CIS461 Chapter 8

question

Dell Computer’s use of information systems to improve efficiency and implement “mass customization” techniques to maintain consistent profitability and an industry lead illustrates which business objective?
answer

competitive advantage
question

The move of retail banking to use ATMs after Citibank unveiled its first ATMs illustrates the use of information systems to achieve which business objective?
answer

survival
question

Which of the following objectives best describes the business strategy behind the development of smart grid initiatives by power companies, as discussed in the chapter case?
answer

operational excellence
question

Order data for baseball tickets and bar code data are examples of
answer

raw input
question

Converting raw data into a more meaningful form is called
answer

processing
question

Operational management is responsible for directing the day-to-day operations of the business and therefore needs transaction-level information.
answer

True
question

Transaction processing systems are most commonly used by the senior management level of an organization
answer

False
question

A transaction processing system is a computerized system that performs and records the daily routine transactions necessary to conduct business.
answer

True
question

Decision-support systems help managers make decisions that are unique, rapidly changing, and not easily specified in advance.
answer

True
question

ESSs are designed to incorporate data about external events, but they also draw summarized information from internal MIS and DSS.
answer

True
question

Producing bills of materials is a business process within the ________ function.
answer

manufacturing and production
question

In green computing, reducing computer power consumption is a top priority.
answer

True
question

An application server may reside on the same computer as a Web server or on its own dedicated computer.
answer

True
question

Enterprise integration requires software that can link disparate applications and enable data to flow freely among different parts of the business.
answer

True
question

The operating system is used to manage the computer’s activities.
answer

True
question

SANs create large central pools of storage that can be rapidly accessed and shared by multiple servers.
answer

True
question

Hypertext markup language specifies how text, graphics, video, and sound are placed on a Web page document.
answer

True
question

The Domain Name System (DNS) converts IP addresses to domain names.
answer

False
question

A DBMS makes the
answer

physical database available for different logical views
question

A DBMS reduces data redundancy and inconsistency by
answer

minimizing isolated files with repeated data.
question

A DBMS separates the logical and physical views of data.
answer

True
question

A VPN
answer

is an encrypted private network configured within a public network
question

A data warehouse is composed of
answer

historic and current internal data
question

A data warehouse may be updated by a legacy system.
answer

True
question

A field identified in a record as holding the unique identifier for that record is called the
answer

key field.
question

A field identified in a table as holding the unique identifier of the table’s records is called the
answer

primary key.
question

A network that covers broad geographical regions is most commonly referred to as a(n)
answer

wide area network
question

A protocol is a standard set of rules and procedures for the control of communications in a network.
answer

True
question

Data mining is a tool for allowing users to
answer

find hidden relationships in data
question

Increasingly, voice, video, and data communications are all based on Internet technology
answer

True
question

In a telecommunications network architecture, a protocol is
answer

a standard set of rules and procedures for control of communications in a network.
question

In a relational database, complex groupings of data must be streamlined to eliminate awkward many-to-many relationships.
answer

True
question

IPv6 is being developed in order to
answer

create more IP addresses
question

Fiber-optic cable is more expensive and harder to install than wire media.
answer

True
question

Every record in a file should contain at least one key field.
answer

True
question

Each characteristic or quality describing a particular entity is called an attribute.
answer

True
question

Duplicate data in multiple data files is called data ________.
answer

redundancy
question

Digital subscriber lines
answer

operate over existing telephone lines to carry voice, data, and video
question

One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as
answer

hotspots
question

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called
answer

normalization
question

The most prominent data manipulation language today is
answer

SQL
question

The logical view
answer

presents data as they would be perceived by end users.
question

________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.
answer

“Security”
question

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called
answer

social engineering
question

Unauthorized access is a security challenge that is most likely to occur in which of the following points of a corporate network?
answer

client computer
question

Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.
answer

True
question

Wal-mart’s strategy of continuous replenishment of inventory based on actual customer purchases is an example a pull-based SCM model.
answer

True
question

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor’s advertising costs up. This is an example of
answer

click fraud
question

A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes
answer

ERP systems.
question

Supply chain inefficiencies can waste as much as 25 percent of a company’s operating costs.
answer

True
question

Sniffing is a security challenge that is most likely to occur in which of the following points of a corporate network?
answer

communications lines
question

To minimize the expense of implementing an enterprise system, businesses can opt to curtail the customization of an enterprise package and instead change business processes to match the software.
answer

True
question

Viruses can be spread through e-mail.
answer

True
question

Customer relationship management systems typically provide software and online tools for sales, customer service, and
answer

marketing
question

A firewall allows the organization to
answer

prevent unauthorized communication both into and out of the network
question

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years
answer

True
question

A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ________ effect.
answer

bullwhip
question

Implementing an enterprise application typically requires organizational change as well as adjustments to existing business processes.
answer

True
question

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
answer

True
question

In addition to e-mail, instant messages and P2P file-sharing can also pose security threats to computer systems and networks
answer

True
question

NAT conceals the IP addresses of the organization’s internal host computers to deter sniffer programs.
answer

True
question

Enterprise software is built around thousands of predefined business processes that reflect
answer

best practices
question

The most common type of electronic evidence is
answer

e-mail
question

Why is overstocking warehouses not an effective solution for a problem of low availability?
answer

It increases inventory costs
question

Redirecting a Web link to a different address is a form of
answer

spoofing
question

Enterprise systems require fundamental changes in the way the business operates.
answer

True
question

Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.
answer

True
question

In a phenomenon called ________, some argue that large numbers of people can make better decisions about a wide range of topics or products than a single person or even a small committee of experts.
answer

the wisdom of crowds
question

In general, for digital goods, the marginal cost of producing another unit is about zero.
answer

True
question

The act of engaging consumers in a dialog that dynamically adjusts the experience to the individual describes which dimension of e-commerce technology?
answer

interactivity
question

The integration of video, audio, and text marketing messages into a single marketing message and consumer experience describes which dimension of e-commerce technology?
answer

richness
question

Amazon.com uses Web personalization as a major marketing tool.
answer

True
question

EBay is an example of
answer

C2C e-commerce
question

Disintermediation provides major benefits to the distributor
answer

False
question

Digital goods are goods that are
answer

delivered digitally.
question

In which of the following revenue models does a Web site charge a fee for access to some or all of its offerings on a continual, regular basis?
answer

subscription
question

Reducing the business process layers in a distribution channel is called
answer

disintermediation
question

Selling products and services directly to individual consumers via the Internet best describes
answer

B2C e-commerce
question

The effort required to locate a suitable product is called
answer

search costs
question

The process of sourcing goods and materials, negotiating with suppliers, paying for goods, and making delivery arrangements is called
answer

procurement
question

The quality of ubiquity, as it relates to e-commerce, is illustrated by
answer

the availability of the Internet everywhere and anytime.
question

What type of knowledge management system did Canadian Tire implement in order to improve the communications with dealers?
answer

content management system
question

Which of the following is not a Web 2.0 tool firms are using to foster collaboration?
answer

intranets
question

Which of the following was the leading marketing format in 2010?
answer

search engine
question

An example of the service provider business model is Netflix, an online video store and streaming media outlet.
answer

False
question

A third-party Net marketplace that connects many buyers and suppliers for spot purchasing is called a(n)
answer

exchange
question

An example of the content provider business model is Salon.com, an online magazine
answer

True
question

An information system project’s scope is directly related to its business requirements
answer

True
question

An information systems plan contains a statement of corporate goals and specifies how information technology will support the attainment of those goals.
answer

True
question

Between 30 and 40 percent of all software projects are “runaway” projects that far exceed original schedule and budget projections.
answer

True
question

Counterimplementation refers to a deliberate strategy to thwart the implementation of an information system or an innovation in an organization.
answer

True
question

Mandatory use of a system is one effective way of overcoming user resistance to an information system.
answer

False
question

The ________ consists of systems analysts, specialists from the relevant end-user business areas, application programmers, and perhaps database specialists.
answer

project team
question

The ________ reviews and approves plans for systems in all divisions.
answer

IS steering committee
question

The larger the systems project, the more risk the project runs in terms of being completed on time, within budget, and according to project requirements.
answer

True
question

The level of a project’s risk is influenced primarily by
answer

project size, project structure, and the level of technical expertise.
question

The most widely used project management software today is
answer

Microsoft Project.
question

The most widely used project management software today is
answer

Microsoft Project.
question

The most widely used project management software today is
answer

Microsoft Project.

Get instant access to
all materials

Become a Member