organization, and collaboration outside the organization.
question

What is a system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?
answer

Open system
question

Which of the below is not a characteristic associated with Mozilla’s Firefox?
answer

Mozilla’s Firefox is a prime example of a reputation system.
question

What is Mozilla Firefox?
answer

A competitor to Internet Explorer.
question

What is software whose source code is available free for any third party to review and modify?
answer

Open source
question

Erik is the president and owner of Watch Out, a local website development company that helps clients create and build unique websites. Many of his daily tasks are heavily technical in nature and require a high level of computer programming and Internet knowledge. Which of the below would Erik primarily use when performing his daily tasks?
answer

Source code
question

Ebusiness was characterized by a few companies or users posting content for the masses. What characterizes Business 2.0?
answer

The masses posting content for the masses.
question

What is web content that is created and updated by many users for many users?
answer

User-contributed content
question

eBay buyers voluntarily comment to other users and sellers on the quality of service, promptness of shipping, and their general satisfaction with the product. This is one of the most popular examples of user-generated content and is called a(n) ____________.
answer

reputation system
question

What is the most common form of collective intelligence found inside the organization?
answer

Knowledge management
question

What is the difference between asynchronous and synchronous communication?
answer

Asynchronous is communication that does not occur at the same time. Synchronous communication occurs at the same time.
question

Which of the below is not a characteristic of Business 2.0?
answer

Web browser
question

Which of the following is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information?
answer

Collaboration system
question

Lisa loves her job as an executive recruiter for a large hospital located in Dallas, Texas. Part of Lisa’s job requires her to gather industry information, collaborate with partners, compare competitors, and tap into the knowledge of prospective employees, partners, and customers. Which of the below would Lisa use to perform her job?
answer

Collective intelligence
question

Which system supports the capture, organization, and dissemination of knowledge throughout an organization?
answer

Knowledge management system
question

Which of the below focuses on user-generated content?
answer

YouTube, Wikipedia, Netflix, All of these
question

What are the two categories that include intellectual and knowledge-based assets?
answer

Explicit knowledge and tacit knowledge
question

What is the type of knowledge that is contained in people’s heads?
answer

Tacit knowledge
question

What is the type of knowledge that consists of anything that can be documented, archived, and codified, often with the help of an MIS department?
answer

Explicit knowledge
question

Which of the following is not an example of explicit knowledge?
answer

Employee opinion
question

What do Netflix and Amazon use to drive their recommendation tools?
answer

User-generated content
question

What are websites that rely on user participation and user-contributed content, such as Facebook, LinkedIn, and YouTube?
answer

Social media
question

What is the practice of expanding your business and social contacts by constructing a personal network?
answer

Social networking
question

What is a locally stored URL or the address of a file or Internet page saved as a shortcut?
answer

Website bookmark
question

Which of the below represents an example of why an employer would use social media?
answer

To find potential job candidates via LinkedIn, To review potential job candidates by viewing their Facebook page., To attract new job candidates via YouTube., All of these.
question

What are the two basic functions that social networking sites provide?
answer

The ability to create and maintain a profile that is your online identity and create connections between other people within the network.
question

Which of the below is not an example of a social bookmarking website?
answer

Facebook
question

What is an SNA?
answer

Social networking analysis
question

What maps group contacts, identifying who knows each other and who works together?
answer

Social networking analysis
question

Many social media websites use _________, or specific keywords or phrases incorporated into website content for means of classification or taxonomy.
answer

tags
question

Social tagging describes the collaborative activity of marking shared online content with keywords or tags as a way to ______________.
answer

Organize it for future navigation, Organize it for future filtering, Organize it for future search, All of these
question

Cell phone manufacturers often refer to their products as mobile devices. Which of the below would not be included in the folksonomy for a cell phone?
answer

Technology platform
question

What is the term that is similar to taxonomy except that crowdsourcing determines the tag or keyword-based classification system?
answer

Folksonomy
question

How do the majority of potential customers find business websites?
answer

Through search terms that match the content.
question

How would a company like Flickr use social tagging on its website?
answer

By allowing users to upload images and tag the images with their own keywords.
question

Using the collective power of a community to identify and classify content significantly _________ content categorization costs.
answer

lowers
question

A social bookmarking site is dedicated to providing all of the following except ________.
answer

to reconnect with colleagues for business progress
question

Which social media site works by allowing content to find the users, instead of the users having to search for the content?
answer

StumbleUpon
question

What is the primary way that social networks work?
answer

Connecting people by matching profile information.
question

What is one simplification that has occurred with Business 2.0?
answer

Improving access to information.
question

Which of the following identifies Business 2.0 communication and collaboration tools?
answer

Blogs, wikis, mashups
question

What is an online journal that allows users to post their own opinions, comments, graphics, and video?
answer

Blog or web log
question

What is one reason that Fortune 500 companies engage in blogging?
answer

To share ideas.
question

Twitter is an example of a __________.
answer

microblogging website
question

What is the practice of sending brief posts, only 140-200 characters long, to a personal blog, either publicly or to a private group of subscribers?
answer

Microblogging
question

Unlike traditional HTML, which of the following lets writers communicate and readers respond on a regular basis through a simple online journal?
answer

Blog
question

What is the difference between a wiki and a blog?
answer

A wiki user can alter the original content of an article, but a blog user can only add information as a comment.
question

What does RSS stand for?
answer

Real Simple Syndication
question

Many websites use _______ to constantly feed news to consumers instead of having the consumer search for the news.
answer

RSS
question

Large wikis, such as Wikipedia, can protect the quality and accuracy of their information by assigning users roles such as __________.
answer

reader, subject matter expert, editor, all of these
question

What describes how products in a network increase in value to users as the number of users increase?
answer

Network effect
question

Which of the following is one of the largest wikis on the web and one of the 10 most popular web destinations?
answer

Wikipedia
question

A company’s internal wiki can be a great tool for all of the following except:
answer

Building software applications.
question

What is a website or web application that uses content from more than one source to create a completely new product or service?
answer

Mashup
question

An API is a set of routines, protocols, and tools for ______________.
answer

building software applications
question

What does API stand for?
answer

Application Programming Interface
question

What is the role of a mashup editor?
answer

WYSIWYG, Often it allows the user to drag and drop data points into a web application, To provide a visual interface to build up a mashup., All of these.
question

Which of the following are challenges of Business 2.0?
answer

Information vandalism, Technology dependence, Violations of copyright and plagiarism, All of these
question

What is a potential problem or impact of technology dependence?
answer

Outages create potentially great havoc for people, businesses, and educational institutions that rely heavily on technology., Many have a need to be continuously connected for every activity, which potentially eliminates crucial in-person social skills and could stunt psychological growth., How do people or businesses function if the connection is down?, All of these.
question

Which of the following demonstrates potential issues with Business 2.0 and information vandalism?
answer

Open source allows anyone to be able to edit, damage, or destroy content.
question

One of the most famous examples of wiki vandalism occurred when a false biography entry stated which of the following?
answer

John Seigenthaler Sr. was assistant to Attorney General Robert F. Kennedy in the early 1960s and was involved in Kennedy’s assassination as well as JFK’s.
question

Which of the following best describes Web 1.0?
answer

Static text-based information websites
question

Which of the following best describes Web 2.0?
answer

Social media and user-generated web content
question

Which of the following best describes Web 3.0?
answer

Based on the “intelligent” web, where applications use natural language processing
question

Which statement below is inaccurate?
answer

Web 2.0 is a simple static website without any interaction with its users.
question

What is a component of Web 3.0 that describes things in a way that computers can understand?
answer

Semantic web
question

Which statement below is incorrect?
answer

The semantic web captures, organizes, and disseminates knowledge (i.e., know-how) throughout an organization.
question

Which of the following is not a topic or feature that is included in Web 3.0?
answer

Social networking
question

What statement below describes Web 3.0’s feature that ensures the “integration of legacy devices”?
answer

The ability to use current devices such as iPhones and laptops as credit cards or tickets.
question

The government has taken an active role online. Which of the following is the term that describes the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between government and the citizen-consumer within all the branches of government
answer

Egovernment
question

What website was the primary catalyst for growing electronic government and is the official U.S. gateway to all government information?
answer

FirstGov.gov
question

Which of the following is the example of consumer-to-government (C2G) highlighted in the figure Extended Ebusiness Models?
answer

egov.com
question

What is the ability to purchase goods and services through a wireless Internet-enabled device
answer

Mobile business
question

How would you categorize mobile entertainment, mobile sales, mobile ticketing, and mobile banking?
answer

Mobile business, Mbusiness, Mcommerce, All of these.
question

What is an open system?
answer

A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
question

What company monitors the operation of its vending machines via wireless technology?
answer

Dr Pepper/Seven Up Inc.
question

What technology enables wireless networks to extend as far as 30 miles and transfer information, voice, and video at faster speeds than cable?
answer

WiMAX wireless broadband
question

What technology uses radio waves rather than wires to transmit information across a local area network?
answer

Wireless local area network
question

What refers to any type of electrical or electronic operation that is accomplished without the use of a “hard-wired” connection?
answer

Wireless
question

Mobile technology refers to any type of electrical or electronic operation that is accomplished without the use of a “hard-wired” connection.
answer

FALSE–Wireless technology refers to any type of electrical or electronic operation that is accomplished without the use of a “hard-wired” connection.
question

Wireless means the technology can travel with the user, but it is not necessarily in real time.
answer

FALSE—Mobile means the technology can travel with the user, but it is not necessarily in real time
question

What is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements?
answer

Project management
question

What is a project?
answer

A temporary endeavor undertaken to create a unique product, service, or result.
question

What is a project manager?
answer

An individual who is an expert in project planning and management.
question

Which of the following is a business-related consequence of successful software?
answer

Increased revenues
question

Which of the following is a business-related consequence of software failure?
answer

Decreased productivity, Damage to brand reputation, Incurred liabilities, All of these.
question

What is the systems development life cycle?
answer

The overall process for developing information systems from planning and analysis through implementation and maintenance.
question

What is the overall process for developing information systems from planning and analysis through implementation and maintenance?
answer

Systems development life cycle
question

Which of the following represents the phases in the SDLC?
answer

Plan, analyze, design, develop, test, implement, maintain
question

What is the analysis phase in the SDLC?
answer

Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system.
question

Which phase of the SDLC gathers business requirements?
answer

Analysis
question

What is the design phase in the SDLC?
answer

Involves describing the desired features and operations of the system.
question

What is the implementation phase in the SDLC?
answer

Involves placing the system into production so users can begin to perform actual business operations with the system.
question

Preventing liabilities is a business-related consequence of failed software.
answer

FALSE—Preventing liabilities is a business-related consequence of successful software.
question

The implementation phase involves taking all of the detailed design documents from the design phase and transforming them into the actual system.
answer

FALSE–The development phase involves taking all of the detailed design documents from the design phase and transforming them into the actual system.
question

PMI stands for the Project Management Institute.
answer

TRUE
question

Project management is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements.
answer

TRUE
question

What is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges?
answer

Methodology
question

Which of the following is an issue related to the waterfall methodology?
answer

Flaws in accurately defining and articulating the business problem., Managing costs, resources, and time constraints., Assumes users can specify all business requirements in advance., All of these.
question

What consists of a series of tiny projects?
answer

Iterative development
question

Which methodology aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process with a design point that uses the bare minimum requirements?
answer

Agile methodology
question

Which of the following describes agile?
answer

Fast and efficient, Small and nimble, Lower cost, All of these
question

Which of the following is not a primary form of agile methodology?
answer

SDLC
question

What is an activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance?
answer

Waterfall methodology
question

What emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process?
answer

RAD methodology
question

What breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete?
answer

Extreme programming methodology
question

What is the success rate for a project using the waterfall methodology?
answer

1 in 10
question

Which of the following is a fundamental of the RAD methodology?
answer

Focus initially on creating a prototype that looks and acts like the desired system, Actively involve system users in the analysis, design, and development phases, Accelerate collecting the business requirements through an interactive and iterative construction approach, All of these.
question

Which methodology provides a framework for breaking down the development of software into four gates?
answer

RUP
question

Which of the following is not one of the four gates in the RUP methodology?
answer

Collaboration
question

Which gate in the RUP methodology expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it.
answer

Elaboration
question

Which gate in the RUP methodology includes building and developing the product?
answer

Construction
question

Which methodology is owned by IBM?
answer

RUP
question

Which methodology uses small teams to produce small pieces of deliverable software using sprints, or 30-day intervals, to achieve an appointed goal?
answer

Scrum
question

Which methodology ends each day or begins with a stand-up meeting to monitor and control the development effort?
answer

Scrum
question

How many days is a typical sprint in the scrum methodology?
answer

30 days
question

Which of the following is not one of the tenets in the Agile Alliance’s manifesto?
answer

Do not allow changing requirements, especially late in development.
question

Which of the following is not one of the primary principles an organization should follow for successful agile software development?
answer

Test and deliver infrequently.
question

The traditional waterfall methodology is a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.
answer

TRUE
question

A prototype is a smaller-scale representation or working model of the users’ requirements or a proposed design for an information system.
answer

TRUE
question

What is the number one reason that IT projects fall behind schedule or fail?
answer

Poor planning or poor project management.
question

What are the three primary variables (or triple constraints) in any project?
answer

Time, cost, scope
question

What is a project deliverable?
answer

Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.
question

What is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house?
answer

Outsourcing
question

What is it called when a company uses organizations from developing countries to write code and develop systems?
answer

Offshore outsourcing
question

Which of the following is a benefit an organization can receive from outsourcing?
answer

Financial savings, Increased technical abilities, , Market agility, All of these
question

Which of the following is the most common function outsourced?
answer

MIS
question

Which of the following is the least common function outsourced?
answer

Marketing/sales
question

Which of the following is the primary reason why companies outsource?
answer

Tap outside sources of expertise.
question

Which of the following is NOT one of the reasons mentioned in the text as reasons companies outsource?
answer

In-house expertise.——————– What is : Acquiring core competencies. Achieving financial savings. Rapid growth.
question

Which of the following are the influential driver(s) affecting the growth of outsourcing markets?
answer

Core competencies, Rapid growth, Industry changes, All of these
question

What is the outsourcing option that includes the closest location and direct customer control?
answer

Onshore outsourcing
question

All of the following are challenges of outsourcing except:
answer

Reduced frustration and expense related to hiring and retaining employees in an exceptionally tight job market.————————–Contract length. Competitive edge. Confidentiality. Reduced frustration is not a challenge of outsourcing. It is a benefit.
question

Which of the following is an outsourcing challenge caused by contract length?
answer

Difficulties in getting out of a contract, Problems in foreseeing future issues, Problems in reforming an internal IT department, All of these
question

What is a project management office (PMO)?
answer

An internal department that oversees all organizational projects.
question

What is a project milestone?
answer

A key date by which a certain group of activities must be performed.
question

Human resources is the most commonly outsourced function.
answer

FALSE–MIS is the most commonly outsourced function.
question

Outsourcing is a common approach using the professional expertise within an organization to develop and maintain the organization’s information technology systems.
answer

FALSE–In-sourcing is a common approach that uses the professional expertise within an organization to develop and maintain the organization’s information technology systems.
question

In-sourcing is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.
answer

FALSE– Outsourcing is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.
question

Offshore outsourcing is using organizations from developing countries to write code and develop systems
answer

TRUE
question

The triple constraint includes time, cost, and quality.
answer

FALSE————The triple constraint includes time, cost, and scope. All affect quality.
question

The relationships among the triple constraint variables are not dependent.
answer

FALSE
question

Which of the following is one of the 21st-century organizational trends on the business side?
answer

Uncertainty in terms of future business scenarios and economic outlooks. Emphasis on strategic analysis for cost reduction and productivity enhancement. Focus on improved business resiliency via the application of enhanced security. All of these.
question

Which of the following is not one of the primary information technology areas on which organizations are focusing?
answer

Database
question

Which of the following is a benefit a business can receive by deploying the latest in security technology?
answer

Fewer disruptions to organizational systems, Increased productivity of employees, Greater advances in administration, All of these
question

Which of the following is a reason why businesses want to have the appropriate levels of authentication, access control, and encryption?
answer

Only authorized individuals can gain access to the network. Only authorized individuals can access applications for which they are entitled. Individuals cannot understand or alter information while in transit. All of these.
question

What is the ability to purchase goods and services through a wireless Internet-enabled device?
answer

Mobile commerce
question

What is the blending of computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations?
answer

Telematics
question

What is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards?
answer

Electronic tagging
question

What uses active or passive tags in the form of chips or smart labels?
answer

Radio frequency identification
question

Which of the following is one of the new series of business success factors and challenges that are helping to determine marketplace winners and losers?
answer

Organization agility A focus on core competencies and processes Instantaneous business response All of these
question

Which of the following was the original design for the Internet?
answer

Email, Document exchange, Display of static content, All of these
question

Where is the position of IT infrastructure within the organization?
answer

Bottom
question

Which company was the victim of a distributed denial-of-service (DDoS) attack that forced the company to close operations and to eventually transfer over 2,500 customers to a rival organization?
answer

CloudNine Communications
question

Core business relationships and models are dramatically changing, including shifts from which of the following?
answer

The value in material things to the value of knowledge and intelligence
question

What is the practice of buying a domain name and not using the web page but waiting to profit from the trademark?
answer

Domain or cyber squatting
question

IT infrastructure is the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization’s goals.
answer

TRUE
question

IT infrastructure, security, ebusiness, and integrations are the four primary information technology areas where organizations are focusing
answer

TRUE
question

The original design of the Internet and the web was for simple email, document exchange, and the display of static content, not for sophisticated and dynamic business applications that require access to back-end systems and databases.
answer

TRUE
question

Telematics is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards.
answer

False– Electronic tagging is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards.
question

Telematics is the blending of computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations.
answer

TRUE
question

What includes the plans for how an organization will build, deploy, use, and share its data, processes, and MIS assets?
answer

MIS infrastructure
question

What includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization’s goals?
answer

Agile MIS infrastructure
question

What is recovery?
answer

The ability to get a system up and running in the event of a system crash, The ability to get a system up and running in the event of a system failure, Restoring the information backup, All of these
question

What is a backup?
answer

An exact copy of a system’s information
question

What is failover?
answer

A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
question

What is recovery?
answer

The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
question

What is fault tolerance?
answer

A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
question

What is a separate and fully equipped facility where the company can move immediately after a disaster and resume business?
answer

Hot site
question

What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
answer

Disaster recovery plan
question

What refers to how well a system can adapt to increased demands of growth?
answer

Scalability
question

What determines the future environmental infrastructure requirements to ensure high-quality system performance?
answer

Capacity planning
question

What addresses when systems can be accessed by employees, customers, and partners?
answer

Availability
question

Which of the following is a type of backup/recovery media?
answer

DVD, Tape, Disk, All of these
question

What is the primary difference between the different types of backup/recovery media?
answer

Speed, Cost, Expense, All of these
question

What type of backup strategy would you recommend to an organization that deals with large volumes of critical information?
answer

Hourly
question

What type of backup strategy would you recommend to an organization that deals with small amounts of noncritical information?
answer

Weekly
question

What does the disaster recovery cost curve chart(s)?
answer

The cost to the organization of the unavailability of information; The cost to the organization of recovering from a disaster over time; The cost to the organization of the unavailability of technologyL; All of these
question

What is a separate facility that does not have any computer equipment, but is a place where employees can move after a disaster?
answer

Cold site
question

Which of the following is not a characteristic of agile MIS infrastructure?
answer

Integrity
question

What ensures all systems are functioning correctly and providing accurate information?
answer

Reliability
question

What addresses the time frames when systems can be accessed by employees, customers, and partners?
answer

Availability
question

What measures how quickly a system performs a certain process or transaction in terms of efficiency IT metrics of both speed and throughput?
answer

Performance
question

Business continuity planning is a plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption.
answer

TRUE
question

Performance measures how quickly a system performs a certain process or transaction in terms of efficiency IT metrics of both speed and throughput.
answer

TRUE
question

Infrastructure architecture identifies where and how important information, like customer records, is maintained and secured.
answer

FALSE– Information MIS infrastructure identifies where and how important information, like customer records, is maintained and secured.
question

Fault tolerance is a computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service. Fault tolerance can be provided with software, or embedded in hardware, or provided by some combination.
answer

TRUE
question

The primary characteristics of agile MIS infrastructure include flexibility, scalability, reliability, availability, and performance.
answer

TRUE
question

What is the recommended way to implement information security lines of defense?
answer

People first, technology second
question

Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident?
answer

Insiders
question

What identifies the rules required to maintain information security?
answer

Information security policies
question

Which of the following is not one of the five steps for creating an information security plan?
answer

Revise and test the information security policies
question

What is social engineering?
answer

Using one’s social skills to trick people into revealing access credentials or other information valuable to the attacker
question

Which of the following is not one of the three primary information security areas?
answer

Detection and resistance
question

What is a method for confirming users’ identities?
answer

Authentication
question

What is the most secure type of authentication?
answer

Something the user knows such as a user ID and password; Something the user has such as a smart card or token; Something that is part of the user such as a fingerprint or voice signature; All of these
question

What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?
answer

Smart card
question

What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?
answer

Biometrics
question

Which of the following is not considered a type of biometrics?
answer

None of these- Voice Face Iris
question

What is the most costly and intrusive form of authentication?
answer

Something that is part of the user such as a fingerprint or voice signature
question

Which of the following authentication methods is 100 percent accurate?
answer

None of these(Smart card; Fingerprint authentication; User ID)
question

What are the technologies available to help prevent and build resistance to attacks?
answer

Content filtering, encryption, firewalls
question

What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?
answer

None of these (Biometrics; Encryption; Firewalls)
question

What is spam?
answer

A form of unsolicited email
question

What is encryption?
answer

Scrambles information into an alternative form that requires a key or password to decrypt the information
question

Which of the following can be completed by encryption?
answer

Switch the order of characters; Replace characters with other characters;Use a mathematical formula to convert the information into some sort of code; All of these
question

Where do organizations typically place firewalls?
answer

Between the server and the Internet
question

Which of the following does a firewall perform?
answer

Examines each message that wants entrance to the network; Blocks messages without the correct markings from entering the network; Detects computers communicating with the Internet without approval; All of these
question

What includes a variety of threats such as viruses, worms, and Trojan horses?
answer

Malicious code
question

What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?
answer

Spoofing
question

Which of the following is a program or device that can monitor data traveling over a network?
answer

Sniffer
question

What attacks computer systems by transmitting a virus hoax, with a real virus attached?
answer

Hoaxes
question

What is the most common type of defense within detection and response technologies?
answer

Antivirus software
question

Who works at the request of the system owners to find system vulnerabilities and plug the holes?
answer

White-hat hackers
question

Who breaks into other people’s computer systems and just looks around or steals and destroys information?
answer

Black-hat hacker
question

Who finds hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses?
answer

Script kiddies
question

Who are hackers with criminal intent?
answer

Crackers
question

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?
answer

Cyberterrorists
question

What is a type of virus that spreads itself, not just from file to file, but also from computer to computer?
answer

Worm
question

What floods a website with so many requests for service that it slows down or crashes the site?
answer

Denial-of-service attack
question

Which is a virus that opens a way into the network for future attacks?
answer

Backdoor programs
question

If there is a security breach on your organizational information systems, which information security area is best suited to handle the breach?
answer

Detection and response
question

Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
answer

FALSE—Insiders are legitimate, not illegitimate, users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
question

Information security policies detail how an organization will implement the information security plan.
answer

FALSE–Information security plan details how an organization will implement the information security policies.
question

Tokens are small electronic devices that change user passwords automatically.
answer

TRUE
question

The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
answer

TRUE
question

What are the principles and standards that guide our behavior toward other people?
answer

Ethics
question

What is intangible creative work that is embodied in physical form?
answer

Intellectual property
question

What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?
answer

Copyright
question

What is the assurance that messages and information remain available only to those authorized to view them?
answer

Confidentiality
question

What is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent?
answer

Privacy
question

What is software that is manufactured to look like the real thing and sold as such?
answer

Counterfeit software
question

What is the unauthorized use, duplication, distribution, or sale of copyrighted software?
answer

Pirated software
question

What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?
answer

ePolicies
question

Which of the following describes privacy?
answer

The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.
question

Which of the following describes confidentiality?
answer

The assurance that messages and information are available only to those who are authorized to view them.
question

Which of the following describes ePolicies?
answer

Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
question

Which of the following is not considered an ePolicy?
answer

Security badge policy
question

Which of the following is an example of acting ethically?
answer

None of the above (Individuals copy, use, and distribute software.; Employees search organizational databases for sensitive corporate and personal information.; Individuals hack into computer systems to steal proprietary information.)
question

Which of the following is not included in the four quadrants of ethical and legal behavior?
answer

Legal behavior and ethical behavior; Illegal behavior and ethical behavior; Legal behavior and unethical behavior; All of these
question

What is the ideal type of decision making for people in an organization?
answer

Legal and ethical
question

Which act prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the consumer?
answer

The Bork bill
question

Which act allows any person to examine government records unless it would cause an invasion of privacy?
answer

The Freedom of Information Act
question

Which act restricts what information the federal government can collect?
answer

The Privacy act
question

Which act protects investors by improving the accuracy and reliability of corporate disclosures?
answer

The Sarbanes-Oxley Act
question

Which act strengthened criminal laws governing identity theft?
answer

None of the above(Bork Bill; Sarbanes-Oxley Act; Cable Communications Act)
question

What is the policy that contains general principles to guide computer user behavior?
answer

None of the above(Information privacy policy; Acceptable use policy; Internet use policy)
question

Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?
answer

Ethical computer use policy
question

According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.
answer

Informed, consent
question

If an organization were to have only one policy, which one would it want?
answer

Ethical computer use policy
question

Which policy contains general principles regarding information privacy?
answer

Information privacy policy
question

Which of the following is a classic example of unintentional information reuse?
answer

Social Security number
question

What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet?
answer

Acceptable use policy
question

What is a contractual stipulation that ensures that ebusiness participants do not deny their online actions?
answer

Nonrepudiation
question

Which policy typically contains a nonrepudiation clause?
answer

Acceptable use policy
question

Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being gaining network access?
answer

Acceptable use policy
question

What is one of the major problems with email?
answer

User’s expectation of privacy
question

Which of the following is part of the acceptable use policy stipulations?
answer

Not using the service as part of violating any law; Not attempting to break the security of any computer network or user; Not posting commercial messages to groups without prior permission; All of the above.
question

Which of the following is part of the acceptable use policy stipulations?
answer

Not attempting to mail bomb a site
question

What is a mail bomb?
answer

Sending a massive amount of email to a specific person or system that can cause that user’s server to stop functioning.
question

Which policy details the extent to which email messages may be read by others?
answer

Email privacy policy
question

Which of the following is not a part of the email privacy policy stipulations?
answer

It informs people that the organization has full control over email once it is transmitted outside the organization.
question

Which of the following describes Workplace MIS monitoring?
answer

Tracking people’s activities by such measures as number of keystrokes; Tracking people’s activities by such measures as error rate; Tracking people’s activities by such measures as number of transactions processed; All of the above.
question

What is a program, when installed on a computer, records every keystroke and mouse click?
answer

Key logger software
question

What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?
answer

Hardware key logger
question

What is a small file deposited on a hard drive by a website containing information about customers and their web activities?
answer

Cookie
question

Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
answer

FALSE0—Privacy is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
question

Ethical computer use policy contains general principles to guide computer user behavior.
answer

TRUE
question

Employee monitoring policies explicitly state how, when, and where the company monitors its employees.
answer

TRUE
question

Workplace MIS monitoring tracks people’s activities by such measures as number of keystrokes, error rate, and number of transactions processed.
answer

TRUE
question

What is a business-driven IT architectural approach that supports organizational computing needs with utility-based computing concepts?
answer

Service oriented architecture
question

What are the key technical concepts of SOA?
answer

Services, interoperability, loose coupling
question

What is a SOA service?
answer

A simple business task
question

Which of the following is not part of a typical SOA solution?
answer

Decrease people productivity with better business integration
question

What is the ability to present the resources of a single computer as if it is a collection of separate computers, each with its own virtual CPUs, network interfaces, storage, and operating system?
answer

System virtualization
question

Which of the following reflects Moore’s Law?
answer

New generations of chips deliver double the processing power as the previous generation
question

Which of the following is not an additional benefit of virtualization?
answer

Ease of use for customer relationship management systems
question

What is an aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilization, and easier access to data?
answer

Grid Computing
question

What enables organizations to optimize computing and data resources, pool them for large capacity workloads, share them across networks, and enable collaboration?
answer

Grid Computing
question

What refers to resources and applications hosted remotely as a shared service over the Internet?
answer

Cloud Computing
question

What is a model of software deployment, where an application is licensed for use as a service, provided to customers on-demand?
answer

Software as a Service
question

SOA provides the technology underpinnings for working with services that are not just software or hardware, but rather business tasks.
answer

TRUE
question

Services are business tasks.
answer

TRUE
question

What is a technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible?
answer

Cluster analysis
question

What reveals the degree to which variables are related and the nature and frequency of these relationships in the information?
answer

Association detection
question

Which of the following represents market basket analysis?
answer

Analyzes website information; Analyzes checkout scanner information; Detects customers’ buying behavior; All of these
question

What is time-series information?
answer

Time-stamped information collected at a particular frequency
question

Which of the following is a form of statistical analysis?
answer

Forecasting
question

What are forecasts?
answer

Predictions made on the basis of time-series information
question

Which company uses statistical analysis to automatically detect potential issues, provide quick and easy access to reports, and perform multidimensional analysis on all warranty information?
answer

Whirlpool
question

Which type of BI manages daily operations and integrates BI with operational systems?
answer

Operational BI
question

Which type of BI conducts short-term analysis to achieve strategic goals?
answer

Tactical BI
question

Which type of BI achieves long-term organizational goals?
answer

Strategic BI
question

Which form of BI has managers and analysts as its primary users?
answer

Operational BI
question

Which form of BI uses the time frame of days to weeks to months?
answer

Tactical BI
question

Which form of BI uses real-time metrics for its data?
answer

Operational BI
question

Which form of BI uses months to years as its time frame?
answer

Strategic BI
question

What is data latency?
answer

The time duration to make data ready for analysis and loading the data into the database
question

What is analysis latency?
answer

The time from which data are made available to the time when analysis is complete
question

What is decision latency?
answer

The time it takes a human to comprehend the analytic result and determine an appropriate action
question

Which of the following is a business benefit of BI?
answer

Up-to-the minute information for everyone
question

Which of the following is one of the four main categories of BI benefits?
answer

Quantifiable benefits
question

Which type of BI benefits includes working time saved in producing reports and selling information to suppliers?
answer

Quantifiable benefits
question

Which type of BI benefits are the results of discoveries made by creative users?
answer

Unpredictable benefits
question

Which type of BI benefits includes improved communication throughout the enterprise, improved job satisfaction of empowered users, and improved knowledge sharing?
answer

Intangible benefits
question

Quantifiable benefits, indirectly quantifiable benefits, unpredictable benefits, and intangible benefits are the four primary categories of BI benefits.
answer

TRUE
question

Data latency is the time from which data are made available to the time when analysis is complete.
answer

FALSE–Analysis latency is the time from which data are made available to the time when analysis is complete.
question

The three forms of BI include operational, tactical, and value-added.
answer

FALSE–The three forms of BI include operational, tactical, and strategic.

Get instant access to
all materials

Become a Member